Enterprise Risk Management 

  1. Business Partner Evaluation:  We evaluate the integrity and business practices of our clients’ customers and business partners through proper evaluation of historic behavior of the businesses and its leaders. 
  2. Market Environment Assessment:  We develop and provide our clients with the comprehensive assessment of political, cultural, and security factors that will affect the outcome of new business ventures in new territories, both foreign and domestic. 
  3. Due Diligence:  Develop independent on-ground valuations of both domestic and foreign firms, for investments, mergers, and acquisitions, to enable our clients to evaluate the valuations presented by these respective firms and make safe and sound investment. 

Management Consulting

  1. Process Improvement:  Enhance efficiency of client organization through development and implementation of sound business processes.
  2. Change Management:  Assist Clients through organizational and mission changes to cope with today's dynamic market and security environment to ensure success in all endeavors.
  3. Operational Support:  Identify program and mission issues and impacts by directly working with clients to enable development of targeted issue specific solutions.
  4. Administrative Support:  Recognize and evaluate administrative issues and identify innovative and creative ways to resolve those issues and incorporate efficient administrative processes.
  5. Communication:  Assist in the generation of internal and external client correspondence to ensure proper channels are used to maximum potential.

Our Services


  1. Counterintelligence Surveys & Vulnerability assessment: Identifies vulnerabilities specific to hostile intelligence, espionage, sabotage, subversion or terrorist capabilities and provides recommendations on how to eliminate or minimize these vulnerabilities.
  2. Counterintelligence Evaluation:  Conducted for a small component of a larger organization when there has been a change in the security posture, an activation or reactivation of a facility, a physical relocation or substantive changes to the organization's facilities or communications and information systems infrastructure.
  3. Counterintelligence Inspections:  Conducted on a recurring basis to ensure security practices meet established standards. There are two types of inspections: Announced: Personnel concerned are aware of the inspection schedule and make reparations as necessary. Unannounced: Conducted to determine compliance with security policies and procedures at a time when special preparations have not been made.
  4. Counterintelligence Awareness & Reporting :  Initial and annual training focusing on the foreign intelligence entity threat, methods, reportable information, and reporting procedures..
  5. Counterintelligence technical Services:  Technical Surveillance Countermeasures (TSCM) used to locate and neutralize technical surveillance devices that have been targeted against U.S. sensitive or secure areas.