Financial Fraud Investigations
International and Domestic Fraud Investigations, Litigation Support, and Asset Tracing. IHC supported the U.S. Court-appointed Stanford Receivership with financial investigative consultant services for the Stanford Financial Group’s civil case, the world’s second largest Ponzi scheme to date.
IHC’s services include financial crime investigations, anti-money laundering, asset tracing, forensic computer audits, interviews, cyber investigations, and civil litigation support.
Corporate Investigations & Intellectual Property Protection
The theft of intellectual property and corporate espionage has become big business, with $500 billion in raw innovation stolen from U.S. companies each year. An insider threat is most simply defined as a security threat that originates from within the organization being attacked or targeted, often by an employee or officer of an organization or enterprise.
A insider threat does not have to be a present employee or stakeholder but also can be a former employee, board member, or anyone who at one time had access to proprietary or confidential information from within an organization or entity.
IHC’s services provide the essentials to protect your company, beginning with security assessments, compliance audits, IT and cyber audits, IT network forensics for post and pre-breach rapid analysis, and assessments of on-premise and/or cloud-stored data, internal investigations, and litigation support. If you do not have the proper measure in place, discovering criminal activity is difficult; 82% of breaches discovered are by third parties. Have you taken the right steps to identify and mitigate risk?
Risk Management Consulting
IHC’s risk management consultants first analyze our client’s operations including the impact from their locations, supply chain, travel, infrastructure, logistics, finances, and staff. All hazards threat management, potential losses, and operational failures are extrapolated to determine where efforts must be made to harden the potential target. Our risk management solutions are designed around the specific needs of the individual client and are implemented to mitigate and minimize risk.
IHC’s investigators support intelligence gathering for corporate entities positioning themselves for mergers, takeovers, and expanding operations in seasoned and emerging markets. Both on the ground and by conducting thorough research, IHC’s security consulting clients are better prepared to face the challenges presented by the current economic landscape.
Web Presence and Social Media
When smart thinking begins, our clients realize that it’s not whether they will be attacked, but when. Once they realize that threats will come, we help them understand where to begin. Our experience fighting asymmetric global terrorism, global criminal organizations, and economic espionage has shaped our approach in finding where the conspiracy begins and assessing the emerging threat vectors. By uncovering the conspiracy, you would understand and stop the threat before it becomes realized.
Today, IHC’s team is quietly disrupting the traditional reactive approach to investigations and has established ourselves as a thought leader in the arena of proactive intelligence. We also have forged ahead technologically by excelling via comprehensive data collection among the surface web, social media, dark web, and peer-to-peer domains. We survey the clear net (aka surface web) and social media, but uniquely combine proprietary search engines to collect and analyze otherwise inaccessible recesses of the dark web and P2P global file sharing networks. IHC’s team quietly and without attribution surveys and indexed terabytes of meaningful intelligence including social media data, public records, files, and postings while maintaining a persistent stare across thousands of forums directly contributing to the threats.
Technical Surveillance Countermeasures (TSCM Bug Sweep) Surveys
IHC’s security consultants deploy industry-leading technology to conduct bug sweeps in support of government agencies, corporate and commercial organizations, and private individuals. Our analysis includes countermeasures against traditional and state-of-the-art eavesdropping and data skimming devices.