<?xml version="1.0" encoding="UTF-8"?>
<feed xml:lang="en-US" xmlns="http://www.w3.org/2005/Atom">
  <id>tag:cms.lawgical.com,2011:/v1/feeds/5</id>
  <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/help"/>
  <link rel="self" type="application/atom+xml" href="http://www.pinow.com/articles"/>
  <title>PInow.com Help Center</title>
  <subtitle>The Help Center is a library of informative articles to guide you through investigation services.</subtitle>
  <logo>http://www.pinow.com/apple-touch-icon.png</logo>
  <icon>http://www.pinow.com/apple-touch-icon.png</icon>
  <updated>2019-03-04T00:00:00-07:00</updated>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2569</id>
    <published>2019-03-04T00:00:00-07:00</published>
    <updated>2019-03-04T13:12:29-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2569/conviction-podcast-where-ethics-and-brawn-clash"/>
    <title>Conviction Podcast: Where Ethics and Brawn Clash</title>
    <summary>The new podcast Conviction looks at Manuel "Manny" Gomez and some of the controversy surrounding his methods.  </summary>
    <content type="html">&lt;p&gt;&lt;em&gt;The below is a review and summary of &amp;ldquo;Conviction,&amp;rdquo; a new podcast exploring investigation themes. PInow was not involved in the production of &amp;ldquo;Conviction.&amp;rdquo;&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;img class="cms-alignright" style="float: right; padding-left: 5px;" title="Manuel Gomez" src="https://s3.amazonaws.com/lawgical/assets/data/5069/original.jpg" alt="Manuel Gomez" width="252" height="250" /&gt;&lt;/p&gt;
&lt;p&gt;With a slick pinstripe suit and a knife hidden in his pen, Manuel &amp;ldquo;Manny&amp;rdquo; Gomez storms through the Bronx as a private investigator or, as he sees it, &amp;ldquo;a punisher for the wicked and a bringer of justice to the innocent.&amp;rdquo; Gomez, the founder of &lt;a&gt;Black Ops Private Investigators&lt;/a&gt; and investigator for a plethora of complex cases for over 15 years, is the subject of a new investigation podcast, &lt;em&gt;Conviction&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;While Gomez may strive for justice, his career is littered with controversy surrounding his brash methods. He has achieved success with the wrongful conviction case of Pedro Hernandez, a man accused of a Bronx shooting. Gomez&amp;rsquo;s successful verdict reversal brings to light the prevalence of police and prosecutor wrongdoing; but many question the ethics of his tactics, particularly after his misconduct recently sent a client back to jail because they were seen as complicit in Gomez&amp;rsquo;s irresponsible actions.&lt;/p&gt;
&lt;blockquote&gt;The justice I couldn&amp;rsquo;t give as a cop, now I give to the people as a private investigator. The justice I couldn&amp;rsquo;t get for myself, now I give to the people of New York City.&amp;rdquo; - Manny Gomez&lt;/blockquote&gt;
&lt;p&gt;In the new podcast Conviction, produced in collaboration with &lt;em&gt;Gimlet Media&lt;/em&gt; and &lt;em&gt;The New York Times&lt;/em&gt;, reporter Saki Knafo dives deep into Gomez&amp;rsquo;s career. Specific highlights include the Hernandez case and the investigator&amp;rsquo;s vendetta against the N.Y.P.D., specifically Officer David Terrell. In putting Gomez under the magnifying glass, the podcast explores the blurred line between hero and villain, and how the answer is not as always straightforward as one would presume. It presents a raw, unflinching report of his past that shapes his nuanced present. Taking his personal experiences into consideration, the reporters speculate how these experiences have impacted the way he approaches his investigations, for better or for worse.&lt;/p&gt;
&lt;p&gt;In its seven episodes, the podcast also explores flaws in America&amp;rsquo;s criminal justice system and the people who are most impacted by these flaws. This multi-perspective podcast forces you to ask questions, that like Gomez, do not have a straightforward answer.&lt;/p&gt;
&lt;blockquote&gt;You cannot be passive aggressive when you fight a fight like this. You must roll through it like a tank going into a battle zone. That&amp;rsquo;s the only way.&amp;rdquo; - Manny Gomez&lt;/blockquote&gt;
&lt;p&gt;&lt;img class="cms-alignleft" style="float: left; padding-right: 5px;" title="Conviction Podcast" src="https://s3.amazonaws.com/lawgical/assets/data/5070/original.jpg" alt="Conviction Podcast" width="250" height="250" /&gt;&lt;/p&gt;
&lt;p&gt;For private investigators, the podcast contains a unique look at the ethics behind investigation and the question of how far is too far. While Manny&amp;rsquo;s drive and dedication often achieves the impossible for his clients, his tunnel vision and strong desire to be right above all else makes him a liability for the already vulnerable. His use of media contacts and his handling of witnesses also toes the line between right and wrong. Taking risks for a case is understandable and even encouraged for a quality investigator, but at what point do those risks put your client and their family in danger?&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.gimletmedia.com/conviction"&gt;Listen to &lt;em&gt;Conviction&lt;/em&gt;&lt;/a&gt; and come to your own conclusions about Manny Gomez and his brazen conduct. If you&amp;rsquo;re interested in hearing more about Manny and the police misconduct he&amp;rsquo;s sworn to dismantle, check out the Hulu documentary &lt;a href="https://www.youtube.com/watch?v=n4WfaaJi_fQ"&gt;Crime + Punishment&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Disclaimer: Conviction contains strong language and mature themes so listener discretion is advised.&lt;/em&gt;&lt;/p&gt;
&lt;blockquote&gt;They can&amp;rsquo;t touch me, they can&amp;rsquo;t hurt me because they see that I&amp;rsquo;m unstoppable, because what I present is the truth.&amp;rdquo; - Manny Gomez&lt;/blockquote&gt;
&lt;p&gt;Do you have a favorite private investigator podcast, movie, book or recently published any relevant materials yourself? Let us know in the comments or &lt;a href="https://www.pinow.com/contact"&gt;get in touch&lt;/a&gt; to share your review.&lt;/p&gt;</content>
    <author>
      <name>ServeNow Staff</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2518</id>
    <published>2018-12-10T00:00:00-07:00</published>
    <updated>2018-12-10T10:53:36-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2518/financial-transactions-social-media-in-investigations"/>
    <title>Financial Transactions &amp; Social Media in Investigations</title>
    <summary>Social media investigations are growing tools for private investigators to get to the bottom of their clients’ cases. Almost every American can identify social media platforms like Facebook, Twitter, and Instagram, but what about applications such as Venmo? Most people view Venmo simply as a way to easily send money to their friends and families, but for investigators, it is much more.</summary>
    <content type="html">&lt;p&gt;&lt;a href="https://www.pinow.com/investigations/social-media-investigations"&gt;Social media investigations&lt;/a&gt; are growing tools for private investigators to get to the bottom of their clients&amp;rsquo; cases. Almost every American can identify social media platforms like Facebook, Twitter, and Instagram, but what about applications such as Venmo? Most people view Venmo simply as a way to easily send money to their friends and families, but for investigators, it is much more.&lt;/p&gt;
&lt;h2&gt;What is Venmo?&lt;/h2&gt;
&lt;p&gt;Venmo is an application that lets an individual connect to his or her bank account to send money to another user. Many people use Venmo to split a bill or pay for utilities/rent to a roommate.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Users simply request or pay their friends a predetermined amount. The recipient can store the money in their Venmo account to pay other users or transfer the money into their bank account. The transaction must include a description to keep track of the reason for sending or receiving payment.&lt;/p&gt;
&lt;h3&gt;Venmo Privacy Settings&lt;/h3&gt;
&lt;h4&gt;Public&lt;/h4&gt;
&lt;p&gt;Many Venmo users have their privacy set to &amp;ldquo;Public&amp;rdquo; - meaning that anyone on the internet can view their transaction history. However, regardless if the payments are open to the public, the amount sent is always hidden.&lt;/p&gt;
&lt;h4&gt;Friends&lt;/h4&gt;
&lt;p&gt;To easily pay your close friends, Venmo also allows people to &amp;ldquo;friend&amp;rdquo; one another. This feature allows them to see their friend&amp;rsquo;s transactions: who they are sending to and receiving from other users.&lt;/p&gt;
&lt;p&gt;When a user sets privacy to &amp;ldquo;Friends&amp;rdquo; the exchange is visible to the sender, recipient, and both the sender and recipient&amp;rsquo;s Venmo friends. Just like &amp;ldquo;Public,&amp;rdquo; the actual amount sent is not shown.&lt;/p&gt;
&lt;h4&gt;Private&lt;/h4&gt;
&lt;p&gt;Users can also set their transactions to &amp;ldquo;Private,&amp;rdquo; meaning that only the accounts involved in the transaction can view the payment and description.&lt;/p&gt;
&lt;h2&gt;How Investigators can utilize Venmo&lt;/h2&gt;
&lt;p&gt;While most of the information on Venmo is harmless and inconsequential, investigators can use the public page to research for their client. However, the public feature may assist investigators in tracking who their subject is paying and decipher the reasoning behind a certain payment. Additionally, if their client is friends with the subjects on Venmo, they have a greater chance of tracking payments with that privacy setting. In certain investigations, this may help establish relationships, determine who their landlord could be, or the person they are living with, or find out the subjects eating and social habits.&lt;/p&gt;
&lt;p&gt;For example, a Berlin-based investigator, Hang Do Thi Duc, was able to use Venmo&amp;rsquo;s Public Dashboard to view all exchanges available to anyone with an internet connection. Hang was able to see trends in habits and transactions that certainly some parties would prefer to be kept secret.&lt;/p&gt;
&lt;h3&gt;Caveats&lt;/h3&gt;
&lt;p&gt;To have a successful Venmo investigation, the private investigators must be sure that the user is actually the person under investigation. This may be tricky or impossible to completely verify, however, investigators can simply use Venmo as a starting point for their research.&lt;/p&gt;
&lt;p&gt;Additionally, many younger users do not put a clear description on some of their Venmo transactions. People often use emojis to describe the exchange. Sometimes it is possible to deduce what the payment is for (e.g. a house emoji may be a rent payment) however, without any specific description, it is hard to prove the true meaning since there can be multiple explanations.&lt;/p&gt;
&lt;p&gt;Venmo limits its user&amp;rsquo;s total payment amounts to $2,999.99 for verified users and $999.99 for unverified users. While outside parties cannot see the amount sent, this monetary limit may restrict some investigations. A private investigator cannot assume a large transaction via Venmo was sent if they are trying to prove an exchange of money exceeding the limit.&lt;/p&gt;
&lt;p&gt;Therefore, these caveats should lead the investigator to use Venmo as a starting point for their investigation. Investigators can use Venmo to gather initial evidence for habits, trends, and relationships. Additionally, it's highly suggested that investigators use other social media investigative tactics and surveillance to gather the evidence needed to prove their client&amp;rsquo;s claim.&lt;/p&gt;
&lt;h2&gt;Users &amp;amp; Venmo&lt;/h2&gt;
&lt;p&gt;Venmo (and PInow) understands that many users want control over their settings, especially when it comes to financial information. The intersection of social media and personal financial details create a gray area. If you use Venmo and do not want your information public, go to Settings, Privacy, and choose your preferred settings.&lt;/p&gt;
&lt;p&gt;&lt;img style="float: left;" title="Venmo Privacy Settings" src="https://s3.amazonaws.com/lawgical/assets/data/4719/original.png?1536269206" alt="Venmo Privacy Settings" width="303" height="526" /&gt;&lt;/p&gt;</content>
    <author>
      <name>PInow Staff</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2523</id>
    <published>2018-10-01T00:00:00-06:00</published>
    <updated>2019-06-14T15:07:56-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2523/private-investigations-on-indian-reservations"/>
    <title>Private Investigations on Indian Reservations</title>
    <summary>Indian reservations present distinct challenges to private investigators due to their independent legal standing. Indian reservations are federally recognized and managed by the FBI as well a the United States Department of the Interior of Indian Affairs.</summary>
    <content type="html">&lt;p dir="ltr"&gt;Private investigators&amp;rsquo; work can span a wide range of services, from surveillance to skip tracing and researching information. For surveillance specifically, private investigators may surveil targets at their place of work, homes, and social events.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;While all of this is standard protocol, extra steps must be taken when handling jobs that occur in places that require special circumstances, such as on Indian reservations. With various Indian reservations across the United States, it is not unheard of that a private investigator may need to conduct work within a reservation&amp;rsquo;s borders.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Law on Indian Reservations&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Indian reservations present distinct challenges to private investigators due to their independent legal standing. Indian reservations are federally recognized and managed by the FBI as well a the United States Department of the Interior of Indian Affairs. According to the United States Department of the Interior of Indian Affairs, there are &lt;/span&gt;&lt;a href="https://www.bia.gov/about-us" target="_blank"&gt;&lt;span&gt;573 federally recognized&lt;/span&gt;&lt;/a&gt;&lt;span&gt; American Indian tribes and Alaska Natives, with approximately 300 reservations.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;To begin with, you must understand that Indian reservations, though federally recognized, &amp;nbsp;are not governed by state law. Instead, the relationship between the United States and a reservation is a &amp;ldquo;&lt;/span&gt;&lt;a href="https://www.bia.gov/frequently-asked-questions" target="_blank"&gt;&lt;span&gt;government-to-government principle&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&amp;rdquo;. The United States government treats Indian reservations similarly to the manner in which they treat other independent nations or countries when it comes to laws. When it comes to investigations and legal matters, the FBI handles major crimes, &amp;nbsp;while the tribal courts handle minor crimes.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Now that we have broken down the unique nature of an Indian reservation, it is time to consider how you will conduct your investigation. Prior to beginning any on-the-ground investigative work, it is important to do your research on the individual reservation itself to understand how it works and so that you understand the territory in which you may find yourself working.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Before The Investigation&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Before beginning work on a reservation, you definitely want to consult the tribal law and determine if the work you need to do is permissible. Because state and even local governments do not have jurisdiction or authority with the reservation, you will need to look at the tribal law, which governs the Indian reservation.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Thankfully, you can find a great breakdown of the different tribal laws online through the United States &lt;/span&gt;&lt;a href="https://www.usa.gov/tribes" target="_blank"&gt;&lt;span&gt;government website&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that offers information on tribes or through other Native American legal sites, such as the &lt;/span&gt;&lt;a href="http://www.tribal-institute.org/lists/tribal_law.htm" target="_blank"&gt;&lt;span&gt;Tribal Law Clearinghouse &lt;/span&gt;&lt;/a&gt;&lt;span&gt;or through the &lt;/span&gt;&lt;a href="https://www.narf.org/nill/triballaw/" target="_blank"&gt;&lt;span&gt;Native American Rights Fund&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which provides a number of resources.&lt;/span&gt; InfoTracer also has an &lt;a href="https://infotracer.com/resources/united-states-tribes/"&gt;extensive database of United States Tribes&lt;/a&gt; in which they provide modern statistics and constantly update for accuracy.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Aside from being familiar with the tribal law of the reservation in which you intend to conduct an investigation, it is important to reach out to local officials on the reservation to ensure that you are following the tribal law. Additionally, they may need to grant you permission or you may need permits to conduct your work. You can find a &lt;/span&gt;&lt;a href="https://www.bia.gov/sites/bia.gov/libraries/maps/tld_map.html" target="_blank"&gt;&lt;span&gt;directory of tribal leaders&lt;/span&gt;&lt;/a&gt;&lt;span&gt; through the Bureau of Indian Affairs. Ample preparation is key and can save you headaches down the road.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Conducting Your Investigation&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;As a private investigator, the manner in which you conduct your investigation should not vary too much. There may be specific regulations that you have to follow with regard to tribal law that may prevent you from utilizing certain technology or techniques, but that is dependant upon the specific reservation&amp;rsquo;s tribal law.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Similar to &lt;/span&gt;&lt;a href="https://www.serve-now.com/articles/2099/how-to-serve-legal-papers-on-an-indian-reservation" target="_blank"&gt;&lt;span&gt;serving process on an Indian reservation&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, it is imperative that you understand the laws that are specific not only to the reservation but also to your job and what you need to do. There may be laws regarding GPS tracking, satellites, surveillance, and more that can change the way you conduct your investigation. If you have permission from the tribal council to conduct your investigation, you may be permitted to do more (or less) than you are able to do outside of the reservation.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;One tribal officer detailed &lt;/span&gt;&lt;a href="https://www.huffingtonpost.com/quora/if-you-commit-a-crime-can_b_1507190.html" target="_blank"&gt;&lt;span&gt;his experience working with reservations&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and the common theme was that they are all different. The rules are not often overtly apparent, which is why we have reiterated that you must take the time to look into the laws of the specific reservation. Similarly to conducting an investigation with a subject who is out of the state or out of the country from which you normally practice, take the same precautions with investigations on reservations.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Just as you may surveil a target and wait to see what they do in their time outside of work, you may also surveil and investigate an individual if and when they leave the reservation. Stick to your investigative instincts and conduct your investigation the way you would with anyone else &amp;mdash; remaining cognizant of the rules.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Read More about Unique Investigation Scenarios:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2408/elder-abuse-investigations" target="_blank"&gt;Elder Abuse Investigations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2242/a-quick-guide-to-family-investigations" target="_blank"&gt;A Quick Guide to Family Investigations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2208/catfishing-investigation-tips-risks-signs-and-what-to-do" target="_blank"&gt;Catfishing Investigation Tips: Risks, Signs, and What to Do&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2451/what-you-need-to-know-about-investigating-workers-compensation-cases" target="_blank"&gt;What You Need to Know About Investigating Workers Compensation Cases&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2423/identity-fraud-how-a-pi-can-help" target="_blank"&gt;Identity Fraud: How a PI can Help&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2366/importance-of-investigators-in-criminal-cases" target="_blank"&gt;Importance of Investigators in Criminal Cases&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2348/traffic-accident-investigations" target="_blank"&gt;Traffic Accident Investigations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2358/online-investigations-the-deep-and-dark-web" target="_blank"&gt;Online Investigations: The Deep and Dark Web&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Stephanie Irvine</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2505</id>
    <published>2018-09-03T00:00:00-06:00</published>
    <updated>2018-08-24T10:53:22-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2505/13-signs-that-your-client-may-be-bugged"/>
    <title>13 Signs That Your Client May Be Bugged</title>
    <summary>In the last decade, bug sweeps are now one of our most requested services. With the rise in technology becoming more affordable, compact, and adaptable, it is more accessible for those with nefarious intents to eavesdrop on a victim to steal valuable intelligence. A victim of being bugged could be blackmailed by the suspect or have their information sold to a competitor.</summary>
    <content type="html">&lt;p dir="ltr"&gt;&lt;span&gt;In the last decade, bug sweeps are now one of our most requested services. With the rise in&amp;nbsp;&lt;/span&gt;technology becoming more affordable, compact, and adaptable, it is more accessible for those with nefarious intents to eavesdrop on a victim to steal valuable intelligence. Common situations that increase susceptibility to being bugged:&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Businesses:&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;&lt;span&gt;Involved in a lawsuit&lt;/span&gt;&lt;/li&gt;
&lt;li dir="ltr"&gt;Have plans to or have recently downsized&lt;/li&gt;
&lt;li dir="ltr"&gt;In a competitive industry that relies on insider knowledge (marketing, fashion, automotive, product development, medical, technology, advertising, etc.)&lt;/li&gt;
&lt;li dir="ltr"&gt;Involved in government affairs or politics&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 dir="ltr"&gt;Personal affairs:&lt;/h3&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;&lt;span&gt;Filing or in the middle of a divorce&lt;/span&gt;&lt;/li&gt;
&lt;li dir="ltr"&gt;Involved in a custody battle (it is common for the children to have devices hidden in their things or on them during visits)&lt;/li&gt;
&lt;li dir="ltr"&gt;In the process of getting married&lt;/li&gt;
&lt;li dir="ltr"&gt;Filed an insurance claim&lt;/li&gt;
&lt;li dir="ltr"&gt;Is or previously was in a position of power or influence, in business or politics&lt;/li&gt;
&lt;li dir="ltr"&gt;Is a minister or religious leader&lt;/li&gt;
&lt;li dir="ltr"&gt;Suspects the person eavesdropping is someone close to them who work in law enforcement, security, or the judicial system.&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;While you should always conduct due diligence beyond the face value of what a client tells you,&amp;nbsp;&lt;/span&gt;if a client doesn&amp;rsquo;t disclose any of these warning signs and are not a high-risk client, there is a&amp;nbsp;very high chance they are not being tracked or eavesdropped through devices.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;However, when you do an intake with your client, if they note any of the warning signs, we advise to gather more information and move forward with a bug sweep or technical surveillance counter-measures (TCSM) inspection.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;People have found out about personal matters or confidential business secrets, or just seem to know too much about their activities.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the most telling sign that they may be bugged: The client has noticed people they have never disclosed information to know about their personal and business affairs. If it is a business, there are signs that a competitor or vendor has obtained the business&amp;rsquo; internal information.&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;In the Home and Office&lt;/span&gt;&lt;/h2&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Evidence of a break-in, but nothing was stolen&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Even if there is no overt evidence, the client may notice that something &amp;ldquo;seems off,&amp;rdquo; such as&amp;nbsp;&lt;/span&gt;furniture or objects slightly moved, closets and drawers are rummaged through, or dusty areas are disturbed. Additionally, a client may note that suddenly a new object was added to the home after the break-in, such as clocks, signage, picture frames, tissue boxes, lamps, and radios.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Wall fixtures have shifted slightly&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Some of the most popular hidden surveillance devices are designed to go inside or behind&amp;nbsp;&lt;/span&gt;electrical outlets, light switches, smoke alarms, and lighting. Hidden camera lenses can be as&amp;nbsp;small as the head of a screw, making them ideal to conceal in common wall fixtures.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;A strange vehicle parked near the home or office frequently with no one inside&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Devices that transmit the recordings via Wi-Fi or radio frequency may require the eavesdropper be stationed nearby. Service or delivery trucks are commonly used: if you see the same or similar vehicle more than three times, there may be an eavesdropper. Vehicles with black or tinted windows allow the perpetrator to conceal themselves in the back of the vehicle to monitor the devices. Ladders or pipe racks on a vehicle can help conceal an antenna or beacon.&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Interference in landlines, radios, or televisions&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;The client has noticed that their radio, landline, or television are acting &amp;ldquo;weird.&amp;rdquo; This&amp;nbsp;&lt;/span&gt;includes increased interference, a solid faint tone or high-pitched squeal on the phone, (note that beeping or high-pitched noises could just be a result of a fax machine dialing the wrong number) or their radio loses signal in areas it has never lost signal before.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Common objects have a small hole or reflective surface&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Many spy stores sell popular, common home and office products such as lamps, clocks, tissue&amp;nbsp;&lt;/span&gt;boxes, plant boxes, or exit signs, with a camera or microphone pre-installed, containing a small&amp;nbsp;hole or reflective spot to hold the camera lens. A client has noticed that these products &amp;ldquo;just&amp;nbsp;appeared&amp;rdquo; or these things have changed slightly in appearance.&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;In the Office&lt;/span&gt;&lt;/h2&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Ceiling tiles appear disturbed, discolored, or damaged, or have ceiling dust on the floor&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;A common installation location for hidden listening devices is inside the ceiling tiles: Their accessibility makes them a prime target. The client may have noticed that tiles have shifted, are not properly set in the frame, or were recently damaged. However, note any recent maintenance issues in the building: These signs could be just a result of a pipe leaking or new construction.&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Bump in the vinyl baseboard&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;A small bump or deformity in the vinyl baseboard along the floor is a sign that someone hid and adhered a wire or microphone behind the baseboard. The vinyl-style baseboards are more popular in offices than homes. &lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;The client recently received gifts from vendors&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;If the client suspects that a competitor or vendor is spying on them, a common tactic is to place listening bugs inside &amp;ldquo;gifts,&amp;rdquo; such as pens, clocks, briefcases, adaptors, etc. Ask the client if any gifts were given to them, and what they were specifically.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;In Their Vehicle&lt;/span&gt;&lt;/h2&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Their car appears broken into, but nothing was taken&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Something inside the vehicle seems &amp;ldquo;off&amp;rdquo;, but nothing was stolen. The client may have noticed that the seating moved, (even though they are the primary driver and have not lent the car to anyone recently) the car rummaged through, or there are new items in the vehicle. This may have occurred multiple times, as the eavesdropper may need to retrieve the device to download the data or recharge the battery.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Their car is taking longer to start&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Some tracking and eavesdropping devices are connected to the car battery, using the power source when the engine is off. While it may not completely drain the battery, it can cause the car to stutter a bit as the remaining power tries to start the engine. This is not as common now as devices have moved more towards using internal batteries, going into an &amp;ldquo;idle&amp;rdquo; mode when movement or sound is not detected to conserve power.&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Electronics in the car are behaving erratically&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;The electronics in the car, including the radio and displays, are acting strange, which could result from interference from a covert surveillance device. &lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Others seem to know the client&amp;rsquo;s whereabouts&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;The client has noticed that others seem to know too much about their travels and driving habits.&amp;nbsp;&lt;/span&gt;GPS tracking devices can be attached to a car with something as simple and discreet as a strong magnet. Common areas include under the engine bay, rear bumper, inside the dashboard, and behind the wheel well.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Client suspects they are followed while driving&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;If there is a hidden microphone or camera in the car, the suspect may need to stay within a&amp;nbsp;&lt;/span&gt;certain range of the device to acquire the recordings. The client has noticed that the same vehicle was following behind them or has frequently parked near their car.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Start Your Investigation&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;While this list is not exhaustive or definitive indicators that a client is bugged, it is enough to warrant further investigation. Seeing these signs in our own agency has resulted in finding covert devices approximately 80% of the time. It is imperative that you analyze the context of your client&amp;rsquo;s situation, perform proper due diligence to ensure you offer the best type of services for your client&amp;rsquo;s needs and give them peace of mind.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author:&lt;/h3&gt;
&lt;p&gt;&lt;img class="align_left" style="float: left;" src="https://s3.amazonaws.com/lawgical/assets/data/4632/original.jpg" alt="Matthew D. Seifer" width="200" /&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Matthew D. Seifer has an extensive background in private investigations and security, with over&amp;nbsp;&lt;/em&gt;&lt;em&gt;a decade of experience in the industries. His passion and drive have earned him a range of titles:&amp;nbsp;&lt;/em&gt;&lt;em&gt;Licensed Private Investigator, New York State Registered Armed Guard, Technical Surveillance&amp;nbsp;&lt;/em&gt;&lt;em&gt;Countermeasures (TSCM) Specialist, and NYS Division of Criminal Justice Services Certified&amp;nbsp;&lt;/em&gt;&lt;em&gt;Instructor. Seifer is a U.S. Army veteran, with over 26 years in the private sector. He is not your&amp;nbsp;&lt;/em&gt;&lt;em&gt;typical PI: his work in security and education has made him evolve into not just a private&amp;nbsp;&lt;/em&gt;&lt;em&gt;investigator, but an instructor and mentor to help provide safety and security to the public.&amp;nbsp;&lt;/em&gt;&lt;em&gt;Matthew Seifer has been featured on local and national media platforms, including Inside&amp;nbsp;&lt;/em&gt;&lt;em&gt;Edition for his work in providing active shooter response training and drills for schools and the&amp;nbsp;&lt;/em&gt;&lt;em&gt;workplace. Mr. Seifer is described as strong and a born leader, as well as compassionate, dedicated, trustworthy, and diligent with his clients, students, and community.&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;He founded &lt;a href="https://prvteye.com/"&gt;Radius Investigations&lt;/a&gt; in 2007. Since its inception, he has expanded the agency from his Long Island, New York headquarters to New York City and has developed a worldwide&amp;nbsp;&lt;/em&gt;&lt;em&gt;network of private investigators. Seifer&amp;rsquo;s professional expertise has made Radius Investigations&amp;nbsp;not your typical PI agency: Providing a broad spectrum of services including background investigations, TSCM bug sweeps, insurance investigations, as well as unique educational programs on security, safety, and private investigations through their new training division, Guardian Security Training.&lt;/em&gt;&lt;/p&gt;</content>
