Hi, How Can We Help You?
  • Address: 91 Murphy Street, Richmond, 3121
  • Email Address: support@investigatorsaustralia.com.au

Category Archives: Investigation Services

June 19, 2020
June 19, 2020

I recently came across an article written by a former investigator who was involved in spying insurance companies. As a private investigator, that article really intrigued me and upon scrolling through the comments section, I found out that people see investigators as a lowlife. But it’s not really clear from the comments how private investigators would fare with journalists in terms of social hierarchy.

To address the misconceptions that were pointed out in the article, let me first start with the title. The article has this for a title – I was a private investigator, spying for insurance companies. First of all, private investigators are not spies. We are investigating and not doing any kind of espionage, which is what the author has engaged in even if she is trying to cover that up.

As private investigators, we’re merely doing surveillance and that’s a legal activity. We conduct an investigation on a wide range of activities including insurance claims. Perhaps the author thought that being a licenced investigator means she has the freedom to use such license to her own advantage.

Clearly, the friends of her employers at GCHQ and NSA thought that they were above the law. If you’re among those people who doubt that our government is also engaging in illegal surveillance, then I can only say little to convince you. I have every reason to believe that the intelligence agencies of the Australian Government are actually breaking the law even if they won’t try.

I can only hope that Mendes, the author, did not engage in some other illegal activities. Most private investigators I know are doing their best to act lawfully during difficult situations where complex legal issues are involved. Most of them will surely be happy to know that a private investigator that’s willing to break the law has already left the industry. But unlike private investigators, government agencies usually have more access to resources that will allow them to manage compliance accurately, which is why their failure to do so is a serious problem.

I truly believe that the biggest enemy of knowledge isn’t ignorance, but the illusion of knowledge. The author might probably not aware that people, in general, are not good at recognising faces, however, a well-experienced investigator is fully aware of this.

In the book, the author seems to have an opinion that the man she was observing during her surveillance was the insurance beneficiary of the subject. She followed him for several days and found out later on that she was actually following the wrong person. In this case, the proper investigative protocol is to provide the investigating manager with photos of the person so she can personally identify the person.

According to the claims officer, the evidence she has provided would have brought the case “out of water”, which is a surprise that Mendes is not well aware of. She also narrated another example in the book about a nurse whose every move she documented in a detailed report, including when she gave a kiss and other gestures.

It’s pretty clear that the only person in Australia who might be responsible for documenting an individual’s every move is her employer, which to me, was the Australian Government. Even without a warrant, the government will access your metadata and will share this with the other eyes of the government. This will facilitate backdoor through apps and will monitor your every move from the thousands of CCTV cameras all over the country while its allies will establish secret relationships with large tech companies.

They would go as far as taping fibre optic lines, which are responsible for carrying Internet traffic just to harvest your data. Yet, despite doing all these, they are the worst when it comes to managing confidential information.

If what Fairfax has reported is correct, then it should be clear that ABC is interfering with the government. So, will their final step of establishing a total surveillance state is to secure a monopoly of investigative power so they will have access to the personal data of a private citizen? Will the ABC serve as the propaganda tool that the government is trying to establish? I am not saying this because I hate ABC. In fact, I rely on the ABC for news, but they have certainly done something wrong here.

First, the author is suggesting that her surveillance of an insurance claimant is a total waste, which is an indication that she feels much of her work is just a waste. Then she seems to have changed her mind and suggested that the type of surveillance that will document every person’s move is somewhat intrusive.

So basically, what she’s trying to say is that being intrusive is a waste?

For me, waste refers to a civil right that can’t be enforced. A contract would be deemed useless if one can’t enforce rights into one’s gains in a given agreement. Are we going to forgive our debtors of what they owe us just because we have offended them for trying to recover such debt? What about the insurers? Can they not enforce their rights due to their size?

Like any profession, there are cases where rogue operators end up doing something wrong. However, it’s not right to suggest that claimants who are aware of the surveillance are getting subjected to a vicious cycle of enhanced surveillance and paranoia. This just makes no sense to me. I just don’t understand why anyone would deliberately put a person who is surveillance aware under another surveillance? If the person is fully aware that he’s being observed, then understandably, he wouldn’t do something that could risk his insurance claims.

If the subject is aware of the surveillance, the proper way to address this is to either stop the surveillance altogether and consider using various operatives in order to minimise any suspicion that could jeopardise the operation. Or perhaps, she can choose to recommence her surveillance after several weeks or months to see if the subject is indeed aware or not. Any experienced private investigator knows that you can’t benefit from monitoring a subject who is surveillance-aware.

June 15, 2020

With the coronavirus pandemic going on all over the world now, it’s clear that we are living in a strange and somewhat scary time. Concerns over public health have caused fear and uneasiness all over. Adding to these worries is the fact that the supermarket shelves are dwindling because people are panic buying. No one knows what will happen in the coming months or when this crisis will be over.

Here at Investigators Australia, we have helped a lot of people, especially during the most trying times of their lives. In our many years of experience, we’ve learned that it is during the most challenging moments that people want to re-establish contact with estranged relatives and old friends.

Getting in touch with someone you care about the most, whether they’re a family member, an old flame, or a long-lost friend, can somehow help to give us comfort during these hard times. Now that we’re in the midst of a coronavirus pandemic, it’s not surprising to see that many people are trying to re-establish connection with old friends and family.

You would think that locating someone from your past should be easy now that we have the Internet. But it’s a different story if an investigator is trying to locate debtors and fraudsters. It is indeed difficult to track people who generally do not want to be found and will do everything they can to conceal their identity.

