FIELD METHODOLOGY

How a case becomes a recovery.

Six investigative phases. Forensic discipline. No “guaranteed recovery” promises — only verifiable trail.

PHASE 1

Encrypted Intake

Case opened over TLS. Statement, wallet addresses, transaction hashes, broker references, supporting evidence — all stored in our case bureau under a unique GEI-YYYYMMDD-XXXXXX identifier.

PHASE 2

Chain Triangulation

Funds traced across the relevant chain — Bitcoin (legacy + bech32), Ethereum and EVM forks (Polygon, BNB, Avalanche, Arbitrum, Base), Tron, Solana — through bridges, mixers, and CEX deposit addresses.

PHASE 3

Subject Verification

Suspect addresses cross-referenced against our open-inquiry database (9,000+ broker case files), known mixer signatures, OFAC SDN list, and partner threat-intel feeds.

PHASE 4

Liaison Coordination

Where funds reach a regulated counterparty (CEX, custodian, fiat off-ramp), we coordinate freeze requests, evidence packages, and law-enforcement liaison through the appropriate jurisdiction.

PHASE 5

Recovery Negotiation

Where a recovery channel is open — exchange-level reversal, civil claim, or counterparty negotiation — our recovery officer leads. Always with verifiable evidence chain.

PHASE 6

Funds Returned

Recovered assets transferred to a wallet you control or a regulated custodian of your choice. Full case ledger and trace report provided. No fee until funds are returned.

WHAT WE INVESTIGATE

The case types we open.

  • Fake “trading platform” / boiler-room broker fraud
  • Romance scams (pig-butchering / sha zhu pan)
  • Fake recovery agents (secondary scams)
  • Rug-pull token launches and rogue smart contracts
  • Phishing-drained hot wallets (browser extension exploits)
  • Compromised exchange accounts (SIM-swap, credential theft)
  • Investment-club / “VIP signal” group seizures
  • Lost seed phrase recovery (forensic, not brute-force)

Ready to open a case?

A field investigator reviews every intake within 24 hours.

Open a Case