By K. Matak Baker Street Private Investigators Academy.

Slides:



Advertisements
Similar presentations
Writing at University Part 1 – General introduction to the academic writing process Cristina Felea, Ph.D.
Advertisements

Injury Management Seminar for the Meat Industry. 2 Major Pieces of Legislation Covering Workers Compensation and Injury Management in NSW Workers Compensation.
FCI INVESTIGATIONS WHERE VIDEO AND INFORMATION ARE KING!
Broker and Agent Responsibilities © 2011 Louisiana Real Estate Commission 1 Lesson 4 Office Practices.
August 19, 2014 watch me!.  Describe the steps to take when processing a crime scene  Describe how to package evidence  Explain the importance of preserving.
INTRODUCTION TO INVESTIGATION Mr. Cappello Sir Robert Borden High School Specialist High Skills Major Program.
California Integrated Waste Management Board Agreement with Air Resources Board for Surveillance Assistance Special Waste Committee Meeting May 10, 2006.
Criminal Intelligence and Surveillance Operations
Metro Security Force Inc. “Protecting you and your property”
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
Chapter Two: Basic Concepts Crime Being the victim of crime is greater than: –being injured in an auto accident –burned by fire –or divorced.
Computers: Tools for an Information Age
1a Job Descriptions for Personnel Involved in PAT Implementation Materials Developed by The IRIS Center, University of Maryland.
Forensic Accounting. Agenda Definition History Skills Business scandals Cases.
The more you know about security the better you’ll like OSS.
Chapter 2 Modern Private Security
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
Introduction to Investigation
Written by Elizabeth Salyers. Lawyer Police/Detective Criminal Investigator/Special Agents.
Real Estate Principles and Practices Chapter 15 Property Management © 2014 OnCourse Learning.
The Mystery of the Missing Monet A Mrs. Walton Who-Dunnit.
By Micah Shaffer.  Private investigators analyze information about legal, financial, and personal matters. The environment in which a private investigator.
Demetrius Nelson. Assist Lawyers & other public cases Do private investigations Goes undercover to seek out or spy on someone Sometimes in danger Often.
SMART VEHICLES AND MISSHAPING MANAGEMENT. MANY CRIMES ARE COMMITTED USING PUBLIC OR PRIVATE VEHICLES. IT CAN BE EASILY CONTROLLED USING AVAILABLE SMART.
1 Job Analysis The identification and description of what is happening on the job. Why Is It Done ? To facilitate an organizations need to accurately and.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 14 Systems Analysis and Design: The Big Picture.
GARDINER POLICE DEPARTMENT SERVING SINCE 1849 SERVING SINCE 1849 Chief James M. Toman.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Lesson 7.3 PROTECT YOUR BUSINESS
Tax Compliance Report January 30 th, Major Themes of Study IRS and other states also have income tax compliance issues. Estimating the level of.
Section 12.2 You and the Legal System Back to Table of Contents.
RSL Consulting Building partnerships, to protect and supply security advice and support to commerce and industry!
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
Human Resource Management, 8th Edition
Identifying and Arresting Suspects
Criminal Investigations Week 4 Seminar CJ 210 Criminal Investigations Instructor: Andy McIntosh.
From Surveillance to Records and Files Chapter 8.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
MOSCOW, NOVEMBER 12 – 14, THE RESEARCH 1.Respondents 8 respondents from SAI Indonesia : auditor, investigator, R &D 2.Time 3 weeks (Sept to Oct.
1 Book Cover Here Copyright © 2015, Elsevier Inc. All rights Reserved Chapter #2 Legal Aspects of Security Security Supervision and Management Theory and.
Unit 3: Crime Scene Processing 3.4 Processing a Scene.
Bell Work: 5/3/12 What is due process? – Hint: look on pg. 564 if you don’t remember!
Do now: What steps do you take in processing a crime scene?
SOUTHWESTERN ALABAMA ARES GROUP EMERGENCY COMMUNICATIONS TRAINING.
Chapter 6 Payroll Schemes.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
ELECTRONIC SECURITY OF CRITICAL SITES RELATING TO HOMELAND DEFENSE By Brian M. Jones.
Welcome to Unit #4 Seminar Please feel free to chat with each other until class starts. I will attempt to use the microphone again, so keep your speakers.
Accident Analysis.
1 Pertemuan 1 Background Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
© Michael Crosby and Charles Sacker, 2001 Systematic Software Reviews Software reviews are a “quality improvement process for written material”.
Talees’ya Johnson.  Obtains and uses search and arrest warrants.  Obtains and verifies evidence  Performs undercover assignments  Maintains surveillance,
Real Estate Principles and Practices Chapter 15 Property Management © 2010 by South-Western, Cengage Learning.
CJ 125 UNIT FOUR PAYROLL SCHEMES. THE MAIN CATEGORIES OF PAYROLL FRAUD Payroll Schemes Occupational frauds in which a person who works for an organization.
RoadPeace conference Wednesday 22 nd September 2010 Date Arial 14pt Investigating fatal collisions.
Are you really protected against all Risk and liabilities? Are you sure that your Security Company have: Liability Insurance covering up to $ 2, ?
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Presentation subhead March 3, 2011 Criminal Justice Investigations – Unit 9.
Objective: You will be able to generate the four steps of preserving a crime scene and identify a wide variety of services in crime laboratories. Warmup.
Accident analysis One-hour training.
© Thomson/South-Western ECONOMIC EDUCATION FOR CONSUMERS Slide 1 Chapter 6 LESSON 6.3 Your Budget Worksheet Objectives: By the end of class, students will.
Chapter 2 Modern Private Security
LVA 6.50
Auditing Information Technology
InCite Performance Group
Are You At Fault In A Dangerous Car Accident?.
Machine Guarding Element Summary Training
Do you know what you own? -Intro -
Locking and Unlocking encounters
Part Two TQM – The Role of the Quality System
Presentation transcript:

