top of page
Compliance logos 050720.jpg

1,397,857

Number of times our FLAG KIT has been triggered since launching in January 2018

updated June 2024

91

Average # of items

Flagged per Report

Flag Kit Categories

Profanity, Drugs, Explicit/Racy, Violence, Extremism, Hate Speech, Bullying, Self Harm and Threats

 

NEW CATEGORY: "Serious Misconduct" influenced by SEC Bylaw 14.1.18 

Ask us about Same Day Processing!

InvestigationG2 Reports are comprised by seasoned Intelligence Analysts using World Class Social Media Screening, Internet Mapping, Artificial Intelligence and Image Recognition technology.

icondidyouknow.png

We utilize the Cyber Investigation Technique called Network Theory, which is based upon the principle of "Show me your friends and I'll show you you're future".

play_media_player_video_button_music_act

Our MOST POPULAR USE-CASES

STAGE 1

Transfers & PSA's

---

Additional Due-Diligence in recruiting

---

ORDERED BY

Compliance

Individual Teams

STAGE 2A

Current Rosters

---

Social Media Awareness and Brand Protection

 

---

ORDERED BY

S-A Development

Lifeskills

Individual Teams

STAGE 2B

Marketing / NIL

---

Players on National Watch Lists

Name/Image/Likeness

---

ORDERED BY

Marketing

Sports Information

Individual Teams

STAGE 3

Rising Seniors

---

Employers & Pro Leagues use similar reports when screening candidates

---

ORDERED BY

S-A Development

Career Services

Individual Teams

HUMAN
RESOURCES

---

New Hires

Promotions

Reassignments

Grad School Apps

Mentors & Tutors

Volunteers

---

ORDERED BY

HR Department

We Proudly serve schools in the following conferences

clients.jpg

References available upon request

NEED A SPEAKER FOR YOUR NEXT EVENT?

Book InvestigationG2's

Founder Steve Kennedy

ssk%20bw%20small_edited.jpg

PRESENTATION TOPIC

Cyber-Investigation TNT! (Technology and Techniques)
 

The internet is written in Ink, not Pencil.  Your historical digital footprint is how people measure your character, which impacts every personal and professional relationship you'll ever have. 

 

Understanding the Technology and Techniques Cyber-Investigators use to paint that picture can help you take control of your personal brand and image.

Attendees will also learn about Federal laws that are designed to protect how your information is discovered and how employers can use it to make hiring, promotion and firing decisions.

NOTE: Each audience member will receive their personal InvestigationG2 report

Book Media Expert

Emily Austen

emily_edited_edited_edited.png

PRESENTATION TOPICS

1) The Power of Social Media

Emily's personal Fall from Grace story features how the hard work invested to reach your Dream Job, can evaporate within 24 hours from a single foolish moment going viral on Social Media.

2) Media Training
Practicing tools on how to conduct yourself in an interview and understanding how to succeed when faced with tough questions from the media.

3) Building Your Brand Online
Lessons on how to use your platform by building a positive image on social media and strategizing a plan to change the narrative after making a public mistake.

NOTE: Each audience member will receive their personal InvestigationG2 report

We proudly volunteer at

ca logo.png
ca puppies.jpg
bottom of page