Private Investigators & Sexual Abuse Investigations

Private Investigators & Sexual Abuse Investigations

private investigator sexual abuseThe growing awareness of sexual abuse in the media has the public on high alert in all walks of life—a steady stream of investigations into allegations of sexual misconduct within religious communities, sport teams and franchises, civil service, and the workplace to name a few. It seems like every week the news cycle is dominated by another story in which a religious leader is denounced following allegations of sexual abuse against minor members of congregation. Investigations into United States Olympic teams have the parents of minor athletes with their ears to the ground, as the horror of Larry Nassar’s crimes continue to shake out in civil court. Leaders within these communities are educating themselves on how the power structure of these institutions leaves minors vulnerable and in many cases are depending on the services of independent private investigators to conduct unbiased, thorough investigations.

In cases where there are allegations of abuse, there is an immediate division between the survivor and the alleged predator. Many of the parties involved will immediately fall on one side or the other. Employers, colleagues, and public relations representatives in the alleged abuser’s life will begin a rash of character defenses, claiming that there’s no way an individual as friendly/respected/admired as them could be capable of such disgusting actions. Parents and loved ones in the survivor’s life will rally in support as they attempt to take on not just their abuser, but potentially an entire institution as well. All of the parties directly involved have a stake in the outcome of the investigation. Institutions that are suspicious of predatory behavior in their ranks often prefer to handle the investigation in-house, using their own investigators in the form of management, attorneys, or employees in another supervisory capacity to do the fact-finding. Not only can the qualifications of these individuals range across a spectrum of investigative prowess, but because they are employed by the employer of the abuser, they likely will have some sort of bias as an investigator. This is why it’s so important to hire an independent, third party private investigator from the onset of any allegations of abuse. Like any unimpeachable structure, the integrity starts at the foundation, with thorough fact-finding by an experienced, qualified investigator. Ethically, a private investigator’s only loyalty is to the truth, and without any stake in the outcome of an investigation, their findings can withstand a higher level of scrutiny than an investigator employed by the abuser’s corporation or institution.

The most qualified private investigators for sexual abuse investigations have a wide array of experiences in multiple areas of criminal justice. Unlike the resumes of corporation and institutional employees, they will have likely majored in an area of criminal justice, have worked law enforcement, have been retained by either the prosecution or defense to assist in a case, and have an intimate knowledge of criminal procedures and investigative methods. Independent private investigators have to be able to work multiple angles in an abuse investigation, vetting every statement by survivors and witnesses, as well as doing thorough fact-finding on the alleged abuser in the form of an extensive background check, with special focus on their work history and criminal record. This kind of comprehensive groundwork lays a strong foundation for any litigation that might take place following the solution of the investigation. And because the private investigator is an objective third-party, the case will have integrity in a court of law.

Another specialty of a seasoned private investigator is surveillance and undercover operations. An investigator who is able to move through a crowd completely unnoticed, melting into the background while they keep an eye on the subject. Sometimes it’s just a matter of looking like you belong, and surveilling the subject from a short distance, or keeping a digital eye on the subject in the form of a camera or tracking device. Regardless, subjects behave most naturally when they do not know they are being watched. Hiding in plain sight, private investigators are able to document an abuser’s movements, correspondence, associates, and schedule to establish means and opportunity with regard to the allegations. Private investigators specializing in undercover operations have an advantage when interviewing witnesses and subjects, building a rapport that allows them to open up to the investigator. This form of subterfuge is often crucial in abuse investigations, particularly if the allegations have not yet become public knowledge. This time is valuable to an undercover operative, because when there are abuse allegations in an institution, there is often a circumventing culture of silence within it. Employees and associates are instructed not to speak to press or law enforcement regarding the allegations, there has not been need for any sort of legal gag order, and these potential witnesses will have their guard down. Private investigators and their field investigators can garner credible leads, leading to a more comprehensive, thorough investigation.

There have been many institutions, particularly in the Catholic faith, that have been accused of what has been characterized as a “cup and ball” routine in which supervisory entities will transfer employees or members of clergy accused of sexual abuse to remote branches of their network, often in different jurisdictions, to prevent law enforcement and investigators from doing their due-diligence. Private investigators are given an autonomy that is free from bureaucratic or jurisdictional chains. They can follow leads to track down multiple witnesses and can track an abuser’s movements—all across state lines.

