Cyber Shopping Fraud

Cyber Shopping Fraud

Online Fraud

CYBER-SHOPPING FRAUD

‘Tis the season for the hustle and bustle of Christmas shopping. While the stores are packed with consumers, cyber-shopping is at an all time high. Shopping in public can have potential to be dangerous with getting your wallet stolen or being robbed when putting the bags in your car.  Cyber-shopping has a different kind of danger to be aware of. Be aware and prepared when shopping online.

Cyber-Shopping Frauds

We are all excited to get the “great deal” when shopping either in the stores or online. Sometimes, though, we need to sit back and determine when a deal is just too good to be true. There are so many sites set up to fraud consumers, I could not list all of them, so I am just going to list some ways these sites go about their scam:

  1. Copy Sites – Large company websites such as Wal-Mart, Amazon, E-Bay, are easily recognized; however, some of the smaller websites, such as Pandora Jewelry, are not as easy to determine if a site is the correct location for the National company. Websites are set up to resemble these less known company websites, selling similar looking items for cheaper prices. When you order from these sites thinking you are getting the real thing, you are sent a cheap knock off that is not worth the money you spent.

How to avoid it? Ensure you are shopping on the correct retailer sight. If the website is something other than “.com”, chances are it is a fake. Do your research and pay attention to the website. If the website is a “knock off”, you will see the difference. httpDid you know the “s” in “https” stands for secure? If there is no “s”, move on.

 

  1. 2. Take the Money and Run – Websites are set up with “authentic” or “custom made” merchandise. monopoly guyWhen you order from these sites, you provide your credit card information to pay for the item and the item never comes. Now the individuals took your money, you have nothing to show for it and they have your credit card information.

 

How to avoid it? Do your homework. Research the company, call the company to speak with an employee, read the customer reviews. Do not give your credit card out without being 100% certain the company is legitimate. If they are legitimate, they will do whatever it takes to make you feel comfortable doing business with them.

  1. Auction Sites – E-Bay is probably the biggest Auction Site on the web. It is also the most problematic Auction Site. When purchasing an item through an auction, there are several scams that may occur:

 Ebay Scam

  1. The seller posts a picture of an expensive item, the bidding war begins, the auction ends, money is sent and the seller posts a picture of the purchased item stating “technically” that is all they listed for sale was the picture, not the actual item.
  2. The buyer purchases an item either by auction or the buy now tab and the seller requests the buyer to pay outside of E-Bay for various reasons. The buyer pays and goes to pick up the item or waits for receipt of the item. When contacting the seller due to never receiving the item, the seller states the item was never listed on E-Bay and it is not for sale.
  3. The auction or sale is complete. The item is received by the buyer and it is damaged or not the correct item. The seller is unresponsive to contact attempts.

How to avoid it? Always make the sure the seller is active on the site. Look for reviews. If they have no reviews, they may be new to the site and started just to pull these scams. Never pay outside of auction site. Ask questions about the item. Get the seller to provide intricate details including extra pictures. Read the description of the item carefully to see if there are any keywords that stick out making the listing unauthentic.

  1. Facebook Sellers – If a seller posts an item to your newsfeed through Facebook, you have to click on the link and you are re-routed to a different page. facebook dislikeAt that point, you are no longer secure. Once you enter their site, all your personal information is provided to them. Should you buy an item, they then have all your credit card information as well. It is so easy to be scrolling through Facebook, see a cute item for sale, hit the link, and within seconds you have purchased the item.

How to avoid it? Stop and think about what you are purchasing. Do not leave Facebook. Do not click on that link. Check out the website on your own. Do your homework. Ensure they have a safety symbol on their website.

Cyber-Shopping is so easy and convenient, we often lose ourselves to the fast paced life that we go for convenience over common sense. Before shopping online, do your research. Are you at a safe, secure website? Does the website look authentic? Check out the reviews of the seller, whether it’s an individual or a company. Ensure the url states “https” as this indicates a secure site. Trust your gut. I cannot express this enough. We know when something doesn’t look right, if we take the time to pay attention. Finally, if the deal seems too good to be true, it is so walk away!

“Trust your gut. It knows what your head hasn’t figured out yet.”

