Free Consulation

Call 866-629-3757

Archive for the ‘Private Investigator’ Category

The Panic Button Program

June 26th, 2013 | Private Investigator, Security | 0 Comments

Have any of you heard of this program yet? The Panic Button Program is a new school safety plan that was introduced in Connecticut. The program was created after the horrific incident that took place at Sandy Hook Elementary school when a gunman shot and killed 26 people.

Panic Button Program

After the incident at Sandy Hook Elementary School, a task force was created to brainstorm ideas to help prevent an incident like that from ever happening again. The task force suggested that each classroom have what’s called a “panic button” installed in it. Once that button is pushed, an announcement is made alerting everyone in the school that there is currently a life threatening situation going on. The school’s door automatically close and lock up, and a notice is immediately send to all emergency personnel to alert them of the situation.

Find out more information here about the “Panic Button” Program.

NSA to Release More Details in Surveillance Leak

June 13th, 2013 | Cyber, Privacy, Private Investigator, Security | 0 Comments

Since Edward Snowden blew the whistle on the National Security Agent a few weeks ago, and then fled to Hong Kong, the NSA has been under a great deal of pressure to explain just why they are invading the privacy of Americans without cause.

NSA to Release More Details in Surveillance Leak

The Director of the NSA explained that the information given out by Edward Snowden has created many misconceptions and inaccuracies about the program and why they collect communications data on people in the United States.

The Director said that the problem with divulging certain information is that it could supposedly put the American people in danger with that information. The NSA claims that they have been collecting communications data is to keep terrorism at bay.

The Director goes on to say, “The more we know, the more dangerous this situation becomes,” he said, adding that people believed to be intent on doing Americans harm had already altered their activities since the existence of the programs became public.

The whole ordeal has caused a great deal of confusion about whether or not Edward Snowden has broken the law or not and what his intentions were behind everything.

Senior Democrat, C. A. Dutch Ruppersberger stated, “He’s broken the law,”. “We have laws in the United States for whistle-blowers, for people who think injustice is being done. Yet he chose to go to China.”

Google Glass – A New Investigative Tool

May 30th, 2013 | Privacy, Private Investigator | 0 Comments

This is the new tool that has been creating the buzz all over the internet. Google has held four public discussions showing off their new amazingly innovative product – Google Glass. The product is a pair of glasses that allows the user wearing them to surf the internet, record video, and more.

Could this be the new investigative tool? In order to get the product early, you need to do a video of why you want the product and why you should be one of the chosen ones who get it. What person than a private investigator to need this product? It’s smooth, slick, and only costs $1200! The coolest aspect about this new product is that it looks just like the person is simply wearing reading glasses.

To find more information on this new product – check out Google Glass for yourself. ☺

Safety, Security, & Emergency Planning in our Nation’s Schools

March 20th, 2013 | Private Investigator, Security | 0 Comments

Think about getting a second opinion or even multiple opinions.

Dr. Victor H. Ferry, Ph.D., Senior Security Consultant

School safety, security and emergency management are now in the forefront of American educational leader thought. Finally, even national and state level politicians and others have come to the conclusion something more needs to be done to curb school violence and tragedies. A few years back, primarily after “Columbine,” school districts scurried to obtain crises plans; plans they could hold up to demonstrate something locally was being done, or at least thought about, to curtail the possibility of a calamity. Fact is and unfortunately, many of these were simply “feel good” actions by educators. The process was simple, get a copy of an existing plan, copy it and distribute it to those in charge of schools and students. The needed details to accompany true E-­‐plans or crises plans lay in future actions, many years away and have only recently been addressed in many districts, many within the past few to 5 years. Clearly, the initial actions were honorable and represented recognition that something more than the status quo needed to be addressed. However, much was done sans the benefit of any formal safety or security education, or even experience in the need to address school threats, especially those posed by a suicide shooter. These were almost unheard of in schools and considered unthinkable. Currently, schools are necessarily reassessing preparedness across a wide spectrum of threats. Now, use of or practice of the plans will no longer be eclipsed by an earlier more highly perceived priority: a focus on the education of America’s young. The realization that student safety and welfare has reached its pinnacle of awareness and priority among educators everywhere is an outcome brought about by unspeakable tragedy. Educators and politicians everywhere recognize the need for broad involvement in emergency planning opinions, counsel and advice by trained specialists experienced in safety-­‐security management in reviewing all emergency and crises planning. Schools attempting to go it alone risk the possibility of missing a key point or issue that could save lives.

