Tuesday, August 11, 2009

Security In Your Home

By: Robert Thatcher



Physical security is very important to a home owner. Your home is one of your most important possessions since this is where you and your loved ones reside.

Once you know that your home is safe from intruders, you can rest assured that your material and personal possessions as well as your loved ones, are secured.

There are several parts of your home that you need to secure by using electronic devices:

- The perimeter of your house to prevent burglars from intruding on your home.

- Enclosed areas within the house should be secured as well, in case of fire.

- Your garage should also have an intruder alarm to protect your vehicles, aside from the anti-theft device on the car itself.

It does not matter what style of life you lead. Home security should be and essential part of your budget to give you peace of mind. In addition to providing physical security in the home, your home security system should also help you find help should an emergency ensue.

Here are some tips when planning for the security of your home:

1. Make an initial survey of your house and from there, develop a home security plan.

Check all of the rooms and the area outside of your house. Determine if the neighbors have a clear view of what is going on within your house.

Having a very open area that can be easily observed by anyone from the outside may be a threat to your security.

2. When placing burglar alarms or intruder sensors, place them in strategic areas in and out of your house.

Home security need not be expensive. You do not need to put in alarms and sensors on each and every part of the house.

As long as they are installed on the proper places, then your house will be secured enough.

3. Review your way of living and the size of your family.

Do you often have visitors who may roam around freely? Do you have a member of the family who may come inside the house in the middle of the night?

These factors will help you decide on the “level” of security system that you will install on your home.

4. You can place sensors within your house. These sensors can be installed on windows to alarm you of intruders.

In addition, you may install sensors within the house, specifically in hallways, to warn you of intruders within the house.

5. Place fire alarms in areas around the house which is most likely to gather heat or smoke.

An unusual level of smoke, fire or heat can easily be detected to warn you of impending fire threats.

6. There are mechanical locks and sensors that you can install on doors for good measure.

7. For households with babies, you may purchase a baby monitor or a video surveillance.

A video security system in your house will give you peace of mind. You may also “automate” your home, and watch your children from your TV screen so that you can keep track of what they are doing.

Whether you choose to install it yourself or get the services of a company which specializes in building security systems, home security should not be taken for granted.

You should put in extra time and effort in order to ensure that you and your family have a happy and physically secure environment.

Article Source: http://www.articlerich.com

Security Officer and Functions

Security Officer and Functions

Security guard or security officer is a privately-employed person who is employed to protect property and/or people. Usually security guards are uniformed and act to protect property by maintaining a high visibility presence and observing (either directly, through patrols, or by watching alarm systems or video cameras) for signs of crime, fire or disorder; then taking action and/or reporting any incidents to their client, employer

Security guard or security officer is a privately-employed person who is employed to protect property and/or people. Usually security guards are uniformed and act to protect property by maintaining a high visibility presence and observing (either directly, through patrols, or by watching alarm systems or video cameras) for signs of crime, fire or disorder; then taking action and/or reporting any incidents to their client, employer and emergency services as appropriate.



Functions and duties



The security guard motto is to "detect, deter, observe and report." Security guards are not normally required to make arrests or otherwise act as police officers except in some United States jurisdictions in which the security officer is invested with arrest powers like those of a county sheriff. In contrast to the above mentioned motto, a Private Security Guard's or Officer's actual primary duty is prevention of crime. Security personnel do enforce company rules and can act (as would any other person) if necessary to protect lives or property. In fact, they frequently have a contractual obligation to provide these actions. Security Officers are often trained to perform arrests, operate emergency equipment, perform first aid, take accurate notes and write effective reports, and perform other tasks as required by the property they are protecting.



One major economic justification for security guards is that insurance companies (particularly fire insurance carriers) will give substantial rate discounts to sites which have a 24-hour presence; for a high risk or high value venue, the discount can often exceed the money being spent on its security program. This is because having a security guard on site increases the odds that any fire will be noticed and reported to the local fire department before a total loss occurs. Also, the presence of security guards (particularly in combination with effective security procedures) tends to diminish "shrinkage," theft, employee misconduct and safety rule violations, property damage, or even sabotage. Many casinos hire security guards to protect the money when transferring it from the casino to the casino's bank.



Security guards also perform access control at building entrances and vehicle gates by ensuring that employees and visitors display proper passes or identification before entering the facility. Security guards are often called upon to respond to minor emergencies (lost persons, lockouts, dead vehicle batteries, etc.) and to assist in serious emergencies by guiding emergency responders to the scene of the incident and documenting what happened on an incident report.



Although security guards are a distinct type of personnel from either police officers or the military, in the United States a very high proportion of security personnel, including most senior management personnel, are either former or retired members of one or both services. Many security guards who don't fit this profile (young people in particular) use the job as a springboard into a police career.



Being a private security guard is by no means a lucrative endeavor. Most first line private security personal are paid a low wage which often does not reflect the risks they endure on duty.

