The FACTS team has a collective experience of more than 50 years in high tech crime related investigations and services focus on the following areas:

  • Cyber forensic investigations.

  • Incident handling or IT security breach investigations.

  • Theft of Intellectual property (software or application) assessment and analysis.

  • Advanced smart phone data extraction and analysis.

  • Open source intelligence investigations.

  • E-discovery and investigation support and hosting platform (SKYNET).

  • Custom and vendor specific training in various leading forensic products.

  • Cryptocurrency or block chain related transactional analysis and investigations.

  • Training.

In each of the above areas or service offerings, we have applied our investigative and technical skills to build custom software solutions to help us and our clients conduct investigations or assessments efficiently and as cost effective as possible.

Cyber Forensics & Investigations

FACTS excels in crafting tailored data solutions, empowering our experts to customize analytics that align with your organization's unique requirements, whether they pertain to forensics or other domains. Leveraging sophisticated data collection technology and advanced analysis, we extract maximum value from your business data. Our analysts possess exceptional quantitative analysis and interpretation skills, simplifying complex technical data for clear understanding.

Data Analytics

Some of our diverse services include:

  • Resolving intricate reconciliation challenges on "Big Data"

  • Customized analytics for uncovering hidden trends and anomalies within vast data sources

  • Cashflow analysis

  • Ad-Hoc Analytics support for investigation processes

We offer comprehensive electronic discovery services to support law firms, corporate clients, regulatory bodies and government agencies involved in litigation, investigations, arbitration matters and regulatory enquiries. We offer services in all the stages of the Electronic Data Reference Model (EDRM): from preservation and collection of data, to processing, review and analysis, to production and presentation.

We match the solution and services which we offer on projects to our clients’ needs and recommend the most appropriate solutions for each stage to achieve cost efficiency.

We can provide all or just select services in the eDiscovery timeline, such as hosting and technological support, allowing clients to team with us, for example by providing their own document reviewers.

We understand the challenges eDiscovery represents. Our team has comprehensive experience applying technological capabilities, combined with review advisory and managed review methodologies, to ensure that our eDiscovery processes are defensible and repeatable, whilst delivering the best results on your matter at the lowest possible cost.

E-Discovery

FACTS offers

  • RelativityOne as eDiscovery platform for processing, analytics and document review, both through manual review and machine learning.

  • In-house developed Skynet as evidence processing engine for Processing and structuring of various data types such as documents, emails, financial statements, calls, chats, and databases to enable investigators and reviewers to get a single view of all data types.

SAS partner

FACTS holds the esteemed position of being a gold partner with SAS and is recognized as the leading accredited SAS technology and solution partner in the domain of Fraud & Security Intelligence practice.

Harnessing our SAS expertise, we bring together a fusion of knowledge and innovation to combat fraud, waste, and abuse in procurement. Specializing in the seamless implementation of advanced fraud solutions for SAS, we take pride in being your trusted ally in safeguarding your procurement processes. With a laser focus on tackling fraud, waste, and abuse, our dedicated team harnesses the power of SAS tools to deliver tailored solutions that fortify your organization's defenses. From sophisticated analytics to cutting-edge technology, we bring a comprehensive approach to detecting and preventing fraudulent activities, ensuring the integrity of your procurement ecosystem. Choose us for a strategic partnership that empowers your business to not only mitigate financial risks but also enhance operational efficiency in the dynamic realm of procurement. Your resilience against fraud starts here.

Introducing our premier SAS Solution: Continuous Monitoring for Procurement Integrity (also known as Payment Integrity)

Embark on a transformative journey with FACTS Consulting, where our team of subject matter experts and data specialists has pioneered the Procurement Integrity Solution for SAS, the world's leading analytics software provider. This groundbreaking solution, meticulously crafted by our adept professionals, stands as a beacon in proactively monitoring and detecting fraudulent activities. Recognized for its exceptional efficacy, the Procurement Integrity Solution has earned the prestigious status of a formal SAS solution and marks FACTS as one of the first small businesses to achieve premier SAS partnership. Join us at the forefront of innovation and reliability as we continue to redefine the landscape of fraud detection and prevention.

SAS Payment Integrity for Procurement

SAS Payment Integrity for Procurement offers comprehensive tools for monitoring and managing procurement risks through advanced data management, risk scoring, and analytics. It enhances productivity and decision-making with automated processes and detailed reporting.

Key Features and Capabilities:

Early Risk Detection:

  • Uncover procurement risks early to prevent financial losses and protect reputation.

  • Monitor staff and supplier activity for early warning signs.

    Data Management:

  • Combine structured and unstructured data from various sources, including third parties.

  • Use data quality techniques like data matching, deduplication, and entity resolution to create a comprehensive view.

    Risk Scoring and Monitoring:

  • Utilize a procurement analytics data model and predefined rules based on procurement forensics experience.

  • Apply business rules, anomaly detection, predictive modeling, and associative link analysis to identify high-risk activities.

  • Automatically prioritize alerts for high-risk items, reducing false positives.

    Enhanced Analyst Productivity:

  • Provide investigative workspaces that facilitate collaboration.

  • Use advanced forensic analysis tools with interactive visualization and search capabilities.

Automated Analysis and Reporting:

  • Streamline operations with automated data management, alert generation, and workflows.

  • Provide decision-makers with dashboards, portals, web analytics, mobile reporting, and alerts.

Detailed Features:

  • Data Management: Access, combine, cleanse, and compare relevant data from diverse sources.

  • Business Rule Development: Import, add, and modify business rules using a closed-loop learning system.

  • Advanced Analytics: Use procurement-specific scenarios and predefined business rules.

