FAQ

I have a passion to ensure that I'm meeting your expectations and enjoy working with people to get the best realistic results. I achieve this through commitment to my profession and through my continued professional development. By ensuring my skills and knowledge in the latest technology and industry best practices, I am able to achieve results you expect and deserve.

My experience, knowledge an skills enable me to provide an approach that is about working with you. Providing investigation and security services in government, for business and private individuals I have a diverse background that I can use to your advantage. I have worked domestically in Australia and overseas, navigating to particular concern or issue to achieve the outcome.

I provide investigation and security services to: Individuals & organisations; Small Business; Companies and Government agencies & departments (Federal, State & Local).

Root Cause Analysis (RCA) is an investigative method of problem solving used to identify the cause of a fault, problem or issue. One of the RCA methods used by Woods Investigation & Security Outcomes is TapRoot®

RCA is applied to methodically identify and correct the root causes of events, rather than to simply address the symptomatic result. Focusing correction on root causes has the goal of entirely preventing problem recurrence. RCA is typically used as a reactive method of identifying event(s) causes, revealing problems and solving them. Analysis is done after an event has occurred. Insights in RCA make it potentially useful as a pre-emptive method. In that event, RCA can be used to forecast or predict probable events even before they occur. While one follows the other.

I am committed to the integrity of my work and the values and ethical standards to provide a professional service. All investigation, surveillance and security activities are conducted with the utmost discretion, confidentially and within the law.

Remember: "If you are willing to bend the rules, you're willing to break them".

Factual investigation is the process of gathering information about the facts of a particular case, issue, or cause. This type of work might entail doing discovery—that is, obtaining access to potentially relevant documents and/or interviewing witnesses.

Information is obtained primarily through interviews, which may or may not necessitate the obtaining of a written statement, conduct of database searches or in conjunction with surveillance activities. The results of the investigations are compiled and presented in a report to the client. It is the facts that enable the client to make informed decisions. A fact, if accepted, determines that something did or did not occur, or that something did or did not exist.

Surveillance is the observation of a people, vehicles, places or objects to obtain information concerning activities or identities of individuals. Contemporary surveillance methods and techniques are used to strive for a successful outcome and the highest quality footage of activities for clients. Surveillance activities are conducted by a licensed operator working within legislative and privacy guidelines at all times.

Each surveillance task is tailored, planned and conducted to meet the needs of the client. Surveillance activities may be mobile, conducted on foot and/or by vehicle, or static. A range of photographic and video equipment is used to obtain surveillance imagery.

Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources)
Social media intelligence (SMI or SOCMINT) refers to the collective tools and solutions that allow organizations to monitor social channels and conversations, respond to social signals and synthesize social data points into meaningful trends and analysis based on the user's needs.