Electronic devices have become an indispensable part of our personal and professional lives. Most communication, documentation, and information today is created and stored electronically, with much of it not being recorded on paper. However, less paperwork does not necessarily mean less of a paper trail.

Computer forensics, or digital forensics, involves the acquisition and analysis of digital information and evidence that is stored on electronic devices, in the context of legal proceedings.

laptop-figure

Types of Cases

Computer forensics can help to identify relevant and crucial evidence in the context of investigations or criminal, civil, or other legal and regulatory proceedings which involve:

  • Fraud, corruption, money laundering and other financial crimes
  • Employee misconduct, wrongful dismissal and other employment disputes
  • Computer crime
  • Intellectual property theft, counterfeiting and forgery
  • Industrial espionage
  • Regulatory compliance
  • Bankruptcy

Sources of Evidence

Essential digital evidence that is material to court proceedings can be found on any device that is able to store digital information. Most commonly, these devices include:

  • Personal desktop or laptop computers
  • Mobile phones
  • Computer servers
  • USB flash drives

Computer forensics identifies and analyzes evidentiary support from the aforementioned devices by taking a closer look at:

  • Deleted files
  • Corporate and web-based e-mail
  • Text and BBM messages
  • Internet history
  • Search engine search terms used
  • Images
  • Word, Excel and other documents from a variety of applications

A meticulous examination of the files that are identified on an electronic device are a requisite to building a strong case. In addition, the ‘metadata’ that is associated with these files can help to determine when, and by whom a file was created, edited, accessed, moved, saved or printed.

How We Can Help

A computer forensics assignment usually involves the identification, preservation, collection, recovery, and analysis of electronic data. This data, the methodologies that were utilized and the findings that they revealed are often presented, reported and testified to during court proceedings by computer forensic experts.

Toronto forensic accounting firm nagel + associates recognizes that there are critical steps involved in all aspects of a computer forensics engagement. An exclusion of any of these steps could call into question the authenticity, reliability and admissibility of the digital evidence in the context of a legal proceeding. The omission of any of these vital steps could lead to abject failure in the pursuit of a favourable judgement.

We work closely with industry-leading computer forensics experts to search for potentially relevant evidence and to ensure that all necessary steps are followed in order to ensure that the evidence is admissible in court, and for any other purpose that is pursuant to the case in question.

Mr. Pang left China after high school to attend university in Canada. Immediately after finishing his studies, Mr. Pang found employment in Canada as an engineer for a car manufacturer’s autonomous driving department. He had been working for this company for 6 years, when he suddenly informed his superiors that he would be resigning, and returning to China to take care of his grandmother. During Mr. Pang’s exit interview, he informed the Human Resource manager that he had been hired to spearhead the autonomous driving division for an electric car manufacturer in China.

Throughout the exit interview, the Human Resource manager grew increasingly suspicious and felt that something was amiss with Mr. Pang. It seemed as though he was not being completely honest regarding the circumstances of his sudden departure. As a result, the company decided to launch an internal investigation. They searched Mr. Pang’s work phone and laptop, and reviewed his network activity.

The investigation uncovered Mr. Pang’s nefarious intentions by revealing targeted searches and downloads of highly confidential proprietary information, as well as organizational trade secrets. When confronted by the internal investigators, Mr. Pang admitted to downloading the company’s data with the sole purpose of selling it with the expressed intent of duplicating the car manufacturer’s work in China.

To determine whether your organization may be susceptible to fraud, take the following brief survey: