We seamlessly integrate our capabilities in forensic technology and fraud investigation to identify, retrieve, normalize and analyze large, diverse and complex data sets. By using advanced technology we produce fact-driven insights enabling our clients to make defensible and informed decisions related to litigation, dispute resolution, regulatory and prosecutorial investigations, false claims, whistleblower claims, or other critical matters.
Our forensic technology services include:
We have extensive experience in the analysis and mining of large, diverse and complex information systems to identify unexpected patterns and expose inconsistencies and irregularities. Our professionals use sophisticated forensic tools to combine disparate datasets, financial records and unstructured data into a single platform for investigation and analysis where there is a dispute, allegations of fraud or misconduct.
We efficiently identify and collect relevant and responsive data across enterprise-wide systems and repositories including proprietary or outsourced third-party systems.
We use sophisticated tools to visually communicate results clearly and effectively using the data to tell a story that is accessible, understandable and usable.
Forensically sound methods are used to recover and preserve key digital evidence, whether that evidence was intentionally deleted or manipulated. Our multidisciplinary team can recover and recreate data history to investigate suspicious activity. We follow industry best practices and forensic protocols to confirm facts and eliminate false assumptions. Our customized investigation solutions in both fraud and internal investigations include:
Evidence and data collection | Data preservation | Forensic data analysis | Expert testimony and reporting
Lindsay H. Gill
Director of Forensic Technology
Lindsay H. Gill is the director of forensic technology at Forensic Strategic Solutions. Ms. Gill has a breadth of experience in data analytics, computer forensics, internal investigations, antifraud programs and controls, fraud vulnerability assessments, and investigative financial consulting.
Wade Morgan
Computer Forensic Advisor
Wade Morgan, president/CEO at Alabama Forensic Data Services, Inc., serves as a professional partner and computer forensics advisor. Mr. Morgan specializes in the area of computer examinations, electronic data recovery and cell phone forensics.
Computer Forensics
FSS was hired by the Board of Directors of a regional company to assist with an internal investigation amid questions of unexplained declines in cash flows and the lack of timely financial reporting.
READ CASE STUDYFalse Claims Investigation
When a whistleblower sounded the alarm on their employer that had allegedly violated the Anti-Kickback Statute and submitted false claims to the government, FSS was hired by the whistleblower’s attorneys to pinpoint evidence and determine the value of any identified claims.
READ CASE STUDYData Analytics with a Focus on Technology | Lindsay H. Gill
Lindsay Gill, director of technology at Forensic Strategic Solutions, reviews the key areas in which technology has changed the landscape of fraud investigation and how data continues to become a growing risk for businesses.
WATCH VIDEOLeveraging Social Media in Fraud Investigations – I | Lindsay H. Gill
Lindsay Gill, director of forensic technology at Forensic Strategic Solutions, discusses social media and its role as a helpful tool to uncover fraudulent electronic evidence in an investigation. She also describes best practices for forensic investigators to collect, analyze and interpret findings to connect the dots.
WATCH VIDEOLeveraging Social Media in Fraud Investigations – II | Lindsay H. Gill
Lindsay Gill, director of forensic technology at Forensic Strategic Solutions, shares insight into the benefits associated with attorneys hiring forensic investigators to uncover evidence on suspects’ social media accounts. She also discusses how to authenticate the evidence gathered and the methods to do so.
WATCH VIDEOUsing Data to Tell a Story & Find the Answers | Kelly J. Todd
Kelly J. Todd, managing member and member in charge of forensic investigations, discusses how FSS uses advanced data analytics to ferret out the truth in fraud investigations via data visualization. Kelly explains how electronic evidence and data can be leveraged in forensic investigations, from verifying or challenging a plaintiff’s testimony to identifying trends and patterns […]
WATCH VIDEOAnalyzing the Variety of Data | Lindsay H. Gill
Lindsay H. Gill, director of forensic technology, discusses the differences between structured data – or “traditional” data – and unstructured data, which investigators use to help fill the holes or see the bigger picture within a case. Lindsay also explains how forensic investigators should use and compare structured and unstructured data.
WATCH VIDEOThe Power of Advanced Data Analytics | Lindsay H. Gill
Lindsay H. Gill, director of forensic technology, explains the benefits advanced data analytics bring to financial investigations Advanced data analytics can provide unparalleled insights when attorneys enlist forensic investigators, helping to ensure vital information does not go undetected.
WATCH VIDEOUnlocking the Potential of Electronically Stored Information | Kelly J. Todd
Think twice before you assume that an unsophisticated small business cannot possibly have any useful or accessible electronically stored information (ESI).
READ FULL BLOGElectronically Stored Information: The Case Study | Kelly J. Todd
You might not think that a small business would have useful or accessible electronically stored information (ESI). Consider this example of identifying and obtaining relevant forensic evidence to determine lost profit damages with this particular small business.
READ FULL BLOGHow to Find Electronically Stored Information | Kelly J. Todd
In our case study, gas station owner, Morris, has alleged that Green Fuel, a small gasoline distributor, overcharged him. Both parties had inadequate and unsophisticated documentation, making determining losses very difficult.
