Trailblazer Investigations Inc Long Island Suffolk County Private Investigators

Trailblazer Investigations Inc is a NYS Licensed & Bonded Private Investigtion Agency. We specialize in matrimonial investigations, pre-marital checks, pre-employment checks, background investigations, worker's compensation insurance fraud and finding people. We have contacts throughout the United States and Europe. Ask about our Special Services. Visit us at: http://www.trailblazerinvestigations.com Tel#: 631.921.5036

Thursday, September 29, 2005

Is He Cheating on You? Now Available As an E-Book : ArriveNet Press Releases : Entertainment




Is He Cheating on You? Now Available As an E-Book
The infidelity book described as a “cheating man’s worst nightmare” is now available as an e-book. Is He Cheating on You? – 829 Telltale Signs lists practically every known sign of infidelity, including the subtle signs most people usually overlook.
Distribution Source : ArriveNet

Date : Wednesday, September 28, 2005


New York, NY -- (ArriveNet - Sep 28, 2005) -- Is He Cheating on You? – 829 Telltale Signs is now available as a downloadable e-book, by popular request. Written by infidelity expert Ruth Houston, this 220-page e-book documents practically every known sign of infidelity, including the subtle signs most people usually overlook. The e-book is distributed through Booklocker.com .

As in the soft cover edition, which was recently featured on The Today Show, the e-book version of Is He Cheating on You? contains hundreds of signs of infidelity, which are conveniently grouped into 21 major categories so a woman can easily find the signs that apply to her mate. Categories of telltale signs include Physical Appearance, Conversational Clues, Work Habits, Day-to-Day Behavior, Telephone Tip-Offs, Computer Use, Car Clues, His Behavior Around Other Women, and more. Each of the 21 categories contains anywhere from 19 to 92 individual telltale signs – all of which any woman can find using nothing more than her eyes and ears, her personal knowledge of her mate, and the checklists in the book. No special skills or equipment are required.





Why Women Like the Book

Says Houston. “What women say they like most about the book is that it contains everything they need to get the goods on a cheating husband without the need for private investigators or high tech surveillance equipment. While gadgets like cameras, tape recorders, computer software and semen detection kits can be useful in exposing a cheating mate, many women are intimidated by these things, or simply can’t afford them. And in many places, these gadgets are illegal. Is He Cheating on You? makes catching the cheater easy and simple. There’s no fancy equipment to fuss with, learn how to use, or risk being discovered. Using the step by step instructions and the detailed lists of telltale signs in the book, a wife can find out almost everything she needs or wants to know about her husband’s affair using her own eyes and ears, and the things she already knows about her husband, his personal habits, and his daily routine. She’ll catch the cheater every time.”

The Secret of Catching a Cheating Spouse

“The secret is knowing what to look for,” explains Houston, “since many of the signs of infidelity are subtle and easy to miss. Once a woman knows what to look for, the telltale signs are really easy to find. Knowing what to look for is the key. Most women are absolutely amazed at how many signs there are just waiting to be found. One talk show host called the book “a cheating man’s worst nightmare.” (For a FREE tip sheet entitled 14 Things You Should Know About Signs of Infidelity, send an email to InfidelityInfo@gmail.com )

Hundreds of Cheating Signs

Based on over 10 years of in-depth research on infidelity which began when Houston accidentally discovered her now ex-husband’s affair, Is He Cheating on You? – 829 Telltale Signs contains literally hundreds of signs of infidelity, including:

• Signs most women usually overlook
• Signs so subtle a cheating spouse would never even think to cover them up
• Signs a private investigator is unlikely to find
• Signs almost impossible for a cheating husband or cheating wife to conceal
• Signs that help pinpoint the identity of the other woman
• Little-known signs not found anywhere else but this book


Infidelity Signs Apply to Both Men and Women

Despite the title, most of the telltale signs in Is He Cheating on You? apply to cheaters of both sexes. The book is packed with secrets that cheating husbands and cheating wives don't want their mates to know. “The e-book actually contains close to a thousand telltale signs” says Houston, “I added signs sent in by readers, which were not included in the original soft cover book.”

Special Section For Men

As an added feature, the e-book version of Is He Cheating on You? contains a special 10-page section for men entitled Is She Cheating on You? Says Houston “ At least a third of the inquiries I get from visitors to the website (http://www.InfidelityAdvice.com ) are from men who want information about cheating wives or girlfriends. So I added this section especially for them.”