    <author>
      <name>Matthew D. Seifer</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2075</id>
    <published>2018-05-28T00:00:00-06:00</published>
    <updated>2019-03-08T13:26:55-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2075/16-things-you-should-know-about-court-records"/>
    <title>16 Things You Should Know About Court Records</title>
    <summary>Learn about how court records work, permissions, data points, and some interesting statistics about U.S. courts. At the end, you'll even get some tips from practicing investigators.</summary>
    <content type="html">&lt;p&gt;When it comes to how court records are organized, which search methods work best, and how these records can supplement an investigation, there is a lot of information out there. Nearly every investigation conference we've attended has had a track on court records, and we hear time and time again that the most reliable and helpful information always comes from a trained and experienced private investigator.&lt;/p&gt;
&lt;p&gt;Brian Willingham of Diligentia Group, a PInow Top Blogger and a Top Investigator on Twitter, along with I-Sight Software put on a great &lt;a href="http://i-sight.com/resources/webinar-an-investigators-guide-to-searching-court-records/."&gt;webinar&lt;/a&gt; on court records. We've included some key takeaways, the things you should know about court records, and some great court record search tips from members of the Investigator Marketing Group on LinkedIn below.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/2549/original.png" alt="16 Things You Should Know About Court Records" /&gt;&lt;/p&gt;
&lt;p&gt;Below are 16 crucial things you should know about court records, how to search them, and how the information can impact your investigation. Afterward, hear some additional tips from experienced investigators.&lt;/p&gt;
&lt;h3&gt;1. Court records are one of the most important and underutilized resources in an investigation&lt;/h3&gt;
&lt;p&gt;"Court records don't require any special permission," investigator Brian Willingham says. "The beauty of court records is that they are available to anybody. "&lt;/p&gt;
&lt;h3&gt;2. They don't require any special permission&lt;/h3&gt;
&lt;p&gt;While investigators who work with corporate entities may have access to emails or human resources files, and police officers will have access to certain information and the FBI even further details, court records are available to anybody who knows how to get access to them.&lt;/p&gt;
&lt;p&gt;"The beauty of court records is that they are available to anybody," investigator Brian Willingham says, "Anybody that knows how to get them can get them."&lt;/p&gt;
&lt;h3&gt;3. They are based on factual information&lt;/h3&gt;
&lt;p&gt;Court records provide documentation of allegations, proceedings, sworn statements, and affidavits taken under oath.&lt;/p&gt;
&lt;h3&gt;4. They paint a different picture of a person than interviews with associates will&lt;/h3&gt;
&lt;p&gt;The documents that you have in court records will provide insight as to whether they have been involved in litigation or are a convicted criminal. This can add a different layer of insight into a person or individual.&lt;/p&gt;
&lt;h3&gt;5. Court records provide millions of data points for you to access&lt;/h3&gt;
&lt;p&gt;There are 150 million cases filed each year in U.S. courts. While many of these are traffic violations, small claims disputes, and other minor cases that wouldn't be critical for most investigations.&lt;/p&gt;
&lt;h3&gt;6. In simplest terms, there are two separate areas of courts: federal courts and state courts&lt;/h3&gt;
&lt;p&gt;Federal courts handle cases like immigration law, bankruptcy law, social security law, patent law, and other federal laws that are being broken. Federal courts include the below courts (in order of superiority).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;U.S. Supreme Court&lt;/li&gt;
&lt;li&gt;U.S. Court of Appeals&lt;/li&gt;
&lt;li&gt;Special Courts&lt;/li&gt;
&lt;li&gt;U.S. District Court&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img class="align_center" src="https://s3.amazonaws.com/lawgical/assets/data/2545/original.png" alt="Federal Court Boundaries Map" /&gt;&lt;/p&gt;
&lt;p class="font_small text_light text_center"&gt;&lt;em&gt;Image credit: http://i-sight.com/resources/webinar-an-investigators-guide-to-searching-court-records&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;State courts handle civil matters like contract disputes, family matters, divorces, and other state-level matters. In order of superiority, state courts include . . .&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;State Supreme Court&lt;/li&gt;
&lt;li&gt;Superior Court&lt;/li&gt;
&lt;li&gt;Special Courts&lt;/li&gt;
&lt;li&gt;Local Courts&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img class="align_center" src="https://s3.amazonaws.com/lawgical/assets/data/2546/original.png" alt="State County County Boundaries Map" /&gt;&lt;/p&gt;
&lt;p class="font_small text_light text_center"&gt;&lt;em&gt;Image credit: http://i-sight.com/resources/webinar-an-investigators-guide-to-searching-court-records&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Special courts would include tax courts, bankruptcy courts, social security courts, etc.&lt;/p&gt;
&lt;h3&gt;7. There are 94 district courts in the United States&lt;/h3&gt;
&lt;p&gt;Most states only have one court, but some have more. California, for example, has four different federal courts.&lt;/p&gt;
&lt;h3&gt;8. There are over 3,000 county or county-equivalent (borough, parish) state courts&lt;/h3&gt;
&lt;p&gt;In Texas alone, there are 250 counties. Even within all of these counties, there is usually one court per county and the regional courts. In New York, there are 62 counties, and within those counties, there are 62 county courts, 62 family courts, 62 surrogates courts, 79 city courts, and 1,487 town and village courts.&lt;/p&gt;
&lt;p&gt;With Texas' 254 counties, there are 454 district courts, 254 county courts, 18 probate courts, 917 municipal courts, and 822 justice courts.&lt;/p&gt;
&lt;p&gt;"There are thousands and thousands of courts out there that can potentially house records that might be critical to your investigation," Brian Willingham says. "The idea here is that you want to get a general sense as to the number of courts that are out there, what you can do to access them, where would the information be that would be relevant to your investigation."&lt;/p&gt;
&lt;h3&gt;9. Having all known names and aliases is better than having just the birth name&lt;/h3&gt;
&lt;p&gt;When it comes to researching databases, the information was entered in by a human being, which means there can be a mistake. With nicknames, maiden names, and birth names, a civil suit may initially be filed under a different name. Having an accurate name before getting started can save time. Criminal records don't present the same issue, as the police generally provide aliases and will log the name listed on the person's identification.&lt;/p&gt;
&lt;h3&gt;10. Civil court records typically do not have identifying information on the person involved in the suit&lt;/h3&gt;
&lt;p&gt;While you will have the name, within the lawsuit the date of birth, social security number, or address will likely not be included. This is problematic, especially for common names. Criminal records typically include identifying information (i.e. date of birth).&lt;/p&gt;
&lt;h3&gt;11. Many courts have their own websites, but you need to understand what you're searching&lt;/h3&gt;
&lt;p&gt;No matter what database you are searching, you need to understand what is covered by that search, including what types of cases and what dates.&lt;/p&gt;
&lt;h3&gt;12. Using resources that search the same sources will make finding mistakes and omissions easier&lt;/h3&gt;
&lt;p&gt;With databases sourced from entries entered by humans, there is a margin of error. This can also help when databases are picky about how names or information needs to be entered in for a search. If you search in multiple databases, it can clue you into mistakes, omissions, and incorrect information.&lt;/p&gt;
&lt;h3&gt;13. You can find court records in state or federal repositories, court websites, third-party databases, and at the physical courts&lt;/h3&gt;
&lt;p&gt;These are some of the main resources for finding court records. It's highly recommended to search through other databases to make sure there are no omissions and to pull the record at the court to verify validity.&lt;/p&gt;
&lt;h3&gt;14. There are 24 states in the U.S. where you can obtain a statewide criminal record check&lt;/h3&gt;
&lt;p&gt;&lt;img class="align_center" src="https://s3.amazonaws.com/lawgical/assets/data/2547/original.png" alt="State and Federal Repositories Map" /&gt;&lt;/p&gt;
&lt;p class="font_small text_light text_center"&gt;&lt;em&gt;Image credit: http://i-sight.com/resources/webinar-an-investigators-guide-to-searching-court-records&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;15. Going directly to the court is the most effective place to obtain records, and you can obtain the documents right there&lt;/h3&gt;
&lt;p&gt;Databases offer great information on whether a court case exists, but to pull the actual court filings you have to go directly to the court.&lt;/p&gt;
&lt;h3&gt;16. You can look for valuable information in the docket, complaint or indictment, affidavits, final disposition, and deposition and transcripts&lt;/h3&gt;
&lt;p&gt;Court documents are overflowing with information, but knowing where to look for the information you need can be helpful.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Docket: basic information, the chronological order of all details of the case&lt;/li&gt;
&lt;li&gt;Complaint or Indictment: initial information and allegations&lt;/li&gt;
&lt;li&gt;Affidavits: information on the case&lt;/li&gt;
&lt;li&gt;Depositions and Transcripts: sworn testimony, legal arguments&lt;/li&gt;
&lt;li&gt;Final Disposition: how the case ended, charges, pleas&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Tips for Searching Court Records&lt;/h2&gt;
&lt;p&gt;Below are some great tips for searching court records from members of the Investigator Marketing group on LinkedIn.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p class="font_large"&gt;&lt;em&gt;My idea is going right to the court where the records are kept in person or via the Internet. Here in New York City some records have to be ordered and when they are obtained from a warehouse you are contacted to go see them. This at times takes up to 60 days for the call to be made to you.&lt;/em&gt;&lt;/p&gt;
&lt;p class="font_small"&gt;Jimmy Alvarez, President at J &amp;amp; J Investigations&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p class="font_large"&gt;&lt;em&gt;Since I regularly deliver records to courthouses I usually do my searches right there since they are a matter of public record as opposed to going online where they do have search engines if you are willing to pay annual fees.&lt;/em&gt;&lt;/p&gt;
&lt;p class="font_small"&gt;Karen Maccini, Private Investigator&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p class="font_large"&gt;&lt;em&gt;Rule of thumb for the best way to check for court records is to go right the source - the court house, state police, etc. Steer clear of court checks claiming to be "nationwide" because that does not exist. It is a good supplement but they only include court searches that are available online. Not every county, state, and federal court is available online. Learn the court system and divisions and what records they hold (and what those records mean) - superior vs district vs magistrate; felony vs misdemeanor; civil lawsuit vs civil judgment, etc.&lt;/em&gt;&lt;/p&gt;
&lt;p class="font_small"&gt;Kayla Boorady (Ricciardi), Vice President of Corporate Resolutions, Inc.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p class="font_large"&gt;&lt;em&gt;Know exactly what you are looking for before you go to the courthouse. Make sure the court is open that day. There are many different courts and locations of these courts. Bring cash and change for parking and a checkbook for paying for the records. Allow enough time as lines are common. Research in courthouses can be time consuming and results may be slow. Make sure you hire the right investigator to do the work. Try to get what you can online and make sure the client is aware of the costs for in person searches.&lt;/em&gt;&lt;/p&gt;
&lt;p class="font_small"&gt;Terrence Green, Owner of New World Investigations&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p class="font_small"&gt;&lt;strong&gt;Editor's Note:&lt;/strong&gt; If you would like more information on this topic, check out the webinar presented by Brian Willingham of Diligentia Group, a PInow Top Investigator on Twitter and Top Blogger. We highly recommend watching the complete webinar for more details and guidance. You can access it here: &lt;a href="http://i-sight.com/resources/webinar-an-investigators-guide-to-searching-court-records/"&gt;http://i-sight.com/resources/webinar-an-investigators-guide-to-searching-court-records/&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;More Information about Public Record Searches:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/investigations/public-records" target="_blank"&gt;Public Records Search&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/314/uses-for-a-public-records-search" target="_blank"&gt;Uses for a Public Records Search&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/937/private-investigator-basics-records-research" target="_blank"&gt;Private Investigator Basics Part 1: Records Research&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Lawgical Staff</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/307</id>
    <published>2018-03-05T00:00:00-07:00</published>
    <updated>2018-05-04T13:02:06-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/307/what-can-private-eyes-do-when-watching-you"/>
    <title>Surveillance &amp; Technology: What can investigators do when watching you?</title>
    <summary>As laws struggle to keep up with technology, it's hard to know what tools are legal for investigators to use to surveil and gather evidence for a case.</summary>
    <content type="html">&lt;p&gt;A large part of investigators work is surveillance, and as technology advances, the definition of surveillance is rapidly changing. Surveillance is progressing passed stakeouts and physical location updates. Rather, surveillance is expanding to online activity, GPS tracking, and public recordings. Technology can make surveillance easier for investigators but they must be up to date on their state's laws and consider the outcome of using new devices. Often investigators go beyond surveillance, so read more about &lt;a href="https://www.pinow.com/articles/456/what-a-private-investigator-cannot-do" target="_blank"&gt;what investigators can and cannot do in general&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;When determining what a private investigator can and cannot do when watching a subject, it's important to note types of &lt;a href="https://www.pinow.com/investigations/surveillance" target="_blank"&gt;surveillance&lt;/a&gt; and typical procedures. A good rule of thumb is that any public information or public acts can be observed and collected by an investigator. However, as legislation varies state to state, it's important to research the applicable laws in your area as new investigation techniques are changing with technology.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/4390/original.png?1519328790" alt="Surveillance &amp;amp; Technology" width="500" height="278" /&gt;&lt;/p&gt;
&lt;h2&gt;Social Media as Surveillance&lt;/h2&gt;
&lt;p&gt;Cheating spouses, child support investigations, and worker compensations are all common investigations that often use surveillance. However, investigators are able to go one step further to gather information and combine traditional surveillance with &lt;a href="https://www.pinow.com/investigations/social-media-investigations" target="_blank"&gt;social media investigations&lt;/a&gt;. If persons of interest are publicly posting personal information, that may lead the investigator to the answer they are seeking, or at least in the right direction for further research.&lt;/p&gt;
&lt;p&gt;Social media features like location check-ins can lead investigators to narrow down frequently visited places, or provide proof of the person's whereabouts. For the tech-savvy investigators, posted photos with no location checked or descriptive caption can still provide a valuable resource. Photos that were taken on smartphones often carry location information where the photo was taken. For example, notorious hacker&amp;nbsp;&lt;a href="https://gimletmedia.com/episode/21-hack-the-police/" target="_blank"&gt;Higinio O. Ochoa III&lt;/a&gt; (known as w0rmer) was caught by the US Government based on an embedded GPS location from a photo he posted taken from an iPhone.&lt;/p&gt;
&lt;p&gt;The online world provides an invaluable&amp;nbsp;resource for digital investigations that make surveillance for private investigators even easier, and it doesn't just stop at social media. The &lt;a href="https://www.pinow.com/articles/2358/online-investigations-the-deep-and-dark-web" target="_blank"&gt;deep and dark web&lt;/a&gt; can be a place were private investigators find information about individuals online.&lt;/p&gt;
&lt;h2&gt;GPS and Tracking Devices&lt;/h2&gt;
&lt;p&gt;Location tracking goes beyond just social media and the embedded code on photos. Today, small devices that can attach to cars track visited locations and are used for surveillance investigations. Visited locations provide an insight as&amp;nbsp;it may reveal suspicious activity, or offer clear evidence of an affair. However, there are debates and legal cases as to whether GPS tracking devices on a vehicle is an invasion of privacy, but a &lt;a href="https://www.pinow.com/articles/2326/using-gps-tracking-devices-in-private-investigation" target="_blank"&gt;Georgia court found&lt;/a&gt; that it was permissible as the device was attached in a public place and the device only tracked the vehicle, which could have been tracked physically in public.&lt;/p&gt;
&lt;p&gt;However, in 2011, the Supreme Court ruled in the case &lt;a href="https://www.oyez.org/cases/2011/10-1259" target="_blank"&gt;United States v. Jones&lt;/a&gt; that attaching a tracking device to a vehicle without a warrant was a violation of the 4th Amendment. Furthermore, in &lt;a href="https://www.supremecourt.gov/opinions/14pdf/14-593_o7jq.pdf" target="_blank"&gt;Grady versus North Carolina&lt;/a&gt;, the &lt;a href="https://www.oyez.org/cases/2014/14-593" target="_blank"&gt;Supreme Court ruled in 2015 that a person wearing a tracking device constituted a search&lt;/a&gt;. The Supreme Court then sent the case back to North Carolina to decide whether or not that specific search was unreasonable.&lt;/p&gt;
&lt;p&gt;Since there are conflicting rulings on the legality of tracking devices, it is difficult to determine whether or not investigators should use them. GPS location devices can be useful&amp;nbsp;for investigators needing surveillance assistance&amp;nbsp;but one should ensure that the information wouldn't go beyond the legal measures and invade privacy or constitute an unreasonable search by tracking information that is not observable in public. If there is any question whether or not to use a tracking device, one should err on the side of caution.&lt;/p&gt;
&lt;h2&gt;Surveillance Recording&lt;/h2&gt;
&lt;h3&gt;Listening Devices&lt;/h3&gt;
&lt;p&gt;Listening and recording devices can help investigations, but their use is limited by state law. Audio surveillance, by and large, is illegal throughout most states if the participating parties are unaware that they are being listened to. However, &lt;a href="https://www.rcfp.org/rcfp/orders/docs/RECORDING.pdf" target="_blank"&gt;in some states&lt;/a&gt;, it is legal to record if only one party consents to be recorded during a conversation. Intercepting messages electronic messages, (wiretapping) typically need at least one person to consent. Be sure to know your &lt;a href="https://www.pinow.com/resources/audio-surveillance-laws-by-state" target="_blank"&gt;state-specific information for audio surveillance party consent&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Video Recording&lt;/h3&gt;
&lt;p&gt;All states have laws regarding hidden cameras, so it is important to note these restrictions should an investigator choose to use hidden cameras in their investigations. Video recording may be an invasion of privacy if cameras are placed in a confidential place, where one would expect privacy. The legality of hidden cameras seems to mostly revolve around the concept of private and public spaces where recording is acceptable. If the area is public and appropriate warnings alert individuals to video or audio recording, video recording is most often permissible. Most, if not all, states have restrictions on photographing or recording nude or partially nude individuals.&lt;/p&gt;
&lt;p&gt;To be sure of the legality, research your &lt;a href="https://www.rcfp.org/rcfp/orders/docs/RECORDING.pdf" target="_blank"&gt;state's restrictions on video recording&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;strong style="font-size: 1.17em;"&gt;As laws struggle to keep up with technology, it's hard to know what's legal&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Technology often changes faster than the law, but it is still important for investigators to maintain a level of caution when using new surveillance and investigation tools. Any device that allows investigations to step over the line from public to private spaces should be used with caution as they may prove to be illegal. Always consider the &lt;a href="http://constitution.findlaw.com/amendment4.html" target="_blank"&gt;4th Amendment&lt;/a&gt;&amp;nbsp;and any state-specific laws or rulings that may guide you.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;More Information on Surveillance Investigations:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/resources/audio-surveillance-laws-by-state" target="_blank"&gt;Audio Surveillance Laws (Party Consent) by State&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/316/electronic-surveillance-how-is-it-affecting-your-life" target="_blank"&gt;Electronic Surveillance -- How is it affecting your Life?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/298/computer-surveillance-what-does-it-offer" target="_blank"&gt;Computer Surveillance - What Does it Offer?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/296/telephone-surveillance-and-bugging-is-it-legal" target="_blank"&gt;Telephone Surveillance and Bugging - Is it Legal?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/1710/video-surveillance-camera-use-is-on-the-rise" target="_blank"&gt;Video Surveillance Camera Use is on the Rise&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/352/follow-that-car-10-mobile-surveillance-tips-for-private-investigators" target="_blank"&gt;Follow that Car: 10 Mobile Surveillance Tips for Private Investigators&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</content>
    <author>
      <name>PInow Staff</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2423</id>
    <published>2018-02-05T00:00:00-07:00</published>
    <updated>2019-03-08T16:36:28-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2423/identity-fraud-how-a-pi-can-help"/>
    <title>Identity Fraud: How a PI can Help</title>
    <summary>Identity theft is becoming more prevalent in the United States — with a record number of victims in 2016, the trend doesn’t show any signs of slowing down. As our identities become more accessible to thieves, we have to work harder to protect them. In the event that you become a victim, it can become even more difficult to track the criminals down.</summary>
    <content type="html">&lt;p dir="ltr"&gt;&lt;span&gt;As tax season is upon us, unscrupulous individuals may attempt to steal your identity in order to get your tax refund or even a job. This issue is so big that the Federal Trade Commission (FTC) even created a &lt;/span&gt;&lt;a href="https://www.consumer.ftc.gov/features/feature-0029-tax-identity-theft-awareness-week"&gt;&lt;span&gt;Tax Identity Awareness Week from January 29th &amp;mdash; February 2, 2018&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to&lt;span id="docs-internal-guid-8c99e269-4d36-56bf-1050-ef52cd4c8747"&gt;&lt;span&gt;&amp;nbsp;help raise awareness to this growing problem. But stealing your social security number to receive a tax refund is just one of the ways in which identity thieves steal and use your identity.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Identity theft is becoming more prevalent in the United States &amp;mdash; with a &lt;/span&gt;&lt;a href="https://www.javelinstrategy.com/press-release/identity-fraud-hits-record-high-154-million-us-victims-2016-16-percent-according-new"&gt;&lt;span&gt;record number of victims in 2016&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the trend doesn&amp;rsquo;t show any signs of slowing down. As our identities become more accessible to thieves, we have to work harder to protect them. In the event that you become a victim, it can become even more difficult to track the criminals down.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;When we last &lt;/span&gt;&lt;a href="https://www.pinow.com/investigations/identity-theft"&gt;&lt;span&gt;highlighted this issue&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, we identified five other types of identity theft: &lt;/span&gt;&lt;span&gt;criminal identity theft,&lt;/span&gt;&lt;span&gt; which occurs when a criminal uses another identity to evade charges; &lt;/span&gt;&lt;span&gt;financial identity theft,&lt;/span&gt;&lt;span&gt; the most common type, which occurs when someone uses your identity to access and use your money;&lt;/span&gt;&lt;span&gt; identity cloning&lt;/span&gt;&lt;span&gt;, which occurs when a person assumes your identity to conceal their own;&lt;/span&gt;&lt;span&gt; medical identity theft&lt;/span&gt;&lt;span&gt;, which occurs when someone uses your insurance benefits to access healthcare for themselves; and &lt;/span&gt;&lt;span&gt;child identity thef&lt;/span&gt;&lt;span&gt;t, which happens when someone uses a minor&amp;rsquo;s identity for personal gain. No matter what type of identity theft is committed, they are all serious crimes.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;&lt;img title="Identity Theft &amp;amp; Investigators" src="https://s3.amazonaws.com/lawgical/assets/data/4339/original.png?1517338935" alt="Identity Theft &amp;amp; Investigators" width="450" height="250" /&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Has your Identity Been Stolen?&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;If you&amp;rsquo;re concerned that your identity or any personally identifiable information has been compromised, it may be helpful to consult a private investigator. A private investigator can help determine if your identity has, in fact, been stolen, and they can help figure out for what purpose.&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;First Steps&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;However, if you suspect identity theft, before you hire an investigator, you must make reports to every applicable agency where you believe fraud has occurred. This could include your bank, credit card companies, etc. You will also want to place a fraud alert with your credit reporting agencies so that in the event your credit is harmed by the event, you do not personally suffer from it.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Furthermore, you will want to report the crime to not only the FTC but to your local law enforcement. Even if you intend on hiring a private investigator, making a timely police report is important. The FTC provides a&lt;/span&gt;&lt;a href="https://www.identitytheft.gov/Steps"&gt;&lt;span&gt; helpful checklist&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that you can use to get the ball rolling.&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Who to Hire&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;From there, hiring a private detective can be crucial in getting your case solved. A private detective can give you the personalized attention that simply may not be possible from a detective in your area. For example, if you live in a small town, your police department may not even have a detective on their local force who can handle your case. Hiring a private detective ensures that you have someone working for you so that you have a better chance at having the person responsible for stealing your identity is held responsible. Keep in mind that according to the Identity Theft Resource Center, &lt;/span&gt;&lt;a href="https://www.idtheftcenter.org/how-to-work-with-your-investigator/"&gt;&lt;span&gt;most cases do not end in arrest&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, despite valiant efforts by police investigators.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;It&amp;rsquo;s important to find a qualified and licensed private investigator (if required in your state) so that you aren&amp;rsquo;t duped again by someone with poor intentions. You are at a vulnerable point if your identity has been compromised or stolen, so it&amp;rsquo;s important not to take any further chances.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;In this day and age, most private investigators are familiar with this type of work &amp;mdash; and some even specialize in it. You can easily find a prescreened private detective nearby with a quick search of our directory.&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Understanding What Happened&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;A private investigator can help you find out who committed the crime and how they did it. Once found, you can pursue punitive damages legally and/or a criminal complaint. This can give you peace of mind, and it can help you recover lost funds.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Additionally, once you know what happened and how, you can better protect yourself by taking preventative measures that will ensure your identity won&amp;rsquo;t be stolen again.&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Recovery from Identity Theft&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Recovering from identity theft can be a long process, but it is possible. The &lt;/span&gt;&lt;a href="https://www.businesswire.com/news/home/20151006006149/en/Latest-Data-Breach-Spotlights-Identity-Restoration"&gt;&lt;span&gt;FTC estimates&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that more than 200 hours are spent over 18 months trying to resolve identity theft cases.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;The emotional toll may be significant, so don&amp;rsquo;t be afraid to contact a counselor to help work through the feelings of distrust, vulnerability, anger, resentment, and betrayal, among others, that you may be feeling. It&amp;rsquo;s imperative that you keep your mental health a priority.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;It can also take time for your credit to recover, and before things are resolved, you may be faced with frustrating hassles when you want to make a purchase and uncertainty of your financial stability. Know that these events will be temporary, as once your identity is restored, you&amp;rsquo;ll be able to get back to living your life &amp;mdash; you&amp;rsquo;ll just have the experience to be more cautious with your identity in the future.&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Need an Investigator?&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;If you&amp;rsquo;ve been a victim of identity theft and are interested in retaining a private investigator to help solve your case, you&amp;rsquo;ve come to the right place. Search our directory of talented private detectives &lt;/span&gt;&lt;a href="https://www.pinow.com/"&gt;&lt;span&gt;here &lt;/span&gt;&lt;/a&gt;&lt;span&gt;or give us a call at (888) 997-4669, and we can get you connected with a qualified, prescreened detective today.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;More Information about Identity Theft and Fraud:&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/investigations/identity-theft"&gt;Identity Theft and Identity Theft Investigations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/investigations/identity-theft"&gt;Top 10 Resources Every Victim of Identity Fraud Should Have&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2138/identity-theft-victim-resources" target="_blank"&gt;Identity Theft Victim Resources&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/1682/mobile-identity-theft-statistics-and-prevention-tips" target="_blank"&gt;Mobile Identity Theft: Statistics and Prevention Tips&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Stephanie Irvine</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2408</id>
    <published>2017-12-11T00:00:00-07:00</published>
    <updated>2019-09-27T09:50:37-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2408/elder-abuse-investigations"/>
    <title>Elder Abuse Investigations</title>
    <summary>Though there are many benefits for a growing elderly population with a longer life expectancy, there is also an increase in situations where seniors suffer abuse and neglect from those entrusted to care for them.</summary>
