Dating Scam – The Professional

Dating Scam – The Professional

From the desk of Kristen Justis, Director of Marketing and Client Relations

DANGERS OF ONLINE DATING FOR ALL GENERATIONSOnline Dating PicPART THREE – THE PROFESSIONAL

In previous postings in this series, I have discussed a widower and a divorcé who were victims of online dating scams. Many believe online dating scams only occur when victims do not meet the perpetrator in person and when the perpetrator lives out of the country. This is far from the truth. Lauth Investigations International, Inc. has handled several cases of scam and fraud in relation to online dating sites. Many of these relationships have been in person, long term, and heading towards marriage. The scammers are committed to their end goal and they stay the course of the scam for months, even years.

The following Lauth Investigations fraud case focuses on a professional woman in her mid-thirties. We hear of the cases often where the victims are older, retired, or just plain lonely. Lauth Investigations has found young, successful professionals are just as prone to falling victim to these scams.

The Professional Woman

dollars in the air

Julia works for a Fortune 500 company in downtown Indianapolis. She owns her home, drives a nice car and has a hefty 401k. Julia has a multitude of friends she spends her time with including traveling often. One of her friends announces she is now engaged. Julia is in her mid-thirties and eventually wants to be married with children someday. The engagement announces gets her thinking how she would like to meet someone. In that moment, she decides to join an online dating website. Managing an online profile would be an easier way to meet someone instead of leaving it to chance, especially with her busy lifestyle.

Julia begins receiving a lot of interest from various men. She meets a few of them for coffee; however, there was no chemistry. Finally, she begins receiving email communication from Scott, a professional man within downtown Indianapolis who travels often. They communicate for a few weeks and they really get to know each other. After feeling extremely connected, they decide to meet.

Scott and Julia meet for dinner. It was an immediate connection. Julia enjoyed everything about Scott and the relationship begins. Although Scott is out of town quite often for his job, they spend all their free time together. Julia finds herself waiting at home for Scott instead of spending her time with her friends. Months pass by and the relationship begins to get extremely serious. Julia is in love.

The love Julia feels for Scott grows to the point she is ready to be married. She only focuses on him and their time together, until the holidays roll around. Julia understands Scott’s job is a lot of traveling; however, he is out of town over Thanksgiving, then he must go out of town for Christmas and finally New Years Eve. Julia begins to question what kind of job makes you travel and miss Christmas with your loved ones.

questionsThe questions start to rush inside Julia. She realizes Scott never has her over to his house, he only stays at her house. He takes a lot of calls while he is with her and he always walks out of the room for these calls. He has canceled a lot of dates with her at the last minute for “work”. Julia thinks back over the year with Scott and she realizes, he has never invited her to work event, she hasn’t met his family, and he has slowly alienated her from her friends and her family.

Julia reached out to Lauth Investigations International, Inc. for a simple background check on Scott. She began to fear he may be married. Even in the initial phone call to Lauth Investigations, Julia was questioning her decision to hire a private investigator as she felt guilty for not trusting Scott. Finally, she realized it is better to be knowledgeable instead of continuing blindly further into deepening this relationship.

The beginning of the investigation, Lauth Investigation’s private investigators found Scott was not married; however, he did not work where he claimed. It was found Scott was unemployed. Further investigating into his background, investigators discovered a long list of criminal activity including Identity Theft, Fraud, Tax Evasion, and Forgery. Julia was advised of our findings and she requested to know more. Surveillance and interviews of his past relations begin.

scam picRather quickly, investigators discovered Scott was a professional scam artist. He dates and marries women eventually taking their money and/or identity. He had opened credit cards under these victim’s names, he married some of these victims and when he divorces them, he is entitled to a portion of their retirement and checking accounts. Scott was a career criminal.

Had Julia not decided to hire Lauth Investigations International, Inc. to investigate Scott’s background, she would have been just another victim in his long line of scams. Julia was lucky as the scam hadn’t reached the money exchange or theft phase. Julia confronted Scott and she has never heard from him again.

Hiring a private investigator when beginning to date someone new seems deceptive and costly; however, it is better to go in with your eyes wide open. Be proactive and spend some money up front before the scammers take your money and your pride on the back end. Julia has since hired Lauth Investigations to complete background checks on two potentially new boyfriends over the past couple of years. She saw how close she was to becoming a victim and refuses to be in that situation ever again.

Be Proactive Not Reactive

 

 

Insider Intellectual Property Theft

Insider Intellectual Property Theft

Top Secret File

Spies, Espionage, and Intellectual Property Theft

Government and military entities are not the only ones spying and conducting espionage investigations to protect our national security. More and more corporations and even small businesses are now hiring expert private investigators to conduct espionage investigations and counter-surveillance to protect “trade secrets” and other classified information.

