- Absconder
- Asset Search
- Batch Processing
- Bounty Hunter
- Cell Tower Analysis:
- Credit Header
- Data Aggregator
- Debtor's Exam
- Electronic Surveillance
- Field Investigator
- Geospatial Analysis
- Header Information
- Information Broker
- Judgment Recovery
- Know Your Customer (KYC)
- Pattern Recognition
- Quantum Computing Resistance
- Risk Assessment
- Steganography
- Temporal Analysis
- Underwriting
- VPN (Virtual Private Network)
- Wire Fraud:
- Xerothermic Zone
- Yellow Pages Extraction
- Z Algorithm
- Access Control List (ACL)
- Biometric Authentication
- Cryptanalysis
- Doxing
- Location Intelligence
- Mail Forwarding Search
- National Change of Address (NCOA)
- Open Source Intelligence (OSINT)
- Pinger
- Query
- Repossession
- Social Engineering
- Toll Records
- Utility Records
- Vapor Wake Dogs
- Watchlist Screening
- X-Ref (Cross-Reference)
- Yield Curve Analysis
- Zero-Knowledge Proof
- Address Verification
- Behavioral Analysis
- Covert Surveillance
- Dossier
- Ethical Hacking
- Financial Forensics
- Garbage Collection
- HUMINT (Human Intelligence)
- Interpol
- Jigsaw Identification
- Kinesics
- Latent Data
- Microexpressions
- National Security Letter (NSL)
- Out-of-Band Communication
Sarah M.