OAKMOREL Forensic Intelligence // ask@oakmorel.com
WHAT OAKMOREL IS forensic · entity · intelligence
Your supplier quotes one price.
Your invoice says another. You've always known.
Now you can prove it.

You're running a business. You have work to do, people to manage, problems that need solving today. Who has time to sit with every invoice against every quote — line by line, item by item, across every order, every month?

Your supplier is counting on that.

◆ The Morel
A morel grows hidden in plain sight. You can walk past it a hundred times and never see it - but you can almost feel it nearby.

Every case we take has one.
Our mission is to find it.
THE OAK AND THE MOREL surface · and · structure
The Oak — Visible
Surface
Scope drift. Items on your invoice with no price ever agreed. The overcharge you and your team caught in the past. You already know what it is. The Oak is real — and it costs you. But it's not what we're after. It's what points us deeper.
The Morel — Hidden
Structure
The substitution pattern. The one character difference in a SKU. The grade that stepped up. The size increment that reads identical in plain language but carries a 6×, 13×, 29× price differential. The single character in a bot review comment that exposes the entire network. The morel is what nobody finds without the instrument we built to find it.

It's rarely the high-ticket items. The morel hides in the small ones — the commodity fittings, the volume line items, the parts that cost a few dollars each. Until you're ordering thousands of them per job cycle. At that scale, a few cents of uplift per unit becomes thousands of dollars per engagement. Added up across years, across jobs, across every supplier relationship you've ever had — the math closes itself.

All of our clients feel it before we show them. Everything looks clean on the surface. They can see the Oak. But they know the morel is there. They can feel it. We point it out — and equip you with the instrument to act on it at your discretion.

DOCUMENTED FINDINGS — ANONYMIZED clients protected · numbers published

Out of respect for clients whose cases involve ongoing renegotiation and potential litigation, we protect identities. What we publish are the numbers. The numbers don't need names.

In our audits we consistently find that more than 75% of line items billed on invoices have no corresponding quoted price. Three out of every four items delivered — no agreed price. Your supplier set that number unilaterally.

But scope drift is just the Oak — the easy part to identify. The deeper finding, the one hidden in plain sight — the morel — is the substitution pattern. The one character in a bot attack comment that goes undetected. The missing link that opens up a new world of findings.

75%+
Line items with no agreed price — unilateral supplier pricing
153
Substitution patterns detected — one supplier, one client
29×
Highest per-unit ratio — $0.87 quoted, $25.31 billed
$125K
Unquoted spend — one client, one supplier, no reference price
⚑ 01
Commodity Fitting — 46 Units
Quoted: standard grade. Invoiced: upgraded grade. Description similarity 99%. Same manufacturer. Different SKU. 46 units ordered. Nobody checked individually. Each one looked fine.
5.97×
price ratio
$518 one line
⚑ 02
Structural Component — $0.87 Quoted
Quoted at $0.87. Invoiced at $25.31. Description 94% identical. Grade and size simultaneously upgraded. Highest per-unit ratio in the dataset. The morel was present from the first invoice.
29.23×
price ratio
highest found
⚑ 03
Pattern Across 8 of 14 Sites
Same substitution logic. Same SKU upgrade path. Appearing across every active job simultaneously. Not a manual error. Structural. The same morel replicated across every engagement with this supplier.
153
patterns total
8 sites hit
◆ 04
Platform Attack — Coordinated Review Network
14 accounts. Sleeper account traced 15 months pre-attack. Template vocabulary fingerprinted across businesses and states. One character difference in a single review comment — the morel that exposed the entire network structure.
37
violations
fully documented
Primary sources · Methodology published · Clients protected Full Case Studies →
HOW IT WORKS intake · extraction · findings · record

One client commissioned us to audit five years back after seeing our initial report. The pattern was present from the first invoice. You didn't build your business by letting money disappear. You just didn't have the instrument to see where it was going.

