By the time counsel engages an investigations firm, the trail is already cold. A judgment debtor has had weeks, often months, to restructure. The question is not whether assets still exist. The question is whether the structure can be reconstructed to a standard a civil court will accept.
This brief documents the approach Coldstorm takes on high-stakes asset tracing engagements in Switzerland, the UK, and offshore jurisdictions. It is written for instructing solicitors, in-house counsel, and trustees who have commissioned this kind of work before, and who want to understand what we do in the first 72 hours before they instruct us.
The 72-Hour Window
Speed in the opening phase is not about performing urgency. It is about capturing public-record snapshots before they change. Corporate registries update on predictable cadences. Nominee directors resign. Properties transfer. In several recent matters, a significant beneficial ownership change was filed within two weeks of the underlying dispute becoming public.
Our first 72 hours typically cover three parallel workstreams: a subject scope, a structural scope, and a preservation scope. Nothing attributive is concluded in this window. What we produce is a working map and a preservation list for counsel's consideration.
We do not issue attribution opinions based on 72-hour data. The window exists to lock in what might otherwise disappear, not to draft exhibits. Counsel occasionally presses for early conclusions. We decline.
Reading the Structure
Offshore asset concealment in 2026 is less about secrecy jurisdictions and more about structural complexity. Each layer is individually defensible. The story lives in the sequence, the timing, and the counterparty overlap between the layers.
Swiss AGs and the Beneficial Interest Gap
A Swiss Aktiengesellschaft discloses its shareholders in a non-public register. FINMA's 2024 revisions to the Due Diligence Ordinance narrowed some exemptions, but the beneficial interest behind bearer-share equivalents and fiduciary holdings remains thinly documented in the commercial register.
Practitioners should read Swiss AG filings alongside FINMA intermediary disclosures and, where a bank relationship exists, counsel-led disclosure requests under the Swiss Lugano framework. One source alone is rarely sufficient.
BVI Private Registers
The BVI Beneficial Ownership Secure Search System (BOSS) is queryable only by competent authorities. For private practitioners, the productive path is triangulation: bank statements, registered-agent subpoenas under Norwich Pharmacal-style orders, and cross-jurisdictional disclosure from related-party filings in the UK, the Cayman Islands, and Luxembourg.
Luxembourg SOPARFI Layers
Luxembourg's RBE (Registre des Bénéficiaires Effectifs) is partially public, but SOPARFI holding structures frequently nominate a secondary beneficial owner at a 25% threshold that intentionally disperses the beneficial interest below the reporting line. These cases resolve through the counterparty mesh, not through the register itself.
The story lives in the sequence, the timing, and the counterparty overlap. M. Volcy · Principal Investigator
Data Sources That Hold Up
Practitioners sometimes treat "open-source intelligence" as a single bucket. It is not. For court-admissible work, we separate sources into four tiers based on evidentiary weight and repeatability:
| Tier | Source Type | Typical Use | Admissibility |
|---|---|---|---|
| 01 | Official registries, court records | Foundational attribution | HIGH |
| 02 | Regulated intermediary disclosures | Beneficial ownership confirmation | HIGH |
| 03 | Commercial datasets, property records | Asset mapping, comp analysis | MODERATE |
| 04 | Open web, social, archival snapshots | Corroboration, signal only | LOW |
Any finding that carries weight in an expert exhibit rests on Tier 01 or Tier 02 foundations. Tier 03 corroborates. Tier 04 never stands alone.
Building the Audit Trail
Counsel instructing investigations often assume that the audit trail is something the firm produces at the end, alongside the report. It is not. The audit trail is built with every query, every retrieval, and every timestamped snapshot. The report is a summary of the trail, not its origin.
We maintain, for every engagement:
- A cryptographically hashed retrieval log for every document.
- Originating IP, method, and authentication basis for every registry query.
- A change-record ledger for every publicly available fact we observed moving during the engagement.
- A second-analyst review checkpoint at 33%, 66%, and pre-delivery.
The objective is a report that can withstand three layers of scrutiny: opposing counsel, a cross-examining expert, and the court itself.
What Gets Concealed, In Practice
Across 100+ completed engagements, a working taxonomy of concealment has emerged. Patterns vary by wealth bracket and jurisdiction, but the recurring categories remain consistent.
- Marine assets , yachts flagged under Cayman or Marshall Islands registries, held through single-purpose BVI companies, chartered back to related-party operators.
- Residential real estate , UK and Swiss properties acquired by Luxembourg SPVs, financed via internal intra-group loans that net to zero.
- Private equity positions , carried interest parked in Jersey discretionary trusts with family foundation protectors.
- Bullion and art , held in Swiss or Singaporean freeports, often without formal transfer records outside vault documentation.
- Cash-equivalent instruments , structured notes, private credit positions, and directly-held bonds routed through nominee custodians.
Concealment methods involving regulated intermediaries create touchpoints that can be compelled through counsel-led disclosure. Concealment methods that avoid intermediaries (freeports, physical storage, bearer-equivalent instruments) require a different evidentiary strategy. Do not confuse the two.
When Civil Recovery Becomes Criminal Referral
Most of our work sits in the civil recovery lane. But in roughly 15% of engagements, facts surface that an investigator is professionally obliged to consider for referral. The thresholds differ by jurisdiction, the retaining party, and the underlying engagement terms. A responsible firm maintains a clear protocol for how these moments are flagged to counsel.
Our standard practice: any indicator triggering a reasonable-suspicion threshold is flagged to instructing counsel within 24 hours, in writing. The referral decision remains with the retaining party. We do not initiate third-party disclosures without instruction.
Key Takeaways for Counsel
- Engage in the first 72 hours. Registry snapshots are perishable.
- Match source tier to evidentiary weight. Tier 04 never stands alone.
- The audit trail is built during the investigation, not after.
- Structural complexity is not the same as secrecy. Read the overlap, not just the layer.
- Protocols for civil-to-criminal escalation must exist before the escalation arises.
If this brief reflects work you are currently scoping, the fastest path is a 20-minute scoping conversation with our intake team. Confidential, no-obligation, and instructed under privilege where counsel chooses.