Computer Forensics: Following the Money in a Fraud Case
- Ari Morse

- Apr 1
- 8 min read

Digital artifacts are often the only witnesses that never forget. In fraud and hidden‑asset cases, spreadsheets, emails, and phone logs quietly record what human witnesses later minimize, misremember, or deny. When investigators and litigators learn to use computer and cell phone forensics together, they gain a powerful way to follow the money and turn patterns of suspicion into hard proof that drives settlement or judgment.
This post walks through a realistic composite scenario, then offers concrete checklists and criteria for using digital forensics in civil fraud, embezzlement, and hidden‑asset litigation. Throughout, the focus is on how a coordinated team of investigators, lawyers, and forensic specialists can make complex financial misconduct understandable to judges, juries, and mediators.
The Scenario: “I Have No Other Accounts”
A closely held company discovers irregularities in its books. A long‑trusted controller has resigned abruptly, leaving behind:
Unexplained transfers to unfamiliar vendors
Credit‑card charges that do not match any known business purpose
A vague explanation that “the accounting software was acting up”
When counsel begins a preliminary review, the former controller insists he simply corrected bookkeeping errors and that any unusual transfers are “timing issues” that will wash out. He swears in a deposition that he never diverted funds and has no undisclosed bank or payment app accounts.
The company’s paper records are incomplete. Bank statements show money leaving, but not clearly where it goes next. Traditional interviews and document reviews stall. Opposing counsel argues that the company is merely re‑casting poor oversight as fraud.
Instead of accepting the uncertainty, the company engages a private investigator and a digital forensics team. Working with counsel, they focus on:
The controller’s work computer and company email
His company‑issued smartphone
Cloud storage and collaboration tools used for the accounting system
Their goal is straightforward: reconstruct the digital trail of the money.
Digital forensics professionals routinely help civil litigants trace electronic footprints through devices and cloud systems, revealing patterns of transfers, document tampering, and deceptive communication that are invisible in paper‑only reviews.
What Digital Forensics Sees in Fraud Cases
Fraud rarely happens in a vacuum. It leaves marks across multiple systems:
Accounting software
Email and messaging platforms
Bank and payment apps
Cloud storage and shared drives
Computer and mobile forensics allow investigators to pull these threads together.
Key Evidence Sources on Computers
On the controller’s workstation, forensics can uncover:
Accounting system logs and exportsRecords of who logged in, when transactions were entered or modified, and whether reports were exported to external files.
Spreadsheets and working papersExcel and CSV files with formulas, hidden columns, and prior versions that show how numbers were manipulated before being uploaded.
Email archivesRequests to vendors, communications with banks, and conversations with confederates, including threads marked deleted but still present in mail store files.
Browser history and cached dataAccess to online banking or payment platforms under personal logins, including URLs and timestamps around suspicious transfers.
Artifacts of external storageLogs showing when USB drives were attached, files copied, or downloads stored to unapproved locations.
Key Evidence Sources on Phones
On the company‑issued smartphone, forensics can reveal:
Text messages and app chatsConversations with accomplices and vendors about routing payments, splitting proceeds, or “cleaning up” records.
Payment and banking appsNotifications, stored credentials, and transaction histories in services like peer‑to‑peer payment apps, digital wallets, or secondary bank apps.
Location dataGPS traces that show visits to banks or businesses linked to suspect accounts, or travel inconsistent with expense reports.
Notes and photosScreenshots of dashboards, photographed checks, or handwritten notes with routing and account numbers.
Each of these artifacts on its own may be ambiguous. Together, and paired with bank records and testimony, they can tell a compelling story.
How the Case Turned: Reconstructing the Money Trail
In our scenario, forensic imaging of the controller’s computer reveals:
An Excel workbook saved in a “Temp” folder, showing a set of “adjusting entries” that siphon small amounts from many accounts into a single clearing account over time.
Hidden columns, viewable in the workbook’s metadata and earlier versions, where formulas originally pointed to a personal‑sounding payee before being changed to a generic vendor name.
