Engagement Protocol.
I do not compete on price; I compete on methodology, discretion, and results. When your life or business is on the line, you don't need a budget investigator—you need the person who can actually solve the problem.
01. Triage & Hourly Rates
Case Triage
A highly confidential evaluation to determine if your case is viable, map immediate threats, and outline a potential operation plan.
- Threat containment advice
- Feasibility assessment
- Strictly confidential (NDA ready)
Ad-Hoc Intelligence
For specialized OSINT tasks, background investigations, or specific digital forensics that do not fall under a fixed-fee retainer.
- 10-hour minimum initial retainer
- Real-time intelligence reporting
- Court-admissible evidence logging
24/7 Emergency Response
Immediate, drop-everything response for live ransomware attacks, active extortion, or highly critical data breaches.
- Under 30-minute reaction time
- Direct line to Lead Investigator
- Night / Weekend / Holiday deployment
02. Private Client Operations (B2C)
Stalker Unmasking
Comprehensive tracing of anonymous online harassers, fake accounts, or physical stalkers crossing into the digital realm.
- IP & metadata forensics
- Cross-platform alias correlation
- Physical identity resolution
- Legal handover packet creation
Crypto Theft Tracing
Advanced blockchain forensics to trace stolen Bitcoin, ETH, or stablecoins through mixers and identify exchange exit points.
- Deep blockchain heuristics
- Mixer & cross-chain unpeeling
- Exchange subpoena drafting support
- Success fee only applied if funds are recovered
Account Rescue
Rapid recovery and securing of hijacked critical accounts (Instagram, WhatsApp, Gmail) and removal of hacker backdoors.
- Attacker eviction & session termination
- Bypass of unauthorized 2FA
- Deep account security hardening
- Data leak & dark web check
03. Corporate Incidents (B2B) Enterprise
Incident Commander
Total operational control during a severe cyber crisis. I manage the threat actors, your IT team, and the recovery roadmap.
- Threat actor communication & negotiation
- Network containment strategy
- Malware reverse engineering
- Post-incident hardening plan
Corporate Espionage
Covert investigations into data leaks, rogue employees, or executive digital compromises without alarming the target.
- Covert endpoint forensics
- Dark web market monitoring
- Shadow IT discovery
- Executive digital footprint scrubbing
04. Comprehensive Service Index
| ID | Service Description | Pricing Model | Base Rate / Cost |
|---|---|---|---|
| Personal Operations (B2C) | |||
| // 01 | Cyber Stalker Identification & Unmasking | Project | From €2,500 |
| // 02 | Personal Identity Theft Recovery & Securing | Hourly or Fixed | €250/hr or €1,500 flat |
| // 03 | Social Media Account Rescue & Compromise Remediation | Fixed Fee | €800 |
| // 04 | Online Harassment & Bullying Intervention | Hourly | €250/hr |
| // 05 | Catfishing, Romance & Investment Scam Investigations | Project | From €2,000 |
| // 06 | Missing Persons Digital Footprint Tracking | Retainer | From €3,000 |
| // 07 | Revenge Porn Tracing & Takedown Assistance | Project | From €1,800 |
| // 08 | Cryptocurrency Theft Tracing & Investigation | Base + Success Fee | €1,500 + 10% recovered |
| Corporate Operations (B2B) | |||
| // 09 | Corporate Espionage & Data Theft Investigations | Project | From €5,000 |
| // 10 | Executive Digital Protection & Footprint Scrubbing | Monthly Retainer | €2,500/month |
| // 11 | Brand Impersonation & Phishing Site Takedowns | Per Domain/Asset | €1,200 |
| // 12 | Insider Threat Identification & Evidence Gathering | Hourly | €250/hr |
| // 13 | Advanced Employee Background Checks (Deep OSINT) | Per Subject | €750 |
| // 14 | Vendor & Third-Party Security Due Diligence | Project | From €2,500 |
| // 15 | Mergers & Acquisitions Cyber Risk Audits | Project | From €8,500 |
| // 16 | Financial Fraud Digital Forensics | Hourly | €250/hr |
| Dark Web & Intelligence | |||
| // 17 | Dark Web Credential Leak Monitoring | Monthly Retainer | €500/month |
| // 18 | Deep Web Data Breach Investigations | Project | From €4,000 |
| // 19 | Stolen Asset Tracing on Underground Forums | Hourly | €250/hr |
| // 20 | Threat Actor Profiling & Real-World Unmasking | Project | From €3,500 |
| // 21 | Underground Market Fraud Investigations | Hourly | €250/hr |
| // 22 | Ransomware Group Intelligence & Negotiation Strategy | Project | From €5,000 |
| // 23 | Zero-Day Exploit Chatter & Vulnerability Monitoring | Custom Retainer | Custom Quote |
| Incident Response (IR) | |||
| // 24 | Emergency Ransomware Containment & Recovery | Emergency Rate | €450/hr |
| // 25 | Network Intrusion Forensics (Post-Hack Analysis) | Hourly | €250/hr |
| // 26 | Decryption Key Sourcing & Recovery Guidance | Project | From €3,000 |
| // 27 | Malware Reverse Engineering & Threat Analysis | Specialist Hourly | €350/hr |
| // 28 | Compromised Server, Network & Website Rescue | Hourly | €250/hr |
| // 29 | SOC (Security Operations Center) Surge Support | Contract (Min 40h) | €200/hr |
| // 30 | Post-Incident Security Hardening & Consulting | Project | From €4,500 |
| // 31 | Expert Witness Testimony & Digital Evidence Packaging | Specialist Hourly | €350/hr + Travel |
cat /rules/financial_terms.md
01. Retainers: Investigative work requires immense upfront resources. Standard operations require a 100% upfront retainer. Large corporate operations require a 50% initial deployment fee.
02. No Guaranteed Outcomes: Cyber investigations deal with sophisticated, globally distributed threat actors. I guarantee elite methodology, total dedication, and transparency. I do not guarantee specific outcomes, nor do I offer refunds for dead-end trails. The truth is what the data shows.
03. Legality: I operate strictly within the confines of European and international cyber law. I do not "hack back," deploy offensive malware, or conduct illegal wiretaps. My methods are OSINT, CTI, and defensive forensics. All evidence gathered is legally sound and court-admissible.
04. Confidentiality: Payment structures can be arranged via secure channels (Crypto, Escrow, discreet wire transfers) to ensure client anonymity if required.
EOF