Our Methods


Following the report or claim of activity members of our team conduct a  thorough and highly documented interview with the client/haunting victim. Documentation during this phase of the research is key, since our entire  investigation is based upon the claims and information we gather during our initial meeting. During the interview process we will want to speak with each family member/witness separately to ensure testimony that is calm and relaxed and untainted.  In addition to recording the client’s claims  (either audibly, visually or both) we also make note of several other key  factors such as:

The psychological state of the client

• The surroundings in which the activity was experienced

• The clients relationship with other people present in the active location

• The habits of the client, such as books, movies or any other activities they may engage in.

All of this data, along with any historic research we may have conducted prior to our meeting will be used to determine if this location and experience is qualified for continued investigation. Many times during these preliminary meetings we will find logical and explainable causes for the activity. On those cases that leave us in question with no logical explanation,  we  schedule further visits to the location and attempt to measure and  document additional occurrences the activity should they occur. In the event that we do capture evidence, our team of researchers will document various scientific attributes of the evidence we’ve collected, catalog the discovery in our archives and database  and submit it to the client in a detailed formal report.


In  preparation for the investigation our team may do all or most  of the following (depending upon the conditions of the location and the claims being made):

1.) Block any or all external lighting to the premises. – This is done to avoid external light contamination and is especially useful when claims of moving shadows or light anomalies are present. Prior to this step we may wish observe or record the external light entering the premises to identify if it is indeed a factor in the claims being made. 

2.) Disable or shut off any and all forms of wireless  communication on the property (including but not limited to, wireless/cordless phones, wireless radios, and wireless internet hubs).This is done to eliminate localized contamination of radio frequencies and electromagnetic interference that may cause  false equipment readings. It will also allow us to separate the normal internal electromagnetic conditions of the premises from those outside influences that may play a part in the activity. Prior to doing this, however, we will document all radio waves that are present on a daily basis.

3.) Power down any large EMF producing appliances or equipment– Appliances such as refrigerators, air-conditioners and microwave ovens etc. can produce large fields of strong EMF radiation which may occlude subtle natural fields in the same low frequency range that may be of value to our research. To expose these natural fields for study we may temporarily turn off such devices.

4.) Conduct an external radio wave survey and note  the positions of power lines, cell towers, and high powered devices. – Since frequencies can play a part in a variety of factors, the sources of these contaminants in the external environment are important to identify. So we will survey the area for any outside source  that may influence our research.

5.) Close any open windows and make note of any rattling or loose window and door frames. – Small gaps in windows and poor insulation can cause external breezes to enter the location. They can also cause temperature changes and possibly allow the inclusion of stray sounds or even harmful gasses.  Therefore it is important that we seal the property as best we can prior to the investigation.

6.) Set up audio/visual equipment in strategic locations  paying close attention to reflective surfaces near and around the visual devices. – This is standard procedure for any research team. Documenting the environment this way allows us to identify changes in the audio/visual spectrum. It also documents the location of people and devices in the environment should activity occur.

7.) Measure the distance from each IR camera to  the wall and to the closest object in view. (used for size calculations) Measurements and precise location of each device is vital to data/experience correlation. Therefore we make note of object in the room, or equipment and their relation to each other.


During the investigation our team members are dispersed in various  locations around the property. Each researcher records and time stamps (in writing) every activity from the smallest motion and noise to the most significant activity experienced. Personal feelings and thoughts are also recorded since these can at times be paranormal in nature. Each investigator carries clock or watch that is in perfect synchronization with the rest of the team and equipment.  Radio silence is typically  observed throughout most of the investigation process but 30 minute to one hour radio check-ins are scheduled to allow organization and safety among researchers. All of the equipment we use is set up to data log and record each event with a time and date stamp for later review. This method helps us by providing a clear chronological view of the investigation at a later time. Many times we find correlations and evidence  that was often missed during the investigation hours. During the investigation our team will record a variety of  atmospheric conditions and attempt to open lines of communication in the  event  that an intelligent energy is there. A variety of methods  are used to do this, some as simple as talking and others as  complex  as using specialized equipment and lighting.


All of the data we collect on an investigation is then reviewed and cataloged by our research team. The data and findings are  then entered into a detailed report and presented to the client in person. Simultaneously the  details and findings from each case  are entered in a password protected online database for viewing  and use by the rest of the team and the  client. Although the evaluation of evidence may take time, we can be  comfortable in the fact that the data collected and presented is accurate,  leaving open the  possibility that further discoveries about each case may be found at a future date.

Leave a Reply