Starting with taking possession of the mobile device

Assignment Help Basic Computer Science
Reference no: EM131756234

In December 2013, a serial con artist plead guilty to Bank Fraud and Identity Theft. According to the plea agreement, the 'con artist' committed crimes from at least as early as July 2011 through May 2013, when she was finally arrested. Over a period of two years, and at least 58 times, the criminal defrauded banks and individuals. As part of her scheme she would approach people, usually at ATMs, and give them a sad story about her need to cash a check and her inability to deposit the check into her bank account. She would convince her victims to deposit the checks, which were worthless, into their own account and then withdraw funds, sometimes giving them $100 for their trouble.

The fake checks were generally drawn on closed accounts, because the checks had been stolen or were from the accounts of deceased individuals. When she was arrested for failure to appear warrants in May 2013, some of the items recovered included a checkbook, stolen from a purse at a local mall, along with the victim's Driver's License, Social Security card, a Visa card, and a bank debit card.

Question: you are a Digital Forensic investigator who has been hired by the attorney for the convicted party. The attorney tells you that the case is under appeal based on the argument that the 'con artist' was coerced to confess. The attorney also gives you a cellphone belonging to his party and asks you to run a thorough examination of the mobile device to extract any data that may be important to this case.

Detail the steps you would take in your investigation, starting with taking possession of the mobile device.

Reference: https://www.justice.gov/usao-mdfl/pr/serial-con-artist-pleads-guilty-bank-fraud-and-aggravated-identity-theft

Reference no: EM131756234

Questions Cloud

Create a diagram of a virtual server environment : Assignment: Disaster Recovery and High Availability. In this assignment, you will have the opportunity to create a diagram of a virtual server environment.
Required for a primary key in god : Assuming both these assertions to be true, what is the minimum number of bits required for a primary key in God's star database? Explain.
Discuss the investment of each partner relative : Income is allocated based on the investment of each partner relative to the total investment of both partners
Description of pipe network that will supply hot water : CME2023 Assignment - Central Heating System Design. Fluid Flow - Description of pipe network that will supply hot water to the radiators
Starting with taking possession of the mobile device : Detail the steps you would take in your investigation, starting with taking possession of the mobile device.
What is elijah adjusted basis in the stock : Elijah Soro owns 100 shares of common stock, each with an adjusted basis of $40, in Dowe Magazine Racks. Dowe distributes one share of common stock for every.
Makes use of an american or european celebrity : Find an example of a Japanese ad that makes use of an American or European celebrity.
Does the process remain in control : Does the process remain in control? Does the data for March appear to be in control? Please support your with calculations.
Give some ideas or thoughts on other methods : Give some ideas or thoughts on other methods of attaining IT Quality apart from the ITIL framework.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd