A. Personal, professional, and financial history
B. Public records verification
C. Reference and credential validation
A. Covert observation (physical and electronic)
B. Video/photo documentation
C. GPS tracking of vehicles or persons (with legal
authorization)
A. Discreet monitoring of suspected cheating
B. Collection of photographic/video evidence
C. Daily activity reporting and timeline logs
A. Locating individuals (lost contact, debtors, etc.)
B. Accessing databases and public records
C. Field inquiries and follow-up
A. Insurance claim investigations
B. Corporate and employee fraud detection
C. Asset verification and witness interviews
A. Resume and qualification verification
B. Criminal record checks
C. Credit history and drug screening
A. Process serving
B. Asset & debt discovery
C. Court testimony as an expert witness
A. Digital forensics (device data recovery)
B. Analysis of suspicious web/email activity
C. Social media investigation
A. Covert assignment for evidence gathering
B. Mystery shopping or integrity audits
C. Stakeout infiltration
A. Corporate and personal security audits
B. Travel security planning
C. Threat analysis