Tuesday, August 31, 2010

Probable Cause Required For Surveillance

The bitter controversy over the building of a Muslim community centre and mosque near the site of the terrorist attacks in New York on September 11, 2001, is sparking new fears of government snooping on Islamic holy places - which it now claims it can do without a warrant. more

















ipsnews.net

PJL 31st August

Espionage: Stealing America's Secrets

60 Minutes has obtained an FBI videotape showing a Defense Department employee selling secrets to a Chinese spy that offers a rare glimpse into the secretive world of espionage. Scott Pelley reports.



cbsnews.com

PJL 31st August 2010

Monday, August 30, 2010

Spying On The Neighbour



Contact Professional Surveillance Investigators

PJL 30th August 2010

Using Private Investigator Subcontractors: Fortune or Curse?

For most private investigators, sub-contracting assignments is like stepping off into the proverbial black hole. Many have had bad experiences, while some have never sub-contracted to other PI’s and instead simply turn away the client. There are several points-of-view that frame the idea of subcontracting, one being “the best thing I can do for my client is to pass them on to a PI who will do a good job.” Another viewpoint often found circulating includes, “I hate to subcontract. The last guy I sent a client to ended up stealing the client from me.” Let’s face it, we are a world economy and to play in the game, your clients expect you to be able to help them where ever the assignment may be geographically located.

To get down to the basics of business, sub-contracting is a practical method to help your clients while adding additional income into your pocket. You spend a lot of time, effort and resources cultivating and marketing clients so why would you simply hand them over to someone else? Your client called YOU because you have built a rapport with them and have gained their trust. This is often where skeptics jump in and say, “exactly, I don’t want to be blamed if something goes wrong with the case when I refer them to another PI.” In the unlikely event that does occur, you stand to lose anyway because you gave them the referral and they trusted your judgment and contacts. If you simply told your client you are not comfortable making referrals, they will be disappointed and may feel like you threw them to the wolves by having to go out and find a PI on their own.

Marketing is an intricate part of any successful business. Whether by word of mouth, media advertising or other avenues, you have achieved your client list. You should therefore watch over your clients like a mother hen waiting on the egg to hatch. I have a good friend that is a claims adjuster for a large insurance company. He will often call me up and tell me that he had four or five PI’s market him in a single day. Why leave the door open for another to step in and side-swipe a client from you?

Unfortunately, not all PI’s subscribe to the proper etiquette of subcontracting fundamentals. When calling other investigators to arrange to subcontract, I often state right up front that my advertised hourly rate is $80 and follow that with “but we always cut our rate for other PI’s to $50 an hour. I hope you will extend the same courtesy so that we can all make some money.” I have had many investigators laugh and respond that they charge $125 an hour and aren’t about to discount their rates. Usually they follow that up with “I would rather not work at all as to work for $50 an hour.” Most likely this is the case – they aren’t working. If you are in the industry to operate a successful business, this is a short-sided view. You may be a semi-retired investigator and this view may fit your lifestyle better.

A good sales person knows that taking a smaller portion of a large volume of deals is often more lucrative than waiting on the one large score. Statistics vary to some degree, however, based on numerous polls by trade associations, somewhere between 70% – 83% of investigative agencies are one or two person operations. The obvious question is why? Does the majority not want to grow any larger or are they still navigating the path to more business? A common practice within the industry is to have part-time investigators that you can call upon when you have an overflow of business. If you are the principal of the business, it truly may not pay for you personally to work at a lower hourly rate. It may, however, be a good opportunity to assign the case to one of these other investigators. You give them much appreciated work and you can still take a portion of the hourly rate billed to the client.