    <content type="html">&lt;h2 dir="ltr"&gt;&lt;span&gt;Understanding Elder Abuse Investigations&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Though there are many benefits for a growing elderly population with a longer life expectancy, there is also an increase in situations where seniors suffer abuse and neglect from those entrusted to care for them.&lt;/span&gt;&lt;span&gt;&lt;br class="kix-line-break" /&gt;&lt;/span&gt;&lt;span&gt;&lt;br class="kix-line-break" /&gt;&lt;/span&gt;&lt;span&gt;The World Health Organization &lt;/span&gt;&lt;a href="https://www.elderabuse.org.uk/Pages/Category/what-is-it"&gt;&lt;span&gt;defines elder abuse&lt;/span&gt;&lt;/a&gt;&lt;span&gt; as "a single, or repeated act, or lack of appropriate action, occurring within any relationship where there is an expectation of trust, which causes harm or distress to an older person."&lt;/span&gt;&lt;span&gt;&lt;br class="kix-line-break" /&gt;&lt;/span&gt;&lt;span&gt;&lt;br class="kix-line-break" /&gt;&lt;/span&gt;&lt;span&gt;The most blatant cases involve physical harm inflicted by a caretaker or relative, but the elderly are also frequently victimized financially.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;What prompts investigations?&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;According to the National Center on Elder Abuse, one out of every 10 senior citizens in the United States &lt;/span&gt;&lt;a href="https://ncea.acl.gov/whatwedo/research/statistics.html"&gt;&lt;span&gt;experiences some type of abuse&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, but fewer than 20 percent of those cases ever get reported. Regrettably, many indications of elder abuse are similar to the mental and physical deterioration of advancing age, but a client could become suspicious if they observe:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;Changes in personality or behavior&lt;/li&gt;
&lt;li dir="ltr"&gt;Unexplained injuries or bruises&lt;/li&gt;
&lt;li dir="ltr"&gt;Conflicting stories between a caregiver and a patient how an injury occurred&lt;/li&gt;
&lt;li dir="ltr"&gt;Frequent arguments between caregivers and patients&lt;/li&gt;
&lt;li dir="ltr"&gt;Patients who appear malnourished, disheveled, in need of medication or overly affected by medication&lt;/li&gt;
&lt;li dir="ltr"&gt;Unexplained financial or property losses and changes in spending patterns&lt;/li&gt;
&lt;li dir="ltr"&gt;A caregiver remaining with a patient at all times - not allowing anyone to be alone with them&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Methods of Investigation&lt;/span&gt;&lt;/h2&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Start with prevention. &lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Investigators seeking to grow their business may want to advertise background checks to assist those hiring caregivers or living facilities for loved ones. Verifying a caregiver&amp;rsquo;s certifications and interviewing past clients just might eliminate a problem before it starts.&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Use technology. &lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;It&amp;rsquo;s hard to think of a senior who doesn't have an alarm clock by the bed. Your knowledge of surveillance products and privacy laws can assist clients who want to set up a &amp;ldquo;granny cam.&amp;rdquo;&lt;/span&gt;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;&lt;span&gt;Covert or overt investigations.&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr"&gt;Every individual case is different. You might document a case better if you remain as unobtrusive as possible but other times the awareness of an investigator can produce new information or changes in behavior that will help the client. Research the case, individuals involved, and type of abuse to determine what investigation style you should use.&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Financial Investigation&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Clients may also want to ensure a senior&amp;rsquo;s financial security. It is estimated one in five elderly people has been targeted by a scam. According to the National Adult Protective Services Association, only &lt;/span&gt;&lt;a href="http://www.napsa-now.org"&gt;&lt;span&gt;1 in every 44 financial elder abuse cases&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is reported. Unfortunately, con artists try to work quickly and confuse their victims and hope the embarrassment may prevent them from telling others.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Whether a client suspects a stranger or a caregiver is abusing the senior financially or just has concerns their loved one can no longer make monetary decisions, investigators should focus on:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;Money missing from investment and bank accounts. Is there any explanation where it went?&lt;/li&gt;
&lt;li dir="ltr"&gt;Charge account use. Has there been an uncharacteristic increase in the use of credit cards or are cash advances being taken out?&lt;/li&gt;
&lt;li dir="ltr"&gt;New authorizations. Who's able to use the funds and is everyone aware who's able to?&lt;/li&gt;
&lt;li dir="ltr"&gt;Unpaid bills and collection notices. Are the senior's resources being spent on other things?&lt;/li&gt;
&lt;li dir="ltr"&gt;Missing property. Are all valuables accounted for?&lt;/li&gt;
&lt;li dir="ltr"&gt;New purchases. Has the elder&amp;rsquo;s money paid for things they seem unlikely to use?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;The Challenges of Elder Abuse Investigations&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;The elderly are more susceptible to falls and forgetfulness. There may be rational explanations for injuries and misplaced items. But as people age, they are less able to stand up to bullying or can be easily taken advantage of.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;According to &lt;/span&gt;&lt;a href="https://ncea.acl.gov/FAQ.aspx"&gt;&lt;span&gt;the National Center on Elder Abuse&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a victim may be reluctant to report abuse from fear of retaliation, not have the mental ability to make a report or because they don&amp;rsquo;t want to get the abuser in trouble or worry who will care for them in the future.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;A Need to Investigate&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;The elderly can be a great resource and deserve respect and affection. Taking steps to protect them not only spares society&amp;rsquo;s resources but can offer clients a peace of mind knowing that helping seniors now will help future seniors later.&lt;/span&gt;&lt;/p&gt;</content>
    <author>
      <name>Stephanie Irvine</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2249</id>
    <published>2016-10-04T00:00:00-06:00</published>
    <updated>2016-10-11T11:25:15-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2249/10-most-common-types-of-fraud"/>
    <title>The 10 Most Common Types of Fraud We Investigate</title>
    <summary>Learn more about the 10 most common types of fraud, and the types of fraud investigators see most frequently.</summary>
    <content type="html">&lt;h2&gt;What is Fraud?&lt;/h2&gt;
&lt;p&gt;Fraud (pronounced fr&amp;ocirc;d) is "wrongful or criminal deception intended to result in a financial or personal gain."&lt;/p&gt;
&lt;div class="box"&gt;
&lt;h3&gt;10 Common Types of Fraud&lt;/h3&gt;
&lt;div class="cols"&gt;
&lt;div class="col_half"&gt;
&lt;p&gt;1. Insurance Claim Fraud&lt;br /&gt; 2. Workers Compensation Fraud&lt;br /&gt; 3. Corporate Slip and Fall&lt;br /&gt; 4. Transit Fraud&lt;br /&gt; 5. Online Classified Fraud&lt;/p&gt;
&lt;/div&gt;
&lt;div class="col_half"&gt;
&lt;p&gt;6. Ticket Fraud&lt;br /&gt; 7. Mechanical Repair Fraud&lt;br /&gt; 8. Rental Insurance Scams&lt;br /&gt; 9. Expense Claim Fraud&lt;br /&gt; 10. Theft of Inventory&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;As we are accredited members of the better business bureau, we have access to the annual "Top 10 Scams Report" so we are on top of the regular scams and fraud tricks of the industry. However, that can be found online. We would like to outline with you the types of fraud cases we deal with the most as a private investigations agency.&lt;/p&gt;
&lt;p&gt;&lt;img title="10 Most Common Types of Fraud" src="https://s3.amazonaws.com/lawgical/assets/data/3529/original.png" alt="10 most common types of fraud" /&gt;&lt;/p&gt;
&lt;h2&gt;1. Insurance Claim Fraud&lt;/h2&gt;
&lt;p&gt;Staged accidents and fraudulent claims cost Canadian insurance companies millions of dollars a year from billing for unneeded treatment of phantom injuries. The general types of injuries we see most often that appear fraudulent are soft-tissue injuries like whiplash as well as back and shoulder injuries. Some can be difficult to medically identify and dispute.&lt;/p&gt;
&lt;h2&gt;2. Workers Compensation W.S.I.B.&lt;/h2&gt;
&lt;p&gt;We see workers compensation claims on a regular basis. Although some claims are legitimate, in the cases we work on the subject does not display any injuries to match their claim. Some of the types of injuries a worker will make a claim about are back, shoulder, neck, and knee injuries. The injuries we see the most are back injuries.&lt;/p&gt;
&lt;h2&gt;3. Corporate Slip and Fall&lt;/h2&gt;
&lt;p&gt;Think of winters in Canada, think of slush on your boots. Think of the times you walk into a store with your boots wet. You clean the snow from your boots while walking in a store. Some individuals will "slip and fall," sparking a claim. Not all claims are false, however several can be. Sometimes the staged accidents are so obvious the subjects are even caught on camera throwing water or some other type of liquid to ensure they slip.&lt;/p&gt;
&lt;h2&gt;4. Transit Fraud&lt;/h2&gt;
&lt;p&gt;Most transit companies experience transportation fraud frequently as passengers of buses, subways, and streetcars who are not seated properly or holding onto a rail when the vehicle comes to a stop often fall, which can result in an injury. We also see several cases of arm/shoulder injuries, as well as foot injuries from people who step onto the road while a bus or streetcar is approaching and they allow the bus to run over their feet or place their arm in the way to have a mirror strike them.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;5. Online Classified Fraud&lt;/h2&gt;
&lt;p&gt;The number of online classifieds are growing and the scams are growing as well. We consistently have clients calling us asking us to assist them in using skip tracing methods to locate the person who scammed them from the item they were buying. Generally, we see this action with vehicles.&lt;/p&gt;
&lt;h2&gt;6. Ticket Fraud&lt;/h2&gt;
&lt;p&gt;In Toronto, for instance, we have many major league teams, so the level of ticket fraud is significant. Clients purchase tickets from a website and often find themselves standing at the ticket counter with a ticket that was already used or does not exist.&lt;/p&gt;
&lt;h2&gt;7. Mechanical Repair Fraud&lt;/h2&gt;
&lt;p&gt;Although this is not as common, many individuals fall prey to mechanics who advise for services needed when the services are not in fact completed or never needed to be completed. We have placed cameras in vehicles and sent them into shops to find the shops did not do the work they stated was required.&lt;/p&gt;
&lt;h2&gt;8. Rental Insurance Scams&lt;/h2&gt;
&lt;p&gt;Insurance companies often hire private investigators to determine any actions that seem suspicious when an individual will take out a large policy covering theft or damages in a home to have then a claim placed that a home was broken into with large amounts of money that are on claim. We will attend to verify what were legitimate purchases speak with friends, neighbors, and colleagues.&lt;/p&gt;
&lt;h2&gt;9. Expense Claim Fraud&lt;/h2&gt;
&lt;p&gt;We see this often with large corporations who pay employees a per diem to be out of town for work purposes. The companies will pay a very generous amount per day to the employee including housing. We find in many cases individuals who claim to stay in hotels costing upwards of $200.00 per night staying in campgrounds and cheap hotels for $25-$100 per night and pocketing the rest of the money.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;10. Theft of Inventory&lt;/h2&gt;
&lt;p&gt;Large companies face the issue of internal theft all the time as employees at times can be left unsupervised and in some scenarios steal product or order more product than is needed. They may also say food products are expired when they are not and take the product they claimed was waste home.&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube.com/embed/mhQNBAt5DS4" frameborder="0" width="560" height="315"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;Fraud is common, and as private investigators, we do everything in our power to stop fraud at all costs. We want to see less fraud, so we work diligently to obtain the necessary evidence to stop the career fraudsters.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://smithinvestigationagency.com/"&gt;The Smith Investigation Agency&lt;/a&gt; is owned by Whitney Joy Smith; Whitney founded her company when she noted a lack of Quality Investigation companies in Ontario. Whitney quickly learned that the most important part of any investigation was not only obtaining the best results possible but building relationships with clients and keeping the client's happiness of the utmost importance. While consulting with many Investigative Agencies Canada-wide Whitney learned that her company would not accept mediocre results, she wanted to outperform and go beyond the client's expectation every time. We don't believe in raising the bar; we stand on the bar!&lt;/p&gt;</content>
    <author>
      <name>Whitney Joy Smith</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2242</id>
    <published>2016-09-20T00:00:00-06:00</published>
    <updated>2016-09-20T12:26:09-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2242/a-quick-guide-to-family-investigations"/>
    <title>A Quick Guide to Family Investigations</title>
    <summary>Family investigations can include checking up on a potentially troubled teen, making sure your elderly relatives are safe and not being taken advantage of, verifying ex-spouse behaviour when they are with your children, and monitoring a potentially cheating spouse. </summary>
    <content type="html">&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/3504/original.jpg" alt="a quick guide to family investigations" /&gt;&lt;/p&gt;
&lt;p&gt;Private investigations involving family are often emotional. There are many different scenarios where a family member may need to be surveilled, all of them being important and sensitive. Family investigations can include checking up on a potentially troubled teen, making sure your elderly relatives are safe and not being taken advantage of, verifying ex-spouse behaviour when they are with your children, and monitoring a potentially cheating spouse. The purpose of family investigations is to have someone be your eyes when and where you are unable to. As a third-party observer, a private investigator uses advanced techniques and state-of-the-art equipment to monitor family members so you can make an informed decision.&lt;/p&gt;
&lt;h2&gt;Monitoring Teen Activity&lt;/h2&gt;
&lt;p&gt;Teenagers are at the peak of their rebellious stage and often put themselves in more danger than they can really fathom at the time. If you are going to be out of town and suspect that your teenager may get into some serious trouble in your absence, you may want to consider having them monitored. Having rebellious activity like underage drinking, substance abuse, or speeding observed by a private investigator gives you the information you need to set your teen on the right path before they end up in the hands of the law.&lt;/p&gt;
&lt;h2&gt;Monitoring Elder Activity&lt;/h2&gt;
&lt;p&gt;Although seniors are likely out of the rebellious stage, they are in another stage of life that can be equally dangerous. On the one hand, you want to ensure that your elderly loved ones are safe at home and able to take care of themselves. Our private investigators have observed seniors driving unlicensed despite protesting to the contrary to their adult children. On the other hand, you also want to ensure that your elderly family members are not being scammed or taken advantage of by others. We have observed private in-home caregivers leave their client unattended for hours on end when they were meant to be providing care (and being paid to provide care). Elder activity checks can give you the information you need to keep your elderly family member safe.&lt;/p&gt;
&lt;h2&gt;Monitoring Ex-Spouse When Children Are Involved&lt;/h2&gt;
&lt;p&gt;If your ex is dating someone new, or is giving you any cause for concern whatsoever when they are in the company of your children, then that is reason enough to have them monitored. People behave differently when they think they are alone. To get the full picture of how your ex behaves around your children, or how their appropriate their new partner is to have around your children, consider having them surveilled. We have investigated a range of serious issues with ex-spouses and new partners, from failing to take them to school to leaving the children unattended to purchase illicit substances. Family investigators can also uncover whether your ex-spouse is being truthful about their job or financial status to gather evidence for wage garnishment.&lt;/p&gt;
&lt;h2&gt;Monitoring a Cheating Spouse&lt;/h2&gt;
&lt;p&gt;There is no pleasant way to go about discovering a cheating spouse. However if there are times when you need to have your spouse&amp;rsquo;s location and activities verified, it&amp;rsquo;s best left up to the professionals to confirm infidelity. You deserve to know the facts so you can make an informed decision about staying in the relationship, working together to move past it, or initiating divorce procedures.&lt;/p&gt;
&lt;h2&gt;How to Grow Your Family Investigations Division&lt;/h2&gt;
&lt;p&gt;Growing a private investigation agency involves not only being good at your job but also having the right connections. Building relationships with family lawyers is a good way to start as family law is at the centre of many situations where family investigations may be necessary. Being a private investigator is a demanding position that involves sensitive material and long hours. In this industry your reputation is everything. Advertising will certainly get you recognized, but the relationships you foster along the way and your reputation are the best ways for you to ensure the longevity and prosperity of your business.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://smithinvestigationagency.com/"&gt;The Smith Investigation Agency&lt;/a&gt; is owned by Whitney Joy Smith; Whitney founded her company when she noted a lack of Quality Investigation companies in Ontario. Whitney quickly learned that the most important part of any investigation was not only obtaining the best results possible but building relationships with clients and keeping the client's happiness of the utmost importance. While consulting with many Investigative Agencies Canada-wide Whitney learned that her company would not accept mediocre results, she wanted to outperform and go beyond the client's expectation every time. We don't believe in raising the bar; we stand on the bar!&lt;/p&gt;</content>
    <author>
      <name>Whitney Joy Smith</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2208</id>
    <published>2016-06-28T00:00:00-06:00</published>
    <updated>2016-06-29T09:26:39-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2208/catfishing-investigation-tips-risks-signs-and-what-to-do"/>
    <title>Catfishing Investigation Tips: Risks, Signs, and What to Do</title>
    <summary> 59% of internet users feel that online dating is a good way to meet people, but that number might go down as the prevalence of catfishing continues to grow. Deceptive internet frauds called catfishers target individuals with a range of goals, from revenge and cyberbullying to building false relationships and even theft or crime.</summary>
    <content type="html">&lt;p&gt;In a world where more new couples are meeting online than in person and friendship is measured by requests, follows, and likes, it might seem like relationships forming and developing through the internet is the norm.&lt;/p&gt;
&lt;p&gt;According to the Pew Internet and American Life Project, 59% of internet users feel that online dating is a good way to meet people, but that number might go down as the prevalence of catfishing continues to grow. Deceptive internet frauds called catfishers target individuals with a range of goals, from revenge and cyberbullying to building false relationships and even theft or crime.&lt;/p&gt;
&lt;h2&gt;What is catfishing?&lt;/h2&gt;
&lt;p&gt;The term catfish was reserved for the barbed freshwater. That is until 2010, when filmmaker Nev Schulman chronicled his experience meeting and falling in love with a woman he met online, "Megan".&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.imdb.com/video/imdb/vi769787417/imdb/embed?autoplay=false&amp;amp;width=640" frameborder="no" scrolling="no" width="640" height="360"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;In the end, the documentary revealed that the woman behind Megan was in reality a woman named Angela, using a fake name and photos of a Vancouver based model to create the online profile. The documentary was titled "Catfish" based on a story Angela's husband shared.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;They used to tank cod from Alaska all the way to China. They&amp;rsquo;d keep them in vats in the ship. By the time the codfish reached China, the flesh was mush and tasteless. So this guy came up with the idea that if you put these cods in these big vats, put some catfish in with them and the catfish will keep the cod agile. And there are those people who are catfish in life. And they keep you on your toes. They keep you guessing, they keep you thinking, they keep you fresh. And I thank god for the catfish because we would be droll, boring and dull if we didn't have somebody nipping at our fin.&lt;/em&gt;&lt;/p&gt;
&lt;p class="font_small"&gt;Vince Pierce in Nev Schulman's 2010 documentary "Catfish"&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;"Catfish" the movie led to an MTV spinoff that launched in 2012, and the term catfish is now widely used to describe "a person who sets up a false personal profile on a social networking site for fraudulent or deceptive purposes." But catfishing isn't limited to social media sites like Facebook, Twitter, and Instagram. Fake profiles are commonly found on dating sites as well. In Catfish the TV show Nev helps individuals who aren't sure whether the people they met online are who they say they are while conducting amateur investigations, usually consisting of reverse image searches and reaching out the individual's friends and family on Facebook.&lt;/p&gt;
&lt;p&gt;But a true catfish or social media investigation is more intense than that, and so can are some of the after effects. Catfishers get close to their targets for a variety of reasons, some as severe as fraud, blackmail, and identity theft.&lt;/p&gt;
&lt;h2&gt;What are some of the risks of being catfished?&lt;/h2&gt;
&lt;p&gt;Though many of the risks in being catfish circle around emotional harm, there are other very real dangers involved:&lt;/p&gt;
&lt;div class="cols"&gt;
&lt;div class="col_half"&gt;
&lt;ul&gt;
&lt;li&gt;Emotional damage&lt;/li&gt;
&lt;li&gt;Public embarassment&lt;/li&gt;
&lt;li&gt;Identity theft&lt;/li&gt;
&lt;li&gt;Blackmail&lt;/li&gt;
&lt;li&gt;Child exploitation&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="col_half"&gt;
&lt;ul&gt;
&lt;li&gt;Credit card theft&lt;/li&gt;
&lt;li&gt;Extortion&lt;/li&gt;
&lt;li&gt;Cyber bullying&lt;/li&gt;
&lt;li&gt;Fraud&lt;/li&gt;
&lt;li&gt;Physical harm&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;This is why it's important to educate yourself and your family about the dangers of being catfished, and to know how to move forward if you suspect something is not right with someone you are getting close to online.&lt;/p&gt;
&lt;h2&gt;What are some of the signs you might be being catfished?&lt;/h2&gt;
&lt;p&gt;If something seems off and you are concerned about a new online friend, or are noticing some inconsistencies with someone you've been interacting with for a while, there's a chance you are being catfished.&lt;/p&gt;
&lt;h3&gt;Signs on Their Profile&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;The name on their profile doesn't match the name in the URL&lt;/li&gt;
&lt;li&gt;They have very few friends/followers, or a very high number&lt;/li&gt;
&lt;li&gt;You have few or no mutual friends&lt;/li&gt;
&lt;li&gt;They're very attractive and their photos look like they were professionally taken&lt;/li&gt;
&lt;li&gt;They don't have many pictures with friends on their profile&amp;mdash;almost all photos are of them alone&lt;/li&gt;
&lt;li&gt;They rarely get comments on their posts, or they are always from the same people&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Signs From Your Interactions&lt;/h3&gt;
&lt;p&gt;&lt;img class="align_right" title="Catfishing Investigation Tips: Risks, Signs, and What to Do" src="https://s3.amazonaws.com/lawgical/assets/data/3375/original.png" alt="catfishing-investigation-tips-risks-signs-and-what-to-do" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;They move very fast and convey strong feelings even if there hasn't been much interaction, especially online&lt;/li&gt;
&lt;li&gt;They either refuse to or are very hesitant about talking on the phone&lt;/li&gt;
&lt;li&gt;They refuse to video chat or keep having problems with Skype, FaceTime, etc.&lt;/li&gt;
&lt;li&gt;They set up a time to meet or video chat but don't show up and have a seemingly reasonable excuse&lt;/li&gt;
&lt;li&gt;They get angry when you confront them&lt;/li&gt;
&lt;li&gt;You've caught them lying&lt;/li&gt;
&lt;li&gt;They make over the top promises&lt;/li&gt;
&lt;li&gt;You've decided to be exclusive, regardless of having never met&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Other Signs&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;They travel often, but can't meet you&lt;/li&gt;
&lt;li&gt;It seems to good to be true&lt;/li&gt;
&lt;li&gt;Something seems off&lt;/li&gt;
&lt;li&gt;They don't have any other social media profiles&lt;/li&gt;
&lt;li&gt;Their personal details are vague or don't add up&lt;/li&gt;
&lt;li&gt;They ask for money or favors&lt;/li&gt;
&lt;li&gt;Your friends are skeptical&lt;/li&gt;
&lt;li&gt;They're going through some sort of hardship&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;What to do if you think you are being catfished?&lt;/h2&gt;
&lt;p&gt;There's no definitive, fool-proof way to move forward when you think you are being catfished. Some good first steps would be to:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Gather all of the information you have about the person (First name, last name, nicknames, age, birthday, where they live, job, photos, etc.)&lt;/li&gt;
&lt;li&gt;Take a close look at their profile and make a note of anything that seems off to you&lt;/li&gt;
&lt;li&gt;Make a list of any inconsistencies in the information they have given you&lt;/li&gt;
&lt;li&gt;Talk to your friends and family about your concerns, and listen carefully to what they think about the situation&lt;/li&gt;
&lt;li&gt;Think about how each potential outcome (catfish vs. not a catfish) will affect you, and start to prepare yourself emotionally&lt;/li&gt;
&lt;li&gt;Pursue a catfishing investigation&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If you want definitive answers, you could apply to be on Catfish: The T.V. Show. However, there's a good chance you won't be selected, and not everyone wants to face potential heartache and embarrassment in front of a national audience.&lt;/p&gt;
&lt;p&gt;You can run a "DIY catfish investigation" using some basic methods like reverse Google image search and searching for other profiles or taking a close look at the person's friends, but often times this information can just add to the confusion and raise more questions. It also takes a lot of time. While it can still show you the person may not have been honest with you, it's not common to get definitive answers through these methods, and when it comes to an online relationship with feelings of doubt, most people want clear-cut answers either way.&lt;/p&gt;
&lt;p&gt;So, if you need help finding answers, hiring a social media investigator might be the way to go.&lt;/p&gt;
&lt;p&gt;A social media investigator will be able to run searches across multiple platforms, set up alerts for posts containing certain information and new accounts being created, and be able to look at the geographic and time stamp data of posts and uploads. For supplemental research offline, a private investigator will also have access to databases through which they can verify the individual's personal data.&lt;/p&gt;
&lt;p&gt;Getting answers is an important part of getting closure and moving forward. A private investigator can conduct an extensive &lt;a href="https://www.pinow.com/investigations/social-media-investigations"&gt;social media investigation&lt;/a&gt; to get you answers, and to determine once and for all whether or not the person you're speaking with is who they say they are.&lt;/p&gt;
&lt;p&gt;Further reading: &lt;a href="https://www.pinow.com/investigations/social-media-investigations"&gt;Social Media Investigations&lt;/a&gt;&lt;/p&gt;
&lt;p class="font_large"&gt;&lt;em&gt;To find a local private investigator for a catfishing investigation, use the search tool at the top of this page or call us toll free at (888) 997-4669.&lt;/em&gt;&lt;/p&gt;</content>
    <author>
      <name>Lawgical Staff</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2201</id>
    <published>2016-05-31T00:00:00-06:00</published>
    <updated>2016-05-31T15:37:57-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2201/the-utah-gumshoe"/>
    <title>The Utah Gumshoe: Catch a Cheating Spouse 5 Cell Phone Tips</title>
    <summary>In this episode of The Utah Gumshoe Podcast, veteran investigator Scott Fulmer shares his top 5 cell phone tips for catching a cheating spouse. </summary>
    <content type="html">&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/2297/original.jpg" alt="The Utah Gumshoe: Catch a Cheating Spouse 5 Cell Phone Tips" /&gt;&lt;/p&gt;
&lt;h2&gt;Listen: Catch a Cheating Spouse 5 Cell Phone Tips&lt;/h2&gt;
&lt;p&gt;&lt;iframe src="https://player.blubrry.com?podcast_id=13721389" frameborder="0" scrolling="no" width="100%" height="138"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;With the growing popularity and ubiquitous nature of social media I am finding that domestic clients, those that suspect a cheating partner, are increasingly doing much more of the leg work before coming to see me. They&amp;rsquo;re checking their boyfriend&amp;rsquo;s Facebook or Tumblr account or monitoring their wife&amp;rsquo;s cell phone call history or internet browser search history. You can add the following 5 tips to your social media repertoire. As a private investigator I offer the accurate and expensive methods that are suitable to present in a court of law. This podcast entry, catch a cheating spouse 5 cell phone tips, offers simple and common sense methods, and is at least a start.&lt;/p&gt;
&lt;h2&gt;#1 &amp;mdash; First and Last Phone Call&lt;/h2&gt;
&lt;p&gt;In many cases if your partner is cheating they will often call their paramour immediately after leaving the house and again right before returning home. You can find this information by checking the cell phone&amp;rsquo;s call history or by looking at a detailed bill and phone log. Look for phone numbers that the cheater appears to be calling regularly or at odd times.&lt;/p&gt;
&lt;h2&gt;#2 &amp;mdash; Identifying Strange Phone Numbers&lt;/h2&gt;
&lt;p&gt;When it comes to strange phone numbers I always try Googling the number first. It&amp;rsquo;s free and it might surprise you what you&amp;rsquo;ll find. You can also try Fone Finder. That&amp;rsquo;s F-O-N-E finder.net Fone Finder is a free service that will provide you the name of the phone company associated with the phone number and where the number is located. It has some limitations but it&amp;rsquo;s a start. And did I mention it&amp;rsquo;s free?&lt;/p&gt;
&lt;h2&gt;#3 &amp;mdash; Identify Strange Phone Numbers, Part II&lt;/h2&gt;
&lt;p&gt;To identify a strange phone number you can always try calling the phone number at some ungodly hour, like 2:00 AM in the morning. If you&amp;rsquo;re lucky, you&amp;rsquo;ll get a voice mail and get a name to go along with the other woman (or man). But be careful. Don&amp;rsquo;t call from a phone number you&amp;rsquo;re associated with because they&amp;rsquo;ll see it in their caller ID the next morning.&lt;/p&gt;
&lt;h2&gt;#4 &amp;mdash; Burner Cell Phone&lt;/h2&gt;
&lt;p&gt;The cheater may be using a burner cell phone. A burner cell phone is a cheap, pre-paid cell phone that typically has no contract and allows you to buy and activate the phone without providing your name or address or any other type of identifying information that can connect you to the actual cell phone. You can also change the cell phone number whenever you want. Burners can be purchased for very little money at grocery stores, drug stores and convenience stores. The popular brands include TracFone and Republic Wireless. Burner cell phones are the choice of terrorists and criminals, so you can see you have your work cut out for you. And finally...&lt;/p&gt;
&lt;h2&gt;#5 &amp;mdash; Phone Behavior Out of the Ordinary&lt;/h2&gt;
