Alimony Investigations

Alimony Investigations

From the Desk of Kristen Justis, Director of Marketing and Customer Relations

ALIMONY INVESTIGATIONS

alimony pic

Alimony is defined as a husband or wife’s court-ordered provision for a spouse after separation or divorce. The purpose of alimony is to provide financial support to a spouse due to the change in their lifestyle upon the separation. While only 20 states still allow alimony, Lauth Investigations International, Inc. (Lauth) receives several clients due to provisions for alimony in a divorce.

Alimony States

Only 20 states allow for alimony and some are stricter than others on their provisions. The stricter states allow alimony to be a permanent obligation for life. Others allow receivers of alimony to receive further income should their ex marry another. Meaning, if the payor marries another, the new spouse will be obligated to pay some of their income to the receiver. Some states have a set formula giving the lower income spouse alimony of up to 40% of the higher income spouse’s salary. Below is the list of the states starting with the strictest states when it comes it alimony:

  1. Colorado
  2. New Mexico
  3. California
  4. Mississippi
  5. New York
  6. New Jersey
  7. Florida
  8. West Virginia
  9. Vermont
  10. Connecticut
  11. Alabama
  12. Delaware
  13. Kansas
  14. Tennessee
  15. Utah
  16. New Hamshire
  17. Alaska
  18. Nevada
  19. Texas
  20. Georgia

Every divorce and alimony decree are different. Some only requires alimony for a few years, while some require alimony to be permanent until death, others stipulate alimony ceases once the receiver of the alimony resides with a new companion, while some allows the new spouse of the payor has to pay a percentage into the alimony. The set time for alimony is clear cut for the ending of alimony payments. The alimony ending when the receiver resides with a new companion is far more difficult to document and prove to the Court.

Alimony Case Investigation

Lauth previously handled an investigation case for the payor of alimony as he believed his ex-wife to be living with a new spouse. This may seem like an easy thing to prove given our access to records on the internet and social media; however, people still have the means to be secretive and manipulative where money is concerned.

check writingTrent, payor of alimony, resides in a state which ordered him to pay Mallory, receiver of alimony, $3,000 per month until Mallory began to reside with a new spouse. Since the divorce several years ago, Mallory moved out of state. Trent began to hear rumblings of Mallory living with a new spouse. He perused social media and saw her with a man several times; however, this did not prove they lived together. Trent began to do some research on his own.

Through his digging on the internet, Trent was able to confirm Mallory had purchased a home along with this new gentleman. Although it may appear they purchased the home to live together, this was not enough information for the Court to cease the alimony requirement. This is where Lauth comes in. Trent hired Lauth to get the full details of the living arrangement and use of the home in question.

The problem of just showing the two individuals purchasing the home together is they could be in business together to flip the home for sale, rent the home to others, starting a business in the home, etc.  In order to receive a ruling for alimony to cease, all information must be concrete and prove fully the receiver is no longer in need of the spousal support as they have other forms of income.

The internet provides useful information; however, private investigators, such as Lauth, are able to answer all questions beyond a shadow of a doubt for clients. Lauth was able to locate the home, complete surveillance of the home, take pictures of Mallory and her significant other leaving the home consistently, and find further information on the use of the home. After given definitive proof from Lauth, Trent was able to show the Court Mallory no longer needs his spousal support. The Court ruled in his favor and he is now saving $3,000 per month.

Conclusion

prenuptialWhen looking to get married, check out the laws in your state and consult an attorney. If there is an alimony law, attempt to establish a prenuptial agreement outlining your own parameters for alimony. If you are getting divorce, contact an attorney immediately and try to work with your ex-spouse on alternative agreements such as a one-time lump sum or a time period so the alimony is not a permanent requirement.

If you are paying or receiving alimony, ensure you stay aware of what the other is doing. On either side of the alimony, the actions of the other can cost or save a lot of money. The best way to stay aware is to work with a private investigator who can keep you updated without your name being involved and allowing you to get definitive answers to help you in Court.

