SlideShare a Scribd company logo
3/3/2018 Adam Quirk: How Social Media Is Used In Private Investigations
http://adamquirkusa.blogspot.com/2017/12/how-social-media-is-used-in-private.html 1/3
Adam Quirk
Tuesday, December 12, 2017
How Social Media Is Used In Private Investigations
These days, it’s very rare to know someone who doesn’t have a social media account. People
connect with their friends on different platforms and social media has long become the norm.
Government and private companies also access social media to gather information and share their
thoughts to the public.
When private investigators are looking into a person’s activities, is social media of much help to
them? The answer is yes. Social media investigations are becoming a common feature of primary
Image source: pixabay.com
Adam Quirk
Adam Quirk is an award‑winning
criminal justice professional
with over 15 years of
experience in investigations,
regulatory compliance, team leadership and
supervision, program initiation and
development, and coalition‑building.
Currently a private investigator, he has
served in both the U.S. Drug Enforcement
Administration and the Federal Bureau of
Investigation. He excels in leading drug
diversion and solving violent crimes, and is
an effective collaborator with both internal
partners and state and local law
enforcement agencies. He has acted as
liaison to executive leadership, external
stakeholders, and the media, being very
adept at translating technical subject
matter effectively to lay audiences. He has
significant experience in handling novel
security/loss prevention/enforcement
project management and development. He
is an avid reader, having been inspired by
crime and spy fiction and academic works
on criminology and criminal justice. Besides
reading, he enjoys travel, with South Korea
and China being recent favorite
destinations. He is also a regular volunteer
for Circles of Support, a program dedicated
About Me
  More    Next Blog» Create Blog   Sign In
3/3/2018 Adam Quirk: How Social Media Is Used In Private Investigations
http://adamquirkusa.blogspot.com/2017/12/how-social-media-is-used-in-private.html 2/3
investigations. Even before the rise of social media investigators, old‑school private investigators
have already transitioned to the digital sphere. They have software that can be used to sidestep the
privacy settings of accounts. 
Investigation through this means provides evidence for court cases. Evidence gathered here helps in
establishing a person’s character, proving or disproving an alibi, or collecting other various
supporting evidence. Professional social media investigators are knowledgeable on preserving,
validating, and presenting evidence according to the rules of the court, and most people on social
media are not. 
Private investigators follow a protocol that as they gather pieces of evidence. They must not violate
laws in order to avoid jeopardizing the validity and authenticity of the evidence handed over to
authorities. They rely only partially on social media to conduct their investigations; these
professionals—however—are experts in operating on different platforms to fulfill their duties. With
cyber threats becoming rampant by the minute, the need for heightened cybersecurity efforts and
professional social media investigators is on the rise. 
A private investigator, Adam Quirk has had 15 years of experience working for both US Drug
Enforcement Administration and the Federal Bureau of Investigation. For more updates and reads
about private investigations, visit this blog.
Image source: pixabay.com
to helping people coming out of prison find
gainful employment
View my complete profile
▼  2017 (11)
▼  December (1)
How Social Media Is Used In Private
Investigations...
►  November (1)
►  October (1)
►  September (1)
►  August (2)
►  June (1)
►  May (1)
►  April (1)
►  February (1)
►  January (1)
►  2016 (6)
Blog Archive
3/3/2018 Adam Quirk: How Social Media Is Used In Private Investigations
http://adamquirkusa.blogspot.com/2017/12/how-social-media-is-used-in-private.html 3/3
Older PostHome
Subscribe to: Post Comments (Atom)
Posted by Adam Quirk at 4:48 AM
Labels: crimes, cybersecurity, private investigator, social media
 
Comment as: 
PublishPublish
 
PreviewPreview
No comments:
Post a Comment
Travel theme. Theme images by chuwy. Powered by Blogger.

