Records of electronic communications, including emails, phone calls, messaging apps, and social media, capturing metadata such as sender/receiver details and timestamps. Where legally permissible, the content may also be included. These logs can help identify suspicious instructions, insider collusion, or other high-risk interactions among individuals or entities.
Communication Records
Related Techniques
Logs capturing emails, phone calls, and other messaging platforms typically document timestamps, sender/recipient identities, and—in jurisdictions where permissible—content. Analyzing these records can reveal collusive arrangements, instructions to withdraw bids, and other conspiratorial communications consistent with bid manipulation.
- Retains whistleblower reports, employee complaints, and other relevant communications.
- Uncovers potential tips or direct allegations of bribery, supporting investigative follow-up.
- Captures metadata and, where permissible, the content of donor or management communications (emails, calls, messaging apps).
- Discloses unclear or evasive donor instructions, false statements of purpose, or contradictory claims about fund usage.
- Supports investigations by correlating suspect messages with suspicious donation timing or unusual board changes.
- Captures metadata from electronic communications, such as emails, phone calls, and messaging app exchanges, potentially including sender/receiver details and timestamps.
- Identifies possible grooming, recruitment, or coordination activities linked to child exploitation, supporting targeted investigations when illicit financial indicators are present.
Captures audio/video call logs, transcripts, and messaging activity, including timestamps, caller/recipient details, and any recorded content.
Enables comparison of suspected deepfake calls with known legitimate recordings to identify discrepancies in voice, speech patterns, or video artifacts, supporting the detection of impersonation attempts.
- Captures email and messaging logs, revealing suspicious or spoofed instructions to alter vendor payment details.
- Helps detect compromised or impersonated accounts rerouting institutional payments to unauthorized recipients under the guise of legitimate projects.
Logs capture the metadata (and sometimes content, where legally permissible) of electronic communications, including emails, calls, and messages. By reviewing or correlating this data with suspicious transactions, investigators can:
- Identify explicit references to intimidation, threats, or forced payments.
- Uncover direct communications indicating extortion-based fundraising activities.
- Include logs of calls, emails, and messaging app exchanges between recruiters and account holders.
- Can show explicit instructions to use personal accounts for rapid fund transfers and highlight secrecy or urgency demands.
- Support investigations into the nature of recruitment dialogues and financial transaction directives.
- Capture phone call and messaging metadata (e.g., duration, frequency, participants, timestamps) to verify genuine call center operations.
- Reveal inconsistencies if declared large-scale telemarketing revenue does not match actual call volume or communication patterns.
- Includes emails, phone logs, and messaging archives that reveal the frequency and content of communications between investors and the local entity.
- Identifies instances where minimal or no interaction contradicts significant labeled foreign investments, suggesting potentially fictitious arrangements.
- Contains call logs, emails, and messaging app data (where permissible).
- Discloses instructions or coercion related to funnel account usage, as well as contradictory explanations for cross-border transfers.
Logs or metadata of communications, such as emails, phone calls, and messaging app exchanges, can reveal insider collusion, corrupt instructions, or expedited approvals from government officials manipulating the relief program process.
Contains logs of phone calls, emails, or messaging app exchanges where hawala participants might use coded or encrypted instructions to arrange or confirm fund movements, aiding investigations into concealed or suspicious activities.
- Include emails, phone calls, and chat logs where impersonators might provide conflicting identities or refuse further verification.
- Enable the review of communication patterns that reveal deceptive arguments or repeated inconsistencies in customer identification.
- Encompass internal emails, chat messages, and other communications, capturing both metadata and (where permissible) content.
- Expose instructions using coded or informal language to coordinate or conceal questionable transactions or data changes by insiders.
Records from corporate emails, phone calls, and messaging platforms capture metadata such as sender/receiver details, timestamps, and—where legally permissible—message content. These logs can reveal unauthorized sharing of material non-public information, suspicious instructions around market-moving announcements, or collusion among insiders, directly supporting investigations of illicit trading activity.
Captures emails, messages, or calls among fund managers, investors, and other parties. Analysis may uncover explicit collusion or instructions to manipulate investment returns or conceal illicit capital.
Provides transcripts or metadata of calls, messages, and other communications. In the context of knowledge compartmentalization, these records help identify contradictory or limited explanations given by different individuals, revealing deliberately siloed information about transaction purposes or roles.
- Collects metadata from emails, phone calls, and messaging apps, such as sender/receiver details and timestamps.
- Identifies potential coordination or collusion among bettors, players, and officials involved in manipulating match outcomes.
- Assists investigators in uncovering illicit communication patterns related to match-fixing arrangements.
- Captures logs of customer interactions (emails, calls, messages) where permissible by law.
- Documents reluctance or evasiveness in justifying fund origins or offshore transactions.
- Helps investigators correlate suspicious communication patterns with cross-border or secrecy jurisdiction activity.
- Contains logs of emails, phone calls, and messaging app conversations used for alleged recruiting.
- Links suspicious instructions or demands directly to phishing-based job offers, providing critical investigative evidence of money mule solicitations.
- Includes messaging, email, and call logs (and content where permissible) between customers and external parties.
- Reveals romantic or friendly overtures mixed with investment solicitations, a hallmark of pig butchering scams.
- Allows investigators to correlate transaction activity with manipulative communication tactics used by fraudsters.
- Collects metadata (and, where permissible, content) of calls, emails, messages, or social media communications.
- Reveals references to dark web platforms or suspicious discussions related to precursor chemical sourcing.
- Helps correlate communication patterns with financial transactions to detect illicit procurement arrangements.
Encompasses emails, phone call logs, and messaging app data involving professional intermediaries and their clients. Investigators can uncover explicit or implicit instructions to structure transactions, obscure ownership details, or evade AML controls.
- Provides logs of phone calls, emails, or messaging app records that can reveal explicit threats or demands from criminal groups.
- Assists investigators in confirming that recurring payments are coerced under extortion schemes, linking communications to suspicious financial activity.
- Captures electronic messages, phone calls, and social media communications, including metadata (sender, receiver, timestamps).
- Supports the detection of romance mule recruitment by identifying scam-related language, urgent requests for assistance, or scripted instructions from purported romantic partners.
- Provides valuable context for investigators to link suspicious transactions with documented communications referencing money movement under romantic pretenses.
- Contains metadata (sender, receiver, timestamps) of messages and calls; where permissible, may include content.
- Helps uncover coordination of sexual services, negotiation of payments, and distribution of illicit proceeds among traffickers or exploiters.
- Logs communications, including social media messages and phone calls, providing metadata about recruitment instructions.
- Identifies cross-communication among multiple recruited mules.
- Reveals direct instructions to route illicit funds.
This evidence helps tie suspicious activity to specific social media recruiters or networks.
- Includes emails, phone logs, and messaging app records among borrowers, co-lenders, intermediaries, and other relevant parties.
- Helps identify discussions or instructions pointing to collusion, such as agreeing to inflate invoices, bypass due diligence, or conceal beneficial ownership in syndicated trade loan arrangements.
- Enables investigators to trace communication patterns that align with suspected manipulations of trade finance and credit agreements.
- Captures emails, chat messages, and social media communications, including pertinent timestamps and metadata.
- Reveals instances where private keys or wallet credentials are improperly requested under the guise of token sale requirements.
- Uncovers abrupt changes or suspicious instructions in official channels, aligning with common ICO exit scam behaviors.
- Captures metadata (and, where permissible, content) of electronic communications such as emails, phone calls, and messages.
- Verifies whether instruction changes were made solely via email or from suspicious domains.
- Identifies urgent payment requests, domain mismatches, or typosquatting indicative of vendor impersonation.