Tuesday, August 11, 2009
Security Officer and Functions
Security guard or security officer is a privately-employed person who is employed to protect property and/or people. Usually security guards are uniformed and act to protect property by maintaining a high visibility presence and observing (either directly, through patrols, or by watching alarm systems or video cameras) for signs of crime, fire or disorder; then taking action and/or reporting any incidents to their client, employer
Security guard or security officer is a privately-employed person who is employed to protect property and/or people. Usually security guards are uniformed and act to protect property by maintaining a high visibility presence and observing (either directly, through patrols, or by watching alarm systems or video cameras) for signs of crime, fire or disorder; then taking action and/or reporting any incidents to their client, employer and emergency services as appropriate.
Functions and duties
The security guard motto is to "detect, deter, observe and report." Security guards are not normally required to make arrests or otherwise act as police officers except in some United States jurisdictions in which the security officer is invested with arrest powers like those of a county sheriff. In contrast to the above mentioned motto, a Private Security Guard's or Officer's actual primary duty is prevention of crime. Security personnel do enforce company rules and can act (as would any other person) if necessary to protect lives or property. In fact, they frequently have a contractual obligation to provide these actions. Security Officers are often trained to perform arrests, operate emergency equipment, perform first aid, take accurate notes and write effective reports, and perform other tasks as required by the property they are protecting.
One major economic justification for security guards is that insurance companies (particularly fire insurance carriers) will give substantial rate discounts to sites which have a 24-hour presence; for a high risk or high value venue, the discount can often exceed the money being spent on its security program. This is because having a security guard on site increases the odds that any fire will be noticed and reported to the local fire department before a total loss occurs. Also, the presence of security guards (particularly in combination with effective security procedures) tends to diminish "shrinkage," theft, employee misconduct and safety rule violations, property damage, or even sabotage. Many casinos hire security guards to protect the money when transferring it from the casino to the casino's bank.
Security guards also perform access control at building entrances and vehicle gates by ensuring that employees and visitors display proper passes or identification before entering the facility. Security guards are often called upon to respond to minor emergencies (lost persons, lockouts, dead vehicle batteries, etc.) and to assist in serious emergencies by guiding emergency responders to the scene of the incident and documenting what happened on an incident report.
Although security guards are a distinct type of personnel from either police officers or the military, in the United States a very high proportion of security personnel, including most senior management personnel, are either former or retired members of one or both services. Many security guards who don't fit this profile (young people in particular) use the job as a springboard into a police career.
Being a private security guard is by no means a lucrative endeavor. Most first line private security personal are paid a low wage which often does not reflect the risks they endure on duty.
Private Detectives & Investigators: Nature of Work
Private detectives and investigators offer many services, including executive, corporate, and celebrity protection; pre-employment verification; and individual background profiles. They investigate computer crimes, such as identity theft , harassing e-mails, and illegal downloading of copyrighted material. They also provide assistance in civil liability and personal injury cases, insurance claims and fraud , child custody and protection cases, missing persons cases, and premarital screening. They are sometimes hired to investigate individuals to prove or disprove infidelity.
Most detectives and investigators are trained to perform physical surveillance. They may observe a site, such as the home of a subject, from an inconspicuous location or a vehicle. They continue the surveillance, which is often carried out using still and video cameras, binoculars, and a cell phone, until the desired evidence is obtained. This watching and waiting often continues for a long time.
Detectives also may perform computer database searches or work with someone who does. Computers allow investigators to quickly obtain massive amounts of information on individuals’ prior arrests, convictions, and civil legal judgments; telephone numbers; motor vehicle registrations; association and club memberships; and other matters.
The duties of private detectives and investigators depend on the needs of their clients. In cases for employers that involve fraudulent workers’ compensation claims, for example, investigators may carry out long-term covert observation of subjects. If an investigator observes a subject performing an activity that contradicts injuries stated in a worker’s compensation claim, the investigator would take video or still photographs to document the activity and report it to the client.
Significant Points
Work hours are often irregular, and the work can be dangerous.
About 1 in 4 are self-employed.
Applicants typically have related experience in areas such as law enforcement, insurance, the military, or government investigative or intelligence jobs.
Despite faster-than-average employment growth, keen competition is expected because of the large number of qualified people who are attracted to this occupation; the most opportunities will be found in entry-level jobs with detective agencies or in stores that hire detectives on a part-time basis.
Private detectives and investigators often specialize. Those who focus on intellectual property theft, for example, investigate and document acts of piracy, help clients stop illegal activity, and provide intelligence for prosecution and civil action. Other investigators specialize in developing financial profiles and asset searches. Their reports reflect information gathered through interviews, investigation and surveillance, and research, including review of public documents.
Legal investigators specialize in cases involving the courts and are normally employed by law firms or lawyers. They frequently assist in preparing criminal defenses, locating witnesses, serving legal documents, interviewing police and prospective witnesses, and gathering and reviewing evidence. Legal investigators also may collect information on the parties to the litigation, take photographs, testify in court, and assemble evidence and reports for trials.
