Skip to content
How We Operate | Imperial PI USA โ€” Remote Intelligence for US Clients
UK-Based Intelligence Firm | Serving US Clients Remotely & Nationwide
usa@imperialpi.org
Imperial PI US Operations
How We Operate

Intelligence Delivered.
Standards That Hold.

A clear account of how Imperial PI delivers remote investigative intelligence to US clients โ€” from overnight report turnaround and US admissibility standards through to chain-of-custody protocols and sworn declarations for American legal proceedings.

โœ“ 100% Remote & Legal โœ“ Court-Admissible Standards โœ“ Chain-of-Custody Provided โœ“ Overnight US Delivery โœ“ Sworn Declarations Available
On This Page

Five Pillars of How We Work

Each section below explains a core element of Imperial PI's operational model for US clients. Together, they define why our intelligence is trusted, legally defensible, and practically useful โ€” whether for a law firm, a corporation, or a private individual navigating a sensitive matter.

24โ€“72
Hour Basic Report Turnaround
50
US States Covered Remotely
100%
Lawful Open-Source Methods
6yr
Secure Case Record Retention
โ˜…
01 โ€” Operational Advantage

Overnight Intelligence

UK working hours. US morning delivery. A genuine competitive edge.

One of the most practical and frequently underappreciated advantages of instructing a UK-based intelligence firm for US work is the time-zone differential. When your US-based legal team, corporate client, or individual contact ends their working day on the East Coast, our team in the United Kingdom is beginning a full overnight research cycle. Intelligence commissioned by 5pm Eastern Time can be in your inbox before 9am the following morning โ€” fully documented, evidenced, and ready to act upon.

For law firms with urgent pre-filing research requirements, for corporate clients responding to fast-moving compliance events, or for individuals in time-sensitive personal matters, overnight delivery is not a luxury โ€” it is often the difference between being ahead of a situation and being reactive to it. Imperial PI structures every engagement with this operational advantage firmly in mind. Where overnight turnaround is a stated requirement, we confirm feasibility in writing at the scoping stage so expectations are set clearly from the outset.

The overnight model applies across our full range of remote services: background checks, skip tracing, OSINT research packages, entity due diligence, litigation support research, and digital evidence preservation. Work that requires multi-day compilation โ€” such as comprehensive corporate intelligence reports or complex asset tracing โ€” is broken into deliverable phases, with interim intelligence packages provided overnight where the instruction allows it. Our clients never wait longer than necessary for actionable intelligence.

๐Ÿ‡บ๐Ÿ‡ธ
New York (ET)
--:--
US East Coast
๐Ÿ‡บ๐Ÿ‡ธ
Los Angeles (PT)
--:--
US West Coast
๐Ÿ‡ฌ๐Ÿ‡ง
London (GMT/BST)
--:--
Imperial PI Base
Overnight Delivery: What Is Included
  • Confirmed overnight scope agreed at instruction stage
  • Research commences same evening upon signed engagement
  • Draft intelligence package delivered before 9am ET
  • Timestamped findings with source attribution
  • Formatted for immediate attorney or executive review
  • Follow-up call available at US business opening hours
Services Available for Overnight Delivery
  • Background & identity checks (24โ€“72hr standard)
  • Skip tracing and locate research
  • Person investigations and digital footprint reports
  • Preliminary OSINT and entity screening
  • Litigation pre-search intelligence
  • Online harassment evidence preservation
๐Ÿ”’
Secure Delivery

All reports are transmitted via encrypted, secure delivery. No intelligence is sent over unencrypted email unless specifically requested and accepted in writing by the client.

๐Ÿ“ž
Client Instruction
Scope agreed by 5pm ET
โœ‰
Engagement Confirmed
Contract & deposit
๐ŸŒ‡
UK Overnight Research
While US sleeps
๐Ÿ“„
Report Compiled
Documented & evidenced
๐ŸŒŸ
US Morning Delivery
Before 9am ET
โš–
02 โ€” Legal Standards

Admissibility & Compliance

Intelligence gathered to US evidentiary standards โ€” lawfully, from the UK.