But there may be some people in your life that you have been trying to locate to no avail. This is where Investigators Australia can step in to help. As always, every case we handle presents new challenges and there are situations that can make our investigation process even more challenging.

Our private investigators are equipped with the right tools and researches to locate individuals. We have access to several databases that can provide information regarding residents and citizens of Australia.

So far, we have been successful in locating individuals through careful search and analysis of the records we have obtained from these databases. But we know that database searches alone are not enough. We may need to do further inquiries just to locate certain individuals.

If you are unable to locate a certain person, whether she is a family member, friend, past colleague, or pretty much anyone, you should enlist our services. Save yourself from all the troubles because if you’re not trained for this task, you’ll just end up wasting a lot of time and effort.

To ensure the best results, it’s important that you provide us with all the relevant details right at the start of the investigation. We need you to provide us with all the actual details of the subject and how you were able to obtain the information. If you can’t afford to pay for the services, the investigator can offer free consultation and share some tips on how you can successfully locate the person yourself.

Investigators Australia has helped hundreds of clients locate missing individuals across the country. Our private investigators are qualified and licensed to conduct investigations and surveillance in order to locate missing individuals. We guarantee your confidentiality so there’s no need to worry about the person finding out that he or she is being investigated.

Most of the job that we do here at Investigators Australia has something to do with locating missing persons. We are proud to say that we are expert in this field. In fact, we enjoy the process that comes with putting puzzle pieces together. Below are some testimonials we received in our many years of operating as private investigators.

“Hi! I would like to thank you for your help. The LinkedIn account and the addresses you gave me were that of my dad and he’s truly very happy that we have gotten in touch. He was looking for me as well. Unfortunately, he got my name wrong. But thank you for we finally made contact.”

 “Good morning! I was so happy to have finally spoken to my brother last time after so many years of not hearing from him. Thank you for making this reunion a success. It’s a dream come true for me and I still can’t believe that it’s really happening!”

How to Locate an Old Friend

Have you lost touch with a dear friend, perhaps an old classmate, colleague, or a buddy you use to work with? Or perhaps, you’ve got some estranged family member somewhere and you believe that it’s about time to kiss and make up. We can help you with this. In fact, we refer to this operation as “Old Friend Locate Investigation.”

Our licensed investigators will do their best to help you get in touch with people you thought you wouldn’t be able to speak again. If you’ve made personal attempts to look for them in social media and failed, you might as well leave it to us.

Before we start with the operation, we’re going to ask you a few important questions, such as the following:

  • What’s the full name of the person?
  • When was the last time you spoke to each other?
  • What’s the city or state that the person used to live in?
  • Can you provide any information about the person’s family?

Your answers to these questions can help us to gauge the probability of us locating that person.

As for the missing persons that we’re trying to find, there are various reasons why they may have fallen off the grid.

Others are simply avoiding any of their family members and some people are trying to hide from legal and financial responsibilities. We’ve had so many clients before who are looking for someone who owes them sums of money, so this is not new to us.

It’s also possible that the reason why you can’t locate the person is that he or she has simply fallen out of touch, either because the person has moved to a new place or has totally forgotten about you. Whatever the situation is, we can assure you that we will be able to help you locate old relatives, colleagues, or any of your past acquaintances.

June 9, 2020

According to research, about 10% of the entire population is left-handed. Scientists have long been interested in knowing what makes some people write using their left hand even though the majority of the population is right-handed. During the ancient civilisations, people would actually think of left-handedness as something of a devil sign.

As a matter of fact, scientific research has long been exploring this theme and has attempted several times to look for a connection between unusual behaviour and left-handedness, but with no success.

If we look at the names of famous people who are left-handed, it’s clear that this trait is more likely linked to high intellect. Some of the famous personalities who are left-handed are Leonardo da Vinci, Bill Gates, and Marie Curie.

Handwriting Analysis

At Investigators Australia, one of the things that we do is to conduct an analysis of handwriting and signatures. For example, we have handwriting experts who are able to study and examine a handwritten will, even if it’s written in cursive.

Another case may involve examining a bill of sale or handwritten contract. Sometimes, questions arise regarding anonymous notes that are sexually threatening in nature or those that contain harassing messages. In some instances, investigators may be asked to examine bank robbery notes. They can also analyse numeric entries on accounting ledgers and timesheets.

The materials to be compared and analysed will vary depending on the type of writing that’s involved. For instance, you’ve received a letter of harassment. If the address happens to be handwritten, the investigator will conduct an investigation by analysing the handwriting in hopes of uncovering the person behind it. We have investigators who are experts at analysing handwriting and are able to identify certain features in writing that can uncover the person behind the harassment.

Around 2004, I conducted a test on about 300 left-handed writers in order to figure out whether the way a left-handed individual holds their pens will affect their writing’s stroke direction. I also wanted to know if the results of my writing could replicate the data provided by the research above even though the main subjects of my study were all Australians.

None of the results were clear, but I’ve noticed one result that’s more pronounced. The results of my experiment were somewhat the same to the subjects from the UK study when it comes to the stroke directions.

Also, the hook-handed position of holding the pen doesn’t have any significant effects on the frequency of left-handed strokes that can help to distinguish left-handers from right-handers.

Identifying whether the handwriting is written by someone left-handed or right-handed based on stroke direction is an important tool that an investigator can use to determine whether a particular handwriting or signature is forged.

Handwriting Comparisons

When it comes to analysing handwriting, forensic experts may need to carry out in-depth analysis in order to figure out the rare or common ways in which each number or letter might be written based on experience, although there are not enough tools that can measure the accuracy of these assessments.