Online Dating Investigations – Part One

Online Dating Investigations – Part One

From the Desk of Kristen Justis, Director of Marketing and Client Relations

DANGERS OF ONLINE DATING FOR ALL GENERATIONS

PART ONE – THE WIDOW

Online Dating Danger

A sixty-year old widow, a fifty-five year old divorcee, a professional woman in her mid-thirties or a twenty-three year old Army soldier, these are just some of the individuals Lauth Investigation International, Inc., a private investigation firm, have helped while being scammed through online dating. Scammers do not discriminate, they throw out a line and see who bites. Hence the name Catfish Scams. Over the next few articles, I will discuss each of these Catfish scams.

catfish definition

The Sixty Year Old Widow

A wonderful forty-year marriage, three children, a mortgage paid off and ready for retirement, then the life altering death of Jane’s husband occurs. Jane deals with the loneliness and grief of losing her life partner. A year later, she decides to join an online dating site to find a companion to spend time and share her life. She is matched with several gentlemen; however, one pursues her in the charming, exciting way she was hoping for.

Jane and the new guy, Joe, begin talking via e-mail. He tells her all about his life and the exciting traveling he has done. They have so much in common, she can’t believe how much she enjoys communicating with him. The communication then moves to phone calls and text messaging. They laugh, he compliments her, they have late night talks. The excitement of this new relationship begins to mount.

Two weeks into the relationship, Joe tells Jane he received a contract for work and he will be leaving in a couple of days to Malaysia. He is unsure how long he will be there. Jane requests to meet him in person prior to him leaving. Joe states he has too much to do before he leaves so he is unable to meet her. This makes sense to Jane, so she doesn’t push the issue.

After months of talking every day, Joe tells Jane he owes money to a hospital for some medical expenses and he cannot get to his money because he must be present at his bank to withdrawal money. Of course, his bank is in the United States. He even showed her a screenshot of his bank account with $2.8 Million. The hospital is holding his passport so he is unable to come home to her. He suggests she sends him the money to cover the debt so he can come home. Jane sends him the money.

Next, Joe asks for more money because now he owes money to his attorney in Malaysia. The attorney is now holding his passport until the debt is paid. Jane has to refinance her paid off house to pull money out, but she does it so Joe can come home to her.

Once the attorney is paid off, Joe needs further money as he now owes money to his landlord, who again is holding his passport as collateral. Jane, once again, sends him the money. Now, Joe claims he cannot come home because his visa has since expired and he has to pay fines before he is allowed to leave Malaysia.

A year and $100,000 sent, Jane begins to question Joe about his history. He explains there is lot he can’t share over the phone or text messaging and he will tell her everything when he returns to the States. She questions his accent because he is supposed to be American. He explains this away stating his father was in the military and he lived overseas in different countries throughout his childhood; therefore, he has a mix of accents. Jane asked him on numerous occasions to send her pictures of him. He claims he does not have a phone that takes pictures.

Finger-print-investigation-4Once Jane looked past her emotions, she hired Lauth Investigations International, Inc. to investigate Joe. Private Investigators found no one exists under the name, birth date and addresses Joe provided to Jane. The bank account he provided was on a fake site. After much investigations, Lauth Investigations was able to link Joe to a scam stemming from Nigeria.

The catfishing scam out of Nigeria is a well-organized group of criminals, men and women, who troll online dating sites in the United States. They are trained to know the region around their victim to convince them they are from the area. The have training on how to connect with the victim and make them fall in love. Once they know the victim is hooked, they pull the line to get them to send money. The requests begin as a small amount and continues to grow over time with more requests for money.

The Nigerian criminal organization operates out of several different internet cafes, use a multitude of computers and phones, maintain various false identities and fake photos, and have fake websites. They utilize all the fraudulent documentation to scam individuals out of millions of dollars a year. Therefore, once the scam is discovered, the money is gone and unrecoverable.

nomoney

Watch out for your loved ones and yourself for any suspicious relationships formed through an online dating service. Unless you meet the person face to face, do not fall prey to the eloquent words they are able to write or say over the phone. Never send money to someone you do not know personally. If you have any questions about someone you have met, spend your money hiring a private investigator. It’s better to be safe than sorry and broke.

