Talk to a Professional Private Investigator - One solution for all your investigative services

Surveillance

SURVEILLANCE PRIVATE INVESTIGATOR

Stryker Investigation Services Inc. One solution for all your investigative services since 2000 

SURVEILLANCE: Are you looking for a private investigator to conduct surveillance? We provide tailor-made investigative solutions that include covert, undercover, mobile, Subrosa, and counter-surveillance. No matter what type of surveillance your investigation requires, our investigators are highly qualified, reliable, and exceptional surveillance investigators, empowered to think independently. We clearly understand what it takes to provide actionable information to expose exaggerated and patently false claims. Our services include Covert Surveillance used to infiltrate and gain access to a target group or corrupt organizations and Subrosa Surveillance for Workers’ Comp insurance fraud. Including Counter-surveillance to detect stalkers and unwanted monitoring by unknown parties. Specialized equipment for fixed surveillance to detect vandalism of businesses, construction site, or home.  

Our private investigators and field investigators will always maintain the highest level of confidentiality while working closely with our clients. We provide tailor-made investigative solutions that include covert surveillance, undercover surveillance, mobile surveillance, Subrosa surveillance, and counter-surveillance… no matter what type of surveillance your investigation requires, Stryker Investigators are seasoned and well trained. We conduct surveillance at the client’s request for the purpose of monitoring a particular subject’s behavior or activity. Typically surveillance is done covertly or at a distance by means of electronic equipment, usually a camcorder or a covert video recorder. Private investigation agencies and governments use undercover and covert surveillance tactics to gather intelligence without an individual’s knowledge. Surveillance can be “static” or “mobile” and can involve one person or a team. The purpose of the surveillance program is to provide professional investigative, counterintelligence, and Stryker investigators trained to carry out various assignments at locations throughout the US.

There are two fundamental types of surveillance, covert surveillance (without their knowledge) and Subrosa surveillance, a term used by the insurance fraud industry to describe covert field surveillance,  and overt or (open and obvious) from this foundation emerge sub-categories such as counter-surveillance, inverse surveillance, computer surveillance and recent developments in electronic media and the internet, computer databases.  


PROFESSIONAL SURVEILLANCE SERVICES


  • Private Investigator Stryker Investigation Services

    WORKERS’ COMP SURVEILLANCE

    We clearly understand what it takes to provide actionable information from field surveillance to expose exaggerated and patently false claims. When an investigator is able to capture video evidence of the claimant performing activities outside the scope of their physical restrictions, set by their physician, the subject matter must be reviewed by their doctor. If the activities are, in fact, deemed outside the scope of their prescribed physical restrictions, the video may provide evidence that weakens or even stops payments of the worker’s compensation benefits. But, employees, employers, and even health care providers can take advantage of the system by committing workers’ compensation fraud. 

  • Private Investigator Stryker Investigation Services | San Francisco & San Jose, California

     MOBILE SURVEILLANCE

    By far mobile surveillance is the most difficult aspect of covert monitoring, especially if the subject is driving through a congested urban area. A private investigator or field investigator must able to make quick, split-second decisions under pressure, second-by-second in heavy traffic while maintaining a discrete distance and remaining undetected. The investigator must take into consideration driver awareness. Some people are very aware of their surroundings. They have their heads on a swivel and would recognize a person’s or vehicle’s consistent appearances in their environment. Likewise, some people are oblivious to the point that you can follow them for weeks without being observed. 

  • Private Investigator Stryker Investigation Services

    STALKING AND COUNTER-SURVEILLANCE

    Do you believe you are the victim of stalking? Are you receiving unwanted attention from an individual you don’t know? Do you find signs that someone has been in or near your home, your car, or your workplace when you were not there? Are you receiving repeated letters, gifts, cards, social media posts, and/or emails even though you told the sender to stop sending them? The act of stalking requires the stalker to operate in close proximity to the targeted individual [a victim] and involve the stalker tracking the target [a victim] for several weeks or even months. While the stalker is conducting surveillance, they are exposed, and, therefore, vulnerable to counter-surveillance detection. 

  • Private Investigator Stryker Investigation Services | San Francisco & San Jose, California

    FIXED POSITION SURVEILLANCE

    For fixed targets such as buildings, construction sites, points of vandalism, personal and business property, fixed surveillance will be used to determine patterns of behavior. Vandals or thieves will look for fences, gates, locks, and alarms, but they also will look for times when fewer guards or employees are present or when the guards or employees are about to change their shifts. They will conduct surveillance several times, often at different times of the day. Detecting this activity can be conducted by one person, or by a small group of counter-surveillance (CS) investigators. The CS investigators must place themselves in a position so that they can covertly monitor the target area or location. 