Private Detectives & Investigators: Nature of Work

Private detectives and investigators use many methods to determine the facts in a variety of matters. To carry out investigations, they may use various types of surveillance or searches. To verify facts, such as an individual’s place of employment or income, they may make phone calls or visit a subject’s workplace. In other cases, especially those involving missing persons and background checks, investigators often interview people to gather as much information as possible about an individual. In all cases, private detectives and investigators assist attorneys, businesses, and the public with legal, financial, and personal problems.

Private detectives and investigators offer many services, including executive, corporate, and celebrity protection; pre-employment verification; and individual background profiles. They investigate computer crimes, such as identity theft , harassing e-mails, and illegal downloading of copyrighted material. They also provide assistance in civil liability and personal injury cases, insurance claims and fraud , child custody and protection cases, missing persons cases, and premarital screening. They are sometimes hired to investigate individuals to prove or disprove infidelity.

Most detectives and investigators are trained to perform physical surveillance. They may observe a site, such as the home of a subject, from an inconspicuous location or a vehicle. They continue the surveillance, which is often carried out using still and video cameras, binoculars, and a cell phone, until the desired evidence is obtained. This watching and waiting often continues for a long time.

Detectives also may perform computer database searches or work with someone who does. Computers allow investigators to quickly obtain massive amounts of information on individuals’ prior arrests, convictions, and civil legal judgments; telephone numbers; motor vehicle registrations; association and club memberships; and other matters.

The duties of private detectives and investigators depend on the needs of their clients. In cases for employers that involve fraudulent workers’ compensation claims, for example, investigators may carry out long-term covert observation of subjects. If an investigator observes a subject performing an activity that contradicts injuries stated in a worker’s compensation claim, the investigator would take video or still photographs to document the activity and report it to the client.

Significant Points

Work hours are often irregular, and the work can be dangerous.
About 1 in 4 are self-employed.
Applicants typically have related experience in areas such as law enforcement, insurance, the military, or government investigative or intelligence jobs.
Despite faster-than-average employment growth, keen competition is expected because of the large number of qualified people who are attracted to this occupation; the most opportunities will be found in entry-level jobs with detective agencies or in stores that hire detectives on a part-time basis.
Private detectives and investigators often specialize. Those who focus on intellectual property theft, for example, investigate and document acts of piracy, help clients stop illegal activity, and provide intelligence for prosecution and civil action. Other investigators specialize in developing financial profiles and asset searches. Their reports reflect information gathered through interviews, investigation and surveillance, and research, including review of public documents.
Legal investigators specialize in cases involving the courts and are normally employed by law firms or lawyers. They frequently assist in preparing criminal defenses, locating witnesses, serving legal documents, interviewing police and prospective witnesses, and gathering and reviewing evidence. Legal investigators also may collect information on the parties to the litigation, take photographs, testify in court, and assemble evidence and reports for trials.
Corporate investigators conduct internal and external investigations for corporations. In internal investigations, they may investigate drug use in the workplace, ensure that expense accounts are not abused, or determine whether employees are stealing merchandise or information. External investigations are typically done to uncover criminal schemes originating outside the corporation, such as theft of company assets through fraudulent billing of products by suppliers.
Financial investigators may be hired to develop confidential financial profiles of individuals or companies that are prospective parties to large financial transactions. These investigators often are certified public accountants (CPAs) who work closely with investment bankers and other accountants. They search for assets in order to recover damages awarded by a court in fraud or theft cases.

Detectives who work for retail stores or hotels are responsible for controlling losses and protecting assets. Store detectives, also known as loss prevention agents, safeguard the assets of retail stores by apprehending anyone attempting to steal merchandise or destroy store property. They prevent theft by shoplifters, vendor representatives, delivery personnel and even store employees. Store detectives also conduct periodic inspections of stock areas, dressing rooms, and restrooms, and sometimes assist in opening and closing the store. They may prepare loss prevention and security reports for management and testify in court against persons they apprehend. Hotel detectives protect guests of the establishment from theft of their belongings and preserve order in hotel restaurants and bars. They also may keep undesirable individuals, such as known thieves, off the premises.

Saturday, July 11, 2009

Skip Tracing

Skip Tracing: What is Skip Tracing?

Skip tracing generally involves finding information about a person who has gone missing. The reasons for the person’s disappearance can be many including, the most common, bad debts, mental illness, domestic violence, and involvement in nefarious activities among others. Investigators use a number of known and tested techniques to locate missing people.

Though skip tracing is not your regular type of service which any collection agency can do. It’s a specialist field and the skills involved can be learned easily. With the advent of internet, almost anyone can now find information about missing persons if they dig deep enough. A skip tracer’s services may be required to – repossess something like a mobile home, collect outstanding debts, find life insurance beneficiaries, locate a long lost friend, relative or loved one, locate missing heirs or people; the reasons why a skip tracer may be varied and many.

