A DIVERSE BOARD COULD HAVE PROTECTED THERANOS

A DIVERSE BOARD COULD HAVE PROTECTED THERANOS

theranos-elizabeth-holmes-01
Elizabeth Holmes was once the shooting star of Silicon Valley. With a lifelong hatred of needles, she set out to turn the world of healthcare on its ear by developing a more efficient and inexpensive way to draw and test blood in order to screen for serious diseases. In a world where access to affordable healthcare is a hot-button issue, Holmes was slated to become a revolutionary of her own making, with
Forbes magazine dubbing her the “youngest self-made woman billionaire.” Now, Holmes is a pariah in Silicon Valley and heads are left spinning in the wake of the Securities and Exchanges Commission having issued a 24-page document revealing just how her duplicity left investors in Theranos’ research out $9 billion dollars.

To litigators and legal commentators, Holmes’ fall from grace is a familiar narrative. Intention to defraud aside, they say the roads in Silicon Valley are paved with ambitious young entrepreneurs who are more than willing to stretch the truth in order to sell their business. They have the determination to succeed and the naivety their deception will be forgiven once their investors are flush with wealth from returns. Since this has happened before and will likely happen again, how was Holmes able to mislead investors under the radar of Theranos’ board of directors? A breakdown of the board’s composition might hold the answer.

Prior to the release of the SEC complaint, the members of the Theranos board of directors had impressive backgrounds that might leave little doubt in their abilities to supervise the good of the company. There were former politicians such as U.S. senators and former cabinet members, who dealt with high-stakes situations every day in their capacities. There were former executives with previous experience in making decisions and placing trust in competent individuals. But despite their differences in resume, they all had one glaring similarity: They were all white men, over the age of 65. Research has shown while their backgrounds might have been impressive, their homogenous nature may have played a huge role in preventing them from identifying Holmes’ fraud before it was too late.

Diversity in Tech 2
According to
Prof. Andras Tilcsik, who holds the Canada Research Chair in strategy, organizations, and society at the University of Toronto’s Rotman School of Management, diverse boards are what prevent problems in large companies, “Companies with more gender diversity on their boards, for example, are less likely to reissue financial statements because of error or fraud. Diverse groups also tend to consider more factors when making a decision. Racially mixed juries deliberate longer, share more information, discuss a wider range of relevant factors and even make fewer mistakes when recalling facts about a case. Ironically, lab experiments show that while homogeneous groups do less well on complex tasks, they report feeling more confident about their decisions.” What the research is telling us is this: The more a person looks like us, the more we are willing to trust them. The attention to detail that might have been shown by a more outwardly diverse board was not shown by the Theranos board of directors in the case of Elizabeth Holmes. The similarities shared between members of the Theranos board likely created a false sense of security and allowed Holmes’ deceptions to go unnoticed.

 

Diversity in expertise prevents boards from becoming too comfortable with business practices and makes them open to new ideas. Given the research on homogenized groups, it is reasonable to think this group of white men with an average age of 76 may never have questioned the veracity of Holmes’ research and her promises to deliver the next big thing in medical technology. This has happened before and is likely to happen again, because while the source of the fraud is often dealt with and forgotten, there is no examination of how board composition can enable fraud.

Carie McMichael is the Communications and Media Specialist for Lauth Investigations International, writing about investigative topics such as missing persons and corporate investigations. To learn more about what we do, please visit our website.

Why Private Investigators Have an Advantage Over Police

Why Private Investigators Have an Advantage Over Police

Why Private Investigators Have an Advantage Over Police

 For months, the family of 5-year-old Lucas Hernandez wondered if they would ever have answers in his mysterious disappearance. On the day he disappeared, he was left in the care of his father’s girlfriend, Emily Glass. In the missing persons report, Glass told investigators on February 17th, 2018, she saw Lucas playing in his room around three in the afternoon. She then took a shower and fell asleep. When she awoke around six in the evening, Lucas was nowhere to be found.

Law enforcement in Wichita investigated for months, unearthing no credible leads into Lucas’ disappearance. Months later, on May 24th, locals were shocked after a private investigator blew the case wide open by informing law enforcement Emily Glass had led them to the decomposing remains of little Lucas under a nearby bridge. Why would Glass, after dealing with law enforcement for months, only then break her silence regarding her knowledge of the little boy’s body? The answer is as simple as this: Private investigators have advantages law enforcement do not when it comes to conducting concurrent independent investigations in criminal and missing persons cases.

