Tag Archives: Investigative Tools

How hard is it to get a warrant?

cell phone recordConnecticut claims it is too hard to get a warrant to obtain the cell phone records. In Connecticut-the police can obtain the cell phone records of “anybody” with an “ex parte  application. Here is the article from “a public defender”.

Click here to read the story



Leave a comment

Filed under Investigative Tools, Laws effecting Investigators, News of PI's, Professional Investigations

Don’t use cellular phone to track without a warrant

cell phone track“Police violated a burglary suspect’s state constitutional right to privacy when they located him using cellphone tracking information without first obtaining a warrant, a New Jersey appeals court ruled on Friday.

Read more: http://www.njlawjournal.com/id=1202642187228/Tracking-Suspect%27s-Cellphone-Without-Warrant-Flouted-Constitutional-Rights#ixzz2tJTc9thZ

Leave a comment

Filed under Domestic Investigations, GPS, Laws, Laws effecting Investigators, News of PI's, Professional Investigations, Surveillance

Spyware on your cell phone?

Several mobile phones
Image via Wikipedia

From Tom Slovenski, of Cellular Forensics

How do you protect a client and their information from thieving eyes and stalking ex-lovers?  How do you protect your own phone as well.  Here are a few simple tips.

  1. Never let anyone you do not know use your cell phone.  Don’t loan it out.
  2. If the phone is lost or stolen and  then recovered, do not use it to transmit sensitive date until it has been thoroughly checked by a cellular professional as it could have become infected.
  3. Turn off the “Bluetooth” when not is use. There is no need for an “open door” when you are not using a secure headset. For added security, use a wired headset.
  4. Do not accept any connection with which you are not familiar.  If you are sitting in a Starbucks and your phone is asking permission to hook on to a device with which you are not familiar…refuse the connection.
  5. Do not open attachments from a party you do not know
  6. Password protect your phone. This will eliminate 95% of problems. If the phone is locked down, the bad guy can’t get into it.

What if the person thinks the phone is already “bugged”? What are some of the signs?

  1. Are there too many “coincidences” in the client’s life? Is the information being transmitted from their phone seemingly winding up in someone else’s  hands. In a conversation, does the other party relate confidential information you did not disclose to them?
  2. Was the phone recently lost and then recovered?
  3. Has the person recently been through a traumatic experience with an ex-lover, spouse or business partner?
  4. Is the person in the midst of a highly charged court battle?
  5. Is the battery area hot to the touch? (The extra transmissions of the spyware to the other party pulls on the battery power)
  6. Does the battery drain quicker than it used to? (Again, more transmissions, less power)
  7. Does the phone light up for no reason?

For the complete article, see PI Magazine, June 2009 edition, or Tom’s website, www.cellularforensics.com, then click on Articles.

Reblog this post [with Zemanta]

Leave a comment

Filed under Home

GPS and the investigator

Here is a story provided by Jim Mabry. Just another day on the job…Hingham, Mass.


POLICE NEWS: Private investigator eyed in bomb scare

Thu Apr 16, 2009, 03:02 PM EDT

Hingham –  

The private investigator, who police believe, is responsible for installing a GPS unit under a car that public safety officials thought was a bomb could face felony charges and have to cover the cost of a 4- hour investigation.

Police spokesman, Lt. Michael Peraino, said a concerned resident in the apartments at One Station Street called police at 5:10 p.m. on Tuesday (April 14) after looking out his window and seeing a man pull up in a car with Florida plates. The witnesses reported the man got out of his car and went over to a green Honda that was parked in the apartment complex’s parking lot. He then got on the ground and went underneath the Honda. The witness said he looked like he was putting something under the car.

Police officers arrived and saw a device under the Honda but could not identify it. The owner of the car, who is from Brazil, was out of town but due back that night, police said. The owner of the Honda lives at the complex and has been having a child custody dispute with his wife.

“The Hingham Fire Department was dispatched to the scene but also could not identify the device. The State Police Bomb Squad was called and the MBTA was notified to stop all Greenbush trains, police said.

The area was evacuated. The bomb squad used a robotic camera to take a look at the device but could not identify it. The bomb squad then used at water canon that fires water at high pressure to knock the device off the car. The device turned out to a GPS unit.

