Tuesday, December 12, 2017

How Social Media Is Used In Private Investigations

These days, it’s very rare to know someone who doesn’t have a social media account. People connect with their friends on different platforms and social media has long become the norm. Government and private companies also access social media to gather information and share their thoughts to the public.

Image source: pixabay.com

When private investigators are looking into a person’s activities, is social media of much help to them? The answer is yes. Social media investigations are becoming a common feature of primary investigations. Even before the rise of social media investigators, old-school private investigators have already transitioned to the digital sphere. They have software that can be used to sidestep the privacy settings of accounts. 

Investigation through this means provides evidence for court cases. Evidence gathered here helps in establishing a person’s character, proving or disproving an alibi, or collecting other various supporting evidence. Professional social media investigators are knowledgeable on preserving, validating, and presenting evidence according to the rules of the court, and most people on social media are not. 

Private investigators follow a protocol that as they gather pieces of evidence. They must not violate laws in order to avoid jeopardizing the validity and authenticity of the evidence handed over to authorities. They rely only partially on social media to conduct their investigations; these professionals—however—are experts in operating on different platforms to fulfill their duties. With cyber threats becoming rampant by the minute, the need for heightened cybersecurity efforts and professional social media investigators is on the rise. 

Image source: pixabay.com

A private investigator, Adam Quirk has had 15 years of experience working for both US Drug Enforcement Administration and the Federal Bureau of Investigation. For more updates and reads about private investigations, visit this blog.

Thursday, November 30, 2017

The intersecting aspects of Jeremy Bentham's Panopticon and modern surveillance

Modern Anglo-American philosophy and jurisprudence has been greatly influenced by the theories of the English philosopher Jeremy Bentham. Educated individuals are aware of his contributions to the growth of utilitarianism, cementing many of the contemporary world’s moral and ethical ideals. At the heart of Bentham’s humanist and Enlightenment concepts is one of the most famous philosophical metaphors in modern thought: the Panopticon. It is an architectural and organizational model for prisons which focuses on a type of surveillance where inmates are perpetually cognizant of being watched. 

Image source: commons.wikimedia.org

The design, of course, goes beyond the physical features of the place. A central inspection tower is surrounded by cells where it is impossible to know if one is being watched. Many thinkers, including Bentham himself, planned and applied conceptually the theory of the Panopticon to explain the effective control exercised by many institutions to its members, from schools to hospitals and offices. There are obvious parallels to the visuality of that late 18th-century method to the modern CCTV. In the United States, the technology has come a long way since the early days of the Vericon in the late 1940s. Closed-circuit television eventually developed ways of recording surveillances to relieve the system of constant monitoring. 

New technologies are emerging that could even be more efficient and robust than CCTVs, although not all of them are exactly legal. The internet and its possibilities are continually being regulated so that it won’t be used for unlawful purposes. Policing of the self happens when one feels that every single action is being observed and recorded. The Panopticon is an interesting take-off point to understand human behavior and the physical and psychological development and connections of communities. 

Image source: pixabay.com

Adam Quirk is an award-winning criminal justice professional with over 15 years of experience in investigations, regulatory compliance, team leadership and supervision, program initiation and development, and coalition-building. Currently a licensed private investigator, he had been involved with both the U.S. Drug Enforcement Administration and the Federal Bureau of Investigation. To learn more about his professional work, visit this page.

Wednesday, October 18, 2017

A Quick Guide To Reporting Human Trafficking

Human trafficking is a crime and a form of modern-day slavery that exploits children and adults alike, using force, fraud, or coercion to involve them in some type of labor or commercial sex purposes. Every year in the United States, millions of victims are lured with false promises of well-paying jobs, and then they are forced into prostitution, farm or factory labor with unjust conditions, or domestic servitude.
Image source:Pixabay.com 


The U.S. Department of Homeland Security (DHS) has power over probing human trafficking. But what should be done to report cases of human trafficking that one has personal knowledge of?