Regardless of an alleged abuser’s reputation or status, allegations of abuse must always be handled with due-diligence and a sense of urgency. Corporations and institutions have it only in their own interest to eliminate potential predators in their ranks. The cost to retain a private investigator to conduct a thorough, objective investigation is a small fraction of the potential cost to these entities in the form of lawsuits that result from an investigation, usually on the part of survivors who were vindicated in their accounts of trauma and betrayal on behalf of mentors and leaders in their lives. Retaining the services of a qualified private investigator can go a long way to bringing predators to justice and preventing potential ruin of institutions that otherwise provide a great service for individuals in communities across America.

Carie McMichael is the Communication and Media Specialist for Lauth Investigations International. For more information, please visit our website.

Catfish: Romance Scams in 2019

Catfish: Romance Scams in 2019

romance scams
Those who met their current significant other in an age before the internet often have a difficult time understanding courtship rituals in the year 2019. Even Gen-Xers who are navigating the single-scape are having trouble adjusting to the way social media and dating apps have changed the way relationships are formed in the United States. The internet has done wonderful things for the world of dating. It reignites old flames who haven’t seen one another since high school. It connects the dots between persons across the country. It brings together people from different walks of life for a far more interesting relationship. However, the anonymity of the internet and the potential to be whoever you want to be has fostered one of the most devastating types of scams that exist in the modern world: romance scams perpetrated by “catfish”.

If you follow internet culture, you’re likely aware of a television program called Catfish: The TV Show. The series is a continuation of creator Nev Schulman’s 2010 documentary simply called Catfish. The film followed Schulman’s journey through his own romance scam, in which he met a woman online named Megan through the internet. Megan claimed to be many things: a singer, songwriter, recording artist, photographer, rancher, and part of an equally-talented family. Through their online communications, Megan led Schulman to believe that her life was very picturesque, but tragically, she has cancer. After several attempts to finally meet Megan fall apart, Schulman and his production team make the trip to finally meet her and begin to realize along the way she may not be truthful about her identity. At the end of the film, Schulman and his team realize that there was never really a Megan. “Megan” was actually a middle-aged woman, Angela, who used the internet as a way of connecting with others in her insular life. The online identity of “Megan” was not entirely fiction—Angela did have a daughter named Megan, who was a photographer, and she used that piece of personal information to craft a persona that endeared her to men and garnered their attention on the internet.

Schulman’s story is unfortunately a common thread in today’s dating world. In 2011, a year or so after the documentary first premiered, studies showed that males between the ages of 40-49 and females between the ages of 50-59, made up the largest age groups effected by romance scams or “catfishing,” 28% and 35% respectively. In most confidence tricks, frauds, or scams, the goal is simply to rob an individual of their finances for personal gain. Catfish scams are particularly ugly, because it’s not just about money. A catfish’s target is often a trusting person, a benevolent person who might experience low self-esteem, and is often isolated from others for a myriad of reasons. That person makes a real emotional investment in the catfish with the intention and belief that they will spend the rest of their lives with that person when they finally meet.

“Catfish” is an appropriate name for this particular type of scammer, according to Special Agent Christine Beining, a seasoned financial fraud agent in the Federal Bureau of Investigation’s Houston Division. Even as recently as 2017, she says, romance scams were on the rise. According to the FBI’s website, in 2016, almost 15,000 complaints which fell under the umbrella of romance or confidence frauds were reported, which is 2,500 more than 2015. Beining characterizes a catfish in search of their next victim as throwing a fishing line, “The internet makes this type of crime easy because you can pretend to be anybody you want to be. You can be anywhere in the world and victimize people. The perpetrators will reach out to a lot of people on various networking sites to find somebody who may be a good target. Then they use what the victims have on their profile pages and try to work those relationships and see which ones develop.” She offers the example of a Texas woman who ended up sending a cumulative $2 million to a man she met over the internet who “said all the right things.” This catfish targeted the woman’s strong Christian faith, and capitalized on it to pull her into his web of deception. When scammers are using social media maliciously, how are we supposed to protect ourselves in a digital age?

