I think my husband is cheating when he travels to Scotland for work and is meeting someone else — how do I find out where he’s going and who he’s with without him knowing?
The focus would be on those specific trips, tracking movements, locations, and interactions over time so you can clearly see whether what he’s doing matches what he’s told you.
My partner says they’re working late during the week but their behaviour has changed and I don’t believe them — how can I check where they’re actually going after work?
Those evenings can be targeted to confirm movements and locations, building a consistent picture of what they’re doing rather than relying on suspicion.
I think my wife is meeting someone during the day while I’m at work and I need to know where she’s going — how is that actually tracked?
Daytime activity can be observed across multiple days to establish routine, movements, and whether there are repeated visits to certain places.
My partner keeps saying they’re staying at a friend’s house at weekends but I think they’re going somewhere else — how do I prove where they’re actually staying?
Weekend activity can be monitored to confirm locations and whether their movements match what they’ve told you.
I think my husband is visiting a specific address regularly and possibly seeing someone there — can you confirm if he’s going there and how often?
Surveillance can focus on that address to establish frequency, timing, and patterns of visits over time.
My partner is being secretive with their phone and going out at odd times during the week — how do I find out where they’re going and who they’re meeting?
Those specific times can be monitored to identify movements, locations, and any repeated interactions with other people.
I think my wife is meeting the same person after work but I don’t know who they are — can you find out who she’s with?
Repeated meetings and locations can be documented to establish who she is meeting and how often it happens.
My partner says they’re working away for a few days but I think they’re staying somewhere else — how do I confirm where they’re actually staying overnight?
Overnight locations during those trips can be tracked to confirm where they are staying and whether it matches what they’ve told you.
I think my husband is going somewhere he shouldn’t be on certain days of the week and I need proof before I confront him — can you focus on those specific days?
Surveillance can be targeted on those exact days to confirm movements and behaviour.
My partner’s routine has changed, they’re going out more during evenings and weekends, and I feel like something is going on — how do I build a clear picture of what they’re actually doing?
A structured approach across multiple days and times builds a reliable timeline of movements and interactions so you can see what’s really happening.
I think one of my employees is stealing stock from our warehouse during shifts and I need to know who is responsible without accusing the wrong person — how do we find out what’s actually happening?
The focus would be on monitoring activity during those specific shifts, identifying patterns in stock movement and behaviour to establish who is involved.
We’ve got cash going missing from the business and I believe a staff member is taking it but I’ve got no proof — how do we confirm who is responsible?
Activity around the areas where losses occur can be observed over time to identify consistent behaviour linked to the issue.
Their daily routine can be tracked to confirm whether they are working or carrying out activities that contradict what has been reported.
I believe two employees are working together to take goods from our premises and I need proof before taking action — can that be properly investigated?
Coordinated behaviour can be identified by observing interactions and movement patterns over time to establish whether activity is linked.
Someone in our business is clearly abusing company time during working hours but I can’t prove it — how do we confirm what they’re actually doing during the day?
Working patterns and daily activity can be compared against reported hours to identify inconsistencies.
We suspect a staff member is accessing restricted areas in our workplace and possibly removing items — how do we confirm who is going where?
Access points and internal movement can be monitored to establish behaviour and responsibility.
The starting point is identifying the seller, then linking their online activity to real-world operations through deliveries, fulfilment methods, and associated addresses.
We’ve found counterfeit versions of our product being sold on marketplaces and social media — how do we prove who is actually supplying them?
Controlled purchases can be used to trace the supply chain back from the seller through delivery and fulfilment activity to identify the source.
I think a business is copying our products and selling them through a website and physical locations — how do we confirm what they’re doing?
Activity can be monitored across online platforms and physical premises to establish how goods are being marketed, distributed, and sold.
We believe fake versions of our products are being sold from a specific shop or address — can you confirm what’s happening at that location?
That location can be observed to confirm whether counterfeit goods are being stored, handled, or sold.
I think multiple online sellers are linked and distributing the same counterfeit products — can you find out if they’re connected?
Patterns in listings, fulfilment, delivery methods, and timing can be analysed to establish links between sellers.
Our products are appearing in places they shouldn’t be and we don’t know how they got there — how do we trace the source?
Distribution routes can be mapped through purchase, delivery, and handling activity to identify where the goods originated.
Evidence is built through consistent, objective observation and documentation over time.
I need to serve legal documents to my ex-partner but they are avoiding contact and I don’t know if they still live at the same address — what can I do?
Their current address can be confirmed before documents are served correctly, ensuring service is carried out properly.
A tenant has stopped paying rent and is ignoring all communication and we need to serve eviction papers — how do we ensure they receive them?
Service can be carried out at the property or other known locations linked to the individual.
Patterns of submissions and supporting documentation can be analysed to identify inconsistencies and pinpoint responsibility.
Our business is losing money and I suspect fraud in supplier invoices — how can I find out what’s happening?
Supplier invoices and payment patterns can be investigated to identify discrepancies and potential fraudulent activity.
I believe someone is using our company identity to commit fraud — how do I discover who it is?
Investigation can trace digital footprints, communications, and operational activity to link the fraudulent actions to the individual or entity.
A client has made suspicious transactions and I need to know if they are legitimate — how can this be checked?
Transactions can be reviewed, and supporting documents verified to confirm legitimacy and identify anomalies.
I suspect a partner or associate is misusing funds for personal gain — how do I uncover the truth?
Financial records and activity patterns can be analysed to establish misuse and identify the individual responsible.
Someone is claiming insurance or compensation under false pretences — how do I prove it?
Surveillance, documentation, and corroborating evidence can be gathered to verify claims and detect false statements.
We think an employee is colluding with a third party to divert funds — how do we find out what’s happening?
Coordinated behaviour can be tracked through financial audits, communication analysis, and observation of interactions.
I suspect identity theft is being committed against my business — how can we confirm and stop it?
Investigators can trace fraudulent activity, confirm misuse of information, and provide evidence to take action.
There are repeated unexplained losses in our accounts — how do we identify if fraud is involved and who is responsible?
Patterns of losses can be analysed alongside staff, supplier, and transactional data to uncover fraudulent activity.
I think someone is forging contracts or signatures in my business — how do I confirm this without tipping them off?
Documents and processes can be reviewed discreetly, and investigation can identify forgeries while maintaining operational secrecy.
I think my husband is cheating when he travels through Edinburgh airport for work and staying in hotels with someone else — how do I find out where he’s going and who he’s meeting?
Those trips can be monitored to track movements, locations, and interactions over time to confirm what is actually happening.
My wife says she’s working late but her behaviour has changed and I don’t believe she’s actually at work — how do I check where she’s going?
Evening movements can be tracked to confirm routine and whether it matches what has been reported.
Monitoring can focus on those specific times to build a clear picture of movements and behaviour.
Every investigative decision should be informed before it becomes operational.
We begin with a confidential assessment to determine whether uncertainty is real, emerging, or perceived — and only then establish what level of private investigation across Scotland, if any, will meaningfully resolve it.