Exclusive: How Far Can Police Go In Securing A Conviction?
June 23, 2016 | Events
Mark Sainsbury talks with private detective Danny Toresen about the Kamal Reddy case and what police are allowed to do to secure a conviction. Convicted double murderer Kamal Reddy thought if he confided in men he thought were his friends and who were part of a criminal gang, they would take care of evidence tying him to the killing of his girlfriend and her daughter. In fact, his "friends" were undercover police officers. Listen here: Radio Live Speak to Danny Toresen - 23 June 2016 Undercover Investigations We can place an agent...
Man Jailed For Underage Revenge Porn Facebook Post
May 25, 2016 | Events
A Hamilton man who covertly filmed a 16-year-old female friend having sex with him and later uploaded the footage to Facebook has been jailed for a year.The man - who cannot be named without leading to the identification of his victim - was 19 at the time of his offending in January last year and is now 20.The Hamilton District Court was told the victim had come to the defendant's family home on January 12, where they twice engaged in consensual sex.However on the second occasion the man covertly filmed them on his cellphone.Afterward...
Why The FBI Director Puts Tape Over His Webcam
April 11, 2016 | Events
FBI Director James Comey gave a speech this week about encryption and privacy, repeating his argument that "absolute privacy" hampers law enforcement. But it was an offhand remark during the Q&A session at Kenyon College that caught the attention of privacy activists: The thought of the FBI chief taping over his webcam is an arresting one for many. His comment Wednesday was in response to a question about growing public awareness of the ways technology can spy on people, and he acknowledged sharing in the surveillance anxiety. "I saw...
Fraud Trends For 2016 In 1 Word: Technology
February 17, 2016 | Events
Technology continues to be the common thread in many of the important developments and emerging trends involving fraud and corruption investigations. In thinking about technology and fraud, and with a nod to Clint Eastwood, a simple classification system emerges: the good, the bad and the ugly. The Good Technology has provided the good guys with advanced tools useful in the prevention, detection and investigation of fraud and corruption. Data mining and analysis have evolved such that organizations can often identify an incident of fr...
Top Private Investigators On Twitter
January 27, 2016 | Events
PINow are happy to release the Top Private Investigators on Twitter in 2015.Twitter is a great tool for interacting with peers, sharing legislation updates, related news, business tips, promoting associations, and more. PINow present this list every year to recognize those in the industry who have proved to be valuable resources to their peers, specifically on the topic of investigations. The list is ranked based on a variety of criteria, including nominations, scores on social media sites like Retweetrank, Klout, and StatusPeople, an...
On The 1st Day Of Christmas - Protect Yourself From Fraud & Scams
December 9, 2015 | Events
With the hectic festive season fast approaching it is easy to forget some of the basics that protect us from becoming victims of crime and trauma. Fraud and identity theft. Christmas is a time when we love to splash out and treat our family and friends and when the credit card statement arrives in the New Year you don't want to find that a thief has used your identity to buy their own treats. Identity theft is when someone uses your personal information without your knowledge to obtain credit or purchase goods or services and with adv...
Fraud Awareness Week 2015 - Tips
November 17, 2015 | Events
Fraudsters use all kinds of clever tricks to steal from businesses. By taking sensible precautions, you can avoid becoming a victim. Almost $800,000 was lost from 35 small businesses that were the victims of cybercrime in 2014, according to NetSafe. That’s an average of $22,521 for each victim. Small businesses have reported 309 incidents so far this year, compared with 106 during the same period of 2014. 2015 biggest scam threats to small businesses Email scams: Hackers intercept business’ emails, and then send false invoices to cli...
Ashley Madison Hack Leads To Spike In Private Eye Requests
August 28, 2015 | Events
A startup called Trustify -- a website for hiring private investigators on-demand -- has seen a major spike in business over the past two days. On Tuesday, hackers exposed identifying details of 32 million Ashley Madison customers. The site was renowned for connecting people who were actively interested in having affairs. "We did more revenue yesterday alone than we did in July," founder Danny Boice said on Friday. "And today is tracking to be even bigger." Trustify, which launched in March, charges users $67 an hour. Boice said A...
Government Plans Child Sex Offender Register
August 13, 2015 | Events
New Zealand's first register of child sex offenders is to be set-up - with the Government saying currently such people can "disappear into communities". Police and the Corrections Department will run the register, which will be established under legislation introduced to Parliament today. Offenders will need to provide a range of information including fingerprints, photographs, aliases, address, workplace and employer, car registration, computer IP address and passport details. Social Development Minister Anne Tolley said such a regis...
Defendant Served Temporary Protective Order Via Text Message
July 30, 2015 | Events
Just yesterday, District of Columbia Superior Court Judge Laura Cordero ordered that an evasive defendant could be served through text message and email. While recent discussions of service through email, social media, and other electronic means have dominated much of the conversation, this is one of the few times we’ve seen that action put to work. The service was completed by Torri Schaffer of Torri’s Legal Service, a process service company with offices in Maryland and Washington, D.C. The order for text message and email service c...









