SCIENCE OF GENEALOGY DEFROSTS INFAMOUS COLD CASE

SCIENCE OF GENEALOGY DEFROSTS INFAMOUS COLD CASE

SCIENCE OF GENEALOGY DEFROSTS INFAMOUS COLD CASE

By Carie McMichael

joseph-deangeloCalifornia law enforcement are celebrating a break in a thirty year old cold case this week, as an an arrest has been made in the case of the Golden State Killer. However, the methods investigators used to identify the suspect have civilians debating whether or not the suspect’s civil liberties were violated.

Investigators used DNA obtained from ancestry and genealogy platforms to locate a suspect matching the profile of the perpetrator. Joseph James DeAngelo, 72, was arrested Tuesday morning, officially charged with 8 counts of Homicide committed in a decade span, across 3 California counties. They hope to eventually link DeAngelo to 12 murders and 45 rapes committed between 1976 and 1986.

DeAngelo worked as a police officer for 6 years during the original investigation—a relevant detail, as investigators suspected the perpetrator had law enforcement knowledge.

At the end of 1986, when the string of assaults and murders attributed to the Golden State Killer officially ended, the science behind DNA forensics in crime scene investigation was in its infancy. The first case in which DNA evidence secured a conviction in the UK in 1986 not only led investigators to the true perpetrator, but also cleared an innocent suspect whom had been previously implicated. In the last thirty years, the technology has become so ubiquitous DNA kits are available over-the-counter in drugstores all over the country. The technology has matured so immensely, the genetic profile of a single football can be identified to prevent counterfeiting during the Super Bowl. And now, the newest trend in DNA technology may have helped Sacramento authorities identify the infamous Golden State Killer.

636560071434423354-GettyImages-912389900Websites like Ancestry.com and 23andme.com have made it easier than ever for people around the world to find out more about their ancestry and genetic makeup. A buccal swab mailed off to a genetics lab can return results of information on everything from the palette of colors in your ancestors’ lineage to the medical problems running in your immediate genetic line. Sacramento authorities have released information advising the DNA provided to these services for informative purposes was one of the chief investigative tools in identifying DeAngelo as a suspect.

According to lead investigator, Paul Holes, GEDmatch was the database utilized leading them to DeAngelo. GEDmatch is a research tool using a database of voluntarily supplied DNA samples for researchers and genealogists. “We were able to generate a DNA profile we uploaded into [a] … database of other similar types of profiles,” Holes told KGO. “And then from there, we get a match list of how much DNA these various other individuals share with the crime scene DNA. The more DNA they share, the more closely related they are.” After obtaining information from the GEDmatch database, they placed him under surveillance. They collected several samples of his discarded DNA, which they were able to match to a DNA profile compiled from samples collected at the plethora of crime scenes, subsequently leading to DeAngelo’s arrest.

Familial DNA searches are becoming more common in forensic science, and as such, more and more controversial. As was the case in identifying DeAngelo, investigators often submit a finite number of genetic markers into a database of genetic samples and the database will return a list of possible results. Results are then cross-referenced with other databases and records to thin the suspect pool. These practices are controversial because large percentages of the country’s population share the same genetic markers, yielding ambiguous results for investigators. Many civilians feel as if the method leaves their civil liberties vulnerable, as though their genetic profiles might make them guilty by association. Currently, the only legislation preventing an individual from being discriminated against, based on their genetic information, is the Genetic Information Nondiscrimination Act of 2008.

dna-forensic_2070437bAt a press conference on Wednesday, April 25th, local law enforcement did not release specifics about how the DNA obtained from GEDmatch was used to locate DeAngelo. Instead, they focused on how a more comprehensive DNA databank in California could have led investigators to DeAngelo sooner. The existing legislations, Proposition 69, was passed in 2004 and allows law enforcement to collect DNA and fingerprints at the earliest stages of criminal proceedings—beginning when the suspect is arrested, as opposed to post-conviction collection. Despite controversy, the law was upheld earlier this month.

According to Thomas Lauth, Lauth Investigations International Inc., whose firm specializes in unsolved homicides and missing persons, “Our firm must always pivot to innovative ideas and think of ways to gather DNA from a potential suspect.” Lauth further said, “Search warrants are required for human samples. However, if you can retrieve a sample from a discarded cigarette or beer can, it may prove positive. Sometimes though, obtaining positive-testing samples can be tricky. The labs could require numerous samples to finally get a positive and readable match.”