The private investigator could be charged with possession of a hoax device and be responsible for paying the cost of tying up police and fire departments and stopping the train.

For the full story, click here

Leave a comment

Filed under GPS, Home, Investigative Tools, Laws effecting Investigators, News of PI's, Professional Investigations

Where is the bailout money going?

Below is a link to website Pro-Publica.

It is an independent, non-profit newsroom that produces investigative journalism in the public interest. Our work focuses exclusively on truly important stories, stories with “moral force.” We do this by producing journalism that shines a light on exploitation of the weak by the strong and on the failures of those with power to vindicate the trust placed in them.

Eye on the Bailout

Bailout Recipients

This list shows a breakdown of where the Treasury Department, authorized by Congress, has directed taxpayer money in the ongoing bailout of the financial system. It accounts for both the broader $700 billion bill and the separate bailout of Fannie Mae and Freddie Mac, to which Treasury has set a limit of $400 billion.

This is a list of companies that have been allocated funds. To see a complete list of Treasury’s programs – including those for which no recipient data is available – see our programs page.

Last updated: Apr. 15, 2009. Return to our main bailout page.

For the list click here

Leave a comment

Filed under Fraud Investigations, Home, Investigative Databases, Investigative Research, Investigative Tools, Professional Investigations

Investigative Research and the Internet

CHICAGO - FEBRUARY 23:  Google employees wait ...
Image by Getty Images via Daylife

From Law.com a very interesting article

Evidence in an Age of Self-Surveillance

George Orwell’s state-run surveillance society had children spying on parents, neighbors scrutinizing neighbors and Big Brother watching over everyone. What Orwell did not foresee was a time when people would voluntarily publish chronicles of their lives for public consumption.

Imagine bookstores suddenly inundated with truckloads of privately published diaries, photo albums and home movies. An unlikely scenario until the mass marketing of computers, digital cameras and Internet access provided an inexpensive outlet.

Millions are participating in online social networks in an age of unprecedented self-surveillance (sousveillance). And these sites are pushing criminal investigation into uncharted waters.

Two of the most popular networking sites are MySpace and Facebook, each of which boasts over 100 million users. And according to a 2008 Pew Internet and American Life Project survey, the numbers of adult users with online profiles increased more than 400 percent over the last four years.[FOOTNOTE 1]

Evidence derived from social networking comes into play in several ways. Law enforcement and prosecutors use it to identify suspects and build cases. And defense attorneys have begun to mine this resource for information that can exculpate their clients, impeach a state’s witness or provide a basis for a reduced sentence or post-conviction review.

A couple of months ago, Newsweek reported on an investigation concerning the murder of a British college student in Italy.[FOOTNOTE 2] The suspects in that case were identified through Skype, an Internet phone service; and additional leads revealed by photos and short stories appearing on a Facebook page, an unsettling YouTube video and queries found in the history of a Google search engine. All told, these social networking and Internet communication sites collectively created a “virtual crime scene,” the output of which is finding its way into the courtroom.

In a Niagara County Court, a judge increased the bail of a defendant charged with felony assault and misdemeanor weapons possession based on pictures found on a MySpace page.[FOOTNOTE 3] The accused had been released on $5,000 bail, but during his arraignment the prosecutor introduced 10 pages of MySpace photos. They allegedly showed him wearing gang clothing, giving gang signs and standing with others in gang colors. Based on this and other information supporting a likelihood of conviction, the judge raised bail to $50,000.

And during a Michigan murder trial, the prosecutor introduced Molineux-type evidence of intent and planning from defendant’s MySpace site. The evidence in People v. Liceaga, 2009 Mich. App. LEXIS 160 (Mich. Ct. App. Jan. 27, 2009), included photos of the accused with a gun, purportedly used to shoot the victim and “throwing” a gang sign. Admission of the images was upheld on appeal because they established familiarity with the weapon and a pattern of threats made to other victims.

Social networking evidence plays an increasingly important role at other stages of the criminal process.

