Our services

Investigations

Our global team specializes in exposing and eliminating threats to your IP, including copyright and trademark infringement, counterfeiting, unauthorized reselling, and digital piracy.

Reveal and dismantle hidden threats to your brand

Our global team of online and in-field investigators are dedicated to collecting, analyzing, and developing intelligence and evidence for civil and criminal enforcement actions.

We seamlessly integrate with our clients’ investigations teams or provide managed programs directly to legal or public affairs teams.

Our international network of on-the-ground investigators and sources close to counterfeit supply chain hotspots enables proactive target identification and development.

Investigations are led by experts from law enforcement, intelligence services, and the private sector, ensuring the delivery of actionable reports leading to effective results.

Comprehensive IP protection

Unrivaled Reach and Influence

  • 100

    Operational footprint in 100+ countries across five continents

  • 600

    600+ leading brands protected

  • 200k

    Over 200k pirate websites identified and enforced against

Online investigations

Our online investigations leverage public, commercial, and proprietary information to support our clients’ legal, regulatory, and enforcement goals. By analyzing digital footprints, we identify key targets involved in illicit activities, ranging from unauthorized manufacturing, distribution, and sale of infringing goods to those engaged in digital piracy and other online threats.

We enrich our investigations and enhance outcomes with test purchases and our extensive network of on-the-ground sources and investigators.

Investigations
  • Digital Network Mapping

    Identify interconnected entities to get a better picture of the players and infrastructure involved in illicit activities. This could be counterfeit sellers related to e-commerce platforms, payment processors, and logistics providers or piracy websites connected to hosting providers and advertising networks.

  • Attribution Support

    Use techniques to link pseudonymous or anonymous online activity to real-world identities. By triangulating information from various sources, we provide crucial support for civil and criminal enforcement actions. Our detailed reports explain the methods used to identify individuals, ensuring transparency and clarity.

  • Evidence Development  

    Establish timelines, intent, and scope of operations to build (pre-)litigation intelligence packages, make criminal referrals, or support affidavits for search warrants and seizures.

  • Dark Web Correlation 

    Darknet marketplaces and forums frequently leak into indexed areas of the web. OSINT methodologies are applied to uncover hybrid trade networks.

  • Threat Intelligence Analysis and Reporting

    Cross-channel risk signals can be used to identify and track organized illicit trade actors targeting your brand or supply chain. We provide supply risk intelligence feeds to corporate security and compliance teams.

  • Knock and Talks

    Fact-finding visits with suspected infringers gather on-the-ground intelligence to support civil or criminal legal action. We coordinate with law enforcement agencies to support the engagements. We can also hand-deliver cease and desist letters to prompt immediate compliance.

  • Offline Investigation and Surveillance

    The monitoring of physical markets and logistics hubs identify high-risk locations for counterfeit trade. We also provide evidentiary documentation (photos, videos, logs) for use in legal filings or regulatory actions.

  • Supply Chain Investigations

    This includes the identification and mapping of illicit infiltration points in legitimate supply chains and the discovery of diversion schemes. It also includes the collection and analysis of intelligence as well as mitigation solutions for supplier audits.

  • Digital Crime

    We investigate eCommerce fraud, spoofed websites, and digital marketplaces selling counterfeit goods. We work alongside legal teams to prepare takedown notices and digital evidence packages.

  • Dark Web Monitoring and Investigation

    We detect and monitor darknet activity across marketplaces and forums. We also support legal proceedings by preserving and analyzing hidden service evidence trails.

  • Malware Analysis

    We identify and analyze malware used in phishing campaigns that impersonate brands to facilitate counterfeit sales. Our global teams support digital takedowns and legal attribution of threat actors targeting clients.

  • In-Person (HUMINT) Investigations

    Our trusted sources gather inside information on counterfeiting operations and their supply routes. We enhance litigation effectiveness with credible, corroborated human intelligence from the field.

  • Digital Forensics

    We extract digital evidence from seized devices or rogue systems tied to illicit trade networks. We also support litigation with chain-of-custody compliant forensic reports and expert testimony.

Connect with IP protection, enforcement and investigations experts today.

Talk to an expert (opens in a new tab)