We seamlessly integrate our capabilities in forensic technology and fraud investigation to identify, retrieve, normalize and analyze large, diverse and complex data sets. By using advanced technology we produce fact-driven insights enabling our clients to make defensible and informed decisions related to litigation, dispute resolution, regulatory and prosecutorial investigations, false claims, whistleblower claims, or other critical matters.
Our forensic technology services include:
We have extensive experience in the analysis and mining of large, diverse and complex information systems to identify unexpected patterns and expose inconsistencies and irregularities. Our professionals use sophisticated forensic tools to combine disparate datasets, financial records and unstructured data into a single platform for investigation and analysis where there is a dispute, allegations of fraud or misconduct.
We efficiently identify and collect relevant and responsive data across enterprise-wide systems and repositories including proprietary or outsourced third-party systems.
We use sophisticated tools to visually communicate results clearly and effectively using the data to tell a story that is accessible, understandable and usable.
Forensically sound methods are used to recover and preserve key digital evidence, whether that evidence was intentionally deleted or manipulated. Our multidisciplinary team can recover and recreate data history to investigate suspicious activity. We follow industry best practices and forensic protocols to confirm facts and eliminate false assumptions. Our customized investigation solutions in both fraud and internal investigations include:
Evidence and data collection | Data preservation | Forensic data analysis | Expert testimony and reporting
Lindsay H. Gill
Director of Forensic Technology
Lindsay H. Gill is the director of forensic technology at Forensic Strategic Solutions. Ms. Gill has a breadth of experience in data analytics, computer forensics, internal investigations, antifraud programs and controls, fraud vulnerability assessments, and investigative financial consulting.
Wade Morgan, president/CEO at Alabama Forensic Data Services, Inc., serves as a professional partner and computer forensics advisor. Mr. Morgan specializes in the area of computer examinations, electronic data recovery and cell phone forensics.
FSS was hired by the Board of Directors of a regional company to assist with an internal investigation amid questions of unexplained declines in cash flows and the lack of timely financial reporting.READ CASE STUDY
Data Analytics with a Focus on Technology | Lindsay H. Gill
Lindsay Gill, director of technology at Forensic Strategic Solutions, reviews the key areas in which technology has changed the landscape of fraud investigation and how data continues to become a growing risk for businesses.WATCH VIDEO
Leveraging Social Media in Fraud Investigations – I | Lindsay H. Gill
Lindsay Gill, director of forensic technology at Forensic Strategic Solutions, discusses social media and its role as a helpful tool to uncover fraudulent electronic evidence in an investigation. She also describes best practices for forensic investigators to collect, analyze and interpret findings to connect the dots.WATCH VIDEO
Leveraging Social Media in Fraud Investigations – II | Lindsay H. Gill
Lindsay Gill, director of forensic technology at Forensic Strategic Solutions, shares insight into the benefits associated with attorneys hiring forensic investigators to uncover evidence on suspects’ social media accounts. She also discusses how to authenticate the evidence gathered and the methods to do so.WATCH VIDEO
Unlocking the Potential of Electronically Stored Information | Kelly J. Todd
Think twice before you assume that an unsophisticated small business cannot possibly have any useful or accessible electronically stored information (ESI).READ FULL BLOG
Electronically Stored Information: The Case Study | Kelly J. Todd
You might not think that a small business would have useful or accessible electronically stored information (ESI). Consider this example of identifying and obtaining relevant forensic evidence to determine lost profit damages with this particular small business.READ FULL BLOG
How to Find Electronically Stored Information | Kelly J. Todd
In our case study, gas station owner, Morris, has alleged that Green Fuel, a small gasoline distributor, overcharged him. Both parties had inadequate and unsophisticated documentation, making determining losses very difficult.READ FULL BLOG
Computer Forensics v. E-Discovery: What Every Expert Should Know | Kelly J. Todd
Increasingly, the answers to the most fundamental litigation questions – the “who, what, where, when, and why” – are contained in electronically stored information (ESI), which can be retrieved through electronic discovery (e-discovery) and/or computer forensics.READ FULL BLOG
QuickBooks Audit Trail: Leveraging This Tool to Expose the Footprints of a Fraudster | Forensic Strategic Solutions
