It is estimated 30% of employees steal from their employer.
Most of us have dealt with a thief during our lifetime. Devious and sneaky, some thieves behave as if stealing is an art. It is usually a theft exposing them; however, many times, they can strike numerous times before getting caught. When theft happens in the workplace, it can not only be a costly lesson but the cause of a business failing.
An estimated 30% of employees steal from their workplace affecting all types of businesses. For instance, if you are running a restaurant with $1 million sales annually, at only 4% theft within the company, your company would be losing $40,000 a year!
Employee theft costs U.S. businesses over $200 billion in annual losses. Not only are companies trying to prevent the public from stealing items, inventory, assets, and ideas from a business, they must also combat thieves on the inside. Unfortunately, 75% of employee-related crimes go undetected.
Theft can take many forms, such as: stealing money, embezzlement, unauthorized use of business or customer identity, and theft of intellectual property, such as cases of patent or trademark infringement.
Combating Theft is Knowing How Employee Theft Occurs.
Cash
Employees who have access to a cash register is the most common way employees steal from companies. If unsecured, petty cash drawers or boxes, can be an easy target for thieves.
In addition, an employee can quote a higher price than the actual price of an item and keep the difference at the point of sale.
If employees have access to credit card information or checks, theft can happen as easily as sticking a few checks inside a folder, costing the owner thousands before it is detected.
Checks and Fraud
Most banks do not verify a signature on a company check making it very easy to sign and cash a check.
Credit card fraud is a number one threat to companies and consumers because most credit card holders admittedly do not check each line item on their credit card statement.
According to the U.S. Small Business Administration (SBA), companies with less than 100 employees, lose approximately $155,000 as a result of fraud each year, a much higher rate than large companies.
Payroll
Employees may often perform actions and falsify records for work they didn’t do, such as requesting reimbursement for travel and other expenses unrelated to work. Employees may also set up fake payroll accounts for workers who have been terminated or retired. Creative thievery abounds.
Time Sheets
Time theft or “Buddy Punching” is a very popular way timesheets may easily be falsified. Individuals complete this theft by having one employee punch another employee in or out for the other.
Excessive breaks, malingering, surfing the Internet, chatting with employees or taking personal phone calls are other ways time theft occurs. While some of these things may not at first be thought of as stealing, all these actions, or inactions, can affect the bottom line and be taking advantage of an employer.
Vendor Accounts
Thieving employees will set up fake vendor accounts, submit phony invoices and issue checks for the false vendor. These checks can then be signed over to themselves and deposited. In addition, a variation would be paying a vendor $500 and writing a check to themselves, expensing the entire $500 to the vendor.
Merchandise
Loss of inventory can happen in the merchandise distribution process but can also happen before merchandise is made available to the public. Many times, employees will take items from a warehouse or newly arrived items before they are scanned into inventory software. Employees have even been known to steal entire shipping trucks containing merchandise headed to their employer’s company.
Supplies
Some employees steal smaller items such as typical office supplies, but furniture and equipment are not off limits for a thief.
Information
Many employees steal information to benefit themselves or a competitor. Types of information include: office memoranda, proprietary products, customer lists and/or other confidential data. Theft can occur by email, printing, or copying information to a flash drive or cell phone, or simply carrying it out in a purse or folder.
Sometimes, theft can be subtler, such as luring customers away, purposefully providing poor service, even spreading rumors to damage a company’s reputation and cause a down-turn in business. All are considered losses.
While there are ways to combat theft within your company, ultimately identifying the thief before they are hired is the most effective way to reduce the occurence of theft.
The SBA recommends: “One of the first steps to preventing fraudulent employee behavior is to make the right hiring decision.”
Background checks are a good practice for any employer, large or small, especially for those employees who will be handling cash, high-value merchandise, or have access to sensitive customer or financial data.
For over twenty-years, Thomas Lauth of Lauth Investigations International has been working nationwide and helping educate employers on methods used to combat theft.
“The first and most effective way to address theft in the workplace, is to conduct an extensive background check,” says Lauth. “A background check can provide insight into an individual’s behavior, character, and integrity.”
Which Types of Background Checks Should You Conduct?
According to the U.S. Chamber of Commerce, upwards to 30% of business failures are caused by employee theft. Thus, conducting effective, extensive background checks helps to mitigate your risk of hiring objectionable or even dangerous employees.
Not all background checks are the same. As you build a profile of your future employee, there are several kinds of background checks you should consider. For example, a criminal background check is different than checking on an individual’s credit score or military service, these require consent. A criminal background check does not require consent; however, some states have laws restricting how you use the information collected during a criminal background check.
