by admin_lauth | Jul 24, 2018 | Missing Person, Personal Investigations, Private Investigations News, Tips & Facts, Unsolved Homicides

Every week there are new stories in the news about teenagers who have either run away or been kidnapped. When parents see these tragedies play out through media coverage, there’s usually one common thread running through their minds, “This could not happen to my child.” Despite statistics on the demographics most often affected by missing or runaway teens, no family is immune. Parents of a missing child or teen will most certainly have never found themselves in these frightful circumstances before and be at a loss for how to proceed. In addition to filing a report with police, the parents might also consider hiring a private investigator to conduct an independent, concurrent investigation. Finding missing teens is not always the speciality of an individual law enforcement agency, which means your child could fall through the cracks. Finding missing teens is not easy, especially when they do not want to be found. That’s why many families rely on the independent tenacity of private investigators to find their missing teens. Should you hire a private investigator to locate your missing or runaway child?
An Overwhelming Task
The Office of Justice Programs estimates the first 48 hours after your child goes missing are the most crucial in the timeline of any investigation. During these moments, your instinct might be to go find the child yourself or help conduct searches; however, as a parent or guardian of a missing child, your information is the most crucial. A 1982 congressional mandate requires law enforcement to immediately take a report following the disappearance of a child under the age of 18. However, recent reports estimate the excess of some 800,000 missing persons cases reported every year, 85-90% of those cases are individuals under the age of 18. What this statistic tells us is law enforcement, in most parts of the country, are overwhelmed by a caseload (with some departments averaging over 40 cases per investigator) leaving your missing child as a file amidst a stack of equally devastating missing child cases. As law enforcement agencies across the country remain stretched, missing child cases—especially ones where the child appears to have run away—are not always the first priority, as investigators attempt to perform a triage regarding which case requires their attention the most. Private investigators only average between three and four cases at any given time, meaning your child’s case will be at the top of their list of priorities. During the crucial FIRST 48 hours, having a private investigator treat your case as a priority can be the difference between acquiring invaluable information and losing a lead.

Constitutional Red Tape
One of the glowing advantages of hiring a private investigator to find your missing child or teen is the fact PIs possess far more autonomy than the average law enforcement officer or investigator. For instance, when a suspect has been identified, law enforcement often must secure a warrant for them to be tracked as the investigation unfolds. Paperwork and bureaucracy within the chain of command can cause the wheels of justice to turn slowly in regards to local or state law enforcement. Not only are PI’s not required to file this sort of paperwork, but they can also do so without the supervision of a governing law enforcement administration, so the case progression is not stalled for lack of warrant or administration approval.
The Binds of Jurisdiction
With a private investigator conducting an independent, concurrent investigation, there will never be any issues of jurisdiction when pursuing leads. Say your family lives in Indiana, but while on an out-of-state family vacation, your child goes missing in a crowd. As missing and abducted children across state or even international borders, local law enforcement exponentially lose power to follow leads maybe illuminating the child’s whereabouts. It is also not uncommon for two or more law enforcement agencies to enter a tug of war when it comes to who has jurisdiction over a particular case based on the specific circumstances. This can lead to the loss of leads or time as agencies hash out the details. Private investigators are never bound by jurisdictional bureaucracy. They can travel between states following the trail of a missing child, all without having to file any paperwork or obtain special permissions from superiors.
While law enforcement may have a wealth of experience and exclusive tools at their disposal, it’s important to remember that these civil servants are often overwhelmed with an immense case-load and can only do so much when it comes to the constitutional and jurisdictional boundaries they cannot cross. Private investigators have the expertise and similar tools of law enforcement, while also having the time to treat your case as a top priority.
Carie McMichael is the Communications and Media Specialist for Lauth Investigations International, writing about investigative topics such as missing persons and corporate investigations. For more information on missing persons topics, please visit our website.
by admin_lauth | Jun 26, 2018 | Consumer Fraud, Corporate Investigations, Tips & Facts

Elizabeth Holmes was once the shooting star of Silicon Valley. With a lifelong hatred of needles, she set out to turn the world of healthcare on its ear by developing a more efficient and inexpensive way to draw and test blood in order to screen for serious diseases. In a world where access to affordable healthcare is a hot-button issue, Holmes was slated to become a revolutionary of her own making, with Forbes magazine dubbing her the “youngest self-made woman billionaire.” Now, Holmes is a pariah in Silicon Valley and heads are left spinning in the wake of the Securities and Exchanges Commission having issued a 24-page document revealing just how her duplicity left investors in Theranos’ research out $9 billion dollars.
To litigators and legal commentators, Holmes’ fall from grace is a familiar narrative. Intention to defraud aside, they say the roads in Silicon Valley are paved with ambitious young entrepreneurs who are more than willing to stretch the truth in order to sell their business. They have the determination to succeed and the naivety their deception will be forgiven once their investors are flush with wealth from returns. Since this has happened before and will likely happen again, how was Holmes able to mislead investors under the radar of Theranos’ board of directors? A breakdown of the board’s composition might hold the answer.
