Friday, March 30, 2012
Thursday, March 22, 2012
Skip Tracing is locating a persons whereabouts.
Some possible reasons to use this service include:
- Bad debts
- Avoiding lawsuit or judgment
- Abusive home life
- Mental illness
- Locating long-lost relatives/friends
With skip tracing, it is important to verify and follow up the data found, then search other sources until all leads are exhausted.
Tuesday, March 13, 2012
Writing PIs recently detailed that private investigators solve murders. Well of course we do! As they state:
It’s true that PIs, who are civilians, are less constrained by government rules — for example, PIs are not bound to the same evidentiary laws as law enforcement. It’s an assumption, however, that an experienced PI, especially one who specializes in legal investigations, would use “unknown” methods for obtaining evidence. In our investigations agency, we’ve gathered evidence using established rules and procedures to establish chain of custody (documented procedures demonstrating how we got evidence from where it was to our evidence locker). These procedures guarantee reliability and have resulted in courtroom admissibility and victory for the lawyers who employed us.
Friday, March 9, 2012
Q. What is Security Consultation?
A. Security consultation is a term used when we are asked to give the "best" security practices or advice on technologies or software that will help improve security of a system. This service is linked to vulnerability testing and security auditing, however it is not seeking a security hole or vulnerability, rather it is giving advice on how to lock down a system without performing an audit or test of the system in question.
Q. Why do I need a security consultation?
A. To protect your enterprise from losses, regardless of the size of the business. These losses are estimated to cost U.S. businesses millions of dollars each year.
Q. What sorts of things are included in a security consultation?
A. No security plan or program can be effective unless it is based upon a clear understanding of the actual risks it is designed to control. Specific areas of the business operation are scrutinized including; perimeter and facility security, cash handling procedures, computer security, proprietary information, hiring practices, benefit abuse, emergency procedures, and contingency planning.
Q. What do you provide to me?
A. A comprehensive written report is provided identifying the risks and vulnerabilities of your business. This analysis results in the development of specific countermeasures and corrective recommendations to reduce or eliminate the risks.
Q. We had a security consultation some time back. Should we repeat the process?
A. This service is recommended to be performed at least once every two years.
Sources: Maley Investigations, Daniel Securities