Cyber Crime Investigations

Misuse of trademarks and other means of identification can lead to significant financial losses and threatens the reputation of the company. It is, therefore, extremely important to take timely and competent measures for identification, prevention, suppression and disclosure of crimes related to production of illegal software copies.

Issues You are Facing

Our Solution


Расследование случаев
Электронного пиратства

What we Offer

During private investigation of illegal use of software, our detectives are able to quickly collect enough evidence to prove the facts of infringement of the customer’s intellectual property rights.

Operational detection of counterfeit software involves finding of such identification signs which do not require special equipment for their detection but allow to determine methods of counterfeit goods manufacture and obtain the opinion on the possibility of conducting of an expert research.

When planning this type of investigation, we consider three ways of identifying counterfeit goods which are conventionally divided into the signs of the first, second and third types.   

1. Primary characteristics include:

2.  Secondary characteristics of counterfeit software (universal password, instructions for modifying the software code, absence of Russian translation, indication of the author’s setting or installation) are defined during the test purchase and at review of the contents of physical data storage device on computer screen.

3.  Characteristics of the third type of counterfeit software are identified through analysis of electronic documents received from the computer of the alleged infringer when performing a test purchase.

As a result you will get

Upon completion of the private investigation, the detective sends a written report with attached documents and other evidence.