Solutions to unique Cases

Our dedicated private investigators and global network of researchers are committed to providing high quality & objective intelligence collection and technical analysis.

We strive to utilize the latest technology and investigative techniques to provide our clients with the facts they need to make the right decisions.

Discover how the superior quality of our Investigative & Research Services will translate into immediate Risk Mitigation, Fraud Prevention and Significant Long Term Savings.

Our diverse team consists of former Canadian & International police officers, government specialists, insurance claims agents, legal & financial staff and ethical cybersecurity professionals.


1 +
Global Partnerts

Private Investigation Services Across Ontario


Physical surveillance investigations are an essential service of any investigator. The discoveries developed through our covert surveillance services are often crucial to proving facts and disproving false claims. Our evidence is obtained legally and is admissible in court, along with testimonies from our investigators. 

Using the latest technology and investigative techniques, our investigators gather the evidence you need, and present it clearly in a professional report with digital exhibits. We are prepared to conduct surveillance operations during any season & in all environments.  From busy city centres, to the remote backcountry, we’ll get the facts you need to make the right decisions.

We guarantee your case will be managed efficiently to ensure the best results on time and on budget. Clients receive an itemized invoice for all services.

Our Corporate Investigation Services have been tailored to assist businesses ranging from independent owners, to Fortune 500 companies mitigate risk associated with dishonest employees and external threats. Using the latest technology and proven investigation techniques, we procure high quality evidence and present it in a clear report. We have conducted investigations pertaining to:

  • Employee Theft and Fraud
  • Undercover Operations
  • Supervisory Issues
  • WSIB and Insurance Benefit Investigations
  • Trade Secret / Intellectual Property Investigations
  • International Inquiries

Discover More.

A separation can be one of the most stressful events in someone’s life. It is made that much more complicated when children are involved. Our domestic service unit investigators prioritize providing surveillance services for child custody matters to ensure their safety, and to give our clients peace of mind. We have successfully kept children safe by discovering violations in court conditions and by observing dangerous circumstances and intervening immediately.

Our child custody investigations may uncover many facts that a court will take into consideration when determining the best interests of the child.

This includes if a parent:

  • has been violent or abusive to the other spouse or children,
  • is involved in criminal activity,
  • is financially stable and able to provide for the children’s needs,
  • has a history of mental illness,
  • abuses alcohol or drugs,
  • neglects the children,
  • has a history of driving offences, or
  • does anything else that could affect the children’s well-being.

The most common investigative techniques to find evidence include:

  1. Surveillance: to monitor activities of the parent and document incidents of neglect, abuse or other forms of mistreatment.
  2. Background searches (criminal records, alcohol and substance abuse, lawsuits, and financial problems) to determine a parent’s ability to look after a child.
  3. Witness statements: to help establish character, conduct and suitability of a parent to have custody.

Discover More.

A well placed undercover investigator will not only be able to provide intelligence but may also be able to delay and prevent actions that could do irreparable harm. An undercover intelligence investigator can get much closer to the action than a security system or CCTV camera. Operating within the law, we can develop leads that give you the evidence you need.

Our experienced undercover investigation team has resolve issues for clients ranging from individual business owners to global companies for matters pertaining to:

  • Alcohol or drug abuse
  • Public Health Compliance
  • Health and safety
  • Industrial espionage
  • Mystery Shopping
  • Productivity
  • Sexual harassment
  • Theft and fraud
  • Warehouse / Office Staff
  • Cheating spouses
  • Online scammers

Night Vision / sensitive area monitoring

Our investigators can be positioned discreetly to document the evidence you need to resolve your problem quickly. We can accomplish more in fewer nights than others can in many days. Up to 500m of clear details in level 3 night.

Illegal Dumping/ Environmental Damage

Avoid costly removal fees, protect your property and the environment. Illegal dumping is a crime and leads to unsafe and unsanitary disposal of car parts, garbage, oil & other hazardous materials into the soil and water. Our technology can clearly identify individuals, vehicles and license plates without any external light sources.

Vandalism & Property Damage

Utilizing our night vision technology for investigations, we can clearly identify and document a repeated vandalism to your property or place of business. Even in places under the cover of darkness, with no visible light around. This has many uses for private clients who are dealing with a neighbourhood nuisance, and also for corporate investigations, where the vandalism results in a loss of business or a damaged reputation. 