Most importantly, Districts must retain only licensed and professionally certified Security firms that have documented experience in conducting Security, Safety, and Emergency Management Audits and Assessments at educational facilities.

For information as to how our firm can help you in assessing your school district’s safety, security and emergency management needs, contact us via email at www.jsainvestigations.com or call us at 860-­‐693-­‐6195.

© Jennings Smith Associates 2013

Top 3 Cyber Crime Trends Expected in 2013

January 18th, 2013 | Cyber, Privacy, Private Investigator, Security | 0 Comments

Each year it seems that cyber crime is getting worse and worse. With all the amazing and astonishing hurdles that technology has helped us overcome, with every positive, there are usually multiple negatives that follow along behind.

Top 3 Cyber Crime Trends for 2013

One of those negatives is the ability of some highly knowledgeable individuals to hack banks, steal identities, and more using technology. Here are the top three cyber crime trends that are expected for 2013.

The Mobile Speedy Pay

There are many applications now available to consumers that allow for “easy” banking, payments, and more. Of course this sounds great to consumers as we are always looking for faster methods of doing things. However, with these speedy pay applications come the higher risk of someone getting ahold of your information and using it without your knowledge to purchase goods. The scariest aspect about these speedy payment applications is that they are the most dangerous when using them in busier areas such as airports. Someone who has the technological capability to get this information will have a field day at an airport.

Malicious Applications

Although mobile applications have been around for a while now, it’s taken a while for many hackers to figure out exactly how to hack into phones. However, some of done this very successfully, and we now expect others to learn the same process. The issue with this is that they don’t want to hack your phone to get access to your confidential information, they want to hack into your phone, get into your App Store (which has your credit card information), and purchase “Malicious Applications” where the money used to purchase them goes directly to them (the hacker) so it’s easy money in their pocket.

Mobile Malware

We all know how large the problem with malware is when dealing with PCs and laptops, so it was just a matter of time before there was a type of malware created to infect mobile devices. And apparently 2013 is that time. This is when things get pretty crazy. Criminals can steal data from someone’s phone, and almost hold it until the phone owner pays ransom to retrieve the information. Of course this would only happen if the criminal got a hold of some highly confidential information.

Not wanting to scare you, we thought we would also share with you a few times on how to protect yourself from allowing any criminals the opportunity to get into your phone. Install security onto your phone such as Norton’s Mobile security programs. Always change your passwords about once per month and make them difficult.

Hope you found this blog post helpful and don’t forget to follow us on Twitter at @JenningsSmith

  • Jennings Smith Associates Professional Certifications

    • Professional Certified Investigator (PCI), ASIS International
    • Certified Protection Professional (CPP), ASIS International
    • Physical Security Professional (PSP), ASIS International
    • Certified Homeland Security Level 5 (CHS-V), American Board for Certification in Homeland Security
    • Certified Business Continuity Professional (CBCP), Disaster Recovery Institute International
    • Certified Healthcare Safety Professional (CHSP), Board of Certified Hazard Control Management
    • Certified Healthcare Emergency Professional (CHEP), Board of Certified Hazard Control Management
    • Certified Safety & Health Manager (CSHM), Institute for Safety and Health Management
    • Certified Hazard Control Manager (CHCM), Board of Certified Hazard Control Management
    • Certified Forensic Consultant (CFC), American College of Forensic Examiners International

    Certifications Continued


    Cyber Forensic Investigations

    JSA's cybersecurity experts are ready to assist you with a complete array of cybercrime protection, data recovery, and evidence collection services. Cyber forensic Investigations include: unauthorized data access; PII (personal identifiable information) exposure; IP (intellectual property/proprietary information) theft; employee social media/email/messaging abuse; ransomware data corruption; and more.

    Cyber Forensics Continued

  • Share

  • Major Credit Cards Accepted