If someone appears to be in immediate danger, call 911. One may also call the National Human Trafficking Hotline toll-free at 1-888-373-7888; advocates here are available 24/7 to take reports of potential human trafficking cases, all reports remaining confidential, reporting individuals anonymous, and interpreters available. Text HELP to BeFree (233733), or submit a tip online via an anonymous online reporting form available at HumanTraffickingHotline.org

Image source: ALToday.com


The Polaris Project, an organization dedicated to ending human trafficking, offers a list of warning signs to help determine if someone is a victim. These include not being free to come and go as pleased from work or home; working excessively or unusually long hours; being under age 18 and already providing commercial sex acts; being fearful, anxious, or depressed; and showing signs of physical and/or sexual abuse or confinement.

Adam Quirk is a private investigator with more than 15 years of professional experience in law enforcement. He has handled various security, loss prevention, and enforcement projects for both the FBI and the DEA. For similar reads, click here.

Saturday, September 30, 2017

Hand-to-hand combat series: Defending one’s home with everything one has

Since a lot of American homes are easy to break into, homeowners have to be more vigilant when it comes to home security. First of all, measures have to be put in place. For instance, locks have to be changed and alarm systems installed. Homeowners have to be familiar with all the entry points of their home. However, even as meticulous as one might be when it comes to securing the home, intruders still find ways to get inside. When this happens, everyone in the house is put at risk.

Image source: callofdestiny.net


Fortunately, there are ways to defend one’s self and the people he loves when intruders are inside.

First off, always have a safe area that is hidden from plain sight. Some houses have panic rooms just for this reason. Trap doors, attics, and even huge chests can be good hiding spots. If homeowners sense there are people in the house, then they should head to these places calmly and quietly. 

Second, homeowners should identify what objects in the room can be used as makeshift weapons. Anything from a hard boot, to an umbrella, to even a ballpoint pen can be used as a weapon. 

Finally, homeowners should know how basic self-defense. If they don’t plan to have guns at home, knowing self-defense can be just as good. 

Image source: Eventbrite.com

Adam Quirk is a private investigator who has worked side-by-side with the DEA and the FBI. He is also very knowledgeable when it comes to home security. For more about his work and his company, Stealth Advise, check out this website.

Wednesday, August 30, 2017

Tips for crime prevention in the workplace

For immediate action and with police forces bearing the weight of increasing crimes, it is somehow incumbent upon business owners to protect their premises and organizational well-being. Here are several ways to deter crime on one’s business property.


Image source: Pixabay.com

Dial 911 right away upon noticing suspicious characters loitering in or near one’s place of business. Take note of people who loiter during opening and closing times. It’s important to never block the view into one’s store by filling windows with multiple displays; robbers are less likely to attack the establishment if passersby can see what’s happening inside. 

Employees assigned to make bank deposits should always stay alert for strangers following them around or lingering at the bank. In the office premises, minimize the amount of cash being kept, and make frequent money pick-ups from registers. Make regular bank deposits – again with a good level of vigilance. 

Working alone isn’t recommended. According to studies, the presence of more employees may slash the incidence of an armed robbery. 

Finally, put physical safeguards in place. Install quality door and window locks, and invest in a monitored alarm system. Always use interior as well as exterior lighting, which may prevent intruders from hiding illegal activities. Motion sensor lighting can be helpful and affordable, too.

Image source: Pixabay.com

With over 15 years of professional experience in law enforcement, Adam Quirk is well-versed in the ins and outs of the criminal justice system. For similar reads, click here.

Friday, August 11, 2017

A Look At Upcoming Global Cybersecurity Efforts

In the past year, hacking attacks in different parts of the world made headlines. From scamming users to energy shortages and halting operations, these attacks have exposed how lacking cybersecurity efforts have been. These events have also shown that citizens must be educated about being secure and vigilant since most of the information these days are stored online. Below are some of the cybersecurity trends online users can expect soon:

Governments will boost their efforts to stop debilitating hacking attacks

These days, vigilante hackers target government agencies. U.S., France, and Ukraine have been victims of recent attacks that threatened to destabilize crucial operations. In response to the frequency of such crimes, governments are already improving their cybersecurity measures to prevent attacks from affecting not just government functions but also economic and financial operations.

Image source: Forbes.com

Cloud security will be more developed

Having a cloud environment that allows users to store information without worries is a need these days. The industry is on the way to developing platforms that will regulate and protect sensitive information. In the future, when cloud security is improved, users will have no other choice but to store their information in the cloud.