More Related Content

What's hot

June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
Ian Tausig
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the Workplace
Allisha Anderson
 
Social Media In the Workplace
Social Media In the WorkplaceSocial Media In the Workplace
Social Media In the WorkplaceRosenthalLurie
 
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Jim Adler
 
Promise And Perils Of Internet Searching Job Candidates
Promise And Perils Of Internet Searching Job CandidatesPromise And Perils Of Internet Searching Job Candidates
Promise And Perils Of Internet Searching Job Candidates
George Lenard
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
Michael Zimmer
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
Internet Law Center
 

What's hot (7)

June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the Workplace
 
Social Media In the Workplace
Social Media In the WorkplaceSocial Media In the Workplace
Social Media In the Workplace
 
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
 
Promise And Perils Of Internet Searching Job Candidates
Promise And Perils Of Internet Searching Job CandidatesPromise And Perils Of Internet Searching Job Candidates
Promise And Perils Of Internet Searching Job Candidates
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 

Similar to Adam quirk

White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
Medpricer
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationsMedpricer
 
cybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacycybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacy
RohitBisht345647
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Milind Agarwal
 
A criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative frameworkA criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative framework
Sameer Dasaka
 
What makes white collar crimes different from others
What makes white collar crimes different from others What makes white collar crimes different from others
What makes white collar crimes different from others
Adam Quirk
 
SOCIAL MEDIA ANALYSIS IN CRIMINAL INVESTIGATION.pptx
SOCIAL MEDIA ANALYSIS IN CRIMINAL INVESTIGATION.pptxSOCIAL MEDIA ANALYSIS IN CRIMINAL INVESTIGATION.pptx
SOCIAL MEDIA ANALYSIS IN CRIMINAL INVESTIGATION.pptx
AnishSingh792986
 
What makes white collar crimes different from others
What makes white collar crimes different from othersWhat makes white collar crimes different from others
What makes white collar crimes different from others
Adam Quirk
 
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdfThe Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
Law Offices of Steven J. Pisani, LLC
 
Ethical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docxEthical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docx
theodorelove43763
 
Media Ethics and Privacy
Media Ethics and PrivacyMedia Ethics and Privacy
Media Ethics and Privacy
Muhammad Rawaha Saleem
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
David Wood
 
How Real-World Law Enforcement Influences Your Favorite Shows
How Real-World Law Enforcement Influences Your Favorite ShowsHow Real-World Law Enforcement Influences Your Favorite Shows
How Real-World Law Enforcement Influences Your Favorite Shows
Adam Quirk
 
#Legal social
#Legal social#Legal social
#Legal social
Lyn Whitham
 
Top 10 Myths vs. Reality about Private Investigations
Top 10 Myths vs. Reality about Private InvestigationsTop 10 Myths vs. Reality about Private Investigations
Top 10 Myths vs. Reality about Private Investigations
The Smith Investigation Agency Inc.
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
Sandra (Sandy) Dunn
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
debishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ronnasleightholm
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
Case IQ
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 

Similar to Adam quirk (20)

White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigations
 
cybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacycybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacy
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 
A criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative frameworkA criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative framework
 
What makes white collar crimes different from others
What makes white collar crimes different from others What makes white collar crimes different from others
What makes white collar crimes different from others
 
SOCIAL MEDIA ANALYSIS IN CRIMINAL INVESTIGATION.pptx
SOCIAL MEDIA ANALYSIS IN CRIMINAL INVESTIGATION.pptxSOCIAL MEDIA ANALYSIS IN CRIMINAL INVESTIGATION.pptx
SOCIAL MEDIA ANALYSIS IN CRIMINAL INVESTIGATION.pptx
 
What makes white collar crimes different from others
What makes white collar crimes different from othersWhat makes white collar crimes different from others
What makes white collar crimes different from others
 
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdfThe Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
 
Ethical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docxEthical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docx
 
Media Ethics and Privacy
Media Ethics and PrivacyMedia Ethics and Privacy
Media Ethics and Privacy
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
How Real-World Law Enforcement Influences Your Favorite Shows
How Real-World Law Enforcement Influences Your Favorite ShowsHow Real-World Law Enforcement Influences Your Favorite Shows
How Real-World Law Enforcement Influences Your Favorite Shows
 
#Legal social
#Legal social#Legal social
#Legal social
 
Top 10 Myths vs. Reality about Private Investigations
Top 10 Myths vs. Reality about Private InvestigationsTop 10 Myths vs. Reality about Private Investigations
Top 10 Myths vs. Reality about Private Investigations
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 

