Cybersecurity & Cybercrime Investigation Services
Countervail LLC is a Washington State licensed private investigation agency providing investigator‑led cybersecurity support, OSINT‑driven analysis, and adversary‑informed cybercrime investigations for individuals and small businesses facing real‑world digital threats.
Every engagement is grounded in enterprise‑grade incident response, structured investigative methodology, and a commitment to clarity, precision, and client protection.
Individual Cybersecurity Assessment
Starting at $570 (tax not included)
Individuals today face targeted attacks that exploit personal information, online accounts, and digital exposure. This assessment provides a comprehensive, investigator‑led review of your digital footprint and security posture.
What this service includes
- Exposure & risk analysis — OSINT review of personal data, leaked credentials, public records, and digital footprint
- Account & device security review — evaluation of email, cloud, social media, and authentication practices
- Threat pattern analysis — identification of suspicious activity, impersonation attempts, or targeted behavior
- Actionable defensive recommendations — prioritized steps to harden accounts, devices, and online presence
- Optional data broker removal support — guidance or managed removal of personal information from major brokers
This service is ideal for individuals experiencing harassment, impersonation, account compromise, stalking, fraud attempts, or unexplained digital activity.
Small Business Cybersecurity Assessment
Starting at $725 (tax not included)
Small businesses are increasingly targeted by attackers exploiting weak authentication, exposed infrastructure, and employee vulnerabilities. This assessment provides a practical, high‑impact review of your organization’s exposure and operational risk.
What this service includes
- Attack surface analysis — review of domains, email systems, cloud services, and public‑facing assets
- OSINT‑driven exposure review — identification of leaked credentials, misconfigurations, and exploitable information
- Workflow & policy evaluation — assessment of internal processes, access controls, and communication channels
- Staff training & awareness — tailored guidance to reduce human‑factor risk
- Incident readiness review — evaluation of response procedures, escalation paths, and recovery posture
This service is ideal for organizations without internal security teams or those seeking external validation, exposure reduction, or incident‑readiness improvements.
Cybercrime Investigative Services
$285/hr, 4‑hour minimum retainer (tax not included)
When a digital incident escalates into fraud, impersonation, harassment, or targeted intrusion, you need a structured, evidence‑driven investigation. Countervail provides licensed investigative support grounded in OSINT, threat analysis, and enterprise‑grade incident response.
What this service includes
- Timeline reconstruction — establishing what happened, when, and how
- Evidence review — analysis of screenshots, logs, messages, emails, and digital artifacts
- Threat actor analysis — identifying patterns, indicators, and potential attribution
- Domain, URL, and infrastructure review — investigation of malicious links, spoofed domains, or suspicious activity
- Actionable next steps — guidance for containment, recovery, and documentation
- Law‑enforcement‑ready reporting — structured findings suitable for police or federal reporting (with client consent)
This service is appropriate for cases involving fraud, payment diversion, impersonation, doxing, cyberstalking, targeted harassment, or account compromise.
Before You Book: Information You Should Gather
To ensure your case begins efficiently and with the highest level of accuracy, please collect the following information before scheduling your consultation or activating your case.
This guide helps you prepare the details that allow a licensed investigator to begin analysis immediately.
1. Your Contact Information
Please have the following ready:
- Full Name
- Email Address
- Phone Number (optional but recommended)
- Preferred Contact Method (email, phone, either)
2. Your IP Address
Your IP address helps validate activity and support investigative analysis.
If you do not know your IP address, visit: https://ipfingerprints.com/ and copy the IP address displayed at the top of the page.
3. Your Primary Concerns
Prepare a clear description of your situation, including:
- What happened
- When it began
- How you discovered the issue
- Any actions you’ve already taken
- Any suspected individuals or organizations (if applicable)
This does not need to be perfect — just honest and detailed.
4. Accounts, Platforms, and Devices Involved
List all relevant accounts or systems, such as:
- Email accounts
- Social media profiles
- Cloud services
- Business systems
- Phones, laptops, tablets
- Financial accounts
- Communication apps
Include usernames, handles, or associated email addresses.
5. Domain Names, URLs, and Online Assets
For individuals and businesses, gather any relevant:
- Domain names
- Websites
- Login portals
- Suspicious URLs
- Hosted services
- Third‑party platforms
This is especially important for business cases involving infrastructure or impersonation.
6. Evidence & Documentation
Collect any relevant evidence, including:
- Screenshots
- Emails
- PDFs
- Logs
- Messages
- Invoices
- Notifications
Bring what you have, additional evidence can be submitted later.
7. Known or Suspected Adversary Information
If you have reason to believe someone may be involved, note:
- Name or alias
- Relationship to you or your business
- How they may be connected
- Any prior incidents or conflicts
This is optional but can accelerate investigative direction.
8. Risk & Safety Concerns
Note if you are experiencing:
- Ongoing harassment
- Threats
- Account lockouts
- Financial loss
- Business disruption
- Personal safety concerns
This helps prioritize urgency.
9. Desired Outcome
Think about what you want to achieve, such as:
- Identify source of compromise
- Stop ongoing harassment
- Recover access to accounts
- Assess exposure
- Strengthen security posture
- Prepare documentation for law enforcement
- Understand what happened and why
This helps shape the investigative scope.
Ready to Begin?
Once you’ve gathered the information above, you can: