PROFESSIONAL
INVESTIGATIONS

Would you like us to send more detailed information to you?

ASSET
RECOVERY

Documentation of assets and possible transfers. Identify changes to asset class and dilution of value. Verification of any increase or decrease to net asset value of the entity or individual. Prepare reporting for seizure or writ of garnishment.

• Hard assets: Vessels, autos, equipment, aircraft
• Cash, securities, and real estate
• Notes due, UCC and receivables
• Intellectual property, trademarks, copyrights
• Business holdings and beneficial interests
• Hidden assets or those in other names
• Third party responsibility
• Historical snapshots of asset values

CLICK FOR MORE INFO

ONLINE FRAUD VICTIMS

There are always hundreds of scams online looking to get web visitors to send payments into their scam and receive nothing in return. The frauds take the form of selling products, investing in businesses, buying inventory, or partnerships. The presentations are often very professional looking, and promise some desirable result. A victim of fraud wants to know about the facts.

• Identify the true company behind the fraud
• Document prior and current activity
• Identify sources to recover lost money
• Connect communications with people involved
• Protect against future fraud or hacks from the scam

CLICK FOR MORE INFO

DELETED DATA EXTRACTION

When someone wants to hide something, they delete the data. This information can be recovered, but attempting to do so without the proper training and tools can result in the data being rendered invalid as legal evidence, or even becoming permanently lost. Recover deleted call logs, IM conversations, track movements with geo-tagging. Gather data from personal computers, phone or other devices.

• Email
• Images
• Webmail
• Internet artifacts
• Web history and cache
• Chat sessions

CLICK FOR MORE INFO

CORPORATE FRAUD DETECTION

A thorough fraud investigation triangulates inquiry and scrutiny of documents, activity, and financial records using cutting edge intelligence tools and methods. By discovering the fraud without revealing the investigation to employees, the full true nature of the fraud is determined along with all associated actors being identified.

• Ghost Vendors (A/P vs payroll)
• Mail Scan
• A/R Mod Review
• Benford Law Analysis
• Delta KPIs
• Criminal/Civil Scan
• Cashed Check Analysis

CLICK FOR MORE INFO

LOCATE MISSING PERSON

Locating hard to find subjects, missing persons, and those avoiding discovery. Reveal the activities and whereabouts of those concealing their identity or hiding their location. Services prepare a report of records and documentation of subjects activities, court testimony available by a licensed investigative agent.

• Missing persons
• Avoiding service of process
• Absconded judgement debtor
• Fugitive from responsibility
• Witness to events
• Homeless or incarcerated

CLICK FOR MORE INFO

FRAUDULENT CHARGEBACK RESPONSE

Ecommerce and storefront merchants are bombarded with chargebacks to their merchant account from consumers who have placed orders with their company. The damages go beyond the lost payment. The chargeback fees taken by the merchant bank extends the loss, and multiple chargebacks can raise the processing rates charged to the merchant.

• Identifying Order Source
• Searching Resale of Your Product
• Connecting Cardholder to order
• Proving Receipt
• Evidence for Response
• IP and Phone Backtrace

CLICK FOR MORE INFO

PROFESSIONAL INVESTIGATIONS FOR ENTERPRISE AND LEGAL INDUSTRY CLIENTS

Active Intel Investigations has provided investigative research services to corporate clients such as Wells Fargo Bank, Chubb Insurance, United States Postal Service, and the SBA. We have provided evidence and expert witness testimony in cases in local and federal court, for clients such as the US Department of Justice.

VIDEO LIBRARY

REPORTING AND PRODUCTION METHODS

• Records Intake & Review
• Data Research
• Extraction Algorithm
• Financial Records
• Witness Interviews
• Subject Observation
• Activity Monitoring
• Message Forensics
• Data Mining Program
• Legal Records
• ESI Processing
• Electronic Preservation
• Structured Data Breakdown
• Voice and Image Files
• Non-Public Records
• Family and Associates
• 3rd Party Retained Records
• Public Sector Filing Verification

ELECTRONIC
SURVEILLANCE

PRIVATE
INVESTIGATIONS

DATA
RESEARCH

COUNTER
SURVEILLANCE