A common and entirely reasonable question from US attorneys and corporate clients is whether intelligence gathered by a UK-based firm will be usable in American legal proceedings. The short answer is yes โ€” subject to proper documentation and your attorney's review of the specific forum โ€” but the longer answer is important. Admissibility in US courts depends primarily on how evidence was gathered, how it was documented, and whether it can be authenticated. It does not depend on the geographic location of the investigator.

Imperial PI structures every report and evidence package with US admissibility considerations built in from the start. All research is conducted using lawful, open-source, and publicly accessible methods. We do not use deceptive pretexting, we do not intercept private communications, and we do not access private systems or data without authorisation. Every piece of intelligence in a delivered report is traceable to a lawful source, and we document that source at the time of collection โ€” not retrospectively. This approach means that when your attorney reviews our product, they are looking at intelligence that was gathered in a manner consistent with US rules governing third-party investigators.

For matters before US federal or state courts, our evidence packages are formatted to support attorney authentication. Where a declaration of the investigator is required to accompany the evidence โ€” as is the case in many civil proceedings and motions โ€” we are able to provide a signed written declaration (see the Sworn Declaration section below). We also comply with the requirements of the Federal Rules of Evidence in terms of how we preserve, timestamp, and document electronically stored information gathered during investigations. For family law proceedings, our evidence packages are structured with the specific disclosure and authentication requirements of the relevant state court in mind, where those requirements are communicated to us at the scoping stage.

On data compliance: as a UK-based firm, we operate under the UK Data Protection Act 2018 and UK GDPR. We are registered with the UK Information Commissioner's Office (ICO). When we collect personal data about US subjects as part of an engagement, we do so in compliance with our UK legal obligations โ€” and we take care to ensure that the data we collect is limited to what is necessary for the stated investigative purpose. We do not sell data, we do not repurpose client data, and we maintain strict records of what we hold and why. US clients can request a data summary or deletion in line with our privacy policy at any time.

โœ“ Lawful Methods Only โœ“ No Unlawful Pretexting โœ“ Source-Attributed Reports โœ“ FRE-Compatible Packaging โœ“ ICO Registered โœ“ UK GDPR Compliant
US Admissibility Checklist
  • All sources open, lawful, and publicly accessible
  • No interception of private communications
  • No unauthorised access to accounts or systems
  • Evidence timestamped at point of collection
  • Source documentation preserved alongside findings
  • Full chain-of-custody record on every instruction
  • Reports formatted for attorney review and filing
  • Sworn declaration available on request
Regulatory Framework
  • UK Data Protection Act 2018 / UK GDPR
  • ICO Registration โ€” active and maintained
  • ABI Code of Conduct โ€” professional standards body
  • Professional Indemnity Insurance held
  • Federal Rules of Evidence (FRE) โ€” report formatting
  • No US PI licence required โ€” remote OSINT scope
โš–
Attorney Collaboration

We work directly with US attorneys to ensure our intelligence packages meet the specific formatting, disclosure, and authentication requirements of their proceedings. Early engagement with your legal team ensures the most useful product.

๐Ÿ”
Lawful Collection
Open-source and public record methods only
๐Ÿ•
Timestamped
Every item captured with date and time
๐Ÿ“„
Source Attributed
Origin of every finding documented
๐Ÿ”’
Chain Preserved
Custody log from collection to delivery
โš–
Attorney-Ready
Formatted for US legal proceedings
โ—†
03 โ€” Investigative Approach

Our Methodology

Intelligence-led. Structured. Repeatable. Defensible in any forum.

Every engagement conducted by Imperial PI follows a structured, intelligence-led methodology that ensures consistency of output, legal defensibility of process, and maximum evidential value for the client. We do not operate on instinct or improvise our approach to each case. We apply a defined research framework that begins with scoping, proceeds through structured open-source intelligence gathering, incorporates regular quality review at each stage, and concludes with a formally written intelligence report supported by the evidence gathered.