So how is a private investigator’s approach different from the approach of a local, state, or federal law enforcement agency? The first thing to consider is the caseload of most law enforcement agencies. From the moment an initial report is made, in both criminal and missing persons cases, law enforcement have the meticulous and overwhelming task of gathering evidence to build a case that will secure justice on behalf of the victims and the state. Crime scenes need to be mined for evidence by medical examiners and crime scene technicians. Detectives and other investigators need to canvass witnesses—sometimes dozens of people—in the area who might have seen or heard something. Now imagine the workload of one case multiplied by 40 or 50 times. An audit conducted in Portland Oregon in 2007 reviewed law enforcement data from Portland itself, and nine other surrounding cities, to conclude the average caseload for a detective in Portland was a median of 54. This is compared to a 5-year average of 56 cases. Knowing statistics like these are similar in law enforcement agencies all across the country, it’s easy to see how the progress of cases might slow to a crawl. Agencies are overwhelmed, and this is where private investigators have the advantage. Private investigators may only handle one or two cases at a time, giving them their full focus and attention. Wichita law enforcement might have faced similar challenges of an overwhelming caseload when it came to investigating Lucas Hernandez’s disappearance. An article released by the Wichita Eagle in mid-December of 2017 revealed, as of publication, there were still ten homicides from the year 2017 remaining unsolved as the new year approached.

Another compelling advantage for private investigators might initially sound like a disadvantage: Private investigators have no powers of arrest. It seems counter-intuitive that a private investigator may use the same tools as law enforcement, ask the same questions, and may even come to the same conclusion as law enforcement without the ability to arrest a suspect for the crime. However, the case of Hernandez showcased exactly why a private investigator—and their inability to arrest—broke the case wide open. Jim Murray of Star Investigations told KMBC News in Kansas, “We’re less of a threat sometimes to people that we’re talking to because we have no powers of arrest,” said Jim. “We can’t arrest them.” This could explain why Emily Glass finally led a private investigator to Lucas’s body, because she knew they could not put handcuffs on her in that moment.

Los-Angeles-Private-InvestigatorUnfortunately, family members and locals will never have the truth about what happened to Lucas. In the wake of the private investigator’s discovery, autopsy reports were found to be inconsistent with what Glass told both police and the PI, but before the People could build a case against her, Glass was found dead from an apparent suicide. However, were it not for the efforts of the private investigator, Lucas’s father may never have had answers in his son’s disappearance.

Carie McMichael is the Communications and Media Specialist for Lauth Investigations International, writing about investigative topics such as missing persons and corporate investigations. To learn more about what we do, please visit our website.

Archives

Categories

BACKGROUND CHECKS

BACKGROUND CHECKS

Rooting Out Thieves in the Workplace 

It is estimated 30% of employees steal from their employer.

It is estimated 30% of employees steal from their employer.

Most of us have dealt with a thief during our lifetime. Devious and sneaky, some thieves behave as if stealing is an art. It is usually a theft exposing them; however, many times, they can strike numerous times before getting caught. When theft happens in the workplace, it can not only be a costly lesson but the cause of a business failing.

An estimated 30% of employees steal from their workplace affecting all types of businesses. For instance, if you are running a restaurant with $1 million sales annually, at only 4% theft within the company, your company would be losing $40,000 a year!

Employee theft costs U.S. businesses over $200 billion in annual losses. Not only are companies trying to prevent the public from stealing items, inventory, assets, and ideas from a business, they must also combat thieves on the inside. Unfortunately, 75% of employee-related crimes go undetected.

Theft can take many forms, such as: stealing money, embezzlement, unauthorized use of business or customer identity, and theft of intellectual property, such as cases of patent or trademark infringement.

Combating Theft is Knowing How Employee Theft Occurs.

Cash

Employees who have access to a cash register is the most common way employees steal from companies. If unsecured, petty cash drawers or boxes, can be an easy target for thieves.

In addition, an employee can quote a higher price than the actual price of an item and keep the difference at the point of sale.

If employees have access to credit card information or checks, theft can happen as easily as sticking a few checks inside a folder, costing the owner thousands before it is detected.

Checks and Fraud

Most banks do not verify a signature on a company check making it very easy to sign and cash a check.

Credit card fraud is a number one threat to companies and consumers because most credit card holders admittedly do not check each line item on their credit card statement.

