AI for Private Investigators: Applications, Limitations & Ethical Considerations Dean and Karen Beers
What to Do if You Suspect Someone Is Embezzling from an Elderly Loved One Alycia Watt and Leah WietholterSeniors in care are vulnerable to financial exploitation, theft, and scams. Here are some red flags to look for. Read More
Ransomware Survival Recommendations for Small and Medium-Sized Businesses David BalabanRansomware attacks threaten businesses worldwide. But don't panic! Learn some ways to reduce the threat to your agency's network. Read More
Five Building Blocks of Investigative Case Management Rod ThompsonProper case management is the foundation of every successful investigation. Read More
Op-Ed: Has Video Killed the Process Serving Star? Jacob OsojnakA fellow process server's TikTok profile raises questions about what kind of self-promotion is ethical. Read More
Rural Surveillance: Planning, Implementation, and Risk Management Rod ThompsonRural surveillance has its challenges. But with planning, creativity, and solid gear, you can get great results. Read More
6 Simple Tips to Protect Your Privacy Online Talia CohenProtecting personal data requires some vigilance and basic tech savvy. Read More
The Three Essential Components of Successful Surveillance Rod ThompsonEvery surveillance is different. But they all hinge on three basic elements: camera, surveillance vehicle, and disguise. Read More
Asbestos Defense Investigations: A Primer Jed MahoneyInvestigating asbestos exposure claims means traveling decades back in time to research the details of a plaintiff's life and work. Read More