Guns, Gams & Gumshoes

A blog for PIs and writers/readers of the PI genre

  • Writing a Sleuth?

    A Guide for Writing Fictional Sleuths from a Couple of Real-Life Sleuths

    "How to Write a Dick is the best work of its kind I’ve ever come across because it covers the whole spectrum in an entertaining style that will appeal to layman and lawmen alike."

    Available on Kindle

  • Copyright Notices

    All rights reserved by Colleen Collins. Any use of the content on this site (including images owned by Colleen Collins) requires specific, written authority.

    It has come to our attention that people are illegally copying and using the black and white private eye at a keyboard image that is used on our site. NOTE: This image is protected by copyright, property of Colleen Collins.

  • Writing PIs on Twitter

  • Guns, Gams, and Gumshoes

Posts Tagged ‘private detective’

Interview with Steven Kerry Brown, author of “The Complete Idiot’s Guide to Private Investigating”

Posted by Writing PIs on December 29, 2019

December 29, 2019

Saddened to learn today that Steven Kerry Brown passed away on Christmas day. I knew his name and reputation before I met him, first over the phone when he called to hire us for a case in Colorado. Later, we met in person at a writers conference. Over the years we’d occasionally chat about fiction writing as both of us were crafting private eye novels.

Below is a piece I wrote about Steven around 2013 when he was battling cancer, followed by a two-part interview I did with him in 2009.

Steven Kerry Brown

Steven Kerry Brown is a former FBI special agent and supervisory special agent, founder and president of Millennial Investigative Agency in Florida, novelist, author of magazine articles and nonfiction books, blogger, and has spent two years as captain of a sixty-foot ketch running sailing charters in the Bahamas.

He’s appeared on such television programs as Hard Copy and 60 Minutes, and is the author of one of the best books on private investigations around (The Complete Idiot’s Guide to Private Investigating — its third edition was released March 2013). He is also the author of 5 Things Women Need to Know About the Men They Date, released in April 2013.

The Idiot’s Guide to Private Investigating

The first time I met Steven was back in 2004 when he called our agency and retained our services for an investigative task in Colorado. The prior year I had attended an intensive, 16-week on-site investigative course that used the The Complete Idiot’s Guide to Private Investigating in its course material. I had read that book front to back, then back to front, scribbled notes in the margins, re-read — and then re-read again — numerous sections to ensure my grasp of a topic. Steven writes in a clear, straightforward manner, and sprinkles factual material with his own personal experiences.

That same year, I took another course on process service.  One day, the instructor played a Q&A game with the class — the prize for the most correct answers was a copy of The Complete Idiot’s Guide to Private Investigating. 

So a year later, when the author called out of the blue and requested our P.I. services, I was honored.

Writing the Private Eye Novel

Years later, Steven’s and my paths crossed again, but this time as novelists. We both have written private-eye genre novels, and have chatted off and on about agents, publishers, even WordPress. He co-authors the blog Handcuffed to the Ocean with several other writers, one being James N. Frey, a novelist and author of one of the better books on fiction writing, How to Write a Damn Good Novel.

Undergoing a Bone Marrow Transplant

Over the past few years, I’ve grown to admire Steven even more for his gutsy perseverance as he’s undergone a bone marrow transplant. Below is the beginning of a post he wrote last June:

I’m sitting here at 11 pm eating out of a carton of Edy’s Double Fudge Brownie ice cream. Got to love life. On Saturday June 15 I passed the one year mark since some nice guy over in Germany donated his bone marrow stem cells to me. I haven’t checked the statistics this year but when I agreed to enter the BMT Clinic at Shands Cancer Institute in Gainesville, Florida the mortality rate for bone marrow transplant patients was fairly high. 

Many of Steven’s friends and colleagues in the P.I. industry have contributed to his Bone Marrow Transplant Fund to help with the $500,000 in expenses for this procedure. Recently, there have been complications, which Steven wrote about in September 2013 — below is the beginning of that post:

I really thought I would have my immune system back by now. Most of the BMT transplant patients I’ve met received their shots by the end of the first year. But, now I’m convinced that I may never get it back. I’ve had a few set backs these last few weeks. I encountered a big flare up of GVHD that took over my entire torso. The doctors put me back on prednisone and other immune suppressant medication. I told the doctors I’d rather have the GVHD than the prednisone. But they said this flare up was life threatening, so I really didn’t have a choice.