Prior to the release of the SEC complaint, the members of the Theranos board of directors had impressive backgrounds that might leave little doubt in their abilities to supervise the good of the company. There were former politicians such as U.S. senators and former cabinet members, who dealt with high-stakes situations every day in their capacities. There were former executives with previous experience in making decisions and placing trust in competent individuals. But despite their differences in resume, they all had one glaring similarity: They were all white men, over the age of 65. Research has shown while their backgrounds might have been impressive, their homogenous nature may have played a huge role in preventing them from identifying Holmes’ fraud before it was too late.

According to Prof. Andras Tilcsik, who holds the Canada Research Chair in strategy, organizations, and society at the University of Toronto’s Rotman School of Management, diverse boards are what prevent problems in large companies, “Companies with more gender diversity on their boards, for example, are less likely to reissue financial statements because of error or fraud. Diverse groups also tend to consider more factors when making a decision. Racially mixed juries deliberate longer, share more information, discuss a wider range of relevant factors and even make fewer mistakes when recalling facts about a case. Ironically, lab experiments show that while homogeneous groups do less well on complex tasks, they report feeling more confident about their decisions.” What the research is telling us is this: The more a person looks like us, the more we are willing to trust them. The attention to detail that might have been shown by a more outwardly diverse board was not shown by the Theranos board of directors in the case of Elizabeth Holmes. The similarities shared between members of the Theranos board likely created a false sense of security and allowed Holmes’ deceptions to go unnoticed.
Diversity in expertise prevents boards from becoming too comfortable with business practices and makes them open to new ideas. Given the research on homogenized groups, it is reasonable to think this group of white men with an average age of 76 may never have questioned the veracity of Holmes’ research and her promises to deliver the next big thing in medical technology. This has happened before and is likely to happen again, because while the source of the fraud is often dealt with and forgotten, there is no examination of how board composition can enable fraud.
Carie McMichael is the Communications and Media Specialist for Lauth Investigations International, writing about investigative topics such as missing persons and corporate investigations. To learn more about what we do, please visit our website.
by admin_lauth | May 15, 2018 | Corporate Investigations, Criminal Investigation, Private Investigations News, Tips & Facts
Rooting Out Thieves in the Workplace

It is estimated 30% of employees steal from their employer.
Most of us have dealt with a thief during our lifetime. Devious and sneaky, some thieves behave as if stealing is an art. It is usually a theft exposing them; however, many times, they can strike numerous times before getting caught. When theft happens in the workplace, it can not only be a costly lesson but the cause of a business failing.
An estimated 30% of employees steal from their workplace affecting all types of businesses. For instance, if you are running a restaurant with $1 million sales annually, at only 4% theft within the company, your company would be losing $40,000 a year!
Employee theft costs U.S. businesses over $200 billion in annual losses. Not only are companies trying to prevent the public from stealing items, inventory, assets, and ideas from a business, they must also combat thieves on the inside. Unfortunately, 75% of employee-related crimes go undetected.
Theft can take many forms, such as: stealing money, embezzlement, unauthorized use of business or customer identity, and theft of intellectual property, such as cases of patent or trademark infringement.
Combating Theft is Knowing How Employee Theft Occurs.
Cash
Employees who have access to a cash register is the most common way employees steal from companies. If unsecured, petty cash drawers or boxes, can be an easy target for thieves.
In addition, an employee can quote a higher price than the actual price of an item and keep the difference at the point of sale.
If employees have access to credit card information or checks, theft can happen as easily as sticking a few checks inside a folder, costing the owner thousands before it is detected.
Checks and Fraud
Most banks do not verify a signature on a company check making it very easy to sign and cash a check.
Credit card fraud is a number one threat to companies and consumers because most credit card holders admittedly do not check each line item on their credit card statement.
According to the U.S. Small Business Administration (SBA), companies with less than 100 employees, lose approximately $155,000 as a result of fraud each year, a much higher rate than large companies.
Payroll
Employees may often perform actions and falsify records for work they didn’t do, such as requesting reimbursement for travel and other expenses unrelated to work. Employees may also set up fake payroll accounts for workers who have been terminated or retired. Creative thievery abounds.
Time Sheets
Time theft or “Buddy Punching” is a very popular way timesheets may easily be falsified. Individuals complete this theft by having one employee punch another employee in or out for the other.
Excessive breaks, malingering, surfing the Internet, chatting with employees or taking personal phone calls are other ways time theft occurs. While some of these things may not at first be thought of as stealing, all these actions, or inactions, can affect the bottom line and be taking advantage of an employer.