Private investigation firms like Lauth Investigations offer complete background checks while helping you comply with the law.
Protecting Your Legal Liability with Background Checks
Smaller businesses often forego background checks for two reasons: 1. A false sense of trust and security developed by business owners working too closely with employees. 2. Most businesses do not understand the legal liabilities associated with the failure to conduct employee screening and background checks.
Any business where employees provide a direct service and interact with customers, such as contractors or daycare providers, is liable if an employee does harm to a customer and the employee has a history of wrongdoing.
A company, big and small. may not recover from this kind of lawsuit.
Choosing the Right Company to Conduct Background Checks
Protecting the interests of your workplace and customers while reducing potential liability is of utmost importance; therefore, it is vital to select a company you can trust to conduct the background screening both efficiently and thoroughly.
While employers can do some background checking of their own, working with an experienced and reputable company can ensure the reliability and thoroughness of the background screening.
Purchasing instant public records found online is not appropriate for conducting potential employee background checks. Most certainly if your hiring decision is based on tpublic record data, your company could land in hot water.
Most public databases do not fact check, clean up or refresh their data providing completely different information than received from an investigative firm experienced in conducting professional, legal and full background screening.
Private investigators have access to databases to determine if a potential employee has a criminal background.
A reputable company providing background screening services will ensure the information you receive is current and accurate.
If a hiring decision is made based upon information found in the background check, in most cases, the company must inform the potential employee of the source used to obtain the information for the background checks (which is where using public databases can get your company in legal trouble).
What can you expect from a professional background check? According to Lauth, it’s all in the details and you pay for what you get. If you want detailed, accurate information, you will choose a Private Investigation Background Search.
Unlike a personal background search using public databases, private investigators have access to several databases providing a variety of information.
Employment history: This search will bring up employment records to include all positions held, making it easier to find discrepancies in a resume. It will also include salaries associated with the positions.
Academic and professional affiliations: Qualifications to include academic history and certification, even if the person did not complete the program.
Criminal records: Including a detailed outline of all criminal activity from traffic warnings and tickets to arrests and convictions. Also, these include jail time served and fines paid.
Financial Standing: Reflects all liens, judgments, bank accounts, current and previous property ownership, repossession of vehicles or other personal property, NSF checks and bankruptcies.
In addition to the typical information received through a personal background check, a private investigator will include:
Worker compensation claims an individual has filed. This can help determine the character of an individual by looking at the number of claims they have filed which could reveal a person is dishonest and fraudulent.
Ascertain causes of accidents or any criminal activity. DMV reports will show accident dates and basic information but do not reflect the cause. Private investigators can provide the cause behind the accident and whether criminal activity was involved.
Information on business and personal partners.
Analysis of all findings.
Relying on an Internet search is risky. A professional background screening will be more in depth than simply entering a name in a database. When a company’s future is at stake, the only way to go to obtain concise information needed to make informed decisions is a professional, private investigations extensive background check.
By: Carie McMichael – Lauth Investigations Communications and Media Specialist
Near the southern tip of North Carolina, where I-74 and I-95 meet, there’s a town called Lumberton. In 1995, the town became the two-time winner of the National Civic Leagues All-America City Award, which aims to recognize communities “whose citizens work together to identify and tackle community-wide challenges and achieve uncommon results.” Unfortunately, in a matter of decades, Lumberton has fallen from recipient of the All-America City Award to the number one spot on the FBI’s list of the top ten most dangerous cities in North Carolina.
According to a 2016 FBI report, there were 393 violent crimes in Lumberton and analysts estimate an individual resident has a 1 in 55 chance of being raped, assaulted, or killed. These overwhelming statistics could explain why the details emerging from Lumberton in recent months read more like a titillating summer mystery novel than a modern-day Mayberry—the citizens stewing in fear and suspicion as law enforcement continue to investigate the three murders and smattering of disappearances plaguing the small North Carolina town in the last year.
On April 18th, 2017, the remains of two women were found in central Lumberton less than 100 yards from one another. The remains of Christina Bennett, 32, were found in an abandoned house after a neighbor called authorities about a rancid odor coming from the property. Police also discovered the remains of Rhonda Jones, 36, stuffed in a trash can not even a football field distance away. The remains of both women were in an advanced stage of decomposition, not only preventing authorities from establishing a time of death, but also preventing them from establishing a cause of death for both women. Police Captain Terry Parker confirmed the women were both identified through medical records.