On April 28th, in his first court appearance, Joseph James DeAngelo was formally arraigned on two of the eight counts of murder with which he is formally charged. He did not enter a plea and bail was denied. His next court appearance is scheduled for May 14th, 2018.

 

How We Can Return Your Assets to You

How We Can Return Your Assets to You

money hanging

By: Kym Pasqualini, Feature Writer for Lauth Investigations

Have you ever found a $20 bill in your laundry and felt you just won the lottery? Most people would be ecstatic to realize they forgot to empty their pockets but what happens to money you don’t know exists? Hundreds, maybe thousands of dollars.

You may be surprised how many people in this country have unclaimed assets they may never know existed . . . unless they look for it.

Currently, it is estimated local, state and federal agencies collectively hold more than $58 billion in unclaimed assets, roughly $175 for every U.S. resident. However, experts estimate there may be as much as $100 billion languishing in unclaimed cash and benefits held in local, state and federal agencies. We do know, daily, the amount of unclaimed funds increases.

According to the National Association of Unclaimed Property Administrators, every state including the District of Columbia, Puerto Rico, and the U.S. Virgin Islands has lost assets, commonly referred to as unclaimed funds.

What are Lost Assets?

The unclaimed property law or escheatment was first enacted in 1954. The purpose of the act is to provide a central repository in each state, so citizens can seek lost assets belonging to them. Each state maintains a comprehensive list of the unclaimed assets.

Unclaimed funds are financial assets owed to an individual or business not claimed or have unknown ownership. Examples of unclaimed assets or funds are the following:

  • Uncashed payroll checks
  • Dormant bank accounts
  • Safe deposit boxes
  • Refunds
  • Customer overpayments
  • Security deposits
  • Insurance payments
  • Unclaimed dividends
  • Unclaimed securities
  • Traveler’s checks, money orders, cashier’s checks
  • Principal on debt
  • Escrow balances
  • Old stock certificates
  • Mining Certificates
  • Mineral royalty payments
  • Retirement
  • Property held by courts and other governmental agencies

All businesses must forward all unclaimed funds or property to their state in accordance with their state’s escheat laws. Ideally, the state holds unclaimed funds in a trust and attempts to locate the rightful owner – except it doesn’t always work in that way.

Unfortunately, since 2006, a mere 5% of lost assets has been returned to rightful owners.

money locked

The Escheatment Process

Unclaimed property is governed by state laws requiring all unclaimed assets be turned over to the state to be held in trust. For example, if a bank account is inactive for a lengthy period, commonly within one year, the state can claim the funds in the account through a process known as escheatment.

Escheatment accounts are defined as dormant, unclaimed or abandoned. For instance, banks are responsible for reporting unclaimed property to the state after a certain amount of dormancy. Each state has a different time frame before the state escheats the assets to safeguard them.

In Arizona, a financial institution must report securities property after a period of 3 years dormancy and bonds after two years.

The laws are strict. A company could be fined by the Arizona Department of Revenue a civil penalty of 25% of the value of the unclaimed asset or abandoned property or $100 per day up to $5,000.

The only tangible property covered is the contents of safe deposit boxes. However, for contents of safe deposit boxes, periodic auctions are conducted by most states and proceeds from the sale of items are held for a rightful owner.

While unclaimed, the policy for unclaimed funds is they should be used for the “greater good” of the public, until such time as it is returned to the rightful owner. Without affecting the state’s obligation to return unclaimed funds, collections are used to finance operations such as public schools and college scholarships.

In 1951, the U.S. Supreme Court stated in the Standard Oil Co. vs New Jersey case, “Property that escapes seizure by would-be possessors and is used for the general good rather than the chance enrichment of particular individuals or organizations.”

In 2015, $3.235 billion was returned by state government unclaimed property agencies to rightful owners or heirs.

What is an Heir?

An heir is the “rightful owner” of lost assets/funds or a person in ranking who is entitled to inherit property if the rightful owner is deceased, sometimes referred to as a logical heir.