Warehouse, Storage & Container theft

Our night vision cameras can be set up for investigations in any location. We provide affordable night vision solutions for businesses and security service providers. Transportation companies and storage sites are particularly vulnerable, as the cargo sitting in the trailers can be worth millions of dollars to some opportunistic thieves. 

Domestic Investigations Using Night Vision

We can use our night vision technology to conduct surveillance at night for domestic investigations, including monitoring activities at a residence, or documenting a cheating spouse or a family member while they are in public at night. Our investigations can be tailored to fit your needs. Contact us for more details.

Discover More.

Remote Surveillance: In any environment, at any location.

We employ private investigators specializing in remote location investigations and intelligence gathering, who are equipped to conduct surveillance for more than one week continuously.

Our private eyes cover 1.076 million square Kms


Physical Penetration Testing

The primary benefit of a physical penetration test is to expose weaknesses and vulnerabilities in physical controls (locks, barriers, cameras, or sensors) so that flaws can be quickly addressed. In addition, physical penetration tests mimic real-world scenarios to demonstrate what impact a malicious actor can have on your infrastructure.

Physical penetration testing will strengthen your security defences and allow you to focus on the digital side of your security. It makes no sense to throw millions of dollars on security tools if an attacker can get inside your company buildings and slip out unnoticed.

Cyber Penetration Testing

A cyber penetration test, often called ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture. These penetration tests are often carried out by ethical hackers which utilize strategies and actions of a real attacker in order to evaluate the vulnerability of an organization’s computer systems, network or web applications. Organizations can also use pen testing to test their adherence to compliance regulations.

Our certified ethical hackers and penetration testers identify and mediate physical and cyber integrity faults in an organization’s security.

Corporate Phishing Education Campaigns

A phishing campaign carried out by our ethical hackers simulates a common email scam designed to steal login credentials or other personal information from victims. Real world cybercriminals use phishing by disguising as a trustworthy organization or reputable person in an email communication.

Phishing is very popular with cybercriminals because it allows them to steal sensitive financial and personal information without having to break through the defences of a computer or network. In our education campaigns, we use social engineering techniques to convince email recipients into inputting personal or financial information. Any and all information gathered with our engagements is kept strictly confidential with a full disclosure and remediation report provided to the client upon completion.

Contact us for more details.

We work with assets around the world to locate hidden assets. This information is for intelligence purposes only.

  • Global Banks Accounts & Amounts
  • Real Estate
  • Vehicles
  • Patents
  • Corporate Searches

Cryptocurrency Forensic Investigators helps individuals, corporations and lawyers, especially in the divorce sector, find and track cryptocurrency funds which they may be partially entitled to through blockchain forensics and cryptocurrency forensic accounting.

Besides divorce, we work in quite a few other niches as well including in cases involving Investment Fraud, Scam Investigations, Cryptocurrency Theft, Hacking & SIM-Swapping, Ransomware, Exit Scams, Ponzi Schemes, Suspect or Fraudulent ICOs, Embezzlement, and we also conduct security audits for businesses.

Our experience in this space is extensive and not limited to tracking holdings of Bitcoin and Ethereum. We act as a private investigation service in cases involving hidden or non-disclosed cryptocurrency assets and act as an expert witness if requested. We consult with and offer guidance to individuals so that ultimately they can recover cryptocurrency.

Find Hidden Spy Cameras

We use proven tools to locate spy cameras in clients homes and workplaces. Multiple optical devices, spectrum analyzers and RF scanners are used to identify and pinpoint the location of spy gear. We have located hidden spy cameras in old luggage, inside furniture, inside a modified Nintendo Wii remote, light fixtures, and workplaces.

Find Hidden Microphones & Listening Devices

Are you starting to notice that private and sensitive details from personal conversations are becoming known to others? Don’t ignore these warning signs and conduct a thorough sweep of all accessible areas for hidden microphones. We have found microphone and transmitters about the size of a quarter coin. Restore the security and peace of mind that your private residence remains private. Call Private Solutions for a no obligation consultation.