The community was staggered by the tragedy. Rhonda Jones’s family had known something was wrong when she didn’t show up for Easter. Jones’ sister told the Robesonian, “I want whoever did this to be punished. I know somebody knows something. Because Rhonda knows everybody in thE area. Somebody knows what happened to Rhonda,” Price said. “She had five kids… She had a family that loved her… She had a granddaughter that she loved with all of her heart. Somebody needs to be punished for what they did to her. She didn’t deserve this. No one deserved that.”
In early June, the remains of Megan Oxendine were found in another abandoned house on 9th Street in central Lumberton. The discovery of her body came as a chilling twist to the citizens of Lumberton, as many recalled her interview with news media the day after the discovery of the remains of her friend, Rhonda Jones. In April 2017, Oxendine joined many across the community who had spoken out about the loss of Jones. She told CBS North Carolina, “I ain’t never seen her act out or nothing. She’s just quiet. She didn’t really mess with too many people.” Just as, in the cases of Christina Bennett and Rhonda Jones, Oxendine’s state of decomposition prevented authorities from establishing both time of death and cause of death. This makes her the third woman found in a four-block radius in central Lumberton in two months. Although law enforcement has yet to link the deaths of the three women, Private investigator Thomas Lauth of Lauth Investigations International speculates that the discovery of their remains could be the patterned behavior of a single perpetrator, “Commonly in cases where the victim(s) are first missing then found deceased in a very small geographic area, the perpetrator of such a heinous crime will kill again, and resides within a 10-20 mile radius. Perhaps even had prior interaction with the victim or their family. Further, if the community has a high rate of crime from meth or heroin, it could bring outside traffickers and other transients into the community which increases the propensity for murder.” Police have reported the neighborhood has been a hive of criminal activity for years but are unable to connect any of the deaths to the criminal element.
It was in June of 2017 the Lumberton Police Department officially requested the assistance of the Federal Bureau of Investigation in what is officially called “the death investigations” of the three women. As recently as last month, March 2018, investigators conducted a canvas of the area where the three women were found. Over the course of three days, they knocked on 800 doors, conducted 500 interviews, and continued to encourage the public to come forward with any information.
Since the beginning of the FBI’s involvement in the death investigations, two more women have gone missing from the Lumberton area. The first woman is Cynthia Jacobs, 41, who went missing sometime in July 2017. Her disappearance strikes those who knew her as “suspicious” because, according to her sister-in-law, Cynthia was the last person to see Megan Oxendine—the third woman found—alive and well. The second woman was 20-year-old Abby Lynn Patterson. On September 5th, 2017, after telling her mother she was leaving the house to run errands, it was reported Abby Lynn was last seen getting into a car with a male acquaintance on East 9th Street, 1000 yards from where Christina Bennett and Rhonda Jones had been found. Captain Terry Parker of the Lumberton Police Department told CBS 17, “While there is always a possibility, we are 99 percent sure the case is not related to the females this spring and early summer.”
Five women have either disappeared or been discovered dead in the same neighborhood over the course of six months. A little over a year later, police and federal investigators have yet to establish a cause of death in the cases of Christina Bennett, Rhonda Jones, and Megan Oxendine. They have yet to name any suspects in their deaths. They are currently offering $30,000 for anyone who can lead investigators to the truth of what happened to the three women. Cynthia Jacobs and Abby Lynn Patterson have not had contact with their families since they were last reported seen in Lumberton. Anyone with information on the whereabouts of the missing women should call the Lumberton Police Department at (910)-671-3845.
By: Kym Pasqualini, Feature Writer for Lauth Investigations
Have you ever found a $20 bill in your laundry and felt you just won the lottery? Most people would be ecstatic to realize they forgot to empty their pockets but what happens to money you don’t know exists? Hundreds, maybe thousands of dollars.
You may be surprised how many people in this country have unclaimed assets they may never know existed . . . unless they look for it.
Currently, it is estimated local, state and federal agencies collectively hold more than $58 billion in unclaimed assets, roughly $175 for every U.S. resident. However, experts estimate there may be as much as $100 billion languishing in unclaimed cash and benefits held in local, state and federal agencies. We do know, daily, the amount of unclaimed funds increases.
According to the National Association of Unclaimed Property Administrators, every state including the District of Columbia, Puerto Rico, and the U.S. Virgin Islands has lost assets, commonly referred to as unclaimed funds.
What are Lost Assets?
The unclaimed property law or escheatment was first enacted in 1954. The purpose of the act is to provide a central repository in each state, so citizens can seek lost assets belonging to them. Each state maintains a comprehensive list of the unclaimed assets.