 

The Diversity of a Private Investigator’s Work: Stories From Around the Web

Private investigators do a variety of work. They track down missing people and recover lost assets. They keep an eye on spouses when one partner is worried about infidelity or in the process of divorce. Private investigators look into business assets during a merger and vet CEOs to make sure there are not hidden secrets that will embarrass the company later.

People tend to assume private investigators only do one kind of work, but that’s a mistake. Here are some stories from around the web that demonstrate the versatility of private investigators and all they do.

 

Private eyes look for runaways, sex-trade victims to rescue

Founder and operator of Lauth Investigations International, Thomas Lauth, was featured in this article from the San Diego Tribune about private investigators working to recover missing people being trafficked into the sex trade.

In Indiana, Thomas Lauth, founder of Lauth Investigations, said his company has worked trafficking cases since “before the word ‘trafficking’ ever came around.”

Historically, he said, law enforcement turned their backs on trafficking victims they viewed simply as prostitutes.

He said that often times a girl is recruited by a friend who introduces her to a trafficker or pimp.

“Police say she left on her own. Parents don’t know what to do. They call police repeatedly. Then they call an investigator,” Lauth said.

Obviously we’re very happy to see Tom’s hard work and dedication to helping families and children being featured in such a big newspaper, but we’re even happier for the work itself. Tom has a long history of finding missing people and helping families recover their loved ones. It’s hard work, but Tom loves doing it and always gets it done.

 

Private Investigator Investigates Client while Client Investigates Him

In a strange case of cat and mouse, Buzzfeed Motion Pictures employee Mike Carrier hired a private investigator to investigate himself and see what he could dig up. Unbeknownst to the private investigator, Carrier hired a second private investigator to investigate the first private investigator. The story ends rather anticlimactically, but it’s worth reading just for the uniqueness of the situation.

 

Man Trashes Woman’s Home then Rinses his Hair

Burglars breaking into people’s home and using their showers is surprising common as we wrote about here. While most people would assume burglars want to get in and out as quickly as possible, they’re frequently tempted to get far too comfortable in the homes they invade.

In Youngstown, Ohio this week a man broke into a woman’s house and trashed the inside before the homeowner returned and found the man rinsing his hair in the shower. Surveillance video showed the man came from a convince store around the corner. Police said the man had a lengthy burglary record.

 

Star of Mannix, Mike Connors, Dies at age 91

Mannix was a tv show that aired for eight season on CBS starting in 1967. Mike Connors played the hero and title namesake Mannix. The show was a big hit despite poor first season ratings. Mannix was a private investigator in Los Angeles who solved street crime and mixed it up with bad guys.

In the CBS News obituary Connors said Mannix was a hit because, ““Up until Mannix, most private investigators were hard-nosed, cynical guys who lived in a seedy area and had no emotions. Mannix got emotionally involved. He was not above being taken advantage of.”

 

David Schroeder, Blog Writer, Lauth Investigations International

Private Investigators and Drone Usage

Private Investigators and Drone Usage

Photo by Nicolas Halftermeyer (Own work), via Wikimedia Commons

Today’s private investigators seem to have it pretty easy compared to those of the past — cell phones, security cameras, and social media accounts are often used to obtain evidence for investigations. Gone are the days when private eyes had to flip through physical documents and phone directories, or find the location of someone with an actual map. And now, thanks to the advancements in drone technology, some investigators are opting to do away with physical surveillance.

A drone, or unmanned aerial vehicle (UAV), is a remote controlled aircraft. Although they have been around for several years, flying personal UAVs is a relatively new hobby. These small crafts have been all over the media lately, even earning the endorsement of Martha Stewart. Like Stewart, many people use drones to take beautiful aerial photos. The market for drones is constantly expanding, and tech companies are keeping pace. Some drones can record a live feed, detect heat, or are small enough to fit in the palm of one’s hand. Others can fly four several hours at a time, scanning entire cities in a day.

