Digital Forensic Services Involving Fraud and Dispute.
We provide a range of services to clients concerning the access to data that may be used as evidence to support one assertion or the other in matters of fraud and dispute.
The huge variety of electronic storage systems now involved in litigation means that professionals and legal practitioners need specialist and timely support in undertaking their duties to the client and the court.
Evidence Data Discovery. We can assist in conducting any investigation concerning the use or existence of files, folders and data stored on computer or communications related devices.
You may be responding to a regulatory request or monitoring compliance with fiscal regulations or simply searching for old emails that relate to your business problem.
Increased business reliance on electronic information and the adoption of email as the current standard of daily communication has exploded the volume of electronic information. Huge amounts of electronic evidence present significant challenges for businesses faced with disputes, regulatory or other investigations and factual reviews. The essential challenge faced with that volume is how to get to the relevant information quickly and cost-effectively. The cost of getting it wrong can result in a diminished reputation as well as economic loss.
Computer Science Labs is focused on understanding your challenges and finding the right tools and processes to address your specific ends. These tools and processes are built around a consistent and repeatable framework based on the Forensic Science recommendations.
Information in electronic format required in civil proceedings is of an intangible form, volume, transience and persistence and will generally have associated “metadata” not present in paper documents. Paper documents can be scanned into electronic format and then manually coded with metadata. Computer Science labs can, subject to available resources, assist in the collection, sorting, search and management of such data documents.
Evidence Data Preservation.Preservation of documents and metadata creates special challenges. Meta data is a feature of evidence in litigation and must be preserved such that the provenance of documents can be adequately established and acted upon.
Data Analysis.Structured data is everywhere. Your business is sitting on mountains of it. You may have duplicate procurement entries amounting to full percentage points of your total expenditure. You may deal with ghost vendors that exist nowhere other than on your accounts. Your expense controls may be being flouted on a regular basis. There may be chains of payments circling between entities that cost you dearly, yet make others rich. Your well thought out compliance framework may be exposed by those who are simply not following the rules. Making sense of large volumes of structured data is not a simple task.
All meaning depends on the key of interpretation. Data can present itself in many ways and the skill in making a correct interpretation is in knowing what to look for and how to look. Much structured data is buried in systems that were designed to support operational processes and which do not lend themselves well to examination. To assess them correctly one must understand the models upon which they are built and interpret the real-world actions which gave rise to the data that is stored. One must also look beyond the literal to the embroidered webs woven to disguise inappropriate behaviour. To not do so is a failure in understanding of what forensic data analysis is about.
Computer science Labs understands therefore that there is no out of the box solution to the majority of situations we are faced with and so we use our expertise to develop solutions that fit. Our analytical techniques and environment have been designed to ensure we employ leading edge procedures whilst retaining our flexibility and agility.
Examples of the types of data included in e-discovery are; e-mail messaging, accounting records, CAD files, Web sites, etc. This information may be stored on many types of equipment running different operating systems and application software. Computer Science Labs use forensic methods, procedures and software to help determine the relevance of documents to the matters in hand.
Presentation and Review.When establishing the facts in an investigation, it is essential that the most appropriate tools and techniques are used. Computer Science Labs use applications that fit our clients needs.
The volume and use of electronic data in business is ever expanding. The rewards that the information age has brought to business are balanced with similar levels of increased risk. Computer-based crime continues to grow rapidly and many organisations are now faced with growing cost implications.
Evidence of fraud, abuse, criminal offences or other wrong-doing often sits on a multitude of electronic sources. Electronic evidence presents many, often conflicting, challenges. It tends to be high on volume, low on context yet durable, it is difficult to delete data permanently. Yet electronic evidence is also fragile in more respects, for example, the simple act of turning a machine on or off alters many files. It is important to use specialist methods to identify, preserve and collect electronic data so as to maximize its value as evidence.
We are able to assist clients in improving the ability of their organisations to comply with legal and ethical obligations to protect information; in providing greater assurance that the integrity and privacy of information handled throughout the business life-cycle is effectively and efficiently maintained; and through improving the ability of the organisation to prevent and detect irresponsible, fraudulent and abusive behaviour. Throughout all engagements we work closely with our clients to ensure that our strategies achieve their specified business and legal objectives at a reasonable cost.
A review of material may include a number of formats such as printed paper, “native file”, PDF or image files such as TIFF etc. Presenting such documents may also involve the conversion of native files into an image format and the redaction of privileged or sensitive information.
Information resources concerning fraud.