Unclaimed funds are financial assets owed to an individual or business not claimed or have unknown ownership. Examples of unclaimed assets or funds are the following:
Uncashed payroll checks
Dormant bank accounts
Safe deposit boxes
Refunds
Customer overpayments
Security deposits
Insurance payments
Unclaimed dividends
Unclaimed securities
Traveler’s checks, money orders, cashier’s checks
Principal on debt
Escrow balances
Old stock certificates
Mining Certificates
Mineral royalty payments
Retirement
Property held by courts and other governmental agencies
All businesses must forward all unclaimed funds or property to their state in accordance with their state’s escheat laws. Ideally, the state holds unclaimed funds in a trust and attempts to locate the rightful owner – except it doesn’t always work in that way.
Unfortunately, since 2006, a mere 5% of lost assets has been returned to rightful owners.
The Escheatment Process
Unclaimed property is governed by state laws requiring all unclaimed assets be turned over to the state to be held in trust. For example, if a bank account is inactive for a lengthy period, commonly within one year, the state can claim the funds in the account through a process known as escheatment.
Escheatment accounts are defined as dormant, unclaimed or abandoned. For instance, banks are responsible for reporting unclaimed property to the state after a certain amount of dormancy. Each state has a different time frame before the state escheats the assets to safeguard them.
In Arizona, a financial institution must report securities property after a period of 3 years dormancy and bonds after two years.
The laws are strict. A company could be fined by the Arizona Department of Revenue a civil penalty of 25% of the value of the unclaimed asset or abandoned property or $100 per day up to $5,000.
The only tangible property covered is the contents of safe deposit boxes. However, for contents of safe deposit boxes, periodic auctions are conducted by most states and proceeds from the sale of items are held for a rightful owner.
While unclaimed, the policy for unclaimed funds is they should be used for the “greater good” of the public, until such time as it is returned to the rightful owner. Without affecting the state’s obligation to return unclaimed funds, collections are used to finance operations such as public schools and college scholarships.
In 1951, the U.S. Supreme Court stated in the Standard Oil Co. vs New Jersey case, “Property that escapes seizure by would-be possessors and is used for the general good rather than the chance enrichment of particular individuals or organizations.”
In 2015, $3.235 billion was returned by state government unclaimed property agencies to rightful owners or heirs.
What is an Heir?
An heir is the “rightful owner” of lost assets/funds or a person in ranking who is entitled to inherit property if the rightful owner is deceased, sometimes referred to as a logical heir.
An heir can be an individual or a company such as a business or corporation, church or charity, or hospital.
Defining the Source
A government database of centralized information does not exist; therefore, each federal agency maintains its own records. When looking for lost assets this can create confusion and, in reality, often makes the property hard to find.
United State Treasury reports an estimated 25,000 payments are returned as undeliverable.
US Bankruptcy Courts reports approximately $200 million dollars is waiting to be claimed.
Class Action Lawsuits have generally 95% of the funds as unclaimed.
Savings Bonds show an estimated 40 million savings bonds have gone unredeemed, equaling an estimated $16.5 billion dollars.
Life Insurance reveals there is approximately $1 billion dollars unclaimed due to lost or unknown policies.
Lost assets can be found in the most unlikely places.
In an Oklahoma News 4 report, the Oklahoma Corporation Commission spokesperson Matt Skinner said, “You were someone who had an ancestor who owned minerals in 1910, [and] that’s still the name on the minerals, then if you can prove those minerals were part of an estate that came to you, you would get the money that is in the fund.”
For any given property, there might be dozens, sometimes hundreds, of oil and mineral owners. Much of the time, people are second and third generation and the original rights are still in the parents or grandparents names who have passed away.
While each state maintains their own database, the resources to find the owners of the property are minimal, even nonexistent. Some states advertise on their websites and others in the local newspapers. Clearly, with only 5% return on total lost assets, these methods are not effective.
With the lack of a national database, finding lost assets can be difficult for most individuals and makes it necessary to find help.
Finding Heirs
Prior to turning over unclaimed property to the state as required by law, businesses or holders of lost funds may conduct due diligence and often hire companies, referred to as heir finders, to assist in finding the rightful owner of unclaimed assets.
Most states require heir finders to be licensed private investigators to protect consumers.
One may think they don’t need a private investigation firm to represent them; however, there are many benefits to hiring a private investigator to locate lost assets. Experts say it is beneficial to work with professionals who are familiar with specific state laws where the property is located and the ability to obtain procurement of documents and certificates while working efficiently for the client.