More from Adam Quirk

Debunking Some Myths About Private Investigators
Debunking Some Myths About Private InvestigatorsDebunking Some Myths About Private Investigators
Debunking Some Myths About Private Investigators
Adam Quirk
 
The monster that lurks in Ted Bundy: A look back at the heinous serial killer
The monster that lurks in Ted Bundy: A look back at the heinous serial killerThe monster that lurks in Ted Bundy: A look back at the heinous serial killer
The monster that lurks in Ted Bundy: A look back at the heinous serial killer
Adam Quirk
 
How To Prevent Violence In The Streets
How To Prevent Violence In The StreetsHow To Prevent Violence In The Streets
How To Prevent Violence In The Streets
Adam Quirk
 
Why It's Important For Children To Know How To Defend Themselves
Why It's Important For Children To Know How To Defend ThemselvesWhy It's Important For Children To Know How To Defend Themselves
Why It's Important For Children To Know How To Defend Themselves
Adam Quirk
 
Road Safety: Preventing Car Theft
Road Safety: Preventing Car TheftRoad Safety: Preventing Car Theft
Road Safety: Preventing Car Theft
Adam Quirk
 
Homeowners could start protecting their property with Sunflower Labs drones i...
Homeowners could start protecting their property with Sunflower Labs drones i...Homeowners could start protecting their property with Sunflower Labs drones i...
Homeowners could start protecting their property with Sunflower Labs drones i...
Adam Quirk
 
Rely on these cams to monitor your home all year round.
Rely on these cams to monitor your home all year round.Rely on these cams to monitor your home all year round.
Rely on these cams to monitor your home all year round.
Adam Quirk
 
What’s a gateway drug?
What’s a gateway drug?	What’s a gateway drug?
What’s a gateway drug?
Adam Quirk
 
Three Useful Apps For Personal Security
Three Useful Apps For Personal SecurityThree Useful Apps For Personal Security
Three Useful Apps For Personal Security
Adam Quirk
 
What’s a gateway drug?
What’s a gateway drug?	What’s a gateway drug?
What’s a gateway drug?
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
Adam Quirk
 
Adam Quirk
Adam Quirk Adam Quirk
Adam Quirk
Adam Quirk
 
Adam Quirk
Adam Quirk Adam Quirk
Adam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
Adam Quirk
 
ADAM QUIRK
ADAM QUIRKADAM QUIRK
ADAM QUIRK
Adam Quirk
 

More from Adam Quirk (20)

Debunking Some Myths About Private Investigators
Debunking Some Myths About Private InvestigatorsDebunking Some Myths About Private Investigators
Debunking Some Myths About Private Investigators
 
The monster that lurks in Ted Bundy: A look back at the heinous serial killer
The monster that lurks in Ted Bundy: A look back at the heinous serial killerThe monster that lurks in Ted Bundy: A look back at the heinous serial killer
The monster that lurks in Ted Bundy: A look back at the heinous serial killer
 
How To Prevent Violence In The Streets
How To Prevent Violence In The StreetsHow To Prevent Violence In The Streets
How To Prevent Violence In The Streets
 
Why It's Important For Children To Know How To Defend Themselves
Why It's Important For Children To Know How To Defend ThemselvesWhy It's Important For Children To Know How To Defend Themselves
Why It's Important For Children To Know How To Defend Themselves
 
Road Safety: Preventing Car Theft
Road Safety: Preventing Car TheftRoad Safety: Preventing Car Theft
Road Safety: Preventing Car Theft
 
Homeowners could start protecting their property with Sunflower Labs drones i...
Homeowners could start protecting their property with Sunflower Labs drones i...Homeowners could start protecting their property with Sunflower Labs drones i...
Homeowners could start protecting their property with Sunflower Labs drones i...
 
Rely on these cams to monitor your home all year round.
Rely on these cams to monitor your home all year round.Rely on these cams to monitor your home all year round.
Rely on these cams to monitor your home all year round.
 
What’s a gateway drug?
What’s a gateway drug?	What’s a gateway drug?
What’s a gateway drug?
 
