Forensic Data Mining / Red Flag Analysis / Journal Entry Testing

In case you want to know what unkown fraud risks are hidden inside of your financial systems or if you want to detect fraud in your transactions you should engage us to do a red flag analysis of your financial data. This way you might not only detect possible fraud but also see, if e.g. projects are split into several transactions to undermine underwriting limits and internal controls or if there are any unusually high transactions right before financial reports are issued.

Red Flag Analysis

We offer Red Flag Analysis (aka Journal Entry Testing) to uncover hidden risks in your financial data and to detected possible fraud that needs to be investigated. With a Red Flag Analysis every transaction in your financial systems will be analyzed for known patterns of fraud and statistical anomalies. Benford Analysis and Chi Square Test are only two of more than 170 known fraud patterns and statistical anomalies that every transaction will be tested and flagged against. This way you have a chance of identifying transactions related to fraud or that will lead to misstatements in your financial reportings and to mitigate the risk they pose to your company and to install apropriate controls to avoid further damage. The results from the red flag analysis can also be used for your internal audit plans and to create "richer" samples with more conspicuous transactions for all your internal and external audits. Also it can assist you with any Fraud Investigations or Compliance Audits by effectively reducing time and effort normally needed to investigate large sets of financial transactions to identify fraudulous ones.

Forensic Data Mining

Besides financial transactions there is lots of other data that could be analysed forensically for anomalies, process weaknesses or signs of fraud. This can be data from your sales department, procurement, materials management, logistics or from your production systems. Other individual or branch specific custom queries and analysis are possible, as there is almost no analysis that can not be run on "Big Data".

Fraud Monitoring

If you use Red Flag Analysis or Forensic Data Mining contiuously, you will also get a chance to monitor slow shifts in the structure of your companies processes and transactions. This allows to take appropriate measures against financial risks arising from these changes before severe damages happen.

If you are interested in a Red Flag Analysis or a Forensic Data Mining please contact us!

Digital Evidence Preservation & Collection

Digital evidence plays a vital role in many court orders, cartell investigations and investigations by the S.E.C or the D.o.J. The forensic preservation of digital evidence is paramount to all of these. It is important that digital evidence is preserved in compliance with IT forensic standards to prevent any accidental alteration or deletion of data which is important to avoid costly fines. To achieve this a strict management of digital evidence is necessary.

Digital evidence can be preserved from many different sources. The most commonly seen sources are hard disk drives from notebooks, desktop PCs and servers, external hard disk drives and USB thumbdrives, data from file, print and mail servers, backup data from SANs and backup tapes and other media like DVDs, CD-ROMs, Floppy disks and flash memory cards (SD,MMC,CF, ...) as well as mobile Devices like mobile phones, PDAs and smart phones, Blackberries, digital cameras and MP3 players.

IT Compliance Systeme GmbH offers the preservation of digital evidence according to forensic standards. We also assist you with the recovery of deleted data and the computer forensic analysis of the digital evidence as well as the management of your digital evidence.

Data recovery

After a successful preservation of digital evidence we normally recover data that has accidentally or deliberately been deleted. Oftentimes we can recover data has has been deleted a long time ago and that might even have survived a re-formatting of the disk. After the recovery a computer forensic analysis will be conducted.

For the recovery of digital evidence we use approved forensic tools and methods to recover deleted files and data fragments. With these forensic tools we can recover data that normal "unerase" tools can not recover (e.g. using techniques like "File Carving" or other means of low level extraction). We can also do complex data recoveries like raid reconstruction.

All the recovered digital evidence is then used for the computer forensic analysis and the following review in the investigation.

Computer Forensic Analysis

You want to use digital evidence in a fraud investigation or if there are any other fraud collaborators inside or outside of your company or if your employee has stolen critical business information when leaving to work for a competitor?

These and many other questions can be answered with a computer forensic analysis. Computer forensic analysis is more than just keyword searches on digital evidence. It is e.g. also the conversion and extraction of mailboxes, the analysis of user profiles and their logins and actions, the analysis of timestamps ("timelining") to prove certain actions like deliberate manipulation or deletion of data, the extraction of certain document types like office documents, CAD drawings, photos, MP3s and Videos. It can also mean to analyse all USB devices and external hard disk drives that have been used to copy data, the reconstruction and analysis of used websites and webmails and the recovery of password protected documents. We also offer analysis and investigation of online fraud / internet crime / computer crime/ cybercrime as well as network forensics and mobile forensics.

We use approved forensic methods and tools to conduct the computer forensic analysis. We will produce the digital evidence in a format and tools of your choice so your inmvestigators can review the evidence. Alternatively we also offer to conduct the review for you and only present the relevant evidence. For the analysis of large data sets we offer special e-discovery / e-disclosure solutions.