  • Detection & Alert Generation: Score transactions in real-time using a hybrid analytics approach.

  • Alert Management: Combine and correlate alerts from multiple monitoring systems for a comprehensive view.

  • Social Network Analysis: Analyze activities and relationships at a network level to identify linkages.

  • Investigative Workspaces: Enhance collaboration with interactive tools for visualization and search.

Despite most companies being confident in the integrity of their general internal controls, the complexity of the procurement process, the potential for fraud at every stage, the involvement of numerous individuals, and the sheer volume of transactions make detecting fraud, waste, and abuse challenging. Often, these issues are only uncovered by auditors after losses have already occurred, if at all.

Our analytical procurement review will help you proactively identify irregularities in your procurement cycles, manage procurement risks more effectively, enhance your systems, and improve data integrity. The issues we identify can lead to significant savings.

Our procurement analytics can transform your data's potential into tangible value.

Procat

The process includes the following steps:

  • Ingesting of your procurement information (Vendor master, Purchase orders, Invoices, Payments, etc.);

  • Standardising, enhancing and conforming your procurement data;

  • Performing several advance analytical tests and procedures using a risk-scoring approach

    The results are presented in a user-friendly web-based interface that includes:

  • Summary of results per analytical test with detailed drill-down capabilities;

  • Risk scores calculated for each vendor and employee;

  • Visual representation of your data:

  • Various graphs (Spend analytics pers vendor)

  • Displaying vendor addresses on a map

  • Network visualization showing relationship links between all entities

Skynet Risk & lifestyle audit solution offering

At FACTS we develop custom software in-house to support our cyber forensics and data analytics key specialisations.

From our experience in large scale investigations, we developed SKYNET, a collaborative investigation platform which supports teams of investigators to conduct investigations in small and big data scenarios. Since 2014, this platform has been used for large-and small-scale investigations ranging from one team member up to 40 team members searching through hundreds of millions of documents and emails. As part of the SKYNET technology is in-house built Encase Enscripts and other software to normalise and structure evidence from most leading software vendors including Accessdata (FTK), Guidance (ENCASE), Cellebrite, Getdata (FORENSIC EXPLORER), Magnet (AXIOM) and XRY into one unified data set in SKYNET.

SKYNET was built to integrate evidence and intelligence extracted and collated in reports and evidence sources over time into one platform. This enables an organisation to leverage the insight of the intelligence and evidence gathered over years of investigations and sources. Using visual links, relationships between persons and entities can be established instantly using historic and new data.

The capability to instantly search millions of records from e-mails, WhatsApp messages, operating system metadata such as event logs and internet activity and apply time-and content-based filters from hundreds of devices, makes this platform extremely powerful. In turn, this enables the analysts or investigators to find the “smoking gun” or conclude a legal process quickly and efficiently. This solution is a hosted solution.

Included in the technology of SKYNET is in-house built Python Scripts and Custom-made software to normalise and structure evidence from most leading software vendors such as;

  • Accessdata (FTK)

  • OpenText Encase

  • Cellebrite

  • Getdata (FORENSIC EXPLORER)

  • Magnet (AXIOM)

  • XRY

into one unified data set in SKYNET. During the data preparation process, duplicate emails and documents are also detected and excluded to reduce the amount of data the analysts will be presented with.

Training

We have instructors with extensive industry knowledge and experience that have taught classes all over the world. Even though training is not our main focus, we have seen the advantages of being able to customise courses depending on the needs of our clients.

We have various in-house developed non-vendor specific training packages that can be adapted to the required level, focus area, intensity and time period that suit client requirements.

The list of current in house training modules available are discussed below.

Digital Forensic Concepts.

This course covers the basic concepts needed to do and manage digital forensics.

Forensic First Responder and Crime Scene Management.

This is a beginners course to ensure people know what to do at a crime scene and how to perform a proper search and seizure. Students are taught what is required up to the point of doing a forensically sound acquisition of various types of digital media.

Digital Forensic Investigation.

The course will explore general investigative concepts, methodologies, and procedures to ensure a general overview of all the concepts involved in digital investigations. This is an instructor-led course, where the focus is on establishing a sound theoretical base and clarification through practical exercises. The course also briefly covers the utilisation of some industry tools and hardware products during practical exercises.

Mobile Forensics.

This course is a vendor independent course that covers the basic concepts of Android and Apple iOS devices and the challenges faced by forensic examiners. The course covers mobile seizure, acquisition and analysis best practices. The main focus of this course is on doing application reverse engineering to be able to extract useful information from unsupported applications using predominantly open-source tools.

Apple Forensic Investigation.

This course was built for investigators that have predominantly Windows experience. It exposes students to useful information regarding Apple Mac hardware, the Mac Operating System and iOS (Mobile Device Operating System) relevant to digital forensic investigations. The course takes students up to the point of creating a forensically sound image of Apple devices.

Open Source Forensic Analysis.

The course focuses on teaching effective analysis methodologies and utilising open source tools like Python to perform as well as automate forensic analysis on diverse datasets. The aim is to be able to obtain and visualise actionable intelligence in support of forensic investigations.

Open-Source Intelligence.

The focus of this course is on Internet investigations using open-source tools. The course covers a wide array of methodologies, tools and resources to perform effective online information gathering. Additional time may be needed if students are not familiar with concepts like DNS, NS and MX records, routing, how the Internet works, social media, networking concepts like IP v 4 and 6 etc.

Digital Forensic Software Refresher.

This course is customized to client requirements. The focus is on refreshing knowledge on digital forensic tools used by the client or just general exposure to industry standard tools and hardware.

For more information regarding training formats, prerequisites and cost please contact FACTS Consulting.