top of page
srx7082_A_stylized_semi-realistic_AI_private_investigator_analy_49a6dbf7-ca3d-4eff-b406-ff

Private investigators
Doubts? We deliver proof. Clear, solid, undeniable.

Digital Profiling and Online Reputation

• Complete analysis of the digital presence of a targeted person (social networks, articles, forums, indexed web, deep web)

• Identification of anonymous accounts or recurring pseudonyms

• Mapping of digital relationships (social networks, LinkedIn connections, etc.)

• Reputation assessment (positive, contentious or toxic)

• Public background checks (litigation, bankruptcy, crimes)

• Verification of IDs, passports (all countries) and official documents

Analysis of digital traces
•Tracking of deleted or altered publications (Wayback Machine)
• Probable attribution of publications to an individual
• Analysis of metadata (documents, images, videos)
• Re-identification by cross-referencing data (e-mails, telephone numbers, pseudonyms)

Cyber-infiltration / Passive observation
• Monitoring of closed groups (forums, Telegram, Discord, etc.)
• Creation of false profiles for digital infiltration (within a legal framework)
• Collection of online behavioral indicators

Investigation into digital fraud
• Identity or business theft
• Investment scams or cryptocurrency scams
• Investigations into scams via dating platforms or social networks
• Verification of the legitimacy of a company online (Whois, IP address, founders, etc.)

OSINT (Open Source Intelligence) type investigations
• In-depth research of public and semi-public information
• Cross-analysis of data available on the web, including the dark web
• Recovery of information from data leaks or compromised databases

Cyberbullying or Targeted Threat Investigation
• Detection of probable perpetrators
• Source identification (IP address, grammatical structure, usage history)
• Creation of timelines of digital incidents

Portfolio analysis and blockchain intelligence
• Tracing of suspicious crypto transactions (BTC, ETH, etc.)
• Identification of recurring patterns between portfolios
• Verification of laundering or misappropriation of digital assets

Investigations into conflicts of interest or unfair competition
• Identification of hidden holdings (domain names, crypto wallets, etc.)
• Establishing links between several companies, individuals or structures via digital indices
• Search for activities inconsistent with the public profile

Investigation into internal leaks or sabotage
• Analysis of document leaks (PDF, DOCX, etc.) and tracing of their source
• Verification of a former employee or partner damaging the reputation of an organization
• Assessment of the level of risk posed by a whistleblower (veracity, intentions)

Field surveys
• Surveillance, observation, tailing
• Company infiltration
• Harassment investigations, interviews and reports
• Investigation recordings and videos
• Counter-spinning
• Electronic counter-surveillance

Preparation of legal and admissible reports
• Creation of a legally valid file
• Precautions regarding the digital chain of evidence (chain of custody)
• Drafting of investigation and expert reports for a lawyer or judge

Additional services
• Audit of human vulnerabilities (social engineering, recruitment)
• Audit of the security of digital communications
• Strategic monitoring of a person or a company
• Training in interview techniques

bottom of page