Recently we shared an article from one of our trusted legal partners, Jack Charman of National Private Investigators, about how the work of a private investigator can support solicitors high-profile and high-net worth cases in their work with companies and also financial remedies.
In this piece Jack Charman provides a study of a recent investigation report that he prepared for a client in 2024. A Law Firm sought the use of National Private Investigators upon advising a company with regards to an issue of suspicious activity with an employee. To protect the client, company and subject being investigated the names have been changed – Law Firm X, Company A and Employee B.
Purpose of the Investigation
Law Firm X approached National Private Investigators about the matter of Company A who had some concerns about the conduct and behaviour of Employee B who was at the time seeking promotion within the company to a more senior role. This would mean that Employee B would have access to information not available to all members of staff. Company A concerns were founded upon the behaviour of Employee B in the workplace, political discussions with other members of staff and unexplained absences. Through conversations with Law Firm X and Company A, Charman was able to identify the main issues with Employee B and understood that Company A needed to protect itself from the suspicious activity of Employee B if they were to promote them based on their professional skills.
The clients that approach National Private Investigators will often have concerns within the following themes:
- Not knowing someone’s intentions
- Loosing what they have built
- Being a victim of fraud, theft or a scam
- Being in the middle of a scandal
- Reputational damage
- Espionage
- Whistleblowing
- Internal leaks of information
- Lack of intelligence around key personnel and who the key personnel are influenced by
- They are seeking security and confidence
In this particular case Company A identified a need to investigate Employee B’s online presence to assess potential risks associated with Employee B’s behaviour and associations on the internet, which may impact their suitability for sensitive or high-profile roles within Company A. Understanding the clients needs Charman could then look at the methods of investigation to employ.
How was the matter investigated?
National Private Investigators provide enhanced digital intelligence reports to uncover risks, malicious intentions, and vulnerabilities before they become threats.
The Enhanced Intelligence Reports are different to standard investigation reports because they integrate deep data sources, dark web intelligence, and AI-driven analysis to surpass traditional background checks.
By mapping every aspect of an individual’s online footprint, from data breaches and social media to unknown email addresses and phone numbers, they deliver unmatched clarity and protective foresight for those who can’t afford to be wrong about the people they trust.
Going back to the case study using the Enhance Digital Intelligence Report Charman was able to thoroughly evaluate Employee B’s online activities, identify behaviours or affiliations that posed reputational, legal, and security risks to the company.
Data Collection Methodology
With all methods of investigations there are limitations to what can be collected by the data available at the time and there strict rules that must be adhered to for data protection purposes.
There are three pillars to a digital profile:
- The background check
- An online presence and digital footprint investigation
- AI insights
Together, these give you a complete picture and help the client make decisions with confidence.
Pillar 1 – The Background Check
- ID check, birth, parents and siblings
- Marriage and children
- Address data, ownership, equity and co occupancy
- Telephone, email and username searches
- Corporate links and shareholdings
- Courts searches
- CCJ, IVA, DRO, Bankruptcy, Insolvencies and adverse financial markers
- Company association and group structures
- Social Media
- Adverse media
Pillar 2 – The Online Presence Investigation
This step delves into their online activity, using every clue to uncover hidden information.
- Digital Footprint: A broad overview of their presence.
- Mobile Number/s: Accounts connected to their phone/s.
- Email/s: Accounts and mentions tied to their email addresses.
- Username/s: Profiles linked to their usernames—active, old, and hidden.
- Social Media: Public interactions, connections, and mentions.
- Facial Recognition: Appearances in photos and media.
- Data breaches: Leaked passwords and credentials.
- Dark web: Illegal activity and hidden risks.
- World compliance data base: Overseas compliance and sanctions.
Pillar 3 – AI-powered digital profile delivering insights.
- Behaviour: What motivates them and how they act.
- Personality: Traits shaping their decisions.
- Sentiment: Hidden feelings or intentions that could cause harm.
- Risks: Dangers that could threaten everything you have built.
Data Analysis, Findings and Recommendations
In the National Private Investigators report to Company A regarding Employee B each pillar of the investigation was highlighted and Charman was able to gleam information about the interests and preferences of Employee B and how this dictated his behavioural patterns on line. It was discovered that Employee B’s interactions online were 60% negative concentrating on aggressive political discussion and comments often including hate speech focusing on particular groups of society. Other risks that Employee B posed were the following:
- Unusual behaviour patterns: Employee B exhibited aggressive and confrontational behaviour, especially in political discussions. The frequent use of hate speech and engagement with explicit content were significant concerns.
- Associations with risky entities: Employee B followed and engaged with controversial figures known for promoting extremist views, they were also a member of online groups discussing illegal activities and explicit content.
- Poor digital hygiene: Employee B personal and business emails were found in multiple data breaches, exposing sensitive information and passwords. Employee B usernames were linked to adult content and illegal activities on the dark web.
- Dark web presence: Employee B username “xxxx” was linked to posts advertising hacking services on the dark web, indicating potential involvement in illegal activities.
Charman drew up a risk assessment with key security recommendations for Company A to follow which could feed into how they continue with the employment of this person without any legal ramifications for them or Employee B raise any legal issues.
Risk Assessment
- Enhanced Monitoring: Implement continuous monitoring of Employee B’s online activities to promptly identify and address any concerning behaviour or associations.
- Digital Hygiene Training: Provide comprehensive training on digital hygiene, focusing on secure password practices, recognising phishing attempts, and maintaining a professional online presence.
- Social Media Policies: Enforce strict social media policies to separate personal and professional online activities, ensuring business emails are not used for personal purposes.
- Regular Security Audits: Conduct regular audits of digital security measures to identify and mitigate vulnerabilities. This includes reviewing the security of email accounts and social media profiles.
- Professional Counselling: Offer professional counselling to address Employee B’s concerning behaviour patterns, such as their aggressive online interactions and engagement with hate speech and explicit content.
- Dark Web Monitoring: Continuously monitor dark web activity for any mentions of Employee B’s personal information or involvement in illegal activities. This will help to pre-emptively address any potential security threats.
- Reconsider Onboarding: Given the significant risks identified, it is recommended to reconsider whether to onboard Employee B into a higher role position. The potential reputational, legal, and security risks associated with their online behaviour and associations may outweigh the benefits of their professional skills. A thorough review of suitability for the role should be conducted in light of these findings and possible termination of employment from current role to be considered.
Based on the evidence collected Company A were able to take appropriate legal and disciplinary actions. The intervention also prompted Company A to strengthen their internal policies and oversight mechanisms.
In Summary
This particular case study is typical of some of the investigations that Charman has carried out as part of his work at National Private Investigators but they have investigated everything from £40M crypto scams to corporate embezzlement, from employee theft and corporate espionage to bugging, cyber-attacks, and high-stakes divorce battles. Each case shares a common denominator.
“a person acting with malicious intent”
National Private Investigators Enhanced Digital Profile Reports provide in-depth intelligence on individuals before they can pose a risk to your client’s business, home, or personal life. They go far beyond traditional security backgrounds and compliance checks. They start where others stop. Digital Profiles are designed for clients who demand the highest level of security and discretion giving you or your client total confidence in their circle of trust.
If you require the services of National Private Investigators please get in touch with Jack Charman using the following contact details:
Confidential Enquiry – National Private Investigators
enquiries@nationalprivateinvestigators.co.uk
020 7459 4526 or 07766 762 887
Further Reading
Why High-Profile Clients Need Enhanced Intelligence Reports – Chronicle Law – Your Legal News