COMPLEX PROJECT LEADERSHIP
Our extensive network of investigative resources, developed and refined over the course of a combined 50 plus years experience in many different theaters, covers not only the United States but extends to the farthest reaches of the globe. And our excellent relations with law-enforcement agencies, both domestic and foreign, facilitate investigative steps and, if required, criminal prosecutions.
We approach all investigations in a prudent, deliberate manner. After analyzing clients' needs, we develop realistic strategies, ranging from the very basic to the exceptionally innovative. Often, a conservative approach is indicated, whereby we undertake an initial inquiry within a defined, reasonable budget. Its results and, when appropriate, suggested avenues of further exploration are presented to the client, who decides whether a fuller effort is warranted. Moreover, we add value to the information generated in the inquiry by collating it into a precise, perceptive, timely report.
DUE DILIGENCE
-
Employment candidates, potential acquisitions and prospective joint-venture partners and franchisees
-
Review of criminal and civil history, credit history, financial data and history, education history, employment history, governmental and regulatory checks, social media, and reputation via interviews
-
Investigations conducted online and in-person; world-wide reach
FRAUD
-
Direct financial losses, such as embezzlement or health insurance fraud
-
Indirect financial losses, such as kickback/bribery schemes, conflict-of-interest situations or bid-rigging/collusion
-
Product diversion investigations and surveillance operations
CONVENTIONAL THEFT
-
Breaches of the production-distribution chain through inventory erosion, diversion, hijacking
-
Corporate penetration by criminal organizations
UNDERCOVER
-
Placing experienced operatives inside client facilities to develop intelligence on thefts
-
Setting up reverse stings to expose criminally errant employees, vendors and distributors
INTELLECTUAL PROPERTY
-
Market-watch programs
-
Controlled "buys" to identify retailers, wholesalers, importers and, ultimately, manufacturers of bogus goods
COMPUTER FORENSICS AND CYBER INVESTIGATIONS
-
Data recovery from workstations, laptops and servers
-
Fraud and intellectual property theft; identity theft
-
Investigation and prevention of intrusions
-
Analyzing and documenting user access histories