&lt;p&gt;My last tip is that you need to come to the realization that your partners cell phone habits may have changed. For example, in the past maybe they allowed you to use their cell phone, now they don&amp;rsquo;t. Maybe their cell phone was not password protected and now it is. Did they received calls in front of you but now they leave the room for the conversation? Did they have a habit of leaving their cell phone lying around, now it&amp;rsquo;s on their person 24 hours a day? This behavior may indicate that there is a problem. But only you can answer these questions. To catch a cheating spouse these 5 cell phone tips are only the beginning.&lt;/p&gt;
&lt;p&gt;Until next time,&lt;/p&gt;
&lt;p&gt;This is Scott Fulmer, the Utah Gumshoe, reminding you the game&amp;hellip;if afoot!&lt;/p&gt;
&lt;h3&gt;About The Utah Gumshoe Podcast&lt;/h3&gt;
&lt;p&gt;&lt;img class="align_left width_25" src="https://s3.amazonaws.com/lawgical/assets/data/2298/original.jpg" alt="Scott B. Fulmer The Utah Gumshoe" /&gt;&lt;/p&gt;
&lt;p&gt;The Utah Gumshoe Podcast follows the real-life exploits, riveting case stories, investigative tips and insightful advice of Scott Fulmer, &lt;a href="http://www.theutahgumshoe.com"&gt;The Utah Gumshoe&lt;/a&gt;. Scott is a 20 year veteran Utah private investigator, surveillance expert and President/CEO of intellUTAH, a private investigation firm based in Salt Lake City.&lt;/p&gt;
&lt;p&gt;He has written numerous articles on investigative and surveillance techniques that have appeared in PInow.com and other industry journals. He is a decorated combat veteran of the Persian Gulf War where he served with the famous 2nd Armored Division (Hell on Wheels). Whether you're a novice or an experienced investigator this is the podcast for you.&lt;/p&gt;
&lt;h3&gt;Additional Episodes&lt;/h3&gt;
&lt;div class="cols"&gt;
&lt;div class="col_half"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2160/the-utah-gumshoe-the-case-of-the-apparent-rapist"&gt;The Case of the Apparent Rapist&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2148/the-utah-gumshoe-the-case-of-the-invisible-thief"&gt;The Case of the Invisible Thief&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2130/the-utah-gumshoe-how-to-record-a-cell-phone-call"&gt;How to Record a Cell Phone Call&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2103/the-utah-gumshoe-private-investigator-and-attorney-work-product"&gt;Private Investigator and Attorney Work Product&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2102/the-utah-gumshoe-5-tips-for-child-custody-arrangements"&gt;5 Tips for Child Custody Arrangements&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="col_half"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2101/the-utah-gumshoe-3-tips-for-every-domestic-surveillance"&gt;3 Tips for Every Domestic Surveillance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2093/the-utah-gumshoe-adventure-of-the-injured-stripper"&gt;Adventure of the Injured Stripper&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2081/the-utah-gumshoe-mystery-of-the-vanishing-utah-lawyer"&gt;Mystery of the Vanishing Utah Lawyer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2070/utah-gumshoe-breaking-bad-two-habits-every-private-eye-should-avoid"&gt;Breaking Bad - Two Habits Every Private Eye Should Avoid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2064/the-utah-gumshoe-easter-and-surveillance-in-church"&gt;Easter and Surveillance in Church&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;Articles from Scott Fulmer&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/1970/5-reasons-private-investigators-have-great-job-security"&gt;5 Reasons Private Investigators Have Great Job Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/366/10-tips-for-private-investigators-to-conduct-more-successful-surveillance"&gt;10 Tips for Private Investigators to Conduct More Successful Surveillance&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Scott Fulmer</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2198</id>
    <published>2016-05-19T00:00:00-06:00</published>
    <updated>2019-03-08T14:31:22-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2198/when-the-police-can-t-help"/>
    <title>When the Police Can't Help</title>
    <summary>One private investigator recently got the scare of his life when his wife received a threatening phone call, which gave him a new perspective on what his clients experience.</summary>
    <content type="html">&lt;p&gt;Private investigators are often called on when the police can't help or more research needs to be done, and they're no stranger to frantic phone calls from individuals who are being stalked, harassed, and frightened by unknown individuals. One of the founders of Bosco Legal Services recently had a scare that hit close to home, when a threatening phone call disrupted his family. This gave the company first hand insight into exactly how valuable a private investigator's services are for safety and piece of mind.&lt;/p&gt;
&lt;p&gt;It was just an average morning. Jeremiah Jones' (one of the co-founders of Bosco Legal Services) wife was driving the couple's oldest daughter to school when they received a disturbing phone call. The man on the other line called her by name and told her he was going to come into her bedroom, then into their eldest daughter's room, and then into their middle daughter's room, referencing each of them by name.&lt;/p&gt;
&lt;p&gt;Jones' wife immediately hung up the phone and tried to call her husband, who wasn't available. She turned around and drove home to make sure everything and everyone was okay, and arrived distraught and frazzled, understandably so. The police were called, took down notes, and tried calling the number, but that was all they could do.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p class="font_large"&gt;&lt;em&gt;The man on the other line called her by name and told her he was going to come into her bedroom, then into their eldest daughter's room, and then into their middle daughter's room, referencing each of them by name.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;"When he left, we didn't have any warm and fuzzy feelings that the sheriff's department was going to do anything else for us," Jones wrote in a &lt;a href="https://www.boscolegal.org/close-to-home-where-to-turn-when-the-police-cant-help/"&gt;blogpost about the experience&lt;/a&gt;. "It dawned on me at that point, that if like most people I had to wait for the police to investigate what happened, I may never have closure. Although this was a very real and scary situation for my family, with the limited resources that the police have and since no one was physically hurt, this was not high on their priority list." Jones said that his children were terrified, frightened of being in the house but too scared to leave. Jones says that this gave him a new perspective of what many of his clients are experiencing, and decided to use the resources he had to move forward with the case.&lt;/p&gt;
&lt;p&gt;"Fortunately, by nature of my profession, I was able to get ahold of the head of our investigations department, who also happens to be my very protective brother, and I had him start the process of figuring out who had called and threatened my family," Jones wrote. The initial searches revealed a phone number that belonged to an individual they had never heard of, and most of the information was several months old, as it often is. Jones wasn't certain the information was accurate.&lt;/p&gt;
&lt;p&gt;So, Jones' brother went a different route, reaching out to a source that had access to real time phone information. That source was able to reveal not only that this phone number had been activated only two days earlier, but also the name and address of the registered owner.&lt;/p&gt;
&lt;p&gt;Surprisingly, Jones recognized the name. The phone number was registered to someone who the family knew well. While this would generally seem alarming, fortunately it turned out to be a prank gone too far. "It turns out the call came from a teenager that had simply gotten carried away with a prank phone call and it was nothing too serious," Jones said. "The perpetrator was dealt with in an appropriate manner, but thankfully nobody was ever in any real danger."&lt;/p&gt;
&lt;p&gt;But what if Jones wasn't a private investigator? What if his only option had been to rely on the police, and deal with an ongoing sense of danger? How far would the prank have gone? Would there have been more phone calls?&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/3314/original.jpg" alt="Private Investigator Concern" /&gt;&lt;/p&gt;
&lt;p&gt;In using his resources as a private investigator, they had the case solved and resolved withing 90 minutes of the original call, giving the family peace of mind.&lt;/p&gt;
&lt;p&gt;"If we had not used a private investigator to help us figure out who it was however, my family would have been in fear for days, weeks, or maybe even months," Jones said. "As I have reflected on this event over and over in my mind, it gave me a new appreciation for what it is that we do for our clients on a daily basis and the effort that ours investigators make. When your family is in the middle of a difficult situation like this, you simply can&amp;rsquo;t put a price tag on having peace of mind and resolution."&lt;/p&gt;
&lt;p&gt;We couldn't agree more.&lt;/p&gt;</content>
    <author>
      <name>Lawgical Staff</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2191</id>
    <published>2016-04-06T00:00:00-06:00</published>
    <updated>2019-03-08T14:30:33-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2191/the-importance-of-undercover-operations"/>
    <title>The Importance of Undercover Operations</title>
    <summary>When there is an issue of criminal activity that shows the unknown and detailed information is needed to verify the authenticity of such details, it is important that the undercover operation is carried out by a professional undercover operative in order to make the facts clearer. I have used my experience to resolve most of our undercover operations that have been very fruitful to many organizations and also help to resolve criminal and investigative issues.</summary>
    <content type="html">&lt;p&gt;When you are a private investigator, one thing that is part and parcel of the private investigation offerings is undercover operations. Having worked as a private investigator for many years, the journey is not always easy because you often have to deal with criminal activities in carrying out such investigations, a difficult task to perform if you are not well experienced.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/3226/original.png" alt="undercover investigations" /&gt;&lt;/p&gt;
&lt;h2&gt;Step 1&lt;/h2&gt;
&lt;p&gt;When there is an issue of criminal activity that shows the unknown and detailed information is needed to verify the authenticity of such details, it is important that the undercover operation is carried out by a professional undercover operative in order to make the facts clearer. I have used my experience to resolve most of our undercover operations that have been very fruitful to many organizations and also help to resolve criminal and investigative issues.&lt;/p&gt;
&lt;p&gt;The process that I have witnessed and applied in all my undercover operations revolves around bringing the operative, aka UC (Undercover), into the business in an apparently routine way such as hiring him or her to fill a vacant position, even if it means creating a position. It will help if the operative has the skill and know-how to perform the tasks of the job, or the job can be made so simple that competence and experience are not important such as a janitorial job. The position should be such that the operative is placed in a physical location where the activity can be observed. If the location proves to be the wrong location for observation, a routine transfer to another potential location should be made.&lt;/p&gt;
&lt;h2&gt;Step 2&lt;/h2&gt;
&lt;p&gt;The second step regarding the game plan, activity etc. is the who, what, where, when and how. In other words, know what is being stolen or compromised, where the activity is taking place, how the activity is presumably being carried out and the identity of the people involved. A handler and experienced investigator must be the unique point of contact with the agency operations.&lt;/p&gt;
&lt;h2&gt;Step 3&lt;/h2&gt;
&lt;p&gt;The third step in the operation is to establish a relationship with the people involved, such as becoming a friend with a member of the criminal group or a thief posing as interested in becoming a member. A cover is essential and must be able to validate if the criminal group wants to check out the cover of the operator. One point needs to be made on this matter: if the operator is at risk, such as leaving its cover, the operator must be extracted in a way that does not confirm the suspicions of criminal group. An example would be the transfer of the employee (operator) to a new location, letting the employee go for a reason such as reducing labor, or terminating the employee for a completely unrelated event to the criminal activity. The aim is to protect the operator first and foremost along with the secrecy of the operation in order to complete the Investigation and expose the criminal activity. After a reasonable period of time, a second UC can be inserted.&lt;/p&gt;
&lt;h2&gt;Step 4&lt;/h2&gt;
&lt;p&gt;The fourth step is to avoid entrapment if the police get involved in any case. Entrapment refers to the police, and if there is any indication that the police have participated, even in a minor way, the prosecution may not be possible. In addition, there is a risk that the trial of the criminal group will attempt to demonstrate that the operation helped plan the activity, participated in it, and the activity would not have occurred if it were not for the operation. This can be demonstrated if the UC participates in social activity and profits generated by the activity. If a portion of the stolen property is taken or a portion of the benefits becomes essential to "legitimize" the UC with the group, the UC should not profit personally in any way. Any item stolen, sharing the "goods,&amp;rdquo; or other material property of the victim must be delivered to the handler and kept as evidence.&lt;/p&gt;
&lt;h2&gt;Step 5&lt;/h2&gt;
&lt;p&gt;The final step is to have a handler constantly receiving information from the UC and directing his/her to take certain actions or avoid certain activities. Communication between the UC and the handler must be at least daily. The method of communication can be disguised person to meet, message, telephone, voice phone, email, fax, or Twitter providing that the method is reasonably free of detection. Although effective, the use of a body wire is risky for most Undercover assignments and must follow the guidelines of state/federal law. Making written notes or keeping a journal is also a no-no.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p class="font_large"&gt;&lt;em&gt;From my evidential point of view, photographs, video tapes and other forms of images are very good, but difficult to acquire.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;From my evidential point of view, photographs, video tapes and other forms of images are very good, but difficult to acquire. An operator caught taking photos can be placed in great danger. A very effective method of showing the thieves in action is the installation of a fiber optic lens that sends images to a photographic recording device that has a time and date generator. A fiber optic lens is easy to remove, for example, in a box such as the fire alarm or inserted in a wall of plasterboard. The disadvantage is that the viewing area can be less than desirable.&lt;/p&gt;
&lt;p&gt;The telephone bug and other forms of listening devices can be useful in capturing a record incriminating conversations and pen can be useful in identifying participants located outside the area of the crime, as a fence. As stated previously always check with legal council and know the laws of the state that you&amp;rsquo;re operating in.&lt;/p&gt;
&lt;p&gt;It is very important to identify places where stolen goods are being removed from the premises. When the operation reaches a conclusion, hidden stolen objects can be captured and held as evidence. Usually, the police arrive at the scene with a court order. The property is seized and arrests made, including the arrest of the culprit. The idea is not to expose the culprit for revenge. The standard police procedure is to separate the detainees confined. This practice can facilitate safe release of the operative and also prevent criminals from inventing a story on the criterion defense attorney; the operator may or may not be called as a witness at trial.&lt;/p&gt;
&lt;p&gt;Working as an undercover operative has helped me to resolve many issues relating to criminal activities and other undercover operations. I will discuss specific cases where I was the UC in a future article.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/3225/original.png" alt="the-importance-of-undercover-operations" /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;img class="align_right width_35" src="https://s3.amazonaws.com/lawgical/assets/data/3188/original.jpeg" alt="Chris Cavallo" /&gt;&lt;/p&gt;
&lt;p&gt;Chris Cavallo has been involved in every facet of the Security and Investigations Industry for over 35 years. He started his career with the two largest Security and Investigation Companies in the world at the time, Wells Fargo and Pinkerton&amp;rsquo;s Investigative Services. After spending 2 years as a Management Trainee with 11 months in the field as an Undercover Operative he quickly raised rose through the ranks and became one of the most highly recognized Security Consultants for his first 10 years. He is considered a subject matter expert in various Security/Investigative practices such as Security Guard Services and Background Investigations. He ended is career with a Fortune 50 Company as the VP of the SE Region which was a $300M + business unit. He then co-founded a company, RSI Investigations (Records Search Inc.), which was one of the pioneers and leaders in the Background Screening industry in the late 80&amp;rsquo;s. After this experience Chris founded Cavallo Associates working with Security, Defense and Investigation Companies and helping them develop their Business Plans and training their personnel while opening new markets in such places as Rome, Italy the Panama Canal and Bogota, Colombia. Today Chris is a Florida Licensed Private Investigator and continues to dedicate himself in the Investigations Industry, sponsoring and developing several PI Interns while operating under the brand name CSI Secure Solutions headquartered in Davie Florida with an office in Bogota, Colombia. Chris and his wife Caryn Rae Robin a local singer and popular voice Coach live in Plantation, Florida with twin daughters Stefanie &amp;amp; Cristina and are very proud Grandparents of 5, Christopher 11,Stefan 9,Legend 6, Roman 5 and Mia Robin 4.&lt;/p&gt;
&lt;p&gt;If your business is experiencing issues of theft, subversive activity of any kind, drugs in the workplace or you believe that proprietary information is being shared with competitors such as price lists, software coding and equipment/product design, please do not hesitate and contact me personally to discuss theses areas of concern in your business or organization. Just visit &lt;a href="http://www.csi-securesolutions.com"&gt;CSI Secure Solutions&lt;/a&gt; to get in contact with us now!&lt;/p&gt;</content>
    <author>
      <name>Chris Cavallo</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2180</id>
    <published>2016-03-09T00:00:00-07:00</published>
    <updated>2019-03-08T15:55:41-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2180/importance-of-hiring-a-private-investigator-as-a-family-law-practitioner"/>
    <title>Importance of Hiring a Private Investigator as a Family Law Practitioner</title>
    <summary>Guest contributor Chris Cavallo shares how family law attorneys and individuals involved in family law matters can benefit from working with a private investigator.</summary>
    <content type="html">&lt;p&gt;If you are a family law practitioner and have never considered hiring a private investigator, you are wasting time and resources.&lt;/p&gt;
&lt;p&gt;No matter how experienced, efficient or skilled you are, you cannot get to all the work that crosses your desk. You cannot do case findings as thoroughly as you would like. And you cannot be an expert in everything.&lt;/p&gt;
&lt;p&gt;Family matters and domestic relations cases may be an extremely grilling experience, however, hiring a private investigator to strengthen your case can help tremendously. According to research conducted recently conducting a thorough investigation can strengthen your case by a whopping 75%. The judge will always want to award custody to the most reliable and responsible parents, and so they tend to look deeply into the matter. The following are some of the importance of hiring a private investigator as a Family Law Practitioner and why you should consider getting one for your Family and domestic matters.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/3189/original.png" alt="importance-of-hiring-a-private-investigator-as-a-family-law-practitioner" /&gt;&lt;/p&gt;
&lt;h2&gt;1. Getting the Facts&lt;/h2&gt;
&lt;p&gt;Family matters such as child abuse, marriage, and civil unions are filled with emotional challenges. During that time, it may be difficult to obtain the necessary data straight since each parent gives information filtering it through their perspective. Private investigators, however, carefully check these facts to determine the real truth that could be harmful or beneficial to your cases.&lt;/p&gt;
&lt;h2&gt;2. Constructive Investigation&lt;/h2&gt;
&lt;p&gt;Parents have a misconception about custody cases. They believe that their main objective here is to assign blame while spreading negativity about the other party. On the contrary, they should focus on the positives reality about themselves. Therefore, constructive investigations by private investigators about their high points as parent research can be useful.&lt;/p&gt;
&lt;h2&gt;3. Abuse and Neglect&lt;/h2&gt;
&lt;p&gt;The neglect and abuse of children by either party can be a determining factor in your custody case. In general, it is not wise to degrade the father who abuses his child as an enemy, but if the abuse/neglect occurred, then it is essential to incorporate this information with the proof in the case that a private investigator will help you to prepare as a Family lawyer. This process will make the court aware of the situation.&lt;/p&gt;
&lt;h2&gt;4. Working with System&lt;/h2&gt;
&lt;p&gt;One of the most crucial aspects of custody cases according to experienced private investigators is to recognize the fact that the judicial system cannot be changed within a night. One must realize that no matter how our family court system is, the truth is that it will never be perfect as the way you want it to be. Therefore, you have to plan to work with the system.&lt;/p&gt;
&lt;p&gt;In custody cases, custodial placement is taking care of the interests of the child. For you to actualize the aim the court must consider all relevant claims and there is probably no better way to support your claim rather than stating that with facts and figures revealed by a private investigator.&lt;/p&gt;
&lt;h2&gt;Hiring a Private Investigator&lt;/h2&gt;
&lt;p&gt;Most states have an official body which authorizes private investigators. Before hiring an investigator, make sure that it is a licensed private investigator. Then it will be good to ask him about his experience. If the private investigator has enjoyed a long career in law enforcement, which may suggest that he has experience in interviewing people and gathering information. Many private investigators specialize in certain types of legal matters. For example, some may be exceptionally efficient in conducting surveillance of divorce cases. Others work primarily in cases involving cybercrimes.&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;img class="align_right width_35" src="https://s3.amazonaws.com/lawgical/assets/data/3188/original.jpeg" alt="Chris Cavallo" /&gt;&lt;/p&gt;
&lt;p&gt;Chris Cavallo has been involved in every facet of the Security and Investigations Industry for over 35 years. He started his career with the two largest Security and Investigation Companies in the world at the time, Wells Fargo and Pinkerton&amp;rsquo;s Investigative Services. After spending 2 years as a Management Trainee with 11 months in the field as an Undercover Operative he quickly raised rose through the ranks and became one of the most highly recognized Security Consultants for his first 10 years. He is considered a subject matter expert in various Security/Investigative practices such as Security Guard Services and Background Investigations. He ended his career with a Fortune 50 Company as the VP of the SE Region which was a $300M + business unit. He then co-founded a company, RSI Investigations (Records Search Inc.), which was one of the pioneers and leaders in the Background Screening industry in the late 80&amp;rsquo;s. After this experience, Chris founded Cavallo Associates working with Security, Defense, and Investigation Companies and helping them develop their Business Plans and training their personnel while opening new markets in such places as Rome, Italy the Panama Canal and Bogota, Colombia. Today Chris is a Florida Licensed Private Investigator and continues to dedicate himself in the Investigations Industry, sponsoring and developing several PI Interns while operating under the brand name CSI Secure Solutions headquartered in Davie Florida with an office in Bogota, Colombia. Chris and his wife Caryn Rae Robin a local singer and popular voice Coach live in Plantation, Florida with twin daughters Stefanie &amp;amp; Cristina and are very proud Grandparents of 5, Christopher 11, Stefan 9, Legend 6, Roman 5 and Mia Robin 4.&lt;/p&gt;
&lt;p&gt;If you are a family lawyer and looking for a private investigator to work on look no more because CSI-secure solutions are ready to partner with you until you win those cases by providing you with outstanding private investigation service that is second to none. Just visit &lt;a href="http://www.csi-securesolutions.com/"&gt;CSI Secure Solutions&lt;/a&gt; to get in contact with us now!&lt;/p&gt;</content>
    <author>
      <name>Chris Cavallo</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2170</id>
    <published>2016-02-10T00:00:00-07:00</published>
    <updated>2018-05-04T13:34:32-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2170/using-technology-to-catch-cheating-spouses"/>
    <title>Using Technology to Catch Cheating Spouses</title>
    <summary>Catching cheating spouses has become progressively easier these days with the use of discreet surveillance equipment and electronic devices. With accessibility to the web, technology and dating applications people are cheating more and more. On the upside it is also getting much easier for those who suspect their partners to catch them red-handed. Engaging a private investigator who specialises in catching cheating spouses is becoming increasingly recognised as the simplest and quickest way to get to the truth of the matter.</summary>
    <content type="html">&lt;p class="font_small text_muted"&gt;&lt;em&gt;&lt;strong&gt;Editor's note:&lt;/strong&gt; The information in this article was provided by an investigation firm based in Australia and is for information purposes only. Law can vary from country to country and state to state, so please make sure you always check local laws, licensing rules, and device laws before conducting surveillance.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;img class="align_right" src="https://s3.amazonaws.com/lawgical/assets/data/3157/original.png" alt="using technology to catch a cheating spouse" /&gt;&lt;/p&gt;
&lt;p&gt;Catching cheating spouses has become progressively easier these days with the use of discreet surveillance equipment and electronic devices. With accessibility to the web, technology and dating applications people are cheating more and more. On the upside, it is also getting much easier for those who suspect their partners to catch them red-handed. Engaging a private investigator who specializes in catching cheating spouses is becoming increasingly recognized as the simplest and quickest way to get to the truth of the matter.&lt;/p&gt;
&lt;p&gt;Sydney, Australia is a hot-spot for cheating partners. This is confirmed by statistics revealed through the hack of Ashley Madison&amp;rsquo;s database in 2015. Sydney ranked 3 out of the top 25 cities in the world with 251,813 registered users. It is often tempting to meet up with potential partners as Sydney has evolved into one of the great social destinations of Australia, with an increasing amount of bars, clubs, and restaurants to meet in. Furthermore, the cheating often occurs in familiar surroundings, like the work environment with a work colleague or even a family friend.&lt;/p&gt;
&lt;p&gt;A private investigator who specializes in investigating cheating spouses receives hundreds of calls a month from distressed individuals seeking answers to their suspicions. Surveillance and spyware give them the answers they need to confront their cheating spouse with the hope of resolving arising relationship problems. Having solved these issues, people are then able to move on with their lives in a more positive direction.&lt;/p&gt;
&lt;h2&gt;Surveillance&lt;/h2&gt;
&lt;p&gt;People often entertain clich&amp;eacute;s of what a private investigator may look like; a grey trench coat with dark glasses sitting on a park bench reading a newspaper. Nothing could be further from the truth. In fact, the best way to monitor the movements of a particular person is to blend into the crowd and look as normal as possible. A good private investigator is never noticed. Agents are all ages and both male and female which means they can be suited to multiple scenarios.&lt;/p&gt;
&lt;h2&gt;The Use of Technology&lt;/h2&gt;
&lt;p&gt;In this day and age, there is a huge array of elite spy equipment available to investigators which is also available to the public. This enables private investigators to capture the precise moment the spouse is doing something inappropriate.&lt;/p&gt;
&lt;p&gt;Private investigators use and recommend equipment such as:&lt;/p&gt;
&lt;h3&gt;In-car cameras&lt;/h3&gt;
&lt;p&gt;These devices are integral to obtaining evidence of where a cheating spouse is located. Often they drive to a secret location and everything is caught on camera.&lt;/p&gt;
&lt;h3&gt;Spy-cams&lt;/h3&gt;
&lt;p&gt;&lt;img class="align_right" src="https://s3.amazonaws.com/lawgical/assets/data/3156/original.png" alt="spycam" /&gt;&lt;/p&gt;
&lt;p&gt;Spy cams are now powerful and tiny and are a perfect way for photographic and video evidence to be captured.&lt;/p&gt;
&lt;h3&gt;Spy glasses&lt;/h3&gt;
&lt;p&gt;Sounds like something out of a movie right? Well, these have been used in many successful surveillance operations. Essentially these glasses will capture video evidence of whatever the private investigator is looking at.&lt;/p&gt;
&lt;h3&gt;Listening devices&lt;/h3&gt;
&lt;p&gt;These are small powerful devices that can be placed in a discreet position. They have long life batteries since they are voice activated. This means that they will record any sounds and voices within a range of about 10 meters.&lt;/p&gt;
&lt;h3&gt;GPS trackers&lt;/h3&gt;
&lt;p&gt;These are by far the most popular items sold today. A person can place this in their car and will know where their car is at all times. They are used in the transport industry to track assets and are perfect for this industry.&lt;/p&gt;
&lt;p&gt;&lt;img class="align_center" src="https://s3.amazonaws.com/lawgical/assets/data/3155/original.png" alt="gps tracker" /&gt;&lt;/p&gt;
&lt;h3&gt;Phone Spyware Apps&lt;/h3&gt;
&lt;p&gt;&lt;img class="align_right" src="https://s3.amazonaws.com/lawgical/assets/data/3154/original.png" alt="spyware apps" /&gt;&lt;/p&gt;
&lt;p&gt;A person can load this software on their phone and download any messages and pictures from the phone. It also allows for phone calls to be recorded. People must be aware of the laws involved in the use of such technology, however at present, if used legally they are a perfect way to obtain the answers a person needs.&lt;/p&gt;
&lt;h3&gt;Computer Monitoring Software&lt;/h3&gt;
&lt;p&gt;Often the cheating is done on the home computer. This type of software has been around for years to track the activity on a computer and is used every day to monitor the unscrupulous activities of cheating spouses.&lt;/p&gt;
&lt;h2&gt;Is it Legal?&lt;/h2&gt;
&lt;p&gt;If used properly, the use of spy equipment complies with laws. Private investigators are licensed under the state police and if registered with a professional body should follow a code of conduct.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="http://www.sydneypi.com"&gt;Sydney Private Investigations&lt;/a&gt;, established in 2002, is at the forefront of the industry of catching cheating spouses. They are licensed and professional and are catching cheating spouses on a daily basis. Call 1300 773 293 to speak with them today if you feel your spouse is cheating on you. They will get you the answers you need today. &lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Become a guest contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, please contact us.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;More Information about Infidelity Investigations:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/investigations/infidelity-cheating-spouse" target="_blank"&gt;Infidelity / Cheating Spouse Investigation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/1995/setting-expectations-for-clients-in-infidelity-cases" target="_blank"&gt;Setting Expectations for Clients in Infidelity Cases&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/293/tracking-down-emotional-affairs" target="_blank"&gt;Tracking Down Emotional Affairs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/318/when-does-online-cheating-cross-the-line" target="_blank"&gt;When Does Online Cheating Cross the Line?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Gavin W</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2153</id>