In United States v. Ebersole, 263 Fed. Appx. 251, 253 n.4 (3d Cir. Pa. 2008), a sentence of supervised released for interstate stalking was revoked because it was claimed the defendant sent a threatening e-mail to the victim. “At the revocation hearing,” the court said, “Ebersole testified that he used his MySpace web page as a ‘vehicle to voice [his] frustration.’ (App. 29.)” The court admitted the profile page evidence to put the message in context.

Recently, in People v. Fernino, 2008 NY Slip Op 28044, 3 (N.Y. City Crim. Ct. 2008), a Staten Island judge held that a friend request intended to reach the complainant’s MySpace page violated the “no contact” provision of an order of protection. “The defendant should not be exculpated because she, instead of contacting her victim directly, used the MySpace Mail Center Friend Request Manager,” the court said.

In both cases the indirect nature of the communication was an unavailing defense. However, communication is a two-way street, and as illustrated below, the actions of the recipient may determine the outcome of a case.

In People v. Rodriguez, 2008 NY Slip Op 28123, 5 (N.Y. City Crim. Ct. 2008), an 18-year-old defendant’s expression of “unrequited teenage love” for a 14-year-old complainant via MySpace failed to reach the level of aggravated harassment.

A key factor in dismissing the charge was the complainant’s willingness to access defendant’s messages on her page. No attempts were made to block them nor did she ask him to desist. At some point, the prosecution claimed she disabled her account, but offered no evidence to determine when it occurred or whether it was done in response to defendant’s epistles.

The virtue and vice of social networking, and the Internet in general, are that it empowers everyone to be an investigator. But incautious use of publicly accessible profiles can lead down the wrong path in some cases.

A North Carolina resident had been arrested and prosecuted for injuries to a victim in an Albany bar fight.[FOOTNOTE 4] Some time after the incident, the victim had gone to a MySpace page where he saw an image of a person he thought was the attacker. Meanwhile, the man in the photo, who lived more than 700 miles away, denied ever having been in Albany. One DNA sample later, the case against him was dismissed.


Internet searching has emerged as a necessity in legal investigation. And with the advent of Google cache and the Wayback Machine to resurrect defunct sites and links, the search parameters have broadened. And now social networking is redefining due diligence in online investigation.[FOOTNOTE 5]

Sites like Facebook and MySpace may hold the keys to an alibi,[FOOTNOTE 6] justification or mental health defense or mitigating evidence. In addition, they may provide material to impeach law enforcement and expert witnesses or assail the credibility of eyewitnesses.[FOOTNOTE 7] Mistaken identifications and false or misleading information might be uncovered as well.

A defendant’s social networking page can also be turned to advantage because, like most personal sites, it represents part of a life story. There may be postings that show strong roots in the community supporting a bail application or positive reputation evidence from testimonials useful in developing a defense theory or mitigation at sentencing.[FOOTNOTE 8]

Depending on the material posted, it could prove to be a valuable snapshot of a client’s experiences — similar to a day in the life movies used in civil litigation.


These sites can open the door to opinion making, where the power of one person or a 1,000 to post their views about a pending case can impact due process.

In United States v. Boyd, 2007 U.S. Dist. LEXIS 88493 (E.D. Tenn. Nov. 30, 2007), the accused moved for a change of venue based on pretrial publicity. In addition to TV broadcasts and newspapers articles, attorneys involved with the defense testified that there were YouTube videos, opinions about the case posted on Internet news sites, and extensive Google search results concerning the victim. All of the electronic information was available to any potential juror in the venire district.

While the attorneys could not determine how many potential jurors might have viewed the YouTube videos, for example, they noted: “[A]nyone, located anywhere on Earth, with access to a computer and the internet, could create a video about Christian and Newsom [victims], or the prosecutions arising from their deaths, and put it on YouTube.”

The trial judge denied the motion as premature, being unable to determine the existence of actual prejudice, and instead granted a defense motion for individual voir dire as needed.

The dangers of jury pool contamination intoned by the defense attorneys in Boyd were realized in a West Virginia case.

K.J., one of the alleged sex abuse victims in State v. Cecil, 221 W. Va. 495, 504 (W. Va. 2007), had a MySpace account. A private detective working for the defense testified that she posted a statement about being “famous someday,” and “used the website to communicate with older boys contrary to her mother’s testimony that K.J. was now withdrawn and did not like to be around older boys or men.”