An heir can be an individual or a company such as a business or corporation, church or charity, or hospital.

unclaimed funds

Defining the Source

A government database of centralized information does not exist; therefore, each federal agency maintains its own records. When looking for lost assets this can create confusion and, in reality, often makes the property hard to find.

  • United State Treasury reports an estimated 25,000 payments are returned as undeliverable.
  • US Bankruptcy Courts reports approximately $200 million dollars is waiting to be claimed.
  • Class Action Lawsuits have generally 95% of the funds as unclaimed.
  • Savings Bonds show an estimated 40 million savings bonds have gone unredeemed, equaling an estimated $16.5 billion dollars.
  • Life Insurance reveals there is approximately $1 billion dollars unclaimed due to lost or unknown policies.

Lost assets can be found in the most unlikely places.

In an Oklahoma News 4 report, the Oklahoma Corporation Commission spokesperson Matt Skinner said, “You were someone who had an ancestor who owned minerals in 1910, [and] that’s still the name on the minerals, then if you can prove those minerals were part of an estate that came to you, you would get the money that is in the fund.”

For any given property, there might be dozens, sometimes hundreds, of oil and mineral owners. Much of the time, people are second and third generation and the original rights are still in the parents or grandparents names who have passed away.

While each state maintains their own database, the resources to find the owners of the property are minimal, even nonexistent. Some states advertise on their websites and others in the local newspapers. Clearly, with only 5% return on total lost assets, these methods are not effective.

With the lack of a national database, finding lost assets can be difficult for most individuals and makes it necessary to find help.

Finding Heirs

Prior to turning over unclaimed property to the state as required by law, businesses or holders of lost funds may conduct due diligence and often hire companies, referred to as heir finders, to assist in finding the rightful owner of unclaimed assets.

Most states require heir finders to be licensed private investigators to protect consumers.

One may think they don’t need a private investigation firm to represent them; however, there are many benefits to hiring a private investigator to locate lost assets. Experts say it is beneficial to work with professionals who are familiar with specific state laws where the property is located and the ability to obtain procurement of documents and certificates while working efficiently for the client.

Rain Lauth of Lauth Investigations International Lost Assets Division, specializes in finding lost assets and works closely with local, state and federal agencies to provide assistance to consumers, stresses the importance of working with licensed private investigators when searching for lost assets and filing claims for ownership.

“They will be familiar with all the forms that will be filed, the proper identification, probate laws, court properties, co-claimants, death certificates and other required information,” says Lauth.

Lauth Investigations has returned over $15 million to rightful owners since 2013 with an overall success rate of 98% on all claims.

 

quote

“We take great pride in working with our clients in a caring and professional manner,” said Lauth. “Often the process of locating and claiming lost assets can be an overwhelming experience, but with our extensive resources and a highly skilled team, we diligently seek to make the process of documentation of ownership a painless experience for our clients,” added Lauth.

 

What to Do About Robocalls

What to Do About Robocalls

CR-Money-Hero-robo-calls-1017

In recent months, many Americans have been receiving calls from parts of the country they have never heard from before. They wonder to themselves, “Who could possibly be calling me from Bristol, Rhode Island? I don’t know anyone in Bristol.” They accept the call, and a voice will tell them that an agent with their firm has reviewed their case file, discovering that they hundreds of dollars in credit card debt, and must pay it all immediately, or else face a smattering of other fees for failure to pay. Fraught with the anxiety of their credit score tanking, they address an envelope to the P.O. box where the voice instructs them to send a check for the full amount. Before they place that envelope in the mail, hopefully they’ll realize they’ve just received a robocall.

They’re almost commonplace nowadays, regarded as more of a nuisance rather than a crime. Strange numbers automatically dial out to phone customers across the country, claiming they’ve won a free cruise or asking for donations to a fraudulent cause. However, many Americans are still not certain about what robocalls are, or the fact that most kinds are illegal.

Robocalls are just one of the latest tools in committing consumer fraud over the phone. There is a great deal of legislation la-fi-lazarus-fcc-robocalls-20160729-snapdistinguishing which types of robocalls are legal. Conventionally they permit robocalls that convey important and/or emergency information, about things like school closures or natural disasters. With the rise of robocalls at the beginning of the millennium, the National Do Not Call Registry was established so that consumers could place themselves on a list in order to avoid them. However, legitimate telemarketing firms are still allowed to contact you over the phone for legal business, as long as your number is not listed on the Do Not Call registry, and you have not formally opted out of receiving phone communication from the business. Indiana law specifically requires that all prerecorded messages that bot calls are famous for must be introduced by a live operator, as well as providing an address where the caller can be reached.