But not everything is bad news. In the past few decades, there have been several validation tests made to establish that the final conclusions that experts made have relatively fewer mistakes, in terms of properly identifying the writer behind the document in question.

There are two issues that forensic experts have to deal with when it comes to analysing the different designs of letters. One is that it usually a large number of assessments from different experts is required before the results are considered reliable. Also, these results have to be compared to a reliable set of proven data.

The second issue that these experts have to deal with is that any data that shows what’s common or rare has to be current and this can be a real problem if the handwriting has been affected by the changing nature of what’s considered as handwriting and also the effects of ageing and migration.

But there’s one area where both variables have a lower effect. Previous research done in the UK by some researchers has shown that there’s a huge difference between the pen stroke directions of right-handed and left-handed individuals, regardless of their educational attainment and age.

The research shows that left-handed individuals are more likely to create cross strokes in the right direction to the left. Also, left-handed writers tend to write circular numbers and letters in clockwise strokes instead of counter-clockwise.

For instance, on the cross strokes of letters T, J, A, and the cursive letter t, it’s found that around 58 to 76 percent of left-hand writers write from left to right depending on the letter’s formation. This is a higher proportion when compared to that of the right-handed individuals.

However, the study didn’t include any material about the possible effect of the hand and arm position in this data. It’s a common notion that left-handed writers are known to use different hand and arm positions while they are holding their pen.

There are those who hold the pen in a “hooked hand” position in such a way that the pen faces them. It’s been said that the main differences between right and left-hand writers may have something to do with this peculiar position of the hand.

Here’s a picture of a hook-handed leftie:

Throughout our many years of working as private investigators, it’s common to hear from our clients that the person behind the note they are trying to analyse may be left-handed. This is especially true if the handwriting is in cursive. Sometimes, they say that an elderly person might have written it and maybe the person is a female.

But the reality is, there are left-handed individuals that are capable of writing in a right-handed slant while there are also right-handed people who can write with a left-handed slant. And if particular handwriting is shaky, it doesn’t necessarily mean that the person behind it was old. Also, cursive text that’s skilfully written doesn’t always mean that the writer is female.

June 1, 2020
June 1, 2020

In 2018, pipe bomb threats were sent to well-known politicians such as Barack Obama and Hillary Clinton, setting off an intense investigation to find out the person behind them. From Washington to Florida, New York, and Los Angeles, authorities scrambled to intercept these small bombs inside envelopes.

But how does Investigators Australia go about investigating serious threats such as these?

First of all, we closely examine the envelope that the bomb was stored in to look for biological evidence. Of course, we also inspect the bomb itself. We look for fingerprints and other evidence. The authorities will also consider examining the address sticker of the envelope and the stamps affixed to it, which may have fingerprints that can be checked through DNA testing.

But since so many people may have handled the envelope, it can be a challenge to connect the fingerprints to one single person. If biological evidence like fingerprints and DNA is established, investigators have to cross-reference these against the database of law enforcers to look for a possible match. But if the perpetrator is extremely careful, the package won’t show any fingerprints or DNA evidence.

If investigators can’t find any biological evidence, they will closely examine the bomb itself. It’s entirely possible that the chemical or physical appearance of the device is unique. Some of the chemicals used may have some identifiable source that will allow investigators to trace the suppliers and gather relevant data from them. This can help to narrow down the suspects and include everyone who bought the components used in making the bomb.

When inquiring with the suppliers, the investigators will ask them to provide details of credit card transactions, bank transfers, cheques, etc. They can also focus their investigation on the postal markings, stamps, and envelopes. The investigator will identify from what region these pipe bomb threats were sent and they can do the tracing.

Next, the investigators will check the address stickers on the envelope to look for the Machine Identification Code (MIC). This comes in the form of a tiny code or digital watermark that copiers and laser printers will automatically print into the document. Usually, the average person won’t know about this. So, if the sticker happens to have that MIC, the investigator will locate the printer used which will eventually lead them to the perpetrator.

Another way to investigate a pipe bomb threat is to study how the bomb was assembled. Investigators will closely examine how the bomb was made. They will try to discover if the bomb was made based on a specific model that was found on the Internet. Now if the investigators are able to establish that the bomb was indeed uniquely made and was made based on a particular model online, they will immediately identify all the visitors who have visited the website recently. They will come up with a list of suspects based on the visitors to that site.

Somehow, it will be an advantage to the investigators if the bomb used was real and not fake. This will give them the idea that the person responsible is indeed an expert in making bombs, which can further narrow down the list of the possible perpetrators. If the person spent a lot of time researching online while making the bomb, then that would somehow make the process of investigation easier.

US government agencies are very serious about online surveillance. So, if the perpetrator talks about the attack online, then that will be even easier for the investigators to locate the person behind this malicious threat.

After going through the above process of investigations, the investigators will now have a long list of possible suspects. The next thing they will do is to do a background check of each of these people. They might have to conduct surveillance, either in the form of digital surveillance, physical surveillance, and other means.

Sometimes, they will try to intercept the mobile devices of the suspects and conduct GPS monitoring. Doing these things will allow the investigators to verify whether any of these suspects might be responsible for the threat.

During their surveillance, they will also try to find out if any of these people may have been involved in recent terrorist threats. They will also investigative if the person is preparing for a future attack.

One important thing to keep in mind during the process of investigation is that the people behind this threat are not really as smart as they think they are. The majority of those who have made these kinds of threats before have been caught.

But if the culprit behind the pipe bomb threats that were sent to Barack Obama and Hillary Clinton was indeed smart, then that can be a problem for the investigators. If that person is really good at what he does, then he may have taken into account the investigative processes mentioned above before committing the crime.

