Wednesday, September 30, 2009

20 Year Old Case of Murdered Private Detective Starts Monday

THE murder trial of a private detective killed in one of Britain's most controversial unsolved cases is due to start this Monday.
Five people are due to stand trial at the Old Bailey in connection with killing of 37-year-old Daniel Morgan who was found dead with a hatchet buried in his head in the Golden Lion pub in Sydenham in March 1987.

Ex-Scotland Yard detective Sid Fillery, 61, is charged with perverting the course of justice.

James Cook, 53, of The Glade, Kingswood, Tadworth, Surrey, Garry Vian, 47, of no fixed abode, his brother Glenn Vian, 49, of 94 Orchard Road, South Croydon and Jonathon Rees, 53, of Village Close, Weybridge, Surrey are all charged with murder.
Read more here.
AddThis Social Bookmark Button

Background Check Leads to Arrest in a 1976 Killing

It's the unexpected break investigators were hoping for. After 33-years on the run, a suspect in the disappearance of a Kirkwood woman is finally in custody in Georgia.

Authorities said the suspect, 65-year-old Johnny Wright, accidentally alerted them to his outstanding murder warrant when he asked for a background check for a new job. Police in Lawrenceville, Georgia do not think Wright realized what he was doing when he asked for that background check. They said he paid $15 to get arrested for the murder of Becky Doisy.

Doisy disappeared back in August of 1976. She was a Kirkwood native, granddaughter of a Nobel Prize-winning biochemist, and a waitress at Ernie's Steak House in Columbia. Years of searching turned up no sign of her.

"We do feel that she's been murdered," said Harriett Doisy, on the anniversary of her daughter's disappearance in 1977.

Read more here

AddThis Social Bookmark Button

Monday, September 28, 2009

Mafia Engages in Cyber Crime

As if CSOs don't have enough on their plates, they now need to beat back made men, capos and the other elements of the Mafia. Yes, the Mafia is formally involved in cybercrime, or so alleges the U.S. attorney for Florida, who filed charges against associates of the Bonanno crime family that included pilfering data from Lexis-Nexis.

The Mafia engaging in cybercrime might sound like your grandmother joining Facebook. In fact, "the majority of data breaches are the result of organized crime," says Nick Holland, an analyst at Aite Group in Boston. That doesn't mean it's the conventional Mafia pulling the strings--though it can be. In fact, it's hard to tell just who is in control sometimes. For the most part, cybergroups that become notorious, like the Rockfish or the old Russian Business Network, do so because very few cybercrime groups publicize themselves, says Steve Santorelli of Team Cymru. (Cymru, pronounced cumri, is the Welsh word for Wales.)
In fact, observers sometimes disagree on just who's behind a crime. Take last year's RBS Worldpay scam, which saw hackers not only make off with 1.5 million records from the electronic payments processor, but make fake ATM cards used to withdraw more than $9 million in 49 cities around the world in a one-hour period. Frank Heidt, CEO of Leviathan Security in Seattle, thinks this was a case of an extremely well-organized group with roots in Russian organized crime. Peter Cassidy, director of research at Triarche Consulting Group in Cambridge, Mass., says it looks like a franchise-style operation in which the data and details on how and when to use it was sold to groups operating in different regions.

Read more here.
AddThis Social Bookmark Button

Reasons why Internet Private Investigation is Taking Over the Online World

Why are internet private investigation services important now? It is because more and more people are putting all their information on the Internet.

People do not want to be left out of the modernization that is happening in the world today. So to become in tune with technology, they eagerly embraced the online world.

To be one with the online world, your information is needed so that it would be easy for other people to find you. Oftentimes, when conducting business online, you give out details that should have been kept private. When this happens, you are very much prone to those that can easily intercept all the information even before they reach the intended destination.

Before you know it, another person has gotten hold of your credit card and is using them for their own personal purpose. The worst thing that could happen is when your identity is stolen just because that person knows everything about you.

In answer to all these online crimes, Internet private investigation services opened their doors to counter wrong doers. These investigators have comprehensive knowledge about what people are capable of doing using the internet. Using every means of internet software and tools, they can track down illegal procedures immediately.

You can tell how effective these investigators are by the number of crimes and criminals that they have cornered on the internet. You may think that programs or other tools are the ones capturing these persons. What you may not know is that there are real people behind who is doing the job for you.

Most online businesses enlist the services of private investigators online to filter out the good from the bad. These businesses know that they are vulnerable to persons that want to take advantage of what they have. Since they cannot prevent people from accessing them online, the only way they can prevent unwanted things from happening is to have investigators check every detail about the online visitors.

One of the useful things that private investigators use in their internet service is computer forensics and public records available in online databases for general public. This is not like the forensics that is being done physically.

Expert technicians are the persons capable of looking out at computers. They look at the sources of documents and data storage systems. They make sure that the systems remain clean of hackers or unwanted and suspicious entries.