These types restrictions have forced the “robo-callers” to evolve and adapt. Conventional methods of blocking robocalls have been successful in nearly extinguishing the presence of calls to landlines. With smartphones only growing in use throughout the country, the technology designed to stop robocalls has not yet been perfected for them. The good news is that consumers (like the one receiving robo-debt-collection-calls) are never without resolve when it comes to harassing calls from a number claiming to be a collection agency.

Regardless of whom the robocall claims to represent, there is no legal obligation to speak to anyone over the phone. In the event that the call is legitimate, it is perfectly legal to communicate through your personal or business legal representation. If the call is legitimate, the lawyer can represent your interests and review your options with you. If you are without representation, you can also retain the services of a private investigator to ensure that the call is legitimate. The internet provides the ability to perform a reverse-lookup of suspicious or unfamiliar phone number, but most websites require that you pay for the search results, and after you pay, it might turn out that the information is inaccurate. The professional services of a private investigator allow them access to specific tools that provide accurate information to verify the legitimacy of the robocall. Bearing in mind that there is no agency sanctioned to harass you via telephone, consumers who sign up for the National Do Not Call Registry might find this is an imperfect solution. It will merely put you on a no-contact list required to be observed by all accredited, registered businesses. Although there might be a decrease in unsolicited calls, it still does not prevent illegitimate businesses to contact you with robocalls.

nmr-iphone-2-v2The best recommendation that the Federal Trade Commission has made to consumers who are the victim of robocalls on their smartphones is downloading a third-party mobile app that uses both the hardware and the software of a smartphone to block robocalls from plaguing your mobile device,” “Call blocking apps let you create blacklists – lists of numbers to block from calling your cell phone. Many of these apps also create their own blacklist databases from numbers that have received significant consumer complaints. They also let you create whitelists – numbers to allow – that are broader than just your personal contacts.” This process has so far proven very effective. As users utilize the application, it builds a stronger wall that keeps unwanted robocalls out.

The days of telemarketers who always call during dinner are long gone. Now robots are doing the dialing work. As technology advances, Americans feel more and more paranoid about ways the criminal element might have access to their money. Robocalls have only made it simpler to manipulate vulnerable consumers into parting with their hard-earned income. The Federal Trade Commission is attempting to evolve even faster than scammers, developing technology similar to apps like RoboKiller and Nomorbo that can keep robocall schemes at arm’s length. Professionals like lawyers and private investigators are invaluable sources when validating the legitimacy of a robocall a consumer fears might be legitimate. The most important resource, however, is an informed consumer. Vigilance and skepticism are the first line of defense when dealing with robocall consumer fraud.

Caveat Emptor

Caveat Emptor

From Latin, it means “buyer beware.” It’s a phrase that conjures scenes from the famous tale of “Jack and the Beanstalk.” Young Jack’s mother, filled with shame and frustration, regrets sending her son to market after finding out he’d sold their most valuable possession—their cow—for a handful of beans. Jack’s mother feared her son had been a victim of consumer fraud, and unfortunately, it is far from fiction.CONSUMER FRAUD PHOTO

In many ways, capitalist America is the perfect hunting ground for the man with the magic beans. America is one of the largest consumer nations on the globe. Securing an excellent deal on goods and services means bragging to your friends about how you got the new lawnmower for a song. The consumer feels intelligent and capable, as if they managed to somehow trick the store or salesperson into giving it to them at an attractive price. American consumers chase this feeling by attending special sales, racking up credit card debt, and turning coupon-clipping into an Olympic sport—all in the interest of outsmarting the man with the magic beans.

Luckily for American consumers, there are institutions that help protect them from consumer fraud, such as the Better Business Bureau, which identifies problematic businesses that might swindle American consumers out of their hard-earned money. There’s the Federal Trade Commission, a government agency policing business practices and policies to protect American consumers and regulate competition within industries to maintain a healthy, well-balanced economy. In the long century since both of these institutions were established, the man with the magic beans has also changed and evolved, just like any predator.