Cases of economic espionage, industrial espionage, corporate spying and corporate espionage are commonly conducted for commercial purposes but can also include personal information that can later be used to blackmail, discredit and control enemies and competitors.

Espionage or “Insider theft” can cause significant personal and financial harm and described as an individual obtaining secret information without the explicit permission of the owner. For example, a corporation or company spying on another company’s activities, collecting data and information for gain or cause damage, most commonly through the doorway of employment.

Espionage involves clandestine activities. Though methods and motives of spying have changed over time, the desire to uncover competitor’s secrets has not. There is a war going on, and spying the primary weapon.

Federal Effort to Combat Economic Espionage

According to a 2015, CNN Politics Report “FBI Sees Chinese involvement amid a sharp rise in economic espionage,” the FBI announced the bureau has seen a 53% increase in economic espionage and intellectual property theft cases leading to the loss of billions of dollars.

Cyber ThreatThe FBI concludes “insider threats” or employees familiar with the inner workings of a company who obtain sensitive industry secrets in exchange for large amounts of cash are becoming more common and pose a significant threat to companies worldwide.

To combat this ever-increasing menace to American businesses, the FBI produced a video “ ” to raise awareness.

Private investigator Thomas Lauth, CEO of Lauth Investigations International, says, “Global trade of fake goods is damaging U.S. markets, along with theft by U.S. retail workers.”

Pirated and imports of counterfeit goods are worth nearly half trillion dollars annually with much of the proceeds going to organized crime, according to the OECD and the EU’s Intellectual Property Office.

Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact,” reports fake products like footwear, handbags, even strawberries, are commonly presented to the U.S market. While there is significant financial damage occurring, products like pharmaceuticals, toys that are harmful to children, baby formula, and failing auto parts are endangering lives.

According to former Attorney General Loretta Lynch in a 2015 Department of Justice press release, “The digital age has revolutionized how we share information, store data, make purchases and develop products, requiring law enforcement to strengthen our defenses against cyber crime – one of my top priorities as Attorney General, “said Lynch. “Companies like Sony and Target – have demonstrated the seriousness of the threat all business face and have underscored the potential for sophisticated adversaries to inflict real and lasting harm.”

While the Attorney General’s Office, FBI, Homeland Security and law enforcement are allocating more resources to combating intellectual property theft from dangerous outside adversaries, companies throughout the world are encouraged to take the necessary steps to protect their own intellectual property from outside and insider threats.

Insider Theft of Intellectual Property

Experts maintain upwards to 70% of a corporation’s value is found in Intellectual Property (IP). Insider threats come from the inside because the “thieves” are given access to their day-to-day employment.

The value of an organization’s secrets, product plans, customer data, and price lists cannot be underestimated. It becomes necessary to find a balance between productivity and protocol that allows a watchful eye to protect sensitive data and detect insider threat activity. Operational staff should be prepared with information to help them better understand how insiders can damage their agency, and in the various methods used by insiders. They are the front line to help battle IP theft crimes.

Insider Attack StatsInsider thieves commit crimes for varying reasons, to include gaining a competitive business edge, to start a competing business, or personal financial gain.

It is not uncommon for thieves to use networks to send internal server data outside of an organization. The most common method of stealing data is the use of external media such as a writable CD or USB mass storage device. Using corporate email accounts to send information off-site to personal emails and competitors is also common and requires monitoring to prevent such abuse.

It is necessary for organizations to identify risks and develop standards of best practices and policies that address the many ways IP can be exploited. These should include but are not limited to IT Security, removable media policy, controls and inventory, physical security, logs, and indexing tools to identify patterns in behavior. It is especially important to implement heightened security measures during reorganization, acquisition, downsizing, mergers or other organizational events.

Non-Compete Agreements Protects the bottom-line

Employee departures resulting in the scheming of trade secrets and clients has increased significantly in recent years. Many employees leave their employment to begin a similar start-up or pursue freelance work. As a result, it has become common for former employees to approach old clients, steal data, marketing materials and even share negative information to damage their former employer’s credibility.

According to a Wall Street Journal report, with the help of investigators, over the past decade, there has been an increase in the number of departing employees being successfully sued by former employers for breaching Non-compete Agreements (CNC).

Considered one of the most effective ways to prevent the theft of a company’s secrets, having a Non-compete in place and requiring every employee to sign it, can prevent damages that could otherwise last years.

Private investigation firms are playing a significant role in the effort to safeguard information, the detection of costly breaches and providing an evidentuary solution presenting facts when litigation is necessary.

