We offer the following services
Private Individuals
- Background vetting and profiling of individuals
- Dynamic assets search
- ID Verification and authentication
- Academic diploma verification and authentication
- Financial investigations and due diligence
- Forensic Fraud & Criminal Investigations
- Spousal / Marital and relationship infidelity investigations
- Sexual harassment and litigation
- Paternity/DNA forensic investigations
- Cellphone real time intelligence gathering – local & international
- Forensic cellphone activity analysis
- Border Crossing investigations and reports
- Data recovery for mobile devices, computers, laptops, cellphones, had drives, usb drives, etc.
- Cellphone tracking and location of individuals
- Retrieval and extraction of deleted data and messages from cell phones and computers (social media, WhatsAp, BBM ect.)
- Social Media & Internet Investigations
- Cellphone private number caller identification
- Forensic early detection of malware/spyware on cellphones, tablets and computers.
- Missing persons / Locate and track (local and international)
- Skip tracking and tracing
- Surveillance / Physical, digital and electronic (video and photographic)
- Early detection of cyber crimes/internet hacking on cellphones, tablets and computers
Corporates
- Real time business intelligence (B.I.)
- Financial investigations
- ID Verification and authentication
- Academic diploma verification and authentication
- Cyber multi intelligence monitoring
- Forensic early detection of malware/spyware in cellphones and Tablets
- Cellphone real time intelligence gathering – local and international
- Retrieval and extraction of deleted data and messages from cell phones and computers (social media, WhatsAp, BBM ect.)
- Social Media & Internet Investigations
- Forensic de-bugging of cellphones, tablets and computers
- De-bugging Services
- TESCM – office areas – boardrooms – kitchens & private homes.
- VoIP lines screen
- Video conferencing – over VoIP lines (live & PolyCom systems)
- Telkom line scanning – analogue including fax lines
- Telkom digital old & new – reception areas and extensions
- WiFi scan of office areas for illegal signals indicating interception
- GSM (SIM) scan of office areas for illegal devices
- Forensic Fraud & Criminal Investigations
- Dynamic assets search
- Polygraphy and honesty examinations
- Tracing and tracking of individuals and assets.
- Identity and integrity verification
- Expert Handwriting Analysis
- Dynamic double scope spider profiling
- Individual background and lifestyle checks
- Pre Employment Vetting/Screening
- CV Authenticity Verification
- In depth intelligence and due diligence for highly competitive and complex business entities.
- Counter industrial espionage
- Risk and vulnerability assessment
- Surveillance / Physical, digital and electronic (video and photographic)
- early detection of cyber crimes/internet hacking on cellphones, tablets and computers
- Border Crossing investigations and reports
- Internet/Online/Computers/Cellphones/Tablets forensic investigations and data analysis
- IT forensic and cyber crime investigations
- Cyber crime analysis, counter hacking, computer hacking and forensic investigations which includes:
- Complete search of scene and collection of all electronic storage
- Creation of forensic backup copy of computers
- Creation of second back up to minimise the risk during investigations
- Analysis and location of all data/evidence
- Data recover of all lost or deleted data
- Decryption of data and tracking of passwords
- location and analysis of emails
- determination of internet activities
- Forensic imaging of computers
Governments, Law Enforcement Agencies and Homeland Security
- Real time intelligence for multi platforms, see ‘The Chameleon’
- Retrieval and extraction of deleted data and messages from cell phones and computers (social media, WhatsAp, BBM ect.)
- Social Media & Internet Investigations
- Cellphone real time intelligence gathering – local and international
- Detection of interceptors
- Forensic Fraud Investigations
- Polygraphy and honesty examinations
- Identity and integrity verification
- Expert Handwriting Analysis
- Pre Employment Vetting/Screening
- CV Authenticity Verification
- Tracing and tracking of individuals and assets
- Surveillance / Physical, digital and electronic (video and photographic)
- Dynamic deep profiling of individuals and business entities
- Cyber multi intelligence remote monitoring
- Forensic detection of malware/spyware in cellphones and tablets
- Dynamic assets search
- ID Verification and authentication
- Lawful mobile data interception
- Cellphone tracking and location of individuals
- Counter industrial espionage
- De-bugging Services
- TESCM – office areas – boardrooms – kitchens & private homes.
- VoIP lines screen
- Video conferencing – over VoIP lines (live & PolyCom systems)
- Telkom line scanning – analogue including fax lines
- Telkom digital old & new – reception areas and extensions
- WiFi scan of office areas for illegal signals indicating interception
- GSM (SIM) scan of office areas for illegal devices
- Risk and vulnerability assessment – threat assessments
- Authentication of Academic Diplomas
- Border Crossing investigations and reports
- Internet/Online/Computers/Cellphones/Tablets forensic investigations and data analysis
- IT forensic and cyber crime investigations
- Cyber crime analysis, counter hacking, computer hacking and forensic investigations which includes:
- Complete search of scene and collection of all electronic storage
- Creation of forensic backup copy of computers
- Creation of second back up to minimise the risk during investigations
- Analysis and location of all data/evidence
- Data recover of all lost or deleted data
- Decryption of data and tracking of passwords
- location and analysis of emails
- determination of internet activities
- Forensic imaging of computers