Despite what he’s going through, his humor shines through—check out this poem to his doctors (posted on his September 2013 blog):

I wrote a little poem for the doctors about GVHD.

GVHD

Itch, itch, Itch,

Like a son of a 

Bitch, bitch, bitch.

By the way, this post includes photos of his symptoms (he does this to help others who might be contemplating a bone marrow transplant). Be forewarned—these photos are graphic.

At the end of this post, Steven writes:

Thanks for the well wishes and the donations. I promise as soon as I can I’ll get back to investigating the Haleigh Cummings case. I do have more posts on that coming up soon.

Amazes me that while dealing with his health challenges over the last year+ he has also self-published one nonfiction book and revised another. Puts the notion of “writer’s block” to shame.

Now to the 2009 interview with P.I.-author Steven Kerry Brown…

Steven Kerry Brown post 2-16-2014

Guns, Gams, and Gumshoes: Good morning, Steven, and welcome to Guns, Gams, and Gumshoes. First, we have to say that The Complete Idiot’s Guide to Private Investigating  is one of our favorite resource books. As we haven’t seen this second edition, we imagine you’ve updated it with more technology and tools–saying that, what is one of the more useful technological techniques you’ve recently started using in your investigative work?

Steven: There are three really useful techniques that are relatively new that I use a lot.  Two of them I describe in detail in my book. The first is the GPS tracking device. Below is a photo with the unit in a waterproof Pelican case and a 50 pound pull magnet and a long life lithium-ion battery pack. (Not much larger than a man’s hand.)

(Photo no longer available)


I set this unit (I have two of them) to report in every 10 minutes. I change the batteries out once a week. I also have the capability of clicking on “tracking now” on the unit’s website and receive a real-time location of where the unit is. So you or your client can sit in front of their computer and see where the unit is at any given time.  Of course, the primary use of this is in family law cases. Even though Florida is a “no fault” divorce state (meaning that proof of adultery doesn’t have a real impact on property settlement), still the client needs to know the facts of their situation before they can make an informed decision. Hence, using the GPS to track the spouse.

We follow-up the use of the GPS with a little judicious surveillance. Even though the GPS will tell us where the spouse is, it won’t tell us who he/she is with, so a few photos of the spouse and the other party will usually do the trick. And don’t be fooled by clichés. There are not more men than women committing adultery. We find it splits about 50-50.

The second technique I like a lot is Spoofing Caller ID. Now you have to be careful with this as it is now illegal in some states, like Florida, if you spoof a caller ID with the intent to deceive. How does it work and how do I use it? You can do a web search on Spoofing Caller ID and find lots of folks who will sell you spoofing time. I use Spoofcard.com  For $5.00 you get 25 minutes of spoofing time. Basically spoofing caller ID means that you can use this service to call a target number and the incoming caller ID will display any number you want it to show. The technology behind it is the spoofing company uses Voice Over IP (VOIP) to make the call and in doing so can send whatever Caller ID data you want sent. (You can find full details in the CIG to PI pages 184-188)

How do you use caller ID spoofing? Well, you might for instance, want to see if a certain person is at a particular residence. Before the law changed in Florida, I called a witness to a case that I needed to talk to. He wouldn’t answer my calls so I spoofed my number to look like his mother’s phone was calling him. He answered the call.

The third technique I like only works on cell phone numbers. You can use this service and it will bypass the phone and go directly to the cell phone’s voice mail. That way you can hear the message on the voice mail and sometimes figure out who the phone belongs to without them ever knowing you called the phone. It’s not perfect and your number might show up as a missed call on their phone. The service is called Slydial and their number is 267-759-3425. It’s free, give it a try. A database only available to PIs called Skip Smasher, has a much improved version of this service which will not leave your number on the target’s phone as a missed call and it will record the voice mail message for you. I love it and use it often. Kudos to SkipSmasher.com.

(Note from WritingPIs: Because of Steven’s recommendation, we began using Skip Smasher, too. Still use it to this day. It’s owned and operated by Robert Scott, a licensed private investigator.)

