Jimmie Mesis Editor
In Chief Of PI Magazine
Interviewing Joel Winton of the FTC
FTC On Pretexting
Jimmie Mesis Interview with Joel Winton of the FTC.
In an effort to get a definitive definition of pretexting and understand
the potential risks and penalties for conducting pretexts, PI Magazine
was granted an interview with Joel Winston, Associate Director of the
FTC, Division of Financial Practices. This unprecedented interview specifically
details the various areas of pretexting including, personal and financial
information, toll records, CNA's, utility company searches, as well as
general telephone and in-person pretexting. The answers that were provided
by the FTC will certainly be of interest to all. Apimagazine.com
Carrie Brechtelsbauer The Document Shredder Service- That Fights Identity
Specialty: The Auburn Hills company operates four mobile shredding trucks
around Metro Detroit that turn discarded customer records into confetti.
With 10 employees the firm earns almost $1 million in revenue.
Hidden Investigative Market For Private Investigators.
Learn All About A new Investigative Service With Identity Theft That Give
You $500.00 Per Case And be People's Lifesaver At The Same Time.
Evidence In The Digital Age
The Age of The Computer has changed the way businesses around the world
conduct their daily transactions. Almost everything they do will find
its way to the computer, from a sales transaction to the purchase of paper
clips. by Timothy Q.Delaney and Stephen C. Smith.
Criminal History Databases
Les Rosen and Carl R. Ernst explain how criminal record databases are
created and maintained and when you can use them to comply with the Fair
Credit Reporting Act. A BRB article
Anyone on the Internet... Myth or Reality?
You have heard of companies selling cyber spy-net programs — (Clue:
They usually begin with the word Net or Spy) They proclaim that anyone
can find out everything about anybody Don't worry your privacy will not
be compromised by these guys. Here's the lowdown and the myths revealed.
by Pamela Sween, Private Investigator.
Why Declare That An Image Is Not Manipulated?
In many applications of photography, it is extremely important that a
photograph be created through as as straight-forward a transfer as possible
from what was recorded on the film or the imaging sensor of the camera
to the image the viewer sees. Obvious examples would be photographs presented
as evidence in a court case, as part of a medical record, with an insurance
claim, or as an illustration of a news article in a newspaper or journalistic
Trends- Business Embraces World Of Spies
Private detectives are traditionally seen as inhabiting the shadowy world
of cheating husbands and estranged wives. But nowadays they are more likely
to work for businesses.
Tadlock Private Matters
Roseville investigator has been on the case for 30 years
The client always lies. This is the edict of Joe Tadlock, a veteran of
30 years in the business of investigating what his clients want known,
but so rarely entail the full scope of.
Says He Left FBI Early To 'Tell The Truth'
And Becomes A Private Investigator
Jon Lipsky stepped to the podium in a hot, cramped press room Wednesday
and began his testimony. "I've been muzzled since 1992," he
Digital Recorder! Amazing Results
With Automatic Telephone Recording Control
Lines And Blind Line Services
For Skip Tracers And Other Investigators
Trap lines have become a very effective investigative tool in skip tracing
and other types of investigations such as when you need to find out where
someone works.The idea behind using a trap line is that if you capture
the telephone number that the party is dialing from, you have a fact that
they were at this location at the time of the call. This could be their
home address. If you set it up right and ask them to call at a certain
time, they could be calling from their work number. Of course, once you
get the number they call from, you need to turn the telephone number you
captured into an address. By Ralph Thomas
by Machine: Living With Lie Detector Tests
A former public defender recounts his first experience with a lie detector
test and argues for their place in American courtrooms A Nolo Press Article.
of Infidelity - 30 Clues to Cheating Spouses
A cheating spouse or significant other will tend to exhibit some of the
signs of infidelity listed in this article.
Writing Specialists: More Than TNT
If you thought handwriting analysis was for fortune telling, carnivals
and parlor tricks guess again. In fact, over 8,000 U.S. corporations use
it for employee screening and solving employee theft. Lawyers use it for
jury selection, Investigators use it for help with cases, Genealogists
use it to profile their deceased ancestors, Singles use it to screen their
prospective mates and much more.