One of the country’s best fraud watchdogs, the Better Business Bureau, conducted a study last year on the current climate of catfishing and other forms of romance scams. While there are some discrepancies among experts as to what defines a romance scam, four consistent stages of a scam emerge:

Contacting the victims

Like Christine Beining said, scammers use the internet as a fishing line, and create dozens of fake profiles online with stolen pictures and manufactured personas in the hopes of netting a handful of victims. They hope to form an instant connection with that person, usually though an alleged common interest based on information mined from the victim’s page or profile. A potential victim loves to ski? Suddenly that catfish also loves to ski, even if they’ve never been. After a short period of time, the catfish will often encourage the victim to move the conversation somewhere else, like texting or another instant-messaging platform. This way, if their profiles are flagged by the social media platform as a scam, they will still be able to contact victims already in the net.

Grooming behavior

Like any predator, catfish depend on grooming behavior to make the victim emotionally dependent on them. They learn about the victim’s life—their hopes, their dreams, their traumas, their family drama. This stage varies in length, but it can often go on for months as catfish attempt to build an impenetrable wall of trust around themselves and the victim. Endearing themselves so allows them to have credibility in the victim’s eyes when those around them might arch an eyebrow. In a further effort to telegraph their integrity, scammers might also send gifts to their victim as one of the hallmarks of a “real relationship.” This is the stage where scammers begin to test the limits of the victim. They ask for small favors, such as small cash amounts to buy groceries or pay the phone bill so their communication may continue. It’s also the stage where catfish begin to further isolate their victims from their friends and family so the fraud can continue unhindered.

The sting

This is where the predator’s bites out of a victim’s income become exponentially larger. In any romance scam, one of the most common plot points in the catfish’s narrative is an “emergency,” likely with themselves or a close member of their family for which they need a cash sum. It can be anything from hospital bills to a plane ticket. If the victim is always willing to send money, there’s no way to predict when the fraud will conclude. This is also where victims can find themselves in real danger. Victims who are not simply bilked out of their savings can easily get mixed up in things such as money laundering or larger scale frauds as an oblivious participant. In the most severe cases, victims get on a plane to meet the catfish and meet a violent fate at the hands of a person they thought was their sweetheart.

The fraud continues

Exposing a catfish does not mean the nightmare is over. There has been an increase in brazen catfish continuing the fraud after being unmasked, this time disguised as a good Samaritan who just wants to help the victim get their money back. They can take the form of a law enforcement officer or a private investigator. The original persona might also reach back out sheepishly—admitting that they had been caught, but what originally began as a con to get their money has now become true love. It’s not uncommon for victims to allow the fraud to continue, having acknowledged the catfish’s honesty.

If you’ve been the victim of a catfish or romance scam, contact a private investigator today to learn how they can help you expose the culprit. A private investigator’s skill set and lack of any bureaucratic ladder will allow the case to move swiftly and efficiently, as time can be of the essence when chasing a scammer, who can quickly pack up their tent and move on to another social media platform before law enforcement pins them down. Private investigators also have no jurisdictional restrictions within their cases, which is particularly crucial to exposing scammers who are operating outside of the United States. They can also empower you with crucial knowledge to prevent the cycle of fraud from continuing. While it may sound callous to some, the best rule of thumb is to never send money to an individual you have never met in real life. After all, the internet is not a substitution for face-to-face interactions. If you’ve connected with someone over the internet, and the chemistry is there, a genuine person will not have the resistance and excuses that catfish often do when the jig is up.

Carie McMichael is the Media and Communication Specialist for Lauth Investigations International. For more information, please visit our website

 

