MySpace Layouts
MySpace Layouts MySpace Codes MySpace Backgrounds
INVESTIGATIVE SERVICES
Insider Trading
ascertain whether one or more persons, usually employed by the company, provide financial information about the company to a competitor, in order for this latter to take advantage, for example in the acquisition of shares or in winning client orders.International and online frauds
The online trading in Internet is experiencing a growing phenomenon of frauds. Many sellers on auction sites are just fraudsters and once riceved the corresponding sum of money for the selling disapper without leaving traces in many cases. I help identify the fraudsters and verify the money flaws in order to help clients get the money transfered back.Trade Information Research
I can reasearch and collect the following information: Trade, company, patrimonial, pre-employment for compagnie and private individuals, insurance and incidents information.Analysis of (Potential) Client/Partners
I collect accurate information in order to assess the solidity of the (potential) client and/or partner with whom my client intends to deal with for a business agreement or to elaborate a specific production and/or financial strategy. This type of service includes all investigations requested by banking and financial institutions in order to assess the goodness and provenance of company shares, bonds, promissory notes and other credit documents which should be used as collaterals in order to issue a credit line in any part of the world.Analysis of Financial Operations
I, based on their knowledge of the world financial and banking system, can ascertain whether a person, with whom my client is about to enter into a deal, is the real party behind it and that there are no other companies or people involved, who for any reason do not intend to come out in the open in the negotiations nor later in the operation. It is about analyzing the composition of the company share capital and all financial interlacements with other companies.Research on Company/Personal Assets and Foreign Bank Accounts
I research on company and personal assets, including bank accounts and securities deposited at foreign banks, even off-shore ones, in order to map the exact person's estate. This will help evaluate his ability to meet his obligations.Unfair Competition
I identify who, inside or outside a company, put in place actions aimed at undermining a consolidated market position, using unfair and illegal practices.Counter Espionage
I find out and eliminate industrial espionage actions. This activity aims at safeguarding immaterial assets, including intellectual property rights, of a person or company, terminating the theft of formulas, production processes and strategic plans put in place by employees or external agents.Counterfeit of Trade Marks and Imitation of Products
I safeguard the client from imitation and illegal reproduction of his products and the counterfait of trademarks.Antisabotage
I make sure that nobody could manipulate or adulterate the company's products causing a damage to the clients and the company image.Individual Professionalism
I assess the individual professionalism of a job candidate. The candidate's background is checked and it is verified whether he has any criminal records. This type of service includes the investigations that aim at ascertaining the reasons why an employees, laid off or who has resigned, has formatted the hard disk of the company computer before leaving the company.Locating and Rescuing Missing Persons
I specialists can search missing persons. This activity is done in coordination with police authorities and magistrates in case the disappearance is due to a criminal act. In case of kidnapped persons, once the place of imprisonment is located, ISOG specialists can rescue them, in collaboration with the police authorities of the country concerned.Research of Evidence and Counter Evidence
I can find counterevidence or new evidence, to take into the trial, able to confute the thesis of the prosecution partially or completely. The research of evidence is also done to reinvestigate a cold case, a solved case or a case that led to the unjust conviction of an innocent.Confirmation of Alibi
I can put in place all the actions aimed to confirm an alibi to achieve a favorable solution of the case.Tracing Unidentified Witnesses
I can trace witnesses not identified by the prosecutors during the investigation. The credibility of the witness is analyzed with the lawyers responsible for the case, before the witness is taken into the court.Background Investigations
I find all the general information related to a person, including personal, patrimonial, banking, job, revenues and education information.Internet Information Collection
I can help clients recover information from the Internet, such as email and chat lines, in order to put in place prevention measures to protect their data.Electronic Debugging and Wire-tapping
I, in order to prevent economic and physical damages, debug the environment to eliminate the possibility of wire-tapping and conversation interception. This service can be used also during the counterterrorism service in order to prevent terrorists from collecting intelligence to prepare an attack.-----------------------------------------------------
---------------------------SECURITY SERVICES
Security and Terrorist Risk Assessment
This is a 360 degree service offered to single individuals and companies. I employ different methods and tools in carrying out a Security Risk Assessment (SRA), including the TRAM ("Threat and Risk Analysis Matrix") Method developed by the IMO ("International Maritime Organization"); the RAM ("Risk Assessment Methodology") developed by Sandia National Laboratories; and the CARVER ("Criticality, Accessibility, Recoverability, Vulnerability, Effect on Population, Recognizability") Method developed as an offensive tool and used by special operations, counterterrorism and intelligence organizations. In case of companies, staff, installations, vulnerability of machinery, business and operating activities assessment, and estimation of losses are part of the scope of the analysis.Security Planning
An effective security system has many elements and finds its glue in a comprehensive Security Plan. A plan and Standard Operating Procedures serve as a tool to prevent, prepare for and respond to a host of events that threaten the lives of people, the ongoing operations, or which may cause environmental damage. Without a plan, the Return On Investment in security guards, intrusion detection systems, access control systems and other security equipment is greatly reduced. I can prepare and write a Security Plan, and then keep it updated or review any existing plans that the client may have and suggest improvements.Security Solution Design and Implementation
Based upon the results of the Security Risk Assessment, I can provide a detailed engineering design. The detailed design indicates the types, locations and Total Cost of Ownership (TCO) associated with the introduction of security measures and security technologies and their integration with legacy systems and equipment. I and my partners can integrate the different technologies, systems and services into Customized High Security Solutions. I cooperate with leading third-party security technology and service providers, in order to provide total solution expertise and capabilities. I provide the client with a future-proof technical design of security solutions ready to be implemented. The final solution design is based on the client assumptions in terms of quality, cost and time. However, the products included in any solutions are top-technology products that lead to the lowest Total Cost of Ownership for the client. I manage also all implementation phases of the client-approved solution.Security Tests, Drills and Exercises
After developing and implementing a Security Plan, this plan needs testing in order to verify whether all risks and aspects of security breaches have been taken into consideration. The response of the security officers and teams should be exercised as well. Exercises are intended to identify weaknesses at a time and in an environment where there is no impact. It is better to make the mistakes during an exercise than to discover them during an actual incident. Before starting any exercise, it is necessary to determine what should be exercised. This should normally be part of an approved Security Plan, in which all procedures for responding to different security scenarios are described. If a well developed plan is in place, I then can immediately begin an exercise program that involves a full range of response actions. I can design, coordinate and conduct a variety of exercises at any kind of facility, ship, port or airport, to help train, prepare and validate the client's ability to respond to various accidental or intentional incidents. The lessons learned from these exercises will be then incorporated into the client's Security Plan. There are various levels of exercises that can be conducted at the client's facility, on a client's computer network, on a ship or involving an entire port or airport.Security Audit and Maintenance
After the development and place in operations of a Security Plan, this needs to be audited and maintained so as to be sure that it reflects the reality and that security personnel can always react to security threats properly.VIP Protection
I and my patners follow up all phaces related to the protection of a VIP. The first step is the risk analysis and the preparation of a protection plan. In fact, it is always better to prevent than having a confrontation with possible aggressors later. I and my patners, all with a background in special and police forces of various countries, are bodyguards, security managers and team leaders highly qualified to conduct protection assignments both in low-risk countries and in terrorism-risk areas.