The Official Newsletter Of The National Association Of Investigative Specialists
December 10th, 2004 Edition




Investigative Articles

Cyberstalking: Obsessional Pursuit And The Digital Criminal
Though the legal recognition of stalking is a recent evolution, the behavior that is involved is by no means a product of the 20th century. It is known though that criminal behavior is incredibly adaptive to new technologies, with credit card, mobile phone and computer fraud as examples. It is also acknowledged that stalking has now taken an on-line form, colloquially referred to as cyber-stalking.

Making The Money As A Private Investigator
You can be the best investigator in the world, have the skills and resources to find the facts and information to make a client sing your praises, but, if they donít know who and where you are, sure as shooting, youíre gonna starve in this business. By Ed Pankau

Finding Military Personnel
The following list of Federal agencies and private organizations assist individuals in locating persons of unknown whereabouts.

New Investigative Technology: Forensic Clock Calls Time On Crimes
A stray hair, or a spatter of blood or saliva, is all it takes to prove that a suspect was at the scene of a crime. But until now, there was no way of knowing when the suspect was there - an element of doubt often exploited by defense lawyers. An ingenious new technique that measures how quickly genetic material breaks down could change that.

Getting Local Called Phone Records Legally
Make money as a PI TelCo Consultant. A PDF download. By: Michele Yontef - Licensed Private Investigator

Sleuth Or Consequences - How To Tell If A Person Is Lying
How to tell in five minutes or less whether someone is lying.

IE Killers: Best Tools To Improve Your Web Browsing
 Frustrated with Internet Explorer? Consider replacing it with the latest version of Firefox, or any of these other utilities.

PI Profile: Joe Maxwell 
He is always out there, watching the world nobody wants anyone to see.

Computer Keystroke Logging: You Can, But Should You?
As long as they get the work done, maybe you don't care if your workers putz around on the computers you paid for. But -- what if they're using it to look at pornography? Or Web sites run by hate groups? Or writing nasty anonymous notes to co-workers that violate your discrimination or sexual harassment policies? What if they're trashing your corporate reputation in chat rooms? By Pat Curry

A Business Analysis
The Feasibility of a Solo Practice in Traffic Accident Reconstruction

This article presents a feasibility study on the business considerations in forming a solo traffic accident reconstruction practice. This task was approached from an academic perspective and fulfilled the thesis requirements of the researcher's Masters of Business Administration program. This article is excerpted from that thesis.-by Denise Aquilante Johnson-University of Phoenix.

New Investigative Technology: Fractal Image Technology Breaks New Ground In Forensic And Criminal Image Enhancement
River Bend Research announced the introduction of Fractal Digital Imaging (FDI) – a new technology that brings fresh life to inferior quality video and digital imagery used in law enforcement in forensic applications.

Investigative Photography: Scale Selection And Placement
There are numerous types of scales to be selected from. Some are appropriate and others are unsuitable. When selecting a scale, there are several questions to consider; what type of lighting is to be used, precision of measurement required, rigidity needed in scale, size of item and thickness of object being photographed. With the advent of computerized databases, search systems and electronic measuring, the need for more precision in the photographs and scales used is becoming apparent. A discrepancy in the distance between two points may bias a data base search or skew data. One should always strive to achieve as much accuracy in the photographs as the system requires. By Ronald Groffy

The Privacy Arms Race!
Fancy new software lets managers spy on employees -- and employees evade the scrutiny. Um... trust, anyone?

New Technology: New Software Detects Art Fraud
Dartmouth College computer scientists create software that uses statistical techniques to authenticate art, to sort out real works from fakes. Their first finding: A painting purportedly by Perugino may have been done by four different artists. By Noah Shachtman- A WiredNews story.

Understanding Electronic And Digital Evidence
In today’s world of complex technologies, digital media and storage as well the concerns over Cyber Terrorism, terrorism in general and Homeland Security, we have a lot to think about. As investigators you have to be able to adjust and be flexible to your surroundings. Incorporating what you have learned in the past to what you will need to do in the future.

Handwriting Analysis-What's it All About And How To Use It
Most people learn to write by imitating a certain style, usually the Palmer or Zaner-Blosser method, but eventually idiosyncrasies develop in the way letters are formed that come from factors like education, artistic ability, physiological development, and preference.

Statewide Or Countywide Background Checks-Which Way To Go
More and more companies are performing background checks on their potential employees. This is a good thing, right? Well, yes and no. Companies are often uninformed about what they are actually receiving. By Ron Kern

Privacy And Email: Putting Email Under Lock And Key!
New Memory Device Encrypts Messages For Privacy.