End of interview, Part 1.  In Part 2, Steven discusses the recession and private eyes, crafting non-fiction vs. fiction, and how much real-world PI dirt he puts into a fictional-world PI story.

Link to his book:

The Complete Idiot’s Guide to Private Investigating, Third Edition

Posted in Interviews, Steven Kerry Brown | Tagged: , , , , , , , , | Comments Off on Interview with Steven Kerry Brown, author of “The Complete Idiot’s Guide to Private Investigating”

Win a Box of Mystery Novels (Ends April 13)

Posted by Writing PIs on April 6, 2019

Love mystery novels? Private eye tales? Amateur detective whodunits (AKA cozies)? Enter the Box o’ Mystery Books Giveaway! Most novels are hardcover, from different publishers and writers, either released in 2018 or 2017. Winner can request one genre (such as private eye) or a mix of genres.

When: April 6 – 13, 2019 (ends at midnight April 13)

How to Enter: Click Box o’ Mystery Books Giveaway

The fine print: Your email address will only be used for this giveaway and never shared with others. Follow @writingpis on Twitter for an extra point. Winner will be randomly selected & notified by April 17. No purchase necessary. Must be 18 years old. Due to mailing restrictions, entrants must be residents of U.S. Good luck!

All Rights Reserved by Colleen Collins. Do not copy any content without written permission from the author. Images are licensed by the author, who does not have legal authority to share them with others.

Posted in Book Giveaways | Tagged: , , , | Comments Off on Win a Box of Mystery Novels (Ends April 13)

#WriteTip Free Online Magazines for Researching PIs, Bounty Hunters, Law Enforcement Officers

Posted by Writing PIs on July 29, 2016

PI taking surveillance footage (image licensed by Colleen Collins)

There’s some great online magazines that contain informative articles for professionals—they’re also excellent resources for writers crafting private investigators, police officers, bounty hunters, CSI experts, and more.

Check out some of these online magazines:

Tickle the Wire: Tapping Into the Latest News in Federal Law Enforcement.

Evidence Technology Magazine: Focused exclusively on evidence collection, processing, and preservation, with topics covering the CSI effect, fingerprint technology, computer forensics, forensic DNA, and much more.

Pursuit Magazine: The magazine of professional investigators.

Collateral: A bail industry magazine that focuses on the bail bond industry, bail bond agents, sureties and the way they conduct business.

American Police Beat: A magazine and forum where law enforcement officers speak out about the issues affecting their personal and professional lives.

Serve Now: Not a magazine, but a handy resource for learning about process servers and their work.


Available August 1, 2016

FB Banner Kim Killion Final draft July 29 2016

 

All rights reserved by Colleen Collins and Shaun Kaufman. Please do not copy/distribute any images noted as copyrighted or licensed. Images noted as in the public domain are copyright-free and yours to steal.

Posted in Online Research Magazines | Tagged: , , , , , , | Comments Off on #WriteTip Free Online Magazines for Researching PIs, Bounty Hunters, Law Enforcement Officers

Three Tips for Conducting a Reverse Phone Number Lookup

Posted by Writing PIs on September 5, 2015

(Image licensed by Colleen Collins)

There’s lots of ads out there for free phone look-ups — often what you get is some free information (such as the possible geographical location of the phone carrier), then they ask you to “click here” and for $1.95 or $34.95 (prices vary), you can get the full report on this person.

Buyer beware.

There’s no magical 100% correct database out there that’ll spit out the latest and greatest information associated with a phone number. We’re not saying you can’t get correct information. You might. But you, the buyer, should know that you are paying for information that could be outdated, input incorrectly into a database, or the phone number might have been correct at one time but has since been ported to a new carrier.

Saying all that, here are three tips to conduct a reverse check on a phone number:

Type a phone number in Google for a quick reverse number search (Image licensed by Colleen Collins)

Type a phone number in Google for a quick reverse number search (image licensed by Colleen Collins)

Tip #1: Run the phone number in Google. Google remains the most comprehensive, free public search engine. Search results reflect every document, website, blog, resume, ad (such as Craigslist), and other online places where that phone number displays.

We once found a person who was on the run by conducting a reverse cell phone number search in Google. Although she had disconnected her cell phone service, that number was still listed on her MySpace site, which she had kept public (not private), meaning anyone could read her comments. Although she had worked to cover her tracks, she was taking the time every day to log into her MySpace account and chat with friends. And we were taking the time every day to read where she’d eaten lunch, what time of day she drove into a certain town, what motel she was staying at, and more.