Opiates in the Workplace

Opiates in the Workplace

Is Your Employee a Drug Trafficker? Opiates in the Workplace

Hydrocodone Pills

According to the Centers for Disease Control and Prevention (CDC), sales of prescription opioids quadrupled during 1999 to 2014. Referred to as an opioid crisis in America, it seems we all know someone battling an addiction to prescription medications.

Opioids include prescription pills (including Vicodin, Oxycontin, and Percocet), as well as Heroin and Fentanyl, a drug that can be injected, taken as a lozenge or through a skin patch.

Nationwide 1 in 4 people who are prescribed opioids will struggle with addiction. The depth of the problem is highlighted in a disturbing CDC post stating, “Almost all prescription drugs involved in overdoses come from prescriptions originally; very few come from pharmacy theft. However, once they are prescribed and dispensed, prescription drugs are frequently diverted to people using them without prescriptions. More than 3 out of 4 people who misuse prescription painkillers use drugs prescribed to someone else.

In addition to the personal toll to the addicts and the American family touched by opioid abuse, the CDC also estimates the total “economic burden” of prescription opioid misuse alone in the United States is $78.5 billion a year, including the cost of healthcare, loss of productivity, absenteeism, increased injuries, addiction treatment, theft, criminal justice involvement, and legal liabilities.

The Substance Abuse and Mental Health Services Administration (SAMHSA) estimates 68.9% of all drug users are employed.

The Drug Enforcement Agency estimates employed persons who misuse opioids account for 64.5% of medically related absenteeism and 90.1% of disability costs.

The use of opioids in the workplace is a growing battle for American business. According to a National Safety Council (NCS) survey, 57% of employers perform drug tests. However, more than 40% do not test for synthetic opioids like oxycodone, one of the most abused narcotics on the market, making accurate national statistics unreliable.

An NCS survey also found 29% of employers reported impaired job performance due to use of painkillers, with 15% citing injuries due to drug use. Up to 70% of employers said their workforce has been negatively affected in one way or another.

The Impact of Drugs in the Workplace

Use of drugs impairs decision making and causes physical impairment, a deadly condition when at work. It causes an overall decline in employee morale, an unsafe working environment and increases employer liability.

It is estimated at least 1 of 6 employees use drugs at work and the toll on the workplace is costly in the following ways:

  • Addicts are 1/3 less productive than their counterparts
  • Five more times likely to cause accidents
  • Are absent up to 20 times more often
  • Five times more likely to request workers compensation
  • Contribute to 40% of all industrial work fatalities
  • Health care costs for addicts is three times higher than other employees
  • Admitted to selling drugs to coworkers
  • Admitted to stealing from employers and coworkers

It is estimated 70% of 14.8 million Americans who use illegal drugs are employed. It is safe to assume if you have drug abusers on the job, you probably also have drug dealers operating within your company.

As drug dependency increases, it is common for addicts to buy drugs from friends or coworkers and even steal from their company, co-workers and clients.  

Experts have also found the number of heroin addicts have increased as it is common for an opioid user to transition to using heroin when they begin running out of pills and money. Heroin is significantly cheaper than opiates and easier to obtain. Heroin laced with Fentanyl is becoming increasingly popular because it can be 50 times stronger than heroin.

The drug dealer of today is no longer the shady guy driving a decked-out Cadillac, meeting his clients in a dark alley or an unlit street corner. Dealing drugs to coworkers is preferred over standing on the corner selling to strangers and for a drug trafficker, less risky.

At work, a dealer has an employed clientele able to afford the drugs, and someone they can establish trust with while selling under the radar of management in the restroom, parking lot, lunch-room or cubicle.

Oftentimes workplace dealers will sell drugs on credit or a “front” according to the book Undercover Investigations in the Workplace by Eugene Ferraro. Drugs are sold to an employee with the agreement of paying later, usually on payday. Co-workers make the perfect client for a drug dealer and quite a lucrative business, with one Oxycontin pill demanding up to $50-$80 each on the street according to a CNN Money article Prescription Drugs Worth Millions to Dealers.

CashAccording to Ferraro, “We have caught employees-dealers (earning less than $10 an hour from their employer) who never carried less than $10,000 cash to work.”

