Prices
Trust & Transparency

Service Offerings

Hourly Rates; Subscription options are available

Digital Investigation

Online Investigation

Investigations on the surface, deep, & dark web. Common sources of evidence include digital media, social media, government data, professional and academic publications, commercial data, and grey literature.

Forensic Accounting

Forensic Accounting

Audit and investigation to research and evaluate evidential material. Used to detect fraud or money laundering, calculate economic damages, or provide a business valuation.

Digital Reputation Management

Digital Privacy & Reputation Management

Minimize digital online footprint, clean up the online presence, sanitize public records and decrease unwanted exposure. Increase cyber security posture. 

Business Meeting

Fraud Investigation

Interviews, analysis, evidence gathering and vetting, confidential informant development, reporting. 

Private Investigator

Field Investigation

Field investigations, photographic and physical surveillance, DNA collection, interviews, confidential informant development, scene reconstruction, evidence gathering/vetting, and locating missing or estranged persons.

Digital Forensics

Digital Forensics

Imaging of computers, hard disk drives, and other digital storage devices. For large scale eDiscovery collections and analysis, Inquisitive Intel provides multiple pricing models based upon the amount of data, keyword searches, processing and production requirements.

Cyber Security

Cyber Security Phase I & III

- Cyber Risk Assessment

- Configuration Review

- Cyber Insurance Review

- Remediation Plan

- Cyber Security Roadmap

- Technical Review and Reporting

Cryptocurrency Investigation

Cryptocurrency Investigation

Investigation of blockchain activity. Connecting cryptocurrency transactions to real-world entities with cutting edge technology.

Digital Forensics

Cell Phone Extraction

Cell phone extraction & analysis. 

Cyber Security

Cyber Security Phase II

Full authenticated web application security test. Manual testing, AI scanning, internal network scan, external network scan. 

Anti-phishing assessment. Assess open-source intelligence exposure. Identify breached credentials exposed online. 

Download the Official Price List 
Contact Us.

Thanks for submitting!