Most of us are aware of the most common ways when trying to locate a person gone missing. Usually, a person who has ‘gone missing’ intentionally or in hurry leaves behind a paper trail. This makes it easy for the skip tracer to find the person. Besides this, telephone books, yellow pages, telephone directories on CD-ROMs, and directory resources are the starting point of the skip tracing process. Though these may not always yield results, but they can definitely produce new leads. Next step, checking all the records like public records, court files, motor vehicle records, property records, which can prove to be valuable sources of information.

It is extremely important to verify and pursue the data (leads) found and search (dig) each source until all leads are exhausted with skip tracing. Nowadays, computerised records can provide a wealth of information on the missing person. Investigators who skip trace have the experience and resources to interpret accurate leads from inaccurate ones.

Monday, May 11, 2009

Identity Theft: 4 Simple Ways To Prevent Identity Theft

Have you ever thought what could happen if someone stole your identity? You’ll be shocked to know that identify theft is the fastest growing crime in U.S today! The statistics on identity theft show us that millions of people are affected by this crime, while millions of dollars are lost each year. In 2004, over 9.9 million Americans were victims of identity theft scams and close to $5 billion were lost.

I hope that this article will help you so that you do not become a victim of this terrible crime. However, it’s imperative that you follow these 4 simple ways to combat this crime.

Destroy documents containing personal information. Make sure you shred all documents you receive that have your personal information mentioned such as credit card receipts and any promotional offers. This is ‘the’ most important tip I can give you, as this alone can offer you tremendous protection against identity theft .

Do not give out personal information to anyone over the phone, internet or mail. If you receive any suspicious sounding calls from people who claim to be from the government, bank etc; do not share your personal information with them, ever!

Keep tab of your credit reports. Make it a point to check your credit history and reports from all three major credit bureaus at least once a year. Check to ensure that everything is precise and if you find any discrepancy, dispute it immediately in order to protect yourself against identity theft .

Do not give out your Social Security Number. It’s important that you do not give out your SS number unless absolutely necessary. It is alright to give out your SS number to your employer, bank, and doctor for taxation and identification. However, always question the motive of anyone who asks for it and be cautious.

Saturday, April 11, 2009

Process Serving

Process Serving: What Is It And How Do You Do It?

The legal procedures in the United States of America require that each party involved in a case needs to be duly notified of any action that can be taken against them in a court of law, or be duly notified when any action needs to be taken regarding their case in the court. This is a mandate and part of the Due Process of Law and known as process serving.

Since different states have different Rules and Regulations, and Procedures regarding the methods by which parties may be notified, it’s advisable that you find out the details relating to your own state.

Whenever a person is sued or involved in some legal issue, he/she has the right to be notified about it, so that he/she can defend themselves. Usually, most states notify civil defendants by serving them with a Complaint and some form of a Summons, requiring the person to present himself in the court of law. And if the defendants don’t respond to the summons, they can lose their case. Also, most states require the Complaint & Summons to be delivered or served to the civil defendant ‘In Person’ and only to him/her. In cases, where the defendant is not served in person, the judge can rule whether or not a default judgement should be entered against the defendant.

A Complaint & Summons can’t be mailed to a defendant for they can then claim that they never received the court summons. So how can you prove that they received the summons? This where process serving and process server plays an important role. During the proceedings of the court, the process server can testify whether the defendant was served or not. Earlier the process serving was performed by law enforcement officials and agents of the court. However, now most states allow American citizens above the age of 18 and residing in the state to do the process serving.

Wednesday, March 11, 2009

Data Profiling

Data profiling in this context is the process of assembling information about a particular individual in order to generate a profile — that is, a picture of their patterns and behavior (compare this use of the term data profiling with that used in statistics or data management where data profiling is the examination of information describing the data or data set itself).

Data profiling is used in security, law enforcement and intelligence operations for a variety of applications — for example, to assess "trust" for security clearances or to grant authorization relating to a trusted system, or to identify or apprehend suspects or threats. The government is able to access information from third parties — for example, banks, credit companies or employers, etc. — by requesting access informally, by compelling access through the use of subpoenas or other procedures, or by purchasing data from commercial data aggregators or data brokers. Under United States v. Miller (1976), data held by third parties is generally not subject to Fourth Amendment warrant requirements. Private companies and private investigators can also generally access or purchase data from these aggregators.

Information relating to any individual transaction is easily available because it is not generally highly valued in isolation, however, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits and preferences of the individual.

In the past, much information about individuals has been protected by practical obscurity (a term used by Justice Stevens in his opinion in USDOJ v. Reporters Committee, 1989). Practical obscurity refers to the practical difficulty of aggregating or analyzing a large number of data points in different physical locations. In addition, information was often transient and not easily available after the fact. Further, even where data was available, correlation of paper-based records was a laborious process. Electronic, particularly digital, record-keeping has undermined this practical obscurity by making data easily available and potentially making aggregation and analysis possible at significantly lower costs.

Thus, as more information becomes available in electronic form — for example, as public records such birth, court, tax and other records are made available online — the ability to create very detailed data profiles increases and may raise concerns.

Bill Warner Private Investigator Sarasota & Bradenton to Panama City Florida

SearchSecurity: Security Wire Daily News