Aerial Photography: Applications In Accident Reconstruction
This article approaches aerial photography from two perspectives. Bob Wyman is a consulting accident investigator. He writes about this topic from the perspective of the end user of aerial photographs. Ross Cobb is a pilot and owner of Aerials Inc, an aerial photographic service. He offers the technical explanation. By Robert Wyman and Ross Cobb

Profile: Mystery Gets A Face: Forensic Artist Gives
Features To 1971 Bones

Talk about your ultimate makeovers. When Joyce Nagy got hold of "Annie," she already understood the job would entail more than a little makeup, hair and some new clothes. Forget the facelift — Annie didn’t even have a face.

Privacy Special Report: Stealth Surfing
You dislike being watched, but you don't want to give up the Net. How do you lower your profile? We offer practical tips on everything from controlling cookies to privatizing your e-mail.
By Matt Lake- A PC World Article

Dealing With Internet Cyber Bullies
The brave new virtual world of the Internet, increasingly populated by young children, is fraught with dangers where computer-based tools become weapons and innocent users become victims, say a trio of cyber bullying experts.

Profile: Demetrios Kosmos And Worker Compensation Fraud
You may not know it, but there is a scam going on that all of us are paying for: worker's compensation fraud, which costs tens of billions of dollars every year.

X-Ray Scanners And Health Risks
Are your children being irradiated? Are you being irradiated? The UK Home Office seems unconcerned by the question, despite being responsible for at least one of the government organization wielding the devices that might be doing the irradiating. Weapons scanners that use x-rays are now being tested by the Metropolitan Police and at Heathrow airport, and while the effect of a single scan will probably be negligible, the actual health risk will depend on the nature of the particular deployments, and on the individuals being scanned. So they should therefore not be deployed casually, without careful prior consideration, on the basis that they're 'harmless'.

Document Analysis And Forensics
In 1991 Michael Barrett, a scrap-dealer from Liverpool, England, claimed to have in his possession a 63-page diary, written on the pages of a photo album, that appeared to be the work of the infamous unidentified killer, Jack the Ripper.

Fresh Perspectives from Doctor Cyril Wecht
Forensic pathologist tackles the really tough cases with a fresh perspective: the JFK assassination, Convenient Ramsey, Elvis Presley & Dr. Jeffrey MacDonald.

Warner Signs Of A CyberAffair
Cyberaffairs are more common than people realize. It is not unusual for someone having a cyberaffair to spend at least four hours a day chatting online. To help partners determine if their loved one is cheating, I have developed Seven Tell-Tale Signs of a Cyberaffair that you should look out for.

Internal Theft-The Inside Threat
It's bad enough when an intruder breaks into your plant at night or a robber holds up your store, but when your own staff steal from you, business owners are left dealing both with the loss and the betrayal of trust. By Ron Kern.

Beware--The Rise Of Snoopware
Snoopware--software that monitors user actions on a PC or LAN--is everywhere. There's application-metering software that tracks who's using what application on a LAN. There's nannyware: Web-use monitoring software that can block employee access to specified "forbidden" sites, chat rooms, and such. There are proxy-level URL and IP loggers that track (and can enable or block) access to any online resource. There are E-mail monitors that track and parse messages, looking for "bad" words that might indicate that corporate E-mail is being used for sexual purposes or to disclose confidential company information. And then there are keystroke loggers that can track user activity down to each individual keystroke. By Fred Langa

API Spying Techniques for Windows 9x, NT and 2000
API spying utilities are among the most powerful tools for exploring the inner structure of applications and operating systems. Unfortunately, neither the SDK nor the DDK provide any documentation or examples demonstrating a way for implementing such a utility. This article will attempt to shed some light on this subject by presenting several techniques for hooking API calls issued by Windows applications. By Yariv Kaplan

Pedestrian Accident Reconstruction:Review and Update
Pedestrian accident reconstruction has become a critical, important aspect of the field of motor vehicle collision reconstruction. The dynamics, methodology, and principles involved are somewhat different than those routinely used to reconstruct vehicle collisions. The field is one quickly becoming highly specialized. This paper presents a background of the problem, a limited summary of the work available in the field, and discusses the current reconstruction methodologies as they refer to pedestrian walking speeds, impact orientation, and determining impact speeds. by Luis Martinez

