Author Archives: Zach Featherstone

Fraud in Business

The article below is a really strong warning on the importance of being alert and vigilante when it comes to fraud.   http://www.couriermail.com.au/news/queensland/fraud-paid-for-leighton-contractors-finance-manager-damian-ocarrigans-high-life-as-stolen-funds-used-to-keep-escort-belinda-leonard-at-his-beck-and-call/story-e6freoof-1226598901950   One of the most common questions asked in by the victims of fraud (Corporate or Personal) is- Can I get the money back?   Not every Read more [...]
Posted in Blog | Tagged , , Comments Off on Fraud in Business

What are the Australian Defamation acts, and why do we have them?

The Defamation Act 2005 was created “to enact provisions to promote uniform laws of defamation in Australia and ensure that the law of defamation does not place unreasonable limits on freedom of expression and, in particular, on the publication and discussion of matters of public interest and importance.” The act was also created “to provide effective and fair remedies for persons whose reputations are harmed by the publication of defamatory matter to promote speedy and non-litigious methods Read more [...]
Posted in Blog | Tagged , , , , , Comments Off on What are the Australian Defamation acts, and why do we have them?

Prevent Break and Enter of your Business!

For the provision of security and safety of staff to be successful, it must be an on going exercise.  It must be addressed in a number of stages.    After an original Risk Assessment and Analysis of all security and work place issues, a security plan must be formulated and approved.  Education of staff of the plan is then necessary.  The plan must be audited regularly and improved upon, where further risk is assessed.    Risk Assessment A Risk assessment with respect to your building Read more [...]
Posted in Blog | Tagged , , , , , , , , Comments Off on Prevent Break and Enter of your Business!

How businesses use surveillance

How Businesses use surveillance   In today's business climate, entrepreneurs are recognizing the benefits of having an on-demand staff of trained surveillance operatives available. A trained surveillance crew has the tools and techniques in place that can protect your company from wide range of potential problems.   Loss Prevention / Hidden Camera Surveillance   One obvious reason for installing surveillance cameras is to aid against loss prevention. A single theft is extremely Read more [...]
Posted in Blog | Tagged , , , , , , Comments Off on How businesses use surveillance

Freedom of Speech v. The Defamation Laws

Whilst Australian residents may believe they are protected from defamation under the Australian Defamation Laws, many are unaware of the loop holes in which they have no legal grounds to defend their reputation if defamed. Australian Defamation Laws protect from domestic defamation, however they do not protect from foreign defamation via .com websites hosted in the United States of America.   Unfortunately Australians can be defamed by websites hosted in foreign nations such as the USA where Read more [...]
Posted in Blog | Tagged , , , , , , , , , Comments Off on Freedom of Speech v. The Defamation Laws

Purchasing Online – EBAY

As more and more consumers move toward online purchasing, so do we see the increase in fraudulent activities. Sites such as Ebay have resources to protect their consumers however scammers are often able to circumvent these initiatives. Internet sellers are becoming increasingly sophisticated and adept at appearing to be legitimate and fooling consumers to into parting with their money for little or nothing in return. Particular risks are involved with overseas transaction as it can be difficult to Read more [...]
Posted in Blog | Tagged , , , Comments Off on Purchasing Online – EBAY

Corporate and legal uses of surveillance

Surveillance for legal and corporate organizations   There are a large number of corporate groups as well as legal practices that hire Phoenix Global for various different investigative and surveillance requirements.   Fraudulent Insurance Claims and Employee Compensation   Many companies experience higher insurance premiums owing to fraudulent claims related to injuries, compensation packages, on the job accidents, and public liability. At Phoenix Global, we pride ourselves Read more [...]
Posted in Blog | Tagged , , , , , Comments Off on Corporate and legal uses of surveillance

Why people use Surveillance

People often ask why our clients might hire a private investigator for surveillance. In most cases, if a person decides to choose this option, their reasons typically include needing to find conclusive evidence or proof to make a fully informed decision or conclusion. In this way, professional surveillance can be used a method of finding and collecting much-needed information.   Our clients can be categorized into three different groups: Individuals, Businesses, and Commercial. In this article, Read more [...]
Posted in Blog | Tagged , , , Comments Off on Why people use Surveillance

SKIP TRACING – LOCATING PERSONS OF INTEREST

Individuals can become difficult to find for a multitude of reasons, whether it be simply moving around the country frequently; or purposely living under the radar. These individual often need to found as a matter of importance the other party involved and can include such reasons as: Searching for a witness to an accident; Service of court documents; Serving bankruptcy notices; Attempting to retrieve monies owed; Locating an estranged family member; Locating a past associate;   Although Read more [...]
Posted in Blog | Tagged , , , Comments Off on SKIP TRACING – LOCATING PERSONS OF INTEREST

Anonymity Online – How much longer will it last?

As of recent times we have seen a significant rise in Online Defamation from people we now refer to as ‘online trolls’. The rise in Online Defamation has been facilitated by Social Networking sites such as Facebook, Twitter and Blogger. These networking sites require no ID authentication, have no written content filters and are often used in nefarious ways to damage the reputation of others. Without the need to validate ones identity when posting on social media, how are we to see through this Read more [...]
Posted in Blog | Tagged , , , , , , , , , , , , , Comments Off on Anonymity Online – How much longer will it last?