By K. Matak Baker Street Private Investigators Academy

To obtain evidence of a civil wrong. To locate persons To obtain evidence of a crime. To verify disability claim information. To develop leads. To develop information. To obtain a real time recording of activities. The American Society for Industrial Security (ASIS) states: Broadly stated, a surveillance may serve to detect or prevent questionable or illicit acts, to obtain evidence of such acts, to help in identifying person, or to collect general intelligence information. Often surveillance may be conducted only in the hope of developing leads in a case if other efforts have been unproductive. *

PLANORGANIZEDIRECTCONTROL

The first step to success in anything, especially surveillance is to plan. You need to know: 1.What kind of case is this? 2.What type of surveillance is needed? 3.What location(s) could be involved? 4.How many parties could be involved? 5.Do you have the proper equipment or assistance? 6.What is the objective of the surveillance? 7.When will you do the surveillance? 8.Who is your client and what are their expectations?

Not enough can be said about being organized. On more than one occasion I have been caught on surveillance with a missing piece of equipment! By then it is too late to do anything about it- but it reduces your effectiveness completely. I recommend having a pre-packed surveillance bag and a checklist. Especially when you are new to the field and sometimes have to be able to move quickly. This will save you hours of stress and preparation time. Later during the course we will review equipment, types of equipment, and recording devices for report writing. As a private investigator -most often - you are working on your own – there is no backup, often no office support staff and always a budget and a deadline. Remember you are not a police officer – you are a private investigator.

WhoWhatWhereWhenHow YOU DIRECT YOU

Control of the surveillance is critical. The majority of surveillance operations are conducted by the individual investigator. The number of personnel used on an investigation is completely determined by the budget of the client. In B.C. There are two categories of licensing – regular and under supervision. An under supervision investigator must work with an experienced investigator. But it is important to remember that YOU ARE RESPONSIBLE FOR YOUR ACTIONS. Today the subjects of investigations and your clients have access to many online sources of information. Never forget that you are in control of the investigation.

 Surveillance techniques and methods fall into two basic categories:  1. Stationary - the surveillance investigator is in a fixed location planted within or on a stakeout.  2. Moving – the surveillance investigator is moving by foot or by vehicle in tight or loose proximity to the subject.  Private investigators often work independently in either of these ways. In this Chapter we want to introduce you to stationary surveillance.  Here are some samples of stationary surveillance:  Surveillance Video Captures Cleveland Man Committing Workers' Comp Fraud – YouTube Surveillance Video Captures Cleveland Man Committing Workers' Comp Fraud – YouTube  Catching Insurance Fraud using Video Surveillance - CheatersCT.com - YouTube Catching Insurance Fraud using Video Surveillance - CheatersCT.com - YouTube

1.. Pg 155 Private Security and the Investigative Process - 2 nd edition; Charles P. Nemeth Baker Street Operations Manual