Bonus Section with Special Infidelity Reports

The e-book version of Is He Cheating on You?- 829 Telltale Signs also comes with the 6 Bonus Reports and 2 Infidelity Questionnaires listed below:

Special Infidelity Reports
• 5 Things You Shouldn’t Do If He’s Cheating on You
• How Gifts Can Expose a Cheating Husband
• Infidelity Quiz - Is He the Cheating Kind?
• What the Two of You Must Do to Survive His Affair
• Advice for the Husband Who Cheated
• Advice for the Betrayed Wife

Infidelity Questionnaires
• Can Your Marriage Survive His Affair?
• Will He Cheat Again?

Faster Service for International Customers

“I originally converted Is He Cheating on You? to e-book format in order to accommodate the many international customers who request the book.” says Houston who receives orders from all over the world including Israel, England, New Zealand, Portugal, Canada, and Australia. ”It’s easier, faster, and less expensive for customers outside the United States to order the e-book version, but customers from the United States order the e-book too.”

Some Customers Order Both

Houston says many customers order both the e-book and the soft cover edition. “They like the convenience and portability of the softcover book,” explains Houston, “ but many customers are eager to start checking for telltale signs right away and realize that some signs may no longer exist by the time they get the book – even though the books are always rushed out by Priority Mail. When people suspect their mate of cheating, you can’t blame them for wanting this information right away.”

How to Order Is He Cheating on You?

The e-book version of Is He Cheating on You? – 829 Telltale Signs, is available from http://www.booklocker.com/books/1755.html for $37.

The soft cover edition of Is He Cheating on You? – 829 Telltale Signs, is $29.95, and can be ordered from the website http://www.Is-He-Cheating-On-You.com , by the toll free-number 800-431-1579, or from Amazon.com. It can also be special ordered from bookstores (Lifestyle Publications, ISBN: 0-9720553-4-7)


About the Author:

Infidelity expert, Ruth Houston is the author of “Is He Cheating on You?-829 Telltale Signs” a comprehensive guide which documents practically every known sign of infidelity. For a FREE tip sheet entitled 14 Things You Should Know About Signs of Infidelity, e-mail InfidelityInfo@gmail.com with “14 things” in the subject line. Ruth has been quoted in the New York Times, Newsday, Cosmopolitan, the New York Post, the Houston Chronicle, the Toronto Sun, iVillage, MSN Lifestyle and numerous other print and online media. She has also been a guest on The Today Show, Good Day New York, 1010WINS, TalkAmeria, Telemundo, BBC, CBC and over 150 other radio and TV talk shows in the United States, Canada, Europe, the Caribbean, New Zealand, and South America. For more information about Ruth Houston, her book, or about infidelity, visit http://www.InfidelityAdvice.com



Friday, September 16, 2005

Identity Theft Info New York Private Investigator

Shocking No. 1 Source of Identity Theft About half of all identity
theft is
committed by close friends and relatives, who lift a wallet or
pocketbook and
not only steal the bills and credit cards inside, but also the identity
that
goes with it. That's the shocking conclusion of a new survey of 4,000
consumers,
about 500 of whom were identity theft victims, that was conducted by
Javelin
Research and the Better Business Bureau for CheckFree Services Corp.,
Visa
USA, and Wells Fargo Bank, report MarketWatch and The Associated Press.


The most frequently cited sources of identity theft:
Lost or stolen wallet: 29 percent
Fraud that occurs during an in-store or telephone transaction: 12.9
percent
Corrupt employees: 9 percent
Stolen mail: 8 percent
Spyware on the computer: 5 percent
Sifting through garbage: 2.6 percent
Computer viruses: 2.2 percent
"Phishing" through fraudulent e-mail: 1.7 percent


If a relative or friend rips off your wallet, you're also likely to pay
more
in dollar terms than if a stranger steals your identity. MarketWatch
reports
that families and friends made off with $15,607 on average, compared
with the
$9,243 on average stolen through mail theft, and $2,320 ripped off in
online
scams. But here's another cold fact: In fully 75 percent of the cases
of
identity theft, the victim has no clue who committed the crime.


The most difficult form of identity theft to detect is new account
fraud.
This occurs when a new credit card account is set up using the victim's
personal
information. This also tends to result in the highest dollar hit. New
account
fraud leads to a $12,646 hit per victim on average, compared with
$9,912 for
existing non-credit-card accounts and $5,803 for existing credit-card
accounts,
reports MarketWatch.



Keep watching this blog for more info.