Paydays are usually the biggest days for drug trafficking activity. However, to pay for drugs, addicts often turn to their employers to fund their habits.

With addicts in the workplace, there is a higher incidence of theft of equipment, tools, products and part inventories where drug trafficking and abuse is occurring. Aside from being at increased risk, both abusers and drug dealers are more likely to become involved in additional criminal behavior, stealing from their employers and fellow employees.

What are the signs of drug trafficking and abuse in the workplace?

Are certain employees driving an expensive car far beyond the means of what they make working? Flaunting money? Are your employees leaving without notice to meet clients? High turnover and absenteeism and/or meeting in the bathroom or parking lot? What may appear on the surface to look like comradery, could be a sign of something more.

Robert Avery, 41, worked as the Parental Involvement Director at a Head Start program in Gadsen, Alabama. Instead of offering educational and health services to low-income children, Avery was arrested for selling the prescription drug “Roxycontin” to undercover agents from the program facility.

Robert RokardEven police departments are not immune. November 20, 2017, Jellico Police Department Dispatcher and Fireman Robert Rookard, was arrested in “Operation Thanksgiving Harvest” for selling drugs at work.

In August 2017, more than a dozen Atlanta USPS workers were rounded up for running an illegal drug distribution operation. Sixteen employees working at post offices across Metro Atlanta were arrested for accepting bribes in exchange for delivering kilogram packages of cocaine.

When the FBI received a tip that drug dealers were running packages of drugs through the mail system, they began an 18-month sting putting a fake drug dealer on the street to see how many postal workers they could get to sign up. In a bribery agreement, workers agreed to provide special addresses to the drug trafficker, intercepting and delivering the packages to the dealer, who just happened to be working with law enforcement. The number of postal workers who agreed to participate astounding.

While some companies may assume there is no liability for the actions of an employee, one company is feeling the devastating effects. According to the October 13, 2017, Chicago Tribune article, “Oak Park appeals board upholds pantry’s closure after employee accused of selling heroin,” it was reported The Village of Oak Park in Chicago closed the Austin Food Pantry after 55-year old store manager Edgar Lucas was arrested on 17 counts of heroin sales and possession at the establishment. Charges include 5 counts of unlawful delivery of a controlled substance determined to be heroin. In the aftermath, the city revoked their business license.

In an appeal, the store owners stated they had no knowledge of the employee’s drug activities; however, Village of Oak Park trustees upheld the decision to permanently close the business. In a written ruling, trustee Cara Pavlick said Austin Pantry owners were “negligent, reckless and careless at a minimum in allowing their business to be operated as a place for the sale of illegal narcotics on numerous dates.”

Austin Pantry

Drug use and trafficking are often difficult to spot and many times even harder to prove. However, every employer and Human Resources department has a responsibility to ensure a safe environment for all employees, immediately addressing any infraction or suspicion to reduce liability within the workplace and protect your company.

Private Investigators – A Weapon in Battle to Reduce Illegal Drug Use

An internal investigation sometimes involves drug-testing, some use dogs, and some use undercover operatives. Wall Street and other large corporations began using private investigations long ago with the demand ever increasing.

General Motors (GM) reported substance abuse by some of its 472,000 employees and their dependents cost the company $600 million in 1987. To combat the problem, GM instituted undercover operations at 10 mid-western plants and said it would not hesitate to use such investigations in the future. That was then, and drug use in the workplace has only increased.

While employers are encouraged to practice a covenant of good faith and dealing with all employees, protecting the workplace should be the primary goal, and often requires professional private investigators to work alongside law enforcement to ferret out drug use and other illegal activity.

Conducting a private investigation not only reflects your company as being proactive, careful documentation can help achieve a conviction and reduce liability.

Thomas Lauth, owner of Lauth Investigations International, specializes in undercover investigations for both blue-collar and white-collar companies. Having spent over 20 years in the field as a private detective, he believes diligence is key to combating workplace crime. “One can never be too careful or diligent when protecting their company. When working with clients, we tailor our investigation to the needs of each individual client.”

