How It Works

Evidence-first verification workflow used in real investigations

Request verification
Step 1 Verify

Identity & operational reality

Establish whether the counterparty exists as claimed and operates in the way it presents.

  • Registry, ownership, directors, sanctions screening
  • Address reality, warehouse/factory proof, staff signals
  • Phone, email, domain, and infrastructure consistency
Step 2 Investigate

Links, reuse, and hidden networks

Identify connections that are not visible in isolation but emerge across cases and data.

  • Linked companies, agents, logistics, and intermediaries
  • Reused documents, images, certificates, and narratives
  • Behavioral patterns across platforms and regions
Step 3 Decide

Clear outcome, documented risk

Translate findings into an understandable risk position before money or documents move.

  • What is verified, unverified, or contradicted
  • Key risk signals and escalation points
  • Proceed, pause, or stop — with justification

When to Verify

Situations where a basic self-check is no longer sufficient

Request verification
Risk signal Payment

Money or payment instructions change

Sudden changes in bank details, beneficiary names, or urgent payment requests.

  • New IBAN, SWIFT, or intermediary banks
  • Pressure to bypass normal approval steps
  • Mismatch between contract and invoice details
Risk signal Counterparty

New or unverified counterparties

First-time suppliers, agents, logistics partners, or intermediaries in the deal.

  • Limited operational history or inconsistent profiles
  • Use of personal emails or messaging-only contact
  • Reluctance to provide verifiable documentation
Risk signal Pressure

Time pressure or secrecy

Attempts to accelerate decisions or limit visibility before verification.

  • “Today only” pricing or expiring offers
  • Refusal of video calls or site visits
  • Requests to skip standard checks “just this once”