Free Consulation

Call 866-629-3757

Posts Tagged ‘private investigator connecticut’

Connecticut Shooting – How Secure Are Schools?

December 17th, 2012 | Security | 0 Comments

Since the horrific event that occurred on Friday morning at Sandy Hook Elementary school in Newtown, Connecticut, many parents and others have been left wondering just how secure schools are. Obviously most of us think, the chances of a shooting occurring at an elementary school are very slim, but when events occur like what happned at Sandy Hook Elementary, it makes us all second guess those low chances.

Sandy Hook, Connecticut Shooting

The shooting at Sandy Hook Elementary occurred in the mid-morning of Friday, December 14th. 20-year-old Adam Lanza forced his way past the locked door of Sandy Hook Elementary school and proceeded to kill 6 adults and 20 children before taking his own life. Prior to entering the school, Lanza also took the life of his mother.
The incident has left the every citizen in Newtown disturbed and shocked as nothing like this has ever happened. Most residents are saying the situation doesn’t even yet feel real.

This should be a wake up call for may schools whether high school, middle school, or elementary school. Schools need to realize that even through they are only elementary, there is still danger. All those that enter schools should be ID’d upon entry and have an explanation for their entrance. However, sometimes with even the most extreme precautions taken, horrible and disturbing events such as Sandy Hook Elementary School Shooting, still manage to take place.


5 Tips for Being Cyber Safe

December 2nd, 2012 | Cyber, Privacy, Private Investigator, Security | 0 Comments

Going online today may seem innocent and completely harmless, but most people have no idea what actual dangers there are when going online. We’re not just talking about shopping either. Going online to chat, to pay bills, or posting information about yourself on social networks all can post dangers. Check out our top five tips on protecting yourself online.

Don’t Talk to Strangers

Cyber Safety

You probably think this is a ridiculous tip, but I’ve seen grown adults accept friend requests and skype requests from total strangers that they have no clue of who they are – and this can pose a danger. Hacker’s are amazing with technology these days and sometimes even just accepting a friend request from one could pose a huge threat. So play it safe and refuse those adding you online that you don’t know.

Always Log Off

I mean this! Even if you’re in the privacy of your own home, you should always log off of anything whether it be your Facebook account, LinkedIn account, bank account, or Skype, always log off. If you don’t log off, you are leaving the door wide open for others.

Passwords Are Key

A lot of people don’t realize how powerful passwords are. Some people have the mixconception that Hacker’s can get into your account with the password – and this is true but highly difficult. So most hacker’s are always looking for ways to crack the passwords of people’s accounts. Therefore it’s up to you to create a strong password – not your birth date.

MChild Locks

Some parents don’t like the idea of “spying” on their children, but after seeing some terrifying cases, I HIGHLY suggest that parents take the necessary precautions in protecting their children online. That includes setting time restraints on the internet – you can control this by actually setting it up that you’re wireless internet turns off at a certain time each night. You can also restrict certain websites from being visited.

Don’t Open Spam Emails

Some people think that opening up a spam email is harmless – it’s not. When you open up a spam email it can easily allow that sender to place something on your computer. So if you don’t know the sender, avoid opening it altogether.

Don’t forget to follow us on Twitter at @JenningsSmith

Mannequins are Watching You

November 21st, 2012 | Privacy, Private Investigator, Security | 0 Comments

This time of the year the stores are usually packed solid full of people shopping for their friends and family for the Holiday season, but what they don’t realize is that they are actually being not only watched while they are shopping, but recorded too. It’s a very common thing for stores to put up surveillance cameras throughout the stores, but this is really the first time that these cameras are going in better hidden areas and are able to catch much more of what consumers are actually doing – so shop lifters beware!

Mannequins are Watching You

The product is called EyeSee and it was introduced by Italian mannequin producer Almax SpA. The device (worth about $5,072 US) is attracting shop owners all over the world because the mannequin looks like every other mannequin so there is really no way for shoppers to know which ones are set up with video recording.