Lauth Investigations International is working to prevent intellectual property breaches, global piracy, counterfeiting and insider threats with data mining experts and field investigators who focus on safeguarding IP and detecting violations utilizing sources that are not commonplace to HR and Operations Supervisors. “It is vital to be able to detect violations to prevent violators from reaping profits and expanding their worldwide market, where damage can extend for years,” says Lauth.

Brand Protection areas include:

Apparel

Music and Apps

Tools and Hardware

Cosmetics and other Products

Logos and Authentic Branding

Indigenous Rights

Author Rights

Content and SEO Detection and Protection

Plagiarism, Marketing Materials and Website Protection

“Our investigators conduct trademark infringement for brands, large and small, trekking through some of the most complicated cases and vast markets such as Hollywood celebrities, apparel, and electronic clients,” says Lauth. “Our team provides intellectual property and litigation support for small business and corporations working with corporate executives, HR, and those in Operations Supervision to provide research and investigations, crisis intervention, employee screening, vendor and supplier screening, electronic discovery, surveillance, loss analysis, and expert testimony if needed.

 

Working to protecting your brand

Brand Protection Image

“Our private investigation firm will not only work with key staff and operations supervisors to identify current and potential breaches, we work with companies that operate throughout the world to implement the right policies and safety protocol to help protect their IP into the future,” says Lauth.

Lauth Investigations offers free consultations and guidance to help protect your brand. Following are a few tips to help you better protect your IP.

  • Protect web content and marketing materials by utilizing a DMCA account and protection badge.
  • Think globally. Obtain trademark protection for worldwide protection.
  • Set up a Google Alert to police your brand.
  • Obtain IP Protection for Copyrights, Trademarks, and Patents.
  • Register trademarks with the US Patent Office.
  • Develop a Policies and Procedure Handbook and have each employee review and sign.
  • Utilize Marketing Analytics software such as TrackMaven and Travel IQ for online tracking.
  • Monitor unregistered infringements.
  • Create various divisions for a more controlled environment.
  • Create a distinctive mark.
  • Develop and implement a Non-Compete Agreement.

For more information about how you can protect your IP, please visit www.lauthinveststg.wpengine.com or call 317.644.2788.

Kym Pasqualini, Lauth Investigations Feature Writer

Cyber Shopping Fraud

Cyber Shopping Fraud

Online Fraud

CYBER-SHOPPING FRAUD

‘Tis the season for the hustle and bustle of Christmas shopping. While the stores are packed with consumers, cyber-shopping is at an all time high. Shopping in public can have potential to be dangerous with getting your wallet stolen or being robbed when putting the bags in your car.  Cyber-shopping has a different kind of danger to be aware of. Be aware and prepared when shopping online.

Cyber-Shopping Frauds

We are all excited to get the “great deal” when shopping either in the stores or online. Sometimes, though, we need to sit back and determine when a deal is just too good to be true. There are so many sites set up to fraud consumers, I could not list all of them, so I am just going to list some ways these sites go about their scam:

  1. Copy Sites – Large company websites such as Wal-Mart, Amazon, E-Bay, are easily recognized; however, some of the smaller websites, such as Pandora Jewelry, are not as easy to determine if a site is the correct location for the National company. Websites are set up to resemble these less known company websites, selling similar looking items for cheaper prices. When you order from these sites thinking you are getting the real thing, you are sent a cheap knock off that is not worth the money you spent.

How to avoid it? Ensure you are shopping on the correct retailer sight. If the website is something other than “.com”, chances are it is a fake. Do your research and pay attention to the website. If the website is a “knock off”, you will see the difference. httpDid you know the “s” in “https” stands for secure? If there is no “s”, move on.

 

  1. 2. Take the Money and Run – Websites are set up with “authentic” or “custom made” merchandise. monopoly guyWhen you order from these sites, you provide your credit card information to pay for the item and the item never comes. Now the individuals took your money, you have nothing to show for it and they have your credit card information.

 

How to avoid it? Do your homework. Research the company, call the company to speak with an employee, read the customer reviews. Do not give your credit card out without being 100% certain the company is legitimate. If they are legitimate, they will do whatever it takes to make you feel comfortable doing business with them.

  1. Auction Sites – E-Bay is probably the biggest Auction Site on the web. It is also the most problematic Auction Site. When purchasing an item through an auction, there are several scams that may occur:

 Ebay Scam

  1. The seller posts a picture of an expensive item, the bidding war begins, the auction ends, money is sent and the seller posts a picture of the purchased item stating “technically” that is all they listed for sale was the picture, not the actual item.
  2. The buyer purchases an item either by auction or the buy now tab and the seller requests the buyer to pay outside of E-Bay for various reasons. The buyer pays and goes to pick up the item or waits for receipt of the item. When contacting the seller due to never receiving the item, the seller states the item was never listed on E-Bay and it is not for sale.
  3. The auction or sale is complete. The item is received