QUINTUS DIAS. Recommendations and Information from QD as a former LEO to the grassroots investigators of corruption in HARNEY COUNTY OREGON.
RULES FOR HAPPINESS WHILE CONDUCTING COMPLEX INVESTIGATIONS
PROLOGUE (Updated 2-1-2016)
–Transparency. Freedom from obscurity and easy to understand; the comprehensibility of clear expression, statements and or facts.
–Obscurity. The quality of being unclear or abstruse and hard to understand. Obscurity is the main obstacle of investigations bent on understanding, revelations, clarity and seeing the object/s of investigation/s for what it truly is or represents.
- Rules for Investigations-Preliminary Considerations
- The OBJECTIVE-what is it you are trying to know, understand, or to make clear-
- Ascertain what you know or do not know. [ Is your investigation related to criminal conduct, politics, ethics, and science? For example investigating corruption may have a political and or criminal nexus]
- Resources. What resources do you have to initiate, conduct, and complete a thorough, competent investigation? [Materials, time, expertise, analysis, money, phones, computers, radio, media]
- Specialists. What specialists do you have to lend expertise to certain aspects of the investigation? [A homicide investigations needs specialists in crime scene investigation techniques, evidence technicians, skilled interrogators, law experts and skilled cops with expertise in all aspects of homicide investigation ]
- Evidence and the Discovery Process. What elements of the investigation pertain to evidence? What is the discovery process?
- Evidence. What may be deemed evidence and how to preserve it or present it?
- The Discovery Process: facts and Information obtained through the discovery process-questioning, reading, examining persons, documents, photos or films may lead to conclusion supporting a thesis or a conclusion of guilt.
- Recourse to law. A criminal investigation or a civil suit investigation conducted under the auspices of a court has weight-that is, respondents, persons of interest, may be compelled by legal authority or penalty to present information, depositions objects, and submit to questioning to disclose identities, actions, and locations of
Persons directly or indirectly to the investigation. Thus, it helps to have legal powers to conduct an investigation.
–Police have legal authority to investigate
–Grand Juries have legal authority to investigate
–Courts have legal authority to issue search and seizure warrants based on probable cause
- Private Investigations. These investigations do not have legal authority, period. Private investigators do not have the legal right to go onto private property without an owner’s consent, nor do they have the ability to obtain bank records, email records, or phone records; they also cannot tamper with mail, wiretap a phone without consent, or obtain information or data through illegal means.
- Scope of Discovery with Legal Recourse. The basic rule of discovery is that a party may obtain any information that pertains to any issue in the case, as long as the information is not “privileged” or otherwise legally protected by law. Particulars of investigatory value are–
- anything a witness or party saw, heard, or did in connection with the case
- anything anyone said at a particular time and place
- the identity of anyone who might know something about the case, about injuries, or money losses, or criminal conduct
- detailed information on how a business or agency is run
- documents relating to the case
- The personal, educational, and professional background of a witness.
NOTE: obviously, a criminal investigation has many advantages over a private investigation. However, this should not discourage private parties from conducting an investigation until they are barred by legal constraints by law. Much can be learned despite the power a legal investigation has.
- The Discovery Process for Private Investigators [Complex Investigations]
- Newspaper resources. News paper articles related to the subject at hand are a primary resource. Make sure you check the morgue files for information
- Radio broadcasts/interviews, photo montages of persons, places, and documents are another resource
- Social Media outlets. These are an excellent investigatory tool
- Books, magazines, journals, documents. All are excellent resources for the discovery process
- Documentaries. Film documentaries are an excellent resource
- Source Context
- Primary sources. Primary sources allow investigators to get to the roots of original ideas, events and or studies. This can include creative ideas, first hand or contemporary accounts of events, publication of the results and or observations or studies, and other items directly related to the source.
- Novels, plays, poems, works of art, popular culture
- Diaries, narratives, autobiographies, memoirs, speeches
- Documents, patents, drawings
- Data tables, technical reports, research results
- Secondary sources analyze, review or review information in primary resources or other secondary resources. All sources presenting facts or descriptions about events are secondary unless they are based on eyewitness observation. Moreover, secondary sources often rely on other secondary sources and standard disciplinary methods to reach results, and they provide the principle sources of analysis about primary sources. Examples include:
- Literature reviews
- Scholarly articles that don’t present new experimental research results
- Historical studies
- Tertiary sources relate to overviews of topics by merging information from other resources. Tertiary resources can present data in a comprehensive form by tables, chronologies, almanacs and useful context to interpret it–
III. The Trajectory of Complex Investigations. There are several trajectories that must be understood, planned for, and equipped for.
- The political. What political figures, parties, or concepts are applicable to the investigation?
- Politicians [Democrat, Republican, Other] and links to persons of interest or corporate bodies, especially to lobbyists, mouthpieces, sources of finance (donors) and known criminals
- Political parties [What links to the parties have to the present narrative, topics and persons of interest]
- Political constructs [is the topic of investigation applicable to a socialist, communist, fascist or Republican form of government?
