IAS
  • Home
  • Plummy
  • Terratonics
  • HiPoint
  • Contact
  • About
  • Services
    • Startup to Unicorn
    • Funding Europe
    • Funding India
    • Digital Transformation
    • IT Asset Management
    • Data Ecosystems
    • Cloud Services
    • Strategic Implementation
    • Virtual Leaders
    • Virtual CFO
    • Audit & Accounting
      • Accounting & Financial Reporting
      • Internal Audit Outsourcing
      • Accounting Outsourcing
        • Registration Accounting
      • IFRS
      • ESG Reporting
      • Transaction Services
    • Risk and Compliance
      • Enterprise Risk
      • Operational Risk
      • Third-party Risk
      • Fraud Risk
        • Fraud Risk Framework
      • Exempt Market Dealers
      • Basel III
      • Corporate Social Responsibility
      • Training
    • Covid/BCP
    • Credit
      • Basel IV
    • AML
      • AML Training
      • AML Checking
    • Cyber Security
    • Marketing
    • Trading
    • Privacy
    • Security, Intelligence & Investigations
      • Surveillance
      • Counterfeit, Copyright & Brand Forgery
    • Change Management
  • Industries
    • Financial Services
    • Capital Markets
    • Structured Finance
    • Pension Services
    • Credit Unions
    • Asset Management
    • Esports Gaming
    • Brokerage
    • Pharma & Healthcare
    • Cannabis
      • Cannabis Sector Risks
  • Assignments
    • IT Asset Management
    • Internal Audit
    • Credit Risk
    • Strategy & M&A
    • AML
    • Compliance
    • Project Management
  • Experts
    • Ken Clarke
    • Bijan Alagheband
    • Basel Anbari
    • Andrea Aimi
    • Wadih Antoun
    • Kapil Arya
    • Katia Barakat
    • Sharon Bauer
    • Mo Bhamra
    • Michael BiZ (Ph.D.)
    • Tim Boucher (CIA)
    • Dan Brennan
    • Chris Caldwell
    • Michael CamilleriI
    • Michael Castro
    • Chiranjib Chatterjee
    • Mumtaz Chaudhary
    • Shaheen Chaudhary
    • Terry Chong
    • James Clayton
    • Sudha Datta
    • Mark Dougherty
    • Warren D'Souza
    • Nabil Eldeh
    • André Fortier
    • Mike Firth
    • Frank Grigg
    • Paul Hedges
    • Andrew Hockin (Compliance)
    • Ken Green
    • Harry Gundy
    • Jim Harris
    • Tim Hanlon
    • Mitch Hirshhorn
    • Sumit Jha
      • Sumit Experience
    • Elyan Jabre
    • Balveen Kaur
    • Kshitij Kaushal
    • Rohin Khurana
    • Data - Kieng Iv
    • Ron Kusano
    • Tony Kwan
    • Rebecca Lai
    • Mark Levesley
    • Cecily Ma
    • Tom O'Carroll
    • Simran Makkar
    • Sahil Malik
    • Terry Martinuk
    • Ed Mathur
    • David McIntosh
    • Indranil Mitra
    • David O'Marra
    • Arlene Palango
    • Doug Pirie
    • Karthikeyan Raaj
    • Jayanth Rao
    • Andrew Richardson
    • David Rose
    • Dhritiman Roy
    • Nandini Roy
    • Dhruv Sachdev
    • Martin Seaton
    • Devanshi Sharma
    • Bill Shek
    • Jane Shen
    • Glenna Smith
    • Ben Swartz
    • Rajesh Varma
    • Dominic Vogel
    • Paul Wallis
    • Bing Wang
    • Ira Wijesooriya
    • Terence Yhip
    • Phil Zanotti
    • Digital Solutions
  • Comparison
  • Leadership
  • Careers
  • Privacy Policy
  • Disclaimer
