FSS was hired by the Board of Directors of a regional company to assist with an internal investigation amid questions of unexplained declines in cash flows and the lack of timely financial reporting.
As part of the internal investigation, FSS collected and examined forensic images of several computers.
Our examination of the allocated and unallocated areas of the hard drives and the recovery of deleted files identified:
Lindsay H. Gill
Director of Forensic Technology
Lindsay H. Gill is the director of forensic technology at Forensic Strategic Solutions. Ms. Gill has a breadth of experience in data analytics, computer forensics, internal investigations, antifraud programs and controls, fraud vulnerability assessments, and investigative financial consulting.
False Claims Investigation
When a whistleblower sounded the alarm on their employer that had allegedly violated the Anti-Kickback Statute and submitted false claims to the government, FSS was hired by the whistleblower’s attorneys to pinpoint evidence and determine the value of any identified claims.
READ FULL CASE STUDYComputer Forensics
FSS was hired by the Board of Directors of a regional company to assist with an internal investigation amid questions of unexplained declines in cash flows and the lack of timely financial reporting.
READ FULL CASE STUDYThe Power of Advanced Data Analytics | Lindsay H. Gill
Lindsay H. Gill, director of forensic technology, explains the benefits advanced data analytics bring to financial investigations Advanced data analytics can provide unparalleled insights when attorneys enlist forensic investigators, helping to ensure vital information does not go undetected.
WATCH VIDEOAnalyzing the Variety of Data | Lindsay H. Gill
Lindsay H. Gill, director of forensic technology, discusses the differences between structured data – or “traditional” data – and unstructured data, which investigators use to help fill the holes or see the bigger picture within a case. Lindsay also explains how forensic investigators should use and compare structured and unstructured data.
WATCH VIDEOUsing Data to Tell a Story & Find the Answers | Kelly J. Todd
Kelly J. Todd, managing member and member in charge of forensic investigations, discusses how FSS uses advanced data analytics to ferret out the truth in fraud investigations via data visualization. Kelly explains how electronic evidence and data can be leveraged in forensic investigations, from verifying or challenging a plaintiff’s testimony to identifying trends and patterns […]
WATCH VIDEOLeveraging Social Media in Fraud Investigations – II | Lindsay H. Gill
Lindsay Gill, director of forensic technology at Forensic Strategic Solutions, shares insight into the benefits associated with attorneys hiring forensic investigators to uncover evidence on suspects’ social media accounts. She also discusses how to authenticate the evidence gathered and the methods to do so.
WATCH VIDEOLeveraging Social Media in Fraud Investigations – I | Lindsay H. Gill
Lindsay Gill, director of forensic technology at Forensic Strategic Solutions, discusses social media and its role as a helpful tool to uncover fraudulent electronic evidence in an investigation. She also describes best practices for forensic investigators to collect, analyze and interpret findings to connect the dots.
WATCH VIDEOData Analytics with a Focus on Technology | Lindsay H. Gill
Lindsay Gill, director of technology at Forensic Strategic Solutions, reviews the key areas in which technology has changed the landscape of fraud investigation and how data continues to become a growing risk for businesses.
