OPERATING EFFECTIVELY IN THE MOST CHALLENGING OF SITUATIONS, BE THAT IN PHYSICAL OR ONLINE ENVIRONMENTS

Our investigation team consists of a diverse group of subject matter experts which possess relevant operational experience in managing and conducting complex open source investigations, which includes the deep and dark web.

The team have a wide range of specialist skills and experience in law enforcement to assist with all aspects of investigation from the planning stage to liaison with government, regulatory and law enforcement bodies, where required.

The capability of our investigation team ensures that Horus operates effectively in the most challenging of situations, be that in physical or online environments, whilst remaining lawfully compliant and meeting the recognised evidential standards. As a result, Horus ensures that its integrity and core values, and that of its clients, are appropriately maintained.

Our investigators have a wide range of specialist skills and can assist with all aspects of investigation from the planning stage through to witness interviewing and liaison with government, regulatory and law enforcement bodies, where required.

The capability of our investigation team ensures that Horus operates effectively in the most challenging of situations, be that in physical or online environments, whilst remaining lawfully compliant and meeting the recognised evidential standards. As a result, Horus ensures that its integrity and core values, and that of its clients, are appropriately maintained.

Our Services

  • Security Investigations Online Vulnerability Assessments
  • Financial Probity Investigations
  • Due Diligence Reports
  • Counterfeit Investigations
  • Product Security and Bespoke Investigations
  • Test Purchase
  • Penetration testing

OSINT

Open Source Intelligence –

Monitoring of the internet relevant to set objectives including mass media, social networks, blogs and forums. Online Vulnerability Assessments for individuals who face a threat due to the role they have in the client’s organisation.

Use of specialist proprietary software to conduct tailored monitoring, gathering, and analysis of information relating to subjects or commodities of interest.

HUMINT

HUMINT investigations –

Engaging with subjects both on and off line, as appropriate, including dark and deep web using covert human intelligence source. Conducting confidential acquisition operations under the client’s direction when deemed operationally necessary.

Provision of written statements in support of investigative activity with a willingness of experienced investigators to give evidence in proceedings when necessary (criminal or civil).

SPECIALIST

Specialist investigations –

Specialist due diligence investigations on individuals or companies to identify risks or vulnerabilities particularly those presented by ‘insider threats’, mergers and acquisitions and individuals of interest.

Dark Web Specialist Investigators – Profiling of subjects of interest through analysis of their online footprint and social media.

Supporting internal investigations with a view to gathering independent intelligence to assist clients in either proving or disproving allegations made against staff members.

Our Services

  • Security Investigations
  • Online Vulnerability Assessments
  • Due Diligence Assessments
  • Product Security Investigations
  • Evidential Test Purchases
  • Physical Penetration Testing
  • Financial Probity Investigations
  • Bespoke Investigations

Security Enquiry? Speak to the Horus Team today:

+44 (0) 20 3137 5505

DUE DILIGENCE

A comprehensive appraisal of a business or an individual in order to establish assets and liabilities and to identify potential reputational and physical security risks.

PRODUCT SECURITY

Investigations into the illegitimate trade of genuine and counterfeit products, including evidential purchase activity, conducted to the recognised standards in support civil or criminal proceedings.

BESPOKE INVESTIGATIONS

Personalised investigations to meet client-specific requirements.

ONLINE VULNERABILITY ASSESSMENTS

Identifying potential vulnerabilities posed to businesses and individuals as a result of their online footprint and the provision of comprehensive advice to mitigate risks.

SECURITY INVESTIGATIONS

Pre or post event investigations into incidents, individuals, groups or businesses utilising disclosable sources and, where required, conducted to the recognised evidential standards.