This site uses cookies to provide you with a more responsive and personalized service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Email Print page


Computer Forensic

It takes special skills, techniques and technology to find, gather and preserve digital evidence. Without rigorous data capture and discovery techniques, crucial evidence could be lost in an internal investigation or a potential litigation.

Experience is everything in computer forensics. Cutting edge technology is certainly important, but without the specialist know-how to apply the technology and years of investigative experience to recognise evidence, you cannot be sure you are getting the best computer forensic support. With backgrounds in law enforcement, technology, fraud investigation, IT security consulting, computer forensics and computer incident response, our team has an impressive track record of successful computer forensic and electronic discovery projects.

Our extensive Deloitte Forensic network in Southeast Asia – four Computer Forensic labs one in each of Kuala Lumpur, Singapore, Bangkok and Jakarta – allows us to quickly respond to computer forensic investigations anywhere in this region within very short notice. We leverage on these local resources who understand the language, culture and nuances of performing computer forensics in such locations.

Our computer forensic methodology is both comprehensive and robust. We collect, preserve and harvest data from computer systems, including hard drives, servers and back-up media. Our experienced and certified computer forensic professionals maintain and preserve authenticity and chain of custody for electronic records. We perform data analysis to find potential evidence of malfeasance, such as information deletion, misappropriation of confidential information (including intellectual property), policy violations or unauthorized access.

Mobile Forensic

As mobile devices become more prevalent in the workplace, identifying, collecting and preserving mobile device data is becoming exceptionally crucial in support of a comprehensive digital forensic investigation.

Specialised forensic tools and the right industry experience and expertise are crucial in performing mobile forensics. And it doesn't end there. Making sense of the data, analysing the information and presenting it in a meaningful manner, helps tremendously in a high-stakes investigation.

At Deloitte, regardless of whether it is an Android, iOS, Windows, Blackberry or other mobile platform, we have the necessary state-of-the-art tools and technology to forensically collect, preserve and extract important data from most mobile devices. Our capabilities allow us to recover emails, examine contact information, review SMS / MMS messages, retrieve pictures and media files, scan chat messages and extract SIM card data.

Cybercrime and Data Breach

Cybercrimes have increased significantly in recent times, placing targeted organisations at significant risk. Today's cyber criminals are increasingly adept at gaining undetected access and maintaining a persistent, low-profile presence in an organisation’s IT environment.

As such, most organisations fail to recognise cybercrimes in their IT environments and are misallocating limited resources to addressing lesser threats. Organisations often place too much focus on foiling hacking attempts or blocking pornography while potential cybercrimes may be going on undetected and unaddressed.

This has generated significant risk exposure to financial losses, regulatory issues, data breach liabilities, reputational damage, and loss of client and public confidence. Most indicators point to future cybercrime attacks being more frequent, severe and complex, and more difficult to prevent, detect, and address than current ones.

An underground economy has now evolved around stealing and reselling confidential information. E-espionage is becoming more prevalent as competition intensifies and economic conditions deteriorate.
Malware authors and other cyber criminals for hire provide skills, capabilities, products and "outsourced" services to cyber criminals. These include data acquisition and storage, stealthy access to systems, identity collection and theft, misdirection of communications, keylogger and keystroke identification, identity authentication, and botnets, among others.

Deloitte Forensic focuses in assisting clients to investigate security intrusions, remediate security threats, and comprehensively assess and recommend industry best practices to mitigate possible re-occurrence. We assist not just in the reactive nature of cybercrime investigations but also to support clients in enhancing their information security posture.

We can help you:

  • Formulate a cyber-incident and data breach response plan.
  • Assist and investigate network security intrusions.
  • Forensically perform compliance tests on employee devices for malware, key loggers, botnet and other malicious software.
  • Coordinate and advise on a suspected on-going data breach.
  • Understand local data privacy, multimedia and communication regulations through our regional and global reach of Deloitte member firms.
  • Project manage the implementation of continuous controls monitoring technology on your ERP and financial systems.


Electronic Discovery and Readiness

The Discovery process is increasingly relying on electronic material or electronically stored information (ESI). Electronic Discovery, or eDiscovery, requires a thorough and in-depth understanding of a firm's systems and data sources. The collection of complex and often large volumes of data involves specialised techniques supported by electronic tools and complex systems. Evidentiary integrity of electronic data collected and processed should always be maintained at all times throughout the process.

We understand the need to comprehensively and methodically perform an eDiscovery engagement. We know that client's demand reliability, completeness and accuracy – all to be accomplished within a quick turnaround time.

To meet these demands, Deloitte's eDiscovery team has recently undertaken a program of testing and reviewing of selected industry tools for eDiscovery assignments. As a result of this comprehensive exercise, we have established a dedicated eDiscovery processing laboratory and data centre in Southeast Asia and implemented a powerful, robust and highly scalable eDiscovery processing and review platform. Our online review platform allows for Investigators and Reviewers to search, tag, analyse and extract electronic evidence intuitively anywhere, anytime.

