methodology


Merrell Strategy solves problems others cannot. Our methods are built on over 15 years as a firm and the decades of specialized experience carried by our core team. We operate through an extensive global network of operatives, investigators, analysts, cyber teams, and strategists, integrating law, intelligence, media, and digital control in ways that create leverage where none exists.

representative case studies


Digital Aggression
Shutting Down a Global Disinformation Empire Case Study

Case Study Brief

Digital Aggression
Online Extortion / Executive & Brand Attack Case Study

Case Study Brief

Corporate - Litigation
Intelligence on Adversaries and the Bench Case Study

Case Study Brief

Litigation
Forensic Investigations and Asset Recovery in Ponzi Scheme Case Study

Corporate
Executive Due Diligence / Background Case Study

Case Study Brief

Personality - Political
Politician Reputation Rescue Before Election Day

Corporate - Executive
Shielding Fortune 500 Leader During #MeToo Claim Case Study

Litigation
Management of Litigation Environment Case Study

Corporate - Litigation
Litigation Analysis -ROI-Assessment Case Study

Personality - Celebrity
Extortion and Viral Smear Campaign Case Study

additional case studies

in the press


Our work reverberates through the headlines without our name attached. Clients we protect have been profiled in:

Merrell Strategy founder, Alexandrea Merrell, has been featured and quoted in coverage surrounding high-profile crises and litigation, when doing so serves the goal of the client. This record of both influence and discretion is the measure of how we operate.

engagement protocol


Every engagement begins in confidence. Merrell Strategy accepts matters selectively, only where our involvement can materially influence the outcome.

To ensure absolute discretion, potential clients are provided with a confidentiality agreement prior to any substantive discussion. This allows counsel, executives, and individuals to share critical details knowing their information is fully protected.

Initiate Contact

All communications are privileged and confidential from the moment of receipt.