Whether supporting Fortune 500 corporations or outside counsel, our services are conducted with the utmost discretion and confidentiality, with respect and sensitivity to the culture of the enterprise and the individuals involved.
These may include advising on financial and operational business controls, such as internal data handling policies and physical security standards, and recommending procedures to safeguard against future problems.
North-RICA’s forensics will examine and analyze relevant business records, reconstruct books and interview involved parties. In doing so, we uncover the facts to determine whether financial wrongdoing has occurred, how long it has been in progress, how it was concealed and the value of the impact.
North-RICA also has extensive experience in assisting clients who are subject to U.S. Securities and Exchange Commission (SEC) investigations. We draw on a wide range of information to generate critical deal-related intelligence for our clients.
Operations Security Protocol
FIVE-STEP OPSEC PROCESS
• Identification of the critical information to be protected
• Analysis of the threats
• Analysis of the vulnerabilities
• Assessment of the risks
• Application of the countermeasures
Identification of Critical Information Basic to the OPSEC
process is determining what information, if available to one or more adversaries,would harm an organization's ability to effectively
carry out the operation or activity.
This critical information constitutes the "core secrets" of the organization, i.e., the few nuggets of information that are central to the organization's mission or the specific activity.
Critical information usually is, or should be, classified or least protected as sensitive unclassified information.
Analysis of Threats Knowing who the adversaries are and what information they require to meet their objectives is essential in determining what informationis truly critical to an organization's mission effectiveness.