Option #1: Theft and Concealment Investigation (Follow attached APA example)
Read the following case study and respond to the questions that follow: Walker, R. (2013). Maxxed out: TJX Companies and the Largest-Ever Consumer Data Breach. Kellog Case Publishing. Retrieved from https://hbsp.harvard.edu/tu/2f41e106
Assume you are an agent with the Federal Bureau of Investigation (FBI). You just captured the Soup Nazi and have been tasked with spearheading a secondary investigation into TJX Companies’ culpability in the data breach.
- Explain in detail how your task force would investigate TJX without alerting them to your new assignment, including how to collect the evidence, and which evidence to target.
- Design a vulnerability chart to coordinate the various elements of the possible fraud within TJX Companies.
- Include rationale and supporting references for your strategy.
Please submit a paper in a Word document of three to five pages in length, not including the title and reference pages. If you wish to include calculations in support of your response, place them in the form of a table within your paper. Cite at least two resources supporting your responses, other than the course textbook.