Securing Digital Evidence
• Computers and laptops
• Cell phones
• Servers and external storage
How to support an investigation
with data analysis?
How to secure digital evidence for further use?
How to detect trends in data that indicate fraud risks?
How to identify unusual communications or relationships with third parties?
• Computers and laptops
• Cell phones
• Servers and external storage
• Accounting data (e.g. trends)
• GPS coordinates
• Benchmarking
• Corporate communication tools (e-mail, Slack, WhatsApp, etc.)
• Business and accounting documentation (contracts, project documentation, purchase orders, invoices, delivery notes, etc.)
We analysed employee email communications to uncover potential unethical behaviour, securing data from email archive, identifying relevant files through keywords, reviewing the communications and compiling our findings into a report for the client’s legal team.
We created a bit-by-bit copy of a former employee’s mobile phone to recover lost data. This analysis enabled the recovery of key information necessary for further investigation.
We conducted a mock dawn raid, simulating an unannounced inspection by a regulatory or investigative body. The goal was to test employee reactions and internal processes for securing digital evidence and other relevant materials.
We processed financial transactions and identified suspicious payments in the scope of a broader financial data analysis, helping the client uncover potential instances of financial fraud.
We expanded a forensic investigation by collecting large datasets from work devices of suspected employees. We then processed the data to identify unusual connections between entities, suspicious messages, and questionable contractual documents.