top of page


If you require further information or details, please contact us using the means indicated.
For other more sensitive services, please contact us following our security protocols.

lop_edited.jpg

International asset search

Search and location of financial assets, movable and immovable assets.

Resumption actions following an international court order guided by our team.

Financial repatriation and assets.

lop_edited.jpg

Due Diligence - Reserved

Gathering information about companies and partners before acquisition.
Carried out in a covert manner as an open due diligence can be manipulated by the selling party with data changes.

lop_edited.jpg

Private criminal investigation

Cases of fraud, kidnapping, robbery and extortion.
We work in parallel with the authorities to quickly clarify the facts using advanced technology and highly qualified agents who will dedicate themselves exclusively to the case.

lop_edited.jpg

Agent Training

We offer special training for bodyguard agents or elite private security personnel.

Our focus is to train your agent in countermeasures in the intelligence sector by offering specific training.

lop_edited.jpg

Political counterintelligence

Total political shielding, guidance and training of advisors in positions of trust, investigation of people close to them and intelligence solutions with the adoption of high-level security protocols in parliamentary operations.

lop_edited.jpg

Crisis management

Serious cases of veiled or open threats, financial losses, situations of business, political or personal risk.
Situations are evaluated by a specialized team who will develop immediate actions.

lop_edited.jpg

Location of missing people

A relative or even a fraudster, the agency has highly qualified personnel, technology and access to important information to search for the whereabouts.
Tracking is carried out in 3 steps and our success rate exceeds 90%.

lop_edited.jpg

Industrial counterintelligence

Complete shielding against corporate espionage.

Allows protection against attempted financial embezzlement, sale of confidential information and monitoring of employees in positions of trust.

lop_edited.jpg

Hackers - electronic security

Our agency has top-level hackers to guarantee the electronic security of all operating systems.

Recovery of passwords for emails, social networks, hard drives, cell phones and network systems.

Monitoring and tracking of IP addresses and precise location.

lop_edited.jpg

HD and password recovery

Recovery from damaged hard drive or pen drive or corrupted or lost password.
Recovery of passwords for email, social networks or any other cyber media.

bottom of page