top of page
The Unregulated Surveillance Industry (UK).
A client's requirement for covert surveillance is often based in less than ideal circumstances.
They rightly expect to be provided with a wholly comprehensive and useable product that has been acquired in a manner that does not leave them legally vulnerable.
Compliance, capability and professionalism should not be the 'gold standard', it is the minimum acceptable standard.
We strongly advise clients research thoroughly the investigation company they intend to use prior to disclosing sensitive/private information.
We wholly support mandatory professional affiliation, regulation and a defined legal framework.
Knowledge Centre.
Resource,
Reference,
Discuss.
-
Why choose SIS?Trust is everything. From initial contact through to operational delivery and reporting, clients need to have faith in the professionalism, discretion and capability of those trusted with their sensitive information and confidence in meeting their objectives. We are all, without exception, from highly vetted Government backgrounds where access to secret material was necessary and commonplace. Beyond Government service vetting our staff are subject to Non Disclosure Agreements and routine Disclosure & Barring Service checks; their integrity, experience in handling sensitive information and discretion is beyond question. Our deployment administration is exceptional and wholly comprehensive mirroring that of Government departments ensuring security, integrity, continuity and compliance. Why do we go to these lengths? Client protection. Does this cost more? No, these processes reflect how we manage every deployment regardless of duration or objectives. We do not negotiate service level agreements, offer a lower tier service or sub contract operations. Does this cost more than other comparable established surveillance providers? No, whilst our processes are exceptional, our costs are not. Capability. We attract the highest calibre ex Government surveillance personnel to SIS. We often ask candidates "why us"? The answer is always the same. You provide the level of professionalism, experience, capability and administration demanded in Government service. We know we will be working with professionals from the same background, same extensive training, same exceptional experience. Externally this translates to highly experienced interoperable teams capable of achieving objectives across all spectrums in the most demanding circumstances. Our conventional surveillance and technical surveillance teams include covert method of entry and covert forensic retrieval specialists. Highly trained, professionally accredited, exceptionally experienced with access to the full range of leading edge technologies, they offer Government level capabilities and tactics to the private sector. Our counter surveillance team is led by a former UK diplomat, previously tasked with the security of UK assets abroad. Again, Government level specialist capabilities offered to the private sector by exceptionally experienced personnel. Our protective surveillance team draws heavily on our extensive surveillance support to kidnap and ransom investigations, counter terrorism operations and anti corruption enquiries. Through covert conventional and technical surveillance deployment we identify and assess risk, providing recommendations and mitigation strategies. These deployments can be venue specific utilising our forward intelligence team, covert method of entry team and penetration testing together with our covert behavioural detection capability and behavioural detection Red Team. Alternatively, tailored to meet specific individual requirements, we can assess kidnap/abduction risk, and identify potential integrity, corruption, tiger kidnap and blackmail issues facing families, household staff and existing security arrangements. We are the only UK company professionally accredited and insured to provide a surveillance response to live kidnap investigations. We believe we provide the most comprehensive and professional service available, so too our clients. Partner of London office, international law firm. “SIS provided a highly professional and time sensitive surveillance service in a cost-effective manner. Their preparation and risk assessment were exceptional. They delivered the evidence in a manner which could be used immediately in different aspects of the case. I could trust in their chain of custody and approach to data protection. The team leader demonstrated a high degree of commercial awareness and technical expertise as well as the correct level of empathy for the client’s requirements. Their years of experience and dedication to HM Government service is evident. I would without question recommend SIS to a fellow professional advisor or family office.
