Before beginning a cybersecurity assessment or cybercrime investigation with Countervail, gathering the right information will help ensure your case starts efficiently and with the highest level of accuracy. This guide outlines the details that are most helpful for a licensed investigator to review before your consultation.
You do not need to have everything perfect, provide what you can, and we will guide you through the rest.
1. Your Contact Information
Please have the following ready:
- Full Name
- Email Address
- Phone Number (optional but recommended)
- Preferred Contact Method (email, phone, either)
This allows us to reach you quickly and securely.
2. Your IP Address
Your IP address helps validate activity and support investigative analysis.
If you do not know your IP address, visit: https://ipfingerprints.com/
Copy the IP address displayed at the top of the page.
3. Primary Concerns
Prepare a clear description of your situation. Include:
- What happened
- When it began
- How you discovered the issue
- Any actions you’ve already taken
- Any suspected individuals or organizations (if applicable)
This does not need to be formal — just honest and detailed.
4. Accounts, Platforms, and Devices Involved
List all accounts or systems that may be relevant, such as:
- Email accounts
- Social media profiles
- Cloud services
- Business systems
- Phones, laptops, tablets
- Financial accounts
- Communication apps
Include usernames, handles, or associated email addresses when possible.
5. Domain Names, URLs, and Online Assets
If your case involves a business, website, or online infrastructure, gather:
- Domain names
- Websites
- Login portals
- Hosted services
- Third‑party platforms
- Suspicious URLs or links you interacted with
This is especially important for business cybersecurity assessments and cybercrime investigations.
6. Evidence & Documentation
Collect any relevant evidence, including:
- Screenshots
- Emails
- Messages
- PDFs
- Logs
- Notifications
- Invoices or transaction records
If you cannot gather everything, bring what you have — additional evidence can be submitted later.
7. Known or Suspected Adversary Information (Optional)
If you believe someone may be involved, note:
- Name or alias
- Relationship to you or your business
- How they may be connected
- Any prior incidents or conflicts
This information is optional but can accelerate investigative direction.
8. Risk & Safety Concerns (Optional)
Please indicate if you are experiencing:
- Ongoing harassment
- Threats
- Account lockouts
- Financial loss
- Business disruption
- Personal safety concerns
This helps prioritize urgency and response.
9. Desired Outcome
Think about what you want to achieve. Examples:
- Identify source of compromise
- Stop ongoing harassment
- Recover access to accounts
- Assess exposure
- Strengthen security posture
- Prepare documentation for law enforcement
- Understand what happened and why
This helps shape the investigative scope and ensures alignment with your goals.