Although surveillance is not extremely difficult, it requires a specific skill-set and would be best left to the professionals. Principal Investigator and President

The Internet is a surveillance state. Whether we admit it to ourselves or not, and whether we like it or not, we’re being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads. 

The Issue: Facebook’s Social Apps are Always Watching…Where you go, and who you talk to

For quite some time now, Facebook’s user tracking hasn’t been limited to your time on the site: any third-party website or service that’s connected to Facebook or that uses a Like button.

Facebook is sending your information without your explicit permission. However, Winer noticed something mostly overlooked in last week’s Facebook changes: Facebook’s new Open Graph-enabled social web apps send information to Facebook and can post to your profile or share with your friends whether you want them to.

Essentially, by using these apps, just reading an article, listening to a song, or watching a video, you’re sending information to Facebook, which can then be automatically shared with your friends or added to your profile, and Facebook doesn’t ask for your permission to do it. Winer’s solution is to simply log out of Facebook when you’re not using it, and avoid clicking Like buttons and trying other services on the web to your Facebook account if you can help it, and he urges Facebook to make its cookies expire, which they currently do not.

Why You Should Care?

If you’re the type of person who doesn’t really use Facebook for anything you wouldn’t normally consider public anyway, you should note that everything you do on the web is fair game. If what Cubrilovic and Winer are saying is true, Facebook considers visiting a website or service that’s connected to Facebook the same thing as broadcasting it to your friends at worst and permission for them to know you’re there at best.

Facebook says that this has nothing to do with tracking movements and that they have no desire to collect information about where you are on the web and what you’re doing. They want to make sure that you can seamlessly log in at any time to Facebook and to sites and services that connect with it and share what you’re doing.

In fact, a number of Facebook engineers have posted comments to Winer’s original post and Cubrilovic’s analysis pointing this out. There’s also some excellent discussion in this comment thread at Hacker News about the issue as well. Essentially, they say this is a feature, not a problem, so if you have an issue with it, it’s up to you to do something about it.

SURVEILLANCE BUGS / BUG SWEEPS

Electronic covert listening devices are commonly referred to as “bugs.”  There are five different kinds of bugs: acoustic, ultrasonic, RF (radio frequency), optical, and hybrid. Acoustic, ultrasonic, RF, and optical bugs are distinct, specific types of bugs, and hybrids are simply a combination of any two types of bugs. An acoustic bug, the most low-tech of all bugs, can be any non-electronic device used to observe communication with the naked ear. Examples of acoustic bugs include drinking glasses, stethoscopes, or rubber tubes, either pressed against or inserted into an area in which there’s a sound leak. Ultrasonic bugs use a technique by which they gather sound, convert it into an audio signal above the range of human hearing, then allow it to be intercepted and converted back to audible sound. 

An RF bug can be placed in an area and/or inside a device, to transmit audio via radiofrequency. RF bugs are quite easy to detect, but they are inexpensive and difficult to trace back to the person who planted them. Optical bugs convert sound into an optical pulse or beam of light. Because they are highly expensive and very easy to detect, optical bugs are rarely used. Examples of optical bugs include active and passive laser listening devices. Surveillance devices, or “bugs,” are not really a communications medium, but they are a device that requires a communications channel. A “bug” usually involves a radio transmitter, but there are many other options for carrying a signal; you can send radio frequencies through the main wiring of a building and pick them up outside, you can pick up the transmissions from cordless phones, and you can pick up the data from poorly configured wireless computer networks or tune in to the radio emissions of a computer monitor.

Bugs come in all shapes and sizes. The original purpose of bugs was to relay sound. Today the miniaturization of electronics has progressed so far that even TV pictures can be broadcast via bugs that incorporate miniature video cameras (something made popular recently during TV coverage of sports events, etc.). conducted surveillance at the client’s request for the purpose of monitoring a particular subject’s behavior or activities. 

TSCM (technical surveillance countermeasures):

TSCM (technical surveillance counter-measures) A TSCM sweep is a service provided by qualified personnel to detect the presence of surveillance devices and hazards and to identify technical security weaknesses. It is also to ensure that there is nothing that could compromise an area’s security and confidentiality by using technical audio surveillance devices.  A bug sweep will detect eavesdropping devices that use Bluetooth, wi-fi or the cellular network to forward your sensitive information to an eavesdropper. The advent of multimedia devices and remote control technologies allows huge scope for the removal of data in very secure environments by the staff employed within, with or without their knowledge. The home bug sweeps address the complex eavesdropping detection threat and vulnerabilities landscape of our “connected” world.