Corporate investigators conduct internal and external investigations for corporations. In internal investigations, they may investigate drug use in the workplace, ensure that expense accounts are not abused, or determine whether employees are stealing merchandise or information. External investigations are typically done to uncover criminal schemes originating outside the corporation, such as theft of company assets through fraudulent billing of products by suppliers.
Financial investigators may be hired to develop confidential financial profiles of individuals or companies that are prospective parties to large financial transactions. These investigators often are certified public accountants (CPAs) who work closely with investment bankers and other accountants. They search for assets in order to recover damages awarded by a court in fraud or theft cases.
Detectives who work for retail stores or hotels are responsible for controlling losses and protecting assets. Store detectives, also known as loss prevention agents, safeguard the assets of retail stores by apprehending anyone attempting to steal merchandise or destroy store property. They prevent theft by shoplifters, vendor representatives, delivery personnel and even store employees. Store detectives also conduct periodic inspections of stock areas, dressing rooms, and restrooms, and sometimes assist in opening and closing the store. They may prepare loss prevention and security reports for management and testify in court against persons they apprehend. Hotel detectives protect guests of the establishment from theft of their belongings and preserve order in hotel restaurants and bars. They also may keep undesirable individuals, such as known thieves, off the premises.
Saturday, July 11, 2009
Skip Tracing
Skip tracing generally involves finding information about a person who has gone missing. The reasons for the person’s disappearance can be many including, the most common, bad debts, mental illness, domestic violence, and involvement in nefarious activities among others. Investigators use a number of known and tested techniques to locate missing people.
Though skip tracing is not your regular type of service which any collection agency can do. It’s a specialist field and the skills involved can be learned easily. With the advent of internet, almost anyone can now find information about missing persons if they dig deep enough. A skip tracer’s services may be required to – repossess something like a mobile home, collect outstanding debts, find life insurance beneficiaries, locate a long lost friend, relative or loved one, locate missing heirs or people; the reasons why a skip tracer may be varied and many.
Most of us are aware of the most common ways when trying to locate a person gone missing. Usually, a person who has ‘gone missing’ intentionally or in hurry leaves behind a paper trail. This makes it easy for the skip tracer to find the person. Besides this, telephone books, yellow pages, telephone directories on CD-ROMs, and directory resources are the starting point of the skip tracing process. Though these may not always yield results, but they can definitely produce new leads. Next step, checking all the records like public records, court files, motor vehicle records, property records, which can prove to be valuable sources of information.
It is extremely important to verify and pursue the data (leads) found and search (dig) each source until all leads are exhausted with skip tracing. Nowadays, computerised records can provide a wealth of information on the missing person. Investigators who skip trace have the experience and resources to interpret accurate leads from inaccurate ones.
Monday, May 11, 2009
Identity Theft: 4 Simple Ways To Prevent Identity Theft
Have you ever thought what could happen if someone stole your identity? You’ll be shocked to know that identify theft is the fastest growing crime in U.S today! The statistics on identity theft show us that millions of people are affected by this crime, while millions of dollars are lost each year. In 2004, over 9.9 million Americans were victims of identity theft scams and close to $5 billion were lost.
I hope that this article will help you so that you do not become a victim of this terrible crime. However, it’s imperative that you follow these 4 simple ways to combat this crime.
Destroy documents containing personal information. Make sure you shred all documents you receive that have your personal information mentioned such as credit card receipts and any promotional offers. This is ‘the’ most important tip I can give you, as this alone can offer you tremendous protection against identity theft .
Do not give out personal information to anyone over the phone, internet or mail. If you receive any suspicious sounding calls from people who claim to be from the government, bank etc; do not share your personal information with them, ever!
Keep tab of your credit reports. Make it a point to check your credit history and reports from all three major credit bureaus at least once a year. Check to ensure that everything is precise and if you find any discrepancy, dispute it immediately in order to protect yourself against identity theft .
Do not give out your Social Security Number. It’s important that you do not give out your SS number unless absolutely necessary. It is alright to give out your SS number to your employer, bank, and doctor for taxation and identification. However, always question the motive of anyone who asks for it and be cautious.
Saturday, April 11, 2009
Process Serving
The legal procedures in the United States of America require that each party involved in a case needs to be duly notified of any action that can be taken against them in a court of law, or be duly notified when any action needs to be taken regarding their case in the court. This is a mandate and part of the Due Process of Law and known as process serving.
Since different states have different Rules and Regulations, and Procedures regarding the methods by which parties may be notified, it’s advisable that you find out the details relating to your own state.
Whenever a person is sued or involved in some legal issue, he/she has the right to be notified about it, so that he/she can defend themselves. Usually, most states notify civil defendants by serving them with a Complaint and some form of a Summons, requiring the person to present himself in the court of law. And if the defendants don’t respond to the summons, they can lose their case. Also, most states require the Complaint & Summons to be delivered or served to the civil defendant ‘In Person’ and only to him/her. In cases, where the defendant is not served in person, the judge can rule whether or not a default judgement should be entered against the defendant.
