Affairs And Infidelity
Julia Hartley Moore, a private investigator in Sydney and author
of Infidelity: Exploding the Myths (HarperCollins), calls them repeat
Lost or Missing Persons
This article provides information about how to search for missing
persons, including runaways and abducted children, birth parents,
servicemen and women, refugees, former classmates, persons in the
criminal justice system or relatives from whom one has become estranged
or who live overseas.
A Resource Guide in a FAQ presentation .Prepared by staff of the
Dallas Public Library.
Hide Your Lying ... Face?
In search of the ultimate lie detector, researchers turn to thermal
facial scans, brain wiring and eyeball tracking. But deception still,
well, deceives. By Randy Dotinga- A WiredNews Article.
To Tell If A Spouse Is Cheating
Cheating spouses provide much of the work and income of most private
investigators, and every PI has developed his list of "tell
tale signs of a cheating spouse." Here is the best of the best.
Internet to gather revealing information
on people and to skip trace, that is, to track someone down. If
you’ve [...] candor and probe a litigant’s background
and resources. This article suggests ways to get started, at little
or no cost. A PDF download article.
Digital Side of Electronic Discovery
(Acquiring, Processing and Leveraging Magnetic Evidence)
A Detailed article dealing with digital media as evidence. By B.
and Abducted Children
A Guide to Case Investigation and Program Management
Authored by a team of 38 professionals from local, state, and federal
agencies, this guide outlines a standard of practice for law-enforcement
officers handling missing-child cases whether runaways, thrownaways,
family/nonfamily abductions, or when the circumstances of the disappearance
are unknown. It describes — step-by-step with definitive checklists
— the investigative process required for each of these types
of cases and offers a wealth of resources to assist an investigator.
Free 224 page downloadable manual from the National Center For Missing
And Exploited Children.
A Clue! Digging Up Dirt
Today's private eyes have evolved beyond using the rumor mill as
an intelligence source and getting important leads from matchbook
covers. They're taking full advantage of the information age to
help businesses hire wisely, choose reliable clients and monitor
employees who may have poor definitions of "profit sharing"
and "flex time."
How Identity Theft Works
The idea that someone can "steal" your identity is very,
very unsettling, but it happens every day. A lot of damage can be
done in this situation. Learn all about identity theft and what
steps you can take to avoid it.
Jane Turner The Making Of A Whistle Blower
When Jane Turner left the building on her last day of active duty
at the FBI--November 21, 2002--several of her colleagues turned
out for the occasion. It was the end of a distinguished 24-year
career in which Turner went places that few, if any, women in the
Bureau had gone before her: criminal psych profiler, New York organized
crime squad member, senior resident agent in Indian country. Some
fellow agents were on hand for her big day, she recalls, along with
members of the clerical staff.
Investment Scams And Fraud
Tim Harper has written several excellent articles on Prime Bank
schemes and offshore investment scams. He has graciously consented
to have a few of them reproduced here.
Stalking has a devastating effect on people's lives and as many
as 900,000 people in Britain fall victim every year, say researchers.
In a major new study launched today, victims are invited to give
their own first-hand experiences online.
and Answers about Memories of Childhood Abuse
The questions and answers will help you better understand how repressed,
recovered, or suggested memories may occur and what you can do if
you or a family member is concerned about a childhood memory.
Forensic Artist And The Statute of Limitations
After completing and drawing of a sexual battery subject, I told
the lead detective that I enjoyed aging wanted subjects. I told
her that I liked to find subjects that have been wanted for more
than 10 years. Although a forensic artist, I'm still a detective
and I sometimes locate wanted subjects using the department's many
computer data bases. After arresting these fugitives, I compare
my drawings to their actual appearance to test my aging accuracy.
by Det. Charles E. Holt Jr.-Miami-Dade Police Department Forensic
The Use Of The Amber Alert System
The AMBER alert system led to the rescue of three kidnapped girls
on Thursday, when a motorist spotted the kidnapper's car and notified
the police. Learn how the AMBER Alert began and see what it entails.
The Cutting Edge: A Pocket-Sized Gun Could Pose Life-Sized Tactical
A Minneapolis gun shop has just debuted a new, affordable and easily
concealed gun that has the potential to pose a serious tactical
threat to officers.
How Anti-shoplifting Devices Work
A fascinating article that examines the variety of anti-shoplifting
devices being used by retail businesses and how these systems and
If you surf, then most likely you've used the Google search engine.
And if you Google, chances are you've used it to look up old friends
and acquaintances, long-lost classmates, or people who owe you money
and have skipped town so they won't have to pay you. Come, on, admit
it, we're all friends here.
