Friday, January 29, 2010

Driver's Licence Photos Used For Intelligence Gathering

A helpful tip in doing business involving substantial amounts of money, regular payments owing or contacting witnesses at a later date, is to request a photo driver licence from a person you intend to do business with prior to or upon drawing up an agreement, lease or contract. A colour scanned copy of a photo driver licence can be taken where permission is granted by the owner of the driver's licence and a declaration obtained, stating that the scanned copy of the driver's licence is to be used for identification purposes only for your business dealings.

Photo intelligence in identifying persons of interest is quite important when a debt collector or process server has to knock on a door to process serve a legal document or to conduct a field call. A debt collector or process server may knock on the door at an address to speak with persons and find that the person of interest that they need to make contact with, have moved address or are evading contact with the debt collector or process server. A debtor or witness can attempt to change their identity by disguising their appearance, shaving their head, dying their hair or even losing weight over time.

An experienced debt collector or process server will know if they have sighted the correct person of interest, by being able to examine current photo intelligence prior to making contact with persons in the public because there will be certain distinguishing features for facial recognition in a photo that doesn't change a lot in short periods of time. It could be the shape of the mouth, the size and shape of a nose, the depth and colour of the eyes or the width & shape of the forehead from photo intelligence, that allows an experienced debt collector or process server to undertake a successful process service or field call with the person of interest promptly and efficiently.

A debt collector or process server has access to database information for current and past address information for locating persons of interest legally.

In having current photo intelligence and reasonable address information, an experienced debt collector or process server can deduce enough intelligence to undertake successful contact with the correct person of interest and succeed in having an affidavit completed for a legal process.
















PJL 29th January 2010

Wednesday, January 27, 2010

TSCM Debugging Investigations Update

During the last 6 years Lynch Investigations & Countermeasures Pty Ltd has serviced Australasia with TSCM Debugging Investigations Services on call. The business has technicians that are specifically trained and qualified in this field, that use the state of art technology in providing their clients with the highest level of technical and professional services.

Lynch Investigations & Countermeasures Pty Ltd's TSCM Debugging Investigations technicians, have 16 years of service background in the industry and they are extremely proficient at what they specialise in.

In the field, Lynch Investigations & Countermeasures Pty Ltd's technicians have been finding a range of electronic eavesdropping devices intercepting their client's intelligence and invading their client's privacy. There have been many wireless cameras detected, listening devices removed from communications systems and further risk management controls put in place where access to communication systems was evident from the low levels of security some communications equipment continues to operate with.

We encourage any one to contact Lynch Investigations & Countermeasures Pty Ltd to inquire further with us about our TSCM Debugging Investigations Services but please read the web page via the web site link below to obtain the necessary information regarding making secure contact with us.


TSCM Debugging Investigations - Lynch Investigations & Countermeasures Pty Ltd





Tuesday, January 26, 2010

Former Australian Soldier Sentenced To Death

A former Australian soldier from Port Augusta in South Australia has been sentenced to death in Kabul for murdering an Afghan security guard.

Sky News Video

Read more in the Australian
(more)

PJL 26th January 2010

Monday, January 25, 2010

Muting your Digital Video Camera Microphone for a Surveillance Investigation

With some electronics background and experience, a competent person can remove the wired circuit belonging to the microphone of a digital video camera, to mute the audio recording of the digital video camera, where the audio recording can't be stopped from the digital video camera controls.

This process requires a jeweller's screwdriver set and very steady hands. The microphone needs to be located on the outside body surface of the digital video camera, then when the casing of the digital video camera is unscrewed & opened, you can determine where the microphones wiring will terminate from.

You can then follow the microphone wires back to the circuit board that may only require a circuit board wire connector to be removed from the circuit board, to break the microphone circuit.

The benefit of this process if performed carefully, allows the circuit of the microphone to be restored at a later date if needed. The process is definitely not recommended where working on the digital video camera will void any current warranty of a digital video camera.

During a surveillance investigation, it is necessary to have the audio muted on a digital video camera due to privacy and the Listening Devices Act.

PJL 25th January 2010 (Licensed Electronics Specialist)

Sunday, January 24, 2010

EasyCap

If you have the need or you are involved with the recording of video evidence using cameras and you need a small compact portable device, EasyCap is useful equipment that can be connected to a laptop computer in minutes and can record video using miniature cameras of good quality for video evidence collection.