- The Criminal/Legal. What actions of persons of interest may constitute crimes and the discovery of evidence supporting allegations of criminal conduct?
- Corruption, malfeasance, bribery, theft of services, intimidation of witnesses, perjury.
- Violation of civil rights: Rights to assembly, unlawful arrest, unlawful detention, due process, incrimination
- Evidence supporting the above
- Preservation and chain of custody related to the above
- Investigate instances or claims of judicial misconduct, perjury, witness tampering, and failure to disclose evidence. This applies to cops, judges, prosecutors and witnesses
- The mysterious death/s or disappearance/s of anyone linked to the Objective
- The Financial [follow the money]. This is a biggie! What financial rewards or assets are at stake? Who has these stakes in possession or is about to ? What wealth is at stake [gas, oil, gold, lead, copper, silver, water, food crops, and cattle, wind, thermal etc.] Follow the money from the source to the person/s of interest and how it is spent, secured, or disposed of and to whom.
- Source of money-who or what is it and the links to the person/s of interest [foreign or domestic source…loan company… bank…brokerage…loan company…shylocks…private loan
- Convertible assets. Not all financial streams are based on money. Residences, land, artworks, gems, patents, publishing rights, loan of assets, conveyances, and business percentages can be exchanged for money or serve as money.
- Money Laundering. The washing of illegal financial gains to make it legal.
NOTE: Money Laundering has three distinct parts-A forensic accountant can be extremely helpful in complex investigations if a financial element is under scrutiny
- Placement. The insertion of “dirty” funds into a legitimate institution, such as a cash deposit in a bank, or the money purchases stock and or notes and or bonds in a legitimate institution
- Layering. This washes money through stock or wire transfers between different accounts and or different countries and or the making of constant deposits or withdrawals to different persons, institutions and or accounts to complicate the transfer of funds and the principals involved. The money may change form to hard assets such as boats, planes and other high value items that can be converted back to cash (diamonds and gems or stamps)
- Integration. The money once again enters the economy in legitimate or legal form. It may come from a legal transaction originating from bank transfer into the account of a local business. The recipient may have an interest or access to the account or in the business for a percentage of the profits
- SUMMARY: Consequently, persons who have no legal authority investigating persons of record and or interest related to the Harney County, Oregon allegations of political corruption have a difficult but not impossible task.
- Get access to stock brands, registries’, grazing permits, water rights, foreclosures, bankruptcies and court records, land patents. See who owns what in Harney County. See who sold what to targets or fronts associated with them.
- See if the targets have associations with mob figures, criminals of record, financial institutions, criminal convictions/pardons, links with: lobbyists, global organizations, ecological organizations, employment, job creation and NGO boards. See if the targets have cross linkages with other persons associated with land, legal, mortgage, financial and or ecology organizations. What are they?
- See if the targets have numerous bank accounts, offshore accounts, take expensive vacations, political junkets and appear to live beyond their means. NOTE: Identify any shell companies or fronts and ID board of directors, where the corporation is registered and who registered it. See if there are cross linkages of the shell with any other companies.
- Obtain statements of net worth applicable to all politicians of interest and or public figures, who may be related, and see if they have obtained professional performance bonds. Did the politicians sign their oaths of office?
NOTE: Many politicians refuse to sign their oaths of office and this is a tipoff that they may be part of the corruption gang operative in the jurisdiction at hand.
- Ascertain if the targets have rule-making, foreclosure, financial sanction, or enforcement powers and delineate what they are.
- Ascertain if the targets have conflicts of interest and delineate what they are.
- Create spider web linkages between persons of interest and or organizations.
- Develop and protect confidential sources of information.
- Protect your information: duplicate it, disperse it, use digitization and hard copies.
- Limit the information to only authorized persons.
- Expect official obfuscation, provocations, misleading statements, or deceptive persons to throw you off course
- Compartmentalize the investigation as much as possible.
- Develop sources who can add their expertise on a voluntary basis that may want to publish your investigation, and or may use it for criminal proceedings as a base.
- Photograph, film and or tape, or digitize papers, persons, vehicles, buildings, conveyances including permits, license plate numbers.
- DO NOT TALK to the MSM or to police about what you are doing. As long as you are lawful, they do not need to know want you are doing. Nor are you obligated to inform them.
- Never meet a witness or source on their ground, especially in isolated places. You choose the place [preferably a public place]. Use a bodyguard detail when meeting sources [they should have CCW permits and carry heat]. Never pay for sources of information.
- Investigators should not be predictable. Change your daily schedule…do not use customary routes to places…change routes, residences, or vehicles, clothes as frequently as possible. Use remote car starters. Be careful of unsolicited mail or mail displaying misspellings, partially wrong address or that have oily stains, or that have no return address, or that seem unduly heavy. It may be a letter bomb.
- Use public library computers if you can without disclosing your identity. Use encryption.
- Run anti-virus and malware programs daily.
- be persistent, polite, and at times stand back and think about what you are doing and how it all relates. See the big picture and keep that in focus.