FAQs

Q: Do you develop or sell spyware?

We do not develop or distribute “spyware” or any form of malicious software for general use. The only exception is the controlled development and distribution of specialized tools for U.S. federal agencies and defense contractors, who are legally bound to strict use-case limitations and compliance standards.

We vehemently oppose the use of such tools to spy on, harass, or intimidate journalists, dissidents, or any individuals exercising their rights, and we will not associate with any entity suspected of such conduct.

Q: Are you a private investigation firm?

No, we are not a private investigation firm. While we are actively pursuing the appropriate licenses to expand our capabilities, our organization operates as a private intelligence firm. All current services fully comply with California Business and Professions Code § 7521.

Q: Can you explain your products in more detail?

Our products are deliberately described in broad terms due to their sensitive nature. In essence, we specialize in advanced vulnerability research, collaborating with top-tier experts in cybersecurity to develop next-generation digital tools. These tools are often acquired by defense contractors for deployment in operational settings. We also source technologies from independent security researchers.

Q: Do you assist law enforcement agencies?

In certain cases, we may choose to work with law enforcement agencies such as DHS, FBI, ATF, IRS-CI, USMS, FinCEN or even INTERPOL—but only in matters directly related to national security. We do not participate in traditional criminal investigations, except in rare circumstances involving alleged terrorism, human trafficking, CSAM, or counterintelligence.

Q: When you say “litigation support” or “dispute support,” what do you mean?

Not all disputes involve formal litigation, so we sometimes use the terms interchangeably to indicate that our support does not require a legal proceeding.

For example, we often assist high-profile clients—those with significant wealth, influence, or political exposure—who may be targeted through coordinated proxy attacks, sometimes originating within established institutions. Our experts and partners work to uncover the true source behind such actions and provide strategic insight and support.