Never heard of us?
Great!
The covert enquiries we undertake on behalf of our clients are exceptionally varied, highly confidential and rarely disclosed.
We are Specialist Investigative Support
We covertly support a wide variety of investigations including,
-
Kidnap / Abduction
-
Blackmail
-
Extortion
-
Corruption
-
Fraud
-
Theft
-
Intellectual Property theft
-
Evidential test purchase operations
-
Fraudulent insurance claims
-
Confidentiality issues & data breaching
And provide specialist intelligence collection capabilities that include,
-
Protective surveillance
-
Covert Behavioural Detection
-
Forward intelligence teams
-
Counter surveillance
-
Integrity testing
-
Locate / trace enquiries
-
Detailed OSINT reporting
-
Analytical and research reports
-
Asset identification & tracking
-
Behavioural detection
-
Penetration testing
Litigation Support
When there is a need to establish fact and credible information we have been providing oral and written evidence based on our investigations and observations for over thirty years. Our processes for conducting covert surveillance in the private sector mirror the justification thresholds necessary to provide a thoroughly comprehensive surveillance product that withstands the strongest scrutiny supporting legal disclosure obligations.
We are ICO registered and UKGDPR / DPA compliant.
We provide,
-
Contemporaneously recorded observation logs for every deployment.
-
Sec 9 witness statements.
-
Cross referenced exhibits and associated surveillance product.
-
Forensic copying of all surveillance imagery and recordings.
-
Evidential continuity of all exhibits and surveillance product.
-
Extensive experience in providing surveillance evidence.
-
Scheduling of all used, unused and sensitive material.
Our professional experience in this field is extensive, professionally accredited and fully insured.
Supporting hostage negotiators our kidnap team,
-
Covertly deploys into environments controlled by the hostage takers,
-
Identifies the stronghold through specialist conventional and technical surveillance,
-
Assists in confirmation of Proof of Life,
-
Provides technical assistance and covert protective surveillance supporting courier deployments,
-
Provides conventional and technical control of couriers and courier specific items/locations.
-
Identifies the hostage takers.
Kidnap and Ransom