Mortgage fraud picOne of the most common types of consumer fraud in America is mortgage fraud. Owning one’s home is still very much a part of the American dream. Americans shop for homes for months, searching for the certainty they will not overpay for their homes. Those who have morbidly derelict credit are afraid to answer the phone, desperate to evade bill collectors, petrified of losing their home. They are perfect targets for criminals running foreclosure-rescue schemes.  The Federal Bureau of Investigation defines it as “perpetrators profit by selling the property to an investor or straw borrower, creating equity using a fraudulent appraisal, and stealing the seller proceeds or fees paid by the homeowners.” Perpetrators convince the debtor they can transfer their poor credit into the name of a third-party investor (i.e. the perpetrator), renting their property until such a time their credit is once again in sufficient standing. The perpetrator fails to make the mortgage payments on behalf of the victim and pockets the profit.

As technology advances, there are more convenient ways to pay for goods and services with the rise of electronic pay, using applications and online services to pay bills. It might be the best way to avoid another common type of consumer fraud: debit-card fraud. Many Americans are familiar with credit card fraud but might believe their debit cards are safe. Ken Stalcup, a certified fraud examiner working with Somerset in Indianapolis, identifies these types of fraud for a living, but even he is not immune to consumer fraud. He was just paying the bill at a restaurant. The waitress disappeared out of sight with his debit card to clear his bill, and when she returned, nothing was amiss. However, Stalcup’s bank was alerted when it appeared his debit card was used to purchase computer equipment almost halfway around the world. The waitress had sold his card information, enabling other criminals to steal from him. His advice to other vulnerable consumers is to “avoid letting their debit cards out of sight and check their accounts daily.”

One of the most devious forms of consumer fraud is charity frauds. Fake charities are set up with the intention of exploiting humanity’s capacity for the desire to help those less fortunate than oneself using the same system that real charities use to collect legal donations. According to a 2011 statement by the FTC, they received more than 30,000 reports of people making donations to fraudulent charities. Just as easily as Americans are vulnerable to a good deal, they are also vulnerable to putting their money towards a charitable cause, whether out of actual benevolence or the appearance of such. These predators are especially fond of slithering out of the woodwork in the wake of natural disasters such as hurricanes like Katrina and Maria that devastated both New Orleans and Puerto Rico respectively. These tactics add a brand-new level of sleaze to consumer fraud, taking advantage of the American need to help their fellow man.

Consumer ProtectionIn addition to remaining an informed and skeptical consumer, there are other ways you can protect yourself from consumer fraud. Enlisting the help of a private investigator or a similar inquisitive entity can help you protect yourself from scams like those mentioned above and resolving these frauds after they are perpetrated. A private investigator’s job is to serve the specific needs of their client, diligently capturing the entire picture of how severely the consumer might have been affected by a particular fraud. Of course, they can be a perfect tool for exposing the agencies that claim to want your money and knowing exactly where the money is going. Local authorities are often overwhelmed by crime statistics that force them to practice triage when dealing with different types of cases. Private investigators have an invaluable list of tools at their disposal, which they can often use without the restraints legislation places on law enforcement. Whether you’re outsourcing to a third party or taking your personal consumer protection into your own hands, never let your guard down when it comes to the man with the magic beans.

Gangs in the Workplace: Corporate Investigations

Gangs in the Workplace: Corporate Investigations

By: Kym Pasqualini, Feature Crime Writer for Lauth Investigations

The days of red and blue handkerchiefs, baggy pants, graffiti, rap-music, and drive-by shootings are no longer such a popular sub-culture. Believe it or not, the new kind of gangsters hold college degrees, work and hold jobs in offices, warehouses, even government positions and police departments. They are a more sophisticated criminal and have infiltrated corporate America.

corporate gang

No more baggy pants. Today, you are more apt to find a gang member wearing black patent leather shoes.

If you think this is not a possibility in your own company, think again. No industry or company is exempt. A University of Chicago study found gangs have increasingly adopted a clean-cut appearance while replicating techniques used by organized crime.

Described as “very sophisticated and well organized” by the Federal Bureau of Investigation (FBI), they estimate there are 33,000 violent street gangs with 1.4 million members nationwide. You can safely double that number if you count affiliates and wannabes. The number has risen steeply, up from 1996 where an estimated 400,000 gang members were accounted for in the University of Chicago study.If you think this is not a possibility in your own company, think again. No industry or company is exempt. A University of Chicago study found gangs have increasingly adopted a clean-cut appearance while replicating techniques used by organized crime.

