What this service covers

When clients engage us

Our approach

Our cyber work operates exclusively on open-source, passive, and lawfully-obtained information, in strict accordance with the Computer Misuse Act 1990. We do not access computer systems, accounts, or data without lawful authorisation. We do not employ pretext or impersonation to obtain account information. Where authorised access is part of an engagement (for example, an employer asking us to examine a company-owned device), we work to forensic standards.

Personal data gathered in the course of an investigation is handled in accordance with the UK GDPR and the Data Protection Act 2018. For our full process, see how we work.

Talk to us about Cyber & OSINT Investigation

An initial scoping conversation is at no charge and treated in strict confidence. We respond within one business day.

Request a confidential consultation See how we work

The form will open with this service area pre-selected and a starter message you can edit before sending.