Human Resources Investigations
Investigate Inside. Outsiders are not the only ones who can do harm to your business. The greatest cause of risk can come from inside your organisation, where you may not often expect it. Internal investigations are a vital part of a security program. It’s a serious matter when an employee is alleged to be violating company rules. So-called ‘insider threats’ can cause as much damage as thieves outside. These threats come in many different forms.
When questions arise, our analysts will leave no stone unturned. In conducting internal investigations, our team will search through public records, open web sources, social media profiles, legal proceedings, and global news databases to uncover past malicious activity or evidence of present unethical behaviour. Ashtree’s internal investigations provide business leaders with comprehensively analysed facts to enable prompt decision-making and preserve critical evidence for use in a court of law.
Our analysts use custom-built search strings and databases comprising over 26,000 global media sources to screen individuals for any negative references in the press that may suggest a troubling pattern of behaviour.
We screen employees, contractors, or other internal stakeholders through international, federal, state, and county court databases to discover past criminal activity that may represent a red flag. Our analysts consult both public records and open web court documents to verify key information, and will dispatch court runners to review physical records, if necessary.
Ashtree uses intelligence-based research techniques to build full reputational profiles based on data discovered on an individual in the open web. As part of this research, our analysts scour open sources to discover reputational red flags, conflicts of interest, or questionable business/personal relationships.
Our in-house social media investigators use specially-developed search strings and a constellation of industry-leading collection tools to monitor individuals for suspicious behaviour on social media profiles as well as deep/ dark web sources.
For insider threat situations where an investigation may lead to litigation, we’ll forensically capture crucial social media metadata upon request using MD-5 hash for use in a court of law.