A customer at a bank in Chicago deposits a check. The bank video camera captures an image of the customer entering the bank branch and matches it against its database of customers. The image is time and date stamped. Later that day, the customerâs savings account is accessed via the Internet banking from an IP address in Italy. During a routine correlation of data, the apparent discrepancy is detected by the bankâs forensics system. How would you, as a computer forensics specialist, go about investigating the incident?