Another fundamental of subcontracting etiquette is the “turn-about is fair play” concept. If you call an investigator who agrees to work a case for you and they cut their rate, expect to do the same in return. Realistically, this is a great avenue of marketing. Once other investigators understand you can be trusted to not steal their client and you will provide a professional discount, you will be their point of contact for case assignments in your area. When working for other investigators, you should also provide a “Vendor Agreement” that details what you expect as part of the agreement and often includes:


• The hourly rate, mileage and other expenses agreed upon

• When the case is to be initiated and any deadlines for completion

• Method of supplying updates and reports

• Special instructions or circumstances

• Instructions pertaining to a “no contact” with client clause. Typically, your client should receive updates from you, not the subcontracted PI

• Obtain copies of the PI’s license and insurance


In some cases, the investigator in the field is asked to communicate directly with your client. In these cases, the investigator should never indicate that they work for anyone other than you and should not use this as a time to market your client. This is generally not a problem, but once your client has a direct number for the other PI, they may feel that it is appropriate to call them directly with any additional assignments. Again, the proper etiquette is for the investigator to simply take the information and then turn around and call the original PI. All cases pertaining to the particular client should go through the originating investigative agency, no exception. Of course, the originating agency should also advise their client that all assignments must originate in their corporate office to insure proper file handling and billing.

Once the investigation is completed, the investigator should email you the final report followed with a hard copy. The emailed report allows you to cut and paste into your report format that your client has become accustom to seeing and understands more readily. This brings you to the next topic of sales tax. In most instances, the investigator doing the actual case needs to provide a resellers certificate to the original PI agency, thus alleviating the need to charge the originating PI sales tax since it is there responsibility to charge and collect this from the ultimate client.

So what about those times when something goes wrong? Although unlikely, a client may become disillusioned with the investigation. Often this is because the end results were not what they had anticipated. When this occurs, whether you subcontracted the case or not, all you can do is try to work through it and resolve the issue. The process of investigations is not a mathematical problem where you can add A + B and get C. They used a PI because the information could not be obtained any other way and although everyone involved may their best attempts, it just didn’t turn out to the client’s satisfaction. Resolve it best you can like you would one of your regular cases that you didn’t subcontract.

How do you go about finding other PI’s to subcontract work? Look to state associations and their websites as a starter. Many allow you to type in geographic areas and specialized types of investigations to find those adept at the services you require. Call, talk and agree. It is better to make $10 – $30 an hour on work you don’t have to do than to not make any money at all.


By Kelly Riddle

Kelly Riddle is the principal of Kelmar and Associates, formed in 1989, and conducts investigations domestically and internationally. A distinguished speaker and author of 10 books, Mr. Riddle has more than 30 years of investigative experience and earned a Bachelor of Science degree in Criminal Justice from the University of North Alabama. He was chosen as the “PI of the Year” by the National Association of Investigative Specialists and the PI Magazine named Mr. Riddle as the “#1 PI in the United States”. He has been designated an expert in surveillance, insurance investigations, nursing home abuse and computer investigations. He was chosen as “One of the Top 25 PI’s of the 20th Century.” Kelly obtained his Texas Certified Investigator designation (less than 50 in TX.) Mr. Riddle is also on the Board of Directors for the Texas Association of Licensed Investigators (TALI).

PJL 30th August 2010

Sunday, August 29, 2010

Summer Surveillance Tips

1. Keep as many windows in your vehicle open as possible using car window socks
2. Install a small independently powered fan with a secure cover over the fan blade
3. Drink water & have plenty on hand
4. Drink electrolytes
5. Spray yourself with water
6. Get your surveillance vehicle into the shade where possible
7. Wear shorts, sandals & tank tops
8. Keep your hair short, shower prior to & after surveillance
9. Have an ice box on hand
10. Have a wet towel soaked in cold water & carry dry towels
11. Position your vehicle to expose the vehicle & yourself to the wind & breeze
12. Use airconditioning prior to arrival & run the fan only, 30 minutes after pulling up
13. Switch places with a second surveillance vehicle to run the airconditioner away from the target
14. If possible work at night
15. Use sunblock
16. Carry a urine bottle
17. Charge Summer rates for surveillance.
18. Accept the contract & hire competent sub-contractors to conduct the surveillance

Surveillance Investigations













PJL 29th August 2010

Investigation eBooks

If you are keen on reading eBooks and you have specific interests in the investigation field, I encourage you to take a look at PI Mall's new range of investigation related eBooks.

The majority of the books I looked at today on the PI Mall web site have been on the web site for some time in hardcover version, although there are some newer books as well.