-
Is the use of a tracking device illegal ?In the UK we all have a defined legal Right to Privacy (Article 8 ECHR Act 1998) and protection from intrusion amounting to harassment/stalking. That Right is reduced if there is reasonable suspicion of involvement in crime and/or specific other matters. Even so, the surveillance methods used need to be a proportionate response to the matter being investigated and necessary to prove involvement. If the investigation meets this threshold the use of a device providing geographic information only is unlikely to be assessed as a disproportionately intrusive tactic, provided it is only deployed for the time necessary to acquire the required information and does not accrue private information on any other unconnected individual. It is worth highlighting key considerations at this point. The device only provides information on the device (obviously). For example, a car with a tracking device installed reports solely on the movements of the device (car), it does not identify who is using the car. Evidentially this is weak and uncorroborated information. The device will require monitoring, maintaining and retrieval. There are costs attributed to this. Balancing the intelligence requirement against privacy rights, in the absence of specific legislation governing private sector surveillance activity there are a number of interpretations associated with the deployment of tracking devices. Our opinion, based in over twenty years experience of delivering surveillance within a legal framework is tracking devices, when deployed legitimately, accrue far less (private) information than physical surveillance (the deployment of a conventional surveillance team/operatives). The justification threshold within this legal framework for both tactics is the same. In summary, tracking devices can be a useful tactic in building intelligence assessments and in assisting conventional surveillance teams. Used in isolation the information provided by them is uncorroborated, evidentially weak and specific only to the device (not the subject). There are other legal considerations including how the device is deployed and handling the information it provides.
-
Can you provide assistance following a surveillance compromise?Yes, if your previous surveillance provider has encountered problems achieving your objectives we can help. Our teams can mitigate anti surveillance and identify counter surveillance HOWEVER, please consider. Any observations that follow a surveillance compromise will almost certainly only evidence the changes in a subject's behaviour resulting from that compromise and may be unlikely to meet the initial objectives for some time.
-
Do you provide surveillance services by the hour?Our surveillance operatives and teams are only available for daily or weekly tasking. Whilst tasked to a project they are unavailable for further tasking and committed to meeting client objectives. A working day is a consecutive ten hour period within twenty four hours. Teams and operatives often work beyond their working day to meet objectives.
-
Can you get information from mobile phones?Interception of communications is a criminal offence in the UK. This includes opening mail, listening/recording/monitoring phone calls, and accessing unopened voicemail/messages/emails. Business communications monitoring is lawful.
-
What is behavioural detection and why is it so important?Behavioural sciences have been a prominent factor in Government security and surveillance operations for many years. Commercially the uptake has been slow, perhaps through a misunderstanding of the capabilities of detection officers and how their skills in interpreting human interactions within certain environments can provide critical warning of hostile intent, detect and preempt criminal activity and identify hostile reconnaissance. It is also indispensable in providing protective and counter surveillance services. Following a sharp increase in terrorist activity in the UK and specifically the mass casualty attack at Manchester Arena in May 2017, the Terrorism (Protection of Premises) Bill, also known as Martyn's Law is currently before Parliament and likely to become legislation this year (2025). This will place a legal obligation on venues to strengthen the security of public events, take steps to mitigate the impact of a terrorist attack and reduce harm should an attack take place. Prevention and early detection is a key component in keeping the public safe and where professionally trained and experienced behavioural detection officers are an invaluable asset within wider security arrangements. We provide the only Covert Behavioural Detection Officers commercially available in the UK. Their counter terrorism, risk assessment and mitigation experience is substantial. Deploying seamlessly in support of existing security teams they provide a wealth of experience in terrorist methodology, attack planning, contingencies, emergency service responses and interoperability.
-
What is a Behavioural Detection Red Team?Behavioural Detection Red Teams provide venues, premises and retail centres with the necessary opportunity to examine their behavioural detection capability, assess its effectiveness specifically within relevant environments and how this function integrates into existing security arrangements. Where the facility exists to utilise temporary structures such as knife arches or manned security cordons, assessment of where and how these can be used to enhance indications. Behavioural detection will only be as effective as the training undertaken, capability of staff in applying theoretical knowledge gained through that training to real world situations, security processes aligned to rapidly respond to BDO concerns and internal administration processes to record, monitor and evaluate relevant information. Our Behavioural Detection Red Team are the only covert behavioural detection officers (CBDOs) available in the commercial / private sector. Their experience in Counter Terrorism covert operations is substantial. Working with venues we can provide bespoke evaluation opportunities based in real world experience. What does hostile reconnaissance really look like? What behaviours are exhibited by those intent on achieving their aims? What differences are there in terrorist methodology? How will you respond, coordinate resources and mitigate risk when faced with suspected threat? We can help.
bottom of page