EasyCap ranges in price from different sellers although eBay maybe where you will find the best EasyCap prices. You should be able to have an EasyCap device delivered to your door for less than $20.00 AUD if you look around on eBay.

The purchase includes software that allows you to run a CCTV Security Camera USB 4 Channel Video Recorder DVR from a portable laptop computer or from a desktop computer from your home, office or remotely where ever you need to record video easily, if you have a power supply for extended use.

I encourage you to look further at the web site links below, so you can learn more about the features and the setting up of this useful equipment, EasyCap.

EasyCap

EasyCap eBay

PJL 24th January 2010

Thursday, January 21, 2010

Strategic Control Plan in Dealing with Fraud & Corruption

An organisation or a business has a responsibility to protect against attempts by a person to gain by deceit, information, assets, money or other inappropriate benefit or advantage. A fraud control plan is a building block to an ethical and successful organisation.

Fraud prevention and control is the responsibility of all staff and all levels of management, and not just selected people within an organisation or a business.

Our Strategic Control Plan in Dealing with Fraud & Corruption will be achieved by implementing these concepts with a rigorous standard of investigation into allegations of misconduct, including fraud.

Please visit the web site link below to our Strategic Control Plan in Dealing with Fraud & Corruption.

Strategic Control Plan in Dealing with Fraud & Corruption

PJL 21st January 2010

Social Networks a Goldmine of Information

People are not using as much discretion as they should when communicating on social networks like Facebook and Twitter.

It becomes easy for competitors to mine information about relationships when people link to their friends and communicate online. If a competitor is watching, valuable information could be obtained by connecting the dots. 
(more)

PJL 21st January 2010

Monday, January 18, 2010

Computer Evidence - Collection & Preservation

Another excellent reference and learning guide is Computer Evidence, Collection & Preservation by Christopher L.T. Brown.

The book focuses on the collection and preservation of digital evidence because these two phases of computer forensics investigations are the most critical to evidence acceptance.

A good understanding of evidence dynamics is required because shutting down a computer changes the state of the computer as well as many of its files, so a good understanding of evidence dynamics is essential when undertaking a computer forensic investigation.

By reading and using this task oriented guide, computer forensic investigators will be able to ensure case integrity during the most crucial phases of the computer forensics investigations process.

Please visit the website link below for more information about this excellent resource.

Computer Evidence - Collection & Preservation

PJL 18th January 2010

Saturday, January 16, 2010

Reasons why a Background Check is Conducted

Background checks are effective in finding out more about a job applicant, business partner or an individual which you may be considering developing a relationship with.

You could be separating in a marriage and concerned about your ex marital partner's new partner for safety and security concerns of your children. There could be an employment position within your business that requires handling sensitive information or assets securely and honestly. It could be quite important to know if a potential business partner has a good credit history and what liability a potential business partner has, if you are considering a new business venture together.

A civil and criminal records check can reveal important information. A business vulnerable to fraud will need to know if a job applicant has a background of theft or fraud related crimes. It is important to know in a child custody matter, if a person has a sex crimes background. If you are interviewing an employee for a particular job position, it is important to know if the job applicant has a civil litigation background from a workers compensation claim, just to be aware of any past injuries that could become aggravated in a certain employment position.

Corporate records are a resource that should be checked when you don't know a lot about a new business partner and you are considering undertaking a new venture involving assets. Corporate records can reveal liability of a potential business partner and other corporate entities that a potential business partner is still involved with or has been involved with. Litigation information of current or past legal matters is also important to know.

Lynch Investigations & Countermeasures Pty Ltd has a procedure to approach your background check with. We are available for a free consultation at any time. Our web site has a free consultation web page that you can contact us through or you can call us at any time to arrange a confidential meeting place and time if required. We can also provide access to the secure client login area of our web site allowing you to complete our comprehensive investigation request forms, at a time when it is convenient for you.

Our contact telephone number is +61417260650 or click on the web site link below to complete our free consultation web form. Our staff looks forward to discussing your concerns with you and we will always place your needs, confidentiality and costs as a priority of our service with you.

Free Consultation

Another brief article on reasons why a background check is conducted.

Reasons Why A Background Check Is Conducted

PJL 16th January 2010

Thursday, January 14, 2010

Protecting Your Cell Phone

The interception of smartphones and the invasion of the public's privacy through illegal cell phone eavesdropping, is definitely increasing.