WATCH VIDEOFinancial Fraud Investigations: Why an Employee’s Vacation is a Great Time to Detect Fraud | Lindsay H. Gill
Time off isn’t just a necessity to help employees recover and regroup, it’s also an opportunity for an organization to measure its efficiency and to uncover vulnerabilities it may face from fraud, waste, and abuse. Here are just a few of the ways an organization can leverage its vacation and time-off policies to help detect […]
READ FULL BLOGIn a Financial Fraud Investigation, It Pays to Follow the Digital Footprint | Lindsay H. Gill
Fraudsters often believe they have covered their tracks so well that their activity is untraceable, but they are increasingly running into a significant obstacle when attempting to hide their crimes: Their digital footprint. During the last decade, people have integrated digital tools into their personal and business lives at an astonishing rate. Since 2010, for […]
READ FULL BLOGWhat Beneficiaries Can Do to Help Spot Fraud in a Trust or Estate | Lindsay H. Gill
It’s an all-too frequent concern for people who are no longer managing their own finances: Are they being taken advantage of by a trustee, executor, or attorney-in-fact—and what can they do to spot and prevent such activity? At Forensic Strategic Solutions, we are often approached by beneficiaries or their loved ones to investigate possible trust […]
READ FULL BLOGEight Tips for Detecting Fraud in Accounts Payable | Lindsay H. Gill
According to the Association of Certified Fraud Examiners 2018 Report to the Nations, fraudulent disbursement schemes remain the costliest form of asset misappropriation fraud to threaten small businesses. Although this risk can seem overwhelming, it may be avoidable through taking proactive steps against fraud within your company. Here are eight tips to help you expose […]
READ FULL BLOGThe Power (and Variety) of Data in Forensic Investigations | Lindsay H. Gill
Time and time again, we trumpet the incredible value of advanced data analytics in forensic investigations – often, it is the key to finding the needle in the haystack. Fortunately, our firm remains at the forefront of utilizing data to identify unexpected patterns when investigating financial fraud – that red flag that tells us something isn’t as it should be – whether for a qui tam case involving kickback schemes or a case of underreported revenue.
READ FULL BLOGQuickbooks Audit Trail: Fraudulent Behavior Detection | Lindsay H. Gill
The QuickBooks Audit Trail (or Audit Log, depending on the version) provides a log of each accounting transaction and denotes any additions, deletions or modifications affecting the integrity of the transaction. The tool captures every transaction from the time it is initially entered into QuickBooks, and tracks changes to the original entry, including transaction type, date, account, vendor/customer name, transaction amount, quantity, and price. The Audit Trail also reveals the User ID under which the entry, deletion or modification was made. The Audit Trail is a report built in the QuickBooks ReportCenter– all you have to do is click a button to generate the report.
READ FULL BLOGSocial Media Evidence: Where to Look and Protocols to Follow | Lindsay H. Gill
As a digital technology expert, it is fascinating to observe how today’s technology-centric world obsesses over anything and everything digital – especially social media. From sharing locations on Instagram and Facebook to live tweeting events, people constantly update their friends – and strangers, if their account is public – on their every movement. Social media […]
READ FULL BLOGThe Digital Footprint: Where to Look | Lindsay H. Gill
The world of technology offers the opportunity for fraud experts to trace the “untraceable.” With technology becoming more popular and present in our lives by the day, people are conducting their lives more digitally, whether through email, texting, social media or Internet browsing. Collecting, analyzing and interpreting the electronic evidence of fraudulent activity is becoming more widespread in the fraud examination world, and will most likely soon become the standard.
READ FULL BLOGTechnology Talk: Active Data for Excel | Lindsay H. Gill
We all recognize budget is a constant concern for auditors and investigators. Oftentimes our technology budgets are just too tight. We find ourselves looking for powerful tools to add to our toolbox that do not break the bank. One of these tools is Active Data for Excel.
READ FULL BLOGTechnology Talk: Excel Shortcuts | Lindsay H. Gill
I was recently surprised to learn at a team meeting that my peers were not as familiar with the many Excel shortcuts that I apparently take for granted. Urged by our team to share more, I decided I should share a few of the more frequently used Excel shortcuts with you:
READ FULL BLOGB.Y.O.D. | Lindsay H. Gill
“Bring your own device,” or “B.Y.O.D,” is a concept that an increasing number of companies are implementing. B.Y.O.D allows employees to use their personally-owned devices in the work place. These devices can range from laptops and tablets to cell phones and flash drives. While B.Y.O.D may be a good plan in theory – employees can work with devices they are comfortable using – It is important for employers to thoroughly consider the implications and potential pitfalls before implementing a B.Y.O.D policy. Consider, for example, the following key areas regarding the security of corporate information and infrastructure:
READ FULL BLOGSocial Media in Fraud Investigations | Lindsay H. Gill
There’s no denying it: social media has changed the way we interact with each other. People are tweeting live from events, “checking in” on Facebook, posting pictures to Instagram and commenting on, liking or sharing just about everything. The amount of personal information that social media users willingly put “out there” is staggering.
READ FULL BLOG