Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Surveillance Investigators

Surveillance & Surveillance Investigators in Washington State

In the news lately, the word surveillance often carries a negative connotation due to accusations of misuse by government and big business. In professional private investigations, surveillance is something very different: it is the lawful, ethical, evidence-focused documentation of observable facts—conducted with strict attention to privacy boundaries and admissibility.

Washington State Investigators is a licensed Washington private investigation agency, fully insured (not merely bonded), and has operated in Washington State for 17+ years. We specialize in surveillance for workers’ compensation injury fraud, personal injury, infidelity/adultery, child custody & parenting plan matters, and other cases where objective documentation can change outcomes.

Educational notice (please read):

This page is a knowledge base for clients and working investigators. It is not legal advice. Laws, agency rules, and court decisions change—consult an attorney for case-specific guidance.

Back to top

What Surveillance Is (Done Correctly) — and What It Is Not

What surveillance is: the monitoring or observation of behavior, activities, and people for a lawful purpose, documented in a way that is credible to attorneys, insurers, employers, and courts.

What surveillance is not: trespassing, harassment, intimidation, unlawful interception of communications, unlawful access to accounts/devices, or “electronic monitoring” without legal authority and consent.

Plain-English standard: Good surveillance is boring on purpose—clean facts, clean timelines, clean legality. If a technique creates legal risk, it creates evidence risk.

Back to top

Covert vs. Overt Surveillance

Covert surveillance

Covert surveillance is observation and documentation performed in a way that is not obvious to the subject. The purpose is to record objective facts without influencing behavior or triggering “performance” for the camera. Covert surveillance is commonly used when evidence integrity depends on natural behavior and when the objective is documentation (not deterrence).

  • Typical uses (PI work): workers’ comp and personal injury activity documentation, infidelity patterns, custody/parenting-plan compliance issues, employee theft, and other matters requiring unbiased fact gathering.
  • Key constraints: lawful vantage points, avoid trespass, avoid unlawful recording/interception of communications, minimize collateral intrusion.

Overt surveillance

Overt surveillance is observation or monitoring that is intentionally visible or known. Its main function is usually deterrence, safety, and policy compliance rather than covert evidence collection. In the security context, overt surveillance often includes clearly visible cameras, signage, or an obvious monitoring posture.

  • Typical uses (security/compliance): deterring theft/trespass, improving safety, documenting incidents, and establishing a visible monitoring presence.
  • Tradeoff: it can change behavior immediately—which may be good (deterrence) or bad (it can reduce evidentiary value if you need natural behavior).

Practical takeaway: Choose covert when you need unbiased documentation; choose overt when you need deterrence and an obvious safety posture. (Both must stay inside legal boundaries.)

References:
PI Now – Overt vs. Covert / Mobile vs. Stationary
CCS Risk – Covert vs. Overt Methods (overview)

Back to top

How Professional Surveillance Works (High-Level Process)

This section is intentionally high-level and educational. Professional surveillance is built around planning, lawful observation, and clean documentation—not “spy movie tricks.”

1) Define the objective (the “proof point”)

  • What needs to be documented (activity level, associations, location, compliance, pattern, timeline)?
  • What does “success” look like in a report to an attorney, adjuster, HR, or court?
  • What information is irrelevant or overly intrusive (and should be avoided)?

2) Use lawful vantage points

Professional surveillance stays on the right side of trespass, privacy, and recording laws. Evidence is only as useful as the legality behind it.

3) Document continuity (time, context, and transitions)

Strong evidence shows who, what, when, where, and context—so a third party can understand events without “trust me bro” narration.

4) Report like it will be challenged (because it will)

Good reporting is objective, chronological, and defensible. It avoids exaggeration, speculation, or inflammatory language.

Back to top

Types of Surveillance

Surveillance on foot

Foot surveillance is common in dense environments (downtown areas, malls, public events) where vehicles are impractical. Professional surveillance focuses on lawful positioning, continuity of observation, and accurate documentation—without engagement, escalation, or behavior that could be misinterpreted as harassment.

