Corporate Slander Investigation

[ False & Negative Statements ] [ Damage to Businesses, Corporations & Organizations ] [ Evidence Collection ] [ Corporate-Slander-Investigation ]

Corporate Slander

False/negative statements harmful to your business

Corporate slander refers to using untrue statements or other types of disinformation/misinformation, altered data, which the offenders have taken out of context to damage somebody their reputation. Consequently, this will then cause a company to permanently lose money, brand reputation.

In case someone slanders your business, sometimes the business does not need to show the actual harm. The reason for this is that it can be presumed that false-negative statements are indeed harmful to your business. Hence Lawsuits can be filed based on evidence of slander collected. As a victim of slander, you can request a civil action lawsuit.

Damage to your Business, Corporation & Organization

It is normal to get a lot of negative or positive comments as a business, individual or organization. But sometimes negative comments can take the form of hate campaigns or pure gossip. All this can be very damaging to your business.

After all, the spreading of lies and half-truths can be done with the intent to damage a business & company brand its reputation.

Collection of Evidence & Corporate Slander Investigation

Corporate slander can lead to defamation cases. To prove this in court, relevant evidence is needed.

Apart from all the above, we recommend keeping an eye on slander in the workplace. Certainly because if this kind of negative communication can get out of control very fast. If not corrected, you will end up with a very toxic work culture.

Contact us about your specific situation, and allow us to investigate your case to collect evidence that can be used in the court of law.

Criminal Investigations

Corporate Crime

Corporate Investigations

Suspicion of criminal activity

Most official criminal investigations can only be conducted by a law enforcement agency or other relevant authorities.

But if the police do not have enough resources to investigate a potentially criminal act, then the help of a private investigator can be called in.

Private investigators will investigate the suspicion of criminal activity, when the rightful authorities have not filed charges or when the crime remained unsolved.

The questions to ask:

  • was a crime committed?
  • if so; who did, what, how, when, where and why.

Our criminal investigations include:

  • the search for evidence – gathering proof and documentation 
  • conducting interviews with witness, coroners, docters, police, bystanders (in relation to the crime)
  • conduction interrogations is done by the police
  • the evidence is collected and preserved
  • depending on the case other methods of investigation are applied
  • different forensic science investigative technique are used
  • provide support to lawyers to present the evidence in the criminal court of law

 The “indicators of suspicion” in investigations lead to suspects:

  • The motive to commit a crime (money, revenge)
  • The means to commit a crime (tools & capabilities)
  • The opportunity to commit a crime (presence at the crime scene during the time of the offence)

Types of Crimes that we can investigate:

The Process of a Criminal Investigation

  • gather evidence in a legal and professional way
  • crime scene investigation at the place of the crime
  • make or gather crime scene photos & crime scene videos
  • arrest record & criminal records search on the victims and perpetrators
  • assist in establishing an alibi for innocent people (wrongly accused)
  • fix the refute motive
  • assist in locating the real criminal (who might be on the run or hiding somewhere)

Corporate Criminal Investigations & Corporate Crimes

Our AR INTELL Corporate Crime Task Force consists of specialized corporate security professionals . We investigate mostly corporate crimes, torts (wrongful acts or an infringement of certain rights), and different types of contractual breaches.

Corporate crimes & Corporate Investigations mostly refer to:

  • employee fraud
  • job thievery – stealing on the job
  • financial fraud
  • theft of physical property
  • data theft
  • embezzlement of money
  • bribery
  • corruption
  • corporate offenses
  • money laundry
  • forgery of documents
  • commercial bribery
  • compliance investigations – non-compliance with industry standards
  • property destruction
  • breach of ethical code – unethical behavior
  • infringement of fiduciary & other financial duties.
  • accounting improprieties.
  • violation of company policies.
  • privacy rights issues.
  • reporting fraud.
  • internal security & other controls + safeguards
  • information access and information control strategies (CIA principle)
  • insider trading & insider deals
  • cartel forming
  • corporate manslaughter

Criminal Corporate Activity

When you suspect there are criminal corporate activities occurring in your organization or company, then you will need to apply forensic accounting skills, maybe learn how to use a polygraph test (lie detector) and understand the correct arrest & other administrative procedures. The use of digital forensics became also more and more important during the past decades.

Do check our Corporate Fraud Investigations page here.

AR INTELL provides practical and strategic advice to shareholders, corporate executives (at all levels, company officers, security officers, managers, employees or staff in for example financial institutions & multinational corporates.

Over the years we have deloped a keen insight in different industries, and offer an indepth local knowledge and insight into regulatory & legal frameworks, international compliance issues and law enforcement.

Criminal Background Check

Criminal Background Check

Reasons for a Criminal Background Check

A criminal background check is needed to verify if for example an potential employee is reliable, honest. How dow you know if somebody might become a threat to others or even your company? How do you protect your company from lawsuits and other risks due to careless recruitment of the wrong candidates?

This is where the concept of a criminal background check comes into play.