Find Hidden GPS Trackers

GPS trackers are used in real life much more common than most people realize. Unfortunately they are not always used by law-abiding citizens, and can pose a serious risk to the safety and security of yourself and your family and assets. We offer a convenient service to determine whether there is an illegal GPS tracking device on your vehicle. Using highly specialized equipment, we can  identify and locate GPS tracks, and make attempts to identify the people responsible.

Discover More.

Criminal Offences and Provincial Offences Check

We have access to comprehensive criminal record checks as well as driving abstracts, provincial offences, and by-law citations.

Tenant Application Background Search for Landlords

Every landlord has heard stories from those “tenants from hell”. We provide quick and affordable background searches for prospective tenants, and can conduct interviews with previous landlords, and check references. With a small investment into a background search, you could have the peace of mind that you are accepting a responsible tenant that will not compromise the security or value of your property.

Pre-Marriage Background Checks

If you are feeling suspicious about your spouse or new partner, don’t ignore your gut feelings. Perhaps you’ve caught them in a lie or maybe they avoids introducing you to their friends. Possibly you don’t even know where they live, or worry that they might be lying to you about their past.

No matter the circumstances of your case, we are here to help.

It’s definitely not a pleasant thought that your romantic partner may be hiding a dark past, or a problematic lifestyle. Have you noticed their avoidance of any topics relating to their past? We provide deep dive and discover the true version of events and state of affairs to give you the peace of mind before taking the next major step in your lives. We can discover past marriages, hidden assets and bank accounts, criminal records, and determine the extent of their financial profile. All of our searches are conducted discreetly and without the other person finding out. 

Employee Background Checks

Anybody can lie on a resume to try and land an interview instead of actually qualified candidates. We carefully review all of the information in the application process and cross reference it with our network of open source intelligence searches, and government records such as criminal background checks, driving record checks as well as past employer verification. We offer affordable solutions and normally get results within 48 hours.

Discover More.

Phone Number Address Trace

  • Find the name and address for the owner of a cell phone number or a landline number.
  • Find a new cell phone number using an old phone number.
  • Find identity of a prepaid/ burner phone number.

Address Verification

  • Verify the identity of a person residing at a residence, even if they are renting, or unlisted on the property title. 
  • We can also get a forwarding address for an individual if they have moved.


  • This service is restricted to missing persons and when safety is a concern.

Discover More.

What is OSINT?

Open Source Intelligence (OSINT) is intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement..It is primarily used in national security, law enforcement, and business intelligence functions.

Did you know only 4% of the internet is Accessible to search engines?

Using the latest technology and investigative techniques, our deep dive researchers are able to locate evidence and find connections between various data points. We utilize the full potential of our research methods and tools to access every corner of the web and get the facts you need to make the right decisions.

Benefits of our Open Source Intelligence Investigations

When considering all sources of intelligence, public (open source) information costs up to 90% less to obtain and can provide the most value for definitive and actionable evidence. We combine automated programming with manual searches to maximize results for our clients.

Sources of Intelligence

  • Human Sources (HUMINT)
  • Imagery (IMINT)
  • Geospatial (GEOINT)
  • Measurement & Signature (MASINT)
  • Signals (SIGINT)
  • Open Sources (OSINT)

Discover More

What is the darknet?

A darknet is a network within the Internet that can only be accessed with specific software. Usually, in a darknet, sites are offering illicit goods, sensitive information and breached data that can be sold and purchased anonymously. To ensure that your most important data and assets do not end up on the darknet or have already ended up there, we can continuously monitor various sources on the darknet, so that you or your company do not suffer any loss of reputation or consequential damage from a data leak.

Our skilled researchers have decades of experience in collecting, analyzing and validating the intelligence from darknet websites. The intelligence is gathered directly from adversaries; hence, it is highly reliable and accurate.

