Tuesday, August 11, 2009
Private Detectives & Investigators: Nature of Work
Private detectives and investigators offer many services, including executive, corporate, and celebrity protection; pre-employment verification; and individual background profiles. They investigate computer crimes, such as identity theft , harassing e-mails, and illegal downloading of copyrighted material. They also provide assistance in civil liability and personal injury cases, insurance claims and fraud , child custody and protection cases, missing persons cases, and premarital screening. They are sometimes hired to investigate individuals to prove or disprove infidelity.
Most detectives and investigators are trained to perform physical surveillance. They may observe a site, such as the home of a subject, from an inconspicuous location or a vehicle. They continue the surveillance, which is often carried out using still and video cameras, binoculars, and a cell phone, until the desired evidence is obtained. This watching and waiting often continues for a long time.
Detectives also may perform computer database searches or work with someone who does. Computers allow investigators to quickly obtain massive amounts of information on individuals’ prior arrests, convictions, and civil legal judgments; telephone numbers; motor vehicle registrations; association and club memberships; and other matters.
The duties of private detectives and investigators depend on the needs of their clients. In cases for employers that involve fraudulent workers’ compensation claims, for example, investigators may carry out long-term covert observation of subjects. If an investigator observes a subject performing an activity that contradicts injuries stated in a worker’s compensation claim, the investigator would take video or still photographs to document the activity and report it to the client.
Significant Points
Work hours are often irregular, and the work can be dangerous.
About 1 in 4 are self-employed.
Applicants typically have related experience in areas such as law enforcement, insurance, the military, or government investigative or intelligence jobs.
Despite faster-than-average employment growth, keen competition is expected because of the large number of qualified people who are attracted to this occupation; the most opportunities will be found in entry-level jobs with detective agencies or in stores that hire detectives on a part-time basis.
Private detectives and investigators often specialize. Those who focus on intellectual property theft, for example, investigate and document acts of piracy, help clients stop illegal activity, and provide intelligence for prosecution and civil action. Other investigators specialize in developing financial profiles and asset searches. Their reports reflect information gathered through interviews, investigation and surveillance, and research, including review of public documents.
Legal investigators specialize in cases involving the courts and are normally employed by law firms or lawyers. They frequently assist in preparing criminal defenses, locating witnesses, serving legal documents, interviewing police and prospective witnesses, and gathering and reviewing evidence. Legal investigators also may collect information on the parties to the litigation, take photographs, testify in court, and assemble evidence and reports for trials.
Corporate investigators conduct internal and external investigations for corporations. In internal investigations, they may investigate drug use in the workplace, ensure that expense accounts are not abused, or determine whether employees are stealing merchandise or information. External investigations are typically done to uncover criminal schemes originating outside the corporation, such as theft of company assets through fraudulent billing of products by suppliers.
Financial investigators may be hired to develop confidential financial profiles of individuals or companies that are prospective parties to large financial transactions. These investigators often are certified public accountants (CPAs) who work closely with investment bankers and other accountants. They search for assets in order to recover damages awarded by a court in fraud or theft cases.
Detectives who work for retail stores or hotels are responsible for controlling losses and protecting assets. Store detectives, also known as loss prevention agents, safeguard the assets of retail stores by apprehending anyone attempting to steal merchandise or destroy store property. They prevent theft by shoplifters, vendor representatives, delivery personnel and even store employees. Store detectives also conduct periodic inspections of stock areas, dressing rooms, and restrooms, and sometimes assist in opening and closing the store. They may prepare loss prevention and security reports for management and testify in court against persons they apprehend. Hotel detectives protect guests of the establishment from theft of their belongings and preserve order in hotel restaurants and bars. They also may keep undesirable individuals, such as known thieves, off the premises.
Saturday, July 11, 2009
Skip Tracing
Skip tracing generally involves finding information about a person who has gone missing. The reasons for the person’s disappearance can be many including, the most common, bad debts, mental illness, domestic violence, and involvement in nefarious activities among others. Investigators use a number of known and tested techniques to locate missing people.
Though skip tracing is not your regular type of service which any collection agency can do. It’s a specialist field and the skills involved can be learned easily. With the advent of internet, almost anyone can now find information about missing persons if they dig deep enough. A skip tracer’s services may be required to – repossess something like a mobile home, collect outstanding debts, find life insurance beneficiaries, locate a long lost friend, relative or loved one, locate missing heirs or people; the reasons why a skip tracer may be varied and many.
Most of us are aware of the most common ways when trying to locate a person gone missing. Usually, a person who has ‘gone missing’ intentionally or in hurry leaves behind a paper trail. This makes it easy for the skip tracer to find the person. Besides this, telephone books, yellow pages, telephone directories on CD-ROMs, and directory resources are the starting point of the skip tracing process. Though these may not always yield results, but they can definitely produce new leads. Next step, checking all the records like public records, court files, motor vehicle records, property records, which can prove to be valuable sources of information.