Yourself Safe from Stalkers
"The only difference between me and a stalker is intent," said
private investigator Bill Vann. "I've been stalking for 9 years but
I've been licensed to do so."
Fault Divorce Vs. Fault Divorce FAQ
One can get a no fault divorce in any state, but one may want to understand
"fault" grounds for divorce as well. A Nolo Press Article
To Increase The Response You Get From Your
Lead Generating Ads
I received two postcards in the mail yesterday. One was cluttered with
so much small text I had difficulty trying to read it. I gave up and trashed
it. The second postcard had a total of 48 words on it including a website
address listed on the bottom of the card. The card announced a new book
on one of my favorite business topics. Part of one chapter was available
to read free at the website listed on the card. I did... then ordered
the book. by Bob Leduc
Monitoring In The Work Place.
This article deals with privacy laws pertaining to telephones, voicemail,
email and Internet use. Advances in technology now make it possible for
employers to keep track of virtually all workplace communications by any
employee -- on the phone and in cyberspace.
Tractor Trailer Side Underrides- (The Invisible Semi)
In 1967, near New Orleans, actress Jayne Mansfield received fatal injuries
when her automobile struck the rear of a semi tractor, underrode it, causing
her virtual decapitation. The remarkable aspect of that crash is that
it happened over thirty years ago and received much publicity, yet very
little has been accomplished in the ensuing years to prevent similar accidents.
By: Robert L. Parke, CLI
Or Consequences - How To Tell If A Person Is Lying
How to tell in five minutes or less whether someone is lying
Wouldn't it be great if everyone around us -- spouse, friends, business
partners, job candidates, employees -- always told the whole truth and
nothing but the truth? Well, as recent news events have made painfully
dear, when confronted with an accusation of misbehavior, many people compound
the problem by backpedaling, obfuscating, denying, and flat-out lying.
War Against Retail Return Abuses
With the holiday season comes fruitcake, traffic jams and an anticipated
onslaught of must-be-returned gifts from well-meaning (and possibly colorblind)
friends and relatives. But sprinkled amongst those gift-receipt-clutching
consumers are what the industry considers thieves: people who deliberately
use return policies to steal. The tactics vary, from “free customer
rentals”—where someone purchases an outfit, wears it to an
event, and then returns it the next day—to those who purchase two
items that look similar but are priced very differently and then switch
the boxes so they return the cheaper item and get the refunded money from
the higher-priced item.
Ethics of Competitive Intelligence: the Good, the
Bad & the Gray
To many, the term "ethical CI" seems to be an oxymoron, a lot
like "jumbo shrimp". But, a more thorough exam of the professional
literature reveals a broad spectrum of various competitive intelligence
practices, including those that might be considered unethical by many.
A PDF Download- By Arik Johnson
Rules for Proving Fault in Accidents
This article covers general rules used to decide who is at fault for an
accident. A Nolo Press Article
Addiction: The Emergence Of A New Disorder
This article attempts to differentiate addictive from normal use of the
Internet. The paper also documents significant behavioral and functional
differences between those subjects classified as addicts and non-addicts.
On-line addicts in this study spent an average of 38 hours per week on-line,
mostly used interactive applications such as chat rooms and MUDs, and
were unable to control their Internet usage which resulted in significant
marital, academic, and job related problems.by Dr. Kimberly S. Young
FORCE FLASH LIGHT STUN GUN!
MADE FOR PROFESSIONAL NIGHT DUTY!
THE SELF DEFENDER 400,000 VOLT COMBO
400,000 K Volt Stun Gun-Flash Light -130 dB
Alarm-rechargeable Long-Life Battery
Normal Price $69.95 - On Sale Now Only $49.95
Utility Companies By Zip Code
This application allows the user to enter an ZIP Code and get a list of
the Gas, Electric, Water and Incumbent Local Exchange Companies that serve
that ZIP Code.
This page gives you access to all FCC licensing in the USA.
A database of police informants compiled from public records.