Managing Espionage Risk – Business threats; the threat of corporate espionage is real. In order to manage the risk of corporate espionage effectively, it is important that organizations consider a cohesive strategy that supports the overall business strategy. It’s also important to note that a TSCM survey involves more than just an electronic ‘sweep’. As well as locating and identifying hostile electronic surveillance devices, an effective TSCM program is designed to detect technical security hazards, physical security weaknesses or security policy, and procedural inadequacies that would allow your premises to be technically or physically penetrated.

Threats to identify

1) Electronic devices are recording or relaying audio or video by radio transmission, infrared transmission, hard-wired circuits, mains circuit transmission, and window vibration systems.
2) Illicit radio transmitters, voice or data recorders.
3) Interception of landline telephones and their cabling
4) Mobile phone and Wi-Fi bugs
5) Other audio or video paths traveling out of the area.

Surveillance Work Product / Materials Prepared in Anticipation of Litigation

Certain information or material may not be subject to discovery if it constitutes work product of a party, their attorney or other representatives. The definition of work product is codified at O.C.G.A. § 9-11-26(b)(3), which provides: “Trial preparation; materials. Subject to paragraph (4) of this subsection, a party may obtain discovery of documents and tangible things otherwise discoverable under paragraph (1) of this subsection and prepared in anticipation of litigation or for trial by or for another party or by or for that other party’s representative (including his attorney, consultant, surety, indemnitor, insurer, or agent) only upon a showing that the party seeking discovery has substantial need of the materials in the preparation of his case and that he is unable without undue hardship to obtain the substantial equivalent of the materials by other means. In ordering discovery of such materials when the required showing has been made, the court shall protect against disclosure of the mental impressions, conclusions, opinions, or legal theories of an attorney or other representatives of a party concerning the litigation.”

Under the work-product doctrine, “tangible material or its intangible equivalent” that is collected or prepared in anticipation of litigation is not discoverable,[3] and maybe shielded from discovery by a Protective Order unless the party seeking discovery can demonstrate that the sought facts can only be obtained through discovery and that those facts are indispensable for impeaching or substantiating a claim.[4] That is, the party unable to obtain the information has no other means of obtaining the information without undue hardship. For example, the witness may have left the country. Where the required showing is made, the court will still protect mental impressions of an attorney by redacting that part of the document containing the mental impressions.

Citation: Black’s Law Dictionary (Abridged 7th ed.) wikipedia.org

 Surveillance, Background Check, Skip-trace and Locates, Statements, Interviews, alive and well checks | Pleasant Hill, Concord, Walnut Creek Contra Costa County, California Surveillance Investigator, Private Investigator Detective | Los Angeles, Los Angeles County, Los Angeles City, City of Los Angeles, LA County, LA, Long Beach, Ocean Blvd, Harbor City, Olympic Blvd, Beverly Hills, Santa Monica Blvd, CALIFORNIA, Azusa, Burbank, Cerritos, Century City, Wilshire Blvd, Diamond Bar, El Segundo, Glendale, Hermosa Beach, Hollywood, Malibu, Pasadena, South Pasadena, Pomona, Rancho Palos Verdes, Rolling Hills Estates, Rolling Hills, Santa Monica, Lincoln Blvd, Venice Blvd, Thousand Oaks, Oxnard, San Gabriel Valley, Ventura, California Private Investigator Stryker Investigation Services

Talk to a Licensed Private Investigator about our surveillance and areas of service in Los Angeles, Long Beach, LA County, Beverly Hills, Century City, Costa Mesa, Irvine, Mission Viejo, Newport Beach, Orange County, San Juan Capistrano, San Gabriel Valley, Surveillance Investigator, Santa Monica | San Francisco Bay Area Private Investigator Surveillance Investigator, Background Check, Skip-trace and Locates, Statements, Interviews, Campbell, Cupertino, Palo Alto, San Jose, The Alameda, West San Jose, East San Jose, San Thomas Expy, North San Jose, 1st Street, Milpitas, West Calaveras Blvd, Los Gatos, Los Gatos Heights, North Santa Cruz Ave, San Francisco, Market Street, California Street, Columbus Ave, Kearney Street Saratoga, Saratoga Ave San Jose and San Francisco