

The following identifies the threat categories we address. This page is intended for principals, their counsel, estate executors, and protection teams considering engagement.

A fabricated video or audio recording attributes statements, conduct, or circumstances to a principal that did not occur. Distribution typically precedes discovery. Custodire establishes forensic provenance, identifies origin infrastructure, and enforces removal across every active distribution point — including secondary platforms and encrypted channels where the material migrates after initial takedown.
Among the most damaging categories of synthetic attack. It follows a cascade model: initial publication, rapid replication, migration to encrypted and dark-web channels beyond the reach of standard platform enforcement. The critical intervention point is before replication reaches secondary platforms. Response is immediate — forensic documentation, platform enforcement, legal escalation, and dark-channel monitoring in parallel, not sequence.
A principal’s voice, likeness, or persona is used to authorise transactions, issue instructions, or conduct communications the principal did not make. The primary vectors are financial — fabricated authorisation calls and wire transfer directives — and reputational, where fabricated statements are attributed to principals in positions of institutional authority. Custodire identifies the infrastructure behind the attack, documents the chain of evidence to evidentiary standard, and supports both criminal prosecution and civil action.
A fabricated statement, instruction, or appearance attributed to a senior military or defence principal can create operational confusion, erode command trust, or trigger diplomatic escalation before verification is established. These attacks are not solely reputational. They may be designed to influence decision-making, disrupt institutional confidence, or exploit moments of geopolitical sensitivity. Custodire establishes forensic provenance, preserves the evidentiary record, and supports rapid verification, containment, and legal escalation where required.
The death of a principal does not extinguish the threat to their identity. Voice and likeness can be reconstructed from publicly available material. The primary harms are commercial exploitation without consent, reputational fabrication affecting the principal’s estate and institution, and personal distress caused to families and close associates. Custodire acts on behalf of families and executors to establish legal standing, preserve the forensic record, and enforce the right of likeness across all active and emerging jurisdictions.
A fabricated call, attributed to a trusted individual, is used to direct financial transfers, disclose sensitive information, or manipulate close associates of the principal. The call sounds authentic. The instruction is not. Custodire verifies, documents, and builds the evidentiary record required for prosecution or civil action — and establishes the verification protocols that prevent the attack from succeeding in the first instance.
An unauthorised digital presence — accounts, profiles, communications, or public statements — attributed to the principal across platforms, forums, and dark channels. Custodire locates all active instances, establishes forensic evidence of construction and distribution, and dismantles the presence at source.
For principals who require coverage before an incident occurs. Persistent surveillance of open, closed, and dark channels. Pre-incident indicators identified and assessed. The threat is surfaced while it is still left of impact — not after the principal has been harmed. This is the foundation of the retainer service.
Synthetic identity attacks follow consequence. The higher the profile, the greater the exposure — and the greater the institutional damage when an attack succeeds.
The primary threat is influence operation fabrication: synthetic video or audio designed to destabilise, trigger a diplomatic incident, or manipulate an electorate. These operations are frequently state-adjacent. Attribution is complex. The evidentiary record must withstand governmental, legal, and international scrutiny.
For counsel: Forensic analysis calibrated to governmental and legal standards. Intelligence-grade confidentiality. Chain-of-custody documentation from discovery.
Synthetic fabrication targeting senior military leadership carries operational consequence beyond the individual principal. Fabricated instructions, statements, or appearances can disrupt command confidence, trigger institutional confusion, or produce diplomatic escalation before verification is established. Attribution is often complex. The evidentiary record must withstand governmental, legal, and allied scrutiny.
For counsel: Forensic analysis calibrated to governmental and defence-adjacent standards. Chain-of-custody documentation from discovery. Confidential handling appropriate to high-consequence principals.
Synthetic fabrication targeting royal principals carries unique institutional risk — constitutional, diplomatic, and reputational simultaneously. The threat extends to deceased members of the household, where synthetic recreation of voice and likeness can misrepresent the institution or cause profound personal distress to families.
For counsel: Institutional NDA framework. Retainer-based coverage calibrated to protocol. Posthumous principal protection for estates and dynastic archives.
Synthetic impersonation of executive principals carries direct financial, regulatory, and reputational consequence. Fabricated instructions, statements, or authorisations can trigger wire transfers, market disruption, board-level instability, or regulatory scrutiny before verification is established. Custodire identifies origin infrastructure, preserves the evidentiary record, and supports legal, regulatory, and internal response.
For counsel: Voice and likeness monitoring. Rapid forensic response. Evidence preserved to the standard required for regulatory and legal proceedings.
Synthetic impersonation of C-suite principals for financial fraud is among the fastest-growing attack categories globally. Fabricated audio authorising wire transfers or acquisitions. Fabricated statements capable of moving markets, destabilising boards, or triggering regulatory scrutiny. The financial exposure is direct. The reputational exposure is compounded.
For counsel: Absolute confidentiality. NDA-first engagement. Discreet resolution without public record where the principal requires it.
Synthetic attacks against performers, athletes, and entertainment principals are typically reputational, commercial, and coercive. Common vectors include fabricated intimate imagery, false statements, voice cloning, impersonation for fraud, and unauthorised synthetic content distributed at speed across platforms and closed channels. Secondary harm is often amplified by publicity, delay, and unmanaged replication.
For counsel: Rapid takedown coordination. Forensic preservation for civil or criminal action. Discreet handling to limit secondary exposure.