Vehicle surveillance

Vehicle surveillance is used when movement and stops matter. Professional standards prioritize safety, legality, and discretion. If conditions create a meaningful risk of detection, misunderstanding by the public, or unsafe driving, the correct move is to disengage and re-plan.

Static (stationary) surveillance

Observation from a lawful fixed position to document activity patterns (arrivals/departures, visitor patterns, repeated behaviors) over time.

Mobile surveillance

Observation that involves movement between locations as events unfold, while maintaining lawful posture and documentation continuity.

Periodic / pattern surveillance

Short, targeted observation windows used to establish schedules and recurring behaviors—often more cost-effective than continuous operations.

Compliance-oriented surveillance

Surveillance performed to document compliance or non-compliance with defined rules/orders (work restrictions, parenting plan terms, no-contact directives), within lawful scope and relevance.

Protective surveillance (support role)

Surveillance conducted to support a safety posture (e.g., awareness around a protected person or location), often paired with threat assessment concepts and reporting.

Overt security monitoring (deterrence surveillance)

Visible monitoring measures intended to deter wrongdoing and document incidents (common in security contexts where the goal is behavior change and prevention).

Undercover / role-based observation (case-dependent)

Situational observation where the investigator is present in a role consistent with the environment. This is strictly case-dependent and must remain lawful (no illegal impersonation, no unlawful access, no harassment).

Reference (taxonomy overview):
PI Now – Mobile vs. Stationary; Overt vs. Covert

Back to top

Video & Photo Documentation

Video and photo documentation must be captured and presented in a way that is accurate, fair, and usable. Clear identification matters, but context matters too. The best evidence typically shows identity + context + continuity.

  • Identity: subject identification and relevant associations (where lawfully observable).
  • Context: wide-angle views that show location and surrounding environment.
  • Continuity: timestamps and notes that explain transitions so a third party can understand what occurred.

About timestamps, metadata, and “date stamps”

In modern workflows, the strongest approach is consistent timekeeping + consistent file handling + consistent reporting. Many cameras embed metadata; investigators also maintain contemporaneous notes/logs to support the timeline.

Back to top

Pre-Surveillance Prep (Perp Work)

Prep work determines whether surveillance produces usable evidence or just hours of expensive nothing. Done right, prep reduces cost, increases capture probability, and lowers legal/operational risk.

For clients: what to provide (fastest way to save time and money)

  • Recent photos and a clear physical description.
  • Vehicle details (make/model/color/plate if known) and common locations.
  • Known schedules, routines, and “high probability” windows.
  • Clear objectives: what must be documented and why it matters.

For investigators: build a defensible plan (high level)

  • Confirm lawful boundaries and permitted methods for the jurisdiction.
  • Define observation points and contingencies (without creating hazards or intrusions).
  • Plan documentation: logs, timestamps, continuity notes, exhibit labeling.
  • Minimize collateral intrusion: collect what matters, skip what doesn’t.

Back to top

Blending In: Clothing, Presence & Staying Unremarkable

Blending in is not “disguise.” It’s being forgettable. The public remembers what looks out of place. Subjects notice what repeats.

Why clothing matters (client-facing explanation)

  • You’re managing memorability: loud outfits, unique logos, and “tactical” looks get remembered.
  • You’re matching the environment: a suit works in one setting; it screams “outsider” in another.
  • You’re reducing friction: looking normal reduces the chance of public attention or misunderstandings.

Professional principle: be a chameleon

Dress to match the environment so your presence is unremarkable. Simple layers (jacket/hat) can help maintain consistency across locations without becoming “noticeable.”

Operational ethics note: Professional surveillance avoids confrontation. If circumstances push toward conflict, the correct move is disengage and document—then re-plan.

