We provide a range of business intelligence including commercial and legal due diligence, background checks, counter and background intelligence. We provide the necessary information to proceed, confidently, being able to bridge cultural gaps, and place assignments in context. Our services include due diligence on companies, executive screening and vetting of teams, and background checks. We also provide competitive intelligence, and are particularly strong in emerging markets, where new opportunities need to be carefully weighed up against tough operating conditions and high potential risks.
a) Monitoring Location and Travel
Continuous monitoring of people, groups of people, buildings, facilities or specific areas, including the monitoring of their movements and actions.b) Vehicle and Container location tracking
Attachment of tracking devices of Vehicles and Containers including real-time tracking on electronic maps and recording of all movements.c) Object and Communication Surveillance
Full Surveillance Services on buildings, facilities, moving targets and all acoustic and electronic communication within a defined area or infrastructure, including mobile, satellite and ground communication.Right information leads to wiser investment decisions and better long term partnerships.
We carefully tailor information and carry out efficient and thorough investigations covering three main categories:
a) Location Preparation/ Location Maintenance
Sweeping or “technologizing” any location before and after events or occupation (hotel rooms, meeting rooms, etc.) to remove listening and other recording devices (cameras, etc.) or planting them for recordings.
b) Counter Intelligence Services
Identifying planted intelligence assets by adversarial groups or entities, and disabling them (incl.).
Com devices, cams, compromised phones and wearable surveillance equipment by meeting persons.
c) Background Intelligence (Individual and Associations/Contacts)
In-depth intelligence reports on individuals and their identified contacts, partners, associates and interactions with identified individuals.
d) Hardware Services
Providing intelligence hardware, including training on how to use such equipment.
e) IT Services
Providing turn-key IT services to make any Business IT infrastructure functional and as secure as reasonably possible. This includes also the maintaining and upgrading of equipment and data depository, including the procedural practice amongst employees.