According to the U.S. Small Business Administration (SBA), companies with less than 100 employees, lose approximately $155,000 as a result of fraud each year, a much higher rate than large companies.

Payroll

Employees may often perform actions and falsify records for work they didn’t do, such as requesting reimbursement for travel and other expenses unrelated to work. Employees may also set up fake payroll accounts for workers who have been terminated or retired. Creative thievery abounds.

Time Sheets

Time theft or “Buddy Punching” is a very popular way timesheets may easily be falsified. Individuals complete this theft by having one employee punch another employee in or out for the other.

Excessive breaks, malingering, surfing the Internet, chatting with employees or taking personal phone calls are other ways time theft occurs. While some of these things may not at first be thought of as stealing, all these actions, or inactions, can affect the bottom line and be taking advantage of an employer.

Vendor Accounts

Thieving employees will set up fake vendor accounts, submit phony invoices and issue checks for the false vendor. These checks can then be signed over to themselves and deposited. In addition, a variation would be paying a vendor $500 and writing a check to themselves, expensing the entire $500 to the vendor.

Merchandise

Loss of inventory can happen in the merchandise distribution process but can also happen before merchandise is made available to the public. Many times, employees will take items from a warehouse or newly arrived items before they are scanned into inventory software. Employees have even been known to steal entire shipping trucks containing merchandise headed to their employer’s company.

Supplies

Some employees steal smaller items such as typical office supplies, but furniture and equipment are not off limits for a thief.

Information

Many employees steal information to benefit themselves or a competitor. Types of information include: office memoranda, proprietary products, customer lists and/or other confidential data. Theft can occur by email, printing, or copying information to a flash drive or cell phone, or simply carrying it out in a purse or folder.

Sometimes, theft can be subtler, such as luring customers away, purposefully providing poor service, even spreading rumors to damage a company’s reputation and cause a down-turn in business.  All are considered losses.

While there are ways to combat theft within your company, ultimately identifying the thief before they are hired is the most effective way to reduce the occurence of theft.

The SBA recommends:  “One of the first steps to preventing fraudulent employee behavior is to make the right hiring decision.”

Background checks are a good practice for any employer, large or small, especially for those employees who will be handling cash, high-value merchandise, or have access to sensitive customer or financial data.

For over twenty-years, Thomas Lauth of Lauth Investigations International has been working nationwide and helping educate employers on methods used to combat theft.

“The first and most effective way to address theft in the workplace, is to conduct an extensive background check,” says Lauth. “A background check can provide insight into an individual’s behavior, character, and integrity.”

Which Types of Background Checks Should You Conduct?

According to the U.S. Chamber of Commerce, upwards to 30% of business failures are caused by employee theft. Thus, conducting effective, extensive background checks helps to mitigate your risk of hiring objectionable or even dangerous employees.

Not all background checks are the same. As you build a profile of your future employee, there are several kinds of background checks you should consider. For example, a criminal background check is different than checking on an individual’s credit score or military service, these require consent. A criminal background check does not require consent; however, some states have laws restricting how you use the information collected during a criminal background check.

Private investigation firms like Lauth Investigations offer complete background checks while helping you comply with the law.

Protecting Your Legal Liability with Background Checks

Smaller businesses often forego background checks for two reasons: 1. A false sense of trust and security developed by business owners working too closely with employees. 2. Most businesses do not understand the legal liabilities associated with the failure to conduct employee screening and background checks.

Any business where employees provide a direct service and interact with customers, such as contractors or daycare providers, is liable if an employee does harm to a customer and the employee has a history of wrongdoing.

A company, big and small. may not recover from this kind of lawsuit.

Choosing the Right Company to Conduct Background Checks

Protecting the interests of your workplace and customers while reducing potential liability is of utmost importance; therefore, it is vital to select a company you can trust to conduct the background screening both efficiently and thoroughly.

While employers can do some background checking of their own, working with an experienced and reputable company can ensure the reliability and thoroughness of the background screening.

Purchasing instant public records found online is not appropriate for conducting potential employee background checks. Most certainly if your hiring decision is based on tpublic record data, your company could land in hot water.

Most public databases do not fact check, clean up or refresh their data providing completely different information than received from an investigative firm experienced in conducting professional, legal and full background screening.

Private investigators have access to databases that can definitively determine if a potential employee has a criminal background.

Private investigators have access to databases to determine if a potential employee has a criminal background.

 

A reputable company providing background screening services will ensure the information you receive is current and accurate.