Rain Lauth of Lauth Investigations International Lost Assets Division, specializes in finding lost assets and works closely with local, state and federal agencies to provide assistance to consumers, stresses the importance of working with licensed private investigators when searching for lost assets and filing claims for ownership.
“They will be familiar with all the forms that will be filed, the proper identification, probate laws, court properties, co-claimants, death certificates and other required information,” says Lauth.
Lauth Investigations has returned over $15 million to rightful owners since 2013 with an overall success rate of 98% on all claims.
“We take great pride in working with our clients in a caring and professional manner,” said Lauth. “Often the process of locating and claiming lost assets can be an overwhelming experience, but with our extensive resources and a highly skilled team, we diligently seek to make the process of documentation of ownership a painless experience for our clients,” added Lauth.
From Latin, it means “buyer beware.” It’s a phrase that conjures scenes from the famous tale of “Jack and the Beanstalk.” Young Jack’s mother, filled with shame and frustration, regrets sending her son to market after finding out he’d sold their most valuable possession—their cow—for a handful of beans. Jack’s mother feared her son had been a victim of consumer fraud, and unfortunately, it is far from fiction.
In many ways, capitalist America is the perfect hunting ground for the man with the magic beans. America is one of the largest consumer nations on the globe. Securing an excellent deal on goods and services means bragging to your friends about how you got the new lawnmower for a song. The consumer feels intelligent and capable, as if they managed to somehow trick the store or salesperson into giving it to them at an attractive price. American consumers chase this feeling by attending special sales, racking up credit card debt, and turning coupon-clipping into an Olympic sport—all in the interest of outsmarting the man with the magic beans.
Luckily for American consumers, there are institutions that help protect them from consumer fraud, such as the Better Business Bureau, which identifies problematic businesses that might swindle American consumers out of their hard-earned money. There’s the Federal Trade Commission, a government agency policing business practices and policies to protect American consumers and regulate competition within industries to maintain a healthy, well-balanced economy. In the long century since both of these institutions were established, the man with the magic beans has also changed and evolved, just like any predator.
One of the most common types of consumer fraud in America is mortgage fraud. Owning one’s home is still very much a part of the American dream. Americans shop for homes for months, searching for the certainty they will not overpay for their homes. Those who have morbidly derelict credit are afraid to answer the phone, desperate to evade bill collectors, petrified of losing their home. They are perfect targets for criminals running foreclosure-rescue schemes. The Federal Bureau of Investigation defines it as “perpetrators profit by selling the property to an investor or straw borrower, creating equity using a fraudulent appraisal, and stealing the seller proceeds or fees paid by the homeowners.” Perpetrators convince the debtor they can transfer their poor credit into the name of a third-party investor (i.e. the perpetrator), renting their property until such a time their credit is once again in sufficient standing. The perpetrator fails to make the mortgage payments on behalf of the victim and pockets the profit.
As technology advances, there are more convenient ways to pay for goods and services with the rise of electronic pay, using applications and online services to pay bills. It might be the best way to avoid another common type of consumer fraud: debit-card fraud. Many Americans are familiar with credit card fraud but might believe their debit cards are safe. Ken Stalcup, a certified fraud examiner working with Somerset in Indianapolis, identifies these types of fraud for a living, but even he is not immune to consumer fraud. He was just paying the bill at a restaurant. The waitress disappeared out of sight with his debit card to clear his bill, and when she returned, nothing was amiss. However, Stalcup’s bank was alerted when it appeared his debit card was used to purchase computer equipment almost halfway around the world. The waitress had sold his card information, enabling other criminals to steal from him. His advice to other vulnerable consumers is to “avoid letting their debit cards out of sight and check their accounts daily.”
One of the most devious forms of consumer fraud is charity frauds. Fake charities are set up with the intention of exploiting humanity’s capacity for the desire to help those less fortunate than oneself using the same system that real charities use to collect legal donations. According to a 2011 statement by the FTC, they received more than 30,000 reports of people making donations to fraudulent charities. Just as easily as Americans are vulnerable to a good deal, they are also vulnerable to putting their money towards a charitable cause, whether out of actual benevolence or the appearance of such. These predators are especially fond of slithering out of the woodwork in the wake of natural disasters such as hurricanes like Katrina and Maria that devastated both New Orleans and Puerto Rico respectively. These tactics add a brand-new level of sleaze to consumer fraud, taking advantage of the American need to help their fellow man.