Store owners and managers strongly believe that they’ll be able to better catch shop lifters with these devices because it’s very common for shop lifters to huddle close to taller objects (such as mannequins) to steal merchandise.

Of course many consumers think this is a huge privacy issue, but some store owners have no choice. Shop lifters in the USA steal about $20 billion dollars of merchandise each year so this is a huge issue that pushes stores to go to the extreme to stop this.

For more information on EyeSee, check out Engadget’s article EyeSee mannequins used to spy on shoppers, confirm paranoid fears.
Don’t forget to follow us on Twitter as well at @JenningsSmith

Gaza Getting Hit with Millions of Cyber Attacks

November 19th, 2012 | Cyber, Security | 0 Comments

On Sunday, Israel admitted that they are currently the target in a mass cyber war. Since Israel began a major air attack campaign against Gaza, Israel said they’ve fought off over 44 million cyber attacks on their government websites.

The anonymous cyber-attack group was able to bring down dozens of government websites as well as a major bank.

Comments from Israeli Finance Minister, Yuval Steinitz, stated:
“All the attacks were thwarted except for one, which targeted a specific website that was down for six or seven minutes.”


Steinitz also stated that the Israel government is now waging a war on a “second front” in regards to the cyber attacks.
An Israeli ministry spokesman stated that the majority of the cyber attacks have come from Israel and the Palestinian territories.

“The ministry’s computer division will continue to block the millions of cyber attacks,” Steinitz said. “We are enjoying the fruits of our investment in recent years in developing computerised defence systems.”

Both sides in the Gaza conflict, but particularly Israel, are embracing the social media as one of their tools of warfare.

Obama Signs Presidential Order 20: Cyber Attacks

November 15th, 2012 | Security | 0 Comments

It’s interesting how we’d gone from fear of being physically attacked by another country to a fear of being virtually attacked by another country. However, thanks for technology, internet, and development of software – that’s where we are.


This new change to security will greatly impact how the United States can respond to security threats through the internet. According to Ellen Nakashima of the Washington Post:


“What it does, really for the first time, is it explicitly talks about how we will use cyber operations,” a senior administration official said. “Network defense is what you’re doing inside your own networks. . . . Cyber operations is stuff outside that space, and recognizing that you could be doing that for what might be called defensive purposes.”

Therefore, if any attempt to threaten the United States through the internet occurs, the hacker’s computer will automatically be shut-down by commanders.
The issue with this new change is that it may actually interfere with Congress views on cyber security. The other aspect that concerned many people is the fact that this new change to cyber security was so secretive or “private”.

  • Jennings Smith Associates Professional Certifications

    • Professional Certified Investigator (PCI), ASIS International
    • Certified Protection Professional (CPP), ASIS International
    • Physical Security Professional (PSP), ASIS International
    • Certified Homeland Security Level 5 (CHS-V), American Board for Certification in Homeland Security
    • Certified Business Continuity Professional (CBCP), Disaster Recovery Institute International
    • Certified Healthcare Safety Professional (CHSP), Board of Certified Hazard Control Management
    • Certified Healthcare Emergency Professional (CHEP), Board of Certified Hazard Control Management
    • Certified Safety & Health Manager (CSHM), Institute for Safety and Health Management
    • Certified Hazard Control Manager (CHCM), Board of Certified Hazard Control Management
    • Certified Forensic Consultant (CFC), American College of Forensic Examiners International

    Certifications Continued


    Cyber Forensic Investigations

    JSA's cybersecurity experts are ready to assist you with a complete array of cybercrime protection, data recovery, and evidence collection services. Cyber forensic Investigations include: unauthorized data access; PII (personal identifiable information) exposure; IP (intellectual property/proprietary information) theft; employee social media/email/messaging abuse; ransomware data corruption; and more.

    Cyber Forensics Continued

  • Share

  • Major Credit Cards Accepted