SlideShare a Scribd company logo
1 of 12
Family Court: The Role of the PI in Modern Times Elizabeth L. Cook, JD, MPA, RPI
Traditional Roles ,[object Object],[object Object]
The PI Profession ,[object Object],[object Object],[object Object]
Traditional roles expanded ,[object Object],[object Object],[object Object]
Adultery and Custody cases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Manned Surveillance ,[object Object],[object Object],[object Object],[object Object]
Stationary Unmanned Surveillance ,[object Object],[object Object]
Mobile Electronic Surveillance ,[object Object],[object Object]
Computer Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Paramour Identification and Background ,[object Object]
Asset Searches and Background on Opposing Party ,[object Object],[object Object]
Conclusion: Make full use of your PI’s skills and technology! ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of FindingsCellebrite
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideAntonio Sanz Alcober
 
Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threatspattcom
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionageHHSome
 
Nova Technical Services Tscm
Nova Technical Services TscmNova Technical Services Tscm
Nova Technical Services Tscmmjbergstrom
 
Jason Coombs Expert Witness CV
Jason Coombs Expert Witness CVJason Coombs Expert Witness CV
Jason Coombs Expert Witness CVJason Coombs
 
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...William782Delaney
 
Information Security 5 06
Information Security 5 06Information Security 5 06
Information Security 5 06johnhewitt_cpp
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examinerNeeraj Aarora
 
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingDigital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingBryan Len
 

What's hot (20)

Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of Findings
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threats
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Keith Cottenden CV
Keith Cottenden CVKeith Cottenden CV
Keith Cottenden CV
 
Nova Technical Services Tscm
Nova Technical Services TscmNova Technical Services Tscm
Nova Technical Services Tscm
 
Jason Coombs Expert Witness CV
Jason Coombs Expert Witness CVJason Coombs Expert Witness CV
Jason Coombs Expert Witness CV
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Information Security 5 06
Information Security 5 06Information Security 5 06
Information Security 5 06
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
CHFI
CHFICHFI
CHFI
 
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingDigital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
 
Industrial Espionage -Task 1596
Industrial Espionage -Task 1596Industrial Espionage -Task 1596
Industrial Espionage -Task 1596
 

Similar to Private Investigations in Family Court

5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic ScienceICFECI
 
76 s201924
76 s20192476 s201924
76 s201924IJRAT
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesICFECI
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
The final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfThe final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfjyothimuppasani1
 
Tools And Methods Of The Trade For Private Detectives
Tools And Methods Of The Trade For Private DetectivesTools And Methods Of The Trade For Private Detectives
Tools And Methods Of The Trade For Private DetectivesDetectivfrei
 
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a BudgetJosh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a BudgetJosh Moulin, MSISA,CISSP
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision TreeMarc St-Pierre
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesAnamZunaira
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Josh Moulin, MSISA,CISSP
 
Evidence and data
Evidence and dataEvidence and data
Evidence and dataAtul Rai
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Danny609Davidson
 
Accredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowAccredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowSifs India
 
DFG Demo
DFG DemoDFG Demo
DFG Demodfgroup
 

Similar to Private Investigations in Family Court (20)

5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science
 
76 s201924
76 s20192476 s201924
76 s201924
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
The final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfThe final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdf
 
Tools And Methods Of The Trade For Private Detectives
Tools And Methods Of The Trade For Private DetectivesTools And Methods Of The Trade For Private Detectives
Tools And Methods Of The Trade For Private Detectives
 
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a BudgetJosh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber Crimes
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Cyber
CyberCyber
Cyber
 
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
 
Accredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowAccredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register Now
 
DFG Demo
DFG DemoDFG Demo
DFG Demo
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 

Private Investigations in Family Court

  • 1. Family Court: The Role of the PI in Modern Times Elizabeth L. Cook, JD, MPA, RPI
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.