In addition to remaining an informed and skeptical consumer, there are other ways you can protect yourself from consumer fraud. Enlisting the help of a private investigator or a similar inquisitive entity can help you protect yourself from scams like those mentioned above and resolving these frauds after they are perpetrated. A private investigator’s job is to serve the specific needs of their client, diligently capturing the entire picture of how severely the consumer might have been affected by a particular fraud. Of course, they can be a perfect tool for exposing the agencies that claim to want your money and knowing exactly where the money is going. Local authorities are often overwhelmed by crime statistics that force them to practice triage when dealing with different types of cases. Private investigators have an invaluable list of tools at their disposal, which they can often use without the restraints legislation places on law enforcement. Whether you’re outsourcing to a third party or taking your personal consumer protection into your own hands, never let your guard down when it comes to the man with the magic beans.
By: Kym Pasqualini, Feature Crime Writer for Lauth Investigations
Open-source intelligence (OSINT) is the collection of data from publicly available sources to be used in the context of intelligence. Within the intelligence world, the term “open” refers to overt, meaning sources available publicly, opposed to clandestine or covert sources.
OSINT is not a new concept. It has been in use for decades. However, with the arrival of instant communication and fast information transmission, a significant amount of predictive and actionable intelligence can now be obtained from unclassified public sources.
OSINT should not be confused with public intelligence or open-source software.
The U.S. Director of National Intelligence and the U.S. Department of Defense (DOD) define OSINT as information produced from publicly available information collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement.
In short, open source acquisition involves procuring written, verbal or electronically transmitted material that can be obtained legally without any type of clandestine collection techniques.
Background of OSINT
OSINT’s originates with the pre-Central Intelligence Agency (CIA). The formation of the 1941 Foreign Broadcast Monitoring Service (FBMS) was born during World War II and evolved into the 1967 Foreign Broadcast Intelligence Service (FBIS), the predecessor of the Open Source Center of today.
Acquired by the CIA in 1947, FBIS emerged as the only recognized service organization trained and equipped to monitor and process foreign broadcasts for the benefit of all government agencies needing the service.
Coverage worldwide, to the extent it exists today, was beyond the dreams of those who lived in that era.
In 2005, following the 9/11 attacks, the Director of National Intelligence Agency, Porter J. Goss, announced the creation of the DNI Open Source Center. The Center is designed to collect information available from databases, radio, television, video, geospatial data, photographs and commercial imagery.
OSINT Information Flow Categories
Media to include newspapers, obituaries, magazines, television, and radio worldwide.
Internet includes, but not limited to, online publications, discussion groups, blogs, citizen video (user created content and video), Facebook, YouTube, Twitter and other social media websites.
Commercial Data includes commercial imagery, industrial and financial assessments and databases.
Grey Literature: patents, working papers, business and corporate documents, newsletters, technical papers, and unpublished works.
Professional and Academic publications obtained through journals, symposia, academic papers, journals, theses, and dissertations.
Public Government Data: telephone directories, press conferences, websites, speeches, budgets, hearings and other public government reports.
There are various disciplines of OSINT and the methods and applications are almost endless.
The New OSINT
Ten years ago, open source information was scarce; however, in recent years OSINT has taken on an entirely new meaning.
Back in the day, people were primarily found by searching a phone book. Today, people are increasingly comfortable with sharing their personal information and a treasure trove of information for those who want it.
According to Statistica, it is estimated there will be 2.77 billion social network users around the globe in 2019. Social media has become an excellent and consistent source of information.
While, decades ago the problem was shortage of open source information, the biggest difficulty now, is filtering through an overabundance of information.
Some examples of OSINT resources are:
Internet directories containing personal information, residences, relatives, demographics, employment, contact information.
Social networkingsites provide personal information, friends, family members, interests, photographs, videos, and activities.
Online reviews provide interests, purchases, activities and lifestyle.
User contributed information could be a blog, hobbies, opinions, and expertise.
Academic sites provide information related to education, business conferences, associations, and academic papers.
Company websites have personnel listings, backgrounds, location, duties, services, and contact information.
News sources provide topical information, reports, events, personal history, obituaries, and contact information.
Government sources provide personal information, criminal background, court activity, minutes, locations, demographics, tax records and other financial data.
Social Media Monitoring and Geofencing
Companies like Echosec, based in Victoria B.C., offers a web platform to draw what is called a “Geofence” allowing users to pinpoint a location of interest on a map and obtain information within selected parameters, then filter searches by keyword, hashtag, or username within the geofence.
Echosec’s real-time social media mapping connects virtual communities to real-world locations and gives new meaning to Geographic Information System Mapping (GIS). A powerful research tool combining GIS and OSINT.
