Countering International Economic Crime

In response to the growing threat posed by international economic crime, Avisa Partners is equipped to respond to a wide variety of threats: smuggling, product or model counterfeiting, misuse, content piracy (streaming, P2P, DDL, IPTV), software or hardware cracking, fraud, identification, monitoring and providing support for dismantling criminal networks, tracing data leaks, etc.

Criminal activities, due to their operational and sectoral diversity, are impossible to eradicate completely. They are persistent threats that must be mitigated or contained using an array of tools. The topline objective for victims of international economic crime (governments, institutions, companies) is to reduce a critical threat to manageable levels.
Criminal Ecosystem Mapping and Analysis
  • Identifying and analysing ecosystems linked to illicit trafficking: actors, marketplaces and products, intermediaries involved, operating methods, etc.
  • Carrying out in-depth investigations of technical solutions, websites, applications and of anti-fraud, counterfeiting or financing mechanisms
  • Preventing acts of sabotage or destruction of property
  • DetectIng and tracking vendors and scammers on the dark web and in semi-closed communities.
  • Monitoring of terrorist or organized crime threats
  • Mitigating the effect of hostile actions, before, during and after litigation strategies or in the course of implementing physical or technological protections
Denouncing illicit trade
  • Strengthening the technical and commercial protections of rights holders(traceability, enhancing security, and countermeasures)
  • Identifying, questioning, and denouncing the financial beneficiaries of fraudulent activities and evaluating the volumes of illegal business and associated risks (political, economic, health, reputational).
  • Undermining the sense of impunity and deterring both pirates and consumers
  • Disrupting the creation, supply, and distribution of illicit content and its associated financial flows, reducing or exhausting its availability while reducing its visibility and making it more difficult to access
  • Reporting and exposing criminal behaviour
  • Devising and executing public relations strategies to raise official awareness and inculcate a sense of responsibility with the general public
  • Analyzing the practices of opposing parties relating to commercial activities, such as bank fraud, wind-up fraud, etc.
Threat Exposure Assessment
  • Mapping and understanding of hostile ecosystems: identification of entities targeted by activists, controversies, analysis of disinformation or destabilization campaigns
  • Research and monitoring of data leaks published online (clear, deep and dark web), such as databases, credentials, credit card numbers, confidential documents...
  • Audit of the risk exposure of highly exposed persons (members of government or executive committees, shareholders, etc.)
  • Identification and investigation of spoofed sites: real-time monitoring of DNS takeovers and website defacement, cybersquatting, typosquatting