top of page
Services: Services

ONLINE PROFILE INVESTIGATIONS

Nemesis Online Law and Security Consultancy offers a specialised and very discreet service involving investigating a subject’s background through online open source research. We have many years of experience in this area and it is open to individual clients as well as corporate clients the service can be broken down into two parts:

1. We feel that in this day and age any person who has struck up a new personal relationship but feels uneasy about their new friend’s past can ask us to carry out an investigation into his or her background in order to see if the new person in their life is who he/she appears to be. We have a bespoke screening service that can be tailored to ask for further in-depth searches or perhaps a ‘lite’ version. It must be pointed out that the screening is only carried out into open online research and we do not use any false flagging procedures.

2. We can also offer this bespoke screening for Corporate clients who suspect that their employees are not standing up to their signed code of conduct or even breaking their non-disclosure agreements. As well as clients who are to be placed in more sensitive areas of employment.

For the Individual:

We will provide a fully detailed highly confidential report; we will supply a copy of all the sources we have used to write the report. All we ask is that you complete the web form providing as much detail about the subject and we will produce a report within 4-5 working days. What activities would be highlighted by an Online Profile Report? 

• A partner’s open online activity
• A business associate’s or client’s background
• Helping your children who associate with people who are badly influencing them making better decisions about their friends
• A background check on a new person to the family

For the Business:

We will carry out a full open source investigation into the subject’s online activity. If there is no derogatory information found we will provide a basic report stating that no derogatory information has been found on the subject’s background. If, however, derogatory information is found we will produce a Derogatory Information Report, which will provide all the relevant details to help you make a more informed decision about their employment and help your company avoid employing personnel who could let you down in the future by their conduct. 

Private Online Investigation checks involve:

• All the mainstream social networking organisations
• ‘Undercover Journalist’ checks
• Copyright and Trademark
• Online Image and Text Takedown Removals
• Extremism Checks 
• Activism Checks
• Ideological or Religious Extremism
• Blogs
• Video Channels
• Forums
• Property Ownership
• Business Records
• Relationship Checks
• Address Records
• Identity and alias Checks
• Press and Media Records
• Social network information
• Negative News Records

Services: Services

Social Media Vulnerability Assessment

We have all heard of the term “online footprints” but do we really understand what they mean? It is important that parents, teenagers and carers understand what these are so that they can in turn educate their children and help them to know what risks they might be placing themselves in when sharing information online, or just looking innocently at websites.

Whatever we are doing on the internet we can leave a trail of information behind us which people can use to determine what we might be interested in buying, or for other less savoury purposes such as trying to hack into our online accounts and trying to access passwords etc.

So what is an online footprint?

A digital footprint is data that is left behind when users have been online. There are two types of digital footprints which are passive and active. A passive footprint is made when information is collected from the user without the person knowing this is happening. An active digital footprint is where the user has deliberately shared information about themselves either by using social media sites or by using websites.

Issues and Risks

NemesisLSC’s Social Media Vulnerability Assessment allows individuals to understand their Digital Footprint online most projects stem from the following areas:

  • Complete Social Media Risk Assessment

  • A starting point for investigations into those responsible for defamatory postings

  • Foundation to remove any offensive content from the Internet

  • Potential multiple avenues of identity and reputation protection

Individuals must understand their digital footprint in order to mitigate the risk it poses to them.  It is also becoming more and more common for employers to “cyber vet” prospective employees based on their online activities. Digital footprints can also be used by the police to gather information about individuals to help them with their enquiries.

Social networking sites can also give a very good idea of an individual’s life. These sites can allow digital tracing data which can include what social groups they belong to, their interests, location etc. This data can be gathered and analysed without the users being aware that this is happening.

So let us carry out a Social Media Vulnerability Assessment and help you identify any risks within your online/social media profile​

Services: Services

Legal Investigations and Support

Investigative Due Diligence

Our investigative due diligence capability provides a consultative approach to clients undertaking new and significant projects, whether underwriting an IPO, considering a merger or acquisition, participating in a joint venture or entering a new marketplace.

The risks inherent in today’s financial transactions are greater than ever. NemesisLSC provides answers to questions that financial and legal analyses cannot address, especially regarding integrity issues and the reputations and backgrounds of counterparties or clients who engage in the following:

  • Mergers and acquisitions

  • Public offerings

  • Financings

  • Joint ventures

  • Private equity, venture capital and other investments

Clients engage NemesisLSC when they need a consultative and comprehensive investigative process to identify key details and then connect the dots. They hire us when they are attempting to manage the risks associated with critical transactions or new relationships — a high-value IPO or merger, a significant acquisition or investment, participating in a joint venture or the appointment of a new board member.

Our professionals bring real-world insights to each assignment and an unparalleled ability to turn raw information into meaningful business intelligence.

We tailor our investigative due diligence to each client and their specific needs, and our work entails a thorough review and analysis of public records and if required inquiries of human sources. Nemesis does not rely on databases and computer-based sources alone. These sources are often incomplete or updated only sporadically. As such, we conduct onsite research in developed and emerging markets and analyzes this information to identify risks.

Our services include investigating, analyzing and verifying significant information, such as:

  • Regulatory history, sanctions and violations

  • Criminal proceedings and civil litigation

  • Corporate, partnership and other business records

  • Property and other asset-related sources

  • Professional and educational history

  • Personal and business reputations

Asset Investigations

Whether you are contemplating litigation or collecting on a judgment, knowing where a person's assets are and their value will determine how successful you are in your case. 

Our asset investigations range from a simple property search to a complete financial composite of the subject. We have simple asset checks that simply look for property, vehicles and businesses (these are great decision making tools when you're considering a case or offer). We also have complete asset investigations that paint a complete picture of your subject's financial world. 

  • Real property ownership

  • Business ownership and interests

  • Motor vehicle ownership

Litigation costs can be staggering — both in legal expenditures and related business disruption. Identifying and locating critical evidence and testimony can make the difference between winning and losing a case. Our clients have retained Kroll in business litigation where the very future of the company has been at stake – and we have produced the information that has enabled our client to prevail. These have been cases where our clients have suffered multi-billion dollar frauds, infringement of intellectual property rights, false claims of environmental spoliation, damage to their corporate or personal reputations or persecution from false claims of wrongdoing. Our expertise in investigation, computer forensics, asset identification, forensic accounting and data breach analysis allows us to get to the heart of a case swiftly and effectively.

Our ability to gather evidence is borderless. We are worldwide firm with resources on the ground on every continent. We have the local cultural and language capabilities to work seamlessly and quickly anywhere evidence may be found. Because many of our day-to-day case managers have had prior careers as prosecutors or in law enforcement, we know the business litigation landscape well and work strategically to support your case. Our team of fact finders, interviewers and investigative strategists, has helped support in-house and outside counsel with critical research, enabling them to reach favorable outcomes.

Upon being retained, we will confer with you on strategy and immediately deploy resources as required by the case, anywhere in the world. This litigation support methodology typically entails identifying key objectives, obtaining pertinent facts, and locating and interviewing crucial fact sources and witnesses.

Our litigation support team will:

  • Investigate impeachment information on adversary witnesses

  • Conduct defensive research on possible attacks on our client’s assets and witnesses

  • Illuminate relevant issues in financial records

  • Detect and preserve evidence in electronic media, including evidence sought to be destroyed

  • Research and identify evidence stored in common and obscure information databases, including social media sites, blogs and the “hidden” Internet, and use Kroll’s proprietary and proven strategy to trace assets around the world

  • Complete civil court history to identify potential assets from previous litigation

  • National searches for liens, judgments and bankruptcies

  • Liquid assets

bottom of page