ACTIVE INTEL
SURVEILLANCE
& SEARCH

ONLINE SCAM INVESTIGATION

If you have been a victim of an online scam, we can provide an investigation of the transaction. Depending upon the nature of the fraud there are two choices for an investigation. A full investigative case deploys several active investigative agents to research and contact the fraudster for case development. We can also perform a preliminary records forensic investigation to provide you with the initial results to determine if a more involved investigation is warranted.

If the loss is less than $5000 we recommend starting with a preliminary investigation first to keep the costs low, and then decide if you wish to go forward with the more complex investigation. We will credit the cost of any preliminary case to future investigations of the same fraudsters.

ONLINE SCAM INVESTIGATION

If you have been a victim of an online scam, we can provide an investigation of the transaction. Depending upon the nature of the fraud there are two choices for an investigation. A full investigative case deploys several active investigative agents to research and contact the fraudster for case development. We can also perform a preliminary records forensic investigation to provide you with the initial results to determine if a more involved investigation is warranted.

If the loss is less than $5000 we recommend starting with a preliminary investigation first to keep the costs low, and then decide if you wish to go forward with the more complex investigation. We will credit the cost of any preliminary case to future investigations of the same fraudsters.

How do I begin a case?

All investigations start with a client consultation. You can book a live appointment for a one-on-one video —- with a licensed investigator to discuss your case. We will listen to the details of your specific situation, and describe the various options for investigations.

100% of the consultation fee is credited towards your investigation. Either way, you will get valuable insight as to how an investigation can be performed, and even instructions of what parts of a case you may be able to do on your own.

PRICING OPTIONS:

Electronic

$499

We run a basic electronic search of the companies and parties involved with your fraud case.

  • Identities searched
  • Common IP addresses
  • Digital activity report
  • Real estate connections

Full Service

$1,299

A 10-hour block of investigation of the fraud operation, including search for:

  • Identities
  • Digital activities
  • Corporate filings
  • Financial records
  • Assets
  • Prior entities
  • Documented activities
  • Contact interviews

Not Sure About Your Needs?

Schedule via TelaClient with a licensed investigator to discuss your case. (Fee is credited to a full search.)

Preliminary
Full Investigation
Entity search
Records search for the fraudulent company
IP scan of website and emails
Identify source of IP address, along with public records of parties associated with IP and domain
Payment destination search
Search for financial institution which collected payments on behalf of fraudulent company
Historical online activity report
Document prior versions of marketing and website for retention and identification
Covert contact by licensed investigators
Sales agents are contacted by several investigators to document sales presentation, and to extract identifying incriminating information
Interview of subjects at physical address
Take statements from individuals identified at the physical location of the fraudulent operation
1 hour surveillance at physical address
Perform covert surveillance to identify vehicles, persons, vendors, and activity at the fraudulent entity
Background check of individual known to be associated
Run criminal and civil records of a party identified as parcel to the fraudulent operation
Bank account search of entity as identified
Search for bank accounts associated with the tax identifier of the fraudulent firm
Request Info
Request Info
Preliminary
Full Investigation
Entity search
Records search for the fraudulent company
IP scan of website and emails
Identify source of IP address, along with public records of parties associated with IP and domain
Payment destination search
Search for financial institution which collected payments on behalf of fraudulent company
Historical online activity report
Document prior versions of marketing and website for retention and identification
Covert contact by licensed investigators
Sales agents are contacted by several investigators to document sales presentation, and to extract identifying incriminating information
Interview of subjects at physical address
Take statements from individuals identified at the physical location of the fraudulent operation
1 hour surveillance at physical address
Perform covert surveillance to identify vehicles, persons, vendors, and activity at the fraudulent entity
Background check of individual known to be associated
Run criminal and civil records of a party identified as parcel to the fraudulent operation
Bank account search of entity as identified
Search for bank accounts associated with the tax identifier of the fraudulent firm
Request Info
Request Info

ENTERPRISE
DUE DILIGENCE

ASSET
RECOVERY

FRAUD & EMBEZZLEMENT RECOVERY

Research of counterparty for aquisiting, merger, or significant proposed contractual relationship. Ensure that the entity has correctly represented its market, licenses, key personnel, financial condition, and reputation.

  • Officers and shareholders
  • Licenses, corporate filings, related entities
  • Prior corporate structure
  • Key vendor interviews covert or disclosed
  • Client and contract verification
  • Market and competitor environment
  • Documentation of sales procedures
  • Identify manner of business dealings

Documentation of assets and possible transfers. Identify changes to asset class and dilution of value. Verification of any increase or decrease to net asset value of the entity or individual. Prepare reporting for seizure or writ of garnishment.

  • Hard assets: Vessels, autos, equipment, aircraft
  • Cash, securities, and real estate
  • Notes due, UCC and receivables
  • Intellectual property, trademarks, copyrights
  • Business holdings, equity, and beneficial interests
  • Hidden assets and those vested in other names
  • Third party responsibility, accountants, agents
  • Compare historical snapshots of asset values

Identity internal losses incurred through embezzlement or diversion of company assets. Document the means of theft, the entirety of the parties involved, and the location of the fraudulently lost assets. Present the overview of theft enterprise and scope.

  • Investigate internal and outside involvement
  • Analyze ghost vendors and payment validity
  • Theft of inventory, cash, clients, and sales revenue
  • Bribes and extortion
  • Organized schemes of theft, and individual larceny
  • Financial fraud, bookkeeping & accounting, billing
  • Cargo and supply diversion
  • Financial statement manipulation

REPORTING AND PRODUCTION METHODS

• Records Intake & Review
• Data Research
• Extraction Algorithm
• Financial Records
• Witness Interviews
• Subject Observation
• Activity Monitoring
• Message Forensics
• Data Mining Program
• Legal Records
• ESI Processing
• Electronic Preservation
• Structured Data Breakdown
• Voice and Image Files
• Non-Public Records
• Family and Associates
• 3rd Party Retained Records
• Public Sector Filing Verification

ELECTRONIC
SURVEILLANCE

PRIVATE
INVESTIGATIONS

DATA
RESEARCH

COUNTER
SURVEILLANCE