Lights and Their Use as Evidence
Were the lights switched on or not? Had you ever have to answer
this question? It is possible to determine if the lights of a vehicle
was working at the time of impact..
Lie Detector, Where Do We Stand?
The term polygraph is increasingly heard in IR and HR circles. As
with many concepts that are "new" and or "foreign,"
a lack of knowledge regarding everything surrounding it results
-The Blood Stain Revealer
You know on crime shows when they spray some stuff on a "clean"
carpet and suddenly -- blood stains! This crime scene tool actually
exists. Find out how luminol reveals the blood.
Produced in cooperation with the American Bar Association, this
fifth edition, which was formerly titled Parental Kidnapping, contains
step-by-step information for parents who have experienced a family
abduction — whether domestic or international. The handbook
guides parents through the civil- and criminal-justice systems,
explains the laws that will help them, outlines prevention methods,
and provides suggestions for aftercare following the abduction.
In addition Family Abduction thoroughly details search and recovery
strategies and contains valuable advice for attorneys, prosecutors,
and family-court judges handling these difficult cases. Free 224
page downloadable PDF manual provided by The National centered For
Missing And Exploited Children.
on International Parental Kidnapping
This downloadable PDF guide provides practical, detailed advice
about preventing international kidnapping and increasing the chances
that children who have been kidnapped or otherwise wrongfully retained
will be returned. The publication also offers descriptions and realistic
assessments of the civil and criminal remedies available in international
parental kidnapping cases, explains applicable laws and identifies
both the public and private resources that may be called upon when
an international abduction occurs or is threatened, and prepares
parents for the legal and emotional difficulties they may experience.
Provided by The National centered For Missing And Exploited Children.
to Workplace Violence Post 9/11:
What Can Organizations Do?
Learn what actions employers can undertake to help minimize the
psychological impact of terrorist violence.
Computer Composite Software Programs
I had the pleasure of testing several computer composite programs
this past year and have finally selected the "best" software.
Now, before I continue, I need to clarify that statement. Several
of the programs were quite good, however for the criteria that I
was using, I felt the CD-Fit software was the "best" for
our needs..., at this time. I used the following criteria to select
the composite software. By Hayden B. Baldwin, Illinois State
Anger -- Before It Controls You
We all know what anger is, and we've all felt it: whether as a fleeting
annoyance or as full-fledged rage.
With PowerPoint Design Templates
You've been working hard on your upcoming presentation. You've checked
your facts, written the text and some punchy headlines —
you even managed a joke or two. But here's the hard part —
you still have to decide on layout, colors, and fonts. Fortunately,
presentation design is easy when you use one of the knockout design
templates included in Microsoft PowerPoint
Investigators Have Meeting
With Senator Feinstein
Staff On Proposed Identity Theft Bill
On October 12th at the San Diego office of Senator Dianne Feinstein,
seven fellow investigators and I had the opportunity to meet with
James Peterson, the District Director for Senator Feinstein. The
panel of investigators represented various associations, including
but not limited to CALI, NCISS, PICA and NALI. By Jim Zinner, CPI
Search Engine Challenges Google
Exalead announces the availability of a new Internet search engine
that makes the content of a billion Web pages immediately accessible.
Our tests provide it's GREAT!
Wants Database Dragnet
Lawmakers may soon pass a bill that would set up a huge network
of databases that law enforcement officials could tap to find terrorists.
But that kind of unfettered access to data about Americans raises
eyebrows. By Ryan Singel- A WiredNews story
Trace Leads To Arrest In Embassy Bombing in Paris
PARIS - Police investigating a bomb attack at the Indonesian Embassy
have arrested a man at an Internet cafe from where an e-mail was
sent claiming responsibility, judicial officials said.
Forensic Experts Track Printer Fingerprints
Researchers at Purdue University have developed image analysis techniques
that may one day help tie counterfeit money and forged documents
to the printers that produced them.
Is First In Nation To Consider Putting
RFIDs In State Driver Licenses
Almost everyone carries a driver’s license, and RFID chips
allow people to be tracked," said Kent Willis, Executive Director
of the ACLU of Virginia. "This proposal would allow anyone
to set up an RFID reader to capture the identities and personal
information of every person who comes within range," added
Willis. "FBI agents, for example, could sweep up the identities
of everyone at a political meeting, protest march, gun show, or
Islamic prayer service.
Vows Piracy Assault
Move over, terrorism. Attorney General John Ashcroft pledges to
make fighting piracy a top priority for the Justice Department.
By Katie Dean. A WiredNews story
Investigator On The Laci Peterson Case
A private investigator charged with impersonating an officer while
looking for leads in Laci Peterson's murder continues to work the
case and has uncovered clues about a mysterious van and alternate
crime scenes, the man's lawyer said Monday.