Tip #2: Check the carrier, geographical region for the number. There are sites that offer free checks for type of phone line, carrier, and geographical region of the phone number. One site is Phone Validator, another is SpyDialer, the latter also offering options to hear the person’s voicemail message and look up the phone owner’s name and photo.

Again, keep in mind that the information returned is only as good as the database, and there’s no guarantee how recently the information has been updated. For example, I just ran my personal cell phone number in SpyDialer, and although it got my first name correct, it displayed a photo of what appeared to be a restaurant along with a man’s name. Perhaps he (or the business) had this number before me.

Tip #3: Hire a private investigator.  A qualified PI is experienced at digging for information and can interpret its accuracy or legality. To find a PI in your area, contact the professional investigators’ association for your state: Private Investigator Associations by State (PINow.com).

Related Article

Last winter, Shaun (now a criminal lawyer), cross-examined an investigator during a trial. Key to the case was the owner of a cell phone found at an apartment. The investigator said it belonged to the guy whose bedroom he found it in. Problem was, there were multiple bedrooms and roommates at this residence, with recent parties in the apartment attended by others, so deciding ownership solely on where the phone was left was flimsy evidence. Shaun then asked the investigator if he’d run a reverse on the phone. That story is here:

Investigator Takes the Stand: Tales from a Trial

Have a great weekend, Writing PIs

All rights reserved by Colleen Collins and Shaun Kaufman. Any use of the content (including images owned or licensed by Colleen Collins and/or Shaun Kaufman) requires specific, written authority. Any photos noted as being in the public domain are copyright-free and yours to steal.

Coming Soon: How Do Private Eyes Do That? (Second Edition)Collins_HowDoPrivateEyesDoThat BLOG ONLINE PR 800

Posted in Online Detective Sites, Reverse Number Searches | Tagged: , , , , , | Comments Off on Three Tips for Conducting a Reverse Phone Number Lookup

Do All PIs Carry Concealed Handguns?

Posted by Writing PIs on August 22, 2015

In movies and books, private eyes often carry handguns (image licensed by Colleen Collins)

In the writers’ classes we’ve taught on private investigations, this question has come up a lot. In those great old noir films, seems every shamus carried one and used it freely. Then along came Jim Rockford from the TV show The RockFord Files, and that easy-going, beach-loving PI preferred to keep his gun in a cookie jar rather than carry it.

We used to stash a stun gun under the front seat of our car, otherwise we don’t own or use any guns, and we know many PIs who don’t carry as well.

Private Eye Characters and Guns

A few years ago, there was a best-selling novel starring a junior PI (she’d just started work in her relative’s PI agency) and she carried a Glock in her glove compartment. The premise of the story was that her relative couldn’t trust her to take on any serious investigative jobs, so she’d been relegated to background checks and hunting down an occasional cheating spouse — and for those jobs, she carried a Glock? For us, that seriously stretched the story’s believability.

Making It Realistic

But many fictional PIs do carry firearms, and if the author makes it credible, it makes for a great read. There was a book out a few years back that starred a PI who had lost her license, and on top of that, she had a felony rap in her background. She carried a gun, but she knew she’d be in deep you-know if that became common knowledge, so she took great care to hide the fact (of course, she got caught and tossed into jail when it was found). The story was plausible because it reflected reality.

Another female fictional PI who carried a gun: Robert Parker’s female PI Sunny Randall. A former cop with grit and smarts, it’s plausible and nail-biting when Sunny pulls out a rifle and blasts the bad-guy as he trespasses her front door, leaving a bloody crime scene in her own living room.

Just keep in mind that under the conditions any real-life PI would legally carry a firearm, so would a fictional PI.

In The Rockford Files, Jim Rockford (R, played by James Garner) kept his gun in a cookie jar (image is in public domain)

Keep in mind, too, that in the real world armed PIs rarely (if ever) get into the kind of gunplay seen in fiction. Many PIs will tell you that if gunplay or a fight breaks out, it indicates an investigator isn’t doing her job well.  When a surprised client asked PI Jim Rockford why he wasn’t carrying a gun, he said, “Because I don’t want to shoot anybody.” After all, the primary guiding forces for any investigator are stealth and discretion.