READ FULL BLOGComputer Forensics v. E-Discovery: What Every Expert Should Know | Kelly J. Todd
Increasingly, the answers to the most fundamental litigation questions – the “who, what, where, when, and why” – are contained in electronically stored information (ESI), which can be retrieved through electronic discovery (e-discovery) and/or computer forensics.
READ FULL BLOGQuickBooks Audit Trail: Leveraging This Tool to Expose the Footprints of a Fraudster | Forensic Strategic Solutions
Employers, if you use QuickBooks for your company’s accounting needs, you have a built-in tool for fraud prevention and detection at no additional cost to you: the QuickBooks Audit Trail.
READ FULL BLOGSocial Media in Fraud Investigations | Lindsay H. Gill
There’s no denying it: social media has changed the way we interact with each other. People are tweeting live from events, “checking in” on Facebook, posting pictures to Instagram and commenting on, liking or sharing just about everything. The amount of personal information that social media users willingly put “out there” is staggering.
READ FULL BLOGB.Y.O.D. | Lindsay H. Gill
“Bring your own device,” or “B.Y.O.D,” is a concept that an increasing number of companies are implementing. B.Y.O.D allows employees to use their personally-owned devices in the work place. These devices can range from laptops and tablets to cell phones and flash drives. While B.Y.O.D may be a good plan in theory – employees can work with devices they are comfortable using – It is important for employers to thoroughly consider the implications and potential pitfalls before implementing a B.Y.O.D policy. Consider, for example, the following key areas regarding the security of corporate information and infrastructure:
READ FULL BLOGLet’s Get Digital: Putting Benford’s Law to Use in Fraud Examinations | Forensic Strategic Solutions
A man by the name of Frank Benford. In the 1930s, physicist Benford developed a theory of leading digits, now known as Benford’s Law. Benford’s Law tells us that in a variety of data sets, the probability of occurrence of each digit (0 through 9) as the first digit in a number follows a certain distribution. That is, the digit 1 will occur with about a 30% frequency, followed by the digit 2 at 17.6%, through the digit 9 at 4.6%. See Figure 1.
READ FULL BLOGCyber-security: Minimizing Internal Threats | Kelly J. Todd
Like a magician’s sleight of hand, the barrage of headline news related to hackers and cyber criminals may divert attention away from the equally dangerous, but perhaps less obvious, threat to your corporate assets: employees. While trusted employees are moving, sharing, and exposing corporate data just to do their jobs, the malicious employee may be deliberately taking confidential information for personal gain or other nefarious reasons.
READ FULL BLOGTechnology Talk: Excel Shortcuts | Lindsay H. Gill
I was recently surprised to learn at a team meeting that my peers were not as familiar with the many Excel shortcuts that I apparently take for granted. Urged by our team to share more, I decided I should share a few of the more frequently used Excel shortcuts with you:
READ FULL BLOGSummation Shortcuts | Leslie P. Littrell
Rooting through and indexing large amounts of documents can be a complex and time-consuming task, placing undue burdens on investigators and clogging a case’s workload. This sort of complication can have negative effects on the timeline and outcome of a case. Enter Summation, an excellent multi-faceted software program used to keep documents organized so that […]
READ FULL BLOGTechnology Talk: Active Data for Excel | Lindsay H. Gill
We all recognize budget is a constant concern for auditors and investigators. Oftentimes our technology budgets are just too tight. We find ourselves looking for powerful tools to add to our toolbox that do not break the bank. One of these tools is Active Data for Excel.
READ FULL BLOGThe Digital Footprint: Where to Look | Lindsay H. Gill
The world of technology offers the opportunity for fraud experts to trace the “untraceable.” With technology becoming more popular and present in our lives by the day, people are conducting their lives more digitally, whether through email, texting, social media or Internet browsing. Collecting, analyzing and interpreting the electronic evidence of fraudulent activity is becoming more widespread in the fraud examination world, and will most likely soon become the standard.
READ FULL BLOGSocial Media Evidence: Where to Look and Protocols to Follow | Lindsay H. Gill
As a digital technology expert, it is fascinating to observe how today’s technology-centric world obsesses over anything and everything digital – especially social media. From sharing locations on Instagram and Facebook to live tweeting events, people constantly update their friends – and strangers, if their account is public – on their every movement. Social media […]
READ FULL BLOGQuickbooks Audit Trail: Fraudulent Behavior Detection | Lindsay H. Gill
The QuickBooks Audit Trail (or Audit Log, depending on the version) provides a log of each accounting transaction and denotes any additions, deletions or modifications affecting the integrity of the transaction. The tool captures every transaction from the time it is initially entered into QuickBooks, and tracks changes to the original entry, including transaction type, date, account, vendor/customer name, transaction amount, quantity, and price. The Audit Trail also reveals the User ID under which the entry, deletion or modification was made. The Audit Trail is a report built in the QuickBooks ReportCenter– all you have to do is click a button to generate the report.
READ FULL BLOGThe Power (and Variety) of Data in Forensic Investigations | Lindsay H. Gill
Time and time again, we trumpet the incredible value of advanced data analytics in forensic investigations – often, it is the key to finding the needle in the haystack. Fortunately, our firm remains at the forefront of utilizing data to identify unexpected patterns when investigating financial fraud – that red flag that tells us something isn’t as it should be – whether for a qui tam case involving kickback schemes or a case of underreported revenue.
READ FULL BLOG