Well-known companies, Chicago Police Department, the United States Post Office, major pharmaceutical companies, and even the Social Security Administration have found gang members within their ranks carrying out complex illegal operations netting millions annually.

According to the FBI 2015, National Gang Report (NGR), gangs have gained employment in the U.S. Military, law enforcement, corrections, and even judiciary.

From the Streets to a Global Crime Empire

Typically, gangs are known for drug trafficking, robbery, gun trafficking, intimidation rackets, prostitution, human trafficking, fraud and other crimes you may think would not infiltrate a common company. Now, they are. However gangs are concentrating their efforts on white-collar crime due to weaker sentencing guidelines and ease of making money.

The term “gang activity” involves identity theft, credit card fraud, prescription drug fraud, trafficking stolen goods, money laundering, mortgage fraud, Social Security Administration fraud, tax fraud, counterfeiting, and securities marketing manipulation. Where there is access, there will be individuals willing to participate in capitalizing and even selling their access to those interested in exploiting the system.

credit card
In New Jersey, the 111 Neighborhood Crips used a machine to make gift cards they distributed to grocery stores, pharmacies and other stores. Grand larceny accounts for 40% of all crime in the United States during 2014.

In 2015, the Outlaw Gangsta Crips in NYC made approximately $500,000 in a paycheck fraud scheme by obtaining a legitimate paycheck from an employee and using the information to create and cash counterfeit checks.

From 2004 through 2009, fraud investigations alone increased 33%, bringing losses associated with those schemes into the billions of dollars.

According to Fox Business, Gangs such as the Bloods, Crips and La Nuestra Familia are undertaking white-collar crime. They are recruiting members that possess the necessary skill-sets, according to the FBI.

When you think gangster, images of Joe Pesci and Robert De Niro, maybe even Snoop Dog, may come to mind, not the impeccably dressed executive working in a high finance position. Or, the nicely dressed woman at the bank who knows how much you deposit weekly or the amount of your company’s payroll.

In a Workforce Magazine article, “Have Gangs Invaded Your Workplace,” during 1995, California, Silicon Valley firms alone were hit with more than 50 armed robberies of microchips and electronic components with the average heist netting the robbers $400,000. “There’s a growing level of sophistication and opportunism,” says Keith Lowry, a detective in the High-Tech Crime Unit of the San Jose Police Department.

Gang members are becoming harder to weed out in the hiring process, much of the time because we commonly think of “gang members” as looking like street thugs, and these old stereotypes are costing companies billions annually.

guy in suit

Weeding out white-collar gang members has become increasingly difficult.

Any company can become a target or an opportunity to engage in illegal activities, like dealing drugs, theft of property or personal information, extortion. Gangs have learned they can make a lot more money by being well-dressed, educated, and articulate.

For instance, electronics firms are easy targets. A microchip or computer processor weighing less than an ounce can score several hundred dollars on the street. The sentence for being charged with a stolen microchip much less than selling an ounce of drugs.

Some gangs plant members within a company in specific department such as infiltrating dispatching, shipping or the financial departments. They can also pose as temporary workers or work for outside vendors to gain access to numerous companies.

In addition, the growing trend toward outsourcing can often lead to less control over merchandise, files, and information.

According to a Fox Business article “From the Streets to Cyberspace: U.S. Gangs Turn to White Collar Crime,” the FBI says, “Gangs are more adaptable, organized, sophisticated, and opportunistic, exploiting new and advanced technology as a means to recruit, communicate discreetly, target their rivals and perpetuate their criminal activity.”

Facebook has become the preferred method for gang members to communicate according to the FBI. “The proliferation of social networking websites has made gang activity more prevalent and lethal – moving gangs from the streets to cyberspace,” says the FBI.

Arming Your Human Resources Department

Much of the solution lies in ensuring Human Resources procedures are effective. Of course, background checks and screening procedures are vital but is there more to be done to detect a potential criminal trying to infiltrate your workforce? The first thing to keep in mind – you get what you pay for and being lax can cost you.