It is also their duty to track down where unwanted entries are coming from. When they have carefully investigated all the details, they report their findings directly to their clients. It is during this time that the business is able to figure out ways on how to solve these problems, change their system and bring the intruder to justice.

Internet private investigators are not only limited to crimes that are going around the internet. They do simple things like recovering of files. They are trained well in this field also. Part of their job is to maintain the smooth sailing operation of the online business.

Read more here.
AddThis Social Bookmark Button

Friday, September 25, 2009

Security System Brings Big Brother to Life

Researchers are looking to develop an intelligent image system that can monitor large areas, perhaps miles wide,  identify potential threats based on the correlation of events and anomalies it detects, and issue timely alerts with few false alarms. 
Such a surveillance system is at the heart of what researchers at the  Defense Advanced Research Projects Agency calls a Persistent Stare Exploitation and Analysis System (PerSEAS) that can automatically and interactively discover intelligence from optical or infra-red devices in the air on drones, for example, or spread over urban, suburban, and rural environments.
DARPA said it envisions two major applications for such a system.  Perhaps most important,  the first would use the system in a near real-time mode to receive alerts and warnings to react to and avert disasters. For example, if it notices a number of activities that were out of the usual, such as the gathering of lots of soldiers and trucks it could alert local authorities.
The second would be to use the data gathered from the system to use archived data from the system to analyze events, such as an attack to determine the movements and origins of the entities involved in the event, DARPA said.   For both types of applications DARPA said the PerSEAS system ideally could receive or generate cues from/to other sensor systems to identify places or people of interest for additional details.
Overall the challenge is to identify potential threats based on the accumulation and correlation of multiple events and anomalies, and issue alerts so military folks in the field can take quick action or other officials can alert the public of problems, DARPA said.
Specifically the PerSEAS system will gather data from sensors and feed the data into an intelligent software engine supporting algorithms that discover relationships and anomalies that are indicative of suspicious behavior, match previously learned threat activity, or match user defined threat activity should also be incorporated, DARPA stated.

Read more here.
AddThis Social Bookmark Button

Thursday, September 24, 2009

Obama Stands Behind ‘State Secrets’ in Spy Case

SAN FRANCISCO – Hours after the Justice Department announced it would limit its use of the state secrets privilege in new cases, the administration appeared before a federal judge here Wednesday and continued to invoke that defense in a closely watched spy case.

The litigation at issue, now five years old, tests whether a sitting president may bypass Congress and adopt a warrantless surveillance program, as President Bush did in the wake of the 2001 terror attacks.

“We need to protect information concerning the manner and methods by which we seek to detect and prevent a terrorist attack,” Justice Department special counsel Anthony Coppolino said Wednesday while arguing to a federal judge to dismiss the case on the basis of state secrets.

The 5-year-old case, having a tortured procedural history, is the furthest along in challenging the Bush administration’s warrantless Terror Surveillance Program.

Read more here.
AddThis Social Bookmark Button

Iphone App Acts as Personal Private Investigator

In less time than it takes to share a drink, a new iPhone application can tell you whether your date is a dream boat or a dirt bag.

On Tuesday Intelius, a Bellevue-based company, launched Date Check, a mobile application that acts like the user's own private eye.

All you need to enter is your date's name, e-mail or phone number, and the application, which cross-references public records, lets you know if your date is really who you think he or she is.

"You can find out all kinds of things, from drug possession to DUI, to sexual assault and battery, to sexual offenders," said Sue Koehler Intelius' chief marketing officer. "Some things aren't serious, but some things are very serious things you should be aware of."

Read more here.
AddThis Social Bookmark Button

Tuesday, September 15, 2009

Missing Persons Group Celebrates 15 Years of Service

Wilmington, N.C. – While it’s the CUE Center’s birthday, the all-volunteer missing person’s organization is giving a gift at a celebration this Saturday to mark the group’s 15th year of service working on the behalf of missing persons nationwide.

Monica Caison became a tireless advocate for the missing after being exposed to the families of missing persons at least three times before she was 25 years old. In 1994, she singlehandedly started the non-profit Community United Effort (CUE) Center for Missing Persons from a tiny back yard shed and a mere $76.00 dollars in Wilmington, North Carolina.

Now, the non-profit group, which is entirely funded by donations, has hundred’s of volunteers aiding the centers mission and receives calls for help from across the nation. CUE Center is proud of their all-volunteer network made up of more than 8,000 people and professional search groups — all of whom share the same goals: to find the missing, to advocate for their causes, and to support their families through what is often the most confusing and desperate times of their lives.