The curiosity of two jurors got the better of them, and during trial they tried to visit K.J.’s MySpace page. However, the profile had been restricted or removed before trial and inaccessible — reducing its prejudicial impact. Still, one of the jurors did discuss the site with her daughter, who knew the other victim and her family. While the jurors’ attempted investigation was not productive, their actions combined with other misconduct by a third juror denied Cecil a fair trial.

As this next case illustrates, Web sites have to be seen to be impactful.

In State v. Gaskins, 2007 Ohio 4103, P30-P35 (Ohio Ct. App., Medina County, Aug. 13, 2007), the defendant was charged with sex crimes against two underage victims. During trial, he attempted to introduce evidence that one of the complainants held herself out on her MySpace page as an 18 year old with experience in adult sexual relationships.

The court permitted photos of the victim from that site to be admitted based on testimony about her appearance at the time. However, since no proof had been offered that the defendant had ever seen the site, and it was created after the event, questioning about the MySpace page was not permitted.

Jury selection has to take into account the fact that many in the pool will be familiar with social networking and Internet searching or have their own sites.

In view of the potential for unwanted publicity or juror curiosity, voir dire and jury instructions should consider how these sites can infiltrate and influence the proceedings. The questions from the Pew survey might suggest a few starting points.[FOOTNOTE 9]


Since Web pages can change or disappear, archiving or making a demand for preservation may be necessary. Admission or exclusion of testimony about the contents may hinge on this early capture of Web content.

Distinct from content is the conduct of the person profiled, whether a party or witness. The act of removing a page, privatizing access or changing the nature of the material posted may be probative as a virtual recantation, recent fabrication, inconsistent statement or basis for impeachment.

Depending on the reason that a complainant shuts down her site or a witness restricts access to his MySpace page, the next step may involve a subpoena to the networking host, a discovery motion, a Rosario demand or preclusion motion, and ultimately, an adverse inference jury charge.[FOOTNOTE 10]

Foreclosure of such evidence might run afoul of the confrontation and compulsory process clauses.

Moreover, if photos from Facebook were used in an identification proceeding or statements on a blog found their way into a search warrant application, there might be a basis for suppression.

The integrity of self-published online information depends on its authenticity and reliability. Well-known phenomena plaguing Web sites apply with equal force to social networking, such as hacking, identity theft, malicious misinformation and misrepresentation.

The Pew survey reported that 4 percent of users deleted their profiles because their page had been hacked or password stolen.

Social networking sites are personal. They represent an extension of conversations that take place between friends or reveal the desire to create casual relationships. The informality and dubiety of their content can be questioned. Whether offered as evidence by the prosecution or considered for use by the defense, fact checking is essential.[FOOTNOTE 11]


Media rich social networking sites have pulled back the curtain on the activities of multitudes. And lawyers are representing an increasing number of clients with an online presence, and trying cases where complainants and witnesses post information that can lead to impeaching or exonerating evidence.

Criminal defense is now virtual defense. And unlike memories that fade with time or physical evidence that deteriorates, a Web site will continue communicating to a global audience for a long time.

What will it mean when we live in a society where everyone knows everything about everyone? And how will it affect the rights of defendants to confront their accusers and prepare their cases?[FOOTNOTE 12]

A world with “virtual crime scenes” demands a comparable set of safeguards to ensure access to and the integrity of the virtual evidence that is fast becoming a staple of criminal prosecutions.

Ken Strutin is director of legal information services at the New York State Defenders Association.


FN1 Pew Internet Project Data Memo: Adults and Social Networking Web Sites (Jan. 14, 2009). See “New Numbers on Social Network Usage,” CNET News, Feb. 10, 2009, .

FN2Murder Most Wired,” Newsweek, Dec. 3, 2008.

FN3MySpace Page Used Against Gang Suspect,” Buffalo News, Jan. 23, 2009.

FN4Bar Brawl Indictment Dismissed,” Albany Times Union, Feb. 18, 2009.

FN5 See generally “Due Diligence With Social Networks,” Law Technology News, Dec. 12, 2008, ; “Making Internet Searches Part of Due Diligence,” Los Angeles Lawyer, Feb. 2007, at 46.