The majority of the hardcover investigation books are now available as eBooks, at half the price of the hardcover versions and much less for some eBook purchases.

When I looked over the range of books at the PI Mall web site today, I purchased a couple of eBooks, that we couldn't outlay the funds for the full price of the hardcover versions earlier on.

Please visit the web site link below to the PI Mall eBook and hardcover investigation book supply.

Investigation eBooks















PJL 29th August 2010

Saturday, August 28, 2010

Spyware Detection & Removal Tip

At the end of each year when online retail sales are increasing, there are more hackers around on the Worldwide Web looking for passwords and usernames of bank accounts, PayPal accounts or any online access, which will give a hacker access to email accounts & web site secure areas.

One motive of a hacker is to gain access to commit fraud, either directly or by using the information the hacker has accessed to obtain financial advantage illegally.

A hacker will use a spyware program or keylogging program, to assist them in getting passwords & usernames, to access your bank account or online merchant account. The risk may seem low but it's not when large sums of money are being transferred online.

I know on occasions when I have talked to clients about what their computer activities are, they have explained at times they could be transferring $1,000,000,000 online once a week.

It's quite frightening to think that you may have transferred a $100 from an online account, but then 10 minutes later a hacker has accessed your bank account by using spyware and keylogging programs in the process, to gain access to your account.

It is certainly quite possible for the hacker to access your bank account and then transfer even $150,000 from the account, to an overseas fake bank account. An overseas fake bank account could be closed within minutes after withdrawing the balance.

Of course there is security on bank accounts and sms alerts set up, also authentication information is required with a lot of online transfers.

Spyware and keylogging programs are a high risk threat to you, so act now and protect your computer systems, personal & business interests.

If you are not using any of the banks online security properly and spyware or keylogging programs are used against you, then you have a real threat of online fraudulent activity.

We can recommend a few quality spyware & keylogging protection programs. These software programs must be used together on the same computer system, for maximum protection.

You may be using an existing Anti Virus program or you may even be just using  Microsoft Windows Security, which is really not going to give your computer system the maximum protection it needs.

SpyReveal, Webroot Spy Sweeper & CounterSpy are excellent protection programs to use in strengthening your computer system against spyware and keylogging programs.

Another program called Vipre is an Anti Spyware & Anti Virus software program. This program can be used in place of CounterSpy from the list above because Vipre has the Anti Spyware features that CounterSpy uses.

You are looking at a cost of around $120.00 AUD to fortify your computer systems, by purchasing and installing quality spyware & keylogging protection software, like mentioned in this article.

The software programs SpyReveal, Webroot Spy Sweeper, Counter Spy & Vipre are multiple award winning programs, not your ordinary Anti Virus programs advertised online that you see all of the time.

These software programs are one of our closely kept secrets that we are providing for you, so at the end of this year when hackers are trying harder to break down your computer systems and enter your bank accounts, you are going to have much better protection.

This software doesn't work like a firewall; it detects spyware and keylogging programs while scanning your computer systems and removes the spyware and keylogging programs from your computer systems.

SpyReveal

Webroot Spy Sweeper

CounterSpy

Vipre



















PJL 28th August 2010

10 Quick & Affordable SEO Tips

An affordable SEO plan that is quick and easy and perfect for a small business budget. more



PJL 28th August 2010

Thursday, August 26, 2010

CPM700 Deluxe Lowest Price

PJL online store has once again reduced a quality product's price. The CPM700 Deluxe is at low price for TSCM professionals to purchase for a limited time.

The CPM700 Deluxe is one of the most popular and versatile Technical Surveillance Counter-Measure products on the market. It's a brilliant piece of equipment.

Lynch Investigations & Countermeasures Pty Ltd can recommend CPM700 Deluxe and can provide technical and backup support in Australia & the United States for this equipment.

We encourage you to think carefully when choosing TSCM equipment, because the CPM700 Deluxe is a government service grade product that comes at an extremely good price.

If you can see a better price for the CPM700 Deluxe in the hard shell case, please get in contact with us immediately because we will be interested in beating that price for you.