Read more here

AddThis Social Bookmark Button

Learn to Make a Home Surveillance System

Make a Surveillance Video Camera at Home
A video surveillance camera is something which you should have in your home, if you want to beef up your home security. Video surveillance camera’s are great if you want to keep an eye on your home, car, children, other belongings etc. No matter what you need the camera for, its always going to prove itself useful. However getting a video surveillance camera in today’s world is going to put a big dent in your pocket. Even if you purchased it from a web store, you would still have to pay for installation anyway. So keep reading if you want to know how to make your very own surveillance system to check on your belongings and may be neighbors as well !

Buying a surveillance system that is very basic in nature will cost you around $300 or more. Frankly speaking, that’s too much for a home security system, but this is what most electronic stores will charge you. However, you might not be aware that you can still make a home surveillance system by the help of a webcam or webcam capable digicam or camcorder.


There are number of benefits of doing this. First of all, you might already possess a webcam that is not in use and lying around your house. If not then you can easily purchase it, since they are cheap to purchase. Say around 50$ or more, but its still less in comparison to the $300 that you would spend on the home video surveillance camera. Secondly, webcams are not very noticeable, so not many people would look at them. This would allow us to watch all the action happening outside, without the knowledge of the person standing in front of the door.

Read more here.
AddThis Social Bookmark Button

Monday, September 14, 2009

Canadian Private Schools Hire Private Investigators to Check Parents

Several Vancouver private schools are screening applicants to determine if their families are linked to gangs and pose a risk to students and staff.

``We have recently been engaged by private schools in the Vancouver area to conduct due diligence on the families of prospective students,'' Kim Marsh, managing director of private investigation firm IPSA International, confirmed to the Vancouver Province.

Marsh, a former RCMP inspector who headed a police organized-crime unit, won't identify the schools, for privacy reasons, but he acknowledged ``it's fair to say'' his business has increased following the shooting of West Point Grey Academy parent Betty Yan, in April.

Read more here.
AddThis Social Bookmark Button

Friday, September 11, 2009

Casey Anthony Case Turns to Private Investigator

Attorneys for a Central Florida woman suing murder suspect Casey Anthony for defamation continued to fight Wednesday to question a private investigator involved in the case.

Dominic Casey said the information he may have is confidential since he was working for Casey Anthony, her parents, Cindy and George Anthony, and her defense attorney. He testified Wednesday he entered into contracts with the family and the defense team in July 27, 2008, 12 days after Casey Anthony's daughter, Caylee, was reported missing.

Read more here.
AddThis Social Bookmark Button

Wednesday, September 09, 2009

NY Times Leaks Kennedy's Book, Publisher Hires Private Investigator

All hell broke loose at the Hachette Book Group building last week when The New York Times published a story detailing some of the most newsworthy bits contained in the late Ted Kennedy’s forthcoming memoir, True Compass. A spokeswoman for the paper said Times reporters had purchased multiple copies of the book at a bookstore the day before, and, much to the chagrin of Twelve publisher Jonathan Karp and his publicity director, Cary Goldstein, quickly broke the strict embargo that the imprint had tried to impose on it. The trouble was, of course, that the $8 million memoir wouldn’t be hitting stores for another 11 days, and all the publicity generated by the Times piece—not to mention the glowing review by Michiko Kakutani that ran the following day—was likely to confuse and frustrate customers who went looking for it in the meantime.

Read more here.
AddThis Social Bookmark Button

Tuesday, September 08, 2009

Lindsay Lohan Hires Private Investigator

Lindsay Lohan's house has been burgled.

The 'Mean Girls' star returned to her home in Los Angeles' Hollywood Hills to find it ransacked.

The 23-year-old star's mother Dina said: “The safe was ripped out of the wall, and the door was off the hinges and door handles removed. Bags, Lindsay's father Michael is convinced the burglary was an "inside job" and has hired a private investigator to look into the case.

He said: "I’m sick of people bugging my daughter and using her. This is not the first time she’s been robbed. I’m working with the police but at the same time, I have my own people.

"I’ve hired private investigators and I’m going to work my own investigation and find out who did this. Lindsay is not OK. She’s very upset and feels extremely violated.shoes and jewellery were taken too.


Read more here
AddThis Social Bookmark Button

Friday, September 04, 2009

Westside Private Investigators Flourish

THEY say cheaters never prosper but the industry set up to catch out those who stray is doing just that.
Sales of spy equipment are reportedly up and one private investigator has found the field so successful - and so colourful - she has written a book about it.

Next month, the westside-based Tiffany Bond, founder of Detection Group. will launch Confessions of a Female Private Investigator, a fictionalised account of her work exposing infidelity and betrayal.
The 35-year-old former police officer, who once caught her now ex-husband cheating, said she found it to be common practice in the western suburbs.

``We’ve got everyone from housewives, business men, cleaners to chief executive officers,’’ she said.

``If this book makes someone think twice about betrayal, or supports them in leaving a relationship, or encourages them to seek help then I have achieved what I set out to do.
Read more here.
AddThis Social Bookmark Button