IMBEWU SPECIALISED SECURITY AND INVESTIGATIONS

IMBEWU SPECIALISED SECURITY AND INVESTIGATIONS

Menu

Our Services:

We offer the following Services
We offer the following Services
Wichling forms Part of Private Investigations
Wichling forms Part of Private Investigations

We Offer

With a National Intelligence Gathering Footprint, Services we Offer Include:


*Background, Assets, Criminal and Credit Checks
*Full Personal Profiles on Request
*Cellular Forensics and Tracing
*Civil and Criminal Intelligence Gathering
*Counter Industrial Espionage
*Covert and Undercover Investigations
*Criminal Investigations (Murder, Theft, Rape, Fraud and Armed Robberies)
*Civil Investigations
*Cheating Spouse Investigations
*Cheating Business Partner Investigations
*Infidelity Investigations
*Intellectual Property and Copyright Infringement
*Procurement Fraud Investigations
*Tender fraud Investigations
*Corporate Theft Investigations
*Commercial Fraud Investigations
*Technical Surveillance Services and Counter Measures
*Long term Undercover agent placements
*Missing Person and Abduction Investigations
*Celebrity & VIP matters
*White Collar and Pink Collar Fraud Investigations
*Aerial Surveillance Services
*24Hr Surveillance
*Asset and Debt Recovering
*Lie Detecting
*ViP Protection
*Body Guards

More Services


*Electronic Monitoring Apparatus
*Sweeping & Debugging Of Phones & Offices
*Covert Camera Installations
*Electronic Surveillance
*Polygraph Examinations
*Forensic & Ballistic Analysis (Fingerprint & Handwriting)
*Security Surveys
*Document Examinations
*Insurance Fraud
*Skeleton Search (Credit History & Asset Identification)
*Individual Tracing

Private, Corporate and Government 

Private Individuals

Background vetting and profiling of individuals
Dynamic assets search
ID Verification and authentication
Academic diploma verification and authentication
Financial investigations and due diligence
Forensic Fraud & Criminal Investigations
Spousal / Marital and relationship infidelity investigations
Sexual harassment and litigation
Paternity/DNA forensic investigations
Cellphone real time intelligence gathering –  local & international

• Forensic cellphone activity analysis
• Border Crossing investigations and reports
• Data recovery for mobile devices, computers, laptops, cellphones, had drives, usb drives, etc.
• Cellphone tracking and  location of individuals
• Retrieval and extraction of deleted data and messages from cell phones and computers (social media, WhatsAp, BBM ect.)
• Social Media & Internet Investigations
• Cellphone private number caller identification
• Forensic early detection of malware/spyware on cellphones, tablets and computers.
• Missing persons / Locate and track (local and international)
• Skip tracking and tracing
• Surveillance / Physical, digital and electronic (video and photographic)
• Early detection of cyber crimes/internet hacking on cellphones, tablets and computers

Corporates
• Real time business intelligence (B.I.)
• Financial investigations
• ID Verification and authentication
• Academic diploma verification and authentication
• Cyber multi  intelligence monitoring
• Forensic early detection of malware/spyware in cellphones and Tablets
• Cellphone real time intelligence gathering – local and international
• Retrieval and extraction of deleted data and messages from cell phones and computers (social media, WhatsAp, BBM ect.)
• Social Media & Internet Investigations
• Forensic de-bugging of cellphones, tablets and computers
• De-bugging Services
• TESCM – office areas – boardrooms – kitchens & private homes.
• VoIP lines screen
• Video conferencing – over VoIP lines (live & PolyCom systems)
• Telkom line scanning – analogue including fax lines
• Telkom digital old & new – reception areas and extensions
• WiFi scan of office areas for illegal signals indicating interception
• GSM (SIM) scan of office areas for illegal devices
• Forensic Fraud & Criminal Investigations
• Dynamic assets search
• Polygraphy and honesty examinations
• Tracing and tracking of individuals and assets.
• Identity and integrity verification
• Expert Handwriting Analysis
• Dynamic double scope spider profiling
• Individual background and lifestyle checks
• Pre Employment Vetting/Screening
• CV Authenticity Verification
• In depth intelligence and due diligence for highly competitive and complex business entities.
• Counter industrial espionage
• Risk and vulnerability assessment
• Surveillance / Physical, digital and electronic (video and photographic)
• early detection of cyber crimes/internet hacking on cellphones, tablets and computers
• Border Crossing investigations and reports
• Internet/Online/Computers/Cellphones/Tablets forensic investigations and data analysis
• IT forensic and cyber crime investigations
• Cyber crime analysis, counter hacking, computer hacking and forensic investigations which includes:
• Complete search of scene and collection of all electronic storage
• Creation of forensic backup copy of computers
• Creation of second back up to minimise the risk during investigations
• Analysis and location of all data/evidence
• Data recover of all lost or deleted data
• Decryption of data and tracking of passwords
• location and analysis of emails
• determination of internet activities
• Forensic imaging of computers


Governments, Law Enforcement Agencies and Homeland Security

• Real time intelligence for multi platforms, see ‘The Chameleon’
• Retrieval and extraction of deleted data and messages from cell phones and computers (social media, WhatsAp, BBM ect.)
• Social Media & Internet Investigations
• Cellphone real time intelligence gathering – local and international
• Detection of interceptors
• Forensic Fraud Investigations
• Polygraphy and honesty examinations
• Identity and integrity verification
• Expert Handwriting Analysis
• Pre Employment Vetting/Screening
• CV Authenticity Verification
• Tracing and tracking of individuals and assets
• Surveillance / Physical, digital and electronic (video and photographic)
• Dynamic deep profiling of individuals and business entities
• Cyber multi intelligence remote monitoring
• Forensic detection of malware/spyware in cellphones and tablets
• Dynamic assets search
• ID Verification and authentication
• Lawful mobile data interception
• Cellphone tracking and  location of individuals
• Counter industrial espionage
• De-bugging Services
• TESCM – office areas – boardrooms – kitchens & private homes.
• VoIP lines screen
• Video conferencing – over VoIP lines (live & PolyCom systems)
• Telkom line scanning – analogue including fax lines
• Telkom digital old & new – reception areas and extensions
• WiFi scan of office areas for illegal signals indicating interception
• GSM (SIM) scan of office areas for illegal devices
• Risk and vulnerability assessment – threat assessments
• Authentication of Academic Diplomas
• Border Crossing investigations and reports
• Internet/Online/Computers/Cellphones/Tablets forensic investigations and data analysis
• IT forensic and cyber crime investigations
• Cyber crime analysis, counter hacking, computer hacking and forensic investigations which includes:
• Complete search of scene and collection of all electronic storage
• Creation of forensic backup copy of computers
• Creation of second back up to minimise the risk during investigations
• Analysis and location of all data/evidence
• Data recover of all lost or deleted data
• Decryption of data and tracking of passwords
• location and analysis of emails
• determination of internet activities
• Forensic imaging of computers
Rodney van Rensburg