Vendor Accounts
Thieving employees will set up fake vendor accounts, submit phony invoices and issue checks for the false vendor. These checks can then be signed over to themselves and deposited. In addition, a variation would be paying a vendor $500 and writing a check to themselves, expensing the entire $500 to the vendor.
Merchandise
Loss of inventory can happen in the merchandise distribution process but can also happen before merchandise is made available to the public. Many times, employees will take items from a warehouse or newly arrived items before they are scanned into inventory software. Employees have even been known to steal entire shipping trucks containing merchandise headed to their employer’s company.
Supplies
Some employees steal smaller items such as typical office supplies, but furniture and equipment are not off limits for a thief.
Information
Many employees steal information to benefit themselves or a competitor. Types of information include: office memoranda, proprietary products, customer lists and/or other confidential data. Theft can occur by email, printing, or copying information to a flash drive or cell phone, or simply carrying it out in a purse or folder.
Sometimes, theft can be subtler, such as luring customers away, purposefully providing poor service, even spreading rumors to damage a company’s reputation and cause a down-turn in business. All are considered losses.
While there are ways to combat theft within your company, ultimately identifying the thief before they are hired is the most effective way to reduce the occurence of theft.
The SBA recommends: “One of the first steps to preventing fraudulent employee behavior is to make the right hiring decision.”
Background checks are a good practice for any employer, large or small, especially for those employees who will be handling cash, high-value merchandise, or have access to sensitive customer or financial data.
For over twenty-years, Thomas Lauth of Lauth Investigations International has been working nationwide and helping educate employers on methods used to combat theft.
“The first and most effective way to address theft in the workplace, is to conduct an extensive background check,” says Lauth. “A background check can provide insight into an individual’s behavior, character, and integrity.”
Which Types of Background Checks Should You Conduct?
According to the U.S. Chamber of Commerce, upwards to 30% of business failures are caused by employee theft. Thus, conducting effective, extensive background checks helps to mitigate your risk of hiring objectionable or even dangerous employees.
Not all background checks are the same. As you build a profile of your future employee, there are several kinds of background checks you should consider. For example, a criminal background check is different than checking on an individual’s credit score or military service, these require consent. A criminal background check does not require consent; however, some states have laws restricting how you use the information collected during a criminal background check.
Private investigation firms like Lauth Investigations offer complete background checks while helping you comply with the law.
Protecting Your Legal Liability with Background Checks
Smaller businesses often forego background checks for two reasons: 1. A false sense of trust and security developed by business owners working too closely with employees. 2. Most businesses do not understand the legal liabilities associated with the failure to conduct employee screening and background checks.
Any business where employees provide a direct service and interact with customers, such as contractors or daycare providers, is liable if an employee does harm to a customer and the employee has a history of wrongdoing.
A company, big and small. may not recover from this kind of lawsuit.
Choosing the Right Company to Conduct Background Checks
Protecting the interests of your workplace and customers while reducing potential liability is of utmost importance; therefore, it is vital to select a company you can trust to conduct the background screening both efficiently and thoroughly.
While employers can do some background checking of their own, working with an experienced and reputable company can ensure the reliability and thoroughness of the background screening.
Purchasing instant public records found online is not appropriate for conducting potential employee background checks. Most certainly if your hiring decision is based on tpublic record data, your company could land in hot water.
Most public databases do not fact check, clean up or refresh their data providing completely different information than received from an investigative firm experienced in conducting professional, legal and full background screening.

Private investigators have access to databases to determine if a potential employee has a criminal background.
A reputable company providing background screening services will ensure the information you receive is current and accurate.
If a hiring decision is made based upon information found in the background check, in most cases, the company must inform the potential employee of the source used to obtain the information for the background checks (which is where using public databases can get your company in legal trouble).
What can you expect from a professional background check? According to Lauth, it’s all in the details and you pay for what you get. If you want detailed, accurate information, you will choose a Private Investigation Background Search.
Unlike a personal background search using public databases, private investigators have access to several databases providing a variety of information.
- Employment history: This search will bring up employment records to include all positions held, making it easier to find discrepancies in a resume. It will also include salaries associated with the positions.
- Academic and professional affiliations: Qualifications to include academic history and certification, even if the person did not complete the program.
- Criminal records: Including a detailed outline of all criminal activity from traffic warnings and tickets to arrests and convictions. Also, these include jail time served and fines paid.
- Financial Standing: Reflects all liens, judgments, bank accounts, current and previous property ownership, repossession of vehicles or other personal property, NSF checks and bankruptcies.
In addition to the typical information received through a personal background check, a private investigator will include:
- Worker compensation claims an individual has filed. This can help determine the character of an individual by looking at the number of claims they have filed which could reveal a person is dishonest and fraudulent.
- Ascertain causes of accidents or any criminal activity. DMV reports will show accident dates and basic information but do not reflect the cause. Private investigators can provide the cause behind the accident and whether criminal activity was involved.
