PI Gear: To Buy Or Not To Buy
Buying equipment is part of the job of private investigators. Knowing when and what to buy is one of the secrets of successful investigators. How many times have you had to turn down a case because you didn’t have the right equipment to do the job? By Cody Woods.
10 More Secrets On Conducting A Surveillance
Kirk Menard is back with ten more secrets onconducting a successful surveillance you will find useful. With the one than ran a few months back, that brings his top surveillance tips to 30!
Reference-Hidden Camera And Hidden Microphone State-by-State Laws
This is an extensive site that review the civil and criminal laws for each state concerining the use of hidden cameras and hidden microphones. An RTNDA presentation.
Blood Spatter And Smear Evidence
Today I will address some unusual types of physical evidence I have encountered as a practicing criminalist. Though the evidence in cases varies in terms of its significance to the overall outcome of each case, every piece of physical evidence, no matter how small, must be evaluated critically to determine its relation to the overall crime committed. This is the work of the criminalist.
9 Hour Covert Wrist Watch Digital
Audio Recorder Player
This handsome fully functional watch is also a media player with 256MB flash memory built in. This unique recorder will allow you to record up to 9 hours of voice recording and download MP3’s music files. Now you can record notes, reminders or listen to music without any other devices. USB plug and play make this the media player perfect for any situation in which audio recording is required. Play back via stereo earphones or window media player.
The Staged Crime Scene
Staging is a conscious criminal action on the part of an offender to thwart an investigation. The term "staging" should not be used to describe the actions of surviving family members who cover or redress a loved one, who is found nude or has died in an embarrassing situation. These activities are certainly understandable considering the shock experienced by a relative who encounters the sudden and violent death of a loved one.
New "Repo" Technology- Can’t Make Your Car Payment? Then You Can't Get It Started
Norfolk's Patriot Auto Sales has outfitted most of its cars with a PayTeck Smart Box. The car won't start if the customer is late with a payment.
Bounty Hunter Convicted In Deadly Shooting Of Fugitive
A bounty hunter from the North Side bowed his head and then shook it in disbelief Monday as an Allegheny County judge convicted him of involuntary manslaughter for the fatal shooting of an unarmed fugitive last year.
Technology-Fingerprint Scanners Replace Keys At " Fingerprint Hotel"
Columbus Monaco hotel-This hotel is equipped with a fingerprint authentication system which eliminates the need for room keys. Upon arrival, guests will be invited to place their fingertips on a fingerprint scanner.They can also pay bar and restaurant bills in this way.
Dan Diego Cheaters Caught On Tape
When people fall in love, they hope it will be happy ever after, but sometimes a special someone can stray. And when that happens, a local private investigator may be watching.
Dog Cameras To Combat Gun Crime
Dogs fitted with the cameras help during gun sieges. Police have collared the latest in technology by kitting out their firearms dogs with cameras. New recruits to the Northumbria Police force are German shepherds Sammy, five, and three-year-old Zara. They have been trained to help during armed sieges and wear miniature television cameras with transmitters fitted to their heads or harnesses.
If a computer holds a clue, this lab will find it
$4 million investment cracks big cases
What’s the best way to get into a criminal’s head? One group of area sleuths knows: Get into their computers. That’s what the men and women assigned to the Heart of America Regional Computer Forensics Laboratory do every day in their high-tech search for evidence of crimes.
Free Encryption And Decryption Email Program
Here is a little Java Program that will encrypt and decrypt any text. Just type out text in the box below to try it and then hit the encrypt key. You can then hit the decrypt key to decrypt it. If you know the key, it will decrypt. Now here is something you can do. Let someone know the URL path to this page. Give them your key. EnCrypt a message and email it to them. They can then go to this page and decrypt it if they have your key number.