PRUDENTIAL ASSOCIATES

Learn More

Frequently Asked Questions

Home » FAQ

Section 1:
Private Detective Agency – Frequently Asked Questions

Section 2:
Cybersecurity & Digital Forensics for Legal Investigations – Frequently Asked Questions

General Questions

We handle a wide range of investigations including surveillance, infidelity, background checks, missing persons, asset searches, fraud investigations, insurance claims, employee misconduct, and more.

Yes, all of our private investigators are fully licensed and operate in compliance with state and federal regulations.

Absolutely. All client communications and investigation details are treated with the highest level of confidentiality.

Yes. Our investigators can testify under oath and provide professional reports and evidence admissible in court.

Fees vary depending on the type and complexity of the case. We provide detailed estimates after an initial consultation.

Yes. All clients are required to sign an engagement agreement that outlines the scope of work, fees, and terms of service.

No. We do not engage in any illegal activities. All investigations are conducted within the bounds of the law.

In many cases, we can initiate services within 24 hours of the initial consultation and agreement execution.

Yes, we use lawful investigative techniques and databases to locate individuals for legitimate legal and personal reasons.

Frequently. We assist law firms with witness location, asset verification, due diligence, and litigation support.

Surveillance and Field Investigations

Surveillance involves trained investigators using discreet methods to observe, document, and report activity. We use high-resolution video, still photography, and detailed logs.
Yes, as long as it’s conducted without trespassing, harassment, or invasion of privacy, and complies with local laws.
Duration depends on the objectives of the case. Some surveillance cases require only a few hours; others may span days or weeks.

Background Checks and Locates

Background checks may include criminal history, civil litigation, address history, property ownership, liens, judgments, professional licenses, and more.
Our investigators use advanced databases and human intelligence to locate individuals, within legal limits.

Section 1:
Private Detective Agency – Frequently Asked Questions

Section 2:
Cybersecurity & Digital Forensics for Legal Investigations – Frequently Asked Questions

Digital Forensics

Digital forensics is the process of collecting, analyzing, preserving, and presenting electronic data in a legally sound manner for use in investigations or court proceedings.

We examine computers, smartphones, tablets, servers, cloud accounts, removable media, and network traffic logs.

We assist in civil litigation, criminal defense, internal investigations, IP theft, harassment, fraud, family law matters, and regulatory investigations.
Yes. Our forensic procedures follow industry-standard protocols to ensure evidence is court-admissible and meets legal requirements for chain of custody and integrity.
Yes. We can often determine the origin, timing, and context of file access, modifications, deletions, and transfers.
In many cases, yes. We use advanced forensic tools and techniques to recover deleted files, emails, chat logs, and browser activity—even from unallocated space.
Our reports include a formal assignment summary, summary of findings, detailed technical analysis, timelines of user activity, screenshots, hash verifications, and evidentiary exhibits.

Digital forensics refers to the process of collecting, recovering, analyzing, and preserving digital devices for an investigative or evidentiary purpose. The field of digital forensics includes use of specific methods and tools, designed to preserve the original evidence and ensure that all changes are conducted in a controlled environment. Digital forensics encompasses analysis of a wide range of digital devices, beyond just computers and cell phones. Digital forensics includes computer and cell phone forensics, which could be described subcategories of digital forensics.

Then your suspicions are incorrect. We are finders of fact. Some text below from our Exam Tasking Clarity Affirmation document (which you will be asked to sign) is worth our offering for your review here;

Client understands, acknowledges, and fully accepts that the examination being funded during this engagement does not have the purpose of explaining phenomena, observations, or problems they have encountered with their cell phone or computer device. Regardless of any list of complaints, observations, or device behaviors, this engagement is in no way undertaken with the purpose of explaining those  observations/behaviors. Client fully acknowledges those would be an engagement appropriate for a technology troubleshooting entity and not an element of the tasking related to this engagement.

The client understands, acknowledges, and fully accepts that their engagement with Prudential Associates is for the sole purpose of determining whether the device is compromised. The term ‘compromised’ pertains to being affected by the implementation of spyware, malware, remote access enabling processes, keylogging software, or other security-compromising method(s).

Given the above, the client understands and fully accepts that the resulting report/findings will answer the question of whether the device is compromised (assuming that a sufficiently thorough exam is funded) and will not address any client-generated list of complaints, observations, or abnormal behaviors relating to the examined device.

The client understands, acknowledges, and fully accepts that this document clarifying tasking and expectations is necessary to apprise the client that Prudential Associate not is going to, as part of this exam, explain or resolve computer-related problems/observations the client has experienced. The client affirms that he/she completely agrees to the above terms and has not been promised any other service or service outcome.

Computer forensics and mobile forensics require both a technical and investigative skill set. Every step in the forensic examination process is designed to preserve evidence and maximize recovery of data. Generally, during a computer or cell phone forensic exam, the examiner will first create a forensic image or extraction from the device.

The examiner will then process the forensic image with tools designed to carve and recover data from the forensic image, including items that have been deleted. The examiner will then conduct analysis based upon the search/tasking criteria provided by the client and will provide a detailed report outlining all items that have been recovered.

Computer forensics and mobile forensics require both a technical and investigative skill set. Every step in the forensic examination process is designed to preserve evidence and maximize recovery of data. Generally, during a computer or cell phone forensic exam, the examiner will first create a forensic image or extraction from the device.

The examiner will then process the forensic image with tools designed to carve and recover data from the forensic image, including items that have been deleted. The examiner will then conduct analysis based upon the search/tasking criteria provided by the client and will provide a detailed report outlining all items that have been recovered.

Cybersecurity & Incident Response

Yes. We provide rapid response services to identify, contain, and remediate cyber threats including ransomware, unauthorized access, and malware infections.

Unfortunately, at that point they are spending twice as much as they originally needed to. Logic dictates that, no matter the profession, a firm must charge an amount sufficient to employ the very best individuals in their industry, and that amount will necessarily be more than other firms to retain those highly skilled staff persons.

We evaluate your systems, networks, and applications for known vulnerabilities and provide prioritized remediation guidance.
Yes. We perform forensic imaging, log review, malware scanning, and artifact analysis to determine the scope and nature of a compromise.
Depending on case urgency, we can initiate collections or remote imaging same-day. A full analysis typically begins immediately following acquisition.
Yes. We are neutral experts able to work on either side of a case or serve as court-appointed third parties when appropriate.