Due to their discreet nature, private eyes have begun using drones to catch cheating spouses or dishonest employees. Instead of observing someone on foot for hours, investigators can use a drone to get a bird’s eye view of a suspect and collect video evidence. Using a drone is also safer for an investigator and are cheaper than chartering a plane or helicopter. A recent New York Post article featured a private investigator whose specialty is drones. According to the article, the investigator had to use a drone to record evidence of insurance fraud instead of physically surveying the suspect’s property for fear of being shot.

Because of their invasive capabilities, many are questioning the ethics of drone usage, including U.S. Senator Charles Schumer. Schumer recently called for federal regulations on drones, even going as far as proposing a ban on drone usage by private investigators. The idea of anyone being able to purchase a surveillance drone and using it to record whomever and wherever they want is fairly unnerving. The use of personal drones is uncharted territory, filled with flimsy guidelines and little regulation. The Federal Aviation Administration (FAA) prohibits the flying of UAVs for commercial use or payment. Drones are also not permitted to fly over heavily urban areas, and must alert control towers if they fly too close to an airport (FAA Website). Even so, investigators like the one featured in the Post article are still flying their drones.

Should we start expecting to see drones tailing us as we walk down the street? Probably not.

For now, most investigators are opting to stay on the ground and stick to their tried-and-true surveillance techniques. If evidence is gathered illegally, it may lose its value in court, and a private investigator could lose their credibility.

Whistleblower Protection

Whistleblower Protection

Whistle

Photo courtesy of Kate Ter Haar, Flickr

Chelsea Manning, Edward Snowden, Julian Assange, and other whistleblowers have sparked an intense debate on the ethics of leaking secrets.  Some view these people as martyrs, others view them as traitors. Numerous laws and acts have been put in place to protect those who choose to expose an entity’s wrongdoings, but where do we draw the line between honest whistleblowing and smear campaigns?

Corporate Whistleblowers

The subject of a leak and the method in which a whisteblower announces their findings all play a role in the ethics of a case. Is the accuser attempting to enact revenge on a corporation by tarnishing their reputation, or are they genuinely trying to alert the public of fraud, harmful practices, and other misdeeds? Many employees keep quiet when they witness corruption because they fear losing their jobs and risk damaging their chances of future employment. And even if an attempt is made, businesses will go to great lengths to cover their tracks, including forcing employees to sign contracts that prevent workers from speaking up about company policies. Consider the case of Donna Busche, whose story was mentioned in this Washington Post article. According to the Post, Busche was fired after raising safety concerns about the nuclear facility she managed. The nondisclosure agreement prevented Busche and her coworkers from reporting mishaps, and also made it impossible for them to receive financial rewards for whistleblowing. Like many others before her, Busche was accused of being fired for other reasons, despite her claims that she did it for ethical reasons.

Measures such as the Dodd-Frank act of 2010 and the Whistleblower Protection Enhancement act of 2012 are meant to protect people like Busche. However, some believe that the government isn’t doing enough to enforce these rules, while others believe that the law encourages people to lie for financial gain. Dodd-Frank rewards whistleblowers with up to 30 percent of the recovery, which can generate millions for the prosecution in a big case.

Going Against the Government

The legality of whistleblowing becomes even more muddled when it involves the government. Snowden’s most recent revelations about the National Security Agency (NSA) have some lauding him as a hero, while others accuse him of treason.

Most recently, a women by the name of Sabrina De Sousa is being punished for her involvement in the kidnapping of Abu Omar. Aljazeera America ran an article about the former CIA operative, who claims to be used as a “scapegoat” for the CIA. De Sousa was working with the CIA in Italy at the time of the kidnapping, but made several attempts to alert Congress to investigate the CIA’s actions. She believed that their treatment of Omar was a huge mistake, and after failing to receive support, found herself being accused for being the mastermind of the operation.

A Difficult Decision

Although the majority of Americans won’t be involved in cases like Snowden’s and De Sousa’s, some may find themselves in a difficult position. A whistleblower is oftentimes the spark needed to ignite a corporate fraud case. Before deciding to go public with information, it’s important for potential whistleblowers to look over contracts they may have signed and learn more about their state’s laws. Even corporations who find themselves the subject of a leak will need to launch an investigation to prove the accuracy of such claims.