01
We collect your documents. Quotes, invoices, contracts, screenshots — whatever exists and in whatever format. No specific system required. If the data is there, we work with it.
02
We run the extraction pipeline. Every line item processed, normalized, and compared against every quoted item. SKU matching. Description similarity scoring. Price ratio calculation across the full dataset. Patterns only become visible at scale — that's the instrument.
03
We find the morel. Substitution patterns. Scope drift. Unquoted spend. Direct overcharges. Every finding sourced to the original document with both sides of the comparison visible and traceable.
04
We deliver the record — securely. Every report is encrypted and delivered through an authenticated client portal. You receive a key. Without it the report is unreadable. The findings inside are yours and nobody else's. We take the security of what we find as seriously as we take finding it.
Always Delivered
Baseline Index
A complete recording of reality. Price index, attacker profiles, contract keyword frequency — whatever the case demands. The instrument for everything that follows.
Always Delivered
Anomaly Record
Every finding sourced to its original document. Reproducible methodology. Structured to hold up in renegotiation, mediation, or litigation.
Case Dependent
Action Document
The instrument you use. Quote request document. Supplier confrontation record. Legal-ready evidence package. What you need to act — at your discretion.
WHO THIS IS FOR any business · any industry · any supplier

If your business receives invoices from suppliers — and those invoices were preceded by a quote, a contract, or an agreed price list — there is a gap between what was promised and what was charged. We find it.

The industry doesn't matter. The size of the business doesn't matter. The morel doesn't care about either. It cares about complexity, volume, and the assumption that nobody is checking.

Contractors
Materials suppliers. Equipment rental. Subcontractors. You're managing fourteen things at once on every job. The supplier knows that. The morel lives in the line items you don't have time to verify individually — and it compounds across every job you run.
Bars & Restaurants
Beverage distributors. Food suppliers. Linen and smallwares. You negotiate the price on the things you order every week. The morel is in the things you order once a month — the SKU that changed, the size that stepped up, the line nobody flagged.
Medical & Dental
Supply distributors. Equipment service contracts. Lab billing. The catalog is built to be complex. That complexity is not an accident. It is exactly where the morel hides and exactly why it stays hidden.
Property Management
Maintenance vendors. HVAC. Cleaning. Landscaping. Multi-vendor and multi-site means the same pattern can run simultaneously across every property you manage — and the total never appears on a single invoice.
Manufacturing
Raw materials. Components. MRO. At volume, a fraction of a cent per unit becomes thousands per quarter. The morel doesn't need to be large. It just needs to be consistent and undetected.
Law Firms & Legal Teams
You need a forensic record, not a summary. We build evidence packages structured for renegotiation, mediation, and litigation. Primary sources. Reproducible methodology. Every finding traceable to its document.
First conversation is free Talk To Us →
WHAT WE DO two service lines · one methodology
Service Line 01
Procurement Forensics
Quote vs invoice comparison. SKU substitution detection. Scope drift analysis. Contract compliance auditing. Equipment rental billing review. Subscription and vendor audits. Any industry. Any supplier. If a vendor is billing you — we check the math.
DOCUMENTED: 153 substitution patterns · 14 job sites · $125K unquoted spend · 29× highest ratio found
Service Line 02
Platform Integrity Forensics
Coordinated review attack documentation. Bot network entity profiling. Linguistic fingerprinting across accounts and businesses. Sleeper account detection. Structured evidence records built for legal use. Yelp, Google, any platform.
DOCUMENTED: 14 bot entities · 37 violations · sleeper account active 15 months pre-attack · network confirmed
Full methodology and pricing Services →
THE STANDARD WE HOLD OURSELVES TO methodology · integrity · evidence
Primary sources only. Every finding traces to a document on file — a quote, an invoice, a contract term. We don't cite patterns without showing the data that produced them. Reproducibility is the standard.
We document anomalies. We don't make allegations. The gap between what was quoted and what was billed is the finding. What you do with it — renegotiation, recovery, legal remedy — belongs to you.
Client identities are protected. We operate under NDA for every engagement. Names and suppliers are protected unless explicitly released. Several of our reports have preceded litigation.
Every report is delivered securely. Encrypted. Authenticated. You receive a key. Without it, the report is unreadable. We take cybersecurity-level precautions with everything we produce — because what we find matters.
FIND THE MOREL open for intake
What people say and what people do
are usually two different things.
We find the morel somewhere between them.

Every case has one. Our mission is finding it.

First conversation is free. Let's discover.

OakMorel
OPEN FOR INTAKE
Phone
Email preferred — call available on request
Response
Within 24 hours
First Call
Free
► Request Audit
Tell us what you have. Invoices, quotes, contracts, a platform attack. We'll take a look at it. We want to hear what you believe is happening.
► GET STARTED →
↑↓ Scroll ENTER Select ESC Exit
What entities claim and what they are — two different questions.