Criminals utilise cell phone spyware to listen to cell phone calls, track cell phone users and intercept cell phone text messages and email. There is some protection for those that are concerned about there unprotected smartphone communications.

SMobile Systems sells a software program for various smartphone platforms used by professionals and individuals. SMobile Security Shield provides protection against spyware & viruses, that threatens the communications security and privacy of businesses and individuals.

For further information about SMobile Security Shield and purchasing SMobile Security Shield, please click on the web site link below.

SMobile Security Shield

PJL 14th January 2010

Wednesday, January 13, 2010

Google Ranking Factors - SEO Checklist

Search engine optimisation (SEO) performed properly plays a significant role in your web site ranking well with Google and other popular search engines, for your target market keywords.

With Google's algorithm changing frequently and the need to have your web site tweaked with quality SEO services, we are providing a web site link below to a list of Google ranking factors, to point out to you how much is involved in using good quality search engine optimisation techniques to promote your web site.

Quality SEO increases online organic traffic to your web site and increases the chances of converting your web site visitors into sales.

Google Ranking Factors SEO Checklist

Lynch Investigations & Countermeasures Pty Ltd provides a quality SEO service with our SEO technicians having completed Certified Internet Marketing Professional training. Our business interest is in providing your web site with the highest quality of Search Engine Optimisation Services in the market today.

Our latest SEO brochure is provided via the web site link below, so please take a moment to view the brief but informative information about our quality Search Engine Optimisation Services.

PJL Search Engine Optimisation

PJL 13th January 2010

Australian Electoral Roll Search

If you have a need to find a missing family member or relative, the Australian Electoral Roll is updated daily and the daily updated Australian Electoral Roll can be viewed by computer, at the Australian Electoral Roll  National State & Divisional Offices.

Please click on the web site link below that will take you to the Australian Electoral Roll National State & Divisional Offices address lists. You will need to look for the web site text link on the top of the next web page after clicking on the web site link below, "Also see Divisional Offices."

Click on this website text link "Also see Divisional Offices" then when the next web page opens, scroll to the bottom left hand corner of the web page, where you will see further web site text links that take you to the addresses for all of the Divisional Offices. At these address locations, the daily updated Australian Electoral Roll information can be searched by computer free of charge.

AEC National State & Divisional Offices

If your search for a missing family member or relative requires historic information, the National Library has the Australian Electoral Roll from past years on microfiche film that can be viewed at the National Library in Canberra ACT.

National Library

PJL 13th January 2010

Tuesday, January 12, 2010

Trace Email Sender

If you have received an email and you would like to attempt to locate the source IP address based on the email headers (where did the email come from). Just copy and paste the full email headers of the email you have received into the box, by clicking the web site link below, then paste the email headers information into the box and click on "get source."

HOW TO OBTAIN EMAIL HEADERS

To obtain email headers information from an email, go to the menu and click on "file" when you have an email open, then click on "properties" and you will see another window open that states "details." Click on "details" and then right click and "select all" of the email headers text in the window. Then select "copy." Now you are ready to "paste" the email headers text into the box you can view by visiting the web site link below. "Paste" the email headers text into the box and click on "get source." When this is done, scroll down the page and you will be given some location details regarding an attempt to locate the source IP address (where did the email come from). Good luck.

Trace Email Sender

PJL 12th January 2010

Monday, January 11, 2010

China sends Rio Espionage Case to Prosecutors

China sends Rio espionage case to prosecutors

PJL 11th January 2010

Sunday, January 10, 2010

Debt Collection Guideline for Collectors & Creditors

It is that time of the year again when business winds down in various industries with invoices needing to be paid, that can become short term or long term debts. With the recent economic slowdown you may find it challenging to have some payment plans honored promptly. It is worth while knowing how to go about collecting those payments promptly and legally to the satisfaction of the creditor, collector and the debtor.

A Debt Collection Guideline for Collectors & Creditors that is a joint publication by the Australian Competition & Consumer Commission (ACCC) & the Australian Securities & Investments Commission (ASIC) is available online.

We think it is quite worth your while knowing that the Debt Collection Guideline for Collectors & Creditors exists and can be used by anyone.

Please click on the website link below to go the web page where the Debt Collection Guideline for Collectors & Creditors can be downloaded in PDF free of charge.

