Phishing and Spoofing Identity Theft Schemes

Overview Half of all internet users get at least one phishing email per day. That number rises considerably among those active on email and social media. Phishing emails are designed to get you to provide personal information, such as your bank account number, routing number, Social Security number, birth date, etc. (see the AOL email fraud … Read more

NORAD North American Aerospace Defense Command

The North American Aerospace Defense Command (NORAD) is a joint military organization of the United States and Canadian governments that provides aerospace warning, air sovereignty, and defense for the two countries. NORAD is responsible for detecting, validating, and warning of any attacks against North America. This includes attacks from aircraft, missiles, or space vehicles. The organization is also responsible for maritime warnings.

Bounty Hunters and Fugitive Recovery Agents

What is a Bounty Hunter? A bounty hunter is an individual who captures fugitives from the law. Usually, the fugitive is someone who “skipped” bail. In other words, they escaped jail by posting bail money but didn’t appear in court as promised. Bail bondsmen employ most bounty hunters to track down and apprehend the fugitive, they … Read more

Master the Hunt: The Private Investigator’s Guide to Evidence Collection

Evidence collection for private investigators

Mastering evidence collection is vital for any private investigator. This guide explores the legal standards for admissibility, the importance of the chain of custody, and best practices for physical and digital forensics. Learn how to ensure your findings hold up in court and protect your professional integrity.

Elder Abuse Investigations

This article provides an overview of elder abuse and elder abuse investigations. What is Elder Abuse? Thousands of persons are abused, neglected, and exploited each year. Unfortunately, many victims are older, frail, and vulnerable people who cannot help or defend themselves and depend on others to meet their basic needs. Abusers of older adults are … Read more

Catfish Investigations for Online Dating Scams: How to Protect Yourself

This article provides an overview of catfish investigations related to online dating fraud, scams, and schemes. Additionally, it provides guidance on identifying catfishing, investigating the perpetrators, and reporting the crime. Online Dating The internet and internet-connected devices are integral to the lives of most people. People constantly use the internet’s power to learn new things, … Read more

Morse Code Signals

What is Morse Code? In an age dominated by instantaneous digital communication, it’s easy to forget the roots of the humble Morse code. This ingenious system has left an indelible mark on human history, developed in the early 1830s by Samuel Morse and Alfred Vail. With a combination of dots and dashes, Morse code has … Read more

Polygraph Tests and Lie Detectors: Things Investigators Should Know

What is a Polygraph Test? A polygraph test (commonly referred to as a lie detector test) is an instrument that measures and records several physiological responses, such as blood pressure, pulse, respiration, and skin conductivity. At the same time, the subject is asked and answers a series of questions because false answers will produce distinctive … Read more

How to Search the U.S. National Archives

National Archives

The National Archives holds billions of records that can be vital to a private investigator’s case. From military service records to census data, these documents provide a wealth of information. Knowing how to navigate this massive collection of information is key to unlocking the secrets within.