Local criminal checks are almost worthless; however, a full criminal screening can pay off. In addition, many applicants may have earned their GED in prison, with some digging, their history can be discovered.

Many companies cut corners and haphazardly follow procedures when screening applicants not realizing dealing with the aftermath can result in costing more when you compare it to properly vetting applicants the first time around.

Additionally, letting your applicants know you will be conducting a thorough background, previous employment, driving records, verifying degrees, criminal record check, and reference checks can also discourage many applicants from pursuing the position in the first place, which ultimately saves your company time and costs associated with the screening process.

What is important to consider is applying an effective screening procedure to contractors, consultants and temporary employees depending upon how much access they may be granted, as well as, the time they will be spending at your company.

Trusting a “temp agency” is conducting the appropriate background checks is a potential liability for your company.

Educating your employees on how to spot gang activity and how to handle it is crucial. Some companies have found having training sessions and employee meetings add to their success combatting gangs in the workplace.

Experts agree loyalty to gangs overrides loyalty to an employer. Even though they may try hard to blend in they may still slip occasionally and there are some recommendations or even subtle things to monitor.

  1. Does your employee reside in a known gang area?
  2. Is your employee responsible? Too much time on the phone or arrive late?
  3. Does your employee go by a nickname and have nicknames for friends?
  4. Do the clothes, colors or insignias stay consistent?
  5. Does your employee have visitors at work, friend or family?
  6. Have you noticed any graffiti in or around your workplace?
  7. Does your employee use verbal, hand or walking mannerisms that could be associated with gang activity?
  8. Is your employee on parole or probation?

Being a girlfriend of a gang member or being a current or former gang member is not against the law, but it could be a sign of other activity that could be detected if your HR department is cognizant of the many issues that face companies if infiltrated.

Using Private Investigators to Combat Gang Intrusion in the Workplace

Private investigators are a commonly used tool in the arsenal to combat “gang intrusion” along with malingering, theft or fraud in the workplace.

Along with surveillance and providing evidence, they can also evaluate your HR department’s policy and procedures through undercover placement or working along with the HR department to tighten up the reigns to reduce incidents of crime.

Many times, it is recommended to have a private investigator apply for employment without informing anyone in your company to best determine where weaknesses exist in the hiring process. Were all the references called? What questions were asked? Were the proper background checks completed?

It may be necessary to start at the beginning of the hiring process. In addition, private investigators can be placed in certain departments where there have been discrepancies identified to collect evidence admissible in a Court of law. It is an extra layer of protection when investigating activities at your company without violating privacy laws.

When a company suspects criminal activity, it is advantageous to hire a professional who will work with police if the legitimate criminal activity is, in fact, detected. Abuse of sick leave or malingering costs companies billions of dollars a year. This is enough to warrant the hiring of a private detective to legally document the behavior.

From filming a guy talking about starting his new business and hinting at using the employer’s database, to a meat manufacturing plant taking a cut of the supplier’s delivery, to the employee watching porn on the company computers, a private investigator can take the care needed to conduct an internal investigation legally, ultimately protecting your company and saving you a lot of money.

5 Important Spy Tools for Private Investigators

5 Important Spy Tools for Private Investigators

P.I Private Investigator Starplus

As a private investigator, there are certain covert tools–spy tools–you must have under your belt in order to complete missions in a safe and efficient manner. Let’s face it, the job comes with a lot of risks. Tact, stealth, cleverness and a keen eye are just a few of the traits required. In many cases, simply relying on your instincts alone just doesn’t cut it.

Not to worry, though, Lauth Investigations International, Inc. has you covered! Below are the 5 most important spy tools we, at Lauth, believe every private investigator should have if they plan on creating a career in the business.

  1. Camcorders

Camcorders are an investigator’s best friend. They’re probably one of the first spy tools you should purchase. They’re not only great because they provide proof of illegal activity, but they can also be used for surveillance as well. What’s even better, there are several different types of cameras and a myriad of options to choose from.

The three main types of cameras you will need include: 1) a digital camera to record interviews, stakeouts, etc. 2) a concealed camera for more covert missions and 3) a dashboard camera to make your surveillance vehicle even more of a spy tool.

digital camcorderDigital Cameras – Handheld digital cameras have gotten smaller over the years and with features like optical zoom and night-time recording being improved with every new model, it’s easier than ever for private investigators to get the evidence they need.

