As licenced private investigators specializing in jewelry and art theft investigations, we witness the fallout of jewelry and art theft first hand and all too often. Whether stolen from a private home or public setting, these types of precious assets often represent immense historic value, sentiment, and uniqueness that makes no dollar amount a satisfying substitute, making the crime one that cuts deep for targeted owners.
Framed by this reality, the unveiling of a brand new app from INTERPOL marks a positive step towards reducing the skyrocketing rates of both jewelry theft and art theft across the United States and around the globe. Let’s take a look at exactly what this cutting-edge technology has to offer concerned collectors everywhere.
Direct Access to INTERPOL’s Stolen Works of Art Database
INTERPOL’s Stolen Works of Art Database promises to change the game for those aiming to thwart criminals intent on art theft and jewelry theft. It does so by cataloging essential information for the identification of valued items, aiding in their identification and location. At time of writing, the database has already amassed data on more than 52,000 objects from 134 member countries—all in the name of mounting a combined response to safeguarding our common heritage.
This impressive resource has been designed for use by police officers, custom officials, the general public, private collectors, art dealers, journalists, students, and art enthusiasts. However, the innovation of this project lies not in the simple documentation of stolen valuables, but in a far more comprehensive range of functions. The key to unlocking this crime fighting potential comes with use of their groundbreaking ap, ID-Art.
Stamping Out Jewelry Theft and Art Theft with ID-Art
The free-to-use ID-Art mobile app not only allows users to check if an object is registered as stolen, but also to create and inventory their own art collections and report site thefts and threats in real time. Missing objects can be searched manually or visually, using diverse search parameters such as object type, medium, production technique, artist’s name, or country of provenance. These metrics are streamlined by INTERPOL’s standardized ‘Object-ID’ format.
Alternatively, users can upload an image of the asset in question to perform a visual search using ID-Art’s cutting-edge image recognition software. This attention to details means that those cataloging their collections on the app can enjoy peace of mind that the data is in place to make it difficult for criminals to move their most beloved property in the event of jewelry or art theft. This, in turn, will help to reduce illicit trafficking and deter would-be criminals from targeting one-of-a-kind objects in the first place.
Going Further to Prevent Art and Jewelry Theft
Seeking adequate insurance and cataloging your valuables can go a long way in the event of a theft, but what about prevention? Private investigators from Lauth Investigations International frequently turn their expertize in analyzing crime scenes to the art of security and risk assessment. If you are concerned that you may be vulnerable to art or jewelry theft, we can deliver a comprehensive assessment and tailored advice on the steps that you can take to ensure the safety of your prized valuables. Should the worst have occurred and your items are missing, our veteran private investigators are ready to jump out into the field and unearth their trail, in hot pursuit of recovery. No matter your art and jewelry related security concerns, the Lauth Investigations team is ready to provide essential support. Contact us to learn more, and download INTERPOLS ID-Art app free of charge for Apple and Android mobile devices, to add vital layers of protection in the safeguarding of your assets.
Have you ever had the feeling you were being watched? Perhaps the hairs on the back of your neck stood up, and you paused for a moment, before brushing the feeling aside. It was probably just paranoia—unless, of course, there was a reason why a private investigator might have been surveilling you as part of their infidelity investigations.
Cheating spouse investigations are one of the most common tasks involving the use of surveillance techniques and technologies undertaken by personal investigators. Although, these types of investigations can be mounted for all manner of other reasons, including over family law matters, suspected abuse or theft by domestic staff, or dishonest dealings within a workplace setting.
Today, we’re going to take a look at why cheating spouse investigations arise so often in the world of private investigators, as well as the kinds of technology and techniques that your trusted PI might use to get to the truth of the matter.
Is Your Spouse Being Disloyal?
If you can’t shake the feeling that your husband or wife is running around behind your back, there’s good reason to investigate further. The tough truth is that research suggests that 50-60% of married men and 45-55% of married women will veer into the realms of extramarital sex in their lifetimes, and these statistics don’t even cover non-traditional types of infidelity, such as those seeking out virtual erotic encounters.
Warning signs that might alert you to the possibility that you other half is doing the dirty include suspicious internet and phone use, changes to their appearance and bathing habits, a shift in work routine, and changes in your own intimate relationship—including, perhaps surprisingly, an increase in sexual interest. When red flags are appearing, some may feel comfortable confronting their spouse, but others prefer to confirm of disprove their worries covertly. This is where a private investigator can assist in discreetly gathering evidence that will close the matter once and for all.
What is Involved in Cheating Spouse Investigations?