Me? The "Reverse" People Finder
Who? Me? is a Reverse People Finder website. A site where someone may
be trying to find you. Is someone, somewhere, looking for you? Could an
old, lost or missing friend be trying to find you?
This SpiesOnline.net page hands you a list of all known online web sites
to obtain restaurant inspection reports.
File To Web Page Generator
This is an Adobe Software page that will take any PDF file and
convert it into an HTML file.
Quatloos is a web site about different kinds of fraud that is quite interesting
Find out if someone is a card-carrying hooker in Nevada! These tools from
Crimes By Stupid Criminals
How stupid can a criminal be? This site kind'a says well..really stupid.
Online Investigative Books
Guide to Sources of Information
This online book has been out for a while but it's recently been updated
and expanded and well worth using.
Contractor Sued Over Iraq Deaths
Raleigh- N.C. - Families of four security contractors whose bodies were
burned and dragged through the streets of Fallujah, Iraq, last year sued
the workers' former company Wednesday. The families contend that the company,
Blackwater Security Consulting, cut corners that led to the men's death.
Investigator Jeff Katz
Federal Legislative Update
The NCISS Legislative Committee, through our retained government relations
expert Larry Sabbath, has been holding talks with the Washington, DC staff
of Senator Dianne Feinstein regarding proposed privacy legislation.
They're Listening When You're On Hold
Melville, NY- It is the opening line on so many phone conversations these
days: This call may be monitored for quality assurance purposes. The taped
message is so common that many callers might assume that no one is ever
listening, let alone taking notes. But they would be wrong.
HOMELAND SECURITY LOGO GOLF SHIRT
American made for comfort and fit!
Masons Murder And Private Investigator Jeff Katz
Calvi's murder is one of the most intriguing mysteries of the 1980s The
Italian courts are preparing to rule on whether four people should face
trial for conspiracy to murder the Vatican banker, Roberto Calvi.
In the heat of a monthslong hacker investigation into an extraordinary
break-in at a leading wireless carrier's network, an Internet informant
approached the Secret Service with startling news: The targeted hackers
were reading some of the agency's own e-mails and computer files.
Investigators Catch Employee Stealing
$90,000 From Employer
Denise Marie, 53, was employed as a cashier at the Grange Restaurant,
which is part of the Bureta Park Motor Inn. But her employer became suspicious
of her expensive-looking jewellery and clothes - and employed a private
investigator and installed a hidden camera to watch her work.
County Anionic In Identity Theft Ring Case
Arizona Daily Sun - Flagstaff,AZ, USA
Tucsom A federal grand jury indicted a Pima County man in an identity
theft ring that victimized as many as 250 people. ...
T-Mobile Hacked, SSN Numbers And
Other Personal Data Taken
A California man faces felony charges of hacking into cell phone company
T-Mobile's computer network to steal hundreds of names and social security
numbers, according to court documents released on Wednesday.
Identity Theft Reported At Mason University
Hacker Gets Into Personal Information Of Students, Faculty, - Fairfax,,
Va. -- Online intruders have hacked into the personal information of more
than 30,000 people affiliated with George Mason University. School officials
said the victims include students, faculty and staff at the school. The
victims have been told their credit and bank account information is at
risk, News4 reported.
Mississippi Changes Driver License Info And Takes
Off SSN Numbers Because Of Massive Identity Theft
If you're a Mississippian whose Social Security number is prominently
displayed on your driver's license, you're advised to report to your nearest
highway patrol office and get it changed.
Charged With Massive Identity Theft In Colorado
The Colorado Bureau of Investigation will charge four people under Colorado's
Organized Crime Control Act in hundreds of identity theft cases.
Identity Theft Around Kansas City
Federal and local authorities are investigating a series of identify thefts
that have victimized as many as 200 people across the metropolitan area
for a loss of about $25,000.
Credit Means Instant Identity Theft
Retailers, banks in a rush make things easy for imposters
A surge in personal bankruptcies isn't the only consequence of America's
addiction to credit. And the problems connected to irresponsible credit
card use are no longer limited to those who don't pay their bills on time.