Active Shooter Training in the Workplace

Active Shooter Training in the Workplace

Active Shooter Training in the Workplace

active shooterSo far this year, there have been 297 mass shootings in the United States. Seeing as how November 1st is the 305th day in the calendar year, it would appear that the spike in active shooter events in recent years will not slow down any time soon. While schools redefine their safety protocols and implement programs that prepare students for these events, employers throughout the United States are also beginning to understand the importance of preparing their workforce for an active shooter event. The year of 2017 broke the record for the most mass-shooting deaths every recorded—112 deaths, well exceeding the amount in any other year in recorded history. In 2018, the Bureau of Labor Statistics published a report that showed another spike in workplace homicides. According to them, there were 83 workplace homicides in 2015, a number that skyrocketed to 500 for the year of 2018 alone. A terrifying 79% of those cases were the result of an active shooter. As a result, the desire for employee active shooter training has never been higher, with NPR reporting that as of 2016, 75-80% of employers are seeking qualified active shooter training to protect their workforce. The Department of Homeland Security has a myriad of resources on their website for dealing with active shooters. One of them is a pocket-card that outlines the characteristics of an active shooter event, “Victims are selected at random. The event is unpredictable and evolves quickly. Law enforcement is usually required to end an active shooter situation.”  Active shooters may fire at random, using no discernible criteria for their victims, but that arbitration should not be misunderstood. Perpetrators are deliberate, focused, and simultaneously detached from their task, creating a fatal perfect storm. active shooter The Department of Homeland Security also have their own guidelines to how private citizens should react during an active shooter event: Run—hide—fight. Run At the onset of an active shooter event, individuals should immediately identify an escape route, most likely a fire exit. While keeping their hands visible, they should leave their belongings behind and run to safety as quick as possible, assisting others if needed. Hide Once they’ve reached safety (or if escape is impossible) the Department of Homeland Security recommends hiding immediately in a location out of the shooter’s line of sight. Individuals should block the door or manner of entry into their hiding spot and silence their cell phones and pagers. Sit very quietly and wait for first-responders to find you. Fight The Department of Homeland Security lists this option as an absolute last resort in the event of an active shooter in the workplace. Your life should be in immediate danger, and you should be well-positioned to act with physical aggression and incapacitate the shooter. Many third-party security companies also endorse the methods of Homeland Security, but there are others that take a different approach. Laurence Barton, a workplace violence expert, recommends employers seek training programs that promote a culture of safety and preparedness—not fear. In lieu of careful research regarding active shooter training, many employers opt for the simple, cost-effective route by showing employees the prolific training video produced by the city of Houston, which features graphic depictions of employees being shot. “When some companies have created these videos that show blood and guts—that’s not in any way the kind of learning that stays with people. In fact, it repulses them…employees get scared,” Barton says, “I just don’t believe scaring people is the way to teach them. It just promotes anxiety.” Aric Mutchnick, the president of a risk management firm called the Experior Group, agrees with Barton, “Cops or military guys like to have it very realistic because they think the more real it is, the more they can find out. That is true if you’re a tactical team, but you can’t apply tactical training to a civilian population.” Mutchnick points out that the equal distribution of choice laid down by the Department of Homeland Security—run, hide, or fight—is not only dangerous, but unrealistic, “It should be 90 percent run, 8 percent hide until you can run, and then as for fight, really? Are you kidding? I don’t know how you would even train on that.” Companies like Experior Group also recommend that a base knowledge of firearms should also be part of the training, not so employees can operate firearms, but so their knowledge can inform their escape. Civilians who are ignorant of basic firearm operations can easily be paralyzed by fear because they are uncertain of a weapons range or magazine size. This gives an active shooter ample opportunity to change their position and reload without fear of retaliation. active shooter Frozen with fear—it’s something we can all relate to. After all, many working people today are not acclimated to the viable, potential threat of an active shooter in the workplace. Aggressive, hyper-realistic training can compound the anxiety triggered by the increased probability of being involved in an active shooter event. That’s why Barton and other like-minded professionals epitomize on a feeling of safety, with straightforward and honest training that will leave any employee feeling prepared. “The chief learning officer has a huge opportunity to lead a discussion about workplace safety. [Employees] are yearning to be informed about how the world is changing and how threats get processed at work…You want to have a subject matter expert who works with law enforcement and can speak the language of all employees.” One thing that employers often overlook when considering active shooter training programs is a company that curtails the training to their individual brick and mortar location. As part of what they call “red ball drills,” Experior Group will evaluate the property to identify the specific issues that might present during an active shooter event. “The problems of a commercial building are not the problems of a hospital or a school,” Mutchnick says. “Run, hide, fight is s giant blanket they throw over the problem as a response, but it doesn’t deal with any site-specific issues.” All training dispensed by Experior Group is tailor-made for the culture and physical context of any business. When these issues have been identified, the instructor can direct employees the best manner of exit, should they have that option. active shooter The last thing to consider when choosing an active shooter training program is the credibility behind the operations. Some of the most prolific risk management and security companies are headed by former members of law enforcement or the military. This experience with weapons and chaos not only validates the content for many employers, but also leaves employees empowered with credible knowledge. However, former navy seals and swat team leaders are not the only option when it comes to the instructor. Lauren Perry, the vice president of operations for Trident Shield, often addresses training groups. Her specific style and feminine touch opens the dialogue in any room, allowing individuals who might not respond to an aggressive, alpha males to remain engaged in the training, retaining the information that might one day save their lives. Many employers often grapple with the cost of active shooter training for their employees. With many training programs averaging in the realm of thousands of dollars, employers often question whether or not active shooter training is even necessary. The Occupational Safety and Health Act of 1970 says, “Employers have the responsibility to provide a safe and healthful workplace that is free from serious recognized hazards.” The rise of active shooter events in the United States is most certainly recognized, with every event further inflaming the political world and conversations surrounding gun control. Given the statistics we’ve seen here, it appears as though it’s not a matter of if an active shooter even will occur, but when. Carie McMichael is the Communication and Media Specialist for Lauth Investigations International. She regularly writes on private investigation and missing persons topics. For more information, please visit our website. 