With vast experience in performing eDiscovery exercises regionally, we have developed our proprietary eDiscovery workflow process with supporting industry leading forensic tools and techniques. Marrying state-of-the-art technology with a robust methodology and the right expertise is what we believe is required for a successful eDiscovery engagement.

Readiness & Prevention

One of the main challenges organisations face during an investigation, be it an internal fraud, confidential information / intellectual property theft, or other serious employee misconduct, is the inability to quickly effectively recover relevant electronic data.

To effectively manage electronic discovery challenges requires careful planning and preparation. With this in mind, your organisation needs to consider challenges surrounding the areas of information management, identification, and preservation / collection. Understanding where your data resides and having proper controls and archival retention policies in place will greatly enhance your ability to recover the information you need.

At Deloitte, we understand these challenges all too well. We know what needs to be done to ensure that you preserve all relevant electronic evidence effectively in the unfortunate event that your organisation needs to undertake an investigation. We recognise that the eDiscovery Lifecycle starts by first identifying and mapping your data and assessing that proper security and controls are in place, before effective preservation and collection can take place.

This deep understanding of the eDiscovery Lifecycle can only be achieved with a forensic technology team that comes from a diverse background in computer forensics, electronic discovery, data management, IT security, ITGC and IT audit controls.


Document Review

We provide our clients and their legal counsel with efficient and timely assistance with document review and production in complex business disputes and investigations.

The depth of our knowledge and the sophistication of our processes set us apart from others. We employ a metrics-based approach to track patterns and trends in the process, helping law firms and law departments make more informed decisions based on historical information.

We facilitate supervision of our work by providing well-documented processes and partnering with outside counsel for lock-step communication and information transfer.

Our comprehensive document review methodology follows a three stage process.

1. Document Preservation

Through our understanding of information storage and the leading methodologies for confirming employee compliance with hold policies, we can assist a client with document hold procedures. This may include participating in training personnel on the importance of following the document hold procedures. Central to the effort is careful analysis of what document and data sources exist now, existed in the past, and will be generated in the future to confirm that all potential custodians and data sources are included and properly handled.

Our document preservation services include:

  • Assessing paper archiving processes and relevant data storage systems
  • Assisting with the preparation of backup tape procedures
  • Documenting derivation of preservation procedures and tracking mechanisms
  • Helping implement a rapid response process
  • Assisting with the preparation of electronic disclosures

2. Document Collection

As a general rule, the more precise the collection, the lower the overall costs. We help develop tight collection parameters and a detailed investigative process. From collecting hard copy in the order it was maintained in the ordinary course of business, to collecting electronic documents, to carefully handling media such as videotapes and slides, our professionals employ a variety of tools and techniques to provide full documentation.

Our document collection services include:

  • Assisting with the identification of custodians, the development of custodian tiers, and custodian interviews
  • Assisting with identifying and collecting relevant hard copy and electronic files
  • Managing keyword searches (in accordance with guidelines provided by legal counsel)
  • Maintaining documentation, tracking, chain-of-custody, and audit trail
  • Special handling of non-paper documents
  • Providing process metrics, analytics, and reporting

3. Document Review

Effective document reviews employ a rule-oriented approach to decision making. We offer a sophisticated review operation that leverages technology and follows client procedures intended to protect privilege, conceal trade secrets, and comply with privacy requirements. We have years of experience with review protocols, and our approach is focused on assisting clients to avoid sanctions while minimizing the costs of meeting production obligations.

Our document review services include:

  • Assisting with the creation of matter-specific review rules and guidelines
  • Assisting with reviews for protection of information such as trade secrets, confidentiality, and privacy
  • Assisting with maintaining privilege logs and making recommendations based on the guidelines approved by client's legal counsel
  • Assisting with document review procedures
  • Customizing techniques for electronic discovery environments
  • Tracking to confirm review of all documents
  • Managing workflow and tracking productivity
  • Providing process metrics, analytics, and reporting.


Data Visualisation

The power of imagery is used in many technical disciplines to provide a single view schematic to the shape and texture of a problem. The same is now true in the field of data analytics. The phrase, “A picture paints a thousand words” is particularly applicable and succinctly describes the benefits of deploying data visualisation on big data for various purposes in forensic investigations, regulatory reporting, compliance, and customer analytics.

Data visualisation is the exploration and analysis of relational data elements, differentiated as entities and links, through a visualisation process that exposes connections, pathways, networks, and flows that are not apparent in traditional data views.

Deloitte couples leading edge analytical software with unparalleled expertise bred from our global experience in assisting our clients to identify the mechanisms of potential fraud that may be woven within their data and processes.

Through the use of such technology, we are able to show relationships, associations, chronological timelines and flows that would otherwise be very difficult to grasp or comprehend by just reading narrative reports.

The end product through this link analysis process includes:

  • Network and association charts
  • Transaction analysis charts
  • Temporal (timeline) charts
  • Commodity flow charts
  • Event charts.

Contact us

David Lehmann

+603 7610 8832

Ernest Ong

+603 7610 8705

Email us

Stay connected:
More on Deloitte
Learn about our site