It is extremely important to verify and pursue the data (leads) found and search (dig) each source until all leads are exhausted with skip tracing. Nowadays, computerised records can provide a wealth of information on the missing person. Investigators who skip trace have the experience and resources to interpret accurate leads from inaccurate ones.
Monday, May 11, 2009
Identity Theft: 4 Simple Ways To Prevent Identity Theft
Have you ever thought what could happen if someone stole your identity? You’ll be shocked to know that identify theft is the fastest growing crime in U.S today! The statistics on identity theft show us that millions of people are affected by this crime, while millions of dollars are lost each year. In 2004, over 9.9 million Americans were victims of identity theft scams and close to $5 billion were lost.
I hope that this article will help you so that you do not become a victim of this terrible crime. However, it’s imperative that you follow these 4 simple ways to combat this crime.
Destroy documents containing personal information. Make sure you shred all documents you receive that have your personal information mentioned such as credit card receipts and any promotional offers. This is ‘the’ most important tip I can give you, as this alone can offer you tremendous protection against identity theft .
Do not give out personal information to anyone over the phone, internet or mail. If you receive any suspicious sounding calls from people who claim to be from the government, bank etc; do not share your personal information with them, ever!
Keep tab of your credit reports. Make it a point to check your credit history and reports from all three major credit bureaus at least once a year. Check to ensure that everything is precise and if you find any discrepancy, dispute it immediately in order to protect yourself against identity theft .
Do not give out your Social Security Number. It’s important that you do not give out your SS number unless absolutely necessary. It is alright to give out your SS number to your employer, bank, and doctor for taxation and identification. However, always question the motive of anyone who asks for it and be cautious.
Saturday, April 11, 2009
Process Serving
The legal procedures in the United States of America require that each party involved in a case needs to be duly notified of any action that can be taken against them in a court of law, or be duly notified when any action needs to be taken regarding their case in the court. This is a mandate and part of the Due Process of Law and known as process serving.
Since different states have different Rules and Regulations, and Procedures regarding the methods by which parties may be notified, it’s advisable that you find out the details relating to your own state.
Whenever a person is sued or involved in some legal issue, he/she has the right to be notified about it, so that he/she can defend themselves. Usually, most states notify civil defendants by serving them with a Complaint and some form of a Summons, requiring the person to present himself in the court of law. And if the defendants don’t respond to the summons, they can lose their case. Also, most states require the Complaint & Summons to be delivered or served to the civil defendant ‘In Person’ and only to him/her. In cases, where the defendant is not served in person, the judge can rule whether or not a default judgement should be entered against the defendant.
A Complaint & Summons can’t be mailed to a defendant for they can then claim that they never received the court summons. So how can you prove that they received the summons? This where process serving and process server plays an important role. During the proceedings of the court, the process server can testify whether the defendant was served or not. Earlier the process serving was performed by law enforcement officials and agents of the court. However, now most states allow American citizens above the age of 18 and residing in the state to do the process serving.
Wednesday, March 11, 2009
Data Profiling
Data profiling is used in security, law enforcement and intelligence operations for a variety of applications — for example, to assess "trust" for security clearances or to grant authorization relating to a trusted system, or to identify or apprehend suspects or threats. The government is able to access information from third parties — for example, banks, credit companies or employers, etc. — by requesting access informally, by compelling access through the use of subpoenas or other procedures, or by purchasing data from commercial data aggregators or data brokers. Under United States v. Miller (1976), data held by third parties is generally not subject to Fourth Amendment warrant requirements. Private companies and private investigators can also generally access or purchase data from these aggregators.
Information relating to any individual transaction is easily available because it is not generally highly valued in isolation, however, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits and preferences of the individual.
In the past, much information about individuals has been protected by practical obscurity (a term used by Justice Stevens in his opinion in USDOJ v. Reporters Committee, 1989). Practical obscurity refers to the practical difficulty of aggregating or analyzing a large number of data points in different physical locations. In addition, information was often transient and not easily available after the fact. Further, even where data was available, correlation of paper-based records was a laborious process. Electronic, particularly digital, record-keeping has undermined this practical obscurity by making data easily available and potentially making aggregation and analysis possible at significantly lower costs.
Thus, as more information becomes available in electronic form — for example, as public records such birth, court, tax and other records are made available online — the ability to create very detailed data profiles increases and may raise concerns.
Wednesday, February 11, 2009
What are signs of a cheating spouse?
To find out if you have a cheating spouse you may not need to hire an expensive private investigator nor invest in expensive surveillance equipment - as a beginner you should look for quite obvious signs of the cheating Spouse.
Below are the most common signs that your spouse, girlfriend, boyfriend, wife or husband might be cheating on you. Generally these signs are displayed unknowingly by the cheater, therefore, it is easy to spot these sudden changes in behavior. These signs should only be used as a tool to gauge your suspicions. You will want to investigate further to gain proof before speaking to them about the situation.