Warning: We know What You're Typing And So Does The FBI
What if every keystroke you typed was recorded? Programs that do this have existed for years, and are often traded on shadowy Web sites. Alone, they are mere curiosities, but when coupled with Trojan horses that send the data over the Internet, these so-called keystroke loggers allow malicious users to steal your passwords and credit card numbers. By Robert Vamosi

Pros And Cons: Using USB Flash Drives
One reason for the increase in USB Flash Drive sales is the capacity of the device to safely store a reasonably large quantity of data in a small package that retails for a reasonable price. A close examination of benefits the device has to offer, however, reveals a number of potential pitfalls that anyone who may be purchasing one should consider. Here is a list of general and Mac specific pros and cons for these devices.

Five Steps to a Leaner, Cleaner Windows
This article takes you by the hand and shows you how to clean your Windows machine making it a whole lot cleaner and leaner.

Beware-Cell Phones New Target For Hackers And Viruses
Early this month, several Web sites began offering software promising ringtones and screensavers for certain cell phones. But those who downloaded the software found that it turned every icon on their cell phones' screens into a skull and crossbones and disabled their phones, so they could no longer send or receive text messages or access contact lists or calendars.

High Profile Trial Coverage

The Scott Peterson Trial
The Robert Blake Trial
Martha Stewart Coverage
Michael Jackson Trial
Jayson Williams Trial

Investigative News

Government Uses Color Laser Printer Technology to Track
Next time you make a printout from your color laser printer, shine an LED flashlight beam on it and examine it closely with a magnifying glass. You might be able to see the small, scattered yellow dots printer there that could be used to trace the document back to you.

Security Officials To Spy On Chat Rooms
The CIA is quietly funding federal research into surveillance of Internet chat rooms as part of an effort to identify possible terrorists, newly released documents reveal. By Declan McCullagh

Court Documents Not Fit for Web?
States are rethinking their policy of publishing all court documents -- divorces, medical histories, arrests -- on the web. On one hand is the citizens' right to know how their government operates. On the other is their right to privacy. By Jacob Ogles. A WiredNews Story.

Gumshoe Goes Extra Mile For Accused Clients
English major turns private eye. Monica Jordan, a petite new mom, almost looks like a college kid. You wouldn't think she just helped spare a guy the death sentence.By James L. Rosica

Lady Detectives In China To Target Cheating Husbands
Cheating husbands in China's flashy commercial hub of Shanghai, beware, female detectives will soon be watching you.

Pa. to Post Sex Offenders' Personal Data
Gov. Ed Rendell has signed a law allowing photographs and personal information on more than 7,000 registered sex offenders to be posted on the Internet within six months.

The Spying Game: Watching The Detectives
On a rainy Saturday night in the neon-drenched streets of Shinjuku, Kenji Shimura looks like 1,000 other salarymen: off-the-rack black suit, sensible shoes and a face made for anonymous middle-management in an insurance firm.

Bush Retrieves Secret Service Bodyguard
resident Bush stepped into the middle of a confrontation and
pulled his lead Secret Service agent away from Chilean security officials who barred his bodyguards from entering an elegant dinner for 21 world leaders Saturday night. Here's a photo sequence of Pres Bush grabbing his Secret Service Agent. Chilean security officials who barred his Pres. Bush's Agents from entering a dinner with him.

Court Rescinds Suspect's Life Insurance
Man defaulted on $4 million loan and then faked his death, a company attorney says.

A Galveston bankruptcy court has rescinded $14 million in life insurance on a Clear Lake businessman who investigators say faked his death after being declared in default on a $4 million loan, an attorney said Friday.

Rough Reception for DNA Law
California voters approve an aggressive DNA-collection program basically anyone held in connection with a felony will be tested -- and that has privacy advocates worried. By Julia Scheeres.

Corporate Espionage: Airline Says Trash Data A Treasure
WestJet Airlines Ltd. generated summaries of Air Canada's "best and worst" routes by snooping into the numbers of seats sold, according to court documents in a corporate espionage case that has riveted the country's aviation industry.

Despite Law, Open Records Hard To Obtain
Nashville- If you need an incident report from the Crockett County Sheriff's Department, it's best if you have a familiar face, especially if the sheriff's not around.

