ACTIVE INTEL
SURVEILLANCE
& SEARCH

INVESTIGATING THE USE OF PERSONAL ELECTRONIC DEVICES

When someone wants to hide something, they delete the data. This information can be recovered, but attempting to do so without the proper training and tools can result in the data being rendered invalid as legal evidence, or even becoming permanently lost. Recover deleted call logs, IM conversations, track movements with geo-tagging.

Gather data from personal computers, including:
Email, Images, Webmail, Internet artifacts, Web history and cache, and Chat sessions.

Nearly any digital source can have evidence on it, including:
Personal desktops and laptops, RAID workstations, Servers, Hard disk drives, RAM, USB / Flash Drives, CD / DVD disks, Smartphones, and Tablets.

Often, data that is important evidence in a digital forensic investigation can exist in a file format you are not equipped to open or process. Because we are data recovery professionals, we are equipped to handle all types of files. This ensures that no evidence is left uncovered during our digital forensic investigations. Evidence can come in any file type, including:

Documents
Images
Email
Webmail
Internet artifacts
Web history and cache
Chat sessions
Compressed files
Backup files
Encrypted files

Contact Us For More Information

How do I begin a case?

All investigations start with a client consultation. You can book a live appointment for a one-on-one video —- with a licensed investigator to discuss your case. We will listen to the details of your specific situation, and describe the various options for investigations.

100% of the consultation fee is credited towards your investigation. Either way, you will get valuable insight as to how an investigation can be performed, and even instructions of what parts of a case you may be able to do on your own.

PRICING OPTIONS:

Remote

$399

Our digital forensics staff attempts recovery of records using remote access technology.

Our electronic device forensics services clearly examine the following sources:

  • Email
  • Images and photos
  • Webmail
  • Internet artifacts
  • Web history and cache
  • Voicemails
  • Chat sessions
  • Map locations
  • Text messages

Shipped

$299

Ship the device to our forensics lab for records analysis and data export to a secure drive.

Our digital forensic services gather data from the following sources:

  • Email
  • Images and photos
  • Webmail
  • Internet artifacts
  • Web history and cache
  • Voicemails
  • Chat sessions
  • Map locations
  • Text messages

Consultation

Inquire

Not sure? Schedule a live video consultation with a licensed investigator to discuss your case.

ENTERPRISE
DUE DILIGENCE

ASSET
RECOVERY

FRAUD & EMBEZZLEMENT RECOVERY

Research of counterparty for aquisiting, merger, or significant proposed contractual relationship. Ensure that the entity has correctly represented its market, licenses, key personnel, financial condition, and reputation.

  • Officers and shareholders
  • Licenses, corporate filings, related entities
  • Prior corporate structure
  • Key vendor interviews covert or disclosed
  • Client and contract verification
  • Market and competitor environment
  • Documentation of sales procedures
  • Identify manner of business dealings

Documentation of assets and possible transfers. Identify changes to asset class and dilution of value. Verification of any increase or decrease to net asset value of the entity or individual. Prepare reporting for seizure or writ of garnishment.

  • Hard assets: Vessels, autos, equipment, aircraft
  • Cash, securities, and real estate
  • Notes due, UCC and receivables
  • Intellectual property, trademarks, copyrights
  • Business holdings, equity, and beneficial interests
  • Hidden assets and those vested in other names
  • Third party responsibility, accountants, agents
  • Compare historical snapshots of asset values

Identity internal losses incurred through embezzlement or diversion of company assets. Document the means of theft, the entirety of the parties involved, and the location of the fraudulently lost assets. Present the overview of theft enterprise and scope.

  • Investigate internal and outside involvement
  • Analyze ghost vendors and payment validity
  • Theft of inventory, cash, clients, and sales revenue
  • Bribes and extortion
  • Organized schemes of theft, and individual larceny
  • Financial fraud, bookkeeping & accounting, billing
  • Cargo and supply diversion
  • Financial statement manipulation

REPORTING AND PRODUCTION METHODS

• Records Intake & Review
• Data Research
• Extraction Algorithm
• Financial Records
• Witness Interviews
• Subject Observation
• Activity Monitoring
• Message Forensics
• Data Mining Program
• Legal Records
• ESI Processing
• Electronic Preservation
• Structured Data Breakdown
• Voice and Image Files
• Non-Public Records
• Family and Associates
• 3rd Party Retained Records
• Public Sector Filing Verification

ELECTRONIC
SURVEILLANCE

PRIVATE
INVESTIGATIONS

DATA
RESEARCH

COUNTER
SURVEILLANCE