This is becoming a popular method of analysis for retail, branding, journalism, private investigation, and finance, collecting what Echosec calls “hyperlocal insights” for better business and breaking news stories.
Google, Yahoo, Bing and other traditional link-crawling search engines do not typically access the information professionals using OSINT research techniques and resources can provide.
Embracing Geolocation
Geolocation is one of the most valuable resources used today. For example, videos and photographs shared publicly often contain information where the photographs originated.
Most of us post pictures of ourselves and our friends, tagging each other during a vacation at the beach or out on the town. A geotagged picture is a post that attaches a “geotag” which is the physical location to the post. It allows users insight to their followers, where they are, and what they are doing.
Social media and Geo-location monitoring of open-source information has been more frequently used by law enforcement and private investigators to conduct investigations. Whether a missing person investigation or background check, basic and even critical investigations can benefit from OSINT.
For example, a person is reported missing and frequently posts photographs on Snapchat, Instagram and Facebook. Investigators can access the geotags and see where the person was last and often see who they were with, allowing the investigating agency the ability to immediately expand their investigation.
Open Source Private Investigations
Many private investigators are now specializing in open-source intelligence and social media investigations, referred to as Social Media Intelligence (SOCMINT). While much of the information is available publicly, there are many reasons why an individual would choose to hire a private investigator.
Private investigators have become experts in the field of open-source intelligence investigations.
Simply, private investigators know how to search, where to search and what to search for, making hiring a private investigator a more efficient choice. Private investigators know if the information is online, in a state repository, library or the courthouse.
Information that can be obtained includes but is not limited to the following:
Voter registration
Bankruptcy records
Corporate records
Property records
Probate records
Divorce records
Marriage records
Court records
Criminal records
Due diligence
Business information
Financial information
Whether a private individual or a business, obtaining the right information often leads the investigation in a specific direction. Private investigators of today are the next-generation of private intelligence providing services such as:
Fraud Investigations
Competitive Intelligence
Counterintelligence
Intelligence Collection
Internet Investigations
Email Tracing
IP Investigations
Financial Investigations
Asset Investigations
Pre-investment Investigations
Difficult to locate
Missing Persons
Background Investigations
Knowing when to use a private investigation firm can help hasten an investigation. The service of these firms can make life easier because it requires more than just knowing how to use the Internet. And when all resources are exhausted, a good old “gum shoe” detective can investigate – boots on the ground.
Protecting Your Business with OSINT
Thomas Lauth of Lauth Investigations International uses his nearly 20 years experience working with both private and business sectors. “Open-souce Intelligence or OSINT isn’t a common term used in the business world; however, I can assure you it is a dynamic method of information gathering for businesses in this day and age,” said Lauth.
(Open-source intelligence is being used more frequently to protect company’s information.)
The importance of OSINT is business can’t be exaggerated. It is a matter of gathering intelligence from publicly available sources and analyzing that information for connections and actionable intelligence that would not be normally publicized. In fact, there may be information about your own company available publicly that can make it easier for someone who is considered an “insider threat” or conducting a social engineering campaign to obtain proprietary or damaging information.
“Conducting periodic OSINT for your business, assessing the risks, and addressing vulnerabilities can save a company from failure,” add Lauth. “It is a recommended and necessary action item for all successful businesses.”
OSINT is contained in company websites, reviews, Google searches, along with newspapers, geo-location data within images, company reports and other publicly available data. Often overlooked is social media. Companies and employees often provide more information to hackers or “insider threats” than realized.
Criminals can exploit easily obtained information to conduct scams or a social engineering campaign against a business. In fact, criminals use OSINT too – only for their own devious purposes.
To exploit weak links, criminals or “black hats” can spend weeks, even months researching employee email addresses, current projects, employees that manage money and monitor their social media. They will even study the way employees communicate with each other, gathering the information to create convincing phishing scams and social engineering attacks.
The information collected to conduct these criminal activities is not obtained by hacking into the company, it is obtained by gathering publicly available information.
“The trick is to stay one step ahead of the criminals,” said Lauth. “When working with clients, we ensure we identify vulnerabilities and the process is conducted effectively, efficiently and confidentially.”
The bottom line, by exercising due diligence, using OSINT, and reviewing your own publicly available information, you can protect yourself and your company.
By: Kym Pasqualini, Feature Crime Writer for Lauth Investigations
Rita Gutierrez-Garcia missing since March 17, 2018 from Longmont, Colorado.
It was St. Patrick’s Day, March 17, 2018, a mother of three boys vanished into thin air in Longmont, Colorado. Rita Gutierrez-Garcia went out to celebrate with friends and family in the evening.