Ahead of launching into infidelity investigations, a private investigator will meet their client in order to ascertain not only the suspected behavior in question, but also as much background information as possible, such as daily routine, habits, hobbies, and social connections. The full scope of this kind of investigative process can be very painful for the client, making discretion, delicacy, and compassion essential qualities in a PI handling cheating spouse investigations.
With background information gathered, the private investigator you hire will begin using surveillance techniques to observe your spouse and document their behavior. Once they have gathered enough evidence for you to be able to draw a solid conclusion, they will present their findings and you can decide how to proceed.
The Spectrum of Surveillance Technology
Surveillance can be an optimally effective way to yield the information that infidelity investigations—and indeed countless other investigation types—call to uncover. However, it is essential to work with a fully licensed and reputable private investigations firm, because the legality of surveillance is complex, and the letter of the law must always be followed. The right investigative experts will know the specifics of each state’s unique legal requirements, allowing them to choose the surveillance options that will safeguard the client’s interests rather than landing them in hot water.
Technologies harnessed by private investigators include so-called nanny cams, which are so small that they can be easily concealed in the home or workplace without occupants being any the wiser. Hidden cameras can also be worn on the body, and even built into smart glasses, making video surveillance easier than ever. Other technologies that may be enlisted include recording devices and GPS tracking devices, however, once again, respective legislation must always be adhered to. A personal investigator may also surveil behavior online and physically observe the suspect’s actions to better understand the facts.
There’s a thrill in tracking down a unique treasure or acquiring artwork that will become a family heirloom, but contemporary buyers should beware. These days, art scams and jewelry scams are rife. If you think it couldn’t happen to you and don’t take the time to learn the facts, there’s a good chance your collecting efforts might go awry.
Do you think you could spot a fake or sniff a scam artist coming? Top art aficionados thought they had struck gold when Glafira Rosales began selling previously unknown works by painters such as Rothko, Pollock, and de Kooning to New York collectors. Later, it came out that every single one of the multi-million dollar paintings was a fake created by her accomplice, Chinese forger Pei-Shen Qian.
If Rosales and Qian were audacious enough to fool the New York art scene elite, you can bet that there are plenty of bad actors out there ready to roll out art scams and jewelry scams on a smaller scale with a big smile on their faces. Of course, this is no reason to avoid investing in spectacular art and exciting jewelry finds. Read on to discover what to look out for in order to protect yourself.
The Power of the Provenance
The provenance of a precious item describes its chain of custody—from the artist or jewelers studio to the seller presenting the piece today. This crucial paper trail doesn’t only exist for high-profile artworks in the world’s most famous museums, but also valuable treasures making their way through the hands of private collectors.
Within the worlds of art scams and jewelry scams, the term “newly discovered” denotes the forgers playground. Whenever a prized piece of reportedly noble origin appears without any provenance, it’s crucial to approach it with caution, no matter how romantic a tale is told. At the very least, a reputable appraiser, independent of the seller, should be brought in to size up your prize.
Of course, a phony provenance can also provide opportunity for sellers to overinflate value. When an item is described as having belonged to celebrity, royalty, or other persons of great importance, it can make an otherwise un-noteworthy item appear far more desirable than it should. Provenance should always be scrutinized to avoid disappointment.
Online Art and Jewelry Scams
The rise of online art and jewelry sales provides the perfect opportunity for scam artists to peddle their wares without direct physical scrutiny. Buyers can receive fake imitation goods, or nothing at all as the perpetrators digitally disappear without a trace. In order to avoid this perilous pitfall, steer clear of buying art and jewelry that is priced below retail value—if it seems too good to be true, it probably is.
Watch out for blurry images that may mask low quality items or poorly imitated brush strokes. Confirm quality guarantees, seller location, and returns policy—and in the name of avoiding jewelry scams, confirm that the total carat weight, gemstone quality, and setting style all match up. Finally, make provenance checks, just as you would when buying in person.
Sellers Avoiding Scrutiny Or a Paper Trail Are a Red Flag
Those selling authentic goods should have no concerns over making your transaction official. If a local seller seeks payment by money order or in cash, it’s time to raise the alarm—particularly ahead of a meeting in person, as this interaction may never happen if they intend to make off with your cash without providing what was promised.
Not only antique and vintage items, but new precious jewelry creations should have accessible proof of provenance for you to scrutinize. Contemporary tech is increasingly allowing buyers to protect themselves, as gemstones and precious metals are documented via blockchain so their history cannot be altered. The temptation to take the plunge on a desirable item can be great when it seems as if you’ve found something extraordinary, but it is better to save money and heart break, approaching every purchase with a focused and suspicious eye. Do you suspect you are a victim of an art scam or jewelry scam? If so, Lauth Investigations International can help. With extensive experience within the realms of art and jewelry theft and tracking the perpetrators of fraud and forgery, we have just the skillset required to find those responsible and ensure justice on your behalf. To learn more, reach out to our team today for a no-commitment consultation.