- Information on business and personal partners.
- Analysis of all findings.
Relying on an Internet search is risky. A professional background screening will be more in depth than simply entering a name in a database. When a company’s future is at stake, the only way to go to obtain concise information needed to make informed decisions is a professional, private investigations extensive background check.
by admin_lauth | May 3, 2018 | Criminal Investigation, Forensics, Genealogy, Tips & Facts
SCIENCE OF GENEALOGY DEFROSTS INFAMOUS COLD CASE
By Carie McMichael
California law enforcement are celebrating a break in a thirty year old cold case this week, as an an arrest has been made in the case of the Golden State Killer. However, the methods investigators used to identify the suspect have civilians debating whether or not the suspect’s civil liberties were violated.
Investigators used DNA obtained from ancestry and genealogy platforms to locate a suspect matching the profile of the perpetrator. Joseph James DeAngelo, 72, was arrested Tuesday morning, officially charged with 8 counts of Homicide committed in a decade span, across 3 California counties. They hope to eventually link DeAngelo to 12 murders and 45 rapes committed between 1976 and 1986.
DeAngelo worked as a police officer for 6 years during the original investigation—a relevant detail, as investigators suspected the perpetrator had law enforcement knowledge.
At the end of 1986, when the string of assaults and murders attributed to the Golden State Killer officially ended, the science behind DNA forensics in crime scene investigation was in its infancy. The first case in which DNA evidence secured a conviction in the UK in 1986 not only led investigators to the true perpetrator, but also cleared an innocent suspect whom had been previously implicated. In the last thirty years, the technology has become so ubiquitous DNA kits are available over-the-counter in drugstores all over the country. The technology has matured so immensely, the genetic profile of a single football can be identified to prevent counterfeiting during the Super Bowl. And now, the newest trend in DNA technology may have helped Sacramento authorities identify the infamous Golden State Killer.
Websites like Ancestry.com and 23andme.com have made it easier than ever for people around the world to find out more about their ancestry and genetic makeup. A buccal swab mailed off to a genetics lab can return results of information on everything from the palette of colors in your ancestors’ lineage to the medical problems running in your immediate genetic line. Sacramento authorities have released information advising the DNA provided to these services for informative purposes was one of the chief investigative tools in identifying DeAngelo as a suspect.
According to lead investigator, Paul Holes, GEDmatch was the database utilized leading them to DeAngelo. GEDmatch is a research tool using a database of voluntarily supplied DNA samples for researchers and genealogists. “We were able to generate a DNA profile we uploaded into [a] … database of other similar types of profiles,” Holes told KGO. “And then from there, we get a match list of how much DNA these various other individuals share with the crime scene DNA. The more DNA they share, the more closely related they are.” After obtaining information from the GEDmatch database, they placed him under surveillance. They collected several samples of his discarded DNA, which they were able to match to a DNA profile compiled from samples collected at the plethora of crime scenes, subsequently leading to DeAngelo’s arrest.
Familial DNA searches are becoming more common in forensic science, and as such, more and more controversial. As was the case in identifying DeAngelo, investigators often submit a finite number of genetic markers into a database of genetic samples and the database will return a list of possible results. Results are then cross-referenced with other databases and records to thin the suspect pool. These practices are controversial because large percentages of the country’s population share the same genetic markers, yielding ambiguous results for investigators. Many civilians feel as if the method leaves their civil liberties vulnerable, as though their genetic profiles might make them guilty by association. Currently, the only legislation preventing an individual from being discriminated against, based on their genetic information, is the Genetic Information Nondiscrimination Act of 2008.
At a press conference on Wednesday, April 25th, local law enforcement did not release specifics about how the DNA obtained from GEDmatch was used to locate DeAngelo. Instead, they focused on how a more comprehensive DNA databank in California could have led investigators to DeAngelo sooner. The existing legislations, Proposition 69, was passed in 2004 and allows law enforcement to collect DNA and fingerprints at the earliest stages of criminal proceedings—beginning when the suspect is arrested, as opposed to post-conviction collection. Despite controversy, the law was upheld earlier this month.
According to Thomas Lauth, Lauth Investigations International Inc., whose firm specializes in unsolved homicides and missing persons, “Our firm must always pivot to innovative ideas and think of ways to gather DNA from a potential suspect.” Lauth further said, “Search warrants are required for human samples. However, if you can retrieve a sample from a discarded cigarette or beer can, it may prove positive. Sometimes though, obtaining positive-testing samples can be tricky. The labs could require numerous samples to finally get a positive and readable match.”
On April 28th, in his first court appearance, Joseph James DeAngelo was formally arraigned on two of the eight counts of murder with which he is formally charged. He did not enter a plea and bail was denied. His next court appearance is scheduled for May 14th, 2018.