When hired by a client, Lauth’s investigative team provides an assessment and tailors the investigation to the needs of the specific case. Working with Human Resources, the business is profiled to determine the best course of action.

The most effective way to detect drug trafficking and abuse in the workplace is to conduct a covert investigation planting an investigator within the company. Typically, the investigator goes through the hiring process like any other employee, informing minimal staff, allowing the undercover private investigator to protect their identity and integrity of the investigation.

From there, the investigator fits in with employees, developing friendships to gain information about drug activity. In Lauth’s experience, “Many times, our investigators uncover additional illegal activities, resulting from the initial investigation,”

Periodic background checks can also assist companies in identifying employees who are high risk for illegal activity. “At Lauth Investigations, we recommend conducting background checks of all employees, newer employees as well as those who have worked for the company for several years. A lot can change after the hiring of an individual,” Lauth says.

For those who may be concerned office morale may be damaged, Lauth points out a background check can be conducted legally without the employee’s knowledge. “Background checks can reveal drug offenses, fraud, theft and other criminal activity on record with a police department or court and one of the most important steps a company can take to protect their company.”

For more information contact Thomas Lauth, Lauth Investigations 317-951-1100.

Written by Lauth Investigations Feature Writer Kym Pasqualini.

 

Online Dating Scam Part Four

Online Dating Scam Part Four

From the desk of Kristen Justis, Director of Marketing and Customer Relations

DANGERS OF ONLINE DATING FOR ALL GENERATIONS

scam alert pic

PART FOUR – THE YOUNG SOLDIER

In previous postings in this series, I have discussed a widower, a divorcé, and a professional who were victims of online dating scams. One would like to believe scammers would have some conscience and stay away for our active duty military or even our veterans. This is not the case. Scammers are not particular when choosing their victims. Lauth Investigations International, Inc. recently handled a fraud investigation for a young military soldier who had been in a long term, live in relationship with a scammer he met online.  Many believe these scams occur quickly; however, these individuals are committed and they get themselves in deep in order to complete the scam in its entirety.

Below is a description of a Lauth Investigation’s fraud case which shows military are a prime target for these scammers as they are gone from home often for months at a time. They are not able to be in tune with what is happening at home while they are deployed.

The Young Soldier

Jack is a twenty-two year old Army soldier. He met Gina on line while he was stationed in Kentucky. Gina and Jack began dating and their relationship grew over a period of two years. They are in love and decide to move in together. Jack proposes, they move into an apartment and they are ready to start their life.

31970396 - some brick walls isolate a different individual from other people. digital illustration.

In the meantime, Jack has completely isolated himself from his family and friends. His mother, Tara, hadn’t heard from him for over a year. Gina has been added to Jack’s bank account and she has taken control on his finances. In a long term, engaged, relationship, one party taking over the finances is not typically a red flag.

In the summer of 2017, Jack learns he is being deployed to Afghanistan. He attends training in Texas prior to his deployment. While in Texas, Tara broke up with Jack but told him she would watch over his finances and apartment while he was in Texas and through his deployment. Heartbroken and hoping they would get back together once he returned to Kentucky, he agreed to allow her to maintain her control over his finances. Jack even began paying her a monthly rate since she was handling his finances.

After a few weeks of being deployed, Jack finds out, through a neighbor in Kentucky, Tara has moved in another man to Jack’s apartment where he was paying the rent. Once Jack found out, he called Tara and told her he was getting rid of the apartment as he didn’t need it anymore. He advised his parents were coming down to move his items from the apartment.

Jack proceeded to draw up a Power of Attorney for his parents to take over his finances. In the time it took him to get the Power of Attorney, Tara had drained his bank account, shut off his debit card and moved all items from the apartment. By the time his parents arrived at the apartment with a moving truck, the only possessions remaining were some of Jack’s clothes. Tara became a ghost.

Jack’s parents immediately hired Lauth Investigations to attempt to locate Tara in hopes of finding some justice for their son. The experienced private investigators began to uncover the full scope of the fraud which had taken place. The scam on Jack was found to be a well thought out plan.