CPM700 Deluxe









































CPM700 Deluxe Manual Download

CPM700 Deluxe Lowest Price

PJL 26th August 2010

Nobel-Winning British Scientist Accused Of Spying By MI5, Papers Reveal

Files released at National Archives show DNA pioneer Maurice Wilkins was investigated for leaking nuclear secrets.

A British scientist who won a Nobel prize for his pioneering work on the DNA double helix was investigated by MI5 as a possible atom spy who had passed US nuclear secrets to the Russians. more 
















Professor Maurice Wilkins won a Nobel prize for his pioneering work on the DNA double helix. Photograph: National Archives/PA

guardian.co.uk

PJL 26th August 2010

Officer Charged With Manslaughter Will Likely Face Lawsuit

A new lawsuit is likely in the shooting death of an Ozarks driver. The police officer who shot the man is charged with involuntary manslaughter.

The family of the driver, Bobby L. Stacy, says prison time isn't enough for the officer. They’ve hired an attorney and a private investigator. more 



kspr.com

PJL 26th August 2010

Sweedish Shoolgirls Allegedly Bugged Staff Room

Two schoolgirls from Stockholm, Sweden, are being taken to court after allegedly placing bugs to record their teachers in the school staff room. more















cnews.canoe.ca

PJL 26th August 2010

CIA Secret Experiments

At the height of the Cold War, the CIA launched a highly classified, top secret research program that exposed Americans to biological agents, hallucinogenic drugs and psychological techniques aimed at mastering the art of mind control.

Entire cities in America were contaminated with bacteria, exposing millions to germ warfare.

NGC's CIA Secret Experiments examines what happened, shedding light on its research to better understand the extent and full reach of its disturbing experiments.

nationalgeographic.com



PJL 26th August 2010

Mandella's House Was Bugged

Johannesburg - Former president Nelson Mandela's Houghton house was bugged ahead the African National Congress's 2007 national conference, the Sunday Times reported on Saturday. more



















PJL 26th August 2010

Wednesday, August 25, 2010

Ski Workers Among Ten People Arrested Over Snowy Mountains Drug Ring

Six men and three women were arrested during seven separate raids carried out by 80 police officers at Jindabyne about 9.30am today.

Six of them are itinerant ski season workers while the other three are local residents, police say.

A tenth man was also arrested today - a 25-year-old from Jindabyne.

Police will allege all were part of a sophisticated drug ring, supplying large quantities of illegal drugs in the alpine region. more

(dailytelegraph.com.au)



PJL 25th August 2010

Tuesday, August 24, 2010

The Possible Prosecution of WikiLeaks

The U.S. Justice Department is apparently considering prosecuting Julian Assange, the founder of WikiLeaks, which is a Web site that publishes classified documents from governments, under the rarely used Espionage Act of 1917. Such a prosecution would have adverse effects on the American people’s right to know what their government is doing in a republic that is supposed to be run by them. more


















antiwar.com

PJL 24th August 2010

Gunman Was Decorated Cop

The gunman killed in one of the Philippines' deadliest hostage incidents was a decorated ex-policeman depressed over his sacking for various alleged crimes, his family said.

Ex-chief inspector Rolando Mendoza was once named one of the country's top 10 police officers and had served as head of Manila's Mobile Patrol Unit, the force's frontline group dealing with the city's street crimes.

He graduated from the Philippine College of Criminology in the early 1980s, before joining the force as a young lieutenant and later rising through the ranks, his service record showed.

Mendoza's downward spiral began in 2008 when a chef accused him of framing him over a drugs charge to extort money. more



news.ninemsn.com.au

PJL 24th August 2010

Changes To The Bankruptcy Act

The Federal Government has amended the Bankruptcy Act.

The minimum amount of judgement debt required to initiate bankruptcy action has been increased from $2,000.00 to $5,000.00 in Australia.

This could mean that you are going to find it harder to collect larger debts.

Debts have a legal life of 6 years but why let an outstanding amount get to a situation, where you or your business need to take legal action to recover the outstanding debt owing.