Criminal Background Elements to check

  • misdemaenors
  • felonies
  • undecent behavior
  • assault
  • theft
  • burglary
  • DIU – driving under influence
  • other criminal convictions
  • pending criminal investigations
  • history of incarceration
  • warrants or other violations
  • arrest records
  • arrests that did not lead to convictions
  • drugs abuse
  • alchohol abuse
  • sex offenses
  • murder
  • manslaughter
  • rape case
  • kidnapping
  • arson
  • theft
  • aggravated assault
  • vandalism
  • trespassing
  • public intoxication
  • disorderly conduct
  • prostitution
  • jaywalking
  • littering
  • drinking in public
  • disturbing the peace
  • boating violations
  • building permit violations
  • petty offenses
  • incarceration records
  • court records
  • social security number check
  • financial record check
  • credit record check
  • character references
  • warrants
  • work history

We will check digital records, paper trails (not everything is filed), but in some instances the police or other authorities and entities keep track of certain indicators.

What types of background checks can be done?

There are many scenario’s whereby you might want to check if an applicant has a criminal record of some sort.

  • pre-employment screening
  • educational screening
  • loan application check
  • criminal history check
  • tenant screening
  • childcare background checks for childcare workers
  • gun sales background checks
  • volunteer organization screenings
  • security clearance screenings

Counter Intelligence

Counter Intelligence

Counter-intelligence is synonymous with counter-espionage.

Counterintelligence will try to protect an agency it’s intelligence program from an adversary intelligence service. Counter Intell activities consist of:

  • gathering information on adversaries
  • conducting activities to prevent espionage
  • prevent acts of sabotage
  • prevent assassinations
  • prevent intelligence activities conducted by foreign powers, organizations or private entities

Collective counterintelligence will gain intell into the adversary (the enemy) their intelligence-gathering capabilities.

Defensive counterintelligence will try to disable or hinder efforts by hostile intelligence services to penetrate their own intelligence service.

In general private counterintelligence focuses on identifying and neutralizing ongoing active or passive security threats surrounding or targeting your organization or company.

Counter Surveillance

Counter surveillance refers to measures undertaken by the public to prevent surveillance, including covert surveillance. 

Counter surveillance includes:

  • discovery of electronic methods that are used to monitor your movement or record your conversations and record video, send signals of movement etc…
  • technical surveillance counter-measures
  • detection of hidden or overt surveillance devices
  • detection covert listening devices
  • visual surveillance devices
  • countersurveillance software to detect spyware & malware etc..
  • detect of people accessing computing and mobile devices for various nefarious reasons
  • find indicator of data theft or theft of financial, personal or corporate data and other business secrets
  • deploy actions (countermeasures) to reduce the risk of surveillance
  • Countersurveillance tries prevent or reduce surveillance by the enemy or adversary or unknown entities

Technical surveillance counter-measures

Electronic bugs or spy devices emit electromagnetic radiation (called RF – radio waves on a certain frequency). To detect these bugs you can “sweep” for them with professional TSCM bug sweeping RF detection technology.

Software countermeasures and Cyber Security

As an individual, organization, or company you might have concerns over your privacy relating to premises, conversations, and places where you store your confidential data or conduct private & confidential conversations. How sure are you that your office or meeting places are not bugged with spy devices? Have you checked?

This is why in cybersecurity software countermeasures can prevent all sorts of cyber-intrusions, cyber espionage, data-exfiltration, snooping, and data theft of personally identifiable information (PID). We all use computer systems, we are all connected, hacking is a real threat. Corporate Espionage Operators target regularly proprietary assets, intellectual property, and other business secrets.

AR INTELL Counter Surveillance & Cyber Security Team 

We focus on securing:

  • your communications
  • your privacy
  • your confidential information
  • detection of Invasion of Privacy
  • Interceptions of Communications (who is doing that)
  • Detection of Electronic Eavesdropping

Our methods are hands-on. We use:

  • government-grade equipment
  • diverse cyber security specialists with different backgrounds and vast experience
  • in depth reporting & analysis of the gathered intelligence

AR INTELL provides Counter-Intelligence services to:

Our services include:

Personal Information – Personal Data Protection

investigation personal information protection

How to verify that your personal data – personally identifiable data is not being sold or used without your prior knowledge or permission?


How can you protect (as a company) the PID of your staff and customers?


Which type of PID should you store and how? Are you using encryption?


What are the rules and regulations for collecting and storing PIDs?

Proxy Contest Investigation

investigation proxy contest

What is a proxy contest?

The term “Proxy Contest” refers to a shareholder’s challenge to an action or the control of corporate management accomplished through the solicitation of proxies from other shareholders or stakeholders with effective power. This is also called “proxy fight” or “proxy battle”.

There could be a scenario emerging whereby a powerful group of shareholders in a company will team up and will try to oppose the existing management or vote out the current board of directors. This is a powerplay between the shareholders and corporate management over the control of the company or organization. Sometimes this is part of a hostile takeover.

In case of such a proxy contest occurring, it might need to be investigated why for example shareholders are unsatisfied with the current management, corporate governance, or business decisions.

AR INTELL can assist you discreetly in these matters.

Human Intelligence


Signal Intelligence


Open Source Intelligence

open source intelligence