Verizon Wireless Wins Injunction Against Data Thieves > September 15, 2005



















Food for thought from New York Private Investigator

Verizon Wireless Wins Injunction Against Data Thieves Sept. 15, 2005





The injunction is against a Tennessee 'private investigation' company that reportedly uses a number of techniques to obtain private subscriber information.
By David Haskin
Mobile Pipeline



Verizon Wireless said Thursday that it has received a court order preventing a Tennessee company continuing what Verizon calls the theft of subscriber information.
The wireless operator received an injunction against Source Resources of Cookeville, Tennessee. The permanent injunction prevents Source Resources from acquiring, possessing or selling customer account information without either a court order or the subscriber's permission.

"They call themselves private investigators," Verizon Wireless spokesman Jeffrey Nelson said in an interview. "They are common identity theft crooks."

In its initial court filing in July, Verizon Wireless claimed that Source Resources used "deceit, trickery and dishonesty" to obtain customer records. Specifically, the wireless operator claimed that Source Resources "is engaged in wrongfully obtaining confidential customer information (such as the customer's calling records) … by posing as a customer of Verizon Wireless seeking information about his or her own account."

The Source Resources "investigators" provided Verizon Wireless customer service agents with security information, such as the victim's social security number of mother's maiden name. That information was, according to Verizon's brief, "wrongfully obtained."

The request for the injunction cited Dan Ealey as the principal of the company and also cited 10 anonymous "John Does" who actually worked to obtain the information. The legal brief said that Source Resources advertised its services over the Internet.

Nelson said that Verizon Wireless customers weren't the other victims but claimed that Verizon Wireless has taken the lead in preventing this type of fraud.

"This may be going on with other wireless companies and telecom companies," Nelson said. "But Verizon Wireless will absolutely go to the mat to protect our customer's rights."









Thursday, September 15, 2005

PRIVATE INVESTIGATOR SITES New York Private Investigator Trailblazer Investigations Inc

As promised I am starting to post some interesting sites that all should find informative.

Private Investigator Sites
Spies Online - An excellent resource for anyone interested in private investigation, computer security, personal privacy, and a host of other related topics. A fine example of a high-content web site that really delivers the goods. They have an excellent, moderated Yahoo Group also called Spies Online that is full of industry professionals, computer security experts, private investigators, attorneys, journalists, etc.

Orion Research Pre-employment Screening and Background Verification. This is an excellent, trustworthy company.

NewPI - The essential Yahoo group for anyone starting out as a new Private Investigator, or just interested in becoming one. It's also the place for experienced professionals to give advice and help for the new PIs.

There will be more to come. Stay tuned.

They're Watching You from New York Private Investigator Trailblazer Investigations Inc


Something that caught my eye and that eveyone should be aware of. I will be posting articles similar to this along with informative investigative links.
Rich



They're Watching You
Posted on Tuesday, September 13 @ 12:24:15 PDT by Intellpuke (283 reads)

Intellpuke: "The following article is by William Illsey Atkinson, writing for Canada's Globe and Mail newspaper. In it, he examines new methods being used and developed to monitor what we do, what we say, what we use ... well, just about anything and everything in the human activity arena. It is a very good, albeit somewhat alarming, article and well worth the read. The article raises important questions about a person's right to privacy and national security, and I believe it merits a wider audience. Mr. Atkinson's article follows:


On the fourth anniversary of 9/11, the world not only recalls the carnage, it also finds itself face to face with the social and technological changes that the terrorist attacks began. The biggest of these -- arguably more important than any military issue -- is surveillance. Whoever you are, wherever you are, at any given moment some friend or foe may be watching you. That's today's reality.



We take some surveillance for granted. Airplanes and satellites with remote-sensing equipment constantly fly over Canada to monitor pollutants and illegal fishing, enforce Arctic sovereignty and inspect our territory for the movement of illegal goods.



Yet the main target of Big Brother is not acreage, but people. Personal surveillance is of two kinds, public and private. Public surveillance covers people and organizations that the state deems to be a real or potential danger. Private surveillance covers threats that an individual fears.



Although public surveillance has many times the scope of private surveillance, the two realms' technologies constantly overlap: The same devices may entrap the frisky husband and the errant embassy official.





Both spies and private detectives may use infrared cameras to show the incontrovertible heat signature of a companion lurking in a bed somebody swears he occupied alone all night. That image can be seen even if Mr. or Ms. X left the premises several hours ago.



Other spies use parabolic microphones to eavesdrop on a conversation from 100 meters or more. A three-dimensional shape called a paraboloid concentrates incoming sound wave fronts to a single point, called the focus. Locate a sensitive condenser microphone there, and you have an ear the size of an elephant's, permitting an analyst to transcribe illicit plots, conspiracies or love talk.



Are the plotters behind closed windows? No problem. New technology can extract human speech from the longitudinal vibrations transmitted through two panes of intervening glass. Loose lips not only sink careers, business deals and marriages, sometimes they imperil nations.