The group went bar hopping to the Speakeasy located at 301 West Main Street and the Breaker’s Grill located at 380 Main Street. Rita was last seen in an alley behind 3’s bar talking on her phone at approximately 2:30 a.m.
Deputy Chief Jeff Satur of Longmont Police Department said Rita was overheard telling someone on the phone she would get a ride from “someone else.” Authorities also say there were as many as seven or eight potential witnesses behind the bar that evening.
“Our old standby of tracking the phone is not working for us,” said Satur. “But we are working our very hardest to find Rita.”
Rita is a mother of three young boys, ages 9, 13, and 18, and described by family as a bubbly and busy mom, who is just one college semester away from becoming a paralegal. Something she has worked very hard for.
Satur told Fox 31, “As you can imagine, everybody is concerned,” he said. “This is unusual behavior.”
Police have asked for anyone who may have seen Rita that evening, to call them immediately.
Connection to Beating Victim Dismissed
Longmont Police Department was investigating the possible connection between a young man found with head trauma and the disappearance of Rita. Tyler Bullock was found at the same location eight days after Rita disappeared, at approximately 2:30 a.m.
Tyler Bullock was found unconscious five days after Rita Gutierrez-Garcia’s disappearance in the same area.
According to Tyler’s sister Kristal Beecher, Tyler was in the intensive care unit for head trauma due to bleeding on his brain. Tyler was found behind the bar unresponsive due to serious head injuries. He is now recovering.
“There is zero connection. I just need to stress there are no suspects in my case. It’s really just a matter of the specific block in Longmont needing better security systems, more cops on busy nights, and cameras, maybe undercovers,” said Tyler, still recovering from the traumatic experience.
The Search
On March 24, 2018, Longmont Police divers searched a pond at Golden Ponds Parks southwest of Hover Street and Third Avenue but did not find anything. Golden Ponds is a network of ponds and walking paths. Police, Longmont Emergency Unit, and Longmont Fire Department searched from approximately 9 a.m. to 4 p.m. Canines were also used in the search.
Police diverssearching area of Golden Ponds inLongmont, Colorado. Courtesy of Daily Camera.
Deputy Chief Satur declined to answer what they were searching for. “We were looking for evidence,” Satur said. “That’s all I can say.”
Police are treating the disappearance as a missing person case and “suspicious disappearance.”
“We will continue to work all leads and go from there,” Satur said. “We are going to continue working until we figure out what happened.”
Police have been working long hours in the search for Rita, and rotating staff to ensure fresh eyes are involved in the investigation.
Mom and Sister Plead for Help at Press Conference
Prior to Rita’s disappearance, she was very active on Snapchat but has not posted since her disappearance. This worries her family.
Diane Romero and Jessica Romero please for the public’s help in the search for Rita Gutierrez-Garcia.
“I love you,” said Rita’s mother Diane Romero at a press conference organized by Longmont Police Department on March 22, 2018. Holding a picture of her daughter, “I need you here,” she said.
Rita’s sister Jessica Romero tearfully told reporters, “She’s my older sister and I’ve never had to go a day without her in my entire life,” said Romero.
Family and Friends Hold Vigil
Family and friends of Rita held a prayer vigil on March 25th at Longmont’s Thompson Park. There, they offered comfort to each other and covered a tree with ribbons of different colors and cards with prayers for her safe return.
“I know they are doing all they can do to help us,” Romero said about police investigators. “They are doing a lot to bring Rita home.”
Rita’s sister Jessica said, “I’m trying not to break down.” Rita’s three sons are staying with her and she is trying to be strong for them. “It’s been nerve-wracking just trying to remember to breathe.”
Pastor Choutka, the pastor at the Rocky Mountain Christian Church’s Niwot campus, asked people attending the vigil to gather around the family, asking God to give Rita’s mother strength and help the investigators.
“By the powerful name of Jesus, we do ask for a miracle, that she be found safe and sound,” Choutka said to those who gathered at the park to pray.
Rumors and speculation of what happened to Rita have circulated and the family is trying to protect the young boys and cousins. “We are trying to keep them strong,” Diane Romero said.
Rita was last seen wearing a black long-sleeved shirt with black leggings. She has tattoos on both arms, as well as on her shoulder and on her feet.
Sleeve tattoo with eye and wave design on Rita Gutierrez-Garcia’s arm.
Anyone with information about the disappearance of Rita Gutierrez-Garcia should contact the Longmont Police Department 303-651-8501.