One of the easiest ways to gain proof is through monitoring their computer activities. In today's age we have found that majority of spouses use the computer and Internet as a means of cheating, communicating with the cheater, etc
Below are some "Signs of a cheating spouse", wife, husband, boyfriend, or girlfriend ... FIND OUT NOW!
When your spouse suddenly begins to treat you extremely nice; more than the usual.
When your spouse does not want sex or makes excuses to not have sex.
Arrives home smelling of perfume/cologne or another person's body.
Begins to put distance between you or shows a lack of interest in what has been the routine with few, if any, excuses for the change in their behavior.
When they will not allow you access to their computer or they suddenly shut down the computer when you walk into the room. They may give password protect their laptop or computer to keep out suspicious eyes. Or they stay up to "work" or "play a game" on the computer after you go to bed.
Excessive use of internet, especially late at night, is a red flag.
When he/she treats you abusively or with disrespect or may begin to find fault in everything you do in an attempt to justify his/her affair.
When he/she goes straight into the shower or bath on arrival at home.
When he has lipstick or strange hairs on his clothing or in the car. Finding strange numbers, condoms can also be clues.
When they begin to make requests or suggest wild play during sex which you have never done before. They may also show an increased interest in sex or sexual things.
Breaks their routine at work and home for no logical reason.
Becomes suddenly forgetful; thoughts are elsewhere.
When your partner’s friends make complaint of sudden changes in his/her behavior.
When you notice that they are reluctant to kiss you or accept your affection.
When they ignore or criticize your affection.
When you notice credit card charges for gifts (such as florist or jewelry) that you didn't receive.
When they begin to make sudden and excessive purchases of clothes or an unexplained change in clothing style. Purchase of a sexy underwear or lingerie may be a hint.
When you notice an unexplained increase in ATM withdrawals.
When you notice an increased attention to losing weight or paying more attention to their appearance.
Starts lying without a reason.
When they begin to volunteer to go to the post office, rushes to check the mail before you do or perhaps without even telling you.
Gets mysterious phone calls or when they leave the room to talk on the phone.
When they start exercising - going to the Gym, often at "odd" times.
Spends an excessive amount of time on the computer when you are asleep.
When they start to buy new clothes or jewelry for someone who is special for them..
When they use a low voice or whisper on the phone or hangs up quickly.
Coming home at odd times with no explanation.
When they set up a separate cell phone account that is billed to their office.
Suddenly your spouse starts to try new love techniques.
Suddenly wants more sex, more often.
When your spouse doesn’t pay attention in the home activities or is away from home at nights on trips, more than previously.
Your spouse doesn't seem interested in "you". There's always something else to do rather than "talk"!
There are changes in wake up time and sleeping times.
When he/she insists or tells to keep the toys of child away from the car.
Sunday, January 11, 2009
Famous Private Detectives in movies, televisions
Element of detective work are also featured in famous "federal" characters, such as Tom Clancy's Jack Ryan and Ian Fleming's James Bond. (The first two Bond film adaptations featured more investigative work than their successors.)
Police detectives
Detective Andy Sipowicz, played by Dennis Franz in the television series NYPD Blue
Detective Vic Mackey, played by Michael Chiklis in the television series "The Shield"
Lennie Briscoe, played by Jerry Orbach in the television series Law & Order
Sergeant Joe Friday, portrayed by Jack Webb and later by Ed O'Neill in the television series Dragnet
Lieutenant Columbo, played by Peter Falk in the television series Columbo (and also some television movies)
Detective Chief Inspector Jane Tennison, played by Helen Mirren in Prime Suspect.
Detective Chief Inspector Morse, in the novels of Colin Dexter and played by John Thaw in Inspector Morse.
Detective Sonny Crockett, played by Don Johnson, and Detective Ricardo Tubbs, played by Philip Michael Thomas, in the television series "Miami Vice"
Detective Inspector Jack Regan, also played by John Thaw, and Detective Sergeant George Carter, played by Dennis Waterman, in the television series The Sweeney.
Thompson and Thomson, from the comic Tintin, created by Hergé
Inspector Gadget
Inspector Koichi Zenigata, from the anime and manga series Lupin III, created by Monkey Punch
Detective Harvey Bullock from the comic book series Batman and cartoon series Batman: The Animated Series
Plainclothesman Elijah Baley from Isaac Asimov's Robot series.
Private detectives
J.J. Gittes, played by Jack Nicholson in the film Chinatown
Adrian Monk, played by Tony Shalhoub
Auguste Dupin, created by Edgar Allan Poe
Hercule Poirot and Miss Jane Marple, both created by Agatha Christie
Jim Rockford, created by Roy Huggins and Stephen J. Cannell, and portrayed by James Garner in the television series The Rockford Files
Thomas Sullivan Magnum, played by Tom Selleck in the television series Magnum P.I.
Philip Marlowe, created by Raymond Chandler
Sam Spade, created by Dashiell Hammett and portrayed on film by Humphrey Bogart
Sherlock Holmes, created by Arthur Conan Doyle
Simon Templar, the book, movie and TV character created by Leslie Charteris