Our research methodology for US engagements draws on open-source intelligence (OSINT) โ€” the systematic collection and analysis of information from publicly available sources including public records, court documents, corporate filings, property records, social media platforms, online databases, digital archives, and the wider open web. We also utilise specialist commercial databases accessible to licensed investigators and professional research services where the content is lawful to access and proportionate to the purpose. All methods are legal. All sources are documentable. None of our work involves accessing systems, accounts, or data without authorisation โ€” activities that are not only unlawful but would render any intelligence gathered in that manner inadmissible and professionally indefensible.

Before any research begins, a written scope of work is agreed with the client and confirmed in the client agreement. This sets out what we are looking for, the specific methods to be deployed, the time frame, and the format of deliverables. Scope changes during an engagement are always agreed in writing before additional work commences. We do not expand beyond the agreed scope without client consent, and we do not pursue avenues of inquiry that were not authorised โ€” regardless of what tangential material we may encounter. This rigour protects the client as much as it protects us. Intelligence gathered outside an authorised scope can create legal and compliance risk for the client themselves, particularly in US litigation contexts where opposing parties may challenge the basis of how evidence was obtained.

At the conclusion of each engagement, the client receives a professionally written intelligence report โ€” not raw data, not a spreadsheet, and not an unstructured email. Reports are structured with an executive summary, a findings section organised by subject matter, source references for each key finding, a methodology section, and a chain-of-custody declaration. This format ensures the report can be reviewed, understood, and actioned by attorneys, executives, and courts without supplementary explanation.

Research Methods Used
  • Open-source intelligence (OSINT)
  • Public records research (federal and state)
  • Court and litigation record searches
  • Corporate and entity filings analysis
  • Property and asset record research
  • Social media intelligence and archiving
  • Digital footprint and online presence mapping
  • Deep web and dark web monitoring (where in scope)
  • Blockchain and transaction analysis (crypto tracing)
  • Commercial database research (licensed access)
Methods We Never Use
  • Interception of private communications
  • Unlawful computer access or hacking
  • Deceptive pretexting constituting a criminal offence
  • Physical surveillance in the United States
  • Unlicensed US field operations
  • Bribery or corruption of sources

The Research Process โ€” Step by Step

01
Confidential Consultation
Free, no-obligation consultation to understand the matter, assess feasibility, and establish the lawful purpose of the instruction. Available by email, phone, or video call to suit US time zones.
02
Strategic Scoping
Written scope of work agreed before any research commences. Methods, timeline, deliverables, and fees confirmed in the client agreement. No surprises, no scope creep without consent.
03
Subject Briefing
We conduct a structured briefing to collect all relevant subject information โ€” names, addresses, known identifiers, relevant dates, and any supporting intelligence the client holds. Accuracy at this stage improves efficiency throughout.
04
Structured Intelligence Gathering
Research executed according to the agreed scope using lawful OSINT, database, and digital methods. Evidence captured, timestamped, and sourced as it is collected. No retrospective documentation.
05
Quality Review
All findings are reviewed internally before reporting. We cross-reference sources, flag conflicts or uncertainties, and assess the reliability grade of the information before it reaches the client.
06
Intelligence Report Delivered
Formally structured written report with executive summary, findings, source references, methodology statement, and chain-of-custody record. Delivered securely in a format suitable for legal or business use.
07
Debrief and Follow-Up
Client walkthrough of findings on request. Any supplementary research, follow-on instructions, or sworn declaration requirements handled at this stage. Case records retained securely for six years in compliance with UK data retention obligations.
๐Ÿ”’
04 โ€” Evidential Integrity

Chain of Custody

Unbroken evidential integrity from collection through to delivery and beyond.

Chain of custody is the documented, unbroken record of how evidence was collected, handled, stored, and transferred from the point of creation to its use in legal or business proceedings. In the context of digital intelligence and OSINT-based investigations, a properly maintained chain of custody is what separates useful intelligence from inadmissible or contestable evidence. Imperial PI applies chain-of-custody principles as standard on every instruction โ€” not selectively, and not only when litigation is anticipated.

For US legal proceedings, the chain-of-custody requirement is well-established. Under the Federal Rules of Evidence, electronically stored information (ESI) must be authentic โ€” meaning a party must be able to demonstrate that the evidence is what it purports to be, and that it has not been altered since collection. For digital evidence gathered during an investigation, this means capturing information in a manner that preserves its original state, recording the time and method of collection, documenting who accessed the material, and ensuring its secure storage until it is delivered to the client and their attorney. We meet all of these requirements as a matter of operational standard.