FN6 See, e.g., “Lack of Internet Access Muddies Case Against Sex Offender’s MySpace Site,” Law.com, Nov. 6, 2006.

FN7 See, e.g., “MySpaced-Out Cops: NYPD Eyes Web Pages of Recruits,” New York Post, Jan. 21, 2009; “Litigation Clues Are Found on Facebook,” National Law Journal, Oct. 15, 2007>

FN8 But see “Social Networking Puts the Bite on Defendants,” Law.com, July 22, 2008; “Danger of Self-Inflicted Damage on the Web,” Pennsylvania Lawyer, November/December 2008, at 34.

FN9 Cf. “Social Networking Sites Help Vet Jurors,” National Law Journal, Aug. 13, 2008.

FN10 Cf. “MySpace, Facebook Pages Called Key to Dispute Over Insurance Coverage for Eating Disorders,” National Law Journal, Feb. 1, 2008.

FN11 See generally “When Reporters Go Into MySpace,” News & Observer, Dec. 31, 2007.

FN12 See generally Anita L. Allen, “Dredging Up the Past: Lifelogging, Memory, and Surveillance,” 75 U. Chi. L. Rev. 47 (2008); “India’s Novel Use of Brain Scans in Courts Is Debated,” The New York Times, Sept. 14, 2008.

Reblog this post [with Zemanta]

Leave a comment

Filed under International Investigations, Investigative Research, Investigative Tools, Professional Investigations, Theft Investigations, Women Investigators

NC Private Investigator To Be On Talk Forensics Radio

Although this is a PR release, it is after all about Monty Clark, the famous Monty Clark

Private Investigator Monty Clark Is This Week’s Guest on Talk Forensics Radio Show Feb 22

2009-02-17 20:11:14 – Talk Forensics, a new talk radio show hosted by Larry Daniel of Guardian Digital Forensics, is proud to announce Monty Clark, Private Investigator will be the guest on Talk Forensics Radio for the February 22nd Episode.

About our guest:

Monty Clark is a member of the North Carolina Association of Private Investigators (NCAPI), the South Carolina Association of Legal Investigators (SCALI), The National Association of Professional Process Servers (NAPPS), The US Process Servers Association (USPSA) and the Internationl Association of Process Servers. Monty has been on the Board of Director’s for the North Carolina Association of Private Investigators for the past 13 years serving as Vice President from 1996-2000. He has served as President of the NCAPI during 2000-2002 and 2004-2005. He is presently serving as the President.

Prior to entering the Private Investigative profession, Monty was a Charlotte City Police Officer for 11 years. During this time he assisted the North Carolina State Bureau of Investigation (SBI) in various undercover assignments. He was then transferred to the Vice and Narcotics Bureau where he served four years undercover investigating specialized crimes. Monty was then transferred to the Charlotte-Douglas International Airport, Narcotics Interdiction Unit investigating drug smuggling.

Monty was also assigned to special tasks units that provided executive protection for President Ronald Reagan, President Jimmy Carter and Presidential Candidate Gary Hart during their visits to the Charlotte area.

In 1997 Monty was accepted by the National Football League (NFL) to assist as the Associate Security Representative assigned to the Carolina Panthers Football Team.

About the Show:

The purpose of our show is to educate and entertain the public on the various fields of forensic science, crime scene investigation, missing person searches and various aspects of the legal system as it relates to forensic science.

You can call (646) 727-3674 and ask questions of our Expert Guest during the live show.

About our host:

The host of our show is Larry E. Daniel. Larry is the primary expert for Guardian Digital Forensics. Larry is well known for his work on capital cases and is an expert in computer forensics.  Larry also writes a popular internet blog on forensics at http://www.exforensis.blogspot.com.

The show airs on www.blogtalkradio.com/TalkForensics each Sunday at 4PM Eastern. Shows will be available soon after on iTunes as pod casts.

We are currently looking for additional guests in various forensic disciplines and for law enforcement experts as well. Contact Leslie Denton for more information or to be considered for the show. (919)868-6291 or email leslie@guardiandf.com

Reblog this post [with Zemanta]

1 Comment

Filed under Investigative Tools, News of PI's, North Carolina Private Investigator, Professional Investigations, South Carolina Private Investigator