All rights reserved by Colleen Collins and Shaun Kaufman. Any use of the content (including images owned or licensed by Colleen Collins and/or Shaun Kaufman) requires specific, written authority. Any photos noted as being in the public domain are copyright-free and yours to steal.

Posted in Concealed Weapons | Tagged: , , , , , , , | Comments Off on Do All PIs Carry Concealed Handguns?

Answering Writer’s Question: Do PIs Use Listening Devices?

Posted by Writing PIs on April 13, 2015

“Eavesdropping” by Théodore Jacques Ralli 1880 – image is in public domain

Since we opened our doors nearly 15 years ago, we have been invited numerous times to give workshops at writers’ conferences about crafting plausible PI characters in stories. Occasionally, we have also taught our own online classes. Below is a question that several writers have asked over the years, and it’s a good one.

We have known PIs who got into trouble after being caught illegally using listening devices, but such problems are good in fiction as tension and conflict bump up the stakes.

Writer’s Question:  Do you ever use listening devices in your investigations?  I’d like to have my fictional sleuth use a listening device while she’s driving around — is that plausible?

Answer: No, we don’t use listening devices because they intrude on others’ expectations of privacy. Also, such devices are frequently electronic in nature, and any electronically supplemented listening device meets the definition of the crime of eavesdropping. We once had an attorney ask us to use an electronic listening device in a motel room to try to listen in on a “cheating spouse” in the next room.  We refused, explaining that would be eavesdropping. Last we heard, the attorney found another PI who was willing to do it.

As to your character using a listening device in her car, yes, it’s plausible, but keep in mind that your character is technically breaking the law. But think of this…unless your character repeats conversations verbatim or admits to using a listening device, who will know?

Now let’s look at it another way — your character is caught with the device — that’s great. Throws more conflict into your story. Or a third party says there’s no way the PI-character could possibly have known about a private conversation unless the PI had been illegally using a listening device. Again, more story tension. What does the PI do?  Toss the listening device?  Yes, probably…in a dumpster far, far away from her premises.  We’re talking fiction, so having a character do things that he/she knows are illegal are great for adding conflict.  What’s key is for the writer to know certain actions and uses of certain devices are illegal to begin with (then the character must wrestle with the whys and hows of what he/she’s doing…and be prepared to pay the consequences).

Have a great week, Writing PIs

All rights reserved by Colleen Collins and Shaun Kaufman. Any use of the content (including images owned by Colleen Collins and/or Shaun Kaufman) requires specific, written authority.

A Guide for Writing Fictional Sleuths from a Couple of Real-Life Sleuths

Available on Kindle

Posted in PIs and Listening Devices | Tagged: , , , , | Comments Off on Answering Writer’s Question: Do PIs Use Listening Devices?

#MondayBlogs Answering Writer’s Question: When Does a PI’s Activity Become Intimidation?

Posted by Writing PIs on March 20, 2015

bad guy

Today we respond to a writer’s question about PIs and intimidation.

Writer’s Question: When does surveillance, or any legitimate investigative activity, become intimidation?

Guns, Gams, and Gumshoes’s Answer: Many investigative activities (such as surveillance, knocking on doors and attempting interviews, service of subpoenas) can be done in such a manner to intimidate the target of an investigation. The legitimate activity can be so pronounced and intense that the subject not only knows they’re being investigated, they fear the person who’s hired the investigator (or they fear the investigator him/herself). This is intimidation. An example of an intimidation is to leave a dead fish on the windshield of someone’s car with a rose in its mouth (which L.A. investigator Anthony Pellicano did to intimidate a newspaper reporter ). This reporter was a witness before an official proceeding and Pellicano was charged for intimidating a witness with this not-so-subtle gift of seafood.

While the FBI agents in The Sopranos could sit at the foot of Tony’s driveway and even FBI special agentchat with him on occasion (which is not covert surveillance), they could not attempt to run his car off the road or interfere with his business because those acts constitute intimidation (or police harassment).