If your business has an outstanding account beyond a 30 day period, at least contact the client person who was in charge of purchasing services or goods from your business and ask when the outstanding account will be settled and how.

If you continue to get promises about the outstanding account being paid and find that it is not being paid, don't hesitate to contact Lynch Investigations & Countermeasures Pty Ltd. We have a background in collecting overdue accounts, process serving statement of claim & bankruptcy notices.

There are some formal steps to undertake with the court in some instances and Lynch Investigations & Countermeasures Pty Ltd's Commercial Agents can assist you or your business in progressing with a collection process, to get you or your business back on track to creating positive cash flow.

Licenced and qualified Fraud Investigators & Commercial Agents are available to assist. Please contact Peter Lynch on telephone number +61417260650 or email to peterlynch@pjlinvestigations.com.au



















PJL 24th August 2010

Sunday, August 22, 2010

Surveillance Investigation - Cameras & Covert Video Tips



Lynch Investigations & Countermeasures Pty Ltd - Surveillance Investigations

PJL 22nd August 2010

Internal Probe Into Pickton Investigation Opens Fresh Wounds For Families

An apology simply doesn't cut it for Lori-Ann Ellis, whose sister-in-law's DNA was found on serial killer Robert (Willie) Pickton's British Columbia pig farm.

The Vancouver Police Department apologized Friday for mistakes it made in the Pickton investigation as it released a 408-page report into every step and misstep in the massive police probe, including compelling evidence pointing at the serial killer by August 1999 — more than two years before his arrest. more













Frame grab of Robert Pickton looks at a surveillance camera while talking to an undercover policeman in his jail cell on February 23, 2002.

Photograph by: Handout, Vancouver Sun/PNG Merlin Archive

vancouversun.com

PJL 22nd August 2010

Friday, August 20, 2010

Tax Investigations Are An Uneven Match Between Small Business And The Tax Inspector

The essential first step to be taken by a small business un regard to a tax inspection happens long before that small business is advised a tax enquiry is about to take place. That first step is to obtain and retain receipts and third party evidence for every sale and purchase and maintain accurate accounting records. more





PJL 20th August 2010

Tuesday, August 17, 2010

Computer Forensics Process For Beginners

Computer forensics is currently a very popular term, and a lot of conferences are organized and books written on the subject. This, together with the popularity of the CSI series, brings an aura of certain very special, even magical steps that forensics teams use. In reality, the computer forensics job is a standard process, and every one of us does parts of the process when we debug our computers. So, here is a simple tutorial on what is involved in computer forensics: more



 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
shortinfosec.net
 
PJL 17th August 2010

Monday, August 16, 2010

Motel Robber Used Stanley Knife

A FORMER Jindera woman who demanded money before lunging with a Stanley knife at an Albury motelier earlier this year has been committed for sentence on two attempted armed robbery charges. more



















bordermail.com.au

PJL 16th August 2010

Private Investigator Charged With Stalking

A private investigator was arrested and charged with felony stalking recently in Weld County for doing what colleagues say is the backbone of their profession: surveillance. more



cbs4denver.com

PJL 16th August 2010

Sunday, August 15, 2010

Woman Takes Charge Of Major Intelligence Agency For The First Time

A chunk of the glass ceiling came tumbling down Monday as veteran national security officer Letitia "Tish" Long became the first woman to head a major intelligence agency. more












edition.cnn.com

PJL 15th August 2010

Saturday, August 14, 2010

CIA Confidential

CIA Confidential: Pakistan Undercover goes inside one of the most perilous battlegrounds of the new war: Pakistan. Join a 14-point strike to capture alleged al Qaeda logistician Abu Zubaydah and follow the CIA's multi-national effort to capture alleged al Qaeda terror-broker Rashid Rauf before he can unleash a massive attack on US airliners. more



nationalgeographic.com

PJL 14th August 2010

Tuesday, August 10, 2010

WikiLeaks People's Spy

For some he is an egoist, an irresponsible villain who has “blood on his hands”. For others, he is a hero, an “uncompromising rebel”. Julian Assange, the editor-in-chief of WikiLeaks, has become quite a phenomenon. more


