Evidence that this workbook was exported to PDF and emailed from the controller’s account to a personal address just before he resigned.
Email forensics further uncovers:
Messages to a small vendor, ostensibly independent, instructing them how to invoice the company for “consulting” services that match the bogus entries.
Negotiations over splitting proceeds and reminders not to “ever mention this in company email.”
On the smartphone, examiners extract:
Chat logs in an encrypted messaging app with the same vendor contact, referencing specific invoice numbers and confirming receipt of funds.
Notifications from a peer‑to‑peer payment app showing transfers from the vendor’s account to the controller’s personal wallet.
A note with multiple bank routing and account numbers labeled with initials that match the controller and a relative.
Existing civil cases and practitioner reports show that this kind of cross‑system reconstruction, combining accounting data, messaging artifacts, and payment‑app logs, has repeatedly exposed embezzlement schemes and hidden assets that were invisible in summary financial reports alone.
With this package, the company’s attorneys can:
Tie specific accounting entries to fraudulent invoices
Connect those invoices to a colluding vendor
Show the vendor’s payments moving back into accounts controlled by the controller
Confronted with this, the defendant faces strong pressure:
Criminal exposure if regulators or prosecutors review the evidence
Civil liability with potential punitive damages or fee shifting
Little credibility left to challenge the forensic story at trial
In mediation, he agrees to a substantial restitution and settlement, including cooperation in identifying any remaining assets. The case resolves far more favorably than it would have based solely on bank statements and vague suspicions.
Where Investigators Fit in the Fraud Puzzle
Digital forensics thrives on good questions. Private investigators, especially those with financial and genealogical experience like Locaters International, help frame those questions and supply the non‑digital context.
An investigator can:
Map the roles and access pathsWho had authority over what accounts, approvals, and systems? Were duties segregated or concentrated?
Identify likely pressure points and motivesMajor life changes, debts, or business setbacks can help explain why someone might take the risk.
Gather third‑party documentationVendor registrations, corporate filings, property records, and genealogy‑style relationship mapping can expose shell companies and associates.
Interview witnesses with the digital picture in mindOnce a forensic review highlights suspicious dates or transactions, targeted interviews can confirm who was in the office, what justifications were given, and how policies were circumvented.
Coordinate with counsel and forensic labsEnsuring devices are preserved, scoping forensic work, and translating technical findings into timelines and charts.
Without investigative structure, even strong forensic findings can look like an overwhelming pile of logs and screenshots. With it, they become a coherent narrative.
Checklist: When to Consider Digital Forensics in Fraud and Hidden‑Asset Cases
You should seriously consider digital forensics, paired with a capable investigator, when you see one or more of these warning signs:
Unexplained journal entries or adjusting entries that move small amounts into clearing accounts or miscellaneous expenses
Vendor payments to entities no one recognizes, with generic descriptions and no clear deliverables
Local or network logs showing heavy after‑hours access to accounting systems or exports of large reports to spreadsheets
Sudden gaps or anomalies in email history related to finance, such as missing threads around key approvals
Clients or executives who insist “there must be more accounts” but cannot prove it from available statements
Divorce or partnership disputes where one side’s declared income and lifestyle obviously diverge
Situations where a key financial employee departs abruptly, especially after tension around audits or controls
Early digital preservation is essential. Devices overwritten by normal use or wiped in the course of “recycling” can eliminate exactly the artifacts you later wished you had.
Criteria for Scoping a Fraud Forensics Engagement
Not every matter justifies imaging every device. To size a fraud investigation appropriately, consider:
Exposure and case valueHow much money is realistically at issue? High‑value claims or cases with regulatory exposure usually warrant comprehensive work.
Complexity of the schemeSimple, one‑time misappropriations may be clear from bank records. Complex, multi‑year schemes that use multiple entities, cards, and apps almost always benefit from forensic reconstruction.
Number of devices and systemsA single laptop and phone versus a multi‑office environment with shared servers and remote desktops will drive cost and strategy.
