We offer the following services

Private Individuals

  • Background vetting and profiling of individuals
  • Dynamic assets search
  • ID Verification and authentication
  • Academic diploma verification and authentication
  • Financial investigations and due diligence
  • Forensic Fraud & Criminal Investigations
  • Spousal / Marital and relationship infidelity investigations
  • Sexual harassment and litigation
  • Paternity/DNA forensic investigations
  • Cellphone real time intelligence gathering –  local & international
  • Forensic cellphone activity analysis
  • Border Crossing investigations and reports
  • Data recovery for mobile devices, computers, laptops, cellphones, had drives, usb drives, etc.
  • Cellphone tracking and  location of individuals
  • Retrieval and extraction of deleted data and messages from cell phones and computers (social media, WhatsAp, BBM ect.)
  • Social Media & Internet Investigations
  • Cellphone private number caller identification
  • Forensic early detection of malware/spyware on cellphones, tablets and computers.
  • Missing persons / Locate and track (local and international)
  • Skip tracking and tracing
  • Surveillance / Physical, digital and electronic (video and photographic)
  • Early detection of cyber crimes/internet hacking on cellphones, tablets and computers

Corporates

  • Real time business intelligence (B.I.)
  • Financial investigations
  • ID Verification and authentication
  • Academic diploma verification and authentication
  • Cyber multi  intelligence monitoring
  • Forensic early detection of malware/spyware in cellphones and Tablets
  • Cellphone real time intelligence gathering – local and international
  • Retrieval and extraction of deleted data and messages from cell phones and computers (social media, WhatsAp, BBM ect.)
  • Social Media & Internet Investigations
  • Forensic de-bugging of cellphones, tablets and computers
  • De-bugging Services
    • TESCM – office areas – boardrooms – kitchens & private homes.
    • VoIP lines screen
    • Video conferencing – over VoIP lines (live & PolyCom systems)
    • Telkom line scanning – analogue including fax lines
    • Telkom digital old & new – reception areas and extensions
    • WiFi scan of office areas for illegal signals indicating interception
    • GSM (SIM) scan of office areas for illegal devices
  • Forensic Fraud & Criminal Investigations
  • Dynamic assets search
  • Polygraphy and honesty examinations
  • Tracing and tracking of individuals and assets.
  • Identity and integrity verification
  • Expert Handwriting Analysis
  • Dynamic double scope spider profiling
  • Individual background and lifestyle checks
  • Pre Employment Vetting/Screening
  • CV Authenticity Verification
  • In depth intelligence and due diligence for highly competitive and complex business entities.
  • Counter industrial espionage
  • Risk and vulnerability assessment
  • Surveillance / Physical, digital and electronic (video and photographic)
  • early detection of cyber crimes/internet hacking on cellphones, tablets and computers
  • Border Crossing investigations and reports
  • Internet/Online/Computers/Cellphones/Tablets forensic investigations and data analysis
  • IT forensic and cyber crime investigations
  • Cyber crime analysis, counter hacking, computer hacking and forensic investigations which includes:
    • Complete search of scene and collection of all electronic storage
    • Creation of forensic backup copy of computers
    • Creation of second back up to minimise the risk during investigations
    • Analysis and location of all data/evidence
    • Data recover of all lost or deleted data
    • Decryption of data and tracking of passwords
    • location and analysis of emails
    • determination of internet activities
    • Forensic imaging of computers

Governments, Law Enforcement Agencies and Homeland Security

  • Real time intelligence for multi platforms, see ‘The Chameleon’
  • Retrieval and extraction of deleted data and messages from cell phones and computers (social media, WhatsAp, BBM ect.)
  • Social Media & Internet Investigations
  • Cellphone real time intelligence gathering – local and international
  • Detection of interceptors
  • Forensic Fraud Investigations
  • Polygraphy and honesty examinations
  • Identity and integrity verification
  • Expert Handwriting Analysis
  • Pre Employment Vetting/Screening
  • CV Authenticity Verification
  • Tracing and tracking of individuals and assets
  • Surveillance / Physical, digital and electronic (video and photographic)
  • Dynamic deep profiling of individuals and business entities
  • Cyber multi intelligence remote monitoring
  • Forensic detection of malware/spyware in cellphones and tablets
  • Dynamic assets search
  • ID Verification and authentication
  • Lawful mobile data interception
  • Cellphone tracking and  location of individuals
  • Counter industrial espionage
  • De-bugging Services
    • TESCM – office areas – boardrooms – kitchens & private homes.
    • VoIP lines screen
    • Video conferencing – over VoIP lines (live & PolyCom systems)
    • Telkom line scanning – analogue including fax lines
    • Telkom digital old & new – reception areas and extensions
    • WiFi scan of office areas for illegal signals indicating interception
    • GSM (SIM) scan of office areas for illegal devices
  • Risk and vulnerability assessment – threat assessments
  • Authentication of Academic Diplomas
  • Border Crossing investigations and reports
  • Internet/Online/Computers/Cellphones/Tablets forensic investigations and data analysis
  • IT forensic and cyber crime investigations
  • Cyber crime analysis, counter hacking, computer hacking and forensic investigations which includes:
    • Complete search of scene and collection of all electronic storage
    • Creation of forensic backup copy of computers
    • Creation of second back up to minimise the risk during investigations
    • Analysis and location of all data/evidence
    • Data recover of all lost or deleted data
    • Decryption of data and tracking of passwords
    • location and analysis of emails
    • determination of internet activities
    • Forensic imaging of computers