What is a Pipe Bomb?

Pipe bombs are explosive devices in the form of a pipe and are improvised by placing explosive materials in the pipe’s tightly sealed section.

How Do Pipe Bombs Work?

Pipe bombs should not be taken lightly because this device can be lethal even when a low-level explosive is used. Basically, this device is a bomb that’s encased in a pipe. It works by placing explosives into the pipe and is then sealed with caps made of either brass or steel.

A fuse is usually placed into the pipe. Then a lead wire will come out of the capped end or into a drilled hole. The fuse is attached to a battery or timer and when the explosive material detonates, the pressure will trigger the pipe to break into fragments, producing shrapnel.

How Powerful Can Pipe Bombs Be?

Depending on the way a bomb is made, it can be really powerful. The explosive material that’s placed in the pipe is exposed to extreme pressure.

Sometimes, the bomb is made with some other materials such as glasses and nails that can make it even more dangerous.

May 25, 2020
May 25, 2020

These days, almost everyone has his or her own mobile phone. We use it on a daily basis, and it’s probably the first thing we check the moment we wake up. Most of the time, we use the phone to communicate with acquaintances, check the news, play games, and many other things.

Because of this, a lot of sensitive data is stored in our phones. Aside from passwords, it contains credit card information and other items that are not supposed to be accessed by other people, even your partner.

There are two common ways through which your privacy could be compromised in your mobile phone. First is when your device is bugged or the account you have accessed using the device gets compromised. Today’s advancements in technology make it easy for anyone to tap the device of their partner, especially if they suspect him or her of cheating.

If you feel like your partner is bugging your phone, there are two things you should be wary of. First, find out if your partner has tampered with your phone. Then check if there’s a spy app or program that’s running in the background while the phone is being used.

Mobile spy applications and programs can operate in the background without you knowing. It can be difficult for an average person to detect if such an app is running.

But here’s what you need to watch out for. If your battery capacity has gone lower than the usual, then that could be a sign that a spy app was installed in your device without you knowing.

Other indications are increased data consumption, the battery becomes hot easily, and your phone will take a long time to shut down. If you are hearing some unusual noise while making calls in your phone or if you’ve noticed that your device is showing some activity even when you’re not using it, then that might be because someone is tapping your phone.

If you feel like your phone is being bugged, you should get in touch with Investigators Australia and speak to one of our forensic investigators. He will be able to perform an examination on your device to determine if there are any malware, bugs, or suspicious programs installed. With his knowledge and skills, the forensic investigator will be able to easily determine if your phone has been compromised.

Another way through which your device can be compromised is through a breach of an online account, such as social media or email. Anyone who can get a hold of your phone may be able to access your email or social media account. Sometimes, they will install the malware in order to obtain your password. Once the perpetrator has your password, it will be easy for her or him to access everything and this may include your bank accounts.

If you feel like your account has been compromised, then you should consult with one of our forensic investigators. He can monitor your online account to prove if your suspicions are right and will also take note of the IP address of the user who is trying to access your account without your knowledge. It may also be possible for anyone to use spyware to hack your account and commit identity fraud.

Using spyware and unauthorised access to a password-protected account is against the law, although there are some unscrupulous investigators out there who will sell these services and will not inform their clients that they could be charged for such an act.

If your partner is keen on stealing your information, there are many opportunities for her or him to do so. He or she can intercept your mail, hack your computer, rummage through your bin, or bug your phone. So, if you feel like your phone has been compromised, you should contact Investigators Australia and speak with one of our forensic experts.

How to Check If Your Phone is Tapped

Below are some of the most common signs that your phone is being bugged.

  1. Battery Drain Problems

If you feel that the battery of your phone gets used up pretty quickly even if you don’t use the device too often, then that may be a sign that someone is tapping your phone.

Also, hot batteries can be an indication that your phone is overused and that’s maybe because a spy app or some malicious software was installed in there without your knowledge.

  1. Excessive Mobile Data Usage

Keeping track of your data usage is another way to determine if there’s spyware installed in your device. If there are several apps running in your phone, this could use up a huge amount of your data, especially if you’re not connected to Wi-Fi.

A lot of people are not mindful of their data usage, but it’s important that you have an idea of how much data you’re using every month. And if you notice a drastic increase, then you should get your phone checked, because a third party might be trying to intercept your communication with other people.

  1. Unfamiliar Apps and Strange Ads

Since you are using your phone every single day, then you should be familiar with its every aspect. It’s very important that you’re also familiar with the things you have installed on your phone. So, if you notice some unfamiliar things in it, then you should immediately remove them because they could be malicious apps.

Hummer is an example of a malware that’s being used by malicious individuals to tamper mobile phones. In 2016, this malware infected millions of Android users. The creator of the virus who is said to be from China earns $0.50 for every infection. In only 24 hours, they were able to earn revenue of more than $500,000!

Those who were affected by this malware will see tons of intrusive ads since the malicious software will not always hide. When this spyware is installed in your device, it will obtain root access to your phone. Then your phone will start downloading unwanted apps and content that is absolutely difficult to remove. It also generates lots of ad traffic, which explains the significant increase in data usage.

May 19, 2020

Working as a private investigator, one of the first lessons I’ve learned is that whenever someone does something wrong, their wrongful actions will eventually become a normal part of their behaviour.

Several years ago, a woman contacted us here in Investigators Australia asking us to investigate her ex-partner. The man was said to be a sociopath and had stolen a huge amount of money from her before they split up. Six months later, another woman contacted us sharing the same story and apparently, the same man was involved.