Elderly Woman Busted for Identity Theft
An elderly woman is behind bars for identity theft. For months investigators have been looking for the Georgia woman, who they say stole millions of dollars. They found her Wednesday morning hiding out in a Gainesville motel. By Heather Sorentrue/WCJB TV 20 News

Google Engineers New Scholarly Search
Google Inc., the leader in online search engines, is setting out to make better sense of all the scholarly work stored on the Web

Judge Dismisses Keylogger Case
A federal judge in Los Angeles has dismissed charges against a California man who used a keystroke logger to spy on his employer, ruling that use of such a device does not violate federal wiretap law.

Wells Fargo Computers Stolen
Identity thieves may have obtained sensitive information about thousands of Wells Fargo mortgage and student loan customers, after four computers containing customer account numbers and Social Security numbers were stolen last month.

Cell Phone Batteries Explode, Causing Recalls
Curtis Sathre said it was like a bomb going off. His 13-year-old son Michael stood stunned, his ears ringing, hand gushing blood and body covered in black ash.

Lexmark Spyware Puts Hardware In Security Spotlight
The revelation that Lexmark uses software that monitors customers' printing raises interesting questions for other hardware vendors, says a technology lawyer. Allegations of printer manufacturer Lexmark installing "spyware" will cause hardware companies to reconsider their licensing practices, a leading technology law firm has said.

Guards of Saudi and American Embassies Get Israeli
Counter-Terrorism Training

Firing at attackers through a thick pall of smoke, U.S. Embassy guards from Iraq and German bodyguards for the Saudi royal family safely escorted their charges through an ambush.

Secret Service Takes Over Website
Until Wednesday one of the best public sources of information on how to use a stolen credit card number, forge a drivers license, defeat a burglar alarm or silence a firearm was a website under the control of the U.S. Secret Service.

RFID: Why You May Need Tinfoil Trousers
Microsoft has told people worried about the tracking capabilities of RFID chips to wrap themselves in tin foil. Speaking at Microsoft's IT Forum in Copenhagen, Steve Riley, security program manager at Microsoft, said consumers will have to be proactive if they want to 'kill' the RFID tracking tags when they leave a store - and he joked about the possible ways to do it.

Angry Nurses Discover Hidden Cameras At
Los Angeles Hospital

Nurses found 16 tiny cameras hidden in clocks throughout Good Samaritan Hospital, a discovery that sparked immediate privacy concerns.

San Francisco Lawsuit Challenges Strip Searches Of Minors
Lawyers representing a 13-year-old middle school student sued in federal court Friday, alleging the girl's civil rights were violated when she was strip searched at San Francisco's juvenile hall.

US Military Taps Bugs and Weeds in War on Terror
Backed by the Pentagon, scientists are recruiting insects, shellfish, bacteria and even weeds to act as "bio-sentinels," which give early warning of biological and chemical attacks, detect explosives or monitor the spread of contamination.

New Web Site Finds & Downloads

IPNetInfo v1.01
IPNetInfo is a small utility that allows you to easily find all available information about an IP address: The owner of the IP address, the country/state name, IP addresses range, contact information (address, phone, fax, and email), and more.
This utility can be very useful for finding the origin of unsolicited mail. You can simply copy the message headers from your email software and paste them into IPNetInfo utility. IPNetInfo automatically extracts all IP addresses from the message headers, and displays the information about these IP addresses.

Surveillance Image Flyover
This is a little slow loading but worthwhile. You can input any address and do a satellite flyover for any address and control the direction you go. Note: If may take a few minutes for the front page to load.

Disk Investigator
Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors. Verify the effectiveness of file and disk wiping programs. Undelete previously deleted files.

Delete Doctor
Delete files that are difficult to delete, such as some files left by viruses and trojans, or files with corrupted file names. This program can also delete files like the "index.dat" files, which store Internet history, by scheduling them for deletion upon system restart. Select a file to delete from the built-in file browser or drag a file to the application's icon or window from Window's Explorer.

Domain Dossier
Investigate domains and IP addresses. This place gives you detailed info on any domain name like who owns in. Who reinserted it. What service it resides on.It will also give you a service scan and a trace route.

Tiny URL
Tiny URL gives you a way to massively shorten a long domain name so you can manage them better. It's great for news articles and other web pages that tend to have very long URLs. Just input the URL address one time, and you are given a shortened version to use.

Quick Find City And State To County
Just input the city and state, and this page quickly gives you the county. You can then click on the country and get a vast set of helpful investigative links within that county.

Quickfind Zip Code To County Search
Input a zip code and you will get back city, country and state info. The results will also give you area code data, Latitude and Longitude and time zone.