May Be To Blame For Infidelity All In The Genes?
Some people may be genetically programmed to be unfaithful to their
partner, a scientist has claimed.
Investigators Gather Crime Evidence From PDAs
Tech savvy criminals are just as likely as anyone else to use high-tech
devices, such as personal digital assistants (PDAs), to help keep
track of their activities.
I Scan The Bar Code In Your Arm, Please?
Forget about temperature-taking
and blood-pressure checking. In the bright, near future, the first
step for people seeking medical care may be to have their bicep
read by an electronic scanner seeking data stored on an implanted
Spies on Chat Rooms
Could terrorists be plotting their next move online, obscured by
the 'noise' of chat-room chatter? The U.S. government thinks that
may be the case and is funding a yearlong study on chat-room surveillance.
A WiredNews Story.
O'Reilly Hit With Sex Harassment Suit
Hours after Bill O'Reilly accused her of a multimillion dollar shakedown
attempt, a female Fox News producer fired back at the TV star today,
filing a lawsuit claiming that he subjected her to repeated instances
of sexual harassment and spoke often, and explicitly, to her about
phone sex, vibrators, threesomes, masturbation, the loss of his
virginity, and sexual fantasies.
Investigation Uncovers Voter
Registration Fraud In Colorado
DENVER - With just 21 days left until an election in which every
vote will count, the 9News I-Team has uncovered voter registration
fraud that could cause chaos on Election Day for hundreds, possibly
thousands of Colorado voters.
In Court: Forensic Science On Trial
New types of forensic evidence are being used to gain convictions.
But much of it is suspect, defense lawyers say -- and judges agree.
Court Must Determine Table Turning Spyware Case
A would-be whistle blower working for the Alabama Department of
Transportation spied on his boss in an attempt to prove that the
supervisor wasted time and taxpayer dollars doing anything but work
while on the clock. The systems administrator installed a spyware
program on his supervisor's computer and, during seven months of
surveillance, discovered the majority of captured images showed
the supervisor playing Solitaire.
Introduces Personal Search
Yahoo has enhanced its My Yahoo service with personalization features
including search history, the ability to save pages to a 'personal
web' and block URLs from appearing in search results.
Newburyport Mayor Mary Anne Clancy admitted this week she had an
e-mail relationship with a male teacher that was "inappropriate
for someone with a husband and family." She insists the relationship
never led to adultery and it ended three months ago. Yet when her
husband saw copies of the e-mails, he got so upset he went to the
teacher's house and was arrested on assault charges. By Julie Kirkwood
Desktop Search Launched
Google released a new Google Desktop Search tool today that allows
people to scan their computers for information in the same way they
use Google to search the web. Its ease of use, plus how it enhances
the Google search experience, make it a compelling product to use.
Bugging' Detective Arrested In England
A man was arrested on suspicion of bugging telephones for a private
detective agency in England.
Private Detective Firms Opening Up In Major Indian Cities
These firms investigate the minutest detail, digging into the background
and legalities of the personality, institution or business deal.
for Your PC: Mac OS X
A Hawaiian company claims to have developed a $50 software emulator
that allows a Windows PC to run Mac OS X. A legal expert says it's
likely Apple will have some objections. By Leander Kahney- A WiredNews
Online Users Entitled To Privacy
A federal court ruling last week nixing a post-September 11 law
that allowed government agents to secretly obtain information from
Internet service providers hasn't yet received much attention in
the online marketing world .
Fraud Threatens Web
Someone could make the argument that watchdogs have better things
to do. But click fraud -- endlessly clicking on ads to generate
cash or hurt a competitor -- is a serious threat to the web business,
and no one's doing much about it. Commentary by Adam L. Penenberg
Industry Still Flies Blind
The commercial web is 10 years old, yet the online publishing industry
still hasn't figured out how to measure accurately the number of
people visiting each site. What's at stake? More than $8 billion
a year. Commentary by Adam L. Penenberg. A WiredNews Story
Bill Gets House Nod
Anti-spyware legislation sails through the House of Representatives,
with the bill's sponsor pressing to have both houses approve a law
to reign in invasive computer programs by the end of the year. By
Michael Grebb. A WiredNews Story
Work To Track Abused Children
Davontae Williams' death at age 9 spurred children's advocates to
seek a creative way to protect abused youngsters before it's too
Nab Fake Gynecologist
Meet Thomas Remo. The 50-year-old Texas sleazeball is facing felony
charges for posing as a doctor and offering unsuspecting patients
free gynecological services. A SmokingGun Story.
High Profile Trial Coverage
Scott Peterson Trial
Robert Blake Trial