Access and legal authorityDo you clearly own or control the devices? Will you need court orders to access personal devices or accounts of former employees?
Timeline pressureIs settlement or injunction needed quickly? Targeted triage on high‑value systems may come first, with deeper work later.
Locaters International works with counsel to prioritize devices and systems, balancing thoroughness with proportionality and budget.
Practical Steps for Lawyers, Investigators, and Clients
If you suspect fraud or hidden assets, you can dramatically improve your position with a few disciplined steps:
Preserve devices and accounts immediatelyAsk the client to stop re‑imaging, reassigning, or disposing of computers and phones used by key actors. Lock down logins and suspend auto‑deletion policies where feasible.
Collect baseline financial recordsGather bank statements, credit‑card summaries, major vendor contracts, and internal financial reports for the relevant period. These provide the framework into which digital artifacts will fit.
Engage an investigator earlyRetain a firm like Locaters International to map relationships, roles, and possible outside entities. This helps define keywords, date ranges, and target accounts for forensic review.
Plan forensic imaging for key systemsIn coordination with counsel, select the highest‑value devices and accounts for forensic imaging, starting with the primary suspect’s workstation, company email, and smartphone.
Correlate digital and financial timelinesWork with the forensic examiner and investigator to lay digital events, such as logins or exports, alongside bank transactions and approvals.
Translate findings into clear visualsCharts, timelines, and flow diagrams make it far easier to explain a digital fraud scheme to mediators, judges, and juries.
Use early findings for leverageEven preliminary forensic hits, such as proof of secret accounts or unexplained transfers to a related party, can reshape settlement negotiations long before trial.
Common Pitfalls in Digital Fraud Investigations
Even sophisticated organizations can undermine their own cases. Watch out for:
Relying solely on the auditorTraditional audits are not designed to uncover collusive frauds or tech‑savvy schemes. They often miss the very data trails forensics can see.
Letting IT “clean up” devicesDecommissioning, upgrades, and routine imaging can overwrite critical deleted data. IT should be instructed to preserve, not sanitize.
Assuming bank records are enoughBank statements show money movement, but not who initiated it, what documentation accompanied it, or how accounting entries were manipulated.
Over‑collecting low‑value systemsImaging every machine in a large company can be costly and slow. Focus on those with access and opportunity.
Underestimating the narrativeWithout a clear, human‑understandable theory of the case, even strong digital findings can appear confusing.
Locaters International’s role is to help structure investigations to avoid these traps, keeping both the digital and human elements aligned.
How Locaters International Helps You Follow the Money
Locaters International brings together investigative experience in complex estates and missing‑heir work with an understanding of digital forensics in financial disputes. In fraud and hidden‑asset cases, we:
Work with attorneys to understand the client’s goals, exposures, and tolerances
Map the involved parties, entities, and accounts using open‑source research, public records, and genealogical methods
Coordinate with forensic examiners to ensure devices and accounts are collected legally and efficiently
Help interpret technical findings, connecting them to witnesses, documents, and financial flows
Support counsel in preparing affidavits, demonstratives, and testimony grounded in both digital and real‑world evidence
Our focus is not just on proving someone did something wrong; it is on building a case that courts and counterparties take seriously.
Do Not Let Digital Evidence Go Dark
Fraud and hidden‑asset schemes thrive in the shadows between financial records and digital systems. When you bridge that gap, the picture often becomes clear enough to drive meaningful settlement or judgment.
If you are an investigator, lawyer, or in‑house counsel facing a matter where the numbers do not add up and you suspect that “something in the system” explains the gap, contact
Locaters International. We can help you:
Assess whether computer and cell phone forensics are likely to add value
Prioritize which devices and accounts to preserve and analyze
Integrate digital findings into a coherent strategy for negotiation, litigation, or referral to regulators
A short, confidential conversation can be the first step toward turning scattered logs, spreadsheets, and messages into a clear money trail that holds up in court.



Comments