Private investigators are regularly asked by bill collectors to visit debtors. This is a dicey area because federal credit collection practice laws permit contact but they don’t permit collectors to threaten with bodily injury or improper damage to the debtor’s reputation. Any time that a debtor can prove that a PI is guilty of these acts then the PI is personally liable, his firm his liable, and the collection agency is liable. Your fictional PI might be employed to knock on doors and collect money, discourage witnesses to testify in a court case, or take photographs of an individual and his/her home, car, workplace, etc. When these acts are done to intentionally frighten the witness and/or drive them from either testifying or bringing a claim in court, those actions are legally classified as intimidation.

Writing PIs

Posted in PIs and Intimidation, Writing About PIs | Tagged: , , , | Comments Off on #MondayBlogs Answering Writer’s Question: When Does a PI’s Activity Become Intimidation?

Answering Writer’s Questions about Surveillance Video

Posted by Writing PIs on November 22, 2014

surveillance

Updated Nov 22 2014

We originally wrote this post in 2010, then updated it in 2012. A note we want to add today is that by 2011-2012, we were exclusively using equipment that recorded digitally, from digital recorders to digital video cameras. A funny story: After we had “gone digital,”  a P.I. contacted us and asked what tape recording equipment we had used for an insurance company client several years prior because they had just hired him, and they insisted he only record with tape! He was frustrated, but had no choice if he wanted to conduct insurance investigations for them.

We figure that the insurance company has gone digital by now. If you’re writing a story set around 2012, that could be a funny predicament to put a PI character in (forced to use near-obsolete equipment).

And now, the post from 2012…

We’re answering a writer’s questions about surveillance video vs. tape, the inclusion of sound, and terms referring to viewing and monitoring video.

WRITER’S QUESTION:  Do PIs/police/etc still refer to surveillance video as surveillance TAPES (even though info could be on disks,sticks, etc)?

GUNS, GAMS, AND GUMSHOES’S ANSWER: In our work, we say “surveillance video.” We thought about this, asking ourselves if we still hear other PIs loosely refer to surveillance video as tapes, but we can’t recall hearing that in a long time (several years at least).

WRITER’S QUESTION:  Do surveillance videos normally include sound?

surveillance female hanging out of car with camera

GUNS, GAMS, AND GUMSHOES’S ANSWER:  With our equipment, yes, and we expect that’s pretty standard for other PIs. We often don’t like it for our surveillance work, and invariably we’ll be using the camera and realize it’s recording our comments to each other, etc., and we need to shut down the sound. We have an entire surveillance video with the sound of our dog panting in the backseat (which strikes a soft spot with us as we’ve since lost that beloved dog). More than you wanted to know, but possibly fodder for stories.

WRITER’S QUESTION:  Are there special (industry specific) terms associated with reviewing and monitoring surveillance video?

GUNS, GAMS, AND GUMSHOES’S ANSWER:  Not that we’re aware of. In speaking with our clients, be they attorneys or civilians, we’ll use pretty generic verbs (reviewing video, downloading video [from video hard-drive to main computer, for example], “photoshopping” video [in our office, photoshop’s become a verb much like Google–let’s Google that address, for example], editing video, burning video to a CD [we’ll burn video segment/s to a CD, which we’ll drop off at attorney’s/other’s offices], shooting video).

Click on image to go to Amazon page

Click on image to go to Amazon page

Posted in Q&As | Tagged: , , | Comments Off on Answering Writer’s Questions about Surveillance Video

#Excerpt How Do Private Eyes Do That? – How PIs Are Used in Cases Where DNA Evidence Is Employed

Posted by Writing PIs on November 8, 2014

How Do Private Eyes Do That? is a compendium of articles about private investigations, currently available on Kindle.

“A must have for any writer serious about crafting authentic private eyes. Collins knows her stuff.”
– Lori Wilde, New York Times and USA Today bestselling author

“A spectacular bargain. It will help sweep out misconceptions, empty the waste bin of trite, worn out cliches and give you plenty of room for fresh ideas. Man, it’ll save your life.”
– C. M. Briggs

“I have been “snooping” for over 30 years. I worked Security and Law Enforcement, in the military, back in the 80’s. I WAS TRULY IMPRESSED with the information in this book!”
~I. Reed Alott

Excerpt: How Does DNA Get to a Crime Scene?

