🕵️

CASE SOLVED

Training Case CI-TRAIN-EN - Complete Solution

🎯 THE CULPRIT IS:

MARCUS WEBB
IT Administrator, Age 35

📋 CASE SUMMARY

Marcus Webb, the IT Administrator at TechStart Inc., orchestrated and executed the theft of David Park's laptop containing $2.5 million worth of proprietary AI software. The theft was carefully premeditated, with Marcus planning the crime at least one week in advance by scheduling security camera maintenance to create a surveillance blind spot.

On January 15, 2024, at 2:45 PM, Marcus used his administrative privileges to unlock David Park's office while David was away. He spent approximately 7 minutes inside the office, during which he took the MacBook Pro and placed it in his IT toolkit. He then left the building at 2:55 PM, appearing nervous to the security guard, and placed the toolkit in his car trunk.

The stolen laptop was recovered from Marcus Webb's vehicle on January 16, 2024, providing indisputable physical evidence of his guilt. Phone records also revealed that Marcus contacted TechVenture Capital, a competing company, immediately after the theft, indicating his intention to sell the stolen software.

🔍 THE EVIDENCE AGAINST MARCUS WEBB

1. Physical Evidence (The Smoking Gun)

  • The stolen laptop was found in Marcus's possession - discovered in his IT toolkit in his car trunk on January 16, 2024 (Evidence #04)
  • Serial number confirmed: Device matched David Park's registered MacBook Pro (TS-MBPRO-0847)
  • This alone is sufficient to prove guilt beyond reasonable doubt

2. Opportunity - Access & Timing

  • Administrative access: Marcus had master key privileges to unlock any office in the building (Evidence #01)
  • Security logs confirm: Marcus used admin override to unlock David's office at exactly 2:45 PM on January 15 (Evidence #01)
  • 7-minute window: Entered at 2:45 PM, exited at 2:52 PM - sufficient time to take the laptop (Evidence #01)
  • Surveillance blackout: Marcus scheduled camera maintenance for 2:00-4:00 PM, eliminating video evidence (Evidence #04)

3. Premeditation - Planned in Advance

  • Camera maintenance scheduled January 6 - nine days before the theft (Evidence #04)
  • Strategic timing: Maintenance window covered David's office during prime working hours
  • False work order: Created bogus "network diagnostic" task as cover story for accessing the office (Evidence #04)
  • Intelligence gathering: Email exchanges show Marcus asked David about the software's value and storage location (Evidence #02)

4. Motive - Financial Gain

  • Recently denied raise: Despite excellent performance reviews, Marcus was refused a salary increase (Case File)
  • Knowledge of value: Marcus knew the software was worth $2.5 million from his conversation with David (Evidence #02)
  • Competitor contact: Phone records show Marcus called TechVenture Capital at 3:05 PM - immediately after hiding the laptop (Evidence #04)
  • Multiple contacts: Marcus had been in communication with this competitor "multiple times over the past month" (Evidence #04)

5. Witness Testimony

  • Tom Bradford (Junior Developer): Saw Marcus use his access card to enter David's office at 2:45 PM and exit with his toolkit (Evidence #03)
  • James Chen (Security Guard): Observed Marcus leaving the building at 2:55 PM carrying his IT toolkit, acting nervous and sweating despite cool weather (Evidence #03)
  • Same witness: Noted Marcus returned at 3:15 PM without the toolkit - unusual behavior (Evidence #03)
  • Lisa Chen's presence: Lisa called Marcus at 2:32 PM and was seen waiting near David's office, possibly acting as lookout (Evidence #03 & #04)

6. Suspicious Behavior

  • Nervous demeanor: Security guard noted Marcus was "sweating" and "kept looking back at the elevators" (Evidence #03)
  • Toolkit disappearance: Left building with toolkit, returned without it - claimed he "dropped it off at his car for repairs" (Evidence #03)
  • Timing of phone call: Called competitor company within minutes of securing the laptop (Evidence #04)

