
Night Hawk Investigations, LLC provides a FREE consultation to assess whether an investigation is appropriate.
To begin this process, our team will require a copy of the court’s order for review. This enables us to fully understand your concerns and situation.
Given the presence of alleged violations, we will outline how Night Hawk Investigations, LLC can assist in gathering critical evidence to present a comprehensive overview to support your attorney in building a compelling case on your behalf.

With the information you provided us, our investigative team will begin to lay the groundwork for an investigation. We will review all the information and begin preliminary research.
After their review and research, an investigator will begin to build the framework for a thorough and cost-effective investigation by identifying the best type of surveillance and the equipment needed to capture the evidence.
We recommend that you take a moment to review our "HELPFUL HINTS TO SECURE YOUR PRIVACY".
CONFIDENTIALITY is our priority

The assigned investigator will initiate evidence collection and documentation using physical and/or technical surveillance methods. Our goal is to gather a clear view of what is occurring that address all your concerns.
Throughout the process, you will be regularly updated regarding the progress of the investigation and the evidence obtained.
Upon the completion of the investigation, our team will prepare all the evidence collected with comprehensive report for you.

At the onset of every investigation, it is vital to understand three key elements to keep your investigation on the right track. They are Situation Awareness, Discretion and Secure Communications. We have compiled a list of precautionary measure you can take to protect privacy and your case.

Simply being alone in your residence or in your vehicle does not mean you are not being monitored. In today’s world of technology, recording devices and Bluetooth make it easy to capture conversations remotely.
Therefore, it is important to remain aware of your surroundings and the potential for your private conversations to be overheard or recorded, even in places you consider safe. Take precautions by regularly checking for unfamiliar devices, being cautious about what you say, and staying informed about ways technology can compromise your privacy.

A simple slip of the tongue or sharing information can jeopardize an investigation from the onset. People involved in wrongdoing often are at a heightened sense of awareness. They are watching and listening for any indication that you may be closing in on what they are hiding.
Maintaining discretion is therefore essential, as even casual comments or unintended signals can alert subjects and compromise the integrity of the process. Staying vigilant and exercising caution in all communications helps protect the investigation, ensuring that sensitive details remain confidential and the inquiry can proceed without interference.

One of the most frequent mistakes made during investigations is failing to properly secure electronic devices. This oversight can lead to investigations being compromised from the very beginning. For example, having a shared cell phone plan may allow others to access your call history, phone numbers, and text messages. Additionally, an unsecured computer or iPad can provide unauthorized individuals with access to your internet searches, research and emails, potentially exposing your confidential efforts.
To help safeguard your privacy, we have outlined several suggestions and straightforward precautionary measures you can implement.

If you share a cell phone plan, consider purchasing an inexpensive "burner" phone or use a third party's phone for communicating with all parties involved with your case.
Change the password on your cell phone and add a two-step authentication to verify it is you that is using the device.
Using an end-to-end encrypted messaging platform such as WhatsApp for calls and texting.
We have provided the link to download the app today.
Link: https://www.whatsapp.com/download/

Changing the passwords on your computers or iPad, deleting browsing histories, and adding a two-step authentication to your devices can help to secure your privacy. Another level of security is to add a password to your email account.
Adding an additional password to your email account can prevent others from gaining access. Lastly, ensure you do not use joint email accounts or accounts with alias, this could allow others access to sanative information regarding your case. It may prove wise to create a new email account and protect it with a password.

Be mindful of the method used for payments of retainers and adding additional funds for your investigation. Joint checking accounts, shared credit or debit cards can allow access to account statements revealing billing information.
Many financial institutions offer "charge alerts" notifications for credit and debit accounts via text messaging or emails, and these alerts could be sent to the wrong person.