There is known DNA evidence (produced by the victim) and there is evidence produced by a suspect (foreign depositor.) This evidence must be collected by a definite protocol because deviation from this collection method might spark a courtroom challenge to the reliability of that evidence.

How is a private investigator used in a case where DNA evidence is employed?

A private investigator might be retained and used to challenge the manner in which DNA evidence was gathered and handled by their opponent. The private investigator might look for evidence to substantiate a challenge to laboratory staff’s credentials or he might look for evidence that their test results have been successfully challenged in other cases.

When Is DNA Evidence Used?

DNA evidence is used in criminal prosecutions (to show a suspect is the perpetrator of a crime) and in an increasing variety of civil cases (to prove that an individual was wrongfully convicted and imprisoned for a crime, to show paternity, and to establish lineage in estate matters.)

As an example, “wrongful conviction” cases have created a new type of litigation. Civil lawsuits are routinely brought by those

Animation of the structure of a section of DNA...

Animation of the structure of a section of DNA. The bases lie horizontally between the two spiraling strands. (Photo credit: Wikipedia)

exonerated through DNA evidence against police, prosecutors, and the forensic laboratories who helped bring about the wrongful conviction. For example three young men who played on Duke’s Lacrosse team and were falsely accused of rape and wrongfully prosecuted for that crime over a twelve-month period sued a North Carolina District Attorney and thirteen others. The trio also sued the laboratory used by the prosecutors for withholding evidence that pointed to their innocence. This is the laboratory that initially attested to a match between their DNA and samples taken from their accuser. This laboratory is now under scrutiny for its handling of evidence in this and other cases.

Note to writers: If you’re writing a story with a private investigator character, he/she (who could easily have a scientific or an investigative background) might be involved in gathering evidence about how certain laboratories are crooked, how they employ “bad science,” or even what makes some scientists charlatans.

All rights reserved by Colleen Collins and Shaun Kaufman. Any use of the content (including images owned by Colleen Collins and/or Shaun Kaufman) requires specific, written authority. Any violations of this reservation will result in legal action.

Posted in DNA Crime Scene, Nonfiction book: HOW DO PRIVATE EYES DO THAT?, PI Topics | Tagged: , , , , | Comments Off on #Excerpt How Do Private Eyes Do That? – How PIs Are Used in Cases Where DNA Evidence Is Employed

Answering Writer’s Question: How Easy Would It Be for a Person to Adopt a New Identity?

Posted by Writing PIs on August 14, 2014

bad guy

Writer’s Question: How difficult would it be for an everyday person (I’ll call him Joe Smith) to learn how to obtain falsified ID documents?  In my story, I have a character who’s hired by shady business people to gain secrets about an opponent’s business.  Could Joe Smith easily (or not so easily) get a job under a different name, and get falsified docs in that name?    As long as Joe Smith didn’t have a criminal record (in fact, he has a squeaky clean record), is it plausible he can get away with this?

Guns, Gams, and Gumshoes’s Answer: It’s not difficult to get new identity documents, but it is difficult to adopt skill-set, career talents, and being convincing as another person with a life history, friends and family.  As to how this everyday person in your story might go about getting new ID documents, the person might turn to someone who possibly has connections to underground contacts, such as a bookie, and ask if they know someone who can assist with providing forged identity documents.  Of course, your character shouldn’t bumble into such a conversation, but could perhaps pay attention to this hypothetical bookie, get a feel if he/she might have such contacts, then ease into the old “I have a friend who’s looking for a new driver’s license because he lost his after a DUI…”

Below is a link to an FAQ that offers Q&As on this topic. A lot of it appears to be an organization hyping its report on this topic, but we’re talking about fiction in this post, not real life, so maybe there’s a nugget or two you can use in your story.

Note: We do not encourage employing questionable or illegal tactics, and the opinions expressed in this article are those of the author/s and respondents and in no way reflects our endorsement:  

“New Identity FAQ”

Have a good week, Writing PIs

woman looking thru mag glass black and white2

All rights reserved by Colleen Collins and Shaun Kaufman. Any use of the content (including images owned by Colleen Collins and/or Shaun Kaufman) requires specific, written authority. Any violations of this reservation will result in legal action.

Posted in Creating False IDs | Tagged: , , | Comments Off on Answering Writer’s Question: How Easy Would It Be for a Person to Adopt a New Identity?