The camera you pick doesn’t have to be complicated. The main features you need to ensure your camera has is a long optical zoom and high ISO settings. Optical zoom provides clear pictures and videos when zooming in because the lens physically moves closer towards your target. Note: optical zoom is different from digital zoom, which is a feature where the electronics in the camera magnifies the image by increasing the pixels seen on the screen, creating a more distorted picture as you zoom in. Without getting too technical, ISO is a feature used to enhance the brightness of the image you see on the screen, making it easier to capture usable pictures and videos in the dark.

Concealed Cameras – What about the situations where you can’t be parading around with a camera? You’re going to need a spy tool to capture footage discreetly. Luckily, there are several mini cameras available that are camouflaged as regular objects, making them hard to detect. Some of these cameras can even be worn on your person without looking obvious, such as spy cameras inside baseball caps and glasses. Others look like chargers, outlets and fire detectors, just to name a few, which can be used to capture footage without you ever being in the room.

Dashboard Camera – Now, you may be thinking of police vehicles when you hear dashboard camera; however, they can also be of benefit to private investigators. While on the road, a dash cam provides a hands-free solution for capturing videos when you need to focus on driving. Not to mention those long stressful stake outs. With a dash cam, you have an extra eye to cover you in case you happen to miss something.

  1. Surveillance Vehicle

Another spy tool you should consider investing in is a surveillance vehicle. You’re going to be spending a lot of time on the road and you will need a quick, convenient way to get around town. The vehicle you choose for surveillance is one of the most important spy tools  potentially making or breaking your investigation.

When choosing a vehicle, bare in mind you need to appear inconspicuous. In fact, it’s best to pick a forgettable vehicle in the general area you plan on conducting the majority of your investigations. You do not want something sticking out like a sore thumb.

Think about the most common make and color of vehicles you most often see in your area and select a similar one. Remember, if you can’t decide on a color, you can never go wrong with silver.

A few other things you will want to consider is the size of the vehicle, how comfortable it feels to you, the amount of miles to the gallon and the amount of tint on the windows.

Larger vehicles are easier to spot while smaller ones are easier to maneuver as well as fit into tight spaces. However, a particular kind of vehicle may work in one area and fail in another depending on the kind of people Living in the neighborhood, so again, be sure to look around you and take notes before making your decision.

The vehicle you select must be comfortable as well because you will be seated in there for hours at a time. Not only when driving, but also during stakeouts. Consider the kind of material used in the interior and the amount of space inside.

  1. Voice Recorder

pen voice recorderVoice recorders are great for capturing conversations which will come in come in handy later down the line, whether it be getting a confession out of someone or helping with notes. Just like camcorders, voice recorders come in very small sizes.

 

Since this is a spy tool, we suggest getting one of the voice recorders disguised as everyday items such as a lighter, usb drive or even a pen. A lot of the models out there now are almost impossible to detect!

  1. GPS Car Tracker

All too often Private Investigators get distraught clients who are worried about their husbands cheating. A GPS car tracker can discover the husband’s whereabouts without staking him out. It’s also useful to pick up on suspicious behavior as most GPS trackers can store a long history, which can be used to pick up a change in regular patterns and routines.

  1. Personal Protection

The last type of spy tools you will need as a private investigator are a set of very important tools. Spy tools for your personal protection. The truth is your job doesn’t come without risks.  You may be investigating a criminal which has the potential to be very dangerous.

We recommend you at least have pepper spray on you when conducting an investigation. However, a great tool to consider investing in for your safety is the Olympian 3 in one self-defense. It comes equipped with pepper spray, a stealth stun gun and a flashlight for those night time missions. You can find this and other great spy tools online at the PI Mall website.

Conclusion

All of these spy tools are important if you’re looking to become a more efficient private investigator. Take the time to build up your tool kit. Trust us, it will be worth the investment. Every case is different so be sure to choose the right tools for your particular investigation.

Thank you for taking the time out to read this article. We hope this list has you helped you. Let us know which tool on the list you think is the most important. If there are any important spy tools we missed be sure to leave them in the comments. Lauth Investigations is always looking for new tools to assist us in our investigations. www.lauthinveststg.wpengine.com

gear up