There’s no such thing as a human lie detector,” according to Philip Houston, Michael Floyd and Susan Carnicero in their must-read book Spy the Lie: Former CIA Officers Teach You How to Detect Deception. But there are still ways you can learn to spot lies.
The organization of an investigative unit has an important bearing on the unit’s efficiency and the success of the investigators.As such, how you organize the unit should not be taken lightly. To maximize the unit’s effectiveness and efficiency, carefully consider how the investigative unit fits into the overall goals and objectives of the agency.
Few days back, I had an opportunity to discuss matters pertaining to the upcoming PRU 13 with my long time friend who had been long involved in previous PRUs and in this upcoming PRU 13 also had been tasked to be in one of the government Intel machinery. The first question posed by me to
In carrying out covert operations, various gadgets equipped with various covert functions that can be disguised in everyday objects had been invented. Among the most famous spy gadgets that had been invented through out history were as follows:
A silhouette of a woman donning a fur wrap appears on the other side of a glass door. Inside, a man with a five-o’clock shadow on his face puffs a cigarette, then opens the door, asking the woman: “What’s a doll-faced dame like you doing in these parts?” “My husband is cheating on me and
According to the Association of Certified Fraud Examiners (ACFE), an estimated 6% of revenues were lost in 2002 as a result of occupational fraud and abuses. Applied to Malaysian Gross Domestic Products in 2011 which amounted RM 278.67 Billion, this translates to losses of approximately RM 16.7 Billion. The frightening part is that many of
INTRODUCTION Security Audit and Risk Assessment is one of the method of risk management process with regard to the security aspect of a business, enterprises and its installations. It is a systematic process of security auditing and assessment which comprises of several steps followed by the security professionals with the objectives of assessing the threats
This evening, after finishing my work at the office and on my way back home, my cell phone rang and it was from one of our client who had engaged us to get some information. The conversation started:- Client:- “Zairi, I read your email and you’ve got the info that we want, right? Myself:-Yes sir,
When I was in my master class listening to one of my risk management lecturer explaining on the importance of risk management and the emergence of enterprise risk management in businesses, suddenly a story of her personal friend getting married to an impostor cropped out and a topic of background check was discussed. We were
Idea of how GPS tracking works is quite simple. A GPS tracking device works by communicating with satellites that orbit around the planet. These satellites are owned by the United States Department of Defense that were opened for civilian use since 1996. These 24 satellites are responsible for feeding the exact location on to the