What’s more, each woman managed to get in touch with another woman who had dealt with that same man and suffered in the same circumstances. With everyone’s consent, we placed the women in touch with one another until we were able to piece together the entire story. It appears that this man had stolen more than $200,000 worth of money from these four women, which also included expensive things, such as engagement rings.

In fact, he had even stolen a cat from one of them and gave it to another woman as a gift. Investigators Australia was able to contact another woman who got victimised by the same man. In her case, the man took an unjustified AVO against the woman.

So, we informed the police about the man’s chequered past. He was clearly a troublemaker who duped several women he had a relationship with. But this case is just one of the many cases that we investigate on a daily basis.

Recently, there was an interesting story that was been making rounds on the Internet this week. It was regarding a hotel worker who had stolen more than a thousand underwear and bras and was also accused of stalking teenage girls.

The accused, named Sutan Achmed Daniel Al Hamilton was a 37-yr old hotel employee who stole more than a thousand pairs of undergarments from Ibis and Rydges hotels in the past few years. He admitted his crime in front of the media outside the court and claimed that it was due to his “fetish.”

The cases illustrated above are examples that impropriety is indeed a pattern of behaviour. Trivial incidents such as stealing underwear or telling lies to a spouse or partner may not matter to most people, however, these are indications of a much deeper problem in the future. For instance, in the case of the hotel worker, he has not only been stealing undergarments, but he was also stalking teenagers, aged 15 to 17 years old.

Behavioural patterns are also present among those who have committed serious crimes. Examples are serial killers who engaged in other criminal acts at a young age, such as harming of animals and arson.

In fact, convicted killers like Russel Williams and Jeff Brudos are said to be stealing women’s undergarments before they committed sexual assaults and eventually resorted to killing people.

Intuition is Nature’s Insurance Policy

If your instinct is telling you that something is wrong, then it probably is. Most of the time, our intuitions are right even if it’s somewhat trivial. So always pay close attention to your instincts. If you find the behaviour of a particular person doubtful, then you should do something to address your doubts.

Background checks are very useful during these situations. This is especially applicable in cases involving intimate relationships and when hiring a new employee. Having evidence of past wrongdoing is an indication that special attention must be given to the person.

What Leads to Criminal Behaviour

In one study, it was found that an individual could have up to eight different traits. Other studies have also established that a person can have up to six traits. Below are the six different traits that a person can possibly have.

  1. Criminal Peers

Those who have this trait are individuals whose peers are linked to criminal activities. Most of these people are involved in substance abuse, either alcohol or drugs.

Peer influence is the number one reason why individuals will engage in criminal activities. This is a common trait among individuals who lack community involvement.

  1. Anti-Social Personality

This trait usually includes atypical behaviour that’s been acquired before reaching the age of 15. It could include running away, fighting, skipping school, lying, damage to property, hurting animals, etc.

  1. Dysfunctional Family

Some people resort to crime due to a dysfunctional family relationship. These are people who don’t get enough emotional or financial support from family members.

This can also happen if the family of the person involved doesn’t have the ability to solve problems and is unable to communicate with each other effectively.

Some family members are usually not good at expressing emotions in the most appropriate manner. Sometimes, the family members themselves are also involved in criminal activities.

  1. Lack of Self-Control

This trait refers to the inability to control one’s impulsivity and temperament. Those who possess this trait tend to do things without carefully thinking about it. Their mindset is to do things here and now and will not consider the consequences of such behaviour.

  1. Anti-Social Values

This trait is also called, “criminal thinking.” It’s usually characterised by a belief that their actions are justifiable even if it’s criminal in nature.

Individuals who have this trait tend to blame others for possessing such negative behaviour and will not even show any remorse for what they have done.

  1. Substance Abuse

This refers to those who have been addicted to alcohol or drugs to the point that it affected their ability to engage in a productive lifestyle. People should normally have an increased tolerance to substances and should know when to stop drinking or using.

The normal process of assessment will normally take six days to be completed. If it takes more or less than that could lead to inaccuracies. As soon as the officer establishes an idea on the level of risk involved and has recognised the subject’s criminogenic traits, they should immediately start with the supervision.

They should come up with tactics that can help to motivate the individual to achieve success while also holding them accountable and impose proper sanctions to address the negative behaviour.

May 15, 2020

Statistics show that the infidelity rate in Australia and some other developed countries has increased in the past 50 years or so. This may be due to the fact that more and more women are entering the workforce, which many believe is an opportunity for them to cheat.

And now that we’re in the age of the Internet, it’s easy for anyone to meet someone online, with the help of social media and dating apps. These tools have made cheating easier for everybody. In fact, studies show that sexual and emotional affairs are present in almost 70% of all marriages. This is pretty upsetting.

Our job as private investigators is to help individuals who suspect their spouses of cheating. We’ve handled these cases several times before and are very familiar with this.

Here, we’re going to share with you some surprising facts about cheating partners:

  1. Cheaters are narcissistic and some are even sociopathic

Cheaters have the tendency to show sociopathic traits and have a tendency to display a general lack of empathy.

Some of the most common behaviours that we have observed in them are callousness, pathological lying, and manipulation. One of the subjects of our investigations even took advantage of six women and these were the only ones we knew about!

  1. Some religions accept infidelity as basis for divorce

In case you’re not aware, different religions actually have different rules on granting divorce. For Maronite Catholics and Coptic Christians, evidence of infidelity is enough to grant the divorce.

This is why if they suspect their partners of cheating, they immediately hire private investigators to gather evidence that they can use as grounds for divorce. Once the evidence is presented to their high-ranking priests, they will review and eventually grant the divorce.