The cyber threat information commonly seen on Darknet includes:

  • Breached Databases of Corporations/ Credit Cards/ Credentials/ Personally Identifiable Information available for sale or for free.
  • Hacking Tools/ Malware
  • Renting services such as DDOS/Ransomware on demand
  • Communication and Propaganda related relating to Anti-National Elements/Radical groups.
  • Hacktivism
  • Attacker Tactics Techniques and Procedures

Our capabilities

  • Investigate Threat Actors
  • Search Cryptocurrency Wallets and Addresses
  • Monitor Leaked Credentials
  • See Inside Authenticated Chatrooms
  • Identify Threats on Darknet Forums
  • Track Vendors on Marketplaces
  • Access Historical Darknet Records


Blackmail is an act of coercion using the threat of revealing or publicizing either substantially true or false information about a person or people unless certain demands are met. It is often damaging information, and may be revealed to family members or associates rather than to the general public. It may involve using threats of physical, mental or emotional harm, or of criminal prosecution, against the victim or someone close to the victim. It is normally carried out for personal gain, most commonly of position, money, or property


Sextortion refers to a form of blackmail in which sexual information or images are used to extort money or sexual favours from the victim. Social media and text messages are often the source of the sexual material and the threatened means of sharing it with others. An example of this type of sextortion is where people are extorted with a nude image of themselves they shared on the Internet through sexting. They are later coerced into performing sexual acts with the person doing the extorting or are coerced into posing or performing sexually on camera, thus producing hardcore pornography. This method of blackmail is also frequently used to outing LGBT people who keep their true sexual orientation private.

Our service are uniquely tailored to identify/ isolate the threat actors and prevent their ability to access the compromising material in question, even after a breach has occurred.

Coming Soon.

Safety Services

Our secure communications products and services are restricted to government and high risk individuals pending a criminal & security clearance.

We provide government and high risk personnel advanced solutions for sophisticated threats.

Secure Mobile Phone

Our Secure Phone provides full anonymity to protect the identification of your device, complete geo-location protection, no metadata recording and rock-solid protection against advanced Zero-day exploits that can turn your mobile phone into a listening device.

Complete Anonymity

Identifiers such as MAC addresses, and hostnames are commonly used to uniquely identify a mobile device. Our secure phones randomize their MAC address, and hostname with no Meta-Data to provide complete anonymity.


The secure phone has built-in protection against both GSM based and mobile data location tracking.


The secure phone provides encryption and comprehensive protection against both Wi-Fi and GSM interceptions, ensuring the privacy and security of all of your communications.

Zero-Day Exploit Protection

Application containers technology provides an additional layer of protection to detect and prevent threats from advanced malware and zero-day exploits.

OS & Apps Customization

Every client has their specific mobile security needs and we are committed to meeting these needs. The secure operating system and applications are fully customizable to meet customer requirements.

Complete Transparency

The secure phone provides its users with peace of mind through a complete transparency policy. All clients can perform a full source code audit of the phone operating system and applications to ensure integrity of privacy and security.

Certified Workplace Violence and Threats Specialists

We provide proactive measures to mitigate risks associated with an employee’s termination from a company. Tailored services include comprehensive threat assessments, target monitoring and safety-oriented route planning.

Our methods ensure cost-effective solutions for a safe and trouble-free transition beyond the workplace, while prioritizing the safety of employees, assets and reputation.

Threat Assessments

After determining the scope of the threat, our former police trained investigators begin by collecting all necessary information related to the threat. We identify all potential vulnerabilities and then plan safety oriented routes to ensure maximum safety.

Undercover & Uniformed security

Depending on the circumstances of the termination, we can assign covert protection investigators as well as highly trained uniformed security guards with use of force options. Our clients can conduct all necessary procedures without fear of violence or retaliation. We also offer sensitive cargo-in-transit escorts.

When we conduct safety services for high risk terminations, our job is not done when the former employee leaves the building. Our surveillance services can continue for a predetermined amount of time, or until you are confident that the risk level has subsided. We offer 24/7 surveillance on the former employee, and sensitive area monitoring if any have been identified.

Utilizing our night vision technology for investigations, we can clearly identify and document a repeated vandalism to your property or place of business. Even in places under the cover of darkness, with no visible light around. This has many uses for private clients who are dealing with a neighbourhood nuisance, and also for corporate investigations, where the vandalism results in a loss of business or a damaged reputation.

Executive protection, also known as close protection, refers to security and risk mitigation measures taken to ensure the safety of VIPs or other individuals who may be exposed to elevated personal risk because of their employment, high-profile status, net worth, affiliations or geographical location.

Our investigators have conducted executive protection operations for principals such as executives, actors, musicians, sports icons, comedians and politicians. All of our certified protection officers have previous police or military training.

Contact Us with confidence

Scroll to Top