Service Line · § 05

Investigation
& monitoring.

When a pattern of infringement deserves a name. Our investigators follow the money, identify operators, prepare dossiers for in-country counsel, and support criminal referrals where the relevant jurisdiction makes them available.

↳ Counsel briefing room — Inner Temple, London
The brief · § 05
A great many infringements end at the takedown. A small number do not. When the same operators reappear month after month — moving domains, shifting hosts, rotating personas — quiet, careful investigation becomes the only proportionate response.
The approach

How the work unfolds in practice.

A cadence designed for clarity, not theatre.

  1. 01

    Pattern recognition

    Atlas surfaces clusters of related infringements: shared infrastructure fingerprints, repeated payment processors, recurring writing styles, common asset folder structures. A human investigator decides if a pattern deserves a case file.

  2. 02

    OSINT and HUMINT

    Open-source intelligence — domain history, certificate transparency, business registry filings, social trail. Where appropriate, our investigators (former intelligence and law-enforcement analysts) make discreet, lawful contact with adjacent sources.

  3. 03

    Operator attribution

    We assemble the picture: who operates what, where the money flows, which company structures shelter the trade. Every claim in the dossier is sourced and footnoted to a primary record.

  4. 04

    Dossier and counsel handover

    The completed dossier is delivered to your General Counsel and, on instruction, to in-country counsel for civil action or to law enforcement for criminal referral. We remain available to support proceedings as factual witnesses.

  5. 05

    Remember the file

    Closed cases remain on a watch list. If the operator resurfaces under a new identity, our investigators will catch the pattern within weeks and the file is reopened — usually without any new instruction from the client.

47
Active investigations
12
Criminal referrals / 2025
9
Civil actions supported
184
Jurisdictions accessible
What's included

Every engagement, in the box.

  • Pattern detection across all monitored surfaces
  • Open-source and lawful HUMINT investigation
  • Operator attribution dossier with primary sources
  • Corporate structure and money-flow analysis
  • Coordination with in-country counsel
  • Support for criminal referrals where available
  • Expert witness availability for proceedings
A worked scenario

An IPTV operator hiding behind seven shell companies

A long-running pirate IPTV portal serving 180,000 paying subscribers had survived four years of takedowns by rotating across thirty-one domains, three hosting providers and seven shell companies in the BVI, Belize and Cyprus. Our quarterly pattern review flagged a unique tracking script common to every iteration of the portal.

Eleven weeks of investigation produced a 142-page dossier identifying the operating principals, their personal social presences, the corporate structures involved, and the payment processors they used. The dossier was handed to in-country counsel in two jurisdictions and to a national broadcasting authority. Civil proceedings followed within four months. The portal has not reappeared.

Read next
Begin

If a pattern of infringement is wearing you down, we will name it.

Most investigations begin with a single conversation about what you have already tried, and what is still happening anyway. We listen carefully and reply candidly.