We design, engineer, develop, write and maintain software & tools to conduct investigations.

New attack vectors require new techniques.

What we provide is custom tailored product solutions for the twenty-first Century adversary. We guarantee undetection. We use Open Source and Proprietary killswitches and self-destruct mechanisms to destroy evidence that the HoneyPot ever existed. Acquired data is

HoneyPots are not so much outside the box, but we develop tools to be inside the box.

HoneyPots are time sensitive applications that require natural emotional intelligence, cultural intelligence, even physical presence.

Our services requires us to know where to be, how to find who you’re looking for, and be there, ready, when your target is going to be there.