There will be a demand for information security professionals especially with the widespread use of IoT

Smart devices and the Internet of Things (IoT) seems to be the futuristic answer to daily living. However, there are still some aspects to be sorted out especially in security. While these tools become a welcome addition to homes and workspaces, there is a rising need for information security professionals that will ensure users that hackers will not use their devices for online theft and other cyber-related crimes.

Image source: Usatoday.com

As people learn how to protect themselves online, cybersecurity companies are also finding better ways to strengthen current efforts in guarding the billions of personal and classified information that is being collected online.

Award-winning criminal justice professional Adam Quirk has 15 years of experience in investigations, regulatory compliance, team leadership and supervision, program initiation, and development. Find out more about him and his company, Stealth Advise, on this website.







Monday, June 19, 2017

Going High-Tech:Top Apps For Private Investigators

The advancement of technology has been beneficial to private investigators because,while they do not necessarily need high-tech devices to function, it does help them work more efficiently.Before, private investigators are used to doing the necessary legwork for surveillance and burning through heaps of papers for research. But these changed with the advent of the internet because of the availability of useful information at the click of a button.

Image source:fastcompany.com

Now, there are also smartphone apps that offer assistance in investigations, surveillance, and stakeouts.Below are some of the best apps for private investigators:

Vault: Private investigators need to ensure that files, such as photos, videos, documents, and receipts, are kept private and are well-secured. Vault allows users to encrypt data and set a password to ensure their confidentiality. It also carries an option for capturing the photo of a person that attempts to access the app without authorization.

IRBmobile: IRBmobile allows private investigators to run background searches on persons of interest. One of the better features of this app is that not all users can use it; private investigators are required to apply and be accredited by the app developers.

Image source:auto-forward.com

Burner: Instead of owning a second phone, private investigators can use the Burner app to create multiple temporary phone numbers that they could use to contact other people or to give out. Once they have no more need for these numbers, these could just be “burned” or disposed of.

Adam Quirk is an award-winning criminal justice professional who had served in both the U.S. Drug Enforcement Administration and the Federal Bureau of Investigation. At present, he is a private investigator working for his own company, Stealth Advise, LLC. For more information about this firm, visit this website.

Wednesday, May 10, 2017

What Citizens Can Do To Help Fight The Drug Menace

The drug menace is a battle that all concerned citizens must face. It’s not only the police who are the exclusive freedom fighters in the war against drugs because the truth is, but citizens can also do their part by helping the authorities with small acts.

Image source: trbimg.com
The most concrete form of assistance is for citizens to be the eyes and ears of the authorities whenever men in uniform cannot do it themselves. Citizens can report suspicious behavior that they may notice. Many drug operations have been aborted in the past because of information from concerned citizens.

It also helps to always know who your children are with at all times. Young adults are among the prime targets of drug syndicates to offer their contraband substances. You never know when some seller has already infiltrated your child’s group of friends.

Be aware of the latest news regarding illegal drug activities. It helps a lot to have a good look at the faces of wanted criminals who are guilty of some of the biggest drug trades imaginable, especially if you are already within striking distance of their last known location. In case you see them anywhere, then you’ll know how to alert the authorities.

Image source: tbo.com
The police can use all the help they can get to foil the criminals who have turned the drug menace into one of the biggest problems faced by the community and the country.

Adam Quirk has previously worked for the U.S. Drug Enforcement Administration and the Federal Bureau of Investigation. For more information on the fight against drugs, read this blog.

Monday, April 10, 2017

The Most Common Practices In Preventing Drug Diversion In Healthcare

Drug diversion is one of the trickiest channels by which addictive drugs get into the wrong hands. Healthcare professionals primarily ensure that people are given proper medication. In principle, drugs are in the market for their role in the treatment of diseases. However, these same drugs can be addictive too, which is why drug users take advantage of the opportunity to get their hands on them.

Image source: guardianlv.com
To manage this, healthcare experts have employed certain practices to minimize the incidence of drug diversion.

