Thomas Ruskin, Former NYPD Detective, Speaks About Obama’s Plan to Demilitarize Police on Newsmax

A Brief History of Criminal Investigation Part 2

This gallery contains 1 photo.

A Milestone for Forensic Science came about through the implementation of Anthropometry—human measurements—which is considered to be the first reliable method of criminal identification. Developed by Alphonse Bertillon (1853-1914), regarded as the Father of Criminal Identification, who began using a … Continue reading

Dzhokhar Tsarnaev Found Guilty of Boston Marathon Bombing

Dzhokhar Tsarnaev has been found guilty on multiple charges, including conspiracy to use a weapon of mass destruction, in the 2013 Boston Marathon bombing.

The guilty verdict means Tsarnaev is eligible for the death penalty.

Tsarnaev, now 21, was accused of planning and carrying out the bombing with his older brother Tamerlan on April 15 2013. Three people were killed and more than 260 were injured in the attack.

Jurors in Boston reached their verdict after two days of deliberations and weeks of testimony.

More soon …

What is spyware? How easily can it be installed on my cellphone?

Private Investigation FAQ Graphic

Spyware is a software that gathers information about a person or organization without their knowledge and send such information to another entity without the consent of that person or organization.

While the term spyware is mainly used to describe software that monitors a user, the functions can extend beyond monitoring.  Spyware can not only collect and relay information but change your computer (cellphone or tablet) settings and in some cases hold your information hostage in exchange for payment to release the information.

The most common spyware we see as a Private Investigative firm is installed on cell phones.

Spyware on a cell phone can monitor and relay a majority of activities that you perform on your cell phone, such as:

  • Text messages (along with pictures or videos) sent and received
  • Emails that are sent and received
  • Both incoming and outgoing phone calls and voicemails
  • Apps
  • Your location
  • Browsing history
  • Apps downloaded
  • Address book
  • Key logger (saves and transmits any log in credentials you enter, that includes online banking)
  • All social media activities
  • Memos
  • Tasks
  • Calendar
  • All files (pictures, videos, documents) saved on the phone

If you have physical access to the device, you can install this type of spyware in 5 minutes.  If you don’t have access to the device, it may take longer.

Spyware, while it may sound nefarious, can be legally installed in some rare occasions.

  1. Business cell phone – the employee has to be notified beforehand and consent.
  2. A child’s cellphone by the parent.

Investigative Steps to Take When an Eavesdropping Device (Bug) Has Been Found – CLE Presentation

What are the investigative steps when an eavesdropping device (also known as a bug) are found?

Thomas Ruskin, President of the CMP Protective and Investigative Group in NYC, speaks at the American Bar Association (ABA) Family Law Section CLE Conference in Stowe, VT (2014).

The Benefits to Have Private Investigators Conduct Interviews

What are the benefits to having a private investigator conduct interviews when preparing for a case?

Thomas Ruskin, President of the CMP Protective and Investigative Group in NYC, speaks at the American Bar Association (ABA) Family Law Section CLE Conference in Stowe, VT (2014).

Using surveillance to prove that a spouse is running a cash-only business.

http://cmp-group.com

How you can prove that your spouse is operating a cash business when filing for child support or divorce?

Thomas Ruskin, President of the CMP Protective and Investigative Group in NYC, speaks at the American Bar Association (ABA) Family Law Section CLE Conference in Stowe, VT (2014).

Tom addresses a question from the audience on how a private investigative firm would utilize surveillance to prove a cash-only business in a marital case.

Thomas Ruskin at the ABA Family Law Section CLE Conference – Narcotics Canine for Custody Cases

http://cmp-group.com

Thomas Ruskin, President of the CMP Protective and Investigative Group in NYC, speaks at the American Bar Association (ABA) Family Law Section CLE Conference in Stowe, VT (2014).

Tom talks about the importance of using a private investigative firm opposed to an individual.

In a recent child custody case, the CMP Group was able to bring in a narcotics canine unit to locate illegal drugs in the marital home where young children resided.

Assembling Your Divorce Team

How does computer forensics work?

Learn the basics on how computer forensics works, in less than a minute.