Asset Tracing


CCC has been providing high-quality investigation services to clients since 1996. Where the experience of former members of new Scotland Yard’s Computer Crime Unit and Company Fraud Department come to bear. As detectives working at NSY, they were involved with some of the largest and most complex crimes of their times. Where circumstances have dictated, officers worked independently, while being part of a team. That experience remains with those at CCC equally at home, working either independently or as part of a team. The investigations we have undertaken are many and varied, and include the following areas:

  • Asset Tracing
  • Asset Stripping
  • Banking, On-shore & Off-shore
  • Blackmail
  • Company Fraud
  • Computer Forensics
  • Domestic Violence
  • Due Diligence
  • Hostile Takeover
  • Industrial Espionage
  • Intellectual Property (IP Theft)
  • Mergers & Acquisitions
  • Murder
  • Sexual Abuse
  • Share Ownership
  • Shipping Frauds
  • Unauthorised Access to computer networks

We understand how sensitive inquiries of any kind can be to all parties and that badly handled or insensitive investigations can cause more damage than the original incident. All our investigations are undertaken in a considered and controlled manner, where the potential risk to reputation is always at the forefront of our thoughts when making suggestions as to a particular course of action that may be required.

We also appreciate that in many, if not all cases where it may not be possible to conclusively prove that an individual was responsible for an incident. It is just as important to prove they were not responsible. Especially where there is an need for trust between the parties to remain.

Although many of our investigations start with the examination of digital devices. We can also undertake more traditional elements of investigations, such as due diligence or risk assessments. As well as having access to other investigative services that include bespoke qualitative due diligence services internationally, bug sweeps or TSCM (Technical Surveillance Counter-Measures), covert surveillance, vehicle tracking, through a long-standing trusted partner.

For more information on any of our capabilities, please email

Open Source Intelligence OSINT - Computer Crime Consultants

Open Source Intelligence (OSINT)

Open Source Intelligence (OSINT) is the application of information gathering from public sources, which includes the collection, processing and analysis of data. With a view to utilising the results in the best possible way. At CCC, we understand the diversity of data sources and how to apply information identified.

Sources information include databases, published records, patent records and other data available to the public, effectively garnering such information, may require a variety of specialist techniques.

Where sources of information are likely to include social media and there is a possibility that the information could be used for litigation, there is a need to ensure that this information is from a legitimate source, accurate and has been obtained in an acceptable manner, with appropriate records being kept. Simply taking a series of screenshots while taking notes on a site may not be either sound or acceptable. Social media platforms are not designed to be ‘imaged or copied’ using conventional methods. Our tools and techniques meet those needs.

Most intelligence gathering exercises typically fall into the following areas:

  • Corporate
  • Criminal
  • Personal
  • Political

As such, these elements often form part of a case. Whether a fraud investigation, asset tracing enquiry or part of a larger and more comprehensive due diligence exercise. It is a discipline that we have become proficient at priding ourselves on being able to provide bespoke services that concentrate on a client’s specific needs within their specific arenas.

The aggregation of data from a variety of sources exponentially increases value

For more information regarding this service, please email

High value off-shore asset ownership dispute


This case is one of several cases that CCC has been involved, which have certain similarities. Due to the nature of this case, it had been running for several years before CCC became involved and relates to identifying the ultimate beneficial owner of shares in an off-shore company, which controlled significant assets. The true identity of the owner having been shrouded in secrecy, with public records recording nominees companies or directors as having control. Utilising several off-shore nominee companies and trusts, located various well know tax havens around the World.

As with the other cases, this came about with the death of an individual and subsequent disclosure of their will. In which it was claimed that he was the ultimate beneficiary of the assets held by these companies and that were to be distributed to his heirs in accordance with his wishes. This led to a number of legal challenges being made by various individuals, with proceedings taking place in two jurisdictions.

The concealment of the ultimate beneficial owner had provided opportunities for others to make claims that, if successful, would have resulted in the rightful beneficiary losing out.

The estimated value of assets being in the region of $45,000,000 USD.

The dispute had been running for some years with several other unsuccessful investigations having taken place, with disputes and claims continuing, which although it might sound odd, was causing the rightful heirs significant hardship with their own assets being frozen, they were close to destitution.


Having received instructions through the years of legal representatives, we were given access to the data held on two ancient, non-working computers and an old mobile phone. We were also given access to some 45,000 pages of hard copy documentation, comprising large quantities of copied bundles of the same documentation together with a relatively small number of faded facsimiles, telex messages and handwritten notes. All of which related to the deceased with some documentation dating back to 1970.

Using a combination of computer forensics, eDiscovery processes, combined with traditional investigation techniques. We were able to trace the history of the assets, together with documents confirming their purchase by the deceased utilising another nominee company that had been formed prior to the existence of the companies that until now had been at the centre of this investigation.

From this point we were able to track correspondence between various parties in the USA and France who had been corresponding with the deceased through an accommodation address during the 1980s. Enquiries at the accommodation address revealed that the correspondence was forwarded to yet another solicitor based in Paris.

Searches of the data recovered from the computer identified two more firms of solicitors who coincidentally resided at the same address. One had occasionally been used for business activities known to be associated with the deceased. Whilst the other had been used by the deceased as a document store. Two of which were relevant to the investigation:

  • One document being a ‘letter of wishes’ related to a discretionary trust. The assets of which were the shares of the company owning the assets now valued at $45,000,000 USD.
  • The other, a letter relating to the original purchase of those assets for just over $150,000 USD.

Through further investigation, we could also show that those challenging the will had also committed several criminal offences, which if successfully proceeded with would not only invalidate their claim but also potentially bar them from continuing in practice within their current roles.

Say no more, job done!

For more information regarding any of the services associated with this assignment, please email


Scroll to Top