Back to top

Surveillance Detection (Venue / Event / Location Vetting)

Surveillance detection is a specialized discipline focused on identifying whether a person, venue, route, or event is being observed for hostile, criminal, or disruptive intent. It is commonly used in executive protection, critical infrastructure protection, and event security planning. The objective is not “following someone,” but threat awareness and prevention through purposeful observation and reporting.

Common uses

  • Event and venue vetting: assessing a location before a party, public event, or high-profile meeting to identify safety concerns, suspicious activity patterns, or potential surveillance targeting the event.
  • Protective operations support: supporting executive protection by improving situational awareness around venues and movements.
  • Facility-focused prevention: identifying indicators of pre-operational surveillance around sensitive sites.

How it differs from traditional PI surveillance

  • Different objective: detection is about identifying and reporting potential surveillance activity; traditional PI surveillance is about documenting a subject’s conduct.
  • Different skill set: baseline-building, pattern recognition, disciplined note-taking, rapid reporting, and coordination with security/management or law enforcement when appropriate.
  • Different deliverables: findings summaries, risk notes, observation logs, and recommendations for safety posture—rather than a “subject activity” report.

Legal/ethics note: Surveillance detection must remain lawful (no trespass, no harassment, no unauthorized interception of communications). It is observational and preventive by nature.

References:
CISA – Surveillance Detection Principles (AWR-940)
DHS CDP – Surveillance Detection for Bombing Prevention (PER-346)
Training Camp – Surveillance Detection definition (glossary)

Back to top

Deliverables, Reporting & Court Use

Surveillance is only as valuable as the reporting and how evidence is preserved. Deliverables should be designed for clarity and credibility.

Typical deliverables

  • Written investigative report with chronological observations.
  • Time-referenced exhibits (photos/video) curated to match the report narrative.
  • Case coordination with counsel/insurers when applicable (scope and objectives defined up front).

What makes evidence usable

  • Lawful collection: obtained from lawful vantage points and lawful methods.
  • Clarity: identity + location + activity + timing.
  • Continuity: reasonable explanation of transitions (what happened between clips/stops).
  • Neutral language: facts first; conclusions reserved for the decision-maker.

Back to top

Surveillance, Privacy & Legal Boundaries (WA + Federal)

Many people worry about surveillance and privacy—and they should. The difference is that licensed investigators operate under defined legal boundaries. Professional surveillance is designed to document relevant facts while avoiding intrusion into protected spaces and private communications.

Washington is strict about recording private communications

Washington’s privacy/recording laws are a major reason professional surveillance often focuses on video documentation from lawful vantage points and avoids audio capture unless consent and legality are clear.

Educational links:
RCW 9.73 (Privacy, violating right of)
RCW 9.73.030 (Recording private communications)

Cybercrime and “account access” problems

Many “digital surveillance” requests are actually requests for illegal access. Unauthorized access to systems/accounts can trigger state and federal exposure—and can destroy admissibility.

Educational links:
RCW 9A.90 (Washington Cybercrime Act)
RCW 9A.90.040 (Computer trespass 1st)
RCW 9A.90.050 (Computer trespass 2nd)

Federal “interception” and “stored communications” limits

Federal law also restricts interception of communications and unauthorized access to stored communications.

Educational links:
18 U.S.C. § 2511 (Interception of communications)
18 U.S.C. § 2701 (Unlawful access to stored communications)
18 U.S.C. § 1030 (CFAA)

Modern surveillance concerns: ALPR and facial recognition

Modern privacy concerns include technologies like automatic license plate readers (ALPR) and facial recognition. Washington has a statutory framework governing government use of facial recognition services.

Educational link:
RCW 43.386 (Facial Recognition – WA framework)

Professional licensing (credibility and accountability)

Washington regulates private investigators under RCW 18.165. Clients should verify licensing and confirm an agency’s insurance/coverage before engaging services.

Educational link:
RCW 18.165 (Private Investigators)

Back to top

GPS Use (Strict Policy: Client-Owned Vehicles Only)

Policy: GPS may be used only on client-owned vehicles with the client’s written permission. We do not deploy GPS where authorization is unclear.