Employers, if you use QuickBooks for your company’s accounting needs, you have a built-in tool for fraud prevention and detection at no additional cost to you: the QuickBooks Audit Trail.READ FULL BLOG
Social Media in Fraud Investigations | Lindsay H. Gill
There’s no denying it: social media has changed the way we interact with each other. People are tweeting live from events, “checking in” on Facebook, posting pictures to Instagram and commenting on, liking or sharing just about everything. The amount of personal information that social media users willingly put “out there” is staggering.READ FULL BLOG
B.Y.O.D. | Lindsay H. Gill
“Bring your own device,” or “B.Y.O.D,” is a concept that an increasing number of companies are implementing. B.Y.O.D allows employees to use their personally-owned devices in the work place. These devices can range from laptops and tablets to cell phones and flash drives. While B.Y.O.D may be a good plan in theory – employees can work with devices they are comfortable using – It is important for employers to thoroughly consider the implications and potential pitfalls before implementing a B.Y.O.D policy. Consider, for example, the following key areas regarding the security of corporate information and infrastructure:READ FULL BLOG
Let’s Get Digital: Putting Benford’s Law to Use in Fraud Examinations | Forensic Strategic Solutions
A man by the name of Frank Benford. In the 1930s, physicist Benford developed a theory of leading digits, now known as Benford’s Law. Benford’s Law tells us that in a variety of data sets, the probability of occurrence of each digit (0 through 9) as the first digit in a number follows a certain distribution. That is, the digit 1 will occur with about a 30% frequency, followed by the digit 2 at 17.6%, through the digit 9 at 4.6%. See Figure 1.READ FULL BLOG
Cyber-security: Minimizing Internal Threats | Kelly J. Todd
Like a magician’s sleight of hand, the barrage of headline news related to hackers and cyber criminals may divert attention away from the equally dangerous, but perhaps less obvious, threat to your corporate assets: employees. While trusted employees are moving, sharing, and exposing corporate data just to do their jobs, the malicious employee may be deliberately taking confidential information for personal gain or other nefarious reasons.READ FULL BLOG
Technology Talk: Excel Shortcuts | Lindsay H. Gill
I was recently surprised to learn at a team meeting that my peers were not as familiar with the many Excel shortcuts that I apparently take for granted. Urged by our team to share more, I decided I should share a few of the more frequently used Excel shortcuts with you:READ FULL BLOG
Summation Shortcuts | Leslie P. Littrell
Rooting through and indexing large amounts of documents can be a complex and time-consuming task, placing undue burdens on investigators and clogging a case’s workload. This sort of complication can have negative effects on the timeline and outcome of a case. Enter Summation, an excellent multi-faceted software program used to keep documents organized so that […]READ FULL BLOG
Technology Talk: Active Data for Excel | Lindsay H. Gill
We all recognize budget is a constant concern for auditors and investigators. Oftentimes our technology budgets are just too tight. We find ourselves looking for powerful tools to add to our toolbox that do not break the bank. One of these tools is Active Data for Excel.READ FULL BLOG
The Digital Footprint: Where to Look | Lindsay H. Gill
The world of technology offers the opportunity for fraud experts to trace the “untraceable.” With technology becoming more popular and present in our lives by the day, people are conducting their lives more digitally, whether through email, texting, social media or Internet browsing. Collecting, analyzing and interpreting the electronic evidence of fraudulent activity is becoming more widespread in the fraud examination world, and will most likely soon become the standard.READ FULL BLOG
Social Media Evidence: Where to Look and Protocols to Follow | Lindsay H. Gill
As a digital technology expert, it is fascinating to observe how today’s technology-centric world obsesses over anything and everything digital – especially social media. From sharing locations on Instagram and Facebook to live tweeting events, people constantly update their friends – and strangers, if their account is public – on their every movement. Social media […]READ FULL BLOG
Quickbooks Audit Trail: Fraudulent Behavior Detection | Lindsay H. Gill
The QuickBooks Audit Trail (or Audit Log, depending on the version) provides a log of each accounting transaction and denotes any additions, deletions or modifications affecting the integrity of the transaction. The tool captures every transaction from the time it is initially entered into QuickBooks, and tracks changes to the original entry, including transaction type, date, account, vendor/customer name, transaction amount, quantity, and price. The Audit Trail also reveals the User ID under which the entry, deletion or modification was made. The Audit Trail is a report built in the QuickBooks ReportCenter– all you have to do is click a button to generate the report.READ FULL BLOG