    <published>2015-12-14T00:00:00-07:00</published>
    <updated>2015-12-16T12:46:53-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2153/11-most-read-help-center-articles-of-2015"/>
    <title>11 Most Popular Help Center Articles of 2015</title>
    <summary>Here are the 11 Most Popular Help Center articles of 2015.</summary>
    <content type="html">&lt;p&gt;We have several articles detailing different aspects of investigation, explaining the limitations of private investigators, and helping individuals, companies, and corporations understand the value of private investigators. As the year comes to a close, we took a look at our most-read articles from the PInow Help Center.&lt;/p&gt;
&lt;p&gt;Here are the 11 most-read Help Center articles of 2015.&lt;/p&gt;
&lt;h2&gt;1. How Much Does it Cost to Hire a Private Investigator?&lt;/h2&gt;
&lt;p&gt;If you are thinking of using the services of a private investigator, you may be wondering what the cost of hiring private investigators will be. Around the country, private investigator fees vary by location and type of services. For investigators with extensive experience and training, expect to pay higher fees. The numbers quoted in this article are estimated cost ranges based on average pricing offered by private investigators across the United States.&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/261/private-investigator-cost"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;2. What a Private Investigator Cannot Do&lt;/h2&gt;
&lt;p&gt;With so many myths associated with private investigators, there are a lot of misconceptions about what these professionals can legally do, but as private citizens, they have no more rights or privileges than the average citizen. Depending on the state, private investigators generally cannot. . .&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/456/what-a-private-investigator-cannot-do"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;3. Signs of a Cheating Spouse&lt;/h2&gt;
&lt;p&gt;When you suspect infidelity in your relationship it can be difficult to determine whether or not your suspicions are valid and if so, what to do next. At PInow, we surveyed our network of trusted infidelity investigators to find out what, in their experience, are the common indications of infidelity in a relationship. The following graphic displays the six major signs of a cheating spouse, what to expect in an infidelity investigation and other statistics on infidelity and marriage.&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/1061/infidelity-infographic"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;4. How to Find Birth Parents Using a Private Investigator&lt;/h2&gt;
&lt;p&gt;There are a number of reasons why adopted individuals desire to search for their birth parents. Of the more common ones are to obtain general family information such as names and locations, to uncover familial traits and personalities, to obtain medical information such as genetic conditions which may impact the seekers health, and to understand the circumstances of the adoption. Recently, there has been an increasing trend for birth parents to search for their adult children given up for adoption years ago as well as by adoptive parents looking to get information about their adopted children. Information from the Child Welfare Information Gateway (www.childwelfare.gov) suggests that nearly half of all adoptive persons will search for their birth parents at some point during their lives.&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/327/how-to-find-birth-parents-using-a-private-investigator"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;5. What is a Private Investigator?&lt;/h2&gt;
&lt;p&gt;A private investigator (who can also be known as a PI, private eye, or private detective) is a professional who is hired by law firms, corporations, insurance agencies, private individuals, or other entities to gather intelligence and confirm or disprove information. Professional private investigators often have law enforcement backgrounds or other relevant experience and training that has prepared them to investigate and research.&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/259/what-is-a-private-investigator"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;6. How a Private Investigator Can Help With a Fraudulent Workers Compensation Claim&lt;/h2&gt;
&lt;p&gt;Workers compensation claims are intended for the benefit of employees who get injured while on the job. The compensation pays for lost wages, medical expenses and other expenses while the employee recovers from the injury. Recently there has been an increase in worker compensation claims and many of them are considered to be fraud or illegitimate. Since worker compensation claims are hardly disapproved by the employer, it has become an easy way to use fraudulent compensation claims for personal profit.&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/1974/how-a-private-investigator-can-help-with-a-fraudulent-workers-compensation-claim"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;7. How To Hire A Private Investigator&lt;/h2&gt;
&lt;p&gt;There are more than 40,000 private investigators working in the United States, and many of them specialize in different investigation types. This means that you have many options and that you should do a bit of homework before hiring an investigator. When hiring a private investigator, you want to find one who is experienced in the investigation type you need and who has all necessary licenses, credentials and qualifications. Below, you'll find a to-do list of items to help you find and hire the right investigator for you.&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/260/hire-private-investigator"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;8. When Should a Polygraph be Used?&lt;/h2&gt;
&lt;p&gt;Polygraph testing is used by many companies. Understanding where and when to use polygraphs is a must for any business looking for answers. People lie all the time, and as law enforcement officials have known for a long time, when people lie, they often show it in some way. When being dishonest, some people avoid eye contact, others fidget, and others break into a sweat. Polygraph tests take this basic concept and create a measurable way of recording people's reactions to questions. A polygraph tests respiration, blood pressure, heart rate, and skin conductivity while the subject is being asked specific questions. By comparing the bodys response to specific questions, polygraph examiners can verify the truthfulness of what a subject is saying.&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/311/when-should-a-polygraph-be-used"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;9. Questions to Ask a Private Investigator before Hiring Them&lt;/h2&gt;
&lt;p&gt;When it comes to hiring a private investigator, there are many questions that need to be covered in order to ensure that your final results are met. The most common misconception about private investigators is that they are all the same. The truth is that most private investigators specialize in very different things, and individually they offer a wide variety of services and market themselves accordingly.&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/275/questions-to-ask-a-private-investigator-before-hiring-them"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;10. Gunshot Residue (GSR) and Testing&lt;/h2&gt;
&lt;p&gt;During our combined years at the medical examiner's office (spanning from late 2002 to late 2008), we collected GSR from every decedent with a cause of death due to a gunshot wound; every investigator did. However, the state laboratory had no longer accepted them for testing unless specific circumstances would warrant it. We cannot recall any submissions of GSR to the state lab. Instead it was recommended to collect DNA swabs from the decedent, firearm and other relevant evidence. Dean wrote the procedure that remains in place today.&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/2071/gunshot-residue-gsr-and-testing"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;11. Gunshot Residue (GSR) and Testing&lt;/h2&gt;
&lt;p&gt;During our combined years at the medical examiner's office (spanning from late 2002 to late 2008), we collected GSR from every decedent with a cause of death due to a gunshot wound; every investigator did. However, the state laboratory had no longer accepted them for testing unless specific circumstances would warrant it. We cannot recall any submissions of GSR to the state lab. Instead it was recommended to collect DNA swabs from the decedent, firearm and other relevant evidence. Dean wrote the procedure that remains in place today.&lt;/p&gt;
&lt;p&gt;&lt;a class="btn" href="http://www.pinow.com/articles/2071/gunshot-residue-gsr-and-testing"&gt;Read Full Article&lt;/a&gt;&lt;/p&gt;</content>
    <author>
      <name>Lawgical Staff</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2071</id>
    <published>2015-04-28T00:00:00-06:00</published>
    <updated>2015-04-28T15:03:40-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2071/gunshot-residue-gsr-and-testing"/>
    <title>Gunshot Residue (GSR) and Testing</title>
    <summary>Dean and Karen Beers return with an expert breakdown of gunshot residue, the collection process, how it is tested, and the misconceptions surrounding it.</summary>
    <content type="html">&lt;p&gt;During our combined years at the medical examiner's office (spanning from late 2002 to late 2008), we collected GSR from every decedent with a cause of death due to a gunshot wound; every investigator did. However, the state laboratory had no longer accepted them for testing unless specific circumstances would warrant it. We cannot recall any submissions of GSR to the state lab. Instead it was recommended to collect DNA swabs from the decedent, firearm and other relevant evidence. Dean wrote the procedure that remains in place today.&lt;/p&gt;
&lt;p&gt;Since returning to the private sector in late 2008, we have not had a case inquiring or requesting GSR testing&amp;mdash;until recent months. In one case GSR was completed by the agency as routine protocol, and in two private consultations we demonstrated the unreliability of GSR and recommended more definitive alternative protocols for the cases. With these recent cases, we decided some information was needed. The information below is simplified and not intended to relate any scientific processes or principles beyond some explanation.&lt;/p&gt;
&lt;h2&gt;What is GSR and the collection process?&lt;/h2&gt;
&lt;p&gt;GSR, an acronym for Gunshot Residue, is deposited&amp;mdash;or not&amp;mdash;on the hands and clothes, or any other objects, of someone or something in the vicinity of a discharged firearm.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/2533/original.png" alt="Gunshot Residue Defined" /&gt;&lt;/p&gt;
&lt;p&gt;Special sealed containers with tabs bearing an adhesive substance are used to collect microscopic particles as directed in the kit&amp;mdash;hands and face, as well as other areas of concern (i.e. clothing); there is one tab that remains sealed and unused as a control for the laboratory.&lt;/p&gt;
&lt;h2&gt;What is tested for?&lt;/h2&gt;
&lt;p&gt;The components are lead, antimony and barium. These are in the primer of the cartridge, and not the gunpowder of the cartridge itself (a common belief). The discharge creates a specific burned component of these three chemicals that is unique to cartridge primers&amp;mdash;although similar to fireworks, not the same microscopically.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p class="font_large"&gt;&lt;em&gt;Generally, we do not rely on GSR to either support or refute a person being involved in the discharge of a firearm. Instead we rely on other available information, facts and evidence.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It is our experience that GSR will not further the quest for answers. There are only two possibilities to GSR testing, per tab collected and tested: positive and negative. If positive, it only confirms a person being in the vicinity of the discharge, not that they did or did not shoot. Similarly, if negative it is not conclusive they were not in the vicinity of or discharged a firearm. In addition, there is a possibility that the movement of the bodies may have spoliated that evidence. As this is microscopic and multiple areas are collected from, this is a variable that we cannot specifically address.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/2532/original.png" alt="Gunshot Residue (GSR) and Testing" /&gt;&lt;/p&gt;
&lt;p&gt;Most requests for GSR involve multiple persons&amp;mdash;such as a homicide/suicide or suicide/suicide seen in domestic violence or end of life decisions of terminally elder people. The hope is that the GSR will tell who discharged the firearm and who was victim to the discharge without doing so themselves. The answer being sought is simply positive or negative for GSR, which gives four unspecified possibilities (alleged shooter and alleged victim):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Positive and positive&lt;/li&gt;
&lt;li&gt;Positive and negative&lt;/li&gt;
&lt;li&gt;Negative and positive&lt;/li&gt;
&lt;li&gt;Negative and negative&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The expected result is that #1&amp;mdash;positive for the alleged shooter and negative for the alleged victim. However, this is not conclusive&amp;mdash;no more than the remaining simplified possibilities.&lt;/p&gt;
&lt;p&gt;As an example, in research Karen learned from a recent very notable case in which it was known who the shooter and who the victim was. In this case there was one confirmed particle (lead). Specifically, GSR was found on the shooter&amp;rsquo;s jacket in the form of 1 particle of lead found on the upper back portion of the right sleeve. No GSR was found on the decedent or his clothing, or on the hands or other areas of the shooter&amp;rsquo;s person. In the altercation the shooter was on the ground and the decedent was on top of him, in close proximity, and the firearm was a semi-automatic handgun.&lt;/p&gt;
&lt;h2&gt;Common Scenarios&lt;/h2&gt;
&lt;p&gt;The two scenarios are most often asked about are:&lt;/p&gt;
&lt;h3&gt;1. Post Incident&lt;/h3&gt;
&lt;p&gt;Positive results are circumstantial and will only indicate these individuals may have discharged a firearm, may have been in the vicinity of a firearm and was discharged, or may have come in contact with an item with gunshot residue on it. Similarly, negative findings will not preclude the above and that one or more of the persons discharged a firearm.&lt;/p&gt;
&lt;h3&gt;2. Post Exhumation&lt;/h3&gt;
&lt;p&gt;Upon completion of the autopsy the body is cleaned for transport to the funeral home. At the funeral home the body is cleansed thoroughly and prepped as directed for burial. If there is an open casket or private viewing, the body is often prepared with makeup in those areas that would be exposed. This prevents any reliable GSR testing.&lt;/p&gt;
&lt;h2&gt;What does this tell us about GSR?&lt;/h2&gt;
&lt;p&gt;The only forensic conclusions are:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The presence of GSR is that the object in question was in the vicinity of a firearm discharge at a time the GSR cannot determine; and&lt;/li&gt;
&lt;li&gt;The absence of GSR is that the object in question may or may not have been in the vicinity of a firearm discharge. These findings do not include that GSR can be wiped or washed off, it cannot be determined how long it has been present, and no other reliable conclusions can be drawn.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;The Best Course of Action&lt;/h2&gt;
&lt;p&gt;It is best to review all the available records, reports and photographs to determine, as best possible, the most accurate conclusions based upon the direct and circumstantial evidence. GSR, like all evidence, is direct evidence that is subordinate and subjective to related circumstantial evidence. You must ask the who, what, when, where, why and how of all evidence and how these interrelate.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Authors&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Dean A. Beers, CLI, CCDI and Karen S. Beers, BSW, CCDI are both Colorado Licensed Private Investigators and Certified Criminal Defense Investigators, and certified in Medicolegal Death Investigations to include as a forensic autopsy assistants; together they co-developed &lt;a href="http://www.medicolegaldeathinvestigations.com/" target="_blank"&gt;Death Investigation for Private Investigators&lt;/a&gt; online continuing education for 14 states and for PIeducation.com. Dean formed the agency in 1987 and focused on general investigations, as well as individual locates, backgrounds and assets and liabilities. Karen began in 1996, gaining knowledge and experience in the same areas. &lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Become a guest contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;</content>
    <author>
      <name>Dean and Karen Beers</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2049</id>
    <published>2015-03-03T00:00:00-07:00</published>
    <updated>2019-03-14T13:20:44-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2049/guide-for-requesting-military-records"/>
    <title>Guide for Requesting Military Records</title>
    <summary>How do I request military records? What is the turn-around time and what is available? Learn more about how to request records for active military and veterans, as well as costs, restrictions, and timeframes.</summary>
    <content type="html">&lt;p&gt;&lt;img title="Guide for Requesting Military Records" src="https://s3.amazonaws.com/lawgical/assets/data/2483/original.png" alt="Guide for Requesting Military Records" /&gt;&lt;/p&gt;
&lt;p&gt;How do I request military records? What is the turn-around time and what is available?&lt;/p&gt;
&lt;h2&gt;Current Status for Active Members&lt;/h2&gt;
&lt;p&gt;First, what if you need to check the status of a current service member? These questions come up frequently for investigators.&amp;nbsp;For current status, visit &lt;a href="https://www.dmdc.osd.mil/appj/scra/single_record.xhtml"&gt;https://www.dmdc.osd.mil/appj/scra/single_record.xhtml&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Veteran Records&lt;/h2&gt;
&lt;p&gt;For veteran records, it's not so simple, but it has been simplified. For our agency, it has been some time since we've done these regularly. A few things have improved - one area that hasn't is their response. Although frequently recorded with the Clerk &amp;amp; Recorder (or similar) DD214s are considered confidential and available only to the veteran - spouse or other next-of-kin cannot receive a DD214.&lt;/p&gt;
&lt;p&gt;However, the near equivalent information is available from the Official Military Personnel Files (OMPF); see below.&lt;/p&gt;
&lt;h3&gt;What does this cost?&lt;/h3&gt;
&lt;p&gt;There is no charge &amp;ndash; free, even for a rush. For a rush request, see below. What is the difference for a rush and routine request to receive your records? In our experience, a rush is about one month (4-6 weeks typically) and standard is about three months (3-4 months typically).&lt;/p&gt;
&lt;h3&gt;Important contact information:&lt;/h3&gt;
&lt;h4&gt;Address&lt;/h4&gt;
&lt;p&gt;National Personnel Records Center&lt;br /&gt;1 Archives Drive&lt;br /&gt;St. Louis, MO 63138&lt;/p&gt;
&lt;h4&gt;Main Customer Service Number&lt;/h4&gt;
&lt;p&gt;(314) 801-0800&lt;/p&gt;
&lt;h4&gt;Request Fax Number&lt;/h4&gt;
&lt;p&gt;(314) 801-9195&lt;/p&gt;
&lt;p&gt;Veterans, and spouses of deceased veterans, can request these records online. The start page for all requests is &lt;a href="https://www.archives.gov/personnel-records-center/foia-info" target="_blank"&gt;http://www.archives.gov/st-louis/military-personnel/foia-info&lt;/a&gt;. Note: requests cannot be emailed, only faxed or mailed.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;form required is SF-180&lt;/strong&gt; and veterans can order directly online at &lt;a href="http://vetrecs.archives.gov"&gt;http://vetrecs.archives.gov&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Once you have sent your request, you can check on the status of a request for records that have been submitted to NPRC going to &lt;a href="https://www.archives.gov/personnel-records-center/forms" target="_blank"&gt;https://www.archives.gov/personnel-records-center/forms&lt;/a&gt;&amp;nbsp;or by phone at (314) 801-0800 (early morning central time is best).&lt;/p&gt;
&lt;h3&gt;How long might this request take?&lt;/h3&gt;
&lt;p&gt;Requests take about 12 weeks - 3 months to process! If you have a deadline date, send in a statement stating the deadline date and urgency and fax it to the emergency fax number (314) 801-0764 and they will try to send the records when you need them.&lt;/p&gt;
&lt;p&gt;The public has access to certain military service information without the veteran's authorization or that of the next-of-kin (the un-remarried widow or widower, son, daughter, father, mother, brother or sister) of deceased veterans.&lt;/p&gt;
&lt;h3&gt;Potentially Available Information&lt;/h3&gt;
&lt;p&gt;Examples of information which may be available from Federal (non-archival) Official Military Personnel Files (OMPF) without an unwarranted invasion of privacy include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Name&lt;/li&gt;
&lt;li&gt;Service Number&lt;/li&gt;
&lt;li&gt;Dates of Service&lt;/li&gt;
&lt;li&gt;Branch of Service&lt;/li&gt;
&lt;li&gt;Final Duty Status&lt;/li&gt;
&lt;li&gt;Final Rank&lt;/li&gt;
&lt;li&gt;Salary*&lt;/li&gt;
&lt;li&gt;Assignments and Geographical Locations&lt;/li&gt;
&lt;li&gt;Source of Commission*&lt;/li&gt;
&lt;li&gt;Military Education Level&lt;/li&gt;
&lt;li&gt;Promotion Sequence Number*&lt;/li&gt;
&lt;li&gt;Awards and decorations (eligibility only, not actual medals)&lt;/li&gt;
&lt;li&gt;Photograph&lt;/li&gt;
&lt;li&gt;Transcript of Courts-Martial Trials&lt;/li&gt;
&lt;li&gt;Place of entrance and separation&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="font_small"&gt;*Items rarely available in the records we maintain.&lt;/p&gt;
&lt;h4&gt;If the veteran is deceased:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Place of birth&lt;/li&gt;
&lt;li&gt;Date and geographical location of death&lt;/li&gt;
&lt;li&gt;Place of burial&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;FOIA and Official Personnel Folders (OPF)&lt;/h2&gt;
&lt;p&gt;Most information in a Federal (non-archival) Official Personnel Folder (OPF) is not releasable to the general public without the written consent of the individual whose record is involved. The Freedom of Information Act does allow, however, for certain information to be released without the individual's consent. The Office of Personnel Management (OPM) has determined that the following information can be released to the public:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Name&lt;/li&gt;
&lt;li&gt;Past and present positions&lt;/li&gt;
&lt;li&gt;Past and present titles&lt;/li&gt;
&lt;li&gt;Past and present salaries&lt;/li&gt;
&lt;li&gt;Past and present grades&lt;/li&gt;
&lt;li&gt;Past and present job locations&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Our Experience&lt;/h2&gt;
&lt;p&gt;Knowing the importance of complete records checks, we researched this process in October 2014. Due to a pending settlement conference, we requested and received copies on a rush basis (about one month). In our case, the client provided a copy of the subject's DD214, which had some time lapses, and noted an Honorable Discharge. The records received filled in those dates &amp;ndash; the subject was both AWOL and a deserter with administrative punishment for these convictions. The discharge, with benefits, was negotiated.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Authors&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Dean A. Beers, CLI, CCDI, and Karen S. Beers, BSW, CCDI are both private investigators licensed in Cheyenne, Wyoming, and Certified Criminal Defense Investigators, and certified in Medicolegal Death Investigations to include as a forensic autopsy assistants; together they co-developed &lt;a href="http://www.medicolegaldeathinvestigations.com/" target="_blank"&gt;Death Investigation for Private Investigators&lt;/a&gt; online continuing education for 14 states and for PIeducation.com. Dean formed the agency in 1987 and focused on general investigations, as well as individual locates, backgrounds and assets and liabilities. Karen began in 1996, gaining knowledge and experience in the same areas. &lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Become a guest contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;</content>
    <author>
      <name>Dean and Karen Beers</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/2020</id>
    <published>2014-11-14T00:00:00-07:00</published>
    <updated>2016-05-20T16:33:27-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/2020/the-utah-gumshoe-5-tips-adjusters-should-provide-investigators"/>
    <title>The Utah Gumshoe: 5 Tips Adjusters Should Provide Investigators</title>
    <summary>In this episode of The Utah Gumshoe, veteran investigator Scott Fulmer discusses the 5 things adjusters need to tell the private investigator.</summary>
    <content type="html">&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/2297/original.jpg" alt="The Utah Gumshoe: The Unknown Golfer" /&gt;&lt;/p&gt;
&lt;h2&gt;Listen: 5 Tips Adjusters Should Provide Investigators&lt;/h2&gt;
&lt;p&gt;&lt;iframe src="https://player.blubrry.com?podcast_id=2412831" frameborder="0" scrolling="no" width="100%" height="138"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;When I was a kid we used to play a game where we&amp;rsquo;d all sit in a line and the first person in line would whisper something to the second person. The second person would whisper it to the third, and so forth, until it got to the last person in line. The last person would then recite out loud what they had been told. Everyone would then have a good laugh because inevitably what the last person said bore little resemblance to what the first person had initially articulated. So it is with private investigators. We often get information third hand; after the employer has told the adjuster, who then tell us.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p class="font_large"&gt;&lt;em&gt;A successful surveillance begins before you even get behind the wheel. There are specific tips that, if provided by the claims adjuster, can mean the difference between success and a waste of 8 hours. Claims handlers are usually overworked. When they assign the case make sure you get the complete background information. It&amp;rsquo;s up to the investigator to ask the right questions.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Claims adjusters are busy. Depending on the company they work for they may be handling 100 to 200 claims at any given time. Because of this they may fail to give you all the information they have on a subject. A successful surveillance begins before you even get behind the wheel. There are specific pieces of key information that, if provided by the claims adjuster, can mean the difference between success and a waste of 8 hours. When an adjuster assigns you a case make sure to get the complete background information. It&amp;rsquo;s up to you to ask the right questions. Consider the following 5 tips.&lt;/p&gt;
&lt;h2&gt;1. Number and Age of Children&lt;/h2&gt;
&lt;p&gt;Why should you care if the claimant has children? Because someone has to take those children to school, doctor&amp;rsquo;s appointments and various other activities. If it&amp;rsquo;s the subject doing so&amp;hellip;then you&amp;rsquo;re already presented with opportunities to videotape an active subject. Additionally, if the number and age of the children you observe correspond to the subject&amp;rsquo;s known number and age of children it&amp;rsquo;s more likely to be the right subject.&lt;/p&gt;
&lt;h2&gt;2. Light Duty Schedule&lt;/h2&gt;
&lt;p&gt;I can&amp;rsquo;t tell you how many times I&amp;rsquo;ve conducted surveillance on a workers comp subject only to follow them to work. The subject may be on a light duty schedule or may have even been cleared to return to work and the company has yet to notify the adjuster (who has yet to notify you). If it&amp;rsquo;s a workers comp case make sure you ask the adjuster whether or not the subject is on light duty, and if so, what their light duty schedule is. If they&amp;rsquo;re on light duty they may not be working their normal job or even at their regular job station. For example, I had a subject that was a bus mechanic. Rather than working in the motor pool his light duty schedule had him at a completely different location doing paperwork. Get this information from the adjuster ahead of time. There&amp;rsquo;s no need to waste time by re-inventing the wheel out in the field.&lt;/p&gt;
&lt;h2&gt;3. Picture/Employee ID&lt;/h2&gt;
&lt;p&gt;Speaking of ways to identify a subject, the easiest is by photograph or an employee ID. But just remember, the photograph on the employee ID may have been taken years ago when the subject first began working for the employer. They may have gained weight or changed their hairstyle since the photograph was taken.&lt;/p&gt;
&lt;h2&gt;4. Day/Time They Pick Up the Check&lt;/h2&gt;
&lt;p&gt;When it comes to workers comp claims, especially involving employers that are self-insured, the subject is often required to physically stop by and pick up their workers comp benefit check. Normally these checks are made available at a specific time and day, i.e. Thursdays after 3:00 PM. Make sure you get this information from the adjuster. By the way, this is an excellent practice for self-insureds for a number of reasons. First, if you don&amp;rsquo;t know where the subject lives you can follow him home after he picks his check up. Second, if you don&amp;rsquo;t know what kind of vehicle the subject drives or how he&amp;rsquo;s getting around you can find out when he comes to get his check. Third, if the adjuster doesn&amp;rsquo;t have a picture of the subject they can notify you when they show up and you can get a good look at them. And fourth, after the subject gets her check she will often cash it and then run errands. You&amp;rsquo;ll be presented with plenty of opportunities to observe the subject active.&lt;/p&gt;
&lt;h2&gt;5. All Phone Numbers&lt;/h2&gt;
&lt;p&gt;And finally, get the phone numbers. All of them. I know many insurance companies such as The Hartford and Liberty Mutual do not want any pretexting of the subject whatsoever and may be leery about providing phone numbers to the investigator. That&amp;rsquo;s fine. Just make sure you tell the adjuster that you need the phone numbers so you can reverse them for the addresses. This is especially important if the subject&amp;rsquo;s provided address is no more than a mail drop or a relatives house.&lt;/p&gt;
&lt;p&gt;There are certainly more than 5 pieces of information you&amp;rsquo;ll need from the adjuster to ensure a successful investigation, but these 5 will get you started. In fact, these 5 are often overlooked. And in this business having the proper information can mean the difference between success and failure out in the field.&lt;/p&gt;
&lt;p&gt;Until next time,&lt;/p&gt;
&lt;p&gt;This is Scott Fulmer, the Utah Gumshoe reminding you the game&amp;hellip;is afoot!&lt;/p&gt;
&lt;h3&gt;About The Utah Gumshoe Podcast&lt;/h3&gt;
&lt;p&gt;&lt;img class="align_left width_25" src="https://s3.amazonaws.com/lawgical/assets/data/2298/original.jpg" alt="Scott B. Fulmer The Utah Gumshoe" /&gt;&lt;/p&gt;
&lt;p&gt;The Utah Gumshoe Podcast follows the real-life exploits, riveting case stories, investigative tips and insightful advice of Scott Fulmer, &lt;a href="http://www.theutahgumshoe.com"&gt;The Utah Gumshoe&lt;/a&gt;. Scott is a 20 year veteran Utah private investigator, surveillance expert and President/CEO of intellUTAH, a private investigation firm based in Salt Lake City.&lt;/p&gt;
&lt;p&gt;He has written numerous articles on investigative and surveillance techniques that have appeared in PInow.com and other industry journals. He is a decorated combat veteran of the Persian Gulf War where he served with the famous 2nd Armored Division (Hell on Wheels). Whether you're a novice or an experienced investigator this is the podcast for you.&lt;/p&gt;
&lt;h3&gt;Additional Episodes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2013/the-utah-gumshoe-the-unknown-golfer"&gt;The Unknown Golfer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2008/the-utah-gumshoe-5-tips-for-a-moving-surveillance"&gt;5 Tips for a Moving Surveillance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2006/the-utah-gumshoe-the-pugilistic-ex-wife"&gt;The Pugilistic Ex-Wife&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/2002/the-utah-gumshoe-5-tips-for-shooting-covert-video"&gt;5 Tips for Shooting Covert Video&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/1994/the-utah-gumshoe-adventure-of-the-naked-baker"&gt;Adventure of the Naked Baker&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Articles from Scott Fulmer&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/1970/5-reasons-private-investigators-have-great-job-security"&gt;5 Reasons Private Investigators Have Great Job Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.pinow.com/articles/366/10-tips-for-private-investigators-to-conduct-more-successful-surveillance"&gt;10 Tips for Private Investigators to Conduct More Successful Surveillance&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Scott Fulmer</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/1974</id>
