Financial & Extra-Financial Due Diligence
Due diligence prior to equity stake
A fund evaluates an equity stake in a West African entity. The documents provided are consistent on the surface. We identify actual ownership diverging from declarations, undisclosed beneficial owners, active litigation in a third jurisdiction and capital links to entities under regulatory scrutiny.
Ownership · UBO · Litigation · Capital links
The client withdraws from the engagement and avoids an estimated exposure of EUR 2.4 million — along with major reputational, legal and financial risk.
Due diligenceGovernanceAfrica
Security Monitoring
Weekly Sahel intelligence brief
A businessman operating between Accra and the Sahel region needs a continuous reading of his environment. We set up a weekly report covering Mali, Burkina Faso and Nigeria: security situation, political dynamics, weak signals affecting his operations.
Security situation · Political dynamics · Weak signals · Travel
Concrete recommendations on operations and decisions to defer. Two major incidents anticipated before materialisation.
MonitoringSahelDecision support
Defensive OSINT Audit
Exposure audit for a fundraising executive
An executive in the fundraising phase wants to know what a hostile third party could piece together about them. We map all exposed pivots: personal data, addresses, identifiable assets, professionally and family connections publicly accessible.
Exposed pivots · Identifiable assets · Accessible relationships · Vulnerabilities
Structured report by pivot, risk level per category, remediation plan with opt-out, anonymisation and de-indexing.
ExposureRemediationExecutive
Offensive OSINT Audit
Attacker posture on a crypto CTO
A major crypto-asset holder, also CTO of a Web3 startup valued at EUR 900 million, engages us to adopt the attacker's posture. Objective: measure what a malicious actor can correlate between their civil identity, wallets, visible assets and digital footprint.
Identity/wallet correlation · Visible assets · Social engineering · Physical targeting
Identification of doxxing, extortion and physical targeting vectors. Full hardening of defensive posture.
CryptoWeb3Targeting
Economic Intelligence
Energy market entry in sub-Saharan Africa
A European industrial group is preparing to enter the energy sector in sub-Saharan Africa. We map the full ecosystem: dominant actors, actual decision circuits, regulatory and political dynamics, positioned competitors, reliable intermediaries and anticipated obstacles.
Dominant actors · Decision circuits · Competitors · Regulation
The deliverable identifies credible entry options and the power dynamics to integrate before any commitment.
MappingEnergyAfrica
Information Warfare
Analysis of a narrative pressure sequence
A listed group faces a media pressure sequence built from public facts reframed into a hostile narrative. We deconstruct the mechanics: actors behind the exposure, amplification relays, sequence timeline, impact on governance.
Actors · Amplification · Timeline · Governance
The client has a clear reading of what happened, why, and what counter-posture options are available.
Info warfareReputationCounter-posture