Frequently Asked Questions
Section 1:
Private Detective Agency – Frequently Asked Questions
Section 2:
Cybersecurity & Digital Forensics for Legal Investigations – Frequently Asked Questions
General Questions
We handle a wide range of investigations including surveillance, infidelity, background checks, missing persons, asset searches, fraud investigations, insurance claims, employee misconduct, and more.
Yes, all of our private investigators are fully licensed and operate in compliance with state and federal regulations.
Absolutely. All client communications and investigation details are treated with the highest level of confidentiality.
Yes. Our investigators can testify under oath and provide professional reports and evidence admissible in court.
Fees vary depending on the type and complexity of the case. We provide detailed estimates after an initial consultation.
Yes. All clients are required to sign an engagement agreement that outlines the scope of work, fees, and terms of service.
No. We do not engage in any illegal activities. All investigations are conducted within the bounds of the law.
In many cases, we can initiate services within 24 hours of the initial consultation and agreement execution.
Yes, we use lawful investigative techniques and databases to locate individuals for legitimate legal and personal reasons.
Frequently. We assist law firms with witness location, asset verification, due diligence, and litigation support.
Surveillance and Field Investigations
Background Checks and Locates
Section 1:
Private Detective Agency – Frequently Asked Questions
Section 2:
Cybersecurity & Digital Forensics for Legal Investigations – Frequently Asked Questions
Digital Forensics
Digital forensics is the process of collecting, analyzing, preserving, and presenting electronic data in a legally sound manner for use in investigations or court proceedings.
We examine computers, smartphones, tablets, servers, cloud accounts, removable media, and network traffic logs.
Digital forensics refers to the process of collecting, recovering, analyzing, and preserving digital devices for an investigative or evidentiary purpose. The field of digital forensics includes use of specific methods and tools, designed to preserve the original evidence and ensure that all changes are conducted in a controlled environment. Digital forensics encompasses analysis of a wide range of digital devices, beyond just computers and cell phones. Digital forensics includes computer and cell phone forensics, which could be described subcategories of digital forensics.
Then your suspicions are incorrect. We are finders of fact. Some text below from our Exam Tasking Clarity Affirmation document (which you will be asked to sign) is worth our offering for your review here;
Client understands, acknowledges, and fully accepts that the examination being funded during this engagement does not have the purpose of explaining phenomena, observations, or problems they have encountered with their cell phone or computer device. Regardless of any list of complaints, observations, or device behaviors, this engagement is in no way undertaken with the purpose of explaining those observations/behaviors. Client fully acknowledges those would be an engagement appropriate for a technology troubleshooting entity and not an element of the tasking related to this engagement.
The client understands, acknowledges, and fully accepts that their engagement with Prudential Associates is for the sole purpose of determining whether the device is compromised. The term ‘compromised’ pertains to being affected by the implementation of spyware, malware, remote access enabling processes, keylogging software, or other security-compromising method(s).
Given the above, the client understands and fully accepts that the resulting report/findings will answer the question of whether the device is compromised (assuming that a sufficiently thorough exam is funded) and will not address any client-generated list of complaints, observations, or abnormal behaviors relating to the examined device.
The client understands, acknowledges, and fully accepts that this document clarifying tasking and expectations is necessary to apprise the client that Prudential Associate not is going to, as part of this exam, explain or resolve computer-related problems/observations the client has experienced. The client affirms that he/she completely agrees to the above terms and has not been promised any other service or service outcome.
Computer forensics and mobile forensics require both a technical and investigative skill set. Every step in the forensic examination process is designed to preserve evidence and maximize recovery of data. Generally, during a computer or cell phone forensic exam, the examiner will first create a forensic image or extraction from the device.
The examiner will then process the forensic image with tools designed to carve and recover data from the forensic image, including items that have been deleted. The examiner will then conduct analysis based upon the search/tasking criteria provided by the client and will provide a detailed report outlining all items that have been recovered.
Computer forensics and mobile forensics require both a technical and investigative skill set. Every step in the forensic examination process is designed to preserve evidence and maximize recovery of data. Generally, during a computer or cell phone forensic exam, the examiner will first create a forensic image or extraction from the device.
The examiner will then process the forensic image with tools designed to carve and recover data from the forensic image, including items that have been deleted. The examiner will then conduct analysis based upon the search/tasking criteria provided by the client and will provide a detailed report outlining all items that have been recovered.
Cybersecurity & Incident Response
Yes. We provide rapid response services to identify, contain, and remediate cyber threats including ransomware, unauthorized access, and malware infections.
Unfortunately, at that point they are spending twice as much as they originally needed to. Logic dictates that, no matter the profession, a firm must charge an amount sufficient to employ the very best individuals in their industry, and that amount will necessarily be more than other firms to retain those highly skilled staff persons.