Long before 9/11, the big powers used science to spy on one another. And when the spymasters exhausted available technologies, they had their boffins develop new ones.



During the U.S. Civil War, observers in tethered balloons photographed enemy emplacements from 300 metres aloft. During the First World War, French physicists developed ways to eavesdrop on telegraph messages without physical links, via induced electrical fields. During the Second World War, abstract mathematics broke German codes.



Today's technology goes far beyond these first tentative steps. In Japan's government laboratories in Tsukuba, an hour's drive northeast of Tokyo, Dr. Takeshi Sasaki has developed trace-chemical detectors 20 nanometres - one fifty-thousandth of a millimeter - in diameter.



"These devices are not a miniaturization of the bench-top gas chromatographs and mass spectrometers used in labs," he says. "They are unique materials, each nano-engineered to detect one specific substance."



One of Dr. Sasaki's materials, made by directed self-assembly of cobalt oxide and silicon dioxide, is honeycombed with passageways three nanometres - the width of a single strand of DNA - in diameter. He calls these tiny tunnels nanopores. "Gas molecules of a specific type infiltrate the nanopores, reacting with receptor molecules built into the sides of the tunnels only a billionth of a meter beneath the material's surface," he explains.



Dr. Sasaki says the technology may soon mature into a rugged, accurate detector for trace molecules emitted by illegal drugs or explosives. This ultra-thin sensor would be as easy to use as litmus paper, and would be almost undetectable.



Nanotechnology, an emerging technology of extreme miniaturization, is being pressed into service to develop surveillance beyond anything in use today.



Rumors have begun to circulate among nanotechnologists that the U.S. Defense Advanced Research Project Agency (DARPA) has funded initial research into a "digital insect." This mobile, autonomous snoop would combine photo-rechargeable batteries with nanosensors for sound, infrared light and visible light, plus molecular detectors like those being developed by Tsukuba's Dr. Sasaki. On command, the tiny platform would "narrowcast" its findings in a digital microburst to a receiving station.



Development would proceed in stages, from bird-sized through bumblebee-sized to something nearly as small as a gnat. Such micro-snoops would be able to go anywhere unseen. The term "bug" certainly applies.



On a larger scale, imaging and recording technology has been mass-produced, micro-miniaturized and cost-reduced to such an extent that high-quality surveillance is now universal.



The Canadian military, always apt with an acronym, calls this technology COTS, for "commercial off the shelf." A key subcomponent is the "charge-coupled device," or CCD, a specialized microchip developed to record the faint trickle of photons from faraway stars. The device looks like a chessboard, with a grid of tiny light-sensitive squares. When polled by a central processor, the elements output their recorded light; the processor then turns this into images.



The military long ago put CCDs into its "eyes in the sky." Some analysts believe that spy satellites can resolve visible images to 10 centimeters, which would read individual licence plates or spot an unshaven man's beard. Going by the public-domain specs of space probes such as the Mars Orbiters, and by the conservative assumption that military technology exceeds anything in the private sector, such tales would seem more truth than myth.



Variants of the CCD have found their way into consumer goods - digital still cameras, videocams and imaging cellphones. They also enable the public-surveillance cameras that increasingly infest our world. These catch us walking, talking, shopping, eating, banking and occasionally committing crimes.



The science and technology of surveillance extends beyond electronics and nanotech to sociology. For example, surveillance has spawned a low-level popular response called "sousveillance," whose self-assigned role is to "out the cams."



In Manhattan, a cheerful group of anarchists called the NYSCP (New York Surveillance Camera Players) detects hidden eyes on sign poles and light standards, then mugs before them in an attempt to embarrass their human monitors. Unfortunately, this may defeat the NYSCP's aim of discombobulating the human component of surveillance: Anything that relieves the tedium of staring at monitors probably pleases the watcher.



The group feels impelled to its performance art because, surprisingly, the American Civil Liberties Union has no objection to surveillance cameras in public places. "It is unreasonable to expect privacy in community locales," the ACLU says.



It's an interesting argument. Jane Jacobs, the world-famous urban scientist who makes Toronto her home, defines a safe city as "one that has eyes on the street." In other words, a watched area is a safe area.



And what difference is there between a neighbor's eyes and a video camera? In terms of human rights, might people's right to safety trump their right to privacy?



NYSCP's members consider the ACLU a toothless watchdog of civil liberties, and they and other private individuals persist in making their point.



A recent civil suit against Atlanta police alleges that while watching closed-circuit TV screens showing nothing but peace, order and good government, the defendant security officials grew so bored with the absence of crime that they turned their cameras on good-looking female Atlantans.



