Skip to content
icon-world

Stay Informed with Our Latest Updates

Discover our latest offers and insights today!

Key Takeaways on Cyber Investigations.

icon-brain

Background Checks vs Cyber Investigations.


Learn the difference between a complete background check and one of CI's Cyber Investigation searches. One is part of the other!

10:00 - 20:00

icon-search

How A Reporter's Work Becomes Our Evidence.


Discover how the recent article, profile, or news report you created can end up as hiring intelligence for an employer during a background check.

20:00 - 30:00

icon-eye-check

What Social Media Really Reveals.


Social Media Screening is becoming more and more common. Employers need to know how to screen compliantly, or risk seeing something they shouldn't!

35:00 - 45:00

The Julia Smith Social Media Screening Report.


Our AI-powered cyber investigation search, Eagle View, analyzed Julia's complete digital footprint across 7 major platforms. Our comprehensive report provided actionable intelligence that no interview process was going to catch,  which transformed the hiring decision:


🔍 Identity Verification


Confirmed all 7 profiles belonged to Julia Smith through username consistency, location data matching, and workplace verification.


📈 Behavioral Pattern Analysis


Our AI-powered word cloud revealed the contrast between wholesome interests and problematic behavior patterns - showing exactly who Julia is when she thinks no one's watching.


⚖️ Risk Classification


Every flagged post was categorized across 13 behavioral risk classifications,  providing clear, compliant hiring intelligence.


📱 Multi-Platform Intelligence


Analysis spanned Twitter, Reddit, Instagram, Facebook, TikTok, LinkedIn, and Pinterest - because character reveals itself consistently across every digital touchpoint.

This is the power of cyber investigations and Eagle View. Julia's resume was flawless. Her interview was impressive. Her references were stellar. But seven years of unfiltered digital behavior told the truth that no traditional screening could reveal.

CIChecked Julia Sample Report_Page_04

Meet Our Presenters.

headshot-michelle-p@2x


Michelle Pyan
President


30+ years developing NY criminal and cyber investigation search technology.

HW Red Headshot Circle


Heidi Winterble
VP Strategic Alliances


20 years providing practical, compliance focused background check solutions.

AS Red Headshot-modified


Alex Skaine
Marketing Coordinator


4 years turning hiring complexity into practical guidance.

FAQs


Find answers to your most pressing questions about our cyber investigation and social media screening services.

Focus: Identifies potential workplace risks related to online behavior.

Considerations: Must comply with FCRA and EEOC guidelines to avoid bias in hiring decisions.

Recommendation: Use to supplement traditional background checks for brand-sensitive roles.

Contact a CIChecked Background Screening Expert for more information.

Other Services Offered:

  • Deep Web & Dark Web Monitoring: Detects potential security threats from nonpublic sources.
  • Brand & Reputation Management Report: Provides insights into online behavior impacting corporate image.

For more details, visit CIChecked’s Social Media Screening Solutions.

Focus: AI-powered social media analysis that provides compliant screening with risk categorization, sentiment analysis, and word cloud intelligence.

Benefits: Reveals authentic candidate character while filtering out protected class information to prevent discrimination liability.

Considerations: Focuses on behavioral patterns and risk assessment rather than comprehensive content examination across all platforms.

Recommendation: Use for positions requiring cultural fit assessment and character evaluation without legal exposure from manual social media searches.
Focus: Forensic analysis of original social media content with detailed risk classification and timestamped evidence documentation.

Benefits: Identifies unlawful conduct, violent behavior, and intolerance expressions through comprehensive content examination.

Considerations: Provides deep content analysis but requires more time than automated social media screening tools.

Recommendation: Use for sensitive positions involving vulnerable populations, security clearances, or high-trust roles requiring detailed behavioral evidence.
Focus: Comprehensive seven-year digital footprint investigation across search engines, archived sites, and specialized databases with illicit activity scanning.

Benefits: Reveals complete internet history including deleted or archived content that candidates might prefer to keep hidden.

Considerations: Extensive investigation scope requires longer turnaround times and generates substantial intelligence requiring careful evaluation.

Recommendation: Use for executive positions, security-sensitive roles, or when comprehensive digital background intelligence is essential for hiring decisions.
Focus: Targeted cyber investigation using optimized keywords to discover criminal activity in verifiable news sources and police communications.

Benefits: Identifies additional criminal activity for 9-10% of candidates that traditional court database searches miss entirely.

Considerations: Supplements rather than replaces traditional criminal searches; focuses on recent activity and news-covered incidents.

Recommendation: Use as an enhancement to standard criminal background checks for comprehensive criminal intelligence and risk mitigation.
Focus: Academic and professional verification through scholarly publications, peer-reviewed articles, and educational databases.

Benefits: Validates claimed expertise and educational achievements while identifying potential credibility issues through published sources.

Considerations: Most valuable for positions requiring specific expertise, advanced degrees, or professional credentials requiring independent verification.

Recommendation: Use for executive, academic, research, or technical positions where claimed expertise and educational background are critical qualifications.
Focus: Tailored digital intelligence with client-specified search parameters, platforms, and keywords for precise investigation targeting.

Benefits: Provides complete control over investigation scope to focus on specific organizational concerns and industry requirements.

Considerations: Requires upfront planning to identify specific intelligence needs and relevant search parameters for optimal results.

Recommendation: Use when standard cyber investigations don't address specific industry concerns or when unique intelligence requirements demand tailored approaches.