Phone Hacker Or Intelligence Gatherer? The Private Investigator

The Private Investigator has always been portrayed in the cinema as a charismatic dark, sometimes sinister figure and in the media as a 16 year old cyberpunk cracking foreign intelligence codes and now, of course, as a criminally minded phone hacker.

Many see PI鎶?as a civilian spy, a one-man band trying to make a meagre living from day-to-day routine enquiries waiting in anticipation of the 鎱磇g job?

So what exactly is a private investigator? The ex-police officer serving papers from the court in divorce proceedings? The retired person whose sense of curiosity and justice stirs them into action? Or the slick, quick, industrial-espionage specialist who continually tries to foil and outwit unscrupulous business people who are bent on financial and political power? Or the PI working for them to bring power by information at any price?

The truth of it is that all of the above and many other definitions fit into the world of the modern day Sherlock Holmes. The type of work carried out by investigators is as diverse as the people who take up the profession. As well as the usual, widely accepted and well-known matrimonial and divorce work, the modern investigator can be called upon to act as a professional witness, involved in gathering evidence to support legal applications put before the court. Sometimes the PI will be called upon to work in criminal investigations to help prove a theft love this website or some other crime, and to gather evidence to be given to the police as part of a court case being presented before a judge or passed to a journalist to expose a wrong-doing. On the other hand, the PI may have to work for the defence of a suspected criminal, meticulously sifting through the evidence and challenging any inconsistencies or locating and interviewing possible defence witnesses.

As a Private Investigator I have been called upon to carry out investigations to locate and prove that firms or individuals are manufacturing or supplying goods without the license-holder鎶?consent. Retail and manufacturing companies have used the skills I learned as a soldier to work instagram followers hack cheats undercover or to carry out covert surveillance, gathering information to determine how their employees operate out of site of management, to identify individuals or teams involved in theft, using company equipment without consent or selling intellectual intelligence and testing the company鎶?security and systems. I have been deployed overseas working undercover to expose Letter-of-Credit fraud, child abduction and protection. I鎶砮 lived in attics, under garden sheds, in disused properties, even in drains gathering video evidence to show that a claimant ?although saying that he/she is unable to work ?is in fact fit and healthy. I鎶砮 met with Special Branch and handed information over to uncover future terrorists leaving the UK for training abroad.

You would be surprised at some of the trouble-shooting tasks investigators get involved in. The following is one such problem I was asked to solve

The Background:

A world financier should have arrived for a meeting in Dubai, but didn’t show. Eleven million pounds sterling was also missing. His life and work partner had information that suggested that the financier was in his hometown of Beirut and probably being kept there by his family who were members of a well-known terrorist group.

The Task:

1. To locate the exact whereabouts of the financier.
2. To make contact with him.
3. To assist him to escape from the Country if he wished to.
4. To deliver him to a safe environment and ensure that he would be kept safe.
5. To locate the eleven million ?believed to have been given to share here the terrorists for the purchase of arms.

Did I sort it?

Professional investigators have a code of confidentiality!

Copyright 2011 Kenn Griffiths, All Rights Reserved.

About the author:

Kenn Griffiths is a writer, investigator, former soldier, undercover operator and founder of the Red Blooded Male Club.

You are free to publish this article but do include this link

Compártelo con tus amigos

Deja un comentario

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos necesarios están marcados *

Puedes usar las siguientes etiquetas y atributos HTML: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>