One young female, noticing the cameras trained on her, ripped off her top and flashed her breasts at the observers. Authorities charged her with lewd behavior in a public place, but steadfastly refused to prosecute, or even to identify, the men who violated her privacy.



One of the more compelling components of the surveillance issue is not new government inquiries into citizens' public and personal lives, but a belated recognition of how deeply the snoops had been burrowing before 9/11. The terrorist attacks simply threw light on a worrisome, existing situation.



Consider Echelon, an all-but-omnipotent system established three decades ago by the U.S. National Security Agency. Echelon's raison d'être is nothing less than monitoring every telephone call made in Europe or North America for keywords deemed important to U.S. security.



Echelon's tendrils extend far beyond the United States. Every trunk line in Britain's telephone system goes through an Echelon emplacement, a fact revealed in public testimony by a senior officer in British Telecom. (Afterward, he was roundly rebuked by a High Court judge for his loose lips.)



Besides Britain, Echelon participants include New Zealand, Australia and Canada.



In the 1970s, U.S. senator Frank Church said: "[Echelon] at any time could be turned around on the American people and no American would have any privacy left, such [is] the capability to monitor everything: telephone conversations, telegrams, it doesn't matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back."



Political elites allegedly have already used Echelon for personal vendettas.



When British prime minister Margaret Thatcher suspected two of her cabinet ministers of disloyalty, she reportedly had Echelon bug the suspects' phone calls. The two were caught red-handed, and dismissed.



In the United States, it has been alleged that the telephone conversations of senior politicians, including senator Strom Thurmond, have been recorded.



Still, there's more to surveillance than scare stories. Every system can mess up, and the biggest systems often mess up most.



Mike Frost, a former employee of Canada's Communications Security Establishment, maintains that in 1981, a serendipitous Canadian intercept of a foreign ambassador's conversation revealed a huge grain deal that the ambassador's country was about to close.



Using its inside knowledge, he says, Canada quietly caught its competitor flat-footed and won a wheat contract worth nearly $4-billion in today's money, he says.



The public realm isn't the only one with horror stories: Private surveillance can be just as spooky. Dozens of companies offer employers Dial-a-Snoop, software that lets their clients check warehouses and cubicles (and the employees therein) from cellphones 24/7. Spouses track each other through private investigators. Parents spy on their children's caregivers through "nanny-cams" disguised as statues, flower arrangements, or books.



There's an interesting footnote to this. Using inexpensive, readily available COTS technology, a U.S. journalist recently cruised the streets of a prosperous, lily-white suburb in an unmarked van. From inside his vehicle, he was able to pick up every nanny-cam signal: The houses he passed were broadcasting sound and video to him. The nanny-cams, installed to increase security, were unwittingly sending intimate household details to the world.



In fact, it's probably time for a thorough public debate on surveillance. Those who use it quote Edmund Burke that "the price of liberty is eternal vigilance." Those who think Big Brother has gone more than far enough say the same thing, but their vigilance is on the invigilators, guarding us from our self-appointed guardians.



Michael Geist, a law professor at the University of Ottawa and the Canada Research Chair for electronic commerce and Internet law, is particularly concerned about legislation being considered by the federal government that would effectively lay open the entire Net to covert surveillance.



"Not only does the proposal ... create new surveillance powers, but it actually reduces the level of privacy protection and oversight associated with that surveillance," Dr. Geist says.



"One proposal floated in the spring would require ISPs [internet service providers] to disclose subscriber information within 30 minutes to law-enforcement authorities on a 24-hour, seven-day-per- week basis. Incredibly, law-enforcement authorities could make such a request with only a phone call under certain circumstances."



How would Dr. Geist sum up this all-embracing proposal? It's simple, he says. "No judicial oversight. No advance paperwork. No privacy."



Intellpuke: "William Illsey Atkinson, a frequent contributor to The Globe and Mail on science and technology, is writing a book for Doubleday on video games' effects on the human brain. You can read the above article in context at the Globe and Mail's website, here.



Related Links
· More about News
· News by Intellpuke

--------------------------------------------------------------------------------







Original materials on this site © Free Internet Press.
Any mirrored or quoted materials © their respective authors, publications, or outlets, as shown on their publication, indicated by the link in the news story.
Original Free Internet Press materials may be copied and/or republished without modification, provided a link to http://FreeInternetPress.com is given in the story, or proper credit is given.

Please email editor@freeinternetpress.com there are any questions.
XML/RSS/RDF Newsfeed Syndication: http://freeinternetpress.com/rss.php


Counter Managed By Masterstats