Archives

Categories

Surveillance Capitalism Online and in Real Life

Surveillance Capitalism Online and in Real Life

Surveillance Capitalism

In the first decades of the 21st century, we have witnessed advances in technology unprecedented in human history. It was once costly and cumbersome to rely on technology to work for you. The reality today is astonishingly different. To view this article, you likely performed a Google search (or whatever your search engine of choice) and clicked through several links to get here. Advances in technology have made it possible for the search engine to collect the data you spread through the internet and use data to determine what kind of advertising you’ll see in the side banners of the websites you visit. For many in America, our phones and our cameras are the same device. Clunky security systems are a thing of the past, and spy cameras can be made as small as a button. This new reality has a name: surveillance capitalism.

There was a time in the United States where changing your identity was as simple as grabbing what you can carry, hopping a train or hitchhiking to a new location, and introducing yourself to others under a different name. Now, in the world of surveillance capitalism, almost every piece of data you put out in the world, either online or on an official form, will likely be entered into a database where you can be tracked by anyone with the proper clearance. At Lauth Investigations International, we use databases like these every day to perform skip traces, asset searches, and background checks. And then there’s the omnipresent threat of “Big Brother,” a moniker often attributed today to the government agencies, law enforcement, and other surveillance platforms who are constantly watching us on what can only be imagined as an IMAX display of viewing screens. Not to mention the entities that might be surveying us and our information in a manner not exactly above reproach, such as Google, Facebook, and every demonym of foreign hackers who see America’s obsession with its surveillance culture as its Achilles heel.


bali couple callIt’s not all doom and gloom, of course. Humans in America and abroad have reaped the top-tier benefits of surveillance capitalism, such as using the “Find My iPhone” to locate someone who has been reported missing. In the recent high-profile case of a missing young woman from Brooklyn, Iowa, Mollie Tibbetts, law enforcement were able to use data collected by Mollie’s Fitbit to piece together her last hours. This information would eventually lead investigators to the man who is now charged with her first-degree murder. Just this past week, an American couple
was saved in Bali after a scooter accident left them both without a way to call local authorities for help. Mikey Lythcott, 36, was able to turn on the roaming data on his cell phone, and with a single bar of service, managed to pen a desperate call for help to his Facebook friends. The United States Consulate in Bali was contacted, and help was sent to the couple’s location. Knowing how well technology can work for us makes it that much more frustrating when we feel it has violated our privacy, such as the aforementioned data-mining that helps target you for specific advertisements. 

In addition to impacting the way Americans live their lives, surveillance capitalism has already become a constipator for many well-established areas of the economy, such as journalism, transportation, and—in a fascinating irony—private investigations. While surveillance capitalism has certainly had a significant impact on American culture, there are many who have a misunderstanding of its omniscient power. In a recent article titled, “A Private Investigator on Living in a Surveillance Culture,” a private investigator named Judith Coburn, shared an anecdote where a client completely underestimated the available technology:

“Two lawyers working on a death-penalty appeal once came to see me about working on their case. There had been a murder at a gas station in Oakland 10 years earlier. Police reports from the time indicated that there was a notorious “trap house” where crack addicts were squatting across from the gas station. The lawyers wanted me to find and interview some of those addicts to discover whether they’d seen anything that night. It would be a quick job, they assured me. (Translation: they would pay me chump change.) I could just find them on the Internet. I thought they were kidding. Crack addicts aren’t exactly known for their Internet presence.”

Frustrations like these are rampant in investigation firms across the country, but the advancements in technology do not prevent the use of tried-and-true analog methods, such as old-fashioned tailing surveillance, or telephone ruses without the use of any fancy phone surveillance tech.