Anyone can be a victim of the radioactive fallout from the credit culture:
Identity theft and ten million Americans have been victims.
Hidden Investigative Market For Private Investigators.earn All About
A new Investigative Service With Identity Theft That Give You $500.00
Per Case And be People's Lifesaver At The Same Time.
First All Female Investigative Agency
Shut Down By Government
China’s first all-female detective agency has been closed following
allegations it broke the law and overstepped the scope of its powers,
an official at the center said.
CIA Security Experts Saying World Safer
If Ben Laden Stays Alive And Free
THE world may be better off if Osama Bin Laden remains at large, according
to the Central Intelligence Agency’s recently departed executive
Behavioral Profiling Techniques, TSA Training Help Target Suspicious Subway
Metro DC police officers are using new behavioral profiling techniques
as they patrol subway stations, identifying suspicious riders and pulling
them aside for questioning.
Accused Of Trying To Steal From
Fund For Indigents
Georgetown, Ky. - A Covington lawyer who has been representing a man accused
of killing a Georgetown woman has been charged with trying to get an investigator
to improperly bill a fund for indigent clients then split the proceeds
to Get Unprecedented Security
Security for President Bush's inauguration _ the first swearing-in since
the Sept. 11, 2001 terrorist attacks _ will be unprecedented with some
6,000 law enforcement personnel, canine bomb teams and close monitoring
Group Pursues Complaint Against Data Brokers Responds To ChoicePoint ,
Congress And The FTC
EPIC argues that many of the data products sold by companies such as Choicepoint
avoid coverage under the Fair Credit Reporting even though the content
and source of these profiles on American consumers may be virtually indistinguishable
from a credit report that would be covered under the federal law.
Scientist In Crime Lab Tied To Wrongful Convictions In Oregon
A forensic scientist whose testimony helped wrongfully convict two young
men of murder in Oregon has been working for the Washington State Patrol
crime lab since the case unraveled nine years ago.
PI Anthony Pellicano Seeks Nullification
Of His Conviction
Those computer files were seized during a raid on the Sunset Strip offices
of famed private detective Anthony Pellicano. Also confiscated were two
hand grenades and a quantity of C4 plastic explosives, resulting in a
30-month federal prison sentence for Pellicano.
Used As Weapon In Court Case
The Canadian Imperial Bank of Commerce has turned employee e-mails into
a potent legal weapon in an acrimonious court battle with a team of top
executives who left the bank last year to form a competing investment
Systems Deploy Latest Surveillance Technology
WBAL Channel.com - Baltimore,MD,USA
Several school systems in the Baltimore area are embracing the latest
in surveillance technology -- adding digital video cameras that can zoom-in
Devices A Boon For Forensics
When forensic examiner Tim Weaver looks at the computers, cell phones
and PDAs that aid and entertain people, he sees yet another purpose: evidence.
Wackenhut, Security Industry Giant, Dead At 85
George Wackenhut, the former FBI agent who became a leader in the private
security industry, died on Dec. 31 of heart failure. He was 85. Mr. Wackenhut,
who retired to Vero Beach, and three former agents started a private investigation
company in Miami in 1954.
GENERATION STUN GUN
IT'S A POWERFUL STUN GUN, BRIGHT FLASH LIGHT AND PEPPPER SPRAY- ALL BUILT
INTO ONE POWERFUL UNIT!
ON SALE NOW! Normally $69.95 Only $49.95!
Fanatic On Trial
Philadelphia— A disgruntled sports fan is on trial, accused of sending
thousands of angry e-mail messages that appeared to be from Philadelphia
Maker Disputes Taser's Claims
Stun-Gun producer Stinger Systems Inc. is countering legal claims by Taser
International Inc., which has accused the Charlotte company of making
misleading statements about Stinger products.