Standard: No electronic monitoring is used without permission from the subject unless a method is explicitly authorized under applicable U.S. and Washington law (for example: court authority / lawful process handled through counsel).

Educational link:
RCW 9A.46.110 (Stalking – includes electronic tracking device language)

Back to top

Electronic Monitoring & Digital “Surveillance”

This is where many cases go off the rails. Clients often ask for “monitoring” that is not lawful without consent or proper legal authority. Professional investigators do not hack, intercept communications, or access accounts without authorization. Digital evidence must be obtained through lawful methods that survive scrutiny.

What is typically NOT lawful (and we do not do)

  • Unauthorized access to email, social media, cloud accounts, or devices (password guessing, using saved logins without permission, bypassing security, spyware/keyloggers without lawful authority).
  • Intercepting communications in transit (capturing messages as they are sent/received, live monitoring, or interception tools).
  • Covert monitoring apps installed on a subject’s device/accounts without clear consent and lawful authority.
  • Obtaining provider-held content (texts/emails/account contents) without lawful process (typically requires attorney-led legal process/court authority).

Why (the law in plain English)

  • WA recording/interception restrictions: Washington generally requires consent of all parties to record private communications, with limited exceptions.
  • WA unauthorized access restrictions: Unauthorized access to computer systems/databases can constitute computer trespass under WA law.
  • Federal interception restrictions: Federal law restricts interception of wire/oral/electronic communications.
  • Federal stored communications restrictions: Federal law restricts unlawful access to stored communications.

Educational links:
RCW 9.73.030
RCW 9A.90.040
RCW 9A.90.050
18 U.S.C. § 2511
18 U.S.C. § 2701
18 U.S.C. § 1030

What IS lawful and commonly used (high-level, defensible methods)

  • Open-source intelligence (OSINT): collecting and preserving publicly available information (public posts, public profiles, public records, public business filings) using proper documentation and preservation practices.
  • Consent-based review: reviewing information that a lawful account/device owner provides with clear authorization (best practice: written consent and clear scope).
  • Attorney-led legal process: when appropriate, evidence may be obtained via lawful discovery tools and court-authorized processes.
  • Evidence preservation: documenting what is publicly observable now so it doesn’t “mysteriously disappear” later.

Standard (yours and ours): No electronic monitoring without permission from the subject, unless a method is explicitly authorized under applicable U.S. and Washington law (e.g., court authority / lawful process handled through counsel).

Back to top

Collateral Intrusion

Collateral intrusion is the collection of unnecessary information about uninvolved third parties. Professional surveillance minimizes collateral intrusion by narrowing scope, using lawful vantage points, and collecting only what supports the case objective. The best surveillance is the minimum surveillance required to prove the point.

Back to top

Surveillance FAQ (30 Questions & Answers)

1) What is surveillance in a private investigation context?

Surveillance is the lawful observation and documentation of behavior, activities, locations, and associations to establish objective facts that can be evaluated by attorneys, insurers, employers, and courts.

2) Is surveillance legal in Washington State?

It can be legal when conducted from lawful vantage points and without violating privacy/recording laws, trespass laws, or other restrictions.

3) What makes surveillance “court-ready”?

Lawful collection, clear date/time continuity, accurate reporting, relevant context, and evidence that does not rely on assumptions or sensational claims.

4) Can a private investigator record video in public?

Generally, video from lawful vantage points is lower risk than recording private communications, but investigators must avoid trespass and protected private spaces.

5) Can a private investigator record audio in Washington State?

Washington generally requires consent of all parties to record private communications, with limited statutory exceptions. If consent isn’t clear, audio capture should not occur.

6) If you film video, can the camera capture audio accidentally?

Accidental audio can still create legal and admissibility issues in Washington. Best practice is to disable audio unless lawful consent and scope are clear.

7) Can you conduct surveillance inside someone’s home or private interior space?

