For professional private investigators and even some in the security field, a piece of gear that seems to pile up over the years is cameras. Not only are we always searching for the next best thing, but when it comes to any type of electronic gear like cameras, the next best thing is always right around the corner. Here, we share some experiences with some of the cameras we have used in our surveillance operations over tens of thousands of hours of surveillance.
For most tasks, a simple Google search will produce an effective result. However, sometimes it will not, especially when conducting more specialized searches for protective intelligence, etc.
What many people don’t know is that Google has very specific search tools and term modifiers for just about everything you may want to search for or eliminate from your search. So if you’re not getting the results you want from Google, read the tips below to help you get relevant results.
Many protective service providers and law enforcement agencies have protective intelligence units that conduct investigations, manage threat assessments and provide tactical, operational and strategic analysis of the information they uncover. However, they may fail to utilize the contemporary collection and analysis methods used by today’s intelligence professionals but rather lean on the standard criminal investigation processes they have always performed.
As featured in Pursuit Magazine
A Private Investigator’s Tricks of the Trade, from Surveillance Prep to Gear and Reports Surveillance is one of the oldest and most common practices in investigative services. But whether you’re gathering protective intelligence on a subject or investigating an insurance fraud case, real-time direct observation remains a useful tool to keep greased in your toolbox .
As a courtesy to our Alumni, we will be offering our investigative services* at ‘no-profit’ rates in order to enable effective information gathering and intelligence development to those with limited resources. No results = no fee.
Contact us for more information on other services: Surveillance, Due Diligence, Business Intelligence, Technical Surveillance Counter-Measures, Consulting, Safe Rooms, Expert Witness.
“Protective intelligence is the process of gathering and assessing information about persons who may have the interest, motive, intention, and capability of mounting attacks against public officials and figures.” – USSS Protective Intelligence & Threat Assessment Investigations: A Guide for State and Local Law Enforcement Officials
“Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources); drawn from publicly available material, including: the Internet, the media, photos and geospatial information.” – CIA DNI Open Source Center
Below, we have put together a list of highly effective resources we use while conducting OSINT investigations for protective intelligence; and remember, information is the data obtained through research and the resultant actionable conclusions we formulate from that data is the intelligence.