  • Home
  • Plummy
  • Terratonics
  • HiPoint
  • Contact
  • About
  • Services
    • Startup to Unicorn
    • Funding Europe
    • Funding India
    • Digital Transformation
    • IT Asset Management
    • Data Ecosystems
    • Cloud Services
    • Strategic Implementation
    • Virtual Leaders
    • Virtual CFO
    • Audit & Accounting
      • Accounting & Financial Reporting
      • Internal Audit Outsourcing
      • Accounting Outsourcing
        • Registration Accounting
      • IFRS
      • ESG Reporting
      • Transaction Services
    • Risk and Compliance
      • Enterprise Risk
      • Operational Risk
      • Third-party Risk
      • Fraud Risk
        • Fraud Risk Framework
      • Exempt Market Dealers
      • Basel III
      • Corporate Social Responsibility
      • Training
    • Covid/BCP
    • Credit
      • Basel IV
    • AML
      • AML Training
      • AML Checking
    • Cyber Security
    • Marketing
    • Trading
    • Privacy
    • Security, Intelligence & Investigations
      • Surveillance
      • Counterfeit, Copyright & Brand Forgery
    • Change Management
  • Industries
    • Financial Services
    • Capital Markets
    • Structured Finance
    • Pension Services
    • Credit Unions
    • Asset Management
    • Esports Gaming
    • Brokerage
    • Pharma & Healthcare
    • Cannabis
      • Cannabis Sector Risks
  • Assignments
    • IT Asset Management
    • Internal Audit
    • Credit Risk
    • Strategy & M&A
    • AML
    • Compliance
    • Project Management
  • Experts
    • Ken Clarke
    • Bijan Alagheband
    • Basel Anbari
    • Andrea Aimi
    • Wadih Antoun
    • Kapil Arya
    • Katia Barakat
    • Sharon Bauer
    • Mo Bhamra
    • Michael BiZ (Ph.D.)
    • Tim Boucher (CIA)
    • Dan Brennan
    • Chris Caldwell
    • Michael CamilleriI
    • Michael Castro
    • Chiranjib Chatterjee
    • Mumtaz Chaudhary
    • Shaheen Chaudhary
    • Terry Chong
    • James Clayton
    • Sudha Datta
    • Mark Dougherty
    • Warren D'Souza
    • Nabil Eldeh
    • André Fortier
    • Mike Firth
    • Frank Grigg
    • Paul Hedges
    • Andrew Hockin (Compliance)
    • Ken Green
    • Harry Gundy
    • Jim Harris
    • Tim Hanlon
    • Mitch Hirshhorn
    • Sumit Jha
      • Sumit Experience
    • Elyan Jabre
    • Balveen Kaur
    • Kshitij Kaushal
    • Rohin Khurana
    • Data - Kieng Iv
    • Ron Kusano
    • Tony Kwan
    • Rebecca Lai
    • Mark Levesley
    • Cecily Ma
    • Tom O'Carroll
    • Simran Makkar
    • Sahil Malik
    • Terry Martinuk
    • Ed Mathur
    • David McIntosh
    • Indranil Mitra
    • David O'Marra
    • Arlene Palango
    • Doug Pirie
    • Karthikeyan Raaj
    • Jayanth Rao
    • Andrew Richardson
    • David Rose
    • Dhritiman Roy
    • Nandini Roy
    • Dhruv Sachdev
    • Martin Seaton
    • Devanshi Sharma
    • Bill Shek
    • Jane Shen
    • Glenna Smith
    • Ben Swartz
    • Rajesh Varma
    • Dominic Vogel
    • Paul Wallis
    • Bing Wang
    • Ira Wijesooriya
    • Terence Yhip
    • Phil Zanotti
    • Digital Solutions
  • Comparison
  • Leadership
  • Careers
  • Privacy Policy
  • Disclaimer
Search