Three Useful Apps For Personal Security
Three Useful Apps For Personal SecurityThree Useful Apps For Personal Security
Three Useful Apps For Personal Security
 
What’s a gateway drug?
What’s a gateway drug?	What’s a gateway drug?
What’s a gateway drug?
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
 
Adam Quirk
Adam Quirk Adam Quirk
Adam Quirk
 
Adam Quirk
Adam Quirk Adam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
 
Adam Quirk
Adam QuirkAdam Quirk
Adam Quirk
 
ADAM QUIRK
ADAM QUIRKADAM QUIRK
ADAM QUIRK
 

Recently uploaded

Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 

Recently uploaded (20)

Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 

Adam quirk

  • 1. 3/3/2018 Adam Quirk: How Social Media Is Used In Private Investigations http://adamquirkusa.blogspot.com/2017/12/how-social-media-is-used-in-private.html 1/3 Adam Quirk Tuesday, December 12, 2017 How Social Media Is Used In Private Investigations These days, it’s very rare to know someone who doesn’t have a social media account. People connect with their friends on different platforms and social media has long become the norm. Government and private companies also access social media to gather information and share their thoughts to the public. When private investigators are looking into a person’s activities, is social media of much help to them? The answer is yes. Social media investigations are becoming a common feature of primary Image source: pixabay.com Adam Quirk Adam Quirk is an award‑winning criminal justice professional with over 15 years of experience in investigations, regulatory compliance, team leadership and supervision, program initiation and development, and coalition‑building. Currently a private investigator, he has served in both the U.S. Drug Enforcement Administration and the Federal Bureau of Investigation. He excels in leading drug diversion and solving violent crimes, and is an effective collaborator with both internal partners and state and local law enforcement agencies. He has acted as liaison to executive leadership, external stakeholders, and the media, being very adept at translating technical subject matter effectively to lay audiences. He has significant experience in handling novel security/loss prevention/enforcement project management and development. He is an avid reader, having been inspired by crime and spy fiction and academic works on criminology and criminal justice. Besides reading, he enjoys travel, with South Korea and China being recent favorite destinations. He is also a regular volunteer for Circles of Support, a program dedicated About Me   More    Next Blog» Create Blog   Sign In
  • 2. 3/3/2018 Adam Quirk: How Social Media Is Used In Private Investigations http://adamquirkusa.blogspot.com/2017/12/how-social-media-is-used-in-private.html 2/3 investigations. Even before the rise of social media investigators, old‑school private investigators have already transitioned to the digital sphere. They have software that can be used to sidestep the privacy settings of accounts.  Investigation through this means provides evidence for court cases. Evidence gathered here helps in establishing a person’s character, proving or disproving an alibi, or collecting other various supporting evidence. Professional social media investigators are knowledgeable on preserving, validating, and presenting evidence according to the rules of the court, and most people on social media are not.  Private investigators follow a protocol that as they gather pieces of evidence. They must not violate laws in order to avoid jeopardizing the validity and authenticity of the evidence handed over to authorities. They rely only partially on social media to conduct their investigations; these professionals—however—are experts in operating on different platforms to fulfill their duties. With cyber threats becoming rampant by the minute, the need for heightened cybersecurity efforts and professional social media investigators is on the rise.  A private investigator, Adam Quirk has had 15 years of experience working for both US Drug Enforcement Administration and the Federal Bureau of Investigation. For more updates and reads about private investigations, visit this blog. Image source: pixabay.com to helping people coming out of prison find gainful employment View my complete profile ▼  2017 (11) ▼  December (1) How Social Media Is Used In Private Investigations... ►  November (1) ►  October (1) ►  September (1) ►  August (2) ►  June (1) ►  May (1) ►  April (1) ►  February (1) ►  January (1) ►  2016 (6) Blog Archive
  • 3. 3/3/2018 Adam Quirk: How Social Media Is Used In Private Investigations http://adamquirkusa.blogspot.com/2017/12/how-social-media-is-used-in-private.html 3/3 Older PostHome Subscribe to: Post Comments (Atom) Posted by Adam Quirk at 4:48 AM Labels: crimes, cybersecurity, private investigator, social media   Comment as:  PublishPublish   PreviewPreview No comments: Post a Comment Travel theme. Theme images by chuwy. Powered by Blogger.