Contractor-Side Forensic Delay Analysis & EOT Support

Municipal park infrastructure — Contractor-side windows analysis

Sector: Municipal Infrastructure · Public Park / Outdoor Recreation Geography: Greater Toronto Area, Ontario Year: 2024 Method: Windows Analysis (AACE RP 29R-03, MIP 3.3) + Eichleay + SCL Protocol §3
8
Update XER Files Audited in the Owner’s Chain
47d
Retroactive Baseline Edits Detected
12
Forensic Detectors Flagged
AACE-aligned
MIP 3.3 + Eichleay + SCL §3 §11.5

The Situation

A general contractor on a public park and outdoor recreation complex in the Greater Toronto Area had reached substantial-completion pressure with the schedule visibly drifting against the owner’s contractual milestones. Mid-project, the owner had issued a unilateral schedule update with retroactive baseline edits applied to activities and logic in earlier data dates — movements that conflicted with the contemporaneous correspondence record the contractor held in its own files.

The contractor needed an independent forensic of the as-planned-vs-as-built record before any EOT submission left its desk. The question was simple but load-bearing: which days are owner-caused, which days are contractor-caused, and what does the schedule chain itself say about how the answer changed over the eight updates the owner pushed through?

What CPP Did

Critical Path Partners performed a contemporaneous windows analysis across the full owner’s update chain, paired with a chain-diff forensic on the XER files themselves — testing whether the schedules opposing counsel would later cite as the contemporaneous record were, in fact, contemporaneous. The methodology stack was AACE Recommended Practice 29R-03 MIP 3.3 for the windows analysis, Eichleay for the home-office overhead allocation tied to the entitlement days, and SCL Delay & Disruption Protocol §3 (notice review) and §11.5 (extension of time) for the procedural and entitlement spine.

  • Parsed all eight P6 XER update files from the owner’s schedule chain and reconstructed the as-planned, interim, and as-built states window by window
  • Ran chain-diff forensics on the update sequence — TASKPRED add/remove deltas, constraint flips, baseline-date changes, completion-status reversals — testing each update for edits to activities and logic that pre-dated its own data date
  • Detected retroactive baseline edits spanning 47 days of activity-finish movement applied to data-date-prior activities — movements inconsistent with the contemporaneous RFI, change-directive, and access-correspondence record that the contractor held
  • Defined contemporaneous analysis windows anchored to the actual submitted-update data dates — not retrofitted to the conclusion
  • Performed per-window critical-path attribution classifying owner, contractor, and force-majeure / third-party drivers, with each attribution traced back to the correspondence item that caused it
  • Computed Eichleay home-office overhead for the days of entitlement, scoped to the AACE-canonical Eichleay formula with daily-rate, overhead-pool, and unabsorbed-overhead components disclosed line by line
  • Built the SCL Protocol §3 notice review — testing the contractor’s notice trail against the contractual time-bar and confirming entitlement preservation under §11.5
  • Packaged the evidence ledger linking each RFI, change directive, and design response to the specific chain-diff manipulation in the owner’s update where the schedule moved against it

Tools Deployed

Forensic Windows Analysis Engine — AACE 29R-03 MIP 3.3 per-window CP attribution across the eight-update chain
Schedule Chain-Diff Detector — TASKPRED add/remove, constraint flips, retroactive baseline edits, completion-status reversals; 12 forensic detectors flagged across the chain
Claim Workbench — evidence ledger; slip-to-evidence cross-reference; per-actor correspondence threading
Eichleay Module — home-office overhead allocation with the daily-rate, overhead-pool, and unabsorbed-overhead components computed transparently from the entitlement-day driver

What Was Distinctive

The chain-diff forensic on the owner’s eight XER updates surfaced the load-bearing finding: retroactive TASKPRED edits and baseline-date movements in the owner’s update chain that were inconsistent with the contemporaneous correspondence record. The owner’s later schedule updates had quietly edited activities and logic in time periods that pre-dated their own data dates — movements that, if accepted at face value, would have shifted the entitlement footprint away from the owner column. The contemporaneous RFI and change-directive thread the contractor held did not support those edits.

Most forensic schedule reviews look only at activity-finish slippage between two snapshots. The chain-diff approach reads the schedule chain as a sequence and tests whether each later update is consistent with the data it pre-dates — the test that separates a genuine contemporaneous record from a record that has been groomed downstream.

The Outcome

CPP delivered a windows-analysis dashboard, a slip register with per-window party-attribution, the Eichleay home-office overhead computation, the SCL §3 notice review, and the evidence ledger linking each RFI and change directive to the specific chain-diff manipulation in the owner’s update sequence. The deliverable supplied the contractor and its counsel with the substantiation needed to file the EOT submission, including the rebuttal record against the owner’s retroactive edits.

Outcome: Substantiated EOT entitlement; matter resolved. The methodology disclosure, the AACE-aligned attribution, and the chain-diff evidence held through the owner’s review process. Specific entitlement-day counts and resolution figures are not disclosed; the engagement is confidential.

Owner pushing retroactive schedule edits?

If the schedule chain you’re being asked to accept doesn’t match the correspondence record you actually have, that is exactly the work this engine was built for. Fixed-fee preliminary assessment in two weeks. No hourly burn.

Talk to CPP → Or email Dana directly →