If a hiring decision is made based upon information found in the background check, in most cases, the company must inform the potential employee of the source used to obtain the information for the background checks (which is where using public databases can get your company in legal trouble).

What can you expect from a professional background check? According to Lauth, it’s all in the details and you pay for what you get. If you want detailed, accurate information, you will choose a Private Investigation Background Search.

Unlike a personal background search using public databases, private investigators have access to several databases providing a variety of information.

  • Employment history: This search will bring up employment records to include all positions held, making it easier to find discrepancies in a resume. It will also include salaries associated with the positions.
  • Academic and professional affiliations: Qualifications to include academic history and certification, even if the person did not complete the program.
  • Criminal records: Including a detailed outline of all criminal activity from traffic warnings and tickets to arrests and convictions. Also, these include jail time served and fines paid.
  • Financial Standing: Reflects all liens, judgments, bank accounts, current and previous property ownership, repossession of vehicles or other personal property, NSF checks and bankruptcies.

In addition to the typical information received through a personal background check, a private investigator will include:

  • Worker compensation claims an individual has filed. This can help determine the character of an individual by looking at the number of claims they have filed which could reveal a person is dishonest and fraudulent.
  • Ascertain causes of accidents or any criminal activity. DMV reports will show accident dates and basic information but do not reflect the cause. Private investigators can provide the cause behind the accident and whether criminal activity was involved.
  • Information on business and personal partners.
  • Analysis of all findings.

Relying on an Internet search is risky. A professional background screening will be more in depth than simply entering a name in a database. When a company’s future is at stake, the only way to go to obtain concise information needed to make informed decisions is a professional, private investigations extensive background check.

 

SCIENCE OF GENEALOGY DEFROSTS INFAMOUS COLD CASE

SCIENCE OF GENEALOGY DEFROSTS INFAMOUS COLD CASE

SCIENCE OF GENEALOGY DEFROSTS INFAMOUS COLD CASE

By Carie McMichael

joseph-deangeloCalifornia law enforcement are celebrating a break in a thirty year old cold case this week, as an an arrest has been made in the case of the Golden State Killer. However, the methods investigators used to identify the suspect have civilians debating whether or not the suspect’s civil liberties were violated.

Investigators used DNA obtained from ancestry and genealogy platforms to locate a suspect matching the profile of the perpetrator. Joseph James DeAngelo, 72, was arrested Tuesday morning, officially charged with 8 counts of Homicide committed in a decade span, across 3 California counties. They hope to eventually link DeAngelo to 12 murders and 45 rapes committed between 1976 and 1986.

DeAngelo worked as a police officer for 6 years during the original investigation—a relevant detail, as investigators suspected the perpetrator had law enforcement knowledge.

At the end of 1986, when the string of assaults and murders attributed to the Golden State Killer officially ended, the science behind DNA forensics in crime scene investigation was in its infancy. The first case in which DNA evidence secured a conviction in the UK in 1986 not only led investigators to the true perpetrator, but also cleared an innocent suspect whom had been previously implicated. In the last thirty years, the technology has become so ubiquitous DNA kits are available over-the-counter in drugstores all over the country. The technology has matured so immensely, the genetic profile of a single football can be identified to prevent counterfeiting during the Super Bowl. And now, the newest trend in DNA technology may have helped Sacramento authorities identify the infamous Golden State Killer.

636560071434423354-GettyImages-912389900Websites like Ancestry.com and 23andme.com have made it easier than ever for people around the world to find out more about their ancestry and genetic makeup. A buccal swab mailed off to a genetics lab can return results of information on everything from the palette of colors in your ancestors’ lineage to the medical problems running in your immediate genetic line. Sacramento authorities have released information advising the DNA provided to these services for informative purposes was one of the chief investigative tools in identifying DeAngelo as a suspect.

According to lead investigator, Paul Holes, GEDmatch was the database utilized leading them to DeAngelo. GEDmatch is a research tool using a database of voluntarily supplied DNA samples for researchers and genealogists. “We were able to generate a DNA profile we uploaded into [a] … database of other similar types of profiles,” Holes told KGO. “And then from there, we get a match list of how much DNA these various other individuals share with the crime scene DNA. The more DNA they share, the more closely related they are.” After obtaining information from the GEDmatch database, they placed him under surveillance. They collected several samples of his discarded DNA, which they were able to match to a DNA profile compiled from samples collected at the plethora of crime scenes, subsequently leading to DeAngelo’s arrest.

