Washington State Investigators P.I. News

Workers compensation scams

Worker's Compensation insurance protects employees who are hurt on the job. Valuable employee benefits pay for medical expenses, lost wages and other expenses while worker recovers. Most employers and their employees are very honest. Only a small number scammed this coverage for personal profit, but the damage they cause is enormous. Worker's Compensation fraud is…
Read more

How you can Detect Hidden Cameras and Microphones

Have you ever felt like you're being watched? Just want to make sure your privacy is protected? Here are some methods to locate hidden cameras and microphones. 1 The Initial Sweep 1) Conduct a physical search of the premises. This includes a slow and meticulous sweep of the room or building you suspect his compromised.…
Read more

About Surveillance Investigators

Introduction to Surveillance In the news lately, the word surveillance has a negative connotation due to accusations of its misuse by government and big business. But, for the private investigator, when surveillance is performed legally, is a necessary and important skill set. A majority of private investigators perform surveillance on a regular basis and are…
Read more

Video Surveillance Investigations

In the context of insurance investigations, covert video surveillance is the observation of an individual from a hidden or unknown position to document the extent of the subject's physical activities. The insurance investigator may suspect that the individual filing an injury or disability claim may be exaggerating their injury in order to collect benefits that…
Read more

Researchers use ride-sharing cars to sniff out secret spying tools

LAW ENFORCEMENT'S USE of the surveillance devices known as stingrays, fake cell towers that can intercept communications and track phones, remains as murky as it is controversial, hidden in non-disclosure agreements and cloak-and-dagger secrecy. But a group of Seattle researchers has found a new method to track those trackers: by recruiting ridesharing vehicles as surveillance…
Read more

America’s gun culture in 10 charts

Students across the United States will join a national march to call for tighter gun control and to highlight the issue of school safety.The March for Our Lives was organized by pupils at the Marjory Stoneman Douglas High School in Florida, where a former student is accused of killing 17 people last month.The shooting, one…
Read more

How to Protect Yourself From Cyber Attacks

Today, we live in an age where cyber security is crucial. Cyber attacks are rampant and it has got to the point where these malicious crimes have become the norm. In the last month alone we have suffered several global cyber attacks. In May, millions of users across the globe were caught off guard by…
Read more

Surveillance: Past, Present and Future

Surveillance is an intrinsic part of a private investigators craft. Also known as spying, it is a way of gathering and collating information, and then using that information to increase ones understanding of another party’s actions and intentions. There is a distinction between surveillance and spying though. Surveillance is solely the act of gathering information…
Read more

Learn cybersecurity basics with these essential YouTube videos

A hand-picked list of must-watch cybersecurity videos to help you learn the fundamentals of encryption, how hackers penetrate systems, and strong cyber-defense tactics for business. This year global cyber-war went mainstream. Banks were robbed by digital criminals, Yahoo confessed to losing half a billion consumer records, foreign attacks leaked documents from the Democratic National Committee…
Read more

Experts predict 2017’s biggest cyber security threats

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cyber security threats likely to materialize in the next year. If 2016 was the year hacking went mainstream, 2017 will be the year hackers innovate, said Adam Meyer, chief security strategist at SurfWatch Labs. Meyer analyzes large and diverse…
Read more

Facts, Truth and Evidence: How to be Objective

As legal investigators, we are not truth seekers, but fact finders. We rarely discover “the whole truth and nothing but the truth.” Moreover, although we may discover a lie or two along the way, it’s not up to legal investigators to decide what the “truth” is. It’s up to us to find information, facts, and…
Read more

How to safely access and navigate the Dark Web

This is the last installment in a series of Dark Web articles brought to you by Washington State Investigators. Is your business data on the Dark Web? Learn how to find out if you've been compromised in this step-by-step guide to accessing the underbelly of the internet. The Dark Web is easy to find. With…
Read more

One of the biggest hacks happened last year, but nobody noticed

Millions of email addresses, passwords, and cell numbers were in the stolen database, but questions remain over where the breached data came from. Hackers last year quietly stole a database containing the details of over 57 million people. The breach has only come to light this week, after the stolen data was put up for…
Read more