Insider Threat Case Study: Digital Forensics Reveals Fraud, Potential Regulatory Concerns

  • William Rimington
    William Rimington WilliamRimington
  • Kevin Wong Kevin Wong
  • Ben Hawkins Ben Hawkins

Insider Threat Case Study: Digital Forensics Reveals Fraud, Potential Regulatory Concerns

In 2019, Kroll, a division of Duff & Phelps, was engaged to assist a media company in the UK who suspected its information technology manager (the IT manager) of fraud. Kroll’s investigation involved digital forensic analysis of the IT manager’s corporate computer and mobile phone.

On these devices, Kroll found evidence that the IT manager was selling large quantities of electronic equipment on online market forums. These were then reconciled against large purchase orders, which were paid for using the company funds. It is estimated that the IT manager had defrauded the company of hundreds of thousands of pounds throughout his employment.

The client was concerned by the IT manager’s motivation as he had been a trusted member of the organization for a long time and received a substantial salary. After forensically examining the mobile phone, it became apparent that the IT manager had a lavish lifestyle, which included indulging in several illegal activities, raising further questions around his behavior and integrity.   

Intellectual Property and Sensitive Data Concerns

Once Kroll reported its findings relating to the sale of electronic equipment and the apparent lifestyle of the IT manager to the client, additional concerns were raised whether the IT manager had potentially stolen intellectual property from the company to sell to a competitor. If this had transpired, was the company's personally identifiable information (PII) also taken, leading to a potential GDPR reporting requirement and notification to the Information Commissioner’s office? Kroll conducted a further review of the devices, searching for evidence of the removal of sensitive intellectual property and PII data, which may have left company systems via common methods such as email, cloud storage, file transfer and removable USB media. Kroll was able to inform the client that no evidence of the loss of sensitive intellectual property or PII data was found, removing the concern that regulatory notification may have been required.

The client asked Kroll to prepare an evidential package to assist law enforcement in prosecuting the IT manager. Working together with law enforcement, the weight of evidence was such that the IT manager had no choice but to plead guilty to fraud at court. The judge issued a substantial custodial sentence.

Insider threats are often overlooked in most organizations’ risk assessments, given the propensity to inherently trust employees as a natural part of running successful operations. It can, however, have a significant impact, including financial loss, intellectual property theft or regulatory fines for PII loss. Like all business risk, insider threats can be managed by ensuring there is a balance of the right controls around people, process and technology. Trust and empowerment must be attached to the ways and means to hold responsible employees accountable for their actions.

Insider Threat Case Study: Digital Forensics Reveals Fraud, Potential Regulatory Concerns 2020-05-08T00:00:00.0000000 /en/insights/publications/cyber/insider-threat-digital-forensics-fraud-regulatory-concerns /-/media/kroll/images/publications/featured-images/2019/insider-threat-digital-forensics-fraud-regulatory-concerns.jpg publication {78D3F940-BF08-40FB-A7F6-B55FB2D9165B} {41C2B883-4E8E-4CB3-8774-5F5B9AEC0582} {C93B6EB0-4997-4312-946E-FEAC23A47496} {B6B1E0A3-F842-4166-A1FC-FABA37190FE5}

Related Services

Cyber Risk

Cyber Risk

End-to-end cyber security services provided by unrivaled experts.

Cyber Risk
Cyber Risk

Computer Forensics

Expert computer forensic assistance at any stage of a digital investigation or litigation.

Computer Forensics

Insights

Cyber Risk

Proceed with Caution: Using Controls to Manage Risk in Digital Currency Transactions

Cyber Risk
Cyber Risk

COVID-19 + Shadow IT = Trouble Ahead

Cyber Risk
Cyber Risk

Has COVID–19 Impacted Your Ability to Preserve Evidence for Future Litigation?

Cyber Risk
Cyber Risk

Maturing Your Cyber Security Program During COVID – 19

Cyber Risk