Strong practices for internal investigations offer vital security both for and within any organization. Employees can feel confident that they will be fully supported if they need a corporate investigator in their corner, and the company itself can deftly tread paths that might otherwise be legally perilous.
That all sounds great—certainly—but where should a business turn to when aiming to establish those best practices in the first place? Today, we’re going to dive into the vital considerations when building a workplace investigations strategy that will serve you well today and in the years to come. Read on, and wrap your mind around all the major need-to-knows.
The Vital Nature of Neutrality
Whether seeking simply to consult on internal investigations or aiming to place a delicate matter in the hands of a seasoned corporate investigator, the importance of neutrality can’t be overstated. If choosing who will lead an internal investigation or contacting someone from central HR within your company for advice, it is critical to assess whether their contribution can be truly viewed as impartial.
If there are personal connections to those being investigated, witnesses, or victims in the case of workplace harassment or discrimination, this may become a lead weight around the neck of the investigation if it ever leads to litigation. Neutral oversight is essential of the investigation is to be considered airtight, so if in doubt, reach out to an external corporate investigations specialist for necessary support as a legal safeguard.
Seeking Out the Right Skillset
A misstep in internal investigations can leave a company open to accusations of retaliation and the potential of an unfair dismissal lawsuit. This means that advice taken when planning your investigatory tactics should come from those truly in the know, and crucially, be rooted in more than mere opinion. An appropriate consulting advisor or corporate investigator will be able to fully grasp workplace policies and frame them within the context of applicable laws and legal obligations. Don’t forget that they may also require the skills to audit financials conduct computer forensics.
The Availability to Take Action
Launching internal investigations without someone at the helm who can handle the complexity and sensitivity of the complaint at hand is a dangerous move, but so too is waiting for a senior HR professional to have time in their schedule to take on the task. Delays in launching internal investigations can lead to leaks to the press and even occupational health and safety complaints. When a matter is serious in nature, bringing in a corporate investigator who can take action immediately is the only logical choice.
Prioritizing Appropriate Seniority
When a workplace complaint is made against a senior individual within the team, the prospect of impartial internal investigations becomes slim at best. It is a a simple reality that it’s highly unlikely someone unconnected to that individual, with no vested interest in the outcome, and within a position that is superior to those under investigation can be called upon. In contrast, an external corporate investigator will be unaffected by the high rank of the parties under investigation and will be able to lend neutral authority to the conclusions drawn.
Do you need expert guidance for workplace investigations or a corporate investigator ready to jump on the task at hand? Call upon the dedicated corporate team at Lauth Investigations International. We will safeguard your organization’s integrity while getting to the truth of the matter. Reach out to our team today and learn more about how we can assist.
When it comes to protecting your business from the myriad of frauds that occur in U.S. workplaces every single day, being informed is the first step. Our private investigators are here to help you recognize these top five types of fraud in business so they can be stopped as soon as possible.
Payroll Fraud
Payroll fraud is one of the top five types of fraud that are seen the most often in businesses of all sizes but particularly small businesses. It also takes many different forms, such as employees lying about productivity, payment advances, or manipulation of timeclock records. As such, those records should be carefully monitored and all potential employees should be thoroughly screened before onboarding.
Asset Misappropriation
Luckily, asset misappropriation is one of the top five types of fraud that is the easiest to spot. Missing assets are going to be noticed. Most managers and supervisors keep tabs on asset misappropriation by rotating out staff who are in charge of supervising inventory or cash kept on hand. It’s also crucial that any accounting positions are not singular, and finances are managed by more than one person.
Invoice Fraud Schemes
This type of fraud is a bit more complicated, and usually involves an employee who works in accounting. It’s achieved by generating fake or inflated invoices for purposes of stealing money from the company. These invoices may detail products that were never sold, vendors who do not exist, or B2B transactions that never took place. To avoid this, all invoices must be cross-referenced with inventory or performed work that is documented.
Financial Statement Fraud
This type of fraud is sometimes called “cooking the books,” in which financial records are altered or destroyed for financial gain or to fool investors into pouring more money into the company or to boost stock bonuses. Regardless of the aim, this kind of fraud can be devastating for a company, which is another reason accounting responsibilities must be delegated to numeral members of staff in order to prevent the funneling structure that allows this fraud to happen.
Tax Fraud
This is the type of fraud most known to the general public. Anyone can commit tax fraud by failing to pay their taxes, but it can also happen when companies misrepresent their earnings to the IRS in order to fall into a smaller tax bracket, or take advantage of exemptions. In order to avoid this, it’s imperative that all earnings must be reported on time.