Threat Actor Unmasking

Track Down Threats

Unmask your harasser.

They think they are anonymous, but there are always clues.

Many bad actors are chumps, easy to find. Others have skills. But they all can be found with the right team, tools, and dedication. We have:

* The top OSINT tools, some of them military-grade, and a few that are not available commercially.

* Incredible expertise, plus worldwide connections to any resource a job might require.

* A reputation for getting the job done. Come to us when others fail.

We'll turn over every rock.

Digital investigations are sort of like gumshoe work – but in cyberspace. Unfortunately, a lot of investigators think a TLO report is the end of the road. For us, that’s just the beginning of the investigation.

In the same ways we know how to delete your digital footprints, we know how to find those of bad actors.

If you are a Law Firm or similar organization looking for better investigative capabilities, give us a call.

Social Links

We uncover connections to social, identity, and related services your target is linked to via email or selectors.

Risk Profiles

TLO, IDI, Clear, Accurint, and others offer profiling that reveals more than you'd expect.

People Search Engines

Major engines and hundreds more offer a peek into anyone’s life — often freely accessible via Google.

Breached Data

We dive into data breaches to uncover methods, context, and what threat actors are really after.

Dark Data

Net flow, logs, and other hidden data sources can be queried — if you know where to look.

Credit Bureaus

Deep insights from bureaus are possible for targeted cases, though tightly regulated.

Everyone leaves a trail. You just need to know where to look.

How We Can Track for You

Quick Assess

  • This can be a great way to size a project, saving you money in the long run. It’s often hard to quote without initial review.
  • Fast track your job and push it ahead in the queue.

Hourly

  • Fixed fee to identify the target and accomplish your goal.
  • Ideal for multiple or hard/nation-state targets.
  • Includes a written wrap-up report.
  • Additional fee for law enforcement presentables.

Flat Fee

  • We charge hourly; investigations average 10 hours.
  • Work is documented and cost is minimized.
  • Only top investigators and best tools are used.

Latest Privacy Advice

Data Breach

When Your Personal Data Is Exposed…

January 20, 2026
A Data Breach Triage Guide for Real-World Risk   Non-negotiable baseline If credentials, recovery paths, or government identifiers are exposed,…
account takeover preventionadversary researchbreach monitoringbreach triagecredential reuse
Adversarial Research

Boutique Intelligence vs. Big Providers

January 14, 2026
Boutique Intelligence vs. Big Providers: Why Smaller Is Safer for High-Risk Decisions When you’re facing a high-risk decision – a…
alpha groupasset tracingbespoke investigationsboutique intelligencecorporate investigations
Attack Surface Mapping

OSINT + HUMINT

January 14, 2026
The Missing Link in Modern Due Diligence In 2025, nobody makes a serious decision without some kind of due diligence.…
alpha groupbackground checkscompliance verificationcorporate investigationscross-border M&A
AI

Gmail Is No Longer a Neutral Tool

January 7, 2026
A quiet shift high-risk people should not ignore Gmail used to be a tradeoff.Less privacy. More convenience. That balance is…
AI in email platformsEmail content scanningEmail data retentionEmail threat surfaceExecutive communication security
Biometric Identifiers

When the Internet Demands Your Identity

January 6, 2026
Your Identity Is Becoming the Price of Entry The web is changing fast. Governments are pushing identity checks deeper into…
Biometric data collectionData minimization principlesDigital identity exposureFacial recognition privacyGovernment ID checks
Communication Privacy

The 6–7 Privacy Stack

December 31, 2025
Real Protection Without Breaking How You Work. Most privacy advice fails because it assumes perfect behavior. Executives do not have…
Cloud SecurityDigital Privacy ToolsEncrypted Emailexecutive privacyPassword Management