An effective way is to regulate the release of potentially addictive prescription drugs. For instance, for patients who are genuinely in need of a particular drug, doctors cannot prescribe more than a certain number of units. Should there be a need to continue medication beyond the initial prescription, the patient will have to get a new prescription from the doctor at a later time.

Another way is through the presentation of identification at the pharmacy. There is a finite list of potentially addictive prescription drugs, and each time a patient makes a purchase, he has to present his prescription and his identification. To be sure, his picture may be taken by the pharmacy when he purchases. This is to make sure that the medicine goes into the right hands.

Image source: bsntomsn.org
The industry also imposes heavy sanctions on any health worker or pharmacist who is complicit in the release of prescription drugs to a person who is without privilege. This has proven to deter drug diversion, and it has also encouraged vigilance in the professional practice.

Adam Quirk, a private investigator, has had 15 years of experience working for both the US Drug Enforcement Administration and the Federal Bureau of Investigation. For more about his work, read this blog.

Wednesday, February 15, 2017

Security Flaws That Make Smartphones Vulnerable To Hacking

Most smartphone users store a lot of sensitive data in their devices such as their personal, contact, and banking details. As people become more dependent on these gadgets, they tend to forget that these can be easily hacked. The iCloud hack that exposed the private photos of famous celebrities from a few years back is proof that people should take their personal cybersecurity seriously.

Image source: Huffingtonpost.com
A smartphone possesses features that most users are unaware of. Gyroscopes and accelerometers are some of the factors that make smartphones smart but can also be easily hacked. To simplify, a gyroscope is a sensor for detecting the phone’s orientation. While it is helpful in maximizing the use of apps, it can also detect sound waves. This makes it easier for hackers to get into a person’s phone and steal information without being discovered.

On the other hand, accelerometers can also be compromised with sound waves. By registering a fake motion signal, hackers can break into a device and take control of it. When this part has been compromised, hackers will be able to see the movement of the phone making it easy to steal passwords and other important information. Accelerometers can also be found in medical devices, vehicles, and even satellites, making these devices vulnerable to hacking.

Image source: DIgitaltrends.com
As more studies about the vulnerabilities of smartphones and devices are being released, companies like Google and Apple are doing their best to ensure the security of their users. Cybersecurity companies are also taking steps to bring their services to individuals, especially in this highly-connected world.

Adam Quirk is an award-winning criminal justice professional with 15 years of experience in investigations, regulatory compliance, team leadership and supervision, program initiation, and development. Find out more about his company, Stealth Advise, on this page.
/

Tuesday, January 10, 2017

Separating Myth From Fact In Crime Fiction

Legal dramas, police procedurals, and detective stories revolving around criminal cases tell stories of tragedy and mystery that for many audience members ring close to reality, or so it would seem on the surface. It is thus shocking (though unsurprising) for many a layperson that many of the things that they see on television aren’t always inaccurate to how real investigations and legal proceedings take place in real life.

Image source: huffingtonpost.com

Much of what is shown in criminal investigations in television outside of documentaries are the product of artistic liberties taken by showrunners, skipping over valuable fieldwork and shortening procedures to fit the episodic nature of the program.

Indeed, of all the works of artistic license shown in television shows featuring criminal investigations, the most egregious of all inaccuracies is the timespan of processing evidence. Rarely in real life are cases resolved in a matter of days, and many of the forensic tests shown would take weeks or months at the least. Actual investigations can take years.

Likewise, not all forensic evidence translates into an ironclad case. DNA evidence and fingerprinting, though invaluable to many cases, do not always prove the guilt or innocence of suspects or, for that matter, are applicable to all crimes. Of course, not all crimes would need something as thorough as evidence gathering.

Image source: criminaljusticedegreesguide.com

Criminals do not always make the same mistakes committed by their television counterparts. Ironically, criminals often attempt to try to hide their misdeeds based on what they see on television, to varying degrees of success. And although many criminals are eventually caught by other mistakes, they are usually of a fundamentally different sort from the ones in a crime drama.

Detectives in fiction also seem to have much more clout than their real-life counterparts such as making arrests and examining forensic evidence directly.

An investigator himself, Adam Quirk enjoys his share of both crime fiction and the works of influential criminologists. Visit this LinkedIn page for more on him and his work.