Past Employee Search
Input the name of a company and obtain a list of past employees. Good way to find sources of information on a company.

Financial And Banks Tools
Here is some online tools on banks and financial services that will be helpful.

Mail Drop Search
Input an address into this page and it will tell you if the address you have is a mail drop.

Turbo10 is a search engine for information on the 'deep web', which is usually not found by normal search engines.

ixQuick.com is a new meta search engine that searches ten different search engines at once and then ranks the results for tight ranking. Try it, you will like it.

National Do Not Call Registry Search
You can verify if a phone number has been registered with the National Do Not Call Registry. Up to three phone numbers can be verified at a time, and the results, including registration dates and expiration dates, will be sent you users with a valid email address.

Salvation Army Tracing Service
From family tracing to disaster response, The Salvation Army offers a wide variety of services Worldwide.

PI Product Features

The #1 Camera Clamp

PI TinyCam!
World's Smallest Camcorder,
Digital Camera & Audio Recorder! You Have To See It To Believe It

New York Police
Department Hand Carved
Hand Painted Wood Seal

Designer Surveillance
Sun Glasses

TinyTech! World's Smallest
Digital Recorder

You Can Gather
35% To 50% More Facts

By Vastly Increasing Your Investigative Interviewing & Statement Taking Skills With This Ground-Breaking Fun To Take DVD Training Material

Los Angeles Police
Department Hand Carved
Hand Painted Wood

Now You Can Have A Complete Covert Video & Audio
Recording Studio In Your Pocket!


Wireless Color Micro
Video Pinhole Camera-Color
And Black & White


World's Smallest Digital Video Surveillance CamCorder

Ultimate Surveillance
World's First DVD
Training On Surveillance

New Generation
Real Time GPS
Car Tracker

Ultra Mini Digital
Video Recorder With Screen--The World's Smallest!

New Generation Bug Detection

Advanced Phone
Records Incoming And
Outgoing Dialed Numbers. Logs Up To 2,000 calls. Gives You Time And Date Stamp!



Access The NAIS Members Only Site Access NAIS Membership Directory Access Special NAIS Wholesale Pricing
Certifications From The National Association Of Investigative Specialists
Certified Missing Persons Investigator Certified Process Server Certified Pre-Employment Screener
Certified Email Tracer Certified Insurance Claims Investigator Certified Online Searching Investigator

40 Or 80 Hour
Pocket Sized Digital
Video Recorder With Screen



Wireless Color Micro
Video Pinhole Camera-Color
And Black & White

6.0 Mega Pixel Tiny
Digital Camera And
Video Camera!
Up To 7,000 Pics
10 Hours Video

Advanced Phone

Records Incoming And
Outgoing Dialed Numbers. Logs Up To 2,000 calls. Gives You Time And Date Stamp!

TinyTech! World's Smallest
Digital Recorder!
Amazing Results
With Automatic Telephone Recording Control

Ultra Mini Digital
Video Recorder With Screen--The World's Smallest!

Special NAIS Members Access

Access The NAIS Members Only Site Access NAIS Membership Directory Access Special NAIS Wholesale Pricing
Skip Trace Portal Free Publics Records Access Portals State Investigative Licensing Contacts
Fee Based Information Services PI Daily-An Investigative Newspaper State Investigative Associations
Join Investigative Forums Investigative Resource Centers Main Flash Web site

Investigative Links To PI Books, Manuals, CDs, Software And Equipment
Investigative Books & Manuals Investigative Software Covert Vide Gear Countermeasures Gear
Audio Reordering Equipment GPS Car Tracking Sound Amplification Surveillance Binoculars
Digital Cameras Night Vision Optics Detection Gear Self Defense & Security



PI Bytes 11-10-2004
PI Bytes 10-20-2004
PI Bytes 10-10-2004
PI Bytes 09-20-2004
PI Bytes 09-10-2004
PI Bytes 08-20-2004
PI Bytes 08-10-2004
PI Bytes 07-20-2004
PI Bytes 07-10-2004
PI Bytes 06-20-2004
PI Bytes 06-10-2004

PI Bytes 05-10-2004
PI Bytes 05-20-2004
PI Bytes 04-20-2004
PI Bytes 04-10-2004
PI Bytes 03-20-2004
PI Bytes 03-10-2004
PI Bytes 02-20-2004
PI Bytes 02-10-2004
PI Bytes 01-20-2004
PI Bytes 01-10-2004


Copyright: 2004, NAIS. All Rights reserved.