The private investigators found Tara’s boyfriend who moved into Jack’s apartment was, in fact, her husband. They have pulled this scam on numerous individuals. They meet military personnel online, develop relationships with them (men and women), take over the finances, skim money from the accounts, and disappear with all the money once their true intent surfaces.

piggy bankUnfortunately for the individuals like Jack, they willingly add the scammers to their bank accounts, thereby making the money common property between the two individuals on the joint account. There is no criminal recourse for this action.  The victims may pursue civil action against these thieves; however, the victims generally do not have the money to take this next action.

Lauth Investigations assisted in locating this thieving couple and provided Jack with information to file civil suit against them. Jack reported both individuals to the online dating site they utilized. Hopefully, they will learn their lesson and stop preying on our military.

Private Investigators provide answers for victims and handles cases the police are unable to investigate. Utilizing a private investigation firm is key to uncovering the truth, arming victims with ammunition to proceed as necessary, and hopefully stopping criminals from harming other individuals in the future.

 

Insider Intellectual Property Theft

Insider Intellectual Property Theft

Top Secret File

Spies, Espionage, and Intellectual Property Theft

Government and military entities are not the only ones spying and conducting espionage investigations to protect our national security. More and more corporations and even small businesses are now hiring expert private investigators to conduct espionage investigations and counter-surveillance to protect “trade secrets” and other classified information.

Cases of economic espionage, industrial espionage, corporate spying and corporate espionage are commonly conducted for commercial purposes but can also include personal information that can later be used to blackmail, discredit and control enemies and competitors.

Espionage or “Insider theft” can cause significant personal and financial harm and described as an individual obtaining secret information without the explicit permission of the owner. For example, a corporation or company spying on another company’s activities, collecting data and information for gain or cause damage, most commonly through the doorway of employment.

Espionage involves clandestine activities. Though methods and motives of spying have changed over time, the desire to uncover competitor’s secrets has not. There is a war going on, and spying the primary weapon.

Federal Effort to Combat Economic Espionage

According to a 2015, CNN Politics Report “FBI Sees Chinese involvement amid a sharp rise in economic espionage,” the FBI announced the bureau has seen a 53% increase in economic espionage and intellectual property theft cases leading to the loss of billions of dollars.

Cyber ThreatThe FBI concludes “insider threats” or employees familiar with the inner workings of a company who obtain sensitive industry secrets in exchange for large amounts of cash are becoming more common and pose a significant threat to companies worldwide.

To combat this ever-increasing menace to American businesses, the FBI produced a video “ ” to raise awareness.

Private investigator Thomas Lauth, CEO of Lauth Investigations International, says, “Global trade of fake goods is damaging U.S. markets, along with theft by U.S. retail workers.”

Pirated and imports of counterfeit goods are worth nearly half trillion dollars annually with much of the proceeds going to organized crime, according to the OECD and the EU’s Intellectual Property Office.

Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact,” reports fake products like footwear, handbags, even strawberries, are commonly presented to the U.S market. While there is significant financial damage occurring, products like pharmaceuticals, toys that are harmful to children, baby formula, and failing auto parts are endangering lives.

According to former Attorney General Loretta Lynch in a 2015 Department of Justice press release, “The digital age has revolutionized how we share information, store data, make purchases and develop products, requiring law enforcement to strengthen our defenses against cyber crime – one of my top priorities as Attorney General, “said Lynch. “Companies like Sony and Target – have demonstrated the seriousness of the threat all business face and have underscored the potential for sophisticated adversaries to inflict real and lasting harm.”

While the Attorney General’s Office, FBI, Homeland Security and law enforcement are allocating more resources to combating intellectual property theft from dangerous outside adversaries, companies throughout the world are encouraged to take the necessary steps to protect their own intellectual property from outside and insider threats.

Insider Theft of Intellectual Property

Experts maintain upwards to 70% of a corporation’s value is found in Intellectual Property (IP). Insider threats come from the inside because the “thieves” are given access to their day-to-day employment.

