JLA Outbrief Mitchell K

pptx

School

American Military University *

*We aren’t endorsed by this school

Course

455

Subject

Accounting

Date

Jun 5, 2024

Type

pptx

Pages

13

Uploaded by SuperHumanMoonGoldfish41

Report
JLA Enterprise OutBrief Case #ISSC455-20-001 Karisma Mitchell CONFIDENTIA L 03/26/2024
SCOPE 01 CO NFIDENTIAL 03/26/2024 APUS Investigation
SCOPE In accordance with the contract signed between American Public University System (APUS) and JLA Enterprise, APUS conducted secondary analysis on report findings provided by Dr. Kevin Malone titled “Attempted 10/15/2019 Fraud against JLA Enterprise Examination Report” along with all necessary evidence associated with that analysis.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Executive Summary 02 CO NFIDENTIAL 03/26/2024 APUS Investigation
EXECUTIVE SUMMARY Over a 48-hour period between October 15 - 17, 2019, Michael SCOTT (Managing Partner, DSS Venture Partners LTD and former consultant to JLA Enterprise) attempted to extort $2.3M USD via wire transfer to a bank in East Hun Chiu from JLA Enterprise using a sophisticated phishing scam. SCOTT crafted 15 emails, created a counterfeit JLAENTREPRISE.COM domain, and five counterfeit email accounts with the purpose of building reputability to attempt to defraud JLA Enterprise. SCOTT fabricated email responses to ensure the individuals in the email chain would believe HE was not involved. On October 17, 2019, at 0237 hours, JLA Enterprise personnel identified the counterfeit domain triggering an internal investigation and seeking external professional assistance.
Findings 03 CO NFIDENTIAL 03/26/2024 APUS Investigation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
FINDINGS An analysis of all evidence in the JLA Enterprise Fraud case has left us with 17 identifying pieces of evidence to make a case, The findings identified by Dr. Kevin Malone were consistent with the findings identified during the independent analysis. Two additional emails of interest were identified during this analysis as well. 3.1 Quick View 3.2 Email 1: Sabre Project - October 15, 2019 - 1938 hours 3.3 Email 2: Sabre Project - October 15, 2019 - 1947 hours 3.4 JLAENTREPRISE.com Domain Created - October 15, 2019 - 2054 hours 3.5 Email 3: Sabre Project - October 15, 2019 - 2258 hours 3.6 Email 4: Sabre Project - October 16, 2019 - 0653 hours 3.7 Email 5: Sabre Project - October 17, 2019 - 1123 hours 3.8 Email 6: JLA Enterprise and Sabre Project - October 17, 2019 - 1209 hours 3.9 Email 7: Sabre Project - October 17, 2019 - 1325 hours 3.10 Email 8: Sabre Project - October 17, 2019 - 1337 hours 3.11 Email 9: JLA Enterprise and Sabre Project - October 17, 2019 - 1431 hours 3.12 Email 10: Sabre Project Wiring Instruction - October 17, 2019 1443 hours 3.13 Email 11: Sabre Project Wire Transfer - October 17, 2019 - 1445 hours 3.14 Email 12: Sabre Project Wire Transfer - October 17, 2019 - 1459 hours 3.15 Email 13: Sabre Project Wiring Instruction - October 17, 2019 - 1506 hours 3.16 Email 14: Sabre Project Wire Transfer - October 17, 2019 - 1542 hours 3.17 Email 15: Sabre Project Wiring Instruction - October 19, 2019 - 1202 hours 3.18 Phishing Scam Sent to JLA Enterprise Consultant - October 19, 2019 - 2233 hours
LEADING UP 03 CO NFIDENTIAL 03/26/2024 APUS Investigation
LEADING UP It has also been discovered that months before the fraud phishing scam, there were IP addresses that would also lead up to SCOTT being marked as the suspect in the case.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
EMAILS 1 AND 2 June 01, 2019 – 0710 hours August 02, 2019 – 1808 hours Figure 50 – IPv6 Geographical Location - Figure 51 - IP Geographical Location – 23.239.21.243 2601:98a:100:57b:206f:26a1:323a:fb5c Figure 51 - IP Geographical Location – 23.239.21.243
RECOMMENDATION 1. Use official emails only to conduct any form of business. 2. All funds should require a two-factor authentication before any fund transfers begin. 3. Utilize a more secure and extensive messaging system- especially when it comes to company business, clients, and funds. 03/26/2024 CONFIDENTIA L
QUESTION S 04 CO NFIDENTIAL 03/26/2024 APUS Investigation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
QUESTIONS Did Scott really try to steal money from the company? Who was working with Scott? What can the police charge him with?