Debt Collection Guideline for Collectors & Creditors

PJL 10th January 2010

Saturday, January 9, 2010

Watching The Detectives 2nd Edition by Deborah Locke

It is extremely pleasing to see the second edition of Watching The Detectives by Deborah Locke former NSW Police Detective, back on the shelves again.

Watching The Detectives is about Deborah Locke and her career as a NSW Police Officer. The book explores police corruption and mismanagement.

Deborah Locke a gutsy woman who couldn't help being true to what she believed in, is the author of the second edition of Watching The Detectives a NSW Police novel.

Watching The Detectives has become a source of information for the latest production in the Underbelly series, Underbelly 3.

More information about the book and ordering the book, Watching The Detectives can be viewed by visiting the website link below.

Watching The Detectives 2nd Edition by Deborah Locke

PJL 9th January 2010

Eavesdropping on Your Computer Conversations

It's becoming terrifying knowing that someone from a remote computer can eavesdrop on your computer by tapping into your computer's microphone with software programs available online.

Some Communications Authorities and Security Agencies are discussing drawing up security recommendations after internet experts found that notebook computers with internal microphones are vulnerable to electronic eavesdropping.

There have been discussions about having switches installed on manufactured notebooks to enable a computer's microphone to be turned on and off as needed to prevent eavesdropping of computers in an office, home or of a mobile computer user.

A simple process can be applied to prevent an eavesdropper tapping into your computer's microphone using remote computer microphone eavesdropping software.

If your current computer doesn't have an external switch to turn off the computer's microphone, you can place a 3.5mm pin, or audio jack etc.. into the microphone pin socket on the computer, to disable the computer's microphone from picking up audio sound from around the computer.

The 3.5mm pin or audio jack shouldn't have a wire terminating to a device but any wire should be trimmed right at the end of the 3.5mm pin or audio jack body, leaving the 3.5mm pin or audio jack to measure approximately 30mm to 40mm in length.

You may find that you have to source a suitably sized pin or audio jack to fit the correct size of the computer's microphone socket, although 3.5mm is a common size.

Please view the program called SpyOn Voice that is used to eavesdrop on computer operators by clicking on the website link below.

SpyOn Voice - Eavesdropping On Your Computer Conversations

PJL 9th January 2010

Friday, January 8, 2010

Workers Compensation Claims - Don't Take a Biased View

Throughout 2009 it was interesting to see the number and specific types of workers compensation claims on the rise. There was a trend identified where employees had been stood down from jobs and workers compensation claims made for stress and back related injuries. Although this was the trend identified from investigation work our business had undertaken, one can't take a biased view to a workers compensation claim when providing evidence for a case.

We would like you to view a short but interesting video relating to a McDonalds Workers Compensation Claim & Case involving the shooting of a McDonalds male employee that was still being decided in 2009.

McDonalds Workers Compensation Claim

McDonalds Workers Compensation Shooting Claim Further Information

PJL 8th January 2010

Thursday, January 7, 2010

Investigation eBooks & Docs for Download

Good quality Investigation eBooks & Docs are very difficult to come by and we know a place on the World Wide Web where Investigation eBooks & Docs can be purchased at unbelievable prices. The Investigateway Web Site has a new eBooks & Doc Online Store where you can purchase and download your industry guides at any time.

The Investigation eBooks & Docs are authored by Michael Hessenthaler who was a private investigator since 1975 (now retired). The eBooks (PDF file format) and guides cover most spheres of private investigation including:


  • All you ever wanted to know about private investigation - the book
  • Motor Vehicle Theft Claims Investigation
  • Factual Investigation
  • Writing Reports (factual, motor vehicle theft, burglary)
  • Interview and Statement Guides
  • Insight and Tactics for Interviews

We know the Investigation eBooks & Docs well having used them in our work and we know that they are a rare resource that will assist student investigators undertaking the Certificate III in Investigative Services, learning investigators and experienced operatives.

Please visit the website links below to view the Investigateway eBooks & Doc Online Store.

Investigation eBooks & Docs for Download

PJL 7th January 2010

Wednesday, January 6, 2010

Email Tracking

Email tracking has been around for many years now and enables a person sending an email to see when an email gets read, re-opened, forwarded and so much more.

Email tracking services can provide the date and time the email was opened, location of the recipient (per their ISP city/town), map of location, recipients IP address, apparent email address of opening (if available), referrer details (i.e. if accessed via web mail etc), URL clicks, how long the email was read for, how many times your email was opened and if your email was forwarded or opened on another computer.