In practice, our chain-of-custody documentation for each piece of digital evidence includes: the date and time of collection (UTC and converted to the relevant US time zone); the source URL, database, or record set from which it was obtained; the method of preservation (screenshot, archive capture, or document download with metadata preserved); the name and role of the team member who collected it; and a log of every occasion on which the evidence was accessed or transferred from collection to delivery. Where screenshots are used, we capture the full URL and timestamp visible in the browser. Where documents are downloaded, we preserve the original file metadata. Where social media content is captured, we use archiving tools that record the live state of the page at the moment of collection.

The chain-of-custody record is included in the final intelligence report as a standalone section and is also available as a separate document for use as an exhibit in legal proceedings. If your matter requires the chain-of-custody documentation to be presented in a specific format mandated by a US court or arbitral tribunal, we ask that you provide us with that template at the scoping stage and we will comply with it. We have previously structured chain-of-custody documentation to meet the requirements of federal civil proceedings, state court disclosure rules, and arbitration proceedings administered under AAA and JAMS rules.

Chain-of-Custody Record Includes
  • Date and time of collection (UTC + US time zone)
  • Source identification โ€” URL, database, or record reference
  • Method of capture โ€” screenshot, archive, or download
  • Collector name and role
  • Access log from collection to client delivery
  • Hash verification where applicable (digital files)
  • Secure storage confirmation
  • Delivery method and recipient confirmation
Evidence Preservation Standards
  • Screenshots with visible URL and timestamp
  • Web archiving with live-state capture tools
  • Document metadata preserved on all downloads
  • Social media content archived at point of collection
  • Video and image files stored with original metadata
  • No post-collection editing of source material
โš–
Court-Specific Formats Available

If your US court, arbitration panel, or regulatory proceeding requires chain-of-custody documentation in a specific prescribed format, provide us with that template at instruction stage and we will produce accordingly.

๐Ÿ”
Collection
Timestamped at point of capture
๐Ÿ“„
Documentation
Source, method, collector logged
๐Ÿ”’
Secure Storage
Encrypted, access-controlled
๐Ÿ“Š
Quality Review
Integrity verified pre-report
๐Ÿ“ค
Delivery
Secure transfer, receipt logged
โš–
Legal Use
Admissible, authenticated, traceable
๐Ÿ“
05 โ€” Legal Authentication

Sworn Declaration

Investigator declarations to support US civil proceedings, motions, and filings.

In many US legal proceedings โ€” particularly in federal civil litigation, state court filings, and motions requiring the authentication of third-party evidence โ€” attorneys are required to submit a supporting declaration from the individual who gathered or can authenticate the evidence in question. As the investigators who collected, preserved, and documented the intelligence in our reports, Imperial PI is in a position to provide a written sworn declaration on request as a supplementary deliverable to any completed engagement.

Our sworn declarations are prepared in compliance with 28 U.S.C. ยง 1746, which governs unsworn declarations under penalty of perjury for use in US federal proceedings. A declaration prepared under this provision carries the same legal weight as a notarised affidavit โ€” without requiring a notary public โ€” provided it contains the statutory declaration of truthfulness and is signed by the declarant. For state court proceedings where a notarised affidavit is specifically required rather than an unsworn declaration, we are able to arrange notarisation of the declaration through established UK notarial procedures, producing a document that can be apostilled under the Hague Convention for use in US state proceedings.

The declaration covers: the identity and professional credentials of the investigator; the nature of the engagement and the scope of the research conducted; the specific methods used to gather each category of evidence; the dates on which evidence was collected; the chain-of-custody record for each item of evidence being authenticated; and a statement that the evidence was gathered lawfully, using open-source and publicly accessible methods, without interception of private communications or unauthorised access to any system or account. Where the declaration accompanies a specific exhibit โ€” for example, a screenshot of social media content or a preserved digital document โ€” it will include a direct reference to that exhibit and confirm the manner and timing of its capture.

