Mini Target Analysis - Desktop Investigation

A mini target analysis is an expedited preliminary desktop investigation and analysis conducted for the purpose of making a quick, educated and informed decision when conducting internal or external investigations. They are often described as a point whereby a field investigator can begin to plan an investigation after obtaining a baseline of information, proving to be a valuable tool to assist staff determine the direction for further investigation.

Most investigative inquiries commence as Desktop Investigations and we aim to uncover as much information as quickly as possible. Our mini target analysis profile typically services our insurance clients who are looking to obtain preliminary information about potentially fraudulent activity. This package provides a basic overview of the target’s online presence, Australian business interests and property holdings. This acts as an ideal starting point for any investigation to reduce costs and determine if a comprehensive profile is necessary.

What is the benefit of conducting a preliminary desktop investigation?

  • Quickly assessing risk


  • Providing prompt identification of base level information


  • Delivering the information to investigators rapidly


  • Obtaining a broad overview of the person of interest and possible locations


  • Accelerating decision making

What services are provided?

  • Business Interests


  • Open Source and Social Media Presence


  • Current and Previous Property Holdings


  • Skip Trace
Note: Most of the above listed checks will require you obtaining permission from the applicant prior to you submitting a request to us. The permission is to protect the individuals right to privacy and is essential for a number of reasons including being able to conduct various checks using their personal information, disclosing their personal information (name, dob etc) to a third party, and also disseminating the results to a third party and for you to also view the completed checks. For these kinds of requests, generally permission will be obtained when the applicant signs an insurance policy agreement at the commencement of their engagement with your company. A copy of this section provided to us, in most cases will be sufficient. Please seek the guidance from your legal department in relation to correct company policy and procedures.
1. Submit your request online

Submit your request via our website.

2. We confirm the Applicants identity

Using only trusted government databases we confirm the applicants identity.

3. We conduct the research and analysis

Our analysts work their magic by conducting analysis across a range of services to get you the answers you need.

4. You receive the results in your inbox

All of our findings are populated into an easy to read, comprehensive report and emailed directly to you.

How do we confirm the applicants identity?

In May 2017 the Federal Government officially announced that the Digital Transformation Agency (DTA) provided an opportunity for all jurisdictions, and businesses, to finally create a national interoperable digital identity framework.

How does Intelligence Studio verify an applicants Identity?
A potential employee, babysitter or tenant will receive a notification from Intelligence Studio informing them of your request and outlining the process which involves the online verification of their identification. 

The applicant will then be required to verify a trusted form of identification, usually in the form of an Australian passport and an Australian drivers licence, before being requested to conduct a ‘liveness check’ using the camera on their mobile device or laptop. This information is the verified against government databases and the photograph on the identification is compared with the photograph obtained by this process.

Our identity provider will then inform us of the results in seconds so that you can be sure the applicant is who they say they are and adds another level of security and peace of mind to our customers.

This simple but important process addresses the growing levels of ‘identity friction’ that has become an unnecessary burden and cost in conducting what should be straightforward transactions whilst still being able to combat identity fraud and security vulnerabilities in application processes.

Need more Information? Visit https://www.idmatch.gov.au

TDIF Accredited

Digital iD™ is the first non-government provider to be accredited under the Australian Government’s Trusted Digital Identity Framework.

ISM Compliance

Digital iD™ is accredited under the Australian Government Information Security Manual (ISM).

OAuth 2.0

OAuth 2.0 is the current universal standard of online security when it comes to safeguarding your customers’ credentials.