SERVICES
FORENSIC CREDIBILITY AUDITS/CREDIBILITY ASSESSMENT/EYEDETECT
We use EyeDetect technology to conduct tests for screening for sensitive positions, and backgrounds. We also use EyeDetect for investigations into fraud, theft, sexual assault, cheating, infidelity, child sex solicitation, cybercrimes, trafficking, drug use, counterfeiting, identity theft, homicide, sabotage, stealing confidential information, terrorism, unauthorized disclosure of classified information, NDA violation of propietary information, gang affiliation, and organized crime, etc. Also used to vet immigrant/foreigners criminal background.
We have conducted thousands of tests for Screening, Credibility, Investigations and Security, for clients just like you. We manage multiple clients throughout our day and receive many compliments on our process, efficiency, and professionalism. Our tests can be written for clients in their native tongue in over 30 different languages.
The presentation of the results from Credibility Testing is clear, accurate, and scientifically supported. Our reports can be emailed as a PDF file within minutes after testing. Our reports can be sent in digital formats via email or we can produce paper reports.
610 S 850 E #4, Lehi, UT 84043
3300 N Triumph Blvd , Lehi, UT, 84043
**SCHEDULE A TEST**
MOBILE NOTARY
Utah Mobile Notary LLC 801-232-2131
Scott Warner
SECURITY CONSULTING
Security Consulting. We pride ourselves in knowledge and experience in the security industry. WE have best practices from war-torn countries, 3rd world, and locally in the US. We provide consulting to corporate, business, law enforcement and private partners to help prepare them for international travel, insider threat, crisis management, active shooter, social engineering, in securing and mitigating risks.
SECURITY PERSONNEL
We are connected to some of the most professional Security Companies in Utah. We often work together on different projects ranging from events, training, speaking outdoors, vehicle escorts, and investigations.
Executive Protection. Private security for events, travel, or longer term.
INTERVIEW TRAINING
Interview. We provide basic interview, and advanced interview training. Training includes one on one mentoring, feedback, video review, Q and A, questioning techniques, themes, exploiting information, deception, confessions, credibility assessment, analysis, lead development, and practical exercise. This training is based on best practices, experience, to improve your skills in more thorough, efficient, and fruitful interviews. Training is open to new or seasoned investigators.
**SCHEDULE TRAINING**
investigations
Investigations can be requested for missing persons, cold case, criminal defense, fraud, theft, forensics, to infidelity, credibility and corruption. Investigations can include searches, interviews, interrogations, evidence exploitation, scene review, timelines, data, cell phone, geolocation and analysis. Our investigators have over 15 years experience in a broad range of investigations which include; terrorism, fraud, fire, criminal, theft, sexual assault, rape, child abuse, drug possession, and drug trafficking. Whatever your specific need is, please feel free to speak to us. If you are working with an attorney please let us know. We handle English and Spanish cases.
**REQUEST A QUOTE**
CYBER - DATA RECOVERY/DIGITAL FORENSICS
Digital Forensics, digital intelligence. Data or Information that may have been lost or corrupted we can examine, image, and recover. We can professionally recover data from hard drives, RAIDs, solid state drives, flash drives, SD Cards, and tapes. Pricing schedule that includes a free professional diagnostic evaluation, guaranteed all-inclusive price quote, for completed projects, and "No data - No charge" commitment. All recovery operations are performed on image copies.
**REQUEST A QUOTE**
Threat Vulnerability Assessment-TVA
We start with the ABC’s of risk; area, boundary, contents. We work at the boundary and towards the core acquiring information of the inner workings of the protected site to develop a risk analysis. If you feel needs an updated assessment or your site is not secure for whatever reason, give us a call and we can provide a comprehensive report on threat vulnerabilities, access, egress, security, recommendations, threat vulnerability, “needs” assessment, security gaps , and “hazards” assessment.
**REQUEST AN TVA/SSA**
DRONE - AERIAL SCENE/SITE INVESTIGATION SURVEILLANCE PHOTOGRAPHY
Security Sweep Patrols overhead on rooftops and a global picture of a venue. Our aerial operator provides instantaneous threat communication to our force protection team to evacuate key personnel immediately. Get premium quality aerial surveillance photos & video captured by one of our vetted and experienced professional drone operators.
We take the time necessary to understand your security objectives prior to launching any project... FALCON ONE Airborn.