OAKMOREL Forensic Intelligence // [email protected]
HOW IT WORKS human intuition · engineered pipeline · primary sources

The morel is specifically designed to survive manual review. What we have found — consistently — is that it is sometimes embedded in the supplier's own system. Something their own employees aren't aware of. A pricing rule. A substitution logic. An algorithm that runs automatically and leaves no fingerprints at the line item level.

What exposes it is not a sharper eye. It is a pipeline robust enough to hold thousands of line items in simultaneous comparison — maintaining every pattern from every previous invoice and quote — mapping it across time — and drawing conclusions that trace back to the origin. That is not a manual process. That is an engineered one.

But the pipeline doesn't move first. Human intuition does. Over years of this work we have developed a feel for what we are looking at. The first conversation tells us more than most people expect it to. We listen for what you believe is happening. Then we go find it — or find what's actually there instead.

THE PROCESS intake · hypothesis · extraction · findings · record
01
First Conversation
We start by listening. You tell us what you have and what you believe is happening. We ask a few specific questions. Most clients come in with a feeling — something is off but they can't point to it. That feeling is almost always right. The conversation shapes the hypothesis we walk in with.
02
Document Intake — Primary Sources Only
We start with what you received. The actual documents. Invoices, quotes, contracts, platform data, screenshots — whatever exists, in whatever format. No summaries. No exports. The source. Every finding we produce traces back to a specific document, a specific page, a specific field. If we can't source it, we don't assert it.
03
Extraction Pipeline
Computer vision and AI-assisted document intelligence processes every document against a validated schema. Every line item extracted, normalized, and scored for confidence. Low-confidence extractions are flagged for human verification before they enter the record. Nothing is assumed. Everything is confirmed.
04
Pattern Recognition Across Time
The pipeline holds every line item in simultaneous comparison — SKU matching, description similarity scoring, price ratio calculation — while maintaining the full history of prior invoices and quotes. Patterns that are invisible in a single invoice become undeniable across twelve. This is where the morel surfaces. Not in what changed — in what has been consistent all along.
05
Findings — Sourced and Classified
Every anomaly classified before it enters the record: direct overcharge, substitution pattern, scope drift, contract non-compliance. Both sides of every comparison are visible — what was quoted, what was billed, what the instrument found between them. We document the gap. We do not make allegations. What you do with it belongs to you.
06
Secure Delivery
Every report encrypted and delivered through an authenticated client portal. You receive a personal key. Without it the report is unreadable. We treat what we find with the same seriousness as a sealed evidentiary record — because for several of our clients, that is exactly what it became.
THE MOREL MOMENT the finding behind the finding
◆ What we have learned
The client is usually right.
Just not in the way they expect.
They come in pointing at the oak — the overcharge they can almost see, the invoice that doesn't feel right, the supplier relationship that has been quietly expensive for years. They are correct that something is wrong. What they don't know is that the real finding is underneath it. The morel isn't the overcharge they spotted. The morel is the system that produced it — running automatically, consistently, and in some cases without the supplier's own staff being aware of it. That is what the pipeline finds. That is what the record documents. And that is what changes the entire nature of what the client does next.
PATTERN MAP — LIVE VISUALIZATION simulated · anonymized · illustrative

This is what the pipeline sees. Supplier nodes. Invoice nodes. Line item nodes. Pattern edges connecting them across time. The morel appears as a cluster — a concentration of connections that shouldn't be there. In a manual review it's invisible. At this scale it's undeniable.

◈ PATTERN MAP — ANONYMIZED SIMULATION

Simulated data for illustration. Node types, edge weights, and cluster patterns reflect real engagement structures with all identifying information removed.

THE STANDARD what every engagement is held to
Primary sources only
Every finding traces to a document on file. We don't cite patterns without showing the data that produced them.
Reproducible methodology
A second analyst following the same process against the same documents arrives at the same findings. That is the bar.
Anomalies documented, not alleged
We document the gap between what was agreed and what was charged. Interpretation belongs to you and your counsel.
Client identities protected
Every engagement operates under NDA. Names and suppliers are never released without explicit authorization.
Human verification on every flag
Low-confidence extractions never enter the record unchecked. The pipeline flags. A human confirms.
Encrypted delivery, always
Every report delivered through an authenticated portal with a client-held key. What we find stays found — and stays yours.
OakMorel
OPEN FOR INTAKE
Phone
Email preferred — call available on request
Response
Within 24 hours
First Assessment
Free
► Commission Engagement
Tell us what you have. We'll tell you honestly whether it's worth pursuing.
► GET STARTED →
↑↓ Scroll ENTER Select ESC Exit
The client is usually right — just not in the way they expect.