Familial DNA searches are becoming more common in forensic science, and as such, more and more controversial. As was the case in identifying DeAngelo, investigators often submit a finite number of genetic markers into a database of genetic samples and the database will return a list of possible results. Results are then cross-referenced with other databases and records to thin the suspect pool. These practices are controversial because large percentages of the country’s population share the same genetic markers, yielding ambiguous results for investigators. Many civilians feel as if the method leaves their civil liberties vulnerable, as though their genetic profiles might make them guilty by association. Currently, the only legislation preventing an individual from being discriminated against, based on their genetic information, is the Genetic Information Nondiscrimination Act of 2008.

dna-forensic_2070437bAt a press conference on Wednesday, April 25th, local law enforcement did not release specifics about how the DNA obtained from GEDmatch was used to locate DeAngelo. Instead, they focused on how a more comprehensive DNA databank in California could have led investigators to DeAngelo sooner. The existing legislations, Proposition 69, was passed in 2004 and allows law enforcement to collect DNA and fingerprints at the earliest stages of criminal proceedings—beginning when the suspect is arrested, as opposed to post-conviction collection. Despite controversy, the law was upheld earlier this month.

According to Thomas Lauth, Lauth Investigations International Inc., whose firm specializes in unsolved homicides and missing persons, “Our firm must always pivot to innovative ideas and think of ways to gather DNA from a potential suspect.” Lauth further said, “Search warrants are required for human samples. However, if you can retrieve a sample from a discarded cigarette or beer can, it may prove positive. Sometimes though, obtaining positive-testing samples can be tricky. The labs could require numerous samples to finally get a positive and readable match.”

On April 28th, in his first court appearance, Joseph James DeAngelo was formally arraigned on two of the eight counts of murder with which he is formally charged. He did not enter a plea and bail was denied. His next court appearance is scheduled for May 14th, 2018.

 

Virtual Kidnapping Scams

Virtual Kidnapping Scams

By: Kym Pasqualini, Lauth Investigations Feature Crime Writer

Kidnapping

You receive a phone call and hear the voice of someone you don’t recognize. They tell you they have your child and will kill them unless you pay a ransom. They direct you not to call police or you will never see your child again.

What would you do?

You tell the person on the other end of the phone not to hang up. You don’t want to disconnect with the one person that can reunite you with your child. You plead for your child’s safe return. “Please don’t hurt her. I will do whatever you want,” you cry.

They demand you go to the bank and wire a ransom of several thousand dollars. Do you call the police? Do you pay the ransom and hope some thug will return your child to you safe?

A child going missing is every parent’s worst nightmare. For those who do have a missing child, living with such ambiguity is said to be the most traumatic of human experiences.

Sounds like a situation that only happens in the movies, right? Or, something only happening to the wealthy.

According to Newsweek, the Seattle Police Department is issuing warnings to parents advising scammers are targeting parents and demanding a ransom in exchange for the safe return of children they kidnapped . . . well, virtually kidnapped. Police throughout the country are following suit.

kidnapped child

On March 8, 2017, in Ravensdale, Kings County, approximately 30 miles southeast of Seattle, a mother drops her children off at the school bus. Shortly thereafter, she receives a phone call from a man who threatened to kill her child if she didn’t pay a ransom.

The mother was able to reach out to the school to make sure her children were there. The school confirmed they were safe.

King’s County Sheriff’s Office told ABC News, this was the first reported incident in their jurisdiction.

In another case, a woman called a father “hysterically crying” claiming to be his daughter and stating she had been kidnapped. A man then got on the phone and told the dad if he didn’t pay a ransom, he would hurt his daughter.

Officers in Denver have responded to several reports of kidnappings. In a press release issued by the Denver Police Department, police say the caller demands a monetary payment in exchange for the release of the victim’s child. The caller dials the parents in the afternoon and demands the ransom to be wired to a bank.

After investigating the recent incidents in Denver, they determined the kidnappings were false and all children involved in the incidents were found safe.

Virtually Kidnapped Daughter

On Monday, April 16th, Sean Hollister was at his residence in Longmont, Colorado, about 15 miles northeast of Boulder, and received a frightening call from his 11-year old daughter who he thought was at school.

“My daughter was in tears, sobbing,” Hollister told the Times-Call. “I thought she was in trouble or something. She said, ‘Dad, I’m sorry I let this happen,’ which is exactly what she would say,” Hollister said.

