Cybercrime Investigative Services
$285/hr, 4‑hour minimum retainer (tax not included)
When a digital incident escalates into fraud, impersonation, harassment, or targeted intrusion, you need a structured, evidence‑driven investigation. Countervail provides licensed investigative support grounded in OSINT, threat analysis, and enterprise‑grade incident response.
What This Service Includes
- Timeline reconstruction — establishing what happened, when, and how
- Evidence review — analysis of screenshots, logs, messages, emails, and digital artifacts
- Threat actor analysis — identifying patterns, indicators, and potential attribution
- Domain, URL, and infrastructure review — investigation of malicious links, spoofed domains, or suspicious activity
- Actionable next steps — guidance for containment, recovery, and documentation
- Law‑enforcement‑ready reporting — structured findings suitable for police or federal reporting (with client consent)
This service is appropriate for cases involving fraud, payment diversion, impersonation, doxing, cyberstalking, targeted harassment, or account compromise.
Information to Gather Before Booking
1. Your Contact Information
- Full Name
- Email Address
- Phone Number
- Preferred Contact Method
2. Your IP Address
If you do not know your IP address, visit: https://ipfingerprints.com/
3. Primary Incident Description
Include:
- What occurred
- When it began
- How you discovered it
- Any financial loss
- Any ongoing harm
4. Accounts, Platforms & Devices Involved
List all relevant:
- Email accounts
- Social media profiles
- Cloud services
- Business systems
- Phones, laptops, tablets
- Financial accounts
5. Domain Names, URLs & Online Assets
Include any:
- Suspicious URLs
- Spoofed domains
- Business infrastructure
- Login portals
6. Evidence & Documentation
Gather:
- Screenshots
- Emails
- Messages
- Logs
- Invoices
- Notifications
7. Known or Suspected Adversary Information (Optional)
Include any:
- Names or aliases
- Relationship to you or your business
- Prior incidents
8. Desired Outcome
Examples:
- Identify threat actor
- Document incident for law enforcement
- Stop ongoing harassment
- Recover access
- Understand what happened