Documentation of assets and possible transfers. Identify changes to asset class and dilution of value. Verification of any increase or decrease to net asset value of the entity or individual. Prepare reporting for seizure or writ of garnishment.
• Hard assets: Vessels, autos, equipment, aircraft
• Cash, securities, and real estate
• Notes due, UCC and receivables
• Intellectual property, trademarks, copyrights
• Business holdings and beneficial interests
• Hidden assets or those in other names
• Third party responsibility
• Historical snapshots of asset values
There are always hundreds of scams online looking to get web visitors to send payments into their scam and receive nothing in return. The frauds take the form of selling products, investing in businesses, buying inventory, or partnerships. The presentations are often very professional looking, and promise some desirable result. A victim of fraud wants to know about the facts.
• Identify the true company behind the fraud
• Document prior and current activity
• Identify sources to recover lost money
• Connect communications with people involved
• Protect against future fraud or hacks from the scam
DELETED DATA EXTRACTION
When someone wants to hide something, they delete the data. This information can be recovered, but attempting to do so without the proper training and tools can result in the data being rendered invalid as legal evidence, or even becoming permanently lost. Recover deleted call logs, IM conversations, track movements with geo-tagging. Gather data from personal computers, phone or other devices.
• Internet artifacts
• Web history and cache
• Chat sessions
CORPORATE FRAUD DETECTION
A thorough fraud investigation triangulates inquiry and scrutiny of documents, activity, and financial records using cutting edge intelligence tools and methods. By discovering the fraud without revealing the investigation to employees, the full true nature of the fraud is determined along with all associated actors being identified.
• Ghost Vendors (A/P vs payroll)
• Mail Scan
• A/R Mod Review
• Benford Law Analysis
• Delta KPIs
• Criminal/Civil Scan
• Cashed Check Analysis
LOCATE MISSING PERSON
Locating hard to find subjects, missing persons, and those avoiding discovery. Reveal the activities and whereabouts of those concealing their identity or hiding their location. Services prepare a report of records and documentation of subjects activities, court testimony available by a licensed investigative agent.
• Missing persons
• Avoiding service of process
• Absconded judgement debtor
• Fugitive from responsibility
• Witness to events
• Homeless or incarcerated
Ecommerce and storefront merchants are bombarded with chargebacks to their merchant account from consumers who have placed orders with their company. The damages go beyond the lost payment. The chargeback fees taken by the merchant bank extends the loss, and multiple chargebacks can raise the processing rates charged to the merchant.
• Identifying Order Source
• Searching Resale of Your Product
• Connecting Cardholder to order
• Proving Receipt
• Evidence for Response
• IP and Phone Backtrace
Get Started Today
Take the first step toward discovering the truth.
I’m looking to get more information.
Click here to receive more information about investigative services via email, including descriptions of some available investigator services.
I’m ready to schedule my consultation.
Select this option to arrange for an online video consultation with a licensed private investigator. They will hear your description of the case situation, and provide advice on possible investigative strategies.
PROFESSIONAL INVESTIGATIONS FOR ENTERPRISE AND LEGAL INDUSTRY CLIENTS
Active Intel Investigations has provided investigative research services to corporate clients such as Wells Fargo Bank, Chubb Insurance, United States Postal Service, and the SBA. We have provided evidence and expert witness testimony in cases in local and federal court, for clients such as the US Department of Justice.
REPORTING AND PRODUCTION METHODS
• Records Intake & Review
• Data Research
• Extraction Algorithm
• Financial Records
• Witness Interviews
• Subject Observation
• Activity Monitoring
• Message Forensics
• Data Mining Program
• Legal Records
• ESI Processing
• Electronic Preservation
• Structured Data Breakdown
• Voice and Image Files
• Non-Public Records
• Family and Associates
• 3rd Party Retained Records
• Public Sector Filing Verification