“I said, ‘What’s wrong,’ and I offered up her name, so he knew my kid’s name,” Hollister said a man got on the phone and told him, “I got your daughter in a truck. She is on her way to Mexico.”

When Hollister told the man he was calling the police, the girl came back on the phone screaming. “Daddy, they are cutting me. Don’t call 911.”

Hollister was able to call police on his cell phone. “The caller told Hollister to get his wallet and identification and promptly leave the house.

Victims of “virtual kidnapping” describe the incident as traumatic.

Victims of “virtual kidnapping” describe the incident as traumatic.

Hollister’s postman was in the yard when he walked outside. “I’m mouthing ‘Help me,’ and he is freaking out,” said Hollister.

Longmont police showed up at his home fast and they took over from there and the caller hung up. Officers quickly determined Hollister’s daughter was safe.

The traumatized father would later find out the callers were trying to pull off a “virtual kidnapping” scam.

“The gap between the cops getting there and finding out my daughter is okay was terrifying,” said Hollister. “Who would think someone would be that cruel?”

Hollister’s caller had a Mexico number, but police say it is possible the caller was local and hijacked the number to appear like the call was made from out of the country.

In yet another case, a woman received a frantic call her brother had been kidnapped, injured and bleeding out, demanding thousands of dollars through a wire to return him safely. She was able to reach her brother on another phone and never paid any money, but a clear sign anyone can be a victim of this type of horrific scam.

According to FBI kidnapping expert, Agent Eric Arbuthnot, several organizations use these scams regularly to make money.

“Thousands of dollars in ransom,” said Arbuthnot. “And you’re talking about a criminal organization that is capable of doing more than one kidnapping at a time.”

According to Arbuthnot many of the cases have been happening on the West coast and along the border involving criminal organizations from Mexico, some claiming to be members of the cartel.

The FBI has seen recent increases in California, Nevada, New York, and Texas.

Monroe Police Department in Connecticut said by using social media, scammers can identify a victim, look up relatives, and reference names of family members and friends to make the call appear legitimate.

FBI Supervisory Agent Christopher Johnson said his office in St. Louis, Missouri deals with these types of crimes. “Scammers will often mention specific facts about the parent or victim, likely from information they were able to obtain online.”

Authorities say about one in five kidnapping cases are successful resulting in the criminal getting their ransom and not getting caught. While extortion has been around for decades, virtual ransom kidnapping calls are increasing around the country.

FBI Special Agent Glenn Milnor warns parents about virtual kidnapping.

FBI Special Agent Glenn Milnor warns parents about virtual kidnapping.

With this emerging scam, the FBI has launched a nationwide campaign to warn parents to fight back against “virtual kidnapping.”

If you receive a virtual kidnapping ransom call…

Unlike traditional kidnapping schemes, a “virtual kidnapper” has not actually kidnapped anyone. According to the Federal Bureau of Investigation, if you receive a call from an individual demanding a ransom for the safe return of a kidnap victim, it is suggested you quickly evaluate the following to determine if you are receiving a legitimate ransom call:

  • Caller insists you stay on the phone.
  • Call does not come from your child’s cell phone.
  • Caller tries to stop you from contacting the kidnap victim.
  • Call includes demand for ransom to be paid via wire transfer.
  • Ransom amounts may decrease quickly.

Knowing what to do

Police say it is best to hang up the phone; however, if you continue the conversation pay attention to the following:

  • If you engage the caller, don’t call out your loved one’s name.
  • Deliberately try to slow the situation down and ask to speak to your child directly.
  • Ask “proof of life” questions like, “How do I know my loved one is okay?”
  • To gain confirmation if your child is an actual kidnapping victim, ask questions only your child would know such as the name of a pet.
  • Listen very closely to the voice of the person speaking. If possible record the call.
  • Have someone else try to call your child’s cell phone, school, text, social media, etc., to confirm their safety.
  • To buy time, repeat the caller’s request and tell them you are writing down the demand or tell the caller you need time to make arrangements.
  • Don’t agree to pay a ransom: by wire or in person.
  • Don’t deliver money in person.
  • Immediately call your local FBI office and police.

According to the National Crime Information Center (NCIC), as of March 31, 2017, there were 86,618 active missing person cases in the FBI database, with 8,792 entered as involuntary.

Experts agree an actual kidnapping with a ransom demand is quite rare but all experts urge parents to be vigilant.

To read the FBI warning, please click here.