The value of an organization’s secrets, product plans, customer data, and price lists cannot be underestimated. It becomes necessary to find a balance between productivity and protocol that allows a watchful eye to protect sensitive data and detect insider threat activity. Operational staff should be prepared with information to help them better understand how insiders can damage their agency, and in the various methods used by insiders. They are the front line to help battle IP theft crimes.

Insider Attack StatsInsider thieves commit crimes for varying reasons, to include gaining a competitive business edge, to start a competing business, or personal financial gain.

It is not uncommon for thieves to use networks to send internal server data outside of an organization. The most common method of stealing data is the use of external media such as a writable CD or USB mass storage device. Using corporate email accounts to send information off-site to personal emails and competitors is also common and requires monitoring to prevent such abuse.

It is necessary for organizations to identify risks and develop standards of best practices and policies that address the many ways IP can be exploited. These should include but are not limited to IT Security, removable media policy, controls and inventory, physical security, logs, and indexing tools to identify patterns in behavior. It is especially important to implement heightened security measures during reorganization, acquisition, downsizing, mergers or other organizational events.

Non-Compete Agreements Protects the bottom-line

Employee departures resulting in the scheming of trade secrets and clients has increased significantly in recent years. Many employees leave their employment to begin a similar start-up or pursue freelance work. As a result, it has become common for former employees to approach old clients, steal data, marketing materials and even share negative information to damage their former employer’s credibility.

According to a Wall Street Journal report, with the help of investigators, over the past decade, there has been an increase in the number of departing employees being successfully sued by former employers for breaching Non-compete Agreements (CNC).

Considered one of the most effective ways to prevent the theft of a company’s secrets, having a Non-compete in place and requiring every employee to sign it, can prevent damages that could otherwise last years.

Private investigation firms are playing a significant role in the effort to safeguard information, the detection of costly breaches and providing an evidentuary solution presenting facts when litigation is necessary.

Lauth Investigations International is working to prevent intellectual property breaches, global piracy, counterfeiting and insider threats with data mining experts and field investigators who focus on safeguarding IP and detecting violations utilizing sources that are not commonplace to HR and Operations Supervisors. “It is vital to be able to detect violations to prevent violators from reaping profits and expanding their worldwide market, where damage can extend for years,” says Lauth.

Brand Protection areas include:

Apparel

Music and Apps

Tools and Hardware

Cosmetics and other Products

Logos and Authentic Branding

Indigenous Rights

Author Rights

Content and SEO Detection and Protection

Plagiarism, Marketing Materials and Website Protection

“Our investigators conduct trademark infringement for brands, large and small, trekking through some of the most complicated cases and vast markets such as Hollywood celebrities, apparel, and electronic clients,” says Lauth. “Our team provides intellectual property and litigation support for small business and corporations working with corporate executives, HR, and those in Operations Supervision to provide research and investigations, crisis intervention, employee screening, vendor and supplier screening, electronic discovery, surveillance, loss analysis, and expert testimony if needed.

 

Working to protecting your brand

Brand Protection Image

“Our private investigation firm will not only work with key staff and operations supervisors to identify current and potential breaches, we work with companies that operate throughout the world to implement the right policies and safety protocol to help protect their IP into the future,” says Lauth.

Lauth Investigations offers free consultations and guidance to help protect your brand. Following are a few tips to help you better protect your IP.

  • Protect web content and marketing materials by utilizing a DMCA account and protection badge.
  • Think globally. Obtain trademark protection for worldwide protection.
  • Set up a Google Alert to police your brand.
  • Obtain IP Protection for Copyrights, Trademarks, and Patents.
  • Register trademarks with the US Patent Office.
  • Develop a Policies and Procedure Handbook and have each employee review and sign.
  • Utilize Marketing Analytics software such as TrackMaven and Travel IQ for online tracking.
  • Monitor unregistered infringements.
  • Create various divisions for a more controlled environment.
  • Create a distinctive mark.
  • Develop and implement a Non-Compete Agreement.

For more information about how you can protect your IP, please visit www.lauthinveststg.wpengine.com or call 317.644.2788.

