
Investigations
Our global team specializes in exposing and eliminating threats to your IP, including copyright and trademark infringement, counterfeiting, unauthorized reselling, and digital piracy.
Reveal and dismantle hidden threats to your brand
Our global team of online and in-field investigators are dedicated to collecting, analyzing, and developing intelligence and evidence for civil and criminal enforcement actions.
We seamlessly integrate with our clients’ investigations teams or provide managed programs directly to legal or public affairs teams.
Our international network of on-the-ground investigators and sources close to counterfeit supply chain hotspots enables proactive target identification and development.
Investigations are led by experts from law enforcement, intelligence services, and the private sector, ensuring the delivery of actionable reports leading to effective results.
Comprehensive IP protection
Unrivaled Reach and Influence
-
100
Operational footprint in 100+ countries across five continents
-
600
600+ leading brands protected
-
200k
Over 200k pirate websites identified and enforced against

Online investigations
Our online investigations leverage public, commercial, and proprietary information to support our clients’ legal, regulatory, and enforcement goals. By analyzing digital footprints, we identify key targets involved in illicit activities, ranging from unauthorized manufacturing, distribution, and sale of infringing goods to those engaged in digital piracy and other online threats.
We enrich our investigations and enhance outcomes with test purchases and our extensive network of on-the-ground sources and investigators.

Services
-
Digital Network Mapping
Identify interconnected entities to get a better picture of the players and infrastructure involved in illicit activities. This could be counterfeit sellers related to e-commerce platforms, payment processors, and logistics providers or piracy websites connected to hosting providers and advertising networks.
-
Attribution Support
Use techniques to link pseudonymous or anonymous online activity to real-world identities. By triangulating information from various sources, we provide crucial support for civil and criminal enforcement actions. Our detailed reports explain the methods used to identify individuals, ensuring transparency and clarity.
-
Evidence Development
Establish timelines, intent, and scope of operations to build (pre-)litigation intelligence packages, make criminal referrals, or support affidavits for search warrants and seizures.
-
Dark Web Correlation
Darknet marketplaces and forums frequently leak into indexed areas of the web. OSINT methodologies are applied to uncover hybrid trade networks.
Related services
-
Threat Intelligence Analysis and Reporting
Cross-channel risk signals can be used to identify and track organized illicit trade actors targeting your brand or supply chain. We provide supply risk intelligence feeds to corporate security and compliance teams.
-
Knock and Talks
Fact-finding visits with suspected infringers gather on-the-ground intelligence to support civil or criminal legal action. We coordinate with law enforcement agencies to support the engagements. We can also hand-deliver cease and desist letters to prompt immediate compliance.
-
Offline Investigation and Surveillance
The monitoring of physical markets and logistics hubs identify high-risk locations for counterfeit trade. We also provide evidentiary documentation (photos, videos, logs) for use in legal filings or regulatory actions.
-
Supply Chain Investigations
This includes the identification and mapping of illicit infiltration points in legitimate supply chains and the discovery of diversion schemes. It also includes the collection and analysis of intelligence as well as mitigation solutions for supplier audits.
-
Digital Crime
We investigate eCommerce fraud, spoofed websites, and digital marketplaces selling counterfeit goods. We work alongside legal teams to prepare takedown notices and digital evidence packages.
-
Dark Web Monitoring and Investigation
We detect and monitor darknet activity across marketplaces and forums. We also support legal proceedings by preserving and analyzing hidden service evidence trails.
-
Malware Analysis
We identify and analyze malware used in phishing campaigns that impersonate brands to facilitate counterfeit sales. Our global teams support digital takedowns and legal attribution of threat actors targeting clients.
-
In-Person (HUMINT) Investigations
Our trusted sources gather inside information on counterfeiting operations and their supply routes. We enhance litigation effectiveness with credible, corroborated human intelligence from the field.
-
Digital Forensics
We extract digital evidence from seized devices or rogue systems tied to illicit trade networks. We also support litigation with chain-of-custody compliant forensic reports and expert testimony.
Connect with IP protection, enforcement and investigations experts today.
Talk to an expert (opens in a new tab)