    <published>2014-09-04T00:00:00-06:00</published>
    <updated>2019-03-08T13:27:36-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/1974/how-a-private-investigator-can-help-with-a-fraudulent-workers-compensation-claim"/>
    <title>How a Private Investigator Can Help With a Fraudulent Workers Compensation Claim</title>
    <summary>Workers compensation claims are intended for the benefit of employees who get injured while on the job. The compensation pays for lost wages, medical expenses and other expenses while the employee recovers from the injury. Recently there has been an increase in worker compensation claims and many of them are considered to be fraud or illegitimate. </summary>
    <content type="html">&lt;p&gt;&lt;a href="http://www.pinow.com/investigations/workers-compensation"&gt;Workers compensation&lt;/a&gt; claims are intended for the benefit of employees who get injured while on the job. The compensation pays for lost wages, medical expenses, and other expenses while the employee recovers from the injury. Recently there has been an increase in worker compensation claims and many of them are considered to be fraud or illegitimate. Since worker compensation claims are hardly disapproved by the employer, it has become an easy way to use fraudulent compensation claims for personal profit.&lt;/p&gt;
&lt;h2&gt;How does fraudulent worker compensation hurt businesses and honest employees?&lt;/h2&gt;
&lt;div class="box_gray align_right width_45"&gt;
&lt;h3 class="text_center"&gt;Data and Statistics&lt;/h3&gt;
&lt;a href="http://www.pinow.com/investigations/workers-compensation"&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/2270/original.png" alt="Workers Fraud Compensation Infographic" /&gt;&lt;/a&gt;
&lt;p class="text_center font_small"&gt;Click the image for full details&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;The increase of the fraudulent workers' compensation claims seriously affects the insurance companies. To deal with the increase in compensation claims, insurance companies increase the premium for such services and the cost is transferred to the employer. There have been cases where higher premium has affected the businesses to the extent which has resulted in the closure of businesses and people losing jobs. Hence, businesses need to be proactive when handling worker compensation claims. The best way to deal with fraudulent worker compensation claims is hiring a private investigator to find out the truth.&lt;/p&gt;
&lt;h2&gt;Reasons for hiring a private investigator to find out fraudulent worker compensation claims&lt;/h2&gt;
&lt;p&gt;The Private investigator is a trained individual to handle such fraudulent workers compensation claims. He/she has required tools that help uncover the fraud and provide proof that is admissible in the court. The primary step in investigating the worker compensation claim is to detect any possibility of fraud. To uncover fraud in compensation claims it is necessary to act fast before the evidence is destroyed. Private investigators use several techniques to find out fraudulent worker compensation claims such as&lt;/p&gt;
&lt;h3&gt;1. Interviews and research&lt;/h3&gt;
&lt;p&gt;Private investigators generally interview employees who seek worker compensation claims. The interview questionnaire contains all types of questions that establish every detail of the claim. The answers are recorded which can be used as evidence in court. Private investigators collect all documents such as photographic evidence of incident and treatment copies that are helpful to detect fraud. A basic research in worker compensation claims can reveal lots of information that is generally not gained through casual observation. A private investigator knows the right places and ways to conduct research and collect information that can tell about any existence of fraud.&lt;/p&gt;
&lt;h3&gt;2. Background checks and research&lt;/h3&gt;
&lt;p&gt;Private investigators conduct background checks to investigate whether the worker was truly injured. Background research generally involves checking for any claims in the past and whether the worker was convicted in any fraudulent claims in the past.&lt;/p&gt;
&lt;h3&gt;3. Surveillance&lt;/h3&gt;
&lt;p&gt;Private investigators use different types of surveillance including audio and video to determine if the worker is really injured the way he/she has claimed in the worker compensation claim. In case of a fraudulent claim, a surveillance record can be provided as a proof that shows the worker has exaggerated the medical condition or injury to get added benefits through a worker compensation claim.&lt;/p&gt;
&lt;h3&gt;4. Evidence gathering&lt;/h3&gt;
&lt;p&gt;Evidence plays an important role in proving a fraudulent working compensation and denies compensation where the claim is not legitimate. A private investigator gathers a considerable amount of evidence that can be used to determine the right amount of compensation whatever is applicable as per the law.&lt;/p&gt;
&lt;p&gt;Thus, hiring a private investigator is the best way to intelligently handle worker compensation claims and prevent fraud.&lt;/p&gt;
&lt;p&gt;More information: &lt;a href="http://www.pinow.com/investigations/workers-compensation"&gt;Workers Compensation Investigations&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Amy Screamer is a professional guest writer who is interested in writing articles related to investigations and security on behalf of &lt;a href="http://www.pantherpi.agency/" target="_blank"&gt;Panther PI&lt;/a&gt;. Panther PI offers a range of investigative services in professional standards.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;More Information about Fraud Investigations:&amp;nbsp;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/investigations/fraud-investigations" target="_blank"&gt;Fraud Investigation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/302/are-employees-using-these-sneaky-tactics-to-defraud-your-business" target="_blank"&gt;Are Employees Using These Sneaky Tactics to Defraud Your Business?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/303/real-estate-fraud-is-on-the-rise-protect-yourself" target="_blank"&gt;Real Estate Fraud Is On the Rise: Protect Yourself&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/304/top-10-resources-every-victim-of-identity-fraud-should-have" target="_blank"&gt;Top 10 Resources Every Victim of Identity Fraud Should Have&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/1974/how-a-private-investigator-can-help-with-a-fraudulent-workers-compensation-claim" target="_blank"&gt;How a Private Investigator Can Help With a Fraudulent Workers Compensation Claim&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;More Information on Workers Compensation Investigations:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/investigations/workers-compensation" target="_blank"&gt;Workers Compensation Investigation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2451/what-you-need-to-know-about-investigating-workers-compensation-cases" target="_blank"&gt;What You Need to Know About Investigating Workers Compensation Cases&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Amy Screamer</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/1796</id>
    <published>2014-06-16T00:00:00-06:00</published>
    <updated>2014-06-17T16:06:15-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/1796/how-technology-is-used-to-prevent-counterfeiting"/>
    <title>How Technology is Used to Prevent Counterfeiting</title>
    <summary>Counterfeiters produce $700 billion in fake products every year. This criminal activity makes it difficult for consumers to identify genuine products. Counterfeiting is also problematic because it negatively affects a brand’s image, and often funds organized crime.</summary>
    <content type="html">&lt;p&gt;Counterfeiters produce $700 billion in fake products every year. This criminal activity makes it difficult for consumers to identify genuine products. Counterfeiting is also problematic because it negatively affects a brand&amp;rsquo;s image, and often funds organized crime.&lt;/p&gt;
&lt;p&gt;Product markings, apps, websites and mobile surveillance devices are used as a line of defense against counterfeiting.&lt;/p&gt;
&lt;h2&gt;Unique markings on products&lt;/h2&gt;
&lt;h3&gt;Pattern in clothing&lt;/h3&gt;
&lt;p&gt;A partially &lt;a href="http://phys.org/news/2013-05-invisible-pattern-counterfeit.html?utm_content=buffer6aa4e&amp;amp;utm_source=buffer&amp;amp;utm_medium=twitter&amp;amp;utm_campaign=Buffer" rel="nofollow" target="_blank"&gt;invisible thread&lt;/a&gt; creates a brand-specific pattern that becomes visible under special lighting. The thread can be used by a range of stakeholders from resellers to border-crossing officials.&lt;/p&gt;
&lt;p&gt;The pattern can be used in a variety of fabrics. The thread is cheap to produce and difficult to copy.&lt;/p&gt;
&lt;h3&gt;Iridescent security image&lt;/h3&gt;
&lt;p&gt;Technology has progressed from the traditional holograms to more advanced forms of identifiers.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://nanosecurity.ca/" rel="nofollow" target="_blank"&gt;Nanotech Security&lt;/a&gt; has studied the Morpho butterfly&amp;rsquo;s iridescent blue and green wings.&lt;/p&gt;
&lt;p&gt;The security image, that&amp;rsquo;s based on the Morpho&amp;rsquo;s wings, uses an embossing technique that can be applied to a variety of surfaces from fabric to metal.&lt;/p&gt;
&lt;p&gt;The cost to add this anti-counterfeiting image amounts to pennies per unit. The process of duplicating this technology is very expensive and difficult for counterfeiters to replicate.&lt;/p&gt;
&lt;h3&gt;Pigments in plastics&lt;/h3&gt;
&lt;p&gt;Custom &lt;a href="http://www.securingindustry.com/electronics-and-industrial/gabriel-chemie-to-launch-anti-counterfeit-tech-for-plastics/s105/a1716/" rel="nofollow" target="_blank"&gt;plastic additives&lt;/a&gt; or pigments are company-specific identifiers that can be easily detected by using a handheld device.&lt;/p&gt;
&lt;h2&gt;Smartphone apps&lt;/h2&gt;
&lt;p&gt;Various apps are used as a tool for buyers to collaborate with brand owners to fight counterfeiting.&lt;/p&gt;
&lt;h3&gt;uFaker&lt;/h3&gt;
&lt;p&gt;The &lt;a href="https://www.ufaker.com/" rel="nofollow" target="_blank"&gt;uFaker app&lt;/a&gt; is designed to allow brand owners to share and track counterfeit activities with law enforcement, lawyers and private investigators.&lt;/p&gt;
&lt;p&gt;uFaker lets users earn a variety of rewards, that is provided by the brand owner, for identifying and reporting counterfeit items.&lt;/p&gt;
&lt;h3&gt;Authenticateit&lt;/h3&gt;
&lt;p&gt;The Authenticateit smartphone &lt;a href="http://authenticateit.com/" rel="nofollow" target="_blank"&gt;app&lt;/a&gt; allows consumers to quickly check if an item is authentic prior to making a purchase. It also empowers brand owners to identify, track, and prevent brand infringers from selling counterfeit products.&lt;/p&gt;
&lt;p&gt;Retail companies can put a Unique Product Identifier (UPI) in the fabric or on the package. Consumers can use their smartphones to scan the UPI. If the UPI has been counterfeited, the system will notify the consumer that the product can&amp;rsquo;t be authenticated. This prevents the consumer from buying a counterfeit item.&lt;/p&gt;
&lt;h3&gt;Black Market Billions&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://itunes.apple.com/us/app/black-market-billions-the-app/id483073257?mt=8" rel="nofollow" target="_blank"&gt;Black Market Billions&lt;/a&gt; is a crowdsourcing app that allows users to take photos of possible counterfeits and upload them to an online map that&amp;rsquo;s linked to a GPS locator. This alerts other consumers of counterfeits in specific locations.&lt;/p&gt;
&lt;h2&gt;Educational websites&lt;/h2&gt;
&lt;p&gt;There are many online initiatives that educate consumers about knockoffs. Consumers learn why counterfeits are harmful and how to avoid purchasing them.&lt;/p&gt;
&lt;h3&gt;Fake e-commerce website&lt;/h3&gt;
&lt;p&gt;&lt;a href="http://designsfauxreal.com/" rel="nofollow" target="_blank"&gt;DesignsFauxReal&lt;/a&gt; is a fake consumer website created by the &lt;a href="http://www.iacc.org/" rel="nofollow" target="_blank"&gt;International AntiCounterfeiting Coalition&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This website initially looks like it sell luxury goods, but it actually sells fictitious counterfeit items. It acts as a tool to education consumers about the negative aspects of purchasing counterfeit items.&lt;/p&gt;
&lt;h3&gt;The Counterfeit Report&lt;/h3&gt;
&lt;p&gt;&lt;a href="http://thecounterfeitreport.com/" rel="nofollow" target="_blank"&gt;The Counterfeit Report&lt;/a&gt; helps manufacturers educate customers about counterfeit products by encouraging them to participate in a reporting system.&lt;/p&gt;
&lt;p&gt;Brand owners can post information about places, such as swap meets and eBay, which sell counterfeits. They can also list authorized dealers, and educate consumers how to identify and report counterfeits.&lt;/p&gt;
&lt;p&gt;Consumers are able to search a database of products to access a brand&amp;rsquo;s information about counterfeits to avoid purchasing a knockoff. This also helps reduce the amount of counterfeits in the marketplace.&lt;/p&gt;
&lt;h3&gt;Unreal campaign&lt;/h3&gt;
&lt;p&gt;The &lt;a href="http://www.inta.org/Press/Pages/UnrealCampaign.aspx" rel="nofollow" target="_blank"&gt;International Trademark Association&lt;/a&gt; launched the &lt;a href="http://unrealcampaign.com/" rel="nofollow" target="_blank"&gt;Unreal campaign&lt;/a&gt; to educate teenagers about the economic, health and social risks associated with counterfeiting.&lt;/p&gt;
&lt;p&gt;The campaign uses social media such as video blogs, Facebook, and Pinterest, as well interactive games to engage teenagers.&lt;/p&gt;
&lt;h2&gt;Mobile surveillance devices&lt;/h2&gt;
&lt;p&gt;Private investigators use mobile surveillance, such as pinhole cameras, to covertly record a buy that involves counterfeit goods.&lt;/p&gt;
&lt;p&gt;Once the infringers of intellectual property are identified, a private investigator can pose as a buyer. During a buy, a private investigator video records the counterfeit goods, purchase of the items, and appearance of the infringers.&lt;/p&gt;
&lt;p&gt;This footage can be used as evidence against the infringers in court and can lead to the seizure of counterfeit goods.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;img class="align_right width_25" src="https://s3.amazonaws.com/lawgical/assets/data/2015/original.png" alt="how-technology-is-used-to-prevent-counterfeiting" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Mark Kusic is a private investigator in British Columbia and is president/founder of&amp;nbsp;&lt;a href="http://kusic.ca/" target="_blank"&gt;Kusic and Kusic Private Investigators&amp;nbsp;&lt;/a&gt;in Vancouver, B.C. The firm specializes in anti-counterfeiting, litigation support, brand protection, online investigations, video surveillance, business employee evaluations, and boutique security and executive protection.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Become a guest contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;</content>
    <author>
      <name>Mark Kusic</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/1741</id>
    <published>2013-11-03T00:00:00-06:00</published>
    <updated>2013-11-07T08:38:08-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/1741/things-one-investigator-says-you-should-never-share-online"/>
    <title>Things One Investigator Says You Should Never Share Online</title>
    <summary>Yes, social media has meant the end (thankfully) of dull nights round at your friends’ houses looking at holiday pictures and home videos, but it now gives everyone a window into just what you are doing with your life.</summary>
    <content type="html">&lt;p&gt;10 years ago, if someone you barely knew asked how your holiday was or what the new job is like, you&amp;rsquo;d have either wondered how much you&amp;rsquo;d had to drink last night or alerted the police that you were the latest victim of &lt;a href="http://en.wikipedia.org/wiki/Stalking" target="_blank"&gt;stalking&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/1881/original.png" alt="things-one-investigator-says-you-should-never-share-online" /&gt;&lt;/p&gt;
&lt;p&gt;Yes, social media has meant the end (thankfully) of dull nights round at your friends&amp;rsquo; houses looking at holiday pictures and home videos, but it now gives everyone a window into just what you are doing with your life.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Innocent comments on what you are up to, where you are going, who you have seen and what you might do may all seem like harmless words; but you never know who is reading them.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&amp;ldquo;So what&amp;rsquo;s wrong with that?&amp;rdquo; you may ask.&lt;/p&gt;
&lt;p&gt;Well, innocent comments on what you are up to, where you are going, who you have seen and what you might do may all seem like harmless words; but you never know who is reading them.&lt;/p&gt;
&lt;p&gt;So, before you pour your heart out to someone who you don&amp;rsquo;t know and may have never met, take a minute to think or, better still, remember these simple rules when it comes to the things you should never declare on social media.&lt;/p&gt;
&lt;h2&gt;There&amp;rsquo;s nobody home&lt;/h2&gt;
&lt;p&gt;An obvious one for starters, but any announcements of holidays, trips away or even nights out should be limited. You don&amp;rsquo;t want all and sundry knowing your house is empty &amp;ndash; besides, you&amp;rsquo;ll only ruin the surprise when all those pictures of your trip go up for everyone to see in a few weeks time.&lt;/p&gt;
&lt;h2&gt;That you have just bought something expensive&lt;/h2&gt;
&lt;p&gt;The 21st century version of not leaving packaging for expensive TVs and DVD players outside your home is not bragging about your latest acquisitions on social media. Pictures of new and expensive gadgets, not to mention where they are placed in your home, will work like an online Argos catalogue for any budding thief. Just be content with showing your friends (real ones) when they come round to visit.&lt;/p&gt;
&lt;h2&gt;Incriminating pictures&lt;/h2&gt;
&lt;p&gt;Where to start with this one? Pictures of a big night out can cause so many problems on so many levels. Not only can they land you in a heap of trouble with work (especially if you don&amp;rsquo;t show up the next day), they can also incriminate others. Make sure you check just who is in the background of your pictures and exactly what they are up to before showing them to the world and probably his wife.&lt;/p&gt;
&lt;div class="box_gray width_35 align_right"&gt;
&lt;h3&gt;Facebook and Divorce&lt;/h3&gt;
&lt;p&gt;Facebook was cited as a reason for one-third of divorces in the United Kingdom last year.&lt;/p&gt;
&lt;p&gt;According to one law firm, in the past two years there has been a 50 percent increase in the number of behavior-based divorce petitions containing the word 'Facebook'.&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;The state of your relationship&lt;/h2&gt;
&lt;p&gt;If relationships weren&amp;rsquo;t complicated enough, why feel the need to tell everyone else about them? From a brief office fling to an extramarital affair; anything disclosed on a social networking site will only muddy the waters. And don&amp;rsquo;t think just because you are recently free and single you can shout it all from the rooftops. Evidence gathered from Facebook photos and tell-tale tweets is cropping up more and more when it comes to &lt;a href="http://www.dailymail.co.uk/femail/article-2080398/Facebook-cited-THIRD-divorces.html" target="_blank"&gt;divorce settlements&lt;/a&gt; &amp;ndash; which can often be very costly.&lt;/p&gt;
&lt;h2&gt;What you think of your boss or fellow workers&lt;/h2&gt;
&lt;p&gt;One of the biggest faux pas you can commit in the virtual world of social media is bad mouthing people. But when those people pay your wages or have to work with you things can get very nasty. Even if you&amp;rsquo;ve just left your job, don&amp;rsquo;t even think about venting your dislike for your former employers. Remember - these are the guys who companies will go to when looking for a reference when the time comes to start applying for other positions.&lt;/p&gt;
&lt;h2&gt;That you&amp;rsquo;ve just committed a crime&lt;/h2&gt;
&lt;p&gt;Yes, it does sound ridiculous, but idle comments about breaking the speed limit, sneaking out of a shop without paying or even parking where you shouldn&amp;rsquo;t can all be flagged up and alert the suspicions of those reading your comments &amp;ndash; who might just do something about it.&lt;/p&gt;
&lt;h2&gt;That you are taking a sickie&lt;/h2&gt;
&lt;p&gt;Claiming you are ill in order to take a day off work is risky enough at the best of times, but shared pictures of a day out in the park, in the pub, or even just random comments about the world in general while you&amp;rsquo;re supposed to be at death&amp;rsquo;s door will only make your return to the office that little more awkward when you&amp;rsquo;ve finally &amp;ldquo;recovered.&amp;rdquo;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This helpful piece of content was written by Peter Farrington, Managing Director of &lt;a href="http://www.probeuk.com/" target="_blank"&gt;Probe Investigations&lt;/a&gt; who are commercial investigators and security consultants based in the United Kingdom.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;To find the latest news and reviews from Probe Investigations, you can find them on LinkedIn, Facebook, and Twitter&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Become a Guest Contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;</content>
    <author>
      <name>Peter Farrington</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/1721</id>
    <published>2013-10-07T00:00:00-06:00</published>
    <updated>2019-03-08T13:32:51-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/1721/how-to-stop-online-tracking-and-protect-your-identity"/>
    <title>How to Stop Online Tracking and Protect Your Identity</title>
    <summary>Find out how to opt out of behavioral tracking, how websites are monitoring your browsing habits, and how you can protect your privacy.</summary>
    <content type="html">&lt;p&gt;&lt;em&gt;&lt;strong&gt;Editor's note:&lt;/strong&gt; This article was written by an industry professional and guest contributor. The views and opinions in this article are of the author and do not reflect the views of PInow. If you are interested in becoming a guest contributor, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Technology has become an integral part of our lives, and in most respects, it has enriched our daily existence, helping make the world smaller, more informed and connected. The problem with networked technology, however, is that everything can be tracked down.&lt;/p&gt;
&lt;p&gt;Unbeknownst to some of you, every move you make on some websites is being tracked, recorded, compiled, and used to sell advertising or otherwise finance the sites that we all know and love. Ten years ago, it used to be just static banner ads and basic, yet primitive, website analytics, like things pertaining to visitor count and IP.&lt;/p&gt;
&lt;p&gt;Today, enter the age of behavioral targeting. Every video you view, every website you visit, every game you play on Facebook&amp;mdash;just about anything you do on the web is retrieved and collected. This information is used by advertising companies to relay the most relevant and targeted ads possible. Of course, it makes sense for companies to get the most out of their buck. Again, ten years ago you'd get ads about women's beauty care products served to men or running shoes to paraplegics and all kinds of irrelevant targeting.&lt;/p&gt;
&lt;p&gt;&lt;img class="cms-alignleft" src="https://s3.amazonaws.com/lawgical/assets/data/1847/original.jpg" alt="Online Tracking" /&gt;So, today it seems everybody's happy. Website can serve targeted ads and thus ask advertisers for more money (though in reality, this isn't necessarily the case since the targeting standard has gone up for all kinds of publishers). Advertisers now make a much better return on investment because they now sell to the right people. And users, well, users should happy they get to browse a website for free and have more relevant ads served to them. However, this comes at a certain cost: privacy. If you have no problem with this and care not that your online activity is monitored and then used to make money by a third party, then &lt;em&gt;really&lt;/em&gt; everybody's happy. If you do have a problem with this, know you can do something about it.&lt;/p&gt;
&lt;p&gt;Here are few tips on how to protect your privacy online:&lt;/p&gt;
&lt;h2&gt;Opt out of behavioral tracking&lt;/h2&gt;
&lt;blockquote class="cms-alignright"&gt;
&lt;p&gt;After you opt-out, you will continue to receive ads&amp;mdash;it just means you won't receive ads specifically tailored to your online actions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Luckily, there are regulating bodies that follow and monitor how and what types of ads are getting served on websites. The &lt;a title="http://www.networkadvertising.org/index.asp" href="http://www.networkadvertising.org/index.asp" rel="nofollow" target="_blank"&gt;Network Advertising Initiative&lt;/a&gt; (NAI) is a cooperative of online marketing and analytics companies which claims it offers consumer protection through self-regulation. NAI offers an &lt;a title="http://www.networkadvertising.org/managing/opt_out.asp" href="http://www.networkadvertising.org/managing/opt_out.asp" rel="nofollow" target="_blank"&gt;opt-out tool&lt;/a&gt;, which you can use to scan to see which advertising companies are currently using information gathered from your browsing habits. When I scanned, it took a while&amp;mdash;apparently, 70 advertising networks were using my browsing info. Of important note is after you opt-out, you will continue to receive ads&amp;mdash;it just means you won't receive ads specifically tailored to your online actions.&lt;/p&gt;
&lt;p&gt;&lt;a title="http://www.privacychoice.org/" href="http://www.privacychoice.org/" rel="nofollow" target="_blank"&gt;PrivacyChoice.org&lt;/a&gt; offers a more advanced solution, which includes features like a consolidated opt-out bookmark that opts you out of over one hundred ad networks, including those in the NAI. They also have a great feature, where you can enter the address of your favorite website - say Pinow.com - and it will show you what advertisers use data about your browsing habits on that website.&lt;/p&gt;
&lt;p&gt;If you're genuinely interested in finding out more how websites gather data, &lt;a href="http://www.digitaltrends.com/web/top-100-websites-how-are-they-tracking-you/" rel="nofollow" target="_blank"&gt;Digital Trends&lt;/a&gt; has a fantastic list of the top 100 websites on the web, listing under each website what advertisers are tracking your online behavior and how they do it.&lt;/p&gt;
&lt;h2&gt;Change cookie settings&lt;/h2&gt;
&lt;p&gt;It's a good idea to change your browser's cookies to expire when you exit your browser and disallow third-party cookies from being set. Here's how you do it in Google Chrome:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click the "list" icon in the top right corner of the screen&lt;/li&gt;
&lt;li&gt;Select "Settings"&lt;/li&gt;
&lt;li&gt;Scroll to the bottom and select "Show Advanced Settings."&lt;/li&gt;
&lt;li&gt;Under "Privacy", select "Content Settings"&lt;/li&gt;
&lt;li&gt;Select "Keep local data only until I quit my browser / for current session", and check "Block third-party cookies and site data".&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Use https encryption&lt;/h2&gt;
&lt;p&gt;Many sites on the web offer some limited support for encryption over &lt;a href="https://en.wikipedia.org/wiki/HTTP_Secure" rel="nofollow" target="_blank"&gt;HTTPS&lt;/a&gt;, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. If you want your private conversations with websites not to be snooped on or tampered with by other parties, consider installing a software or browser add-on that encrypts your communications in https on major websites that offer this option. I use &lt;a href="https://www.eff.org/https-everywhere" rel="nofollow" target="_blank"&gt;HTTPS everywhere&lt;/a&gt; - works with Chrome and Firefox.&lt;/p&gt;
&lt;h2&gt;Log out of spy sites and start private browsing&lt;/h2&gt;
&lt;p&gt;This should have been actually at the top of the list, since this is the first step you need to take if you need to surf as private and anonymous possible (there's no such thing as completely anonymous on the Web). You see, even if you aren't browsing websites owned by Google (YouTube, Google search, Gmail, etc.) or Facebook, if you're logged in to one of these services, they can track your moves. Again, even if there aren't any tabs open with these services in your browser, they still can track your moves if you're logged in. Solve this simply by logging out and resetting your cookies.&lt;/p&gt;
&lt;p&gt;Then, be extra safe by surfing the web using private browsing. In Chrome, this is known as "incognito mode" and in Firefox as "private browsing" under settings.&lt;/p&gt;
&lt;p&gt;This is how I keep my browsing safe. It's definitely not 100% foolproof, but at least it gives me a sense of security, false or not. Notice that I didn't list Adblock here. While using it will solve much of your advertising tracking problems, I don't believe it's ethical using it. Most websites make their revenue&amp;mdash;revenue that they use to provide you with awesome content for free&amp;mdash;out of display advertisement. If we'd all use Adblock, then every major, value-providing website would cost money. Think about it.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;About the Author:&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Larry Harrison is a forensic pathologist by training, and one of the founders of &lt;a href="http://www.itsgov.com" target="_blank"&gt;itsGov.com&lt;/a&gt;&amp;mdash;the complete on online forensics science and crime scene investigation network.&lt;/em&gt;&lt;/p&gt;
&lt;h2&gt;Become a guest contributor&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in being a guest contributor or have an article suggestion, please contact us.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;More Information on Cyber Investigations:&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2323/cyber-security-and-the-protection-of-company-data" target="_blank"&gt;Cyber Security and The Protection Of Company Data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/2358/online-investigations-the-deep-and-dark-web" target="_blank"&gt;Online Investigations: The Deep and Dark Web&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/investigations/computer-forensics" target="_blank"&gt;Cellular and Computer Forensics / Cyber Crime Investigation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Larry Harrison</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/1710</id>
    <published>2013-09-21T00:00:00-06:00</published>
    <updated>2018-05-04T13:04:55-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/1710/video-surveillance-camera-use-is-on-the-rise"/>
    <title>Video Surveillance Camera Use is on the Rise</title>
    <summary>Video surveillance continues to rise in frequency and numbers across the globe. Government agencies, institutional organizations and privately-owned corporations are increasing the use of surveillance cameras, and the use of video cameras in private investigations is on the upswing as well.</summary>
    <content type="html">&lt;p&gt;&lt;em&gt;&lt;strong&gt;Editor's note:&lt;/strong&gt; This article was written by an industry professional and guest contributor. The views and opinions in this article are of the author and do not reflect the views of PInow. Before conducting video surveillance, be sure to check the laws in your state. If you are interested in becoming a guest contributor, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;img class="cms-alignright" src="https://s3.amazonaws.com/lawgical/assets/data/1821/original.png" alt="video-surveillance-camera-use-is-on-the-rise" /&gt;Video surveillance continues to rise in frequency and numbers across the globe. Government agencies, institutional organizations and privately-owned corporations are increasing the use of surveillance cameras, and the use of video cameras in private investigations is on the upswing as well.&lt;/p&gt;
&lt;p&gt;A new study by IMS Research finds that tremendous growth is forecast for the wireless infrastructure market in place to support video surveillance applications. With demand for low-priced video surveillance systems coming from China and India, &lt;a href="http://www.imsresearch.com/press-release/CCTV_Tipping_Point_Still_Coming_in_2014_Network_Video_Surveillance_Gear_Sales_to_Surpass_Analog_Next_Year" rel="nofollow" target="_blank"&gt;IMS expects revenues to soar&lt;/a&gt; to $705 million by 2017. That's a 160 percent increase from the nearly $275 million recorded in 2011.&lt;/p&gt;
&lt;p&gt;In the US, video surveillance work is taking shape in a stunning amount of video security cameras in the streets, and low-cost tech gadgets and tools in the hands of private investigators for their surveillance work. As an example of the video camera saturated urban centers in the US now, CNN reports that there are about 4,000 video surveillance security cameras and license plate readers south of Canal Street in Lower Manhattan, NYC. It's part of the overall Lower Manhattan Security Initiative (LMSI), which calculates the number of feeds from open public security cameras, as well as private cameras. These are monitored by the New York police department regularly 24-7.&lt;/p&gt;