Kym Pasqualini, Lauth Investigations Feature Writer

How to Protect Against Burglars

This was a big week for news in America. It seemed like a new story broke before you could finish reading about the first one. All of the major networks and newspapers were scrambling to report on everything taking place, but one story in the private investigation world stood out me more than the others.

The headline “Stranger enters Arizona woman’s home, eats food, uses shower, sleeps in her bed, police say” was attention grabbing and hard to forget. Most people would read this headline and quickly move on under the assumption that surely this was an outlier. This is a case of one dumb criminal who got far too cozy during a break, but if you do the slightest bit of googling, you’ll quickly find it’s really not that uncommon for home intruders to do these kinds of things. Here’s a rundown of some similar incidences and what you can do to protect your home and property.

 

Denver Police Warn Home Owners String of Break-ins, Burglars Eating their Food

In 2015 there were a series of break-ins across Denver. Each of the burglaries had something in common; the thieves weren’t stealing anything, but were breaking in and eating food at the houses. Wile nothing was stolen, it was happening so often that Denver police issued a warning to people in the area.

Denver police didn’t think the break-ins were related, but that almost makes it stranger. What are the odd all of these people were breaking into houses just to steal food? One of the burglaries was perpetrated by a kid. The homeowner walked into to find the kid watching anime on her tv while eating food. He ran from the scene when they cam home.

 

Arizona Man Enters Home, Sleeps in Woman’s bed, has Standoff with Police

The case referenced in the introduction took place in Mesa, Arizona last October. Joshua Forsgren broke into a home and took a nap inside the homeowners bed. Forsgren must have been pretty tired from all that burglarizing, because he was still asleep when the homeowner came arrived home with her children and found him in her bed.

She quickly exited the house and called police. When the police arrived they tried to get Forsgren to exit the home of his own volition, but he had other ideas. As police waited outside they observed Forsgen going through the house and eating food. After 90 minutes the police entered the home and took Forsgren down with a stun gun. He’s now in jail awaiting trial.

 

Man breaks into house, takes shower, eats pizza, but steals nothing

The Florida Man stories never cease to amaze us. If you’re unfamiliar with Florida Man, do a quick search and you’re mind will be blown. Whether it’s Florida Man setting his underwear on fire at a Starbucks or when Florida Man got body slammed by a pro wrestler after threatening him with a bb gun while trying to make him buy him a beer, Florida Man is always up to something.

While this story is surprising, Florida Man being the perpetrator sure isn’t. In September, 36-year-old Timothy Tomlinson broke into a home, showered, ate pizza and downed two bottles of water. Tomlinson didn’t steal anything, but he was charged with burglary for unlawfully entering the home. Luckily the homeowner didn’t lose any valuables to theft, but Tomlinson broke multiple kitchen windows to get in.

 

What does this mean to you?

It’s alarming to think someone could just enter your home while you’re gone. The fear of coming home while someone is still in your house is a scary proposition. One of the easiest things to do is make sure all of your doors and windows are locked whenever you head out. Porch lights are a great deterrent and they can help ward of would-be burglars by making it difficult for them to approach the home undetected.

Security cameras are excellent to catch in perpetrator in the act, but they’re also good at scaring burglars off. Some burglars are dumb enough to see cameras on a house and try to break in anyways, but most won’t. It’ll also give you excellent evidence to help the police catch any intruders.

Another great tip is is catalogue your property. By keeping an active inventory of all of your valuables, you’ll be able to immediately identify any property that’s stolen and provide pictures to police. This is as easy as snapping a picture with your phone and saving them to the cloud with a brief description you can write in your notes app.

If family heirlooms are stolen, consider contacting a private investigation firm like Lauth Investigations International. While the police would like to catch every single burglar and return property to their owners, their resources are limited and if it’s not a violent crime their motivation to catch the crook is low. Private investigators on the other hand work exclusively for you and know where to look for stolen goods. Armed with pictures and descriptions of the items, private investigators like Thomas Lauth can make short work of finding your belongings.

 

David Schroeder, Blog Writer, Lauth Investigations International