PJL 10th August 2010

Monday, August 9, 2010

Phone Secrets Found: The Dirt On Delete (smh.com.au)

After recovering deleted text messages that helped clear a man of rape charges, surveillance expert Gary Coulthart's services have been in high demand - for cases from lovers' quarrels to peeping toms to workplace thieves and perverts. more

Phone Secrets Found: The Dirt On Delete



















PJL 8th August 2010

Saturday, August 7, 2010

Top 40 Red Flags Which May Indicate Worker's Compensation Fraud

Claims adjusters look for the presence of red flags in workers’ compensation (WC) claims to determine whether or not a claim is legitimate. Red flags consist of particular conditions or behaviors commonly found in fraudulent claims. more












By Scott B. Fulmer

PJL 7th August 2010

Friday, August 6, 2010

Undercover Investigation (nationalgeographic.com)

Investigators pretending to be customers have covertly filmed Indonesian timber traders allegedly talking about how they exported a protected hardwood to China, where environmentalists say it is turned into furniture and building products for use worldwide, including Europe and the U.S. The names and video have been made public. more
















PJL 6th August 2010

Thursday, August 5, 2010

Hume Highway Speedster Appeals Jail Term (bordermail.com.au)

A CANBERRA man described by a magistrate as having “a continuing attitude of irresponsibility on the roads” has lodged an appeal against a four-month jail term imposed for driving at 235km/h. more











PJL 5th August 2010

Wednesday, August 4, 2010

Help Find My Child

If you didn't know about the Help Find My Child web site, then it's about time you had a look at it for the benefits of those lost children, who in some way or another, you may at some stage be able to help.

We think it is an extremely valuable and useful resource for sharing intelligence with the public about missing children.

Finding people is all about information sharing, so the more you know, the better we are equipped to make informed decisions about finding missing children.

Help Find My Child



















PJL 4th August 2010

Tuesday, August 3, 2010

Nine Killed in Shooting at Connecticut Beer Distributorship

One of two survivors shot in a beer warehouse rampage in Connecticut tells The Associated Press the gunman was "cold as ice" as he started firing his weapon shortly after being forced to resign for stealing beer. more























PJL 3rd August 2010

Monday, August 2, 2010

David Jones Scandal (aca.ninemsn.com.au))

David Jones and the department store's former CEO Mark McInnes are being sued for more than $37 million by former employee Kristy Fraser-Kirk who claims the executive sexually harassed her. more






PJL 2nd August 2010

Sunday, August 1, 2010

Police Arrest Two Unlicensed Locksmiths (wral.com)

Raleigh, N.C. — Police on Thursday arrested two men on charges that they were performing locksmith services without a license, including one man who was the subject of a WRAL News hidden-camera investigation. more







PJL 1st August 2010

How To Disappear: The World's Number One Guide To Vanishing Without A Trace.

I received an email today from Frank M. Ahearn with a web site link to information about his new book, How to Disappear: The Worlds Number One Guide to Vanishing Without a Trace.

Basically the book is about the tools that can be used to help you disappear, both online and in the flesh and how to make sure you stay invisible.

The book also provides practical advice on;
  • Disappearing from a stalker
  • Identity theft protection
  • Internet privacy
  • Living offshore incognito
It should be a very interesting book to read especially for the Private Investigation Industry.

How to Disappear: The World's Number One Guide to Vanishing Without a Trace is available at Barnes & Noble at a pre-order price & at Penguin Books.

The book can be reviewed further by visiting Frank's web site.

Please visit the web site link below to the new book, How to Disappear: The World's Number One Guide to Vanishing Without a Trace by Frank M. Ahearn & Eileen C. Horan.

You will be able to place a book order online.

How to Disappear: The World's Number One Guide to Vanishing Without a Trace by Frank M. Ahearn & Eileen C. Horan


















PJL 1st August 2010

Service of Court Papers Probed (lvrj.com)

Las Vegas police are investigating allegations that an unlicensed process serving company submitted false affidavits in justice courts around the valley, potentially disrupting the lives and finances of thousands of civil case defendants. more


PJL 1st August 2010