Sworn declarations are provided as a standalone document formatted for filing as an exhibit or annexure to the relevant court document or motion. We ask that your instructing attorney advises us of the specific court, the nature of the proceeding, and any prescribed format or content requirements at the time the declaration is requested. Where a declaration is required urgently to meet a filing deadline, we will prioritise its preparation and aim to deliver within 24 hours of receiving the full briefing from your legal team. There is an additional fee for sworn declaration preparation, confirmed in writing at the time of instruction.

Declaration Contents
  • Investigator identity and professional credentials
  • Engagement scope and research mandate
  • Methods employed and sources consulted
  • Evidence collection dates and timestamps
  • Chain-of-custody confirmation per exhibit
  • Statement of lawful collection methods
  • Statutory truthfulness declaration (28 U.S.C. ยง 1746)
  • Signed by lead investigator
Declaration Formats Available
  • 28 U.S.C. ยง 1746 โ€” unsworn federal declaration
  • UK-notarised affidavit with Hague apostille
  • State-specific format (attorney template provided)
  • AAA / JAMS arbitration format
  • Exhibits annexed as required by the proceeding
โŒ›
24-Hour Urgent Turnaround

Where a declaration is required urgently to meet a filing deadline, we prioritise its preparation and target delivery within 24 hours of receiving a full briefing from your legal team. Fees confirmed in writing at instruction stage.

How to Request a Sworn Declaration

01
Complete the Underlying Investigation
A sworn declaration supplements a completed intelligence engagement. Ensure the underlying research has been delivered and reviewed before requesting the declaration.
02
Advise of Court and Proceeding
Provide us with the court name, case number, nature of the proceeding, and any applicable local rules or prescribed form for declarations or affidavits in that jurisdiction.
03
Identify Specific Exhibits
Confirm which items of evidence from the report require authentication in the declaration. Where possible, provide the exhibit references your attorney has assigned to each item.
04
Declaration Prepared and Reviewed
We draft the declaration, cross-reference against the original case records and chain-of-custody log, and review for accuracy before signing.
05
Delivered to Instructing Attorney
Signed declaration delivered securely. Where apostille is required, we arrange notarisation and advise on expected turnaround for apostille attachment through UK channels.
Our Credentials

Verified. Accountable. Professional.

Every engagement is underpinned by formal accreditation, regulatory compliance, and independently verified professional standards. Our credentials are not decorative โ€” they define the framework within which every instruction is handled.

Professional Standard
ABI Code of Conduct

Imperial PI operates in full compliance with the Association of British Investigators Code of Conduct โ€” the UK's foremost professional standard governing lawful methods, data handling, and ethical investigative conduct.

theabi.org.uk โ†’
Regulatory Compliance
ICO Registration

Registered with the UK Information Commissioner's Office under the UK GDPR and Data Protection Act 2018. All personal data processed during engagements is handled lawfully, securely, and proportionately.

ico.org.uk โ†’
Financial Protection
Professional Indemnity Insurance

Full Professional Indemnity Insurance and Public Liability Insurance held and maintained on all active engagements. Certificate of insurance available on request.

View Certificate โ†’
Evidential Standard
Court-Admissible Intelligence

All reports and evidence are gathered, preserved, and documented to civil and criminal admissibility standards. Full chain-of-custody provided on every instruction, regardless of whether legal proceedings are anticipated.

Our Chain of Custody โ†’
Data & Privacy
UK GDPR Compliant

All engagements are conducted in strict compliance with the UK Data Protection Act 2018. Case records retained for six years then securely destroyed. Your data is never shared with third parties.

Privacy Policy โ†’
Client Accountability
Formal Complaints Policy

A published formal complaints policy with clear escalation procedures. All complaints acknowledged within two working days and resolved in writing. Our commitment to accountability is unconditional.

Complaints Policy โ†’

Ready to Instruct Imperial PI?

All enquiries are treated with absolute confidentiality. There is no obligation. Speak directly with a lead investigator, receive honest advice about what is achievable, and receive a written proposal before any work begins.

โœ“ Free initial consultation โ€” no obligation โœ“ All fees agreed in writing before work begins โœ“ Response within 1 business day โœ“ Absolute confidentiality guaranteed