  1. Infidelity doesn’t affect divorce according to the law

This might come as a surprise but infidelity is not ground for divorce in Australia. Just because your partner has been unfaithful doesn’t mean you can already divorce him or her.

Furthermore, your partner’s infidelity will not play a part in the splitting of your assets.

  1. Some couples don’t separate despite obvious cheating evidence

Interesting enough, it’s common for partners to still go on with the relationship even when there’s already a clear evidence of infidelity.

Some couples are willing to ignore what their partners did and will continue with their relationship due to various reasons, one of these being financial. Also, those with children try to forgive and forget for the sake of their kids.

But in our many years of experience as private investigators, we can say that every individual has different thresholds when it comes to tolerating their partner’s infidelity and it’s merely up to the parties involved to decide on how to handle the issue. Our role is to simply assist people in making informed decisions.

  1. Private investigators can sometimes catch the cheating partner in the act!

As private investigators, our main task is to gather enough evidence that will prove the cheating partner’s wrongdoing. We are so good at what we do that we have been able to catch them on the act several times!

These include kissing, holding hands, and even being intimate with each other. In one occasion, our investigator was lucky enough to be at the right place and at the right time and was able to gather actual footage of the act!

  1. Cheaters slip up often

In our experience, we have found out that cheaters are not actually as smart as they think they are. They tend to develop a pattern of behaviour that makes their partners suspect them.

And once the seed of doubt is planted, these suspicious partners will become more wary of them and will be very watchful of their action, which causes them to get caught.

  1. Cheaters usually have a conservative Christian background

Ashley Madison, a controversial dating site that’s geared towards married people who are interested in having an affair, conducted a survey that revealed more than 70% of the dating site’s users are Christians.

We’re not really surprised by this because in our job as private investigators, most of those we investigated for infidelity were Christians. This is probably due to the fact that the religion encourages people to marry at a younger age and they realise at a later time that they weren’t yet ready for commitment.

  1. Putting matters into your own hands is never a good idea

We’re not promoting our services so that we can earn good money. But we are promoting it since we know it’s what people should do.

If you’re not trained for this job and you attempt to do it yourself, you might just make things worse for you and your relationship. You cannot just hack into your partner’s device to look for evidence because that is illegal. Doing this might just turn the tables.

Your partner will use it against you. Sure, it’s possible for anyone to do surveillance but it can be time-consuming and is not practical if you have your own job to attend to.

  1. There’s a good chance that the cheating party is lying about other things too

Another thing we have learned about cheaters is that lying becomes a pattern of their behaviour. So, if your partner is cheating, he or she is more likely to be good at lying too.

Over the years, we’ve come across several individuals who have not only cheated, but also lied about their financial matters, addictions, career, etc.

  1. Some won’t admit they are unfaithful even after decades of cheating

People who cheat will never admit their wrongdoing even if you catch them or have pieces of evidence to prove their infidelity.

Even if they have been unfaithful to you for decades, they will never admit their mistakes. And if the cheated party will continue to ignore the behaviour or remains in denial to their partner’s wrongdoing, this behaviour will go on until forever.

We have cases where they have been suspecting their partners to be cheating on them for decades, but it’s only now that they decided to have him or her investigated.

May 5, 2020

It’s truly unfortunate to hear reports about elders being abused by their own carers and even family members!

We’re not only talking about physical abuse or mental abuse, but also about deceiving them of their assets and pensions. In fact, this is one of the most common cases that Investigators Australia deals with, which is truly upsetting.

To fully understand what elder abuse is, we’re going to share some of the most shocking facts we’ve discovered after many years of handling these cases.

  1. It’s very common

Society dictates that we should care for the elderly and treat them with the utmost respect. But you might be surprised to know that elder abuse is pretty common.

Even though there’s not yet an established measurement on how prevalent elder abuse cases are in Australia, International figures say that about 2% to 15.7% of the elderly are victims of abuse.

The real figure may actually exceed these estimates since there are plenty of elder abuse cases that have not been reported. And in countries like Australia where there is a rapid increase in the ageing population, there may be several of these cases.

  1. It comes in many forms

There are many forms of elder abuse cases. Since this crime has a broad category, the abuse can come in many forms. Furthermore, the implications of each of these cases would vary wildly.

Although mismanaging finances is the most common, elder abuse can also come in the form of physical, social, psychological, and even sexual abuse, done by the carers themselves.

Different forms of elder abuse cases can also co-occur. For instance, financial and physical abuses are inflicted together.

  1. The victim’s child often carries out the abuse

One of the most common elder abuse cases that we’ve handled has something to do with financial matters. And surprisingly, this is usually carried out by the victim’s own child!

The reason behind this is that it is usually the family members that have easy access to the victim’s financial resources.

According to the data gathered by Victoria’s National Ageing Research Institute of Seniors Rights, the perpetrators behind the 92.3% of elder abuse cases are the victim’s family members. Meanwhile, 66.8% of these are done by the victim’s own child!

  1. The victim and the perpetrator sometimes are not aware of the abuse

As mentioned, people who are close to the victim or a family member are often the perpetrators. Because of this, the victim may not consider the act as something abusive. There are also cases where the victim would refuse to accept the fact that someone they trust or love is already abusing them.

Meanwhile, the perpetrator of the act will sometimes fail to acknowledge that they are already being abusive to the elderly person. There are also instances where they will neglect their needs. Carers are often the ones who are more prone to abusing the elderly due to stress and frustration that comes with caring for the elderly.

Short temper and emotional disconnectedness are some of the most common reasons behind elder abuse among caregivers and carers.