Email tracking used sensibly can be an invaluable tool for marketing purposes in business and an excellent communications tool to confirm that your email communication is being received.

I encourage you to look closer at the Readnotify and Did They Read It Email Tracking Services via the website links provided below. Both services offer a free trial and this gives you the opportunity to really get a feel for an email tracking service at no obligation.

Readnotify Email Tracking

Did They Read It Email Tracking

PJL 6th January 2010

Tuesday, January 5, 2010

Online Marketing Websites & Hosting For Investigators & Other Professions

For those investigators and other professionals that have been looking for a quality website design business to consult with about their online marketing needs, we would like to refer you to Australdata Web Site Design & Hosting from Port Macquarie in NSW Australia. A very competent and professional website designing business owned by Michael.

Michael is a very approachable and professional person, when it comes to discussing your businesses needs in online marketing. We couldn't recommend a better business for you to discuss your needs with other than Australdata and Michael for your website design, hosting and online marketing requirements.

Please vist the website links below to the website of Australdata and Australdata's portfolio of work.

Australdata's Website

Australdata's Portfolio of Work

PJL 5th January 2010

Monday, January 4, 2010

Surveillance During a Family Law Case

Surveillance can be used in a child custody matter where the investigator conducts surveillance of a parent, baby sitter or nanny, to determine what happens when the child is with a parent. Court orders have conditions that set out what a parent must do (or must not) do.

Lynch Investigations & Countermeasures Pty Ltd's investigators can document or video tape any neglect or mistreatment that they observe and they can gather other circumstancial evidence that can indicate whether a child is being treated well or not.

Our investigators conduct surveillance in family law cases where child custody needs investigating. Our investigators conduct this surveillance by surveillance or fixed surveillance cameras. Lynch Investigations & Countermeasures Pty Ltd's investigators conduct child custody surveillance in conformance with the law in the relevant jurisdiction.

Please visit the website link below for more information on surveillance during a family law case.

Surveillance During a Family Law Case

PJL 4th January 2010

Sunday, January 3, 2010

Cell Phone Tapping & Is Your Cell Phone Bugged?

Cell phone tapping continues to explode. Please find some interesting videos from withing the links below, to follow on from our recent blog article that we posted on the 28th of December 2009, called Cell Phone Calls & Text Messages Interception.

Cell Phone Tapping

Is Your Cell Phone Bugged?

Here are some suppliers who will set up these cell phone tapping and cell phone bugging systems.

Cell Spy Pro

FlexiSpy

e-stealth

Professional Spy Phone Tools

PJL 3rd January 2010

Online Enrolment Verification Facility

Have you ever needed to verify your own Australian Electoral Roll listing or check the Australian Electoral Roll listing for of a person living in Australia. If you have certain information about a person you can confirm an Australian Electoral Roll listing for that person.

Check your own or another persons Australian Electoral Roll listing by using the Online Enrolment Verification Facility. All you need to do is to enter a persons information into the online form. The Australian Electoral Roll information will be either confirmed or failed to confirm instantly. Confirm those details 24 hours a day 365 days of the year.

Please visit the website link below to the Online Enrolment Verification Facility.

Australian Electoral Commission Online Enrolment Verification Facility

PJL 3rd January 2009

Saturday, January 2, 2010

Acoustic Leakage & Eavesdropping

A contact microphone can be used to pick up sounds through sound wave vibration on walls, windows, doors & materials glass, timber, and concrete. Information can be transferred from the microphone through a wire connected to a listening device, recording device or modulated into radio waves and then transmitted to an unwanted listener outside of the room, or even transmitted to any where in the world if GSM transmission technology is utilised.

Sound masking systems such as the ANG-2200 are designed to create a perimeter of noise around a target area that defeats wired microphones inside of walls, contact microphones, laser reflections from windows and audio transmitters located in AC outlets.

ANG-2200 injects noise into the environment perimeter and not directly into the environment. This process creates a countermeasure to defeat eavesdropping devices that rely on acoustic leakage.

Please visit the website link below for further information about ANG-2200.

ANG-2200

PJL 2nd January 2010

Confessions of a Female Private Investigator

An interesting and entertaining read, Confessions of a Female Private Investigator by Tiffany Bond. Real life experiences from a private investigator specialising in Infidelity Investigations.

Please click on the website link below to read more about this excellent book.

Confessions of a Female Private Investigator

PJL 2nd January 2010