Money moves around the world today with great speed and efficiency. These advancements in technology and communications have also dramatically increased opportunities for malefactors to abscond with or hide ownership of money and other liquid or nonliquid assets. K2 Intelligence professionals have decades of accumulated experience in asset searches and in tracing and recovering assets. Ours is a global practice with assignments ranging from internal corporate fraud, to high-profile misappropriation by individuals, to the misappropriation of assets by government officials.
We combine traditional asset recovery methods—following paper trails, reviewing current assets, and interviewing connected parties—with new technology adapted from the intelligence service to uncover sophisticated embezzlement schemes, identify key relationships, and maximize the likelihood of recovery.
Over a period of decades, our asset search investigations have provided critical intelligence in a wide range of circumstances, including securing the return of misappropriated assets, identifying and securing assets to satisfy a post-judgment award, and informing the determination of whether or not litigation is viable in the first instance.
Our approach includes:
- Tracing and recovery of misappropriated assets.
- Uncovering complex international asset misappropriation schemes.
- Unraveling complex offshore structures designed to hide the beneficial ownership of assets.
- Supporting legal activities to freeze and embargo assets and pierce the corporate veil.
- The ethical and careful use of public records research, field investigations, surveillance, and investigative interviews to develop information.
- Analysis of relationships and evaluation of employees’ access to and misuse of sensitive information and other corporate resources.
- Use of sophisticated analytic technology to assist in the identification of patterns and relationships across massive data sets.
- Forensic accounting of financial statement fraud.
- Reconstruction and identification of key events, central malefactors, and their support networks.
- Design and implementation of programs to prevent new instances of fraud or theft.