The concept of the “right to be forgotten” was forged in the European Union, with individuals voicing their concerns about their inability to “determine the development of their life in an autonomous way, without being perpetually or periodically stigmatized as a consequence of a specific action performed in the past.” Given the surveillance tech available to citizens, both private and public, it sounds like an unattainable status for anyone who uses social media, the internet, or walks by a security camera on their way to work every day.

In February, 2018, NPR published an article titled, “Google Has Received 650,000 ‘Right To Be Forgotten’ Requests Since 2014,” detailing the mountain of requests fielded by the multi-national technology company to remove certain URLs from their search results on the condition the content is “inadequate, irrelevant or excessive in relation to the purposes of the processing.” The article goes on to say this means it is up to the discretion of a private company to determine what is in the best interests of the people who use their services, which is a tall-order in a capitalist society. Whether the policy proposed in the EU will ever be universally enforced—both in Europe and around the world—education regarding this newfound culture in which we find ourselves is paramount to protecting yourself and your loved ones from the evils of surveillance capitalism.

 

Carie McMichael is the Communication and Media Specialist for Lauth Investigations International, a private investigation firm based in Indianapolis, Indiana–delivering proactive and diligent solutions for over 30 years. For more information, please visit our website.

Using a CNC to Protect Your Business

Using a CNC to Protect Your Business

Using a CNC to protect your business means the peace of mind that your trade secrets are safe.

Using a CNC to protect your business means the peace of mind that your trade secrets are safe.

If you own your own business, you know finding the right people to build your company is vital. One “weak link in the chain,” as they say, can tear a business down to its foundation. And as such, it’s not only important to hire the right people, but also protect your business from being exploited in the event a former employee might expose trade secrets. If it is your business’ practice to require a signature of an employee on a covenant not to compete, you should consider having a private investigator on retainer in order to vet any suspicions of non-compete violations.

Often referred to as a non-compete clause, a covenant not to compete or CNC is designed to protect an employer’s business against future competition or theft of trade secrets by a former employee. In essence, the CNC prevents a former employee, terminated or otherwise, from using a business’ trade secrets to either work for or start a rival business. Violators of CNC have an intimate knowledge of a particular business and can use that information to destroy it. In addition to exploiting the successes of a company by using the same strategies, a violator uses their knowledge to exploit the weaknesses of a company. They know where the vulnerable spots are in their business model, and violators can correct this process in the rival business, as well as, target their former employer in advertisements.

These legal contracts have a history going back as far as the 15th century, when English common law refused to enforce the Renaissance-era CNCs on the grounds they would place too many restrictions on trade. There have been many arguments made CNCs also interfere with America’s capitalist economy, placing restraints on the free-market standards in the United States. There are only a few states in the union completely prohibiting the use of non-competes, including California, Montana, North Dakota, and Oklahoma. One of the industries where CNCs are most common is the media. Most media-conglomerates force employees to sign CNCs at the time of hire to prevent them from sharing delicate information about media markets upon leaving their position. Another common industry is finance, especially Wall Street, where a person can literally be indicted for knowing too much, having been charged with insider-trading. Many might remember reading about CNCs back in 2005, when Microsoft and Google took a former employee, Kai-Fu Lee, to task by enforcing his CNC after leaving the company. CNCs are everywhere, and as such, businesses would be wise to employ external investigators to get the hard facts on CNC violations.

As was the case with FMLA fraud violations within a company, having an external investigator—like a PI—on retainer, will allow the company to protect itself in the event they believe a former employee has violated their CNC. The fallout from CNC violations can be ugly, with former employees insisting, not only did they not violate their CNC, but also they are being persecuted by their former employer. A private investigator is a third-party, which means they are well within their means to be objective. A private investigator’s loyalty is to the truth, as such, you can rely on cold-hard facts to bolster a case against a CNC violator. This objectivity comes in handy during litigation when enforcing a CNC.

The former employee cannot claim their employer is biased in their fact-finding, because they did not conduct the investigation. While a business can sue a former employee for violation of a CNC, it is not a criminal matter, so a business cannot ask law enforcement to investigate. Luckily, private investigators often have a resume bearing similar experience to law enforcement, as well as ,a very similar set of tools to find answers.  They can locate witnesses, witness statements, videotapes, photographs, and acquire documents to build a prima facia case against a CNC violator. Whatever the circumstances, having an objective external investigator on retainer will provide businesses with the assurance they have conducted all necessary steps to safeguard their company.