Web Site Claims To "Out"
Would-Be Child Molesters
The people who run Perverted-Justice.com say their goal is to "out"
child predators whose anonymity allows them to lurk in the shadows of
the Internet. But critics say the group — whose members insist on
anonymity themselves — is nothing more than an Internet lynch mob
that operates in the same kinds of shadows they claim to illuminate
Suranne To Play PI
Sky News - UK -Suranne Jones will go from soap star to private investigator
in her first role since her tearful departure from Corrie. The 25-year
Employee Of Missing Candy Heiress Says She Was Shot
Chicago,IL- ... Amendment in front of a grand jury, he failed a lie detector
test and he hasn't been talked to since," said Ernie Rizzo, a private
investigator who believes ...
Booked With Cyber Stalking
Deputies arrested three Loranger High School students Wednesday following
a week-long investigation into the teenagers' Web habits and booked them
with cyber stalking, the Tangipahoa Parish Sheriff's Office said
Arises Over Public Records Act In Ca
Santa Cruz County changes tune on access to original documents - While
Santa Cruz County voters recently gave their overwhelming approval to
a guarantee of access to public records, the county government has cut
off that access, a local businessman said.
Wife, a Short Story by Philip Beloin, Jr.
It's a private investigator's bread and butter: is the wife cheating?
She's a platinum blonde with perfect measurements and not an iota of fat
on that gorgeous body. But how smart is she?
Ramotswe No. 1 Ladies' Detective Agency
Mma Ramotswe had a detective agency in Africa, at the foot of Kgale Hill.
These were its assets: a tiny white van, two desks, two chairs, a telephone,
and an old typewriter. Then there was a teapot, in which Mma Ramotswe-the
only lady private detective in Botswana-brewed redbush tea.
Society Hides In The Shadows
For these online bootleggers, who authorities say represent the top of
a distribution pyramid for pirated movies, software and music, it's all
about the bragging rights for being first to copy a hot title or releasing
the best-quality replica.
New Generation 9.9 Mega Pixel Digital Camera/Camcorder!
Up To 7,000 pics or 10 Hours Of Video
Wireless Color Camera With Color Screen Receiver
This video camera
set contains a 2.4 GHz wireless color camera and a 5.5 LCD wireless receiver/monitor.
Both the camera and receiver/monitors are four channel. The color monitor
contains a 5.5 inch LED screen for sharp crisp clear full color viewing.
The camera has 330 lines of resolution and a 2 lux rating. FCC approved.
Very limited supply at this price. On Sale Only $350.00
Turns Your Computer Into A High Tech Video Monitoring Station You Can
Access From Anywhere In The Word. Use Your Existing Cameras Or Obtain
Specialized Cameras. Access Video From The Internet. Have System Contact
You By Phone, Email, Cell Phone Or PDA When It Detects Motion!
Built Into A Working Pen!
Silently And Covertly Detects Bugs, Wiretaps,
Hidden Cameras And Other Eavesdropping Devices!
Tiny Digital Video Recorder!
World's Smallest Digital Video Recorder With Screen!
So Small Optical Magnification Is Used To Make It. Up To 8.8 Hours Recording
time. Ideal For Covert Use. You got'a See This One To Believe it. Free
Wireless VIdeo Camera With Purchase!
Skip Trace Training Manual
Room Polo Shirt
Spy Finder!- Detects And Locates Any Overt Or Covert Video Camera Wired
Or Wireless From 50 Feet Away!
Briefcase. With Several Remote Controlled Security Modes, This Case Gives
You Complete Loss-Proof, Snoop-Proof Theft Proof And Robbery Proof Functions!
Designed For Diplomatic
Level courier security.
The Booming Area Of
#1 Camera Clamp
World's Smallest Camcorder,
Digital Camera & Audio Recorder! You Have To See It To Believe It
SEE BEHIND YOU
Sun Glasses Only $19.95
Two Pair For $29.95
35% To 50% More Facts
Vastly Increasing Your Investigative Interviewing & Statement Taking
Skills With This Ground-Breaking Fun To Take DVD Training Material
Real Time GPS
Cigarette Lighter Digital Camera-Sale!
Amazing! You Got'a See This!
Tiny Multi-Function Cigarette Lighter Digital Spy Camera!
Generation Wireless Micro Video Camera