If you require further information or details, please contact us using the means indicated.
For other more sensitive services, please contact us following our security protocols.
International asset search
Search and location of financial assets, movable and immovable assets.
Resumption actions following an international court order guided by our team.
Financial repatriation and assets.
Due Diligence - Reserved
Gathering information about companies and partners before acquisition.
Carried out in a covert manner as an open due diligence can be manipulated by the selling party with data changes.
Private criminal investigation
Cases of fraud, kidnapping, robbery and extortion.
We work in parallel with the authorities to quickly clarify the facts using advanced technology and highly qualified agents who will dedicate themselves exclusively to the case.
Agent Training
We offer special training for bodyguard agents or elite private security personnel.
Our focus is to train your agent in countermeasures in the intelligence sector by offering specific training.
Political counterintelligence
Total political shielding, guidance and training of advisors in positions of trust, investigation of people close to them and intelligence solutions with the adoption of high-level security protocols in parliamentary operations.
Crisis management
Serious cases of veiled or open threats, financial losses, situations of business, political or personal risk.
Situations are evaluated by a specialized team who will develop immediate actions.
Location of missing people
A relative or even a fraudster, the agency has highly qualified personnel, technology and access to important information to search for the whereabouts.
Tracking is carried out in 3 steps and our success rate exceeds 90%.
Industrial counterintelligence
Complete shielding against corporate espionage.
Allows protection against attempted financial embezzlement, sale of confidential information and monitoring of employees in positions of trust.
Hackers - electronic security
Our agency has top-level hackers to guarantee the electronic security of all operating systems.
Recovery of passwords for emails, social networks, hard drives, cell phones and network systems.
Monitoring and tracking of IP addresses and precise location.
HD and password recovery
Recovery from damaged hard drive or pen drive or corrupted or lost password.
Recovery of passwords for email, social networks or any other cyber media.