A Complaint & Summons can’t be mailed to a defendant for they can then claim that they never received the court summons. So how can you prove that they received the summons? This where process serving and process server plays an important role. During the proceedings of the court, the process server can testify whether the defendant was served or not. Earlier the process serving was performed by law enforcement officials and agents of the court. However, now most states allow American citizens above the age of 18 and residing in the state to do the process serving.
Wednesday, March 11, 2009
Data Profiling
Data profiling is used in security, law enforcement and intelligence operations for a variety of applications — for example, to assess "trust" for security clearances or to grant authorization relating to a trusted system, or to identify or apprehend suspects or threats. The government is able to access information from third parties — for example, banks, credit companies or employers, etc. — by requesting access informally, by compelling access through the use of subpoenas or other procedures, or by purchasing data from commercial data aggregators or data brokers. Under United States v. Miller (1976), data held by third parties is generally not subject to Fourth Amendment warrant requirements. Private companies and private investigators can also generally access or purchase data from these aggregators.
Information relating to any individual transaction is easily available because it is not generally highly valued in isolation, however, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits and preferences of the individual.
In the past, much information about individuals has been protected by practical obscurity (a term used by Justice Stevens in his opinion in USDOJ v. Reporters Committee, 1989). Practical obscurity refers to the practical difficulty of aggregating or analyzing a large number of data points in different physical locations. In addition, information was often transient and not easily available after the fact. Further, even where data was available, correlation of paper-based records was a laborious process. Electronic, particularly digital, record-keeping has undermined this practical obscurity by making data easily available and potentially making aggregation and analysis possible at significantly lower costs.
Thus, as more information becomes available in electronic form — for example, as public records such birth, court, tax and other records are made available online — the ability to create very detailed data profiles increases and may raise concerns.
Wednesday, February 11, 2009
What are signs of a cheating spouse?
To find out if you have a cheating spouse you may not need to hire an expensive private investigator nor invest in expensive surveillance equipment - as a beginner you should look for quite obvious signs of the cheating Spouse.
Below are the most common signs that your spouse, girlfriend, boyfriend, wife or husband might be cheating on you. Generally these signs are displayed unknowingly by the cheater, therefore, it is easy to spot these sudden changes in behavior. These signs should only be used as a tool to gauge your suspicions. You will want to investigate further to gain proof before speaking to them about the situation.
One of the easiest ways to gain proof is through monitoring their computer activities. In today's age we have found that majority of spouses use the computer and Internet as a means of cheating, communicating with the cheater, etc
Below are some "Signs of a cheating spouse", wife, husband, boyfriend, or girlfriend ... FIND OUT NOW!
When your spouse suddenly begins to treat you extremely nice; more than the usual.
When your spouse does not want sex or makes excuses to not have sex.
Arrives home smelling of perfume/cologne or another person's body.
Begins to put distance between you or shows a lack of interest in what has been the routine with few, if any, excuses for the change in their behavior.
When they will not allow you access to their computer or they suddenly shut down the computer when you walk into the room. They may give password protect their laptop or computer to keep out suspicious eyes. Or they stay up to "work" or "play a game" on the computer after you go to bed.
Excessive use of internet, especially late at night, is a red flag.
When he/she treats you abusively or with disrespect or may begin to find fault in everything you do in an attempt to justify his/her affair.
When he/she goes straight into the shower or bath on arrival at home.
When he has lipstick or strange hairs on his clothing or in the car. Finding strange numbers, condoms can also be clues.
When they begin to make requests or suggest wild play during sex which you have never done before. They may also show an increased interest in sex or sexual things.
Breaks their routine at work and home for no logical reason.
Becomes suddenly forgetful; thoughts are elsewhere.
When your partner’s friends make complaint of sudden changes in his/her behavior.
When you notice that they are reluctant to kiss you or accept your affection.
When they ignore or criticize your affection.
When you notice credit card charges for gifts (such as florist or jewelry) that you didn't receive.
When they begin to make sudden and excessive purchases of clothes or an unexplained change in clothing style. Purchase of a sexy underwear or lingerie may be a hint.
When you notice an unexplained increase in ATM withdrawals.
When you notice an increased attention to losing weight or paying more attention to their appearance.
Starts lying without a reason.
When they begin to volunteer to go to the post office, rushes to check the mail before you do or perhaps without even telling you.
Gets mysterious phone calls or when they leave the room to talk on the phone.
When they start exercising - going to the Gym, often at "odd" times.
Spends an excessive amount of time on the computer when you are asleep.
When they start to buy new clothes or jewelry for someone who is special for them..
When they use a low voice or whisper on the phone or hangs up quickly.
Coming home at odd times with no explanation.
When they set up a separate cell phone account that is billed to their office.
Suddenly your spouse starts to try new love techniques.
Suddenly wants more sex, more often.
When your spouse doesn’t pay attention in the home activities or is away from home at nights on trips, more than previously.
Your spouse doesn't seem interested in "you". There's always something else to do rather than "talk"!
There are changes in wake up time and sleeping times.
When he/she insists or tells to keep the toys of child away from the car.