  1. An investigator can assist with elder abuse cases in many ways

If you suspect a person is abusing your parent or an elderly person that you love, you can consult with Investigators Australia for assistance on this case. As private investigators, we will closely monitor the person whom you are suspecting of committing elder abuse.

We are able to perform many things when handling elder abuse cases. First, we will do a background check of the suspect. This will reveal if they have a history of similar cases or has been accused or convicted of criminal acts in the past.

When it comes to financial matters, our forensic experts will conduct an analysis of signatures and handwriting. This is the best way to determine if there has been any forgery committed.

Our investigators can also prove claims of any allegations made regarding a dispute over the estate and provision claims of the elderly family member. Furthermore, if an elderly relative has gone missing, our private investigator will be able to conduct an investigation to locate the person.

If you suspect that a carer is abusing an elderly relative, we will immediately conduct close monitoring in order to gather evidence of the wrongdoing which can be used as court evidence to implicate the suspect.

Common Risk Factors

Below are some of the factors that could increase the likelihood of elder abuse.

  • Individual

In most cases, those who are accused of abusing an elderly are suffering from poor psychological problems. Others have poor mental health and are suffering from substance or alcohol abuse.

Other individual factors that could increase the likelihood of abuse is the gender of both the abuser and the victim, especially if they are in a shared living condition. Although elderly men have the same risk as elderly women, elderly women are usually more prone to abuse.

They are also at risk of financial abuse and neglect, where their assets and properties are seized without their knowledge. Women have a higher risk of physical and sexual abuse.

  • Community

The consequent lack of social support and isolation of older persons in society are also risk factors for elder abuse.

A lot of elderly people are usually isolated either because they are suffering from mental or physical illnesses, or mainly because most of their family and friends have already passed away.

  • Relationship

One of the most common risk factors for elder abuse is a shared living condition. It’s not yet known if the adult kids or spouses of the victims are the most common perpetrators.

However, the dependency of the victim to the abuser is another factor that increases the likelihood of abuse.

In some instances, a long history of conflicting relationships with the victim could make the situation worse. Also, as more women are choosing to work and have less time to spare, caring for elder relatives has become an even bigger burden and this could increase the possibility of abuse.

April 6, 2020
April 6, 2020

Biometrics is a technology that has human characteristics. It can recognise individuals and harvest essential information about the overall human physiology. Some of the most commonly used biometric identifiers are capable of facial recognition, fingerprints, and heat signatures.

Businesses and government units have started using biometrics for a wide range of purposes. There’s also a wider opportunity for the use of data gathered by the biometric identifiers in the future. Most of these technologies are unique to each individual and can also be used in combination in order to achieve better accuracy.

Over the last few weeks, some airports have already utilised biometric testing on arriving passengers to identify if they are positive with the coronavirus. Also known as COVID-19, the virus started in Wuhan, a city in China’s Hubei province. The virus spreads very rapidly and has already killed thousands around the world.

In response to the outbreak, thermal cameras have been installed at the airports to check arriving passengers. These cameras are capable of scanning a huge crowd of people and detect who among these has a higher temperature, which is an indication that the person might be infected.

Some airports in Singapore and China had already been using thermal cameras years ago, during the 2003 SARS Outbreak. Countries like Nigeria and India also followed suit during the Ebola and Swine Flu outbreak.

But it’s important to note that thermal cameras are only useful in identifying who has high temperature or who has developed a fever which is a common symptom of the coronavirus. Studies show that the thermal scanning that was conducted at the airports was able to detect no less than 20% of infected passengers.

As a matter of fact, even the World Health Organisation doesn’t recommend testing every traveller since it provides little benefit but requires a considerable amount of resources. Biometrics such as fingerprint scanning and facial recognition are some of the most effective biometric identifiers.

With regards to biometric data, we believe that everyone should campaign for greater access to this data.

Meanwhile, thermal imaging technology has already been used widely by militaries and law enforcement agencies around the world. It was actually first used in the 1950s during the Korean War, which helped identify enemies in the dark. In the US, firefighters have also used such technologies to locate people during a rescue operations in the middle of dense smoke. Last year, US police forces used the technology in detecting and nabbing a gang of thieves in the middle of the night.

The use of biometrics by businesses, governments, and law enforcers is important. However, we cannot deny the fact that entrusting our data to the government would give them a chance to misuse them. But of course, privacy advocates don’t challenge the use of scanners to detect anyone who is positive of the virus. Is it reasonable enough to charge someone of disorderly conduct for deliberately covering his face when passing through facial recognition technology?

Here at Investigators Australia, we are fully aware of the fact that having more data will make it easier to solve certain problems. We sometimes refer to public record databases to uncover details about a particular person we are investigating. Thankfully, we have access to the ASIC database, which contains government-stored data. This is very useful for when we need to conduct an investigation. We also rely on databases owned by private companies, such as Equifax. This is what we use when looking for important information, such as addresses of certain individuals.

We truly believe that private citizens should be given access to government-owned data, whether it is to protect their financial interests by going after a debtor, identify if a potential employee is high risk, to learn about the deceptive behaviour of a partner, and more.

Today, governments are actually using biometric data as a way to lobby financial aid and ask for donations from big corporations. As for metadata, keeping biometric data by some powerful organisations and the government is something that’s truly useful in certain situations, although citizens should fully understand how to precisely use the data. They must also be given access to government-stored data that they can use for legal purposes.

For instance, the outbreak of coronavirus is a perfect opportunity for the government to explain how the biometric scanning will be implemented and how it has helped to curb the spread of the virus. They should also reveal whether it has worked and what type of data is being collected during the process.