Surveillance & Counterveillance

Picture
What we do

At IaS we conduct surveillance utilizing state-of-the-art equipment and techniques including digital photography, video cameras and sophisticated communications equipment. Our employees and agents are experts in the art of surveillance. Surveillance is much more than simply 'following' a subject. It has been accurately described as "a highly skilled and technical art form." Unlike the fictional private investigators and law enforcement personnel depicted on television and in the movies, surveillance in the real world is extremely unpredictable. There is no script, no director, and if it's not done correctly the first time, there are no 're-takes'.

We are always mindful of the objectives and goals of our clients, and never forget that we are their 'eyes and ears', making every effort to complete every investigation within the scope and authorization provided.

Generally speaking, 'surveillance' is a covert investigative technique, utilized to discreetly obtain information through observation, regarding to the activities, associates and/or whereabouts of a subject.

We conduct surveillance to obtain information and/or evidence. When you need to obtain evidence regarding a subject's precise activities and/or acquaintances, there is absolutely no substitute for surveillance. Surveillance is useful for gathering many different types of information. Some of the information gathered through surveillance could include evidence regarding a subject's business and recreational activities, personal and business relationships, residence, employment and business locations, and much more.

Surveillance is utilized in nearly all types of investigations, including civil, criminal, insurance, background, domestic, and locate investigations. 

There may be situations where it is beneficial or necessary to use more than one surveillance investigator. These might include:

  • long-term surveillance operations
  • surveillance of a subject who is likely to suspect that he is being investigated
  • surveillance that involves following a subject from an airport or other large congested location where many different transportation alternatives exist
  • surveillance of one subject that is likely to result in identifying and following a second subject.

The duration of any surveillance investigation varies greatly from one case to another. While a simple investigation may be completed in only a few hours, others require days, weeks, or even months of surveillance in order to accomplish the stated goals.

The IaS Team

Picture
Picture
Picture
Contact us
  • Home
  • Plummy
  • Terratonics
  • HiPoint
  • Contact
  • About
  • Services
    • Startup to Unicorn
    • Funding Europe
    • Funding India
    • Digital Transformation
    • IT Asset Management
    • Data Ecosystems
    • Cloud Services
    • Strategic Implementation
    • Virtual Leaders
    • Virtual CFO
    • Audit & Accounting
      • Accounting & Financial Reporting
      • Internal Audit Outsourcing
      • Accounting Outsourcing
        • Registration Accounting
      • IFRS
      • ESG Reporting
      • Transaction Services
    • Risk and Compliance
      • Enterprise Risk
      • Operational Risk
      • Third-party Risk
      • Fraud Risk
        • Fraud Risk Framework
      • Exempt Market Dealers
      • Basel III
      • Corporate Social Responsibility
      • Training
    • Covid/BCP
    • Credit
      • Basel IV
    • AML
      • AML Training
      • AML Checking
    • Cyber Security
    • Marketing
    • Trading
    • Privacy
    • Security, Intelligence & Investigations
      • Surveillance
      • Counterfeit, Copyright & Brand Forgery
    • Change Management
  • Industries
    • Financial Services
    • Capital Markets
    • Structured Finance
    • Pension Services
    • Credit Unions
    • Asset Management
    • Esports Gaming
    • Brokerage
    • Pharma & Healthcare
    • Cannabis
      • Cannabis Sector Risks
  • Assignments
    • IT Asset Management
    • Internal Audit
    • Credit Risk
    • Strategy & M&A
    • AML
    • Compliance
    • Project Management
  • Experts
    • Ken Clarke
    • Bijan Alagheband
    • Basel Anbari
    • Andrea Aimi
    • Wadih Antoun
    • Kapil Arya
    • Katia Barakat
    • Sharon Bauer
    • Mo Bhamra
    • Michael BiZ (Ph.D.)
    • Tim Boucher (CIA)
    • Dan Brennan
    • Chris Caldwell
    • Michael CamilleriI
    • Michael Castro
    • Chiranjib Chatterjee
    • Mumtaz Chaudhary
    • Shaheen Chaudhary
    • Terry Chong
    • James Clayton
    • Sudha Datta
    • Mark Dougherty
    • Warren D'Souza
    • Nabil Eldeh
    • André Fortier
    • Mike Firth
    • Frank Grigg
    • Paul Hedges
    • Andrew Hockin (Compliance)
    • Ken Green
    • Harry Gundy
    • Jim Harris
    • Tim Hanlon
    • Mitch Hirshhorn
    • Sumit Jha
      • Sumit Experience
    • Elyan Jabre
    • Balveen Kaur
    • Kshitij Kaushal
    • Rohin Khurana
    • Data - Kieng Iv
    • Ron Kusano
    • Tony Kwan
    • Rebecca Lai
    • Mark Levesley
    • Cecily Ma
    • Tom O'Carroll
    • Simran Makkar
    • Sahil Malik
    • Terry Martinuk
    • Ed Mathur
    • David McIntosh
    • Indranil Mitra
    • David O'Marra
    • Arlene Palango
    • Doug Pirie
    • Karthikeyan Raaj
    • Jayanth Rao
    • Andrew Richardson
    • David Rose
    • Dhritiman Roy
    • Nandini Roy
    • Dhruv Sachdev
    • Martin Seaton
    • Devanshi Sharma
    • Bill Shek
    • Jane Shen
    • Glenna Smith
    • Ben Swartz
    • Rajesh Varma
    • Dominic Vogel
    • Paul Wallis
    • Bing Wang
    • Ira Wijesooriya
    • Terence Yhip
    • Phil Zanotti
    • Digital Solutions
  • Comparison
  • Leadership
  • Careers
  • Privacy Policy
  • Disclaimer