📅 COMPLETE TIMELINE - HOW THE CRIME UNFOLDED

January 6
Initial Planning: Marcus schedules security camera maintenance for January 15, 2:00-4:00 PM, creating future surveillance gap for Office 3-12
January 8
Intelligence Gathering Begins: David emails Marcus about laptop performance issues, expressing concern about the valuable software on the device
January 9
Critical Information Obtained: David reveals the software is worth $2.5 million and is stored only locally on his laptop (not backed up to cloud)
January 14
Final Preparation: Marcus creates false work order for "network connectivity diagnostic" as cover story for accessing David's office the next day
Jan 15, 2:00 PM
David Secures Office: David Park locks his office from inside to work privately. Camera maintenance begins - surveillance goes offline
2:32 PM
Coordination Call: Lisa Chen calls Marcus (possibly acting as lookout to confirm coast is clear)
2:45 PM
THE THEFT OCCURS: Marcus uses administrative override to unlock David's office and enters with his IT toolkit. No cameras recording
2:52 PM
Exit: Marcus leaves the office after 7 minutes - laptop now in his toolkit
2:55 PM
Building Exit: Security guard observes Marcus leaving with toolkit, acting nervous, sweating, looking back at elevators
3:02 PM
Evidence Concealment: Parking lot camera shows Marcus placing toolkit in car trunk (discovered during investigation)
3:05 PM
Monetization Attempt: Marcus calls TechVenture Capital (competitor) - likely negotiating sale of stolen software
3:15 PM
Return to Building: Marcus re-enters without toolkit, tells security guard he "dropped it at his car for repairs later"
5:30 PM
Crime Discovered: David unlocks his office and discovers laptop missing, reports theft to security
January 16, 10:00 AM
CASE SOLVED: Police search Marcus's vehicle with warrant. Laptop discovered in IT toolkit in trunk. Serial number confirms it's David's stolen MacBook Pro

❌ WHY THE OTHER SUSPECTS ARE INNOCENT

Lisa Chen - Marketing Manager

Why she's innocent: While Lisa was present in the hallway and had a motive (needed software specs for her presentation), she lacks the technical means to execute the theft. She has no administrative access to unlock offices, and witness testimony shows she left immediately when Marcus arrived. She may have been involved as a lookout or accomplice, but she did not physically steal the laptop. Most importantly, the laptop was found in Marcus's possession, not hers. At worst, she was complicit, but Marcus was the primary perpetrator.

Sarah Miller - Chief Financial Officer

Why she's innocent: Sarah had strong financial motive (wanted David's project to fail to save budget) and was unaccounted for during the theft window. However, she has no technical knowledge, no administrative building access, and no means to unlock David's office. Her assistant's testimony about her absence is suspicious, but there's no physical evidence connecting her to the theft. The laptop was found in Marcus's possession. Sarah may have harbored ill will toward David, but she didn't commit the theft.

⚖️ CONCLUSION

Marcus Webb is guilty beyond reasonable doubt. He had motive (financial gain through selling to competitors), means (administrative access and technical knowledge), and opportunity (scheduled camera blackout and legitimate access to the office). The physical evidence - the laptop found in his possession - conclusively proves his guilt.

Marcus carefully planned this theft at least one week in advance, demonstrating premeditation. He created a surveillance blind spot, fabricated a work order as cover, and immediately contacted a competitor to sell the stolen intellectual property. His nervous behavior when leaving the building and the discovery of the laptop in his vehicle seal his conviction.

Recommended charges: Theft of intellectual property, computer fraud, corporate espionage, and attempted sale of stolen trade secrets.

🎉 CONGRATULATIONS, DETECTIVE!

You've successfully solved your first training case! You learned how to examine evidence, cross-reference witness statements with physical evidence, identify contradictions in alibis, and piece together a timeline of events.

Ready for a real case? The full cases are more complex with more suspects, evidence, and challenging puzzles to solve!