Skip to searchSkip to main content

Investigative Services

When you hire us, you can depend on confidential, reliable and professional service from experienced investigators.

We strive to be consistent, fast, and efficient.

​Civil Investigations

Civil investigations encompass a wide range of disputes including torts among individuals, corporations, or both.  These can cover incidents such as accidents, personal injuries, insurance defense, divorce proceedings, workers' compensation fraud, insurance fraud, locating missing persons or runaways, medical malpractice, product liability, and conducting witness interviews.

​Background and Due Diligence Investigations

Background investigations are necessary for verifying the honesty, integrity, and practices of individuals or companies. Our services include pre-employment, tenant, business entity, business reputation, and personal background checks. Due diligence investigations are conducted to gather detailed information about a business, individual, or other entity before entering into a transaction or agreement.  We can perform various searches, such as criminal history, driver's license verification and driving records, license plate registration, education verification, business entity registration, Secretary of State information, address and asset location and verification, military service records, as well as marriage and divorce records, among many others.

​Criminal Investigations

Criminal investigations are crucial for determining whether an individual or company has violated the law. They are necessary in cases involving criminal defense, accidents, abuse, theft, fraud, embezzlement, blackmail, extortion, vandalism, arson, kidnapping, as well as suicides and homicides.


​Surveillance

Surveillance is conducted for a variety of reasons, often to gather crucial information discreetly and ethically. Here are some common scenarios where surveillance is used:

  • Companies may use surveillance to uncover fraudulent activities, intellectual property theft, or employee misconduct.
  • Surveillance helps verify the legitimacy of insurance claims, reducing the risk of fraud.
  • Surveillance helps ensure that workers' compensation claims are legitimate which is essential for protecting businesses from fraudulent or exaggerated claims.

​Domestic Issues

Here are some common Domestic Issues where an investigator is beneficial:

  • When someone suspects their partner of cheating, we can gather evidence to confirm or dispel these suspicions through surveillance and other techniques.
  • In disputes over child custody, we can provide evidence through surveillance and other techniques about a parent's behavior and living conditions to ensure the child's best interests are considered.
  • In cases of domestic violence, we can gather evidence to support legal actions to help ensure the safety of the victim.
  • During divorce proceedings, we can locate hidden assets to ensure a fair division of property.

​Threat Assessment

Threat Assessments are necessary whenever an individual or company suspects a risk of harassment, stalking, violence, vandalism, or terrorism. Our process includes reviewing, assessing, investigating, and offering recommendations for managing such threats, encompassing internet harassment, workplace and school violence, stalking, issues with disgruntled employees or consumers, domestic violence, and threats from terrorist organizations or towards corporate executives and public figures.

​Electronic Forensics

Electronic forensics focuses on uncovering and analyzing digital evidence from electronic devices and online accounts. Here are some key tasks:

  • Recover deleted, hidden, or damaged files from devices like computers, smartphones, tablets, and external storage devices.
  • Analyze metadata from text messages, emails, photos, videos, and documents to create timelines and uncover hidden details.
  • Examine various devices, including computers, smartphones, and tablets, to extract relevant information.
  • Analyze internet router configurations, log files, and traffic to detect signs of surveillance or unauthorized access.
  • Access and analyze data from social media and email accounts to gather evidence related to the investigation.
  • Conduct penetration testing and assess network security to identify vulnerabilities and protect against cyber threats.

​Mystery Shopping

Mystery shopping is a tool used in market research and corporate compliance to measure the quality of service, compliance with regulation, or to gather specific information about products and services. Private investigators are particularly suited for this role due to their training in observation and evidence gathering. They can provide unbiased reports on customer experience and employee integrity, which can be crucial for businesses looking to improve their service quality and ensure adherence to company policies.

Investigative Services Request

General Information
Established Clients
Prospective Clients
General Information

We've made it easy to get your case started.  Complete the following form including as much information as possible. Please note that by submitting this information, you are requesting that we review the submitted information and contact you to further discuss your case.  Submission is not a guarantee of acceptance, and we reserve the right to refuse any submission, in which case all submitted information will be deleted.  If your case is accepted, an employment agreement may be required.

Established Clients

Thank you for continuing to trust the Perkins Investigative Agency.  Your time is valuable, and we want doing business with us to be easy.  We value our relationship with you and as an established client, you can assign a case to us by logging into your secure Client Portal and completing the Intake Form.  Once accepted, your case will be visible to you in the Client Portal.

Prospective Clients

New to our Agency?  We're excited that you've chosen to trust the Perkins Investigative Agency.  Your time is valuable, and we want doing business with us to be easy.   If you would like to us review your case, you can complete and submit the following secure Investigative Intake Form.  Once we review your information, an investigator will contact you to further discuss your case.  An employment agreement may be required.  Help us help you!  Please complete as much information as possible.  We'll contact you if we have any questions.

Your submission is secure.  Our software is SOC 2 Type II Certified.