The government should provide registers that are accessible to the public, that’s capable of anonymously storing information. That way, it will not reveal any information about certain individuals. This is to set guidelines for a more aggressive form of data collection that’s being done now.

This is also applicable when capturing a certain type of data. ASIC has recently started allowing media personnel to have free access to its databases, which we believe is heading in the right direction. However, this should actually be freely available to everyone, especially companies that are proprietary limited and licensed investigators like us. This can ensure greater transparency in the country and will encourage more overseas investors to invest their money in Australian-based companies.

Data of any kind must be obtained and kept in a transparent way while also considering any possible risks to the person involved. In a way, the data belongs to the person and they should know where and how the data is being used.

The comprehensive use of technologies for surveillance and biometric has questionably resulted in the government upturning the principles behind the presumption of innocence. It seems that the battle might have been lost in respect to metadata, where citizens won’t be able to have access to the compulsorily acquired metadata from ISP to be used for civil cases. Yet, the fact that the government has the freedom to use the data against its citizens is deemed as a threat.

April 5, 2020

Whenever you hear the term “private investigator”, what usually comes to your mind?

Are you thinking of a guy wearing a trench coat while sitting in a dimly-lit room and is focused on solving some mysteries while puffing a cigar? This is usually what comes to people’s mind about an investigator, and that’s thanks to those spy movies from Hollywood.

But over the past few years, investigators have actually evolved into a commercial sphere. In Australia and in the rest of the world, the role of a Private Investigator is now better understood.

Still, some people are not aware of what a modern-day investigator is capable of, especially these days when private investigators are tech-savvy and have access to innovative tools that can help them with their investigation.

What is a Private Investigator?

Private investigators are known for their excellent skills in observing and their keen eye for detail. Above all, they have a brilliant analytical skill. Sometimes called private detectives, these agents utilise different surveillance tools and investigative techniques in order to harvest accurate information about a subject and gather evidence.

Before private investigators can practice, they must first be licensed by the state where they are based. Most of them work as a full-time investigator and others are only on a contractual basis and are hired by private detective firms, organisations, businesses, and any individual who needs help investigating a person.

Although the services of the private investigators will vary from one case or another and will also depend on the industry they are working for, they usually have similar skillsets. Most of the time, these investigators are hired to uncover facts, gather pieces of evidence, and analyse information. They are also required to submit the results of their investigation to their clients.

Areas Where Private Investigators Are Useful?

Several industries can benefit from the services of skilled investigators.

Their knowledge, expertise and skills are valuable and are usually in-demand in the following areas:

  • Undercover investigations
  • Screening vendors and employees
  • Retail loss and prevention
  • Pre-employment screenings
  • Polygraph services
  • Offering personal protection services
  • Locating missing persons
  • Crisis intervention
  • Criminal investigation
  • Computer forensics services
  • Personal investigations

Short History

According to history, the first private investigation firm was established in France around the early 19th century. The man behind it was a Frenchman named Eugene Francois Vidocq who was an ex-criminal. He named the agency, “Office of Intelligence,” and most of the detectives he hired were ex-criminals. In fact, Vidocq is dubbed as the first criminologist. Using his printing company, Vidocq started producing a bond paper that couldn’t be altered.

Around the mid-1800s, a Scottish man named Allan Pinkerton who immigrated in the US established his own detective agency that he named “Pinkerton National Detective Agency.” The agency was based in Chicago and was launched after the local sheriff awarded him the role of a private detective. Pinkerton was doing well in his role. The highlight of his career was the foiling of former US president Abraham Lincoln’s assassination. It’s worth noting that the agency is still in existence today.

During the olden times, the services of a private investigator are in-demand among the wealthy people, usually businessmen and aristocrats, mainly for solving disputes on labour. The investigators during that time were tasked to perform things that law enforcers were unable to perform. Although the conduct was questionable, it took several years before the private investigation was considered a profession with ethical guidelines in place.

The Evolution of Private Investigators

Pinkerton deserves to be given credit for the evolution of the industry of private investigation since he did a great job of ensuring that the investigators he hired were able to adhere to the codes of conduct and ethical values of being an investigator. The skilled agents of Pinkerton swore never to accept any bribes. They were also advised against accepting reward money. They should be willing to work with law enforcers.

When the middle class started seeking the services of a private investigator, the roles of the investigators slowly shifted. Over time, several people were recognising the valuable work of private detectives since they saw them recovering lost property, solving complex issues in the society, providing answers to complicated questions, and many more. In addition, the private investigators were also very helpful during legal disputes and in cases where a client wants to achieve peace of mind by uncovering something suspicious.

As time went on, the public started to gain a better understanding of the services that private investigators provide, either through the media outlets, word of mouth, and portrayals on Hollywood movies. This resulted in a significant increase in the demand for the services of private investigators. These days, it’s common to hear individuals, organisations, businesses, and law firms hiring investigators in solving all sorts of issues, from personal problems to the most complex commercial problems.

With the advent of technology, the roles of private investigations were transformed. Thanks to the Internet, it’s now easy for investigators to get access to powerful databases for research. They also rely on the World Wide Web for resources that can help them to locate and identify profiles of the person they are investigating.

The private investigators of today are also equipped with tools and devices that can easily record evidence, although there are laws that must be followed when it comes to using these tools. These rules will vary from one jurisdiction to another. And although these resources have given investigators an advantage, the criminals have also taken advantage of these. Con artists, stalkers, and other people with malicious intent use these tools to carry out their illegal activities.

Because of the increasing demand for private investigators, there are now colleges and universities that train students who are interested to work as private investigators. And as with any profession, the private investigators must undergo rigorous training and must be familiar with the ethical codes that are expected to be followed.