Due diligence and Know Your Customer
Litigation Support
Surveillance/Counter Surveillance
Risk Assessments
Global Asset Location
Counterfeit Goods & Copyright Protection
Penetration Testing
Electronic Counter Measures
Lobbying, Media Relations & Crisis Management
Exhaustive background research into the "bona fides" of individuals and corporations across the globe.
Whether you are involved in a merger or acquisition, or researching the in-
The price of NOT conducting such research can sometimes be catastrophic.
For an idea of our capabilities in this regard, please refer to the KYC document.
Working as a key member of your legal team, we provide any and all support for your case, from witness location through to surveillance, intelligence gathering, financial competitor analysis, (do they have the resources to meet a judgment) and so on.
Be assured if the opposition is savvy, they are doing the same to you.
We work with / employ very experienced, skilled operatives from police, security services and military backgrounds working within a close team structure in any environment.
They are deployed to collect audio-
We are accredited professional witnesses and thus able to provide expert testimony in court to support our findings.
Determining the vulnerabilities of your commercial or domestic set up. This can range
widely from identifying flaws in security, political risk in high jeopardy locations
overseas, anti-
This can sometimes be run in conjunction with our client's insurers, leading to the lowering of insurance premiums.
This action can save money over time.
Often in a litigation support role, we can estalish the concealed asset base of individuals
and corporations within the UK, internationally and in off-
We are also able to refer clients to a debt recovery service run by a former UK Special Forces operative and his team, and refer to a leading London law firm extremely adept in this area.
Investigations into the unauthorised production and distribution of goods that are protected by IP rights such as copyright, trademarks and trade names.
Working within our client's IT structure and on their instruction we ethically "hack" their computer set up and identify flaws within. A thorough report is produced outlining in detail the weaknesses with the system and identifying remedies.
Cyber crime is a vast and under-
Your head of IT will likely resist, as he/she may be territorial, but in the great majority of such tests, we find exploitable loopholes.
Electronic de-
Often run in conjunction with Penetration Testing.
Bespoke political lobbying, public affairs and relations with sovereign governments across the world.
On your behalf we work closely within the already existing channels to secure the assistance and edge you seek.
We will also safeguard your good name with effective crisis management. Our media specialists provide rapid response to any unfolding crisis as soon, or ideally before, the situation develops, 24/7.