No. Surveillance must avoid intrusion into protected private spaces and must not involve trespass or invasive viewing.

8) Can you trespass to obtain evidence?

No. Trespass can create criminal exposure and undermine the credibility and usability of evidence.

9) Can you “hack” a phone or social media account to get messages?

No. Unauthorized access to devices/accounts or stored communications can violate state and federal law.

10) Can you access someone’s email, texts, DMs, or cloud data without permission?

No. Non-public account content generally requires consent from the account owner or lawful legal process handled through counsel.

11) Do you perform electronic monitoring without permission from the subject?

No. Our standard is consent-only for electronic monitoring unless a method is explicitly authorized by applicable U.S. and Washington law (e.g., court authority).

12) Can you use GPS tracking?

Yes, but only under our strict policy: on a client-owned vehicle with written client permission, and only where authorization is clear and lawful.

13) Can you place a tracker on a vehicle the client does not own?

No.

14) What cases most commonly use surveillance?

Workers’ comp injury fraud, personal injury, infidelity/adultery, child custody/parenting plan matters, employee theft, harassment documentation (lawful scope), and other civil investigations.

15) How long does surveillance take?

Some cases can be resolved in a targeted session; others require multiple sessions to document patterns. It depends on the subject’s routine and the proof required.

16) What does surveillance typically cost?

Cost depends on total hours, complexity, travel, number of investigators required for continuity/safety, and reporting requirements.

17) Is “24/7 surveillance” realistic?

It is rarely efficient or necessary. Targeted windows based on prep work usually produce stronger results at lower cost.

18) What information should I provide before surveillance begins?

Current photos, vehicle description, likely locations, schedule windows, and the specific behaviors you need documented.

19) Why is pre-work (prep) important?

Prep reduces cost, increases the probability of capturing relevant activity, and helps avoid misidentification and operational mistakes.

20) Will the subject know they’re being surveilled?

Professional surveillance aims to minimize detection, but no ethical investigator guarantees invisibility. Safety and legality come first.

21) Can surveillance prove infidelity/adultery?

It can document patterns, associations, and relevant overnights where legally observed—providing objective evidence for counsel and clients.

22) Can surveillance help in child custody or parenting plan cases?

Yes, when it focuses on legally relevant issues such as safety, stability, activities, and compliance with orders—not trivial disputes.

23) Can surveillance support workers’ comp fraud investigations?

Yes. Surveillance can document activities that may be inconsistent with claimed limitations, when performed lawfully and reported accurately.

24) Can surveillance help in personal injury cases?

Yes. It can document activity levels and mobility that may be relevant to claimed damages or limitations.

25) What deliverables will I receive?

A written investigative report with time-referenced observations and supporting photos/video exhibits curated for clarity and relevance.

26) Do you provide raw footage?

Case-dependent. Many matters benefit from curated exhibits plus a clear report; raw footage can be provided when appropriate and requested.

27) How quickly will I receive the report?

Often within days of an operation, depending on case complexity and deadlines.

28) Do you coordinate with attorneys and insurers?

Yes. Surveillance objectives and reporting formats can be aligned to legal strategy and deadlines.

29) What is surveillance detection and do you offer it?

Yes. Surveillance detection assesses whether a venue/event/route/person may be under observation. It is preventive and safety-oriented with different skill requirements than subject surveillance.

30) Are you licensed and fully insured?

Yes. Washington State Investigators is a licensed Washington investigative services agency and is fully insured (not merely bonded).

Back to top

Confidential Case Review

If you suspect a spouse is cheating, an employee is dishonest, an injury claim needs verification, or you need proof of harassment, it can be difficult to concentrate on everyday tasks at home or at work. Our surveillance investigators are here to help.

If you would like to have a confidential conversation regarding surveillance and how it may benefit your case, please call us at your convenience.

To read more about surveillance, please visit our older PI News article: Surveillance — past, present and future

Back to top


Confidentiality, Integrity, and Professionalism
Washington State Investigators