EXITPROTOCOL
Strategic Defense Unit
ATTORNEY WORK PRODUCT
Privileged & Confidential
© 2026 Exit Protocol. Unlawful distribution is strictly prohibited.
Secure Automated Forensic Intelligence

Defense Discovery Checklist

"Amateurs hack systems, professionals hack people, but attorneys hack discovery."

I. The "Silent 5" Document Checklist

Most divorce attorneys request standard tax returns and bank statements. Sophisticated concealers know this. To detect hidden assets, you must demand the following "Silent 5" documents that reveal what the tax returns lie about.

1. IRS Tax Transcripts (Form 4506-T)
Why: Spouses often forge tax returns provided in discovery. They cannot forge the transcript directly from the IRS.
Action: Demand the spouse sign Form 4506-T allowing you to pull the transcript directly.
2. Complete "Tri-Merge" Credit Report
Why: Reveals secret credit cards, lines of credit, or inquiries from lenders for properties you don't know about.
Action: Run a credit check on both parties immediately.
3. Loan Applications (Mortgage/Auto/Business)
Why: The "Liar's Paradox": People minimize income to the spouse (to pay less support) but inflate income to the bank (to get the loan).
Action: Subpoena all loan applications from the last 5 years. Use their "inflated" income against them.
4. Digital Wallet Transaction Logs (CSV)
Why: Venmo, CashApp, PayPal, and Zelle are the new "offshore accounts." They are often used to funnel cash to paramours or crypto on-ramps.
Action: Demand the full transaction history download (.CSV), not just screenshots.
5. Cryptocurrency Exchange "Buy/Sell" History
Why: Bank statements only show the transfer to Coinbase/Binance. They don't show the millions made inside the exchange.
Action: Subpoena the full trade history from any exchange identified in bank records.

II. Forensic Assessment Worksheet

Use this worksheet to identify if you need a full forensic trace.

Red Flag Indicator Investigative Action
Lifestyle Exceeds Income
(Burn rate > Reported Earnings)
Action: Take photos of new luxury items (watches, cars) that don't match the "we're broke" story.
"Business is Bad" suddenly
(Revenue drops pre-filing)
Action: Check if they are telling clients to "pay me next year" or delaying big deals.
High Volume of transfers under $10,000 Action: Look for patterns of $9,000 or $9,500 withdrawals. This is a federal crime if done to hide money.
Encrypted Communication Apps
(Signal, Telegram usage)
Action: Look for "Signal" or "Telegram" notifications on their phone. These are often used for secret conversations.
Payments to "Consultants" or LLCs Action: Google the company names. If they don't have a website or look fake, it's likely a shell company.

III. Asset Tracing Flowchart

Exit Protocol Automated Forensic process.

STEP 1: EVIDENCE COLLECTION
(Bank PDFs, Tax Transcripts, Loan Apps)
STEP 2: OPTICAL CHARACTER RECOGNITION (OCR)
(Convert flat PDF text to digital data)
STEP 3: ALGORITHMIC TRACING (LIBR)
(Replays history day-by-day to separate Marital vs. Separate funds)
STEP 4: ANOMALY DETECTION
(AI flags crypto transfers, structuring, and shell companies)
STEP 5: COURT-READY FORENSIC REPORT
(Admissible Dossier)