&lt;p&gt;For private investigations, video is still a key element in most cases. Armed with small HD video cameras, many private detectives use various covert observation techniques to learn about their subjects.&lt;/p&gt;
&lt;h2&gt;Video Surveillance for PIs&lt;/h2&gt;
&lt;p&gt;Video surveillance work by private investigators initially involves background searches, skip tracing, smart online searching and experienced detective work. Once a plan is set to use video surveillance, the target's actions and activities are monitored via HD video. One PI firm offered up a look at how a typical video surveillance might be set up:&lt;/p&gt;
&lt;h3&gt;1. Use date and time stamps&lt;/h3&gt;
&lt;p&gt;The initial steps should include authenticating your video with a date and time stamp as a starting point. It's essential to know dates and times when using video surveillance.&lt;/p&gt;
&lt;h3&gt;2. Think like a film director&lt;/h3&gt;
&lt;p&gt;Use the video to show the location and position of the surveillance, to capture footage that shows entry and exit roads, busy street intersections and more. Having the coordinates of the stakeout position helps with the video construct.&lt;/p&gt;
&lt;h3&gt;3. Wait and wait&lt;/h3&gt;
&lt;p&gt;For location video surveillance, this could be the hardest part of the role of the private investigator. Staged surveillance operations may involve a different video set up, but waiting for the target to emerge from a house or building can take a lot of waiting. Vigilance is key.&lt;/p&gt;
&lt;h3&gt;4. Follow the target&lt;/h3&gt;
&lt;p&gt;Be prepared to follow in car, by foot, taxis, subways trains or other transportation. Do what it takes to get the video you need, making sure to maintain a steady hand and a professional look.&lt;/p&gt;
&lt;h3&gt;5. Go unnoticed&lt;/h3&gt;
&lt;p&gt;Video surveillance is only as good as the lack of detection. Once the target is aware of a pursuing video camera, the person will likely go to great lengths to maneuver out of the situation.&lt;/p&gt;
&lt;h3&gt;Video Surveillance Laws&lt;/h3&gt;
&lt;p&gt;PIs should keep in mind that video surveillance and video security camera laws vary by state. Always make sure you check with the laws in your county and state before taking on a surveillance case.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Zoe Hudson has a background in law enforcement and weapons. She teaches gun safety courses and enjoys writing about this and other topics. &lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Become a guest contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;More Information on Surveillance Investigations:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/resources/audio-surveillance-laws-by-state" target="_blank"&gt;Audio Surveillance Laws (Party Consent) by State&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/investigations/electronic-surveillance" target="_blank"&gt;Surveillance &amp;amp; Technology: What can investigators do when watching you?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/316/electronic-surveillance-how-is-it-affecting-your-life" target="_blank"&gt;Electronic Surveillance -- How is it affecting your Life?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/298/computer-surveillance-what-does-it-offer" target="_blank"&gt;Computer Surveillance - What Does it Offer?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/296/telephone-surveillance-and-bugging-is-it-legal" target="_blank"&gt;Telephone Surveillance and Bugging - Is it Legal?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/352/follow-that-car-10-mobile-surveillance-tips-for-private-investigators" target="_blank"&gt;Follow that Car: 10 Mobile Surveillance Tips for Private Investigators&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Zoe Hudson</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/1707</id>
    <published>2013-09-11T00:00:00-06:00</published>
    <updated>2013-11-26T11:04:15-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/1707/the-question-of-suicide-equivocal-death-investigations"/>
    <title>The Question of Suicide Equivocal Death Investigations</title>
    <summary>Learn more about equivocal death investigations, the 5 categories of death, common death case reviews, and 10 common questions asked by those who have lost someone to suicide. </summary>
    <content type="html">&lt;p&gt;&lt;em&gt;&lt;strong&gt;Editor's note:&lt;/strong&gt; This article was written by an industry professional and guest contributor. The views and opinions in this article are of the author and do not reflect the views of PInow. If you are interested in becoming a guest contributor, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;From Voltaire, &amp;ldquo;To the living we owe respect. To the dead we owe only the truth.&amp;rdquo; That is the purpose of an Equivocal Death Analysis and Investigation (EDA or EDI); collectively referred to as equivocal death case review. &amp;nbsp;This leaves the possibility of closure for the families impossible, particularly if foul play is suspected, or even an accident. The wrong determination can also result in benefits, such as life insurance or workers&amp;rsquo; compensation, underpaid - or worse, denied.&lt;/p&gt;
&lt;p&gt;First, &lt;strong&gt;what is &amp;lsquo;Equivocal&amp;rsquo;&lt;/strong&gt;? Equivocal is unanswered, or lingering questions.&lt;/p&gt;
&lt;p&gt;Second, &lt;strong&gt;what is the difference between &amp;lsquo;Analysis&amp;rsquo; and &amp;lsquo;Investigation&amp;rsquo;?&lt;/strong&gt; In an analysis the official investigation is reviewed to determine if proper protocols were followed. In an investigation, the official records, reports and photographs are used in conjunction with a new investigation of the physical and circumstantial evidence.&lt;/p&gt;
&lt;div class="box_gray"&gt;
&lt;div class="cols"&gt;
&lt;div class="col_half"&gt;
&lt;h3&gt;Analysis&lt;/h3&gt;
&lt;p&gt;During an analysis the official investigation is reviewed to determine whether proper protocols were followed.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="col_half"&gt;
&lt;h3&gt;Investigation&lt;/h3&gt;
&lt;p&gt;The official records, reports and photographs are used in conjunction with a new investigation of the physical and circumstantial evidence.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;What does it mean to conduct an equivocal death case review (analysis and/or investigation)? If there are errors noted in the Equivocal Death Analysis, an in-depth investigation into the death (Equivocal Death Investigation), is the next stage. Many families need expert help in understanding the circumstances surrounding a loved one&amp;rsquo;s death. The manners of death can be classified as any of the following: homicide, suicide, natural, accident or undetermined. Sometimes the family and loved ones of the deceased individual do not agree with the final determination and have a yearning for more answers.&lt;/p&gt;
&lt;p&gt;First, it is necessary to understand how a death is certified by the coroner or medical examiner&amp;rsquo;s office. There are two components listed on the death certificate. These are Manner of Death and Cause of Death. For example, &amp;ldquo;The manner of death is suicide and the cause of death is ligature strangulation.&amp;rdquo; These statements are concise and follow a standard. The autopsy report and official investigation, if conducted, will provide more detail. It is therefore necessary to understand these components and definitions. The following are adapted from &amp;ldquo;Practical Methods for Legal Investigations: Concepts and Protocols in Civil and Criminal Cases&amp;rdquo; (Feb. 2011, CRC Press, Dean A. Beers, CLI), &amp;ldquo;Death Investigation for Private Investigators&amp;rdquo; (Feb. 2011, Dean A. Beers, CLI and Karen S. Beers, BSW for PIEducation.com).&lt;/p&gt;
&lt;h2&gt;Manner of Death: 5 Categories&lt;/h2&gt;
&lt;p&gt;There are five categories &amp;ndash; Natural, Accident, Suicide, Homicide and Undetermined. The manner of death is by a &amp;lsquo;Preponderance&amp;rsquo; &amp;ndash; it being more likely than not that the death was as officially certified, and not another manner. This question of preponderance is the medicolegal investigation and conclusion, and not a legal or criminal statute conclusion.&lt;/p&gt;
&lt;div class="cols"&gt;
&lt;div class="col_half"&gt;
&lt;div class="align_left" style="background-image: url('https://s3.amazonaws.com/lawgical/assets/data/1809/original.png'); height: 400px; width: 300px;"&gt;
&lt;h3 style="padding-left: 20px; color: black; font-size: 24px; margin-top: 15px; margin-bottom: 0px;"&gt;1. Natural&lt;/h3&gt;
&lt;p style="width: 250px; padding-left: 20px; font-size: 14px; margin-bottom: 5px;"&gt;Deaths caused solely by disease, like heart disease, cancer, etc. If natural death is hastened by injury or any other non-natural event, the manner of death will not be considered natural.&lt;/p&gt;
&lt;p style="padding-left: 20px; width: 250px; font-size: 14px;"&gt;If the disease process is caused by a non-natural event (ex: pneumonia due to long-term bed confinement as a result of a motor vehicle accident) the manner of death will not be considered natural, it will be Accident due to a remote motor vehicle accident.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="col_half"&gt;
&lt;div class="cms-alignleft" style="background-image: url('https://s3.amazonaws.com/lawgical/assets/data/1810/original.png'); height: 400px; width: 300px;"&gt;
&lt;h3 style="padding-left: 20px; color: black; font-size: 24px; margin-top: 15px; margin-bottom: 0px;"&gt;2. Accidental&lt;/h3&gt;
&lt;p style="width: 250px; padding-left: 20px; font-size: 14px; margin-bottom: 5px;"&gt;Deaths other than natural, where there is no evidence of intent; an unintentional event or category of chain of events.&lt;/p&gt;
&lt;p style="width: 250px; padding-left: 20px; font-size: 14px; margin-bottom: 5px;"&gt;Examples may include Motor Vehicle (including vehicular homicide), Drug Overdoses, Drowning, Electrocution, Autoerotic, Acute Alcohol Consumption, Recreational Activities, Plane Crashes, Hypothermia, Workplace, etc.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="cols"&gt;
&lt;div class="col_half"&gt;
&lt;div class="cms-alignleft" style="background-image: url('https://s3.amazonaws.com/lawgical/assets/data/1811/original.png'); height: 400px; width: 300px;"&gt;
&lt;h3 style="padding-left: 20px; color: black; font-size: 24px; margin-top: 15px; margin-bottom: 0px;"&gt;3. Suicide&lt;/h3&gt;
&lt;p style="width: 250px; padding-left: 20px; font-size: 14px; margin-bottom: 5px;"&gt;Death as a purposeful action set in motion (explicit or implicit) to end one&amp;rsquo;s life. It is prejudicial to the investigation to try and determine the decedent&amp;rsquo;s final thoughts; only their final actions can be determined and bear direct relevance. Examples may include Motor Vehicle (including vehicular homicide), Drug Overdoses, Drowning, Electrocution, Acute Alcohol Consumption, Recreational Activities, Plane Crashes, Hypothermia, Workplace, etc. Autoerotic is not.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="col_half"&gt;
&lt;div class="cms-alignleft" style="background-image: url('https://s3.amazonaws.com/lawgical/assets/data/1812/original.png'); height: 400px; width: 300px;"&gt;
&lt;h3 style="padding-left: 20px; color: black; font-size: 24px; margin-top: 15px; margin-bottom: 0px;"&gt;4. Homicide&lt;/h3&gt;
&lt;p style="width: 250px; padding-left: 20px; font-size: 14px; margin-bottom: 5px;"&gt;Death resulting from intentional harm (explicit or implicit) of one person by another, or by grossly reckless behavior. In death investigation, homicide is the medical determination. The legal determination is judicial, and therefore the two may seem inconsistent. Examples may include Motor Vehicle (if there is intentional harm), Drug Overdoses, Drowning, Electrocution, Workplace, etc. &amp;lsquo;Assisted Suicide&amp;rsquo; or &amp;lsquo;Suicide by Cop&amp;rsquo; are not suicide, they are homicide.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="cms-alignleft" style="background-image: url('https://s3.amazonaws.com/lawgical/assets/data/1813/original.png'); height: 400px; width: 300px;"&gt;
&lt;h3 style="padding-left: 20px; color: black; font-size: 24px; margin-top: 15px; margin-bottom: 0px;"&gt;5. Undetermined&lt;/h3&gt;
&lt;p style="width: 250px; padding-left: 20px; font-size: 14px; margin-bottom: 5px;"&gt;This Manner of Death is assigned when there is insufficient evidence or information, especially about intent, to assign another manner. Examples include cases of Sudden Unexplained Infant Death Syndrome (formerly Sudden Infant Death Syndrome), advanced stages of decomposition, skeletal remains, and unknown identification and/or history. This includes when there is no clear medical evidence by the preponderance.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Equivocal death case reviews should include the analysis of all the information the family and loved ones have concerning the decedent, combing through the information step by step to trace the steps in the original investigative process. It may not be possible, but every effort should be made, to answer any questions the family and loved ones has regarding the death, and doing so with an unbiased open mind. Although it is very difficult, it is also important for the family and loved ones to share the same unbiased open minds.&lt;/p&gt;
&lt;p&gt;Reconstructing a death and the investigation will assist the family and loved ones in the healing process. Sometimes minds can get carried away creating numerous scenarios which only adds to lingering questions and distress over a loved one&amp;rsquo;s death. Equivocal death case reviews may help quiet some or even all of those questions so that the family and loved ones may heal and carry on with their lives having been provided some answers to these lingering questions. Life can be stressful and difficult enough without the constant worry surrounding a loved one&amp;rsquo;s death. Many times a professional second opinion regarding whether the investigation was conducted properly in the first place may be enough to ease one&amp;rsquo;s mind.&lt;/p&gt;
&lt;p&gt;The most common equivocal death case reviews involve the official determination v. family belief: Suicide v. Accident, Suicide v. Homicide, Accident v. Suicide, and Accident v. Homicide. It is not often that a ruling of homicide is questioned by the family; however, it must be considered that these investigations and official determinations may also be erroneous. Even less often are those deaths ruled natural that the family believes may be homicide, and to a lesser degree accident or suicide. These often involve cases of potential poisoning or toxicity and the official investigation did not include an autopsy or circumstantially support other than natural. This would include a review of the decedent&amp;rsquo;s medical history and corresponding conclusion as to the cause and manner of death. The most common are those in which suicide is determined and there are associated concerns.&lt;/p&gt;
&lt;div class="cms-box cms-alignleft"&gt;
&lt;h3&gt;Common Equivocal Death Case Reveiws&lt;/h3&gt;
&lt;p&gt;The most common equivocal death case review is Official Determination vs. Family Belief, such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Suicide vs. Accident&lt;/li&gt;
&lt;li&gt;Suicide vs. Homicide&lt;/li&gt;
&lt;li&gt;Accident vs. Suicide&lt;/li&gt;
&lt;li&gt;Accident vs. Homicide&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Reviews frequently surrround concerns surounding suicides.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;In addition to the emotional significance of suicide, that the decedent acted to such a degree as to take their own life, there are also considerations of insurance. Insurance companies may conduct their own investigation, and may reach a different conclusion. Even if there is not an insurance investigation, there may be significant underlying consequences to the official certification of death. Commonly, these may include non-payment of benefits due to a clause involving suicide (complete non-payment or within a specified time period following activation of the policy are common), or there may be a double indemnity clause in which the death is an accident (the policy payout is doubled to the beneficiary). There are also considerations of staged deaths, such as a beneficiary committing a homicide to appear suicide or accident.&lt;/p&gt;
&lt;p&gt;The heaviness that so many questions weigh on a person&amp;rsquo;s mind is one reason a family or loved ones may seek an equivocal death case review. This review offers most people enough information to get the answers they seek to the many questions that linger. This may begin the process of allowing themselves to let go and move on with their own lives. If simply understanding that they did all they could for their loved one, then perhaps their own healing process may begin. Letting go does not mean forgetting that person or their death; it simply allows them to calm their internal emotions and begin a path towards closure.&lt;/p&gt;
&lt;p&gt;&lt;img class="cms-alignright" src="https://s3.amazonaws.com/lawgical/assets/data/1808/original.jpg" alt="the-question-of-suicide-equivocal-death-investigations" /&gt;One unintended consequence of suicide is that when there are so many questions, which only the decedent can answer, the person experiencing these questions will sometimes become obsessed, and the questions are played over and over again in their minds. This wears that person down, which can cause anxiety, depression, and an abundance of anger and sadness to the point that the person with the lingering questions becomes compromised in their own physical and emotional health. Once the questions are answered, the person&amp;rsquo;s mind will quiet down, and then acceptance will simply calm their internal emotions and begin a path towards closure.&lt;/p&gt;
&lt;p&gt;Sometimes a person may not have specific questions, yet they have doubt about some issues surrounding a death. With an equivocal death case review, these doubts can either be put to rest, or confirmed. If the doubts are put to rest, again, it eases the mind and allows that person to continue on with their life. If the review supports their doubt or suspicions, then a full equivocal death investigation may be necessary to confirm these doubts or suspicions.&lt;/p&gt;
&lt;p&gt;In most deaths, there is no error in the official ruling &amp;ndash; including those not autopsied. However, the likelihood of error may occur when there is no autopsy. Similarly, it is likely the initial investigation was in fact performed properly from the beginning. However, in cases of concern &amp;ndash; flags being raised &amp;ndash; is most often when there is no autopsy and the official investigation appears erroneous. Due to the abundance of &amp;lsquo;crime&amp;rsquo; and &amp;lsquo;CSI&amp;rsquo; television shows, the appearance of erroneous investigations has increased. Families must have closure, and an equivocal death case review (analysis and/or investigation) may save time and emotional energy &amp;ndash; beginning the process of closure and preserving emotional well-being.&lt;/p&gt;
&lt;blockquote class="cms-alignright"&gt;
&lt;p&gt;It may not be possible, but every effort should be made, to answer any questions the family and loved ones has regarding the death, and doing so with an unbiased open mind.&lt;/p&gt;
&lt;small&gt;Dean A. Beers, CLI, CCDI&lt;/small&gt;&lt;/blockquote&gt;
&lt;p&gt;There is nothing more satisfying than hearing, &amp;ldquo;Thank you, I can now sleep at night&amp;rdquo;, or &amp;ldquo;Thank you, I feel at peace now&amp;rdquo;. These statements are simply because the lingering questions have finally been understood. So the answer to who needs an equivocal death case review is anyone with any lingering questions surrounding the death of a loved one. Suicide, cases in which our agency is predominantly consulted by families &amp;ndash; including private investigators and attorneys representing families), is high. There are signs and indications of suicidal ideation, and actions that can be taken to save a life.&lt;/p&gt;
&lt;p&gt;This article continues below. In the next part, information on the signs and interventions of suicidal ideation.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/1807/original.jpg" alt="the-question-of-suicide-equivocal-death-investigations" /&gt;&lt;/p&gt;
&lt;p&gt;Life can be extremely hard on us, and unexpected deaths &amp;ndash; especially traumatic and suicides &amp;ndash; can be more difficult to accept and cope with &amp;ndash; closure. There can be several triggering events leading to suicidal ideation and attempts &amp;ndash; from personal to work, from relationships to friendships. Holidays, often a joyous time, become burdensome and some people still have a hard time coping with the letdown, the bills, and the broken relationships. While some people look to the future on a positive note, others see only dread and feel overwhelmed with the sense of &amp;ldquo;here we go again&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;Many people know how burdensome life can be; many have struggled with depression and the feelings of despair. While most people are able to seek the help they need, others feel the help just isn&amp;rsquo;t there, and nobody would understand them anyway.&lt;/p&gt;
&lt;p&gt;Suicide has no boundaries and it does not matter what age, race, ethnicity, sex gender, sexual orientation, career status, monetary status or where you live; it can strike at any given moment. Those who believe suicide affects only certain types of people are misinformed, if informed at all, or are avoiding truth and reality.&lt;/p&gt;
&lt;p&gt;The top ten repeated statements and questions, and bringing rise to an equivocal death case review, are:&lt;/p&gt;
&lt;blockquote class="cms-alignright"&gt;
&lt;p&gt;Sometimes the death of a loved one leaves behind many unanswered questions. Helping clients understand the investigative process, answer questions to help ease their minds are the main goals of a death analysis. Helping clients with lingering issues surrounding a loved one&amp;rsquo;s death is difficult yet necessary to assist in resolving issues that can sometimes take years. Hearing the words, "Thank you, you have helped me to understand" whatever questions they may have had tucked inside their minds is very rewarding.&lt;/p&gt;
&lt;small&gt;Karen Beers, BSW, CCDI&lt;/small&gt;&lt;/blockquote&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;They didn&amp;rsquo;t leave a note, so they couldn&amp;rsquo;t have committed suicide.&lt;/strong&gt; The consistency is that a suicide note is rarely left behind. Sometimes even when a note is left behind, the questions are still unanswered.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They never mentioned suicide, so they couldn&amp;rsquo;t have committed suicide.&lt;/strong&gt; Or they did mention suicide and we talked it through. The consistency is some people will never mention suicide, while others will mention it here and there and still others talk about suicide, which may seem like too much to be taken seriously.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They were so happy; it was one of the best days so they couldn&amp;rsquo;t have committed suicide.&lt;/strong&gt; The consistency is that perhaps once the person has made this final decision, they no longer feel the depression, they feel relieved, and they are literally happy because they are not struggling with inner turmoil any longer.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They couldn&amp;rsquo;t have committed suicide there was a new baby in the family.&lt;/strong&gt; The consistency is that although a person may love that new family member, it brings on added stress from many aspects, maybe they were not ready for this new baby and everything might be too overwhelming for that person.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They couldn&amp;rsquo;t have committed suicide they just got a new job.&lt;/strong&gt; The consistency is getting a new job in the scheme of overwhelming life issues is not that important. Perhaps they felt pressured to take this job, when that job was not one they were truly interested in.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They couldn&amp;rsquo;t have committed suicide they just started a new relationship with a great person.&lt;/strong&gt; The consistency is although they have begun a new relationship; they may still be feeling the effects of a past relationship and cannot cope no matter who walks into their life.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They couldn&amp;rsquo;t have committed suicide they just bought a new car or new furniture, or some new gadget of some sort.&lt;/strong&gt; The consistency is, perhaps they bought the new item in hopes of cheering themselves up, when it just became another costly burden.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They couldn&amp;rsquo;t have committed suicide they had no drugs or alcohol in their system.&lt;/strong&gt; The consistency is perhaps they wanted to make a decision being free from any effects of drugs or alcohol. However, not everyone is under these influences when they have committed suicide.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They couldn&amp;rsquo;t have committed suicide they just received a clean bill of health from their doctor.&lt;/strong&gt; The consistency is, although the doctor gave the person a stamped physical healthy card, the doctor cannot know if the person is suffering from any sort of mental disparity unless the patient tells them. Being healthy does not stop someone from committing suicide.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They couldn&amp;rsquo;t have committed suicide they were financially stable and had no reason to commit suicide.&lt;/strong&gt; The consistency is, it does not matter how much money a person does or does not have. It is the struggles and stressors that come with having money or a lack financial stability. It seems to ring true that &amp;ldquo;money can&amp;rsquo;t buy happiness&amp;rdquo;.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;This list continues with as much variety as the background of the decedent, circumstances of the death and emotions of the family and loved ones. Some of the resources listed below may have similar or different misconceptions, which only demonstrates just how broad the spectrum is and how there are no definite answers to this problem.&lt;/p&gt;
&lt;p&gt;Suicide has long been epidemic and prevention is primarily through education and being alert to ourselves and those around us. When alerted and aware of the suicidal ideations of another, let them vent and do this with patience and sincerity. Contrary to what people might believe, a person can detect whether you are truly listening to them, or whether you are just sitting there pretending. Make it a point to truly listen to people, you never know how important just &amp;ldquo;listening&amp;rdquo; might be to another human being. If someone you know ever mentions anything surrounding suicidal thoughts, talk to them about it, offer them some resource options, and perhaps even offer to go with them to their physician. Ignoring the situation will not make it go away, and these days there is no topic that is considered &amp;ldquo;taboo&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;If you or someone you know has been affected by someone having committed to suicide, do not blame the living, whether it is yourself or someone else. The devastation left behind after someone commits suicide is horrific enough without adding unnecessary fault finding.&lt;/p&gt;
&lt;div class="cms-box cms-alignright" style="width: 410px;"&gt;
&lt;p&gt;&lt;strong&gt;Here are some suggested resources that may be helpful:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;http://www.suicidepreventionlifeline.org/&lt;br /&gt;http://www.afsp.org/&lt;br /&gt;http://www.nimh.nih.gov/health/topics/suicide-prevention/index.shtml&lt;br /&gt;http://www.mentalhealth.va.gov/suicide_prevention/&lt;br /&gt;http://www.save.org/&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Unfortunately the responsibility lies upon the shoulders of the person who chose to take their own life and what ifs and whys will not change that final act. We have to find peace within ourselves, and that can sometimes take years, as with any death.&lt;/p&gt;
&lt;p&gt;If you or someone you know could benefit from this information we ask that you please pass it on, you might just save a life.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Authors&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Dean A. Beers, CLI, CCDI and Karen S. Beers, BSW, CCDI are both Colorado Licensed Private Investigators and Certified Criminal Defense Investigators, and certified in Medicolegal Death Investigations to include as a forensic autopsy assistants; together they co-developed &lt;a href="http://www.medicolegaldeathinvestigations.com/" target="_blank"&gt;Death Investigation for Private Investigators&lt;/a&gt; online continuing education for 14 states and for PIeducation.com. Dean formed the agency in 1987 and focused on general investigations, as well as individual locates, backgrounds and assets and liabilities. Karen began in 1996, gaining knowledge and experience in the same areas. &lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Become a guest contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;</content>
    <author>
      <name>Dean and Karen Beers</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/1682</id>
    <published>2013-07-28T00:00:00-06:00</published>
    <updated>2019-03-08T13:25:26-07:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/1682/mobile-identity-theft-statistics-and-prevention-tips"/>
    <title>Mobile Identity Theft: Statistics and Prevention Tips</title>
    <summary>Mobile identity theft is one of the fastest growing types of identity theft due to the prevalence of mobile devices such as smartphones and tablets. With over one billion smartphones being used globally and research predicting this number will double by 2015, the soaring sales of mobile devices come at a time when identity theft is at an all-time high.</summary>
    <content type="html">&lt;p&gt;&lt;em&gt;&lt;strong&gt;Editor's note:&lt;/strong&gt; This article was written by an industry professional and guest contributor. The views and opinions in this article are of the author and do not reflect the views of PInow. If you are interested in becoming a guest contributor, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;div class="cms-box cms-alignright" style="width: 332px;"&gt;
&lt;h3&gt;&lt;img class="cms-alignleft" style="margin-top: 0px; width: 85px;" src="https://s3.amazonaws.com/lawgical/assets/data/1738/feature.jpg" alt="3 seconds - Clock" /&gt;Scary Statistic:&lt;/h3&gt;
&lt;p&gt;In 2012, a new person became a victim of identity theft every three seconds.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Mobile identity theft is one of the fastest growing types of identity theft due to the prevalence of mobile devices such as smartphones and tablets. With over one billion smartphones being used globally and research predicting this number will double by 2015, the soaring sales of mobile devices come at a time when identity theft is at an all-time high.&lt;/p&gt;
&lt;p&gt;There was one victim of identity theft every three seconds in the U.S. in 2012, totaling 12.6 million consumers&amp;mdash;an increase of over one million victims compared to the previous year and accounting for more than $21 billion, according to Javelin Strategy &amp;amp; Research&amp;rsquo;s 2013 Identity Fraud Report. These numbers are expected to rise, especially as our use of mobile devices continues to increase.&lt;/p&gt;
&lt;h2&gt;Preventing Mobile Identity Theft&lt;/h2&gt;
&lt;p&gt;Whether it&amp;rsquo;s for email, instant messaging, surfing the web, shopping online, paying bills, or even banking, we store and share an immense amount of personal data on our mobile devices. Unless steps are taken to protect it, this data is vulnerable to identity thieves who want to use it to create fake identities and steal money.&lt;/p&gt;
&lt;p&gt;Other than being convenient to use everywhere we go, it&amp;rsquo;s important to remember that smartphones are no different than desktops or laptop computers when it comes to hackers, viruses, malware, and spyware. Their apps and mobile browsers enable us to store personal information such as passwords, credit card numbers, and bank account data in addition to our contacts and other sensitive information. When this data is breached, however, the resulting identity theft can have severe and long-lasting consequences.&lt;/p&gt;
&lt;div class="cms-alignright cms-box"&gt;
&lt;h3&gt;Tip:&lt;/h3&gt;
&lt;p&gt;Make sure you are shopping on secure websites by verifying that the &amp;ldquo;s&amp;rdquo; is in the &lt;strong&gt;&amp;ldquo;https://&amp;rdquo;&lt;/strong&gt; in the address bar. Websites using &lt;strong&gt;&amp;ldquo;http://&amp;rdquo;&lt;/strong&gt; at the beginning of the website address are unsecure.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Fortunately, there are many actions you can take to secure your hand-held devices and avoid mobile identity theft. Here are a few tips:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Create a strong password that is required to unlock your phone and access data. Make sure to set up the phone to automatically lock when it has not been used for a specified period of time.&lt;/li&gt;
&lt;li&gt;Never share sensitive data such as passwords or credit card numbers over an unsecured Wi-Fi connection. Even something as simple as purchasing movie tickets on an iPhone using a public Wi-Fi network can give a nearby hacker the opportunity to steal your data and use it to create a fake identity.&lt;/li&gt;
&lt;li&gt;Carefully review your phone bills for sudden increases in data usage. You also want to be on the lookout for charges from third-party content providers for services and apps you haven&amp;rsquo;t authorized. These can be signs that your phone has been hacked and puts you at risk for mobile identity theft.&lt;/li&gt;
&lt;li&gt;Keep your operating system and apps up-to-date. These updates are important for keeping your smartphone or tablet current with all of the latest security enhancements.&lt;/li&gt;
Make sure you are shopping on secure websites by verifying that the &amp;ldquo;s&amp;rdquo; is in the &amp;ldquo;https://&amp;rdquo; in the address bar. Websites using &amp;ldquo;http://&amp;rdquo; at the beginning of the website address are unsecure.&lt;/ul&gt;
&lt;h2&gt;&lt;img class="cms-alignleft" src="https://s3.amazonaws.com/lawgical/assets/data/1737/original.jpg" alt="Mobile Security" width="300" /&gt;Professional Offices and Mobile Identity Theft&lt;/h2&gt;
&lt;p&gt;When trusted professionals or businesses use mobile devices to share information with clients, the same types of mobile identity theft are possible. Take, for example, healthcare professionals. Over 80 percent of physicians polled in an ABA Health survey revealed that they have used personal mobile devices to access the protected health information of their patients. This puts their patients at risk for mobile medical identity theft even when patients haven&amp;rsquo;t done anything to put their own identity in jeopardy.&lt;/p&gt;
&lt;p&gt;Healthcare professionals can help secure medical records on mobile devices by creating passwords to authenticate access to patient information, and never sharing data over an unsecured Wi-Fi connection.&lt;/p&gt;
&lt;h2&gt;Mobile Identity Theft Protection Services&lt;/h2&gt;
&lt;p&gt;In spite of all the safeguards you put in place, hackers will always try to stay one step ahead of you and the available technology. Unfortunately, it&amp;rsquo;s not a matter of &amp;ldquo;if&amp;rdquo; but &amp;ldquo;when&amp;rdquo; your identity will be compromised. When it happens to you, don&amp;rsquo;t be caught without a mobile identity theft prevention plan.&lt;/p&gt;
&lt;p&gt;There are a number of free mobile identity theft services, such as AVG, that offer anti-virus plans for mobile devices. Phones can be locked and located remotely, suspicious calls or text messages can be blocked, and widgets can detect questionable website activity.&lt;/p&gt;
&lt;p&gt;The best identity theft protection service on the market is ID Theft Solutions. Managed by law enforcement professionals, ID Theft Solutions is the most comprehensive way to ensure your identity is recovered when it is stolen.&lt;/p&gt;
&lt;p&gt;Learn more about preventing mobile identity theft by visiting &lt;a href="http://www.theidentityadvocate.com/index.php" target="_blank"&gt;The Identity Advocate&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;img class="cms-alignright" src="https://s3.amazonaws.com/lawgical/assets/data/1734/original.jpg" alt="Linda Vincent" width="100" /&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;The Identity Advocate is committed to providing unparalleled education, consulting, resources, and investigations to help prevent identity theft, medical ID theft, and healthcare fraud.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The Identity Advocate approaches these challenges with a unique perspective. Lead consultant Linda Vincent, R.N., P.I., an identity theft, medical ID theft, and healthcare fraud prevention expert, has over 35 years of experience. As a registered nurse, private investigator, and healthcare consultant, Ms. Vincent is passionate about helping individuals and businesses prevent theft and fraud. Her experience includes hospital and physician audits, managed care consulting, and healthcare fraud education, training, investigations, negotiations, and case review.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Call The Identity Advocate at 310.831.4400 or email info@theidentityadvocate.com for more information.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Become a guest contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;</content>
    <author>
      <name>Linda Vincent</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/1659</id>
    <published>2013-06-13T00:00:00-06:00</published>
    <updated>2019-03-14T13:25:06-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/1659/the-story-of-an-unlikely-private-investigator"/>
    <title>The Story of an Unlikely Private Investigator</title>
    <summary>C.J. Scheidegger, a private investigator based in Arizona, shares his story of what led him to a career as a PI and how his special circumstances can make his job easier. </summary>
    <content type="html">&lt;p&gt;&lt;em&gt;&lt;strong&gt;Editor's note:&lt;/strong&gt;&amp;nbsp;This article was written by an industry professional and guest contributor.&amp;nbsp;The views and opinions in this article are of the author and do not necessarily reflect the views of PInow.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;When asked to write an article about myself the first thing I did was ask myself a question: where do I start? Let&amp;rsquo;s first start with my background. I have over seventeen years in doing research and skip tracing. I was the go-to person for tracking down those who didn&amp;rsquo;t want to be tracked down. I mostly did my skip tracing for collection agencies. I then spent seven-years investigating businesses and corporations doing research and skip tracing on the owners and any other parties involved.&lt;/p&gt;
&lt;p&gt;After that, I decided it was time for a change. I had some health problems and needed to take some time off for recovery. During this time I went back to college and decided I would get a degree in Paralegal Studies. So, two and half years later I graduated from Pima Community College in Tucson, Arizona. I graduated with the highest honors Phi Theta Kappa. While I was in school, I volunteered and worked at the Pima County Attorney&amp;rsquo;s Office (PCAO). I spent the majority of my time in the Special Victims Unit.&lt;/p&gt;
&lt;blockquote class="cms-alignleft"&gt;
&lt;p&gt;My special circumstances help with surveillance because no one suspects that I am a PI and I can pretty much go up to my subject and film them and they don&amp;rsquo;t suspect a thing.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Before I graduated I decided I needed to make a decision: what was I going to do? Since I was almost done with school I needed to decide where I was going to work. At first, I was thinking about working full-time with PCAO. However, during final summer classes I decided I would rather work for myself than someone else, I figured this was the best time in my life to start my own business.&lt;/p&gt;
&lt;p&gt;So, before I decided to take this venture, I talked with a good friend from school, Harvey Morris, who has owned several successful businesses. It was during one of our several conversations that we both felt with our background and schooling--he was also in the paralegal program with me--that a private investigators business would be perfect.&lt;/p&gt;
&lt;p&gt;Several months later it was decided that I would start the business alone, with my friend giving me free consulting. I was nervous, scared, and excited all-in-one, but ready to take this plunge. This takes us up to the summer of 2012. I started the paperwork needed to get my business license, my EIN, and, of course, my license. By October 2012 I had my approval for my license and all the necessary paperwork to be in business.&lt;/p&gt;
&lt;p&gt;Since getting things going, I have decided that my specialties are research, skip tracing, and surveillance. I have found that with my special circumstances, surveillance has been quite easy.&lt;/p&gt;
&lt;p&gt;Now I am sure you're asking yourself &lt;strong&gt;&amp;ldquo;what does he mean by &amp;lsquo;special circumstance&amp;rsquo; and what&amp;rsquo;s so special about this guy?&amp;rdquo;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img class="cms-alignright" src="https://s3.amazonaws.com/lawgical/assets/data/1622/original.jpg" alt="the-story-of-an-unlikely-private-investigator" width="400" /&gt;Well, I was asked to write this article and tell you about me &amp;ldquo;The Unlikely PI.&amp;rdquo; Why am I the Unlikely PI; well I was born with Spinal Bifida. For those that don&amp;rsquo;t know what that is, it&amp;rsquo;s a birth defect that affects the spinal cord. Each case is different, but in my case, I can&amp;rsquo;t walk. I use crutches only to put my wheelchair in the back of my vehicle and to get up to the driver seat. I have hand controls so I can drive and use a wheelchair to get from point A to point B.&lt;/p&gt;
&lt;p&gt;My special circumstances help with surveillance because no one suspects that I am a PI and I can pretty much go up to my subject and film them and they don&amp;rsquo;t suspect a thing.&lt;/p&gt;
&lt;p&gt;My background has helped me go into the PI industry, especially when it comes to doing research and skip tracing. I have even had other PIs in North Carolina turn to me to help. Now since I am a new company, things are still a little slow, but I am enjoying my new found career.&lt;/p&gt;
&lt;p&gt;The one thing I want any reader to understand is the fact to never judge someone from their cover. Just because someone may be in a wheelchair, doesn&amp;rsquo;t mean they can&amp;rsquo;t do the job necessary.&lt;/p&gt;
&lt;blockquote class="cms-alignleft"&gt;
&lt;p&gt;The one thing I want any reader to understand is the fact to never judge someone from their cover. Just because someone may be in a wheelchair, doesn&amp;rsquo;t mean they can&amp;rsquo;t do the job necessary.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&amp;ldquo;The Unlikely PI,&amp;rdquo; is a segment that I created on YouTube. I created for two main reasons. The first one, of course, is to try and generate activity to my website and the second one is to bring to light some issues that those of us that are handicapped deal with on a daily basis. I did this because a lot of people try to be cognitive about the disable, however, they offer help in areas that most of the time we don&amp;rsquo;t need it. These same people then go and do something that hinders or makes things harder for us.&lt;/p&gt;
&lt;p&gt;When writing this, I tried to think of questions asked of when since considering starting this business and when someone finds out that I am a PI. Some additional questions that I am asked:&lt;/p&gt;
&lt;h3&gt;Don&amp;rsquo;t you fear for your safety?&lt;/h3&gt;
&lt;p&gt;Well, I think at any point that any PI fears for their safety. This industry can be dangerous at times and I would be lying if I said that there was never a time that I have felt fear doing my job. It&amp;rsquo;s because of the dangers that this job has that I do carry a concealed weapon and continue to make sure I go to the range regularly to make sure I am prepared to use it.&lt;/p&gt;
&lt;h3&gt;What if you have to protect yourself from someone trying attack you?&lt;/h3&gt;
&lt;p&gt;This question is similar to the one above, however, it differs. People often look at those that are disabled as helpless, so it is not surprising that they think that we can't take care of ourselves. With this said, we are thankful when the public offers assistance, but understand, the majority of us can drive, go grocery shopping, open doors, and if need be we can protect ourselves. I have taken karate classes and if someone does try to attack me, I can fend for myself. With this said, I hope to not be in that position and never have to pull my gun. However, if I have to, I am not afraid to fight or use my weapon.&lt;/p&gt;
&lt;blockquote class="cms-alignright"&gt;
&lt;p&gt;When I decided to start my own business as a PI, in a sense I was finally living out my dream job.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Why a Private Investigator?&lt;/h3&gt;
&lt;p&gt;This question is one I never know how to answer. Why does one end up doing what they do? Some people just love what they do and do it. Others, like me, just fall into it. Becoming a private investigator in some ways was always a childhood dream. We all grew up watching or reading about a famous PI. As for me, there was Magnum PI and of course the famous Sherlock Holmes. So when I decided to start my own business as a PI, in a sense I was finally living out my dream job.&lt;/p&gt;
&lt;h3&gt;One of the most asked questions that I am asked, why would I need a private investigator?&lt;/h3&gt;
&lt;p&gt;Most of the general public considers the PI the guy lurking in the dark spying on a possible infidelity case. Yes, some of us PIs do follow the possible cheating spouse. However, there is a lot more we can offer the general public. We can investigate a child custody case, where we can follow and watch the actions of the other spouse with the children. Maybe you think that a spouse or someone that spends time around your children may be doing something wrong; we can watch and document the actions of that person. PIs are a big help in missing children cases. In child custody or where they may be a civil judgment, a PI can follow a subject to find out and document where that subject is working. Say, maybe you need a long lost family member or school friend found, a PI can be of great help in a case like this; I had a case where a person had a stepbrother growing up, lost contact because of a divorce, and my client wanted to reach out and make contact with the stepbrother. I was able to use the information they had and make that happen. I guess my point is that there is a lot that we can do to assist the general public when and where it's needed. We don't just sit in the dark watching cheating spouses, and even though those cases can be interesting at times, mostly it is boring.&lt;/p&gt;
&lt;p&gt;For more information, feel free to call me or check out the two completed videos on YouTube under &amp;ldquo;The Unlikely PI.&amp;rdquo; Thank you.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;C.J. Scheidegger is the Owner and Lead Investigator with &lt;a href="https://gopropi.com/" rel="nofollow" target="_blank"&gt;Pro PI, LLC&lt;/a&gt;, serving Tucson, AZ, and the surrounding cities, even the Phoenix area. Pro PI, LLC specializes in research, skip tracing and surveillance. They also do background checks and any other needs you may have.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Become a guest contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, send an email to submissions@pinow.com.&lt;/em&gt;&lt;/p&gt;</content>
    <author>
      <name>C.J. Scheidegger</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/1666</id>
    <published>2013-06-12T00:00:00-06:00</published>
    <updated>2018-05-04T13:39:45-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/1666/the-difference-between-soft-and-hard-insurance-fraud"/>
    <title>The Difference Between Soft and Hard Insurance Fraud</title>
    <summary>There are two different types of insurance fraud: soft insurance fraud and hard insurance fraud. Soft insurance fraud is opportunistic of an otherwise legitimate claim, while hard insurance fraud is schemed.</summary>
    <content type="html">&lt;p&gt;&lt;em&gt;&lt;strong&gt;Editor's note:&lt;/strong&gt;&amp;nbsp;This article was written by an industry professional and guest contributor.&amp;nbsp;The views and opinions in this article are of the author and do not reflect the views of PInow.&amp;nbsp;If you are interested in becoming a guest contributor please email submission@pinow.com.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;div class="cms-box cms-alignright"&gt;&lt;center&gt;
&lt;h3&gt;Insurance Fraud Statistics&lt;/h3&gt;
&lt;/center&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;The total cost of insurance fraud is $40 billion per year&lt;/li&gt;
&lt;li&gt;Insurance fraud costs the average U.S. family $400-$700 per year in increased premiums.&lt;/li&gt;
&lt;li&gt;4% of the money the insurance industry makes is lost to insurance fraud.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Insurance Fraud&lt;/h3&gt;
&lt;p&gt;It&amp;rsquo;s easy to see huge insurance corporations as entities that cannot be hurt. What're a few thousand dollars to a company that has billions of dollars in assets?&lt;/p&gt;
&lt;p&gt;That&amp;rsquo;s how so much &lt;a href="http://www.pinow.com/investigations/insurance-fraud" target="_blank"&gt;insurance fraud&lt;/a&gt; begins. It might not be the initial thought when coming up with a plan, but it&amp;rsquo;s certainly the rationalization behind it. The words &amp;ldquo;victimless crime&amp;rdquo; get thrown around, but it&amp;rsquo;s actually far from true.&lt;/p&gt;
&lt;p&gt;Insurance fraud is stealing. Simply put, insurance fraud is lying for the purpose of getting more money from an insurance company, whether it is auto insurance, life insurance, or any other kind of insurance.&lt;/p&gt;
&lt;p&gt;On a deeper level, insurance fraud is tricking an insurance company into thinking that they owe you more than they really do either by exploiting a situation that has risen organically or by creating situations that you can milk for the insurance money.&lt;/p&gt;
&lt;p&gt;There are two different types of insurance fraud: soft insurance fraud and hard insurance fraud.&lt;/p&gt;
&lt;hr /&gt;
&lt;div class="cms-box cms-alignright"&gt;&lt;center&gt;
&lt;p&gt;&lt;strong&gt;Soft Insurance Fraud:&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;Opportunistic of legitimate claim&lt;/em&gt;&lt;/p&gt;
&lt;/center&gt;&lt;hr style="height: 10px; margin-bottom: 10px;" /&gt;
&lt;ul&gt;
&lt;li&gt;Claiming your injuries are more severe than they are&lt;/li&gt;
&lt;li&gt;Claiming stolen property is worth more than it is&lt;/li&gt;
&lt;li&gt;Exaggerating claims that would otherwise be legitimate&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Soft Insurance Fraud&lt;/h3&gt;
&lt;p&gt;Soft fraud is usually unplanned and arises when the opportunity presents itself. It is the significantly more prevalent form of fraud. An example of this type of fraud would be getting into a car accident and claiming your injuries are worse than they really are, getting you a bigger settlement than you would get if you were telling the truth about your injuries.&lt;/p&gt;
&lt;p&gt;Another example of soft fraud would be claiming you had very expensive art that was destroyed when your home was burglarized. In reality, your home was burglarized but your art collection really consisted of prints. This would be significantly more difficult to do because most insurance companies ask for proof of big-ticket items.&lt;/p&gt;
&lt;hr /&gt;
&lt;div class="cms-box cms-alignright"&gt;&lt;center&gt;
&lt;p&gt;&lt;strong&gt;Hard Insurance Fraud:&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;Premeditated, planned, deliberate&lt;/em&gt;&lt;/p&gt;
&lt;/center&gt;&lt;hr style="height: 10px; margin-bottom: 10px;" /&gt;
&lt;ul&gt;
&lt;li&gt;Slamming on your breaks with the intention of causing a car accident&lt;/li&gt;
&lt;li&gt;Developing a scheme to create the need for an insurance claim (i.e. arson)&lt;/li&gt;
&lt;li&gt;Faking a death to collect life insurance&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Hard Insurance Fraud&lt;/h3&gt;
&lt;p&gt;Hard fraud takes planning, scheming, and maybe even someone on the inside to help you get money from an insurance company. An example of hard fraud would be getting into an accident on purpose so that you can claim the insurance money. This example is fairly prevalent lately; someone hits the brakes so that the person behind them can&amp;rsquo;t stop quickly enough.&lt;/p&gt;
&lt;p&gt;Another really severe form of hard fraud would be faking your own death for the life insurance death benefit. You would definitely need somebody&amp;rsquo;s help to pull that one off.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Insurance Fraud Statistics and Repercussions&lt;/h3&gt;
&lt;p&gt;According to the &lt;a href="http://www.fbi.gov/stats-services/publications/insurance-fraud" rel="nofollow" target="_blank"&gt;FBI insurance fraud division&lt;/a&gt; website, &amp;ldquo;The total cost of insurance fraud (non-health insurance) is estimated to be more than $40 billion per year. That means Insurance Fraud costs the average U.S. family between $400 and $700 per year in the form of increased premiums.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;The FBI states that insurance is a $1 trillion industry annually. This means that 4% of the money that the insurance industry makes is lost to insurance fraud.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/1657/original.jpg" alt="the-difference-between-soft-and-hard-insurance-fraud" /&gt;&lt;/p&gt;
&lt;p&gt;You may think that insurance companies will just lose the money and that will be it, but they need to combat this loss by hiring and expanding a fraud department which is expensive. The only way to&amp;nbsp;make up the money from all of this money loss is to raise prices.&lt;/p&gt;
&lt;p&gt;Ultimately, fraud hurts the consumer much more than it hurts the insurance companies. They can increase their prices all they want. People will still need insurance even if it&amp;rsquo;s more expensive; they will just have to pay the higher price because of fraud.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;More information: &lt;a href="http://www.pinow.com/investigations/insurance-fraud" target="_blank"&gt;Insurance Fraud&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Tatyana Levin is a personal finance enthusiast and blogger, writing for the website &lt;a href="http://insureyes.com/" rel="nofollow" target="_blank"&gt; InsureYes.com&lt;/a&gt;. She is dedicated to helping people understand all types of financial issues and misconceptions.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Become a guest contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, please contact us.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;More Information about Insurance Fraud Investigations:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/investigations/insurance-fraud" target="_blank"&gt;Insurance Fraud Investigation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/305/insurers-on-the-alert-for-false-claims-turn-to-private-investigators" target="_blank"&gt;Insurers on the Alert for False Claims Turn to Private Investigators&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Tatyana Levin</name>
    </author>
  </entry>
  <entry>
    <id>tag:cms.lawgical.com,2011:Article/1475</id>
    <published>2013-04-23T00:00:00-06:00</published>
    <updated>2018-05-04T12:16:05-06:00</updated>
    <link rel="alternate" type="text/html" href="http://www.pinow.com/articles/1475/how-to-keep-your-smartphone-secure"/>
    <title>How to Keep Your Smartphone Secure</title>
    <summary>While many individuals focus on their computers secure, they often forget about the importance of smartphone security. In this article, guest contributor Kelly Cory shares her tips on how to keep your smartphone secure.</summary>
    <content type="html">&lt;p&gt;&lt;em&gt;&lt;strong&gt;Editor's note:&lt;/strong&gt;&amp;nbsp;This article was written by an industry professional and guest contributor.&amp;nbsp;The views and opinions in this article are of the author and do not reflect the views of PInow. Any recommendations and tips should not be construed as legal or professional advice.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In today&amp;rsquo;s technology landscape, people are becoming increasingly aware of security issues. It has almost become second nature for people to understand the importance of keeping their computers and laptops safe from unauthorized access and malicious attacks. In recent years, the advent of the smartphone has taken center stage as people have been enticed by the convenience of having all the power of a desktop computer in their pocket. According to Plateau, a telecomm provider, an estimated 96% of the US population currently uses cell phones.&lt;/p&gt;
&lt;center&gt;
&lt;p&gt;&lt;span style="font-size: large;"&gt;&lt;strong&gt;Every year, 1 in 4 Americans will lose their cell phone&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;Source: Intuit, 2012&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/1546/original.png" alt="how-to-keep-your-smartphone-secure" /&gt;&lt;/p&gt;
&lt;/center&gt;
&lt;p&gt;&lt;br /&gt;Some smartphones can cost an upward of $500 and yet are quite an easy little item to steal. The information that you keep on your device can be worth more than money. &amp;nbsp;Therefore, it is increasingly important for people to educate themselves on the safe use of smartphones and how to secure their personal data kept therein.&lt;/p&gt;
&lt;h2&gt;Active Measures You Can Take to Protect Your Smartphone&lt;/h2&gt;
&lt;p&gt;The following are tips and hints to help you keep your smartphone protected from physical theft, data theft, access, and more.&lt;/p&gt;
&lt;h3&gt;Password Protection:&lt;/h3&gt;
&lt;blockquote class="cms-alignleft"&gt;
&lt;p&gt;A good password will have at least 8 characters or many more, contain both capital and lower case letters, a number and a special character (ex: # or !).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Password protect your voicemail and general entry into your phone. And, do not use your date of birth or dog&amp;rsquo;s name as these are the first passwords someone who knows even a little bit about you, (or find out about you on social media), will try. A good password will have at least 8 characters or many more, contain both capital and lower case letters, a number and a special character (ex: # or !).&lt;/p&gt;
&lt;p&gt;If you use a pattern password on your touch-screen phone, be sure to change it often. Drawing a pattern on your phone&amp;rsquo;s screen over and over again will create small scratches which will eventually show the pattern.&lt;/p&gt;
&lt;h3&gt;Antivirus Programs &amp;amp; Backup:&lt;/h3&gt;
&lt;p&gt;Be sure to utilize a reputable smartphone antivirus such as Avast&amp;reg; (&lt;a href="http://www.avast.com/" rel="nofollow"&gt;www.avast.com&lt;/a&gt;) or Lookout&amp;trade; (&lt;a href="http://www.lookout.com/" rel="nofollow"&gt;www.lookout.com&lt;/a&gt;). Kapersky&amp;trade; (&lt;a href="http://www.kaspersky.com/" rel="nofollow"&gt;www.kaspersky.com&lt;/a&gt;) is also an excellent provider. You wouldn&amp;rsquo;t imagine using your laptop without an antivirus so why would you neglect to put one on your smartphone which is essentially a tiny computer?&lt;/p&gt;
&lt;p&gt;Many smartphones and their carriers include a tracking solution. Several of the smartphone antivirus programs also offer a tracking option for lost and stolen phones. Double check that your phone is covered by one of these programs and TEST IT!&lt;/p&gt;
&lt;p&gt;Backup your phone data regularly (personal information, bank and medical information which could be on your phone, contact information, photos, etc.). Make the backup automated and store it in a secure cloud which is encrypted. Test the restoration process.&lt;/p&gt;
&lt;div class="cms-alignright cms-box"&gt;&lt;center&gt;
&lt;p&gt;&lt;strong&gt;In the United States, approximately 113 cell phones are lost or stolen every minute.&lt;/strong&gt;&lt;br /&gt;Source: Plateau, 2012&lt;/p&gt;
&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/1549/original.jpg" alt="smartphone-security-for-investigators" /&gt;&lt;/center&gt;&lt;/div&gt;
&lt;h3&gt;Application &amp;ldquo;App&amp;rdquo; Security:&lt;/h3&gt;
&lt;p&gt;You will want to be cautious with which applications you install on your smartphone. Some are malicious and many ask that you approve a list of permissions. &amp;nbsp;Read the entire list of permissions and use common sense as to whether they are logical. &amp;nbsp;Why would a flashlight application need access to your email contacts? &amp;nbsp;Some apps ask permission to be able to write or delete information on your SIM card. Stick to the iPhone App Store and Android Market for trusted and screened applications.&lt;/p&gt;
&lt;p&gt;Use protective apps with encryption that also give remote access. Some of the smartphone antivirus programs include remote wipe capability software which can be used clear the phone&amp;rsquo;s data if the phone is lost or stolen. If only we could do this to the contents of a stolen wallet!&lt;/p&gt;
&lt;h3&gt;Physical Security:&lt;/h3&gt;
&lt;p&gt;When walking down the street and talking on your phone, be aware of your surroundings. It&amp;rsquo;s quite easy for a thief to see you distracted and just nab it out of your hand and run. Having a wrist strap on your phone and using it can also help make this method of theft more difficult.&lt;/p&gt;
&lt;p&gt;Be aware of your surroundings when using public transit. Cell phone users are a great target and thieves have an easy getaway when the subway or bus stops. Don&amp;rsquo;t even take out your phone as this would advertise how nice the phone is to any potential thief.&lt;/p&gt;
&lt;center&gt;
&lt;p&gt;&lt;span style="font-size: large;"&gt;&lt;strong&gt;1 in 5 school-aged children have had their mobile phone stolen&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;Source: Plateau, 2012&lt;/p&gt;
&lt;p&gt;&lt;img src="https://s3.amazonaws.com/lawgical/assets/data/1547/original.png" alt="smartphone-security-statistics" /&gt;&lt;/p&gt;
&lt;/center&gt;
&lt;p&gt;Don&amp;rsquo;t leave your phone lying around. Don&amp;rsquo;t leave it in plain sight in your car or home near a window.&lt;/p&gt;
&lt;p&gt;Turn off the geo-tagging feature which usually is automatically setup on the cell phone at the time of purchase. Any photos taken with the geo-tagging feature turned on can disclose the location in which the photo was taken; your office, home or even specific room in the house. Anyone searching your social media page can likely find more about your than you suspected by using photos taken by your cell phone.&lt;/p&gt;
&lt;div class="cms-box cms-alignright"&gt;
&lt;h3&gt;Daily Loss:&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;$7 Million worth of smartphones are lost daily&lt;/strong&gt;&lt;br /&gt;Source: Plateau, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Yearly Loss:&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;$30 Billion worth of smartphones are lost each year in the United States alone&lt;/strong&gt;&lt;br /&gt;Source: Intuit, 2012&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Miscellaneous:&lt;/h3&gt;
&lt;p&gt;If your phone is lost, make it easier for it to be returned. You can add contact information to the lock-screen. Just don&amp;rsquo;t list the number to the phone itself! Perhaps you can include a work number or non-primary email address.&lt;/p&gt;
&lt;p&gt;Document your phone&amp;rsquo;s serial number and IMEI (International Mobile Equipment Identity) and store it in a safe place. That information will be imperative to have for an insurance claim or police report.&lt;/p&gt;
&lt;p&gt;Turn off the feature on your cell phone which automatically connects it to a wireless network. Having that feature on allows anyone to be able to nab your logins and passwords right off of your phone as you walk by-phone in use or not. With the auto-connect WiFi feature, your phone will continue to search for a local connection and allow authToken information on your phone (which stores your login details for frequently used sites such as social media sites, online banking, etc.) vulnerable for hackers.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;What to do if your smartphone has been stolen:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Use the tracking software to locate the device&lt;/li&gt;
&lt;li&gt;If necessary, use your phone program to wipe the data off of the SIM card remotely&lt;/li&gt;
&lt;li&gt;File a police report&lt;/li&gt;
&lt;li&gt;Notify your cell phone carrier who can shut off the phone&amp;rsquo;s service and document your account that you reported your phone stolen&lt;/li&gt;
&lt;/ol&gt;&lt;hr /&gt;
&lt;div class="cms-box"&gt;
&lt;h3&gt;How Investigators Use Smartphones&lt;/h3&gt;
&lt;p&gt;For private investigators, smartphones may be their primary and most valued business tool. A smartphone will allow the investigator to make calls, check email, use GPS and maps, locate a business or office, record audio statements, obtain photographs or video documentation and research information using the Internet. There are numerous applications, &amp;ldquo;Apps,&amp;rdquo; which can be downloaded onto the smartphone that help make an investigator&amp;rsquo;s device an even more of a powerful professional tool. Just as an investigator accesses confidential and restricted information and databases on their laptops, they are increasingly going to their smartphone as a research device while in the field. Therefore, it is essential that private investigators, or anyone with a smartphone, take measures to safeguard their device.&lt;/p&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Kelly Cory is a licensed professional investigator who specializes in customized litigation support and complex investigations. Cory has been sought out for her expertise in background and cyber investigations, interviewed on the topic of database research and educates on the importance of information security. Learn more about Cory&amp;rsquo;s company, Keystone Investigative Services, Inc. at &lt;a href="http://www.keystoneis.com/" target="_blank"&gt;www.keystoneis.com&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Become a guest contributor&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, please contact us.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;More Information on Electronic Data Discovery Investigations:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/investigations/electronic-discovery" target="_blank"&gt;Electronic Data Discovery&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.pinow.com/articles/345/data-accountability-and-trust-act-introduced" target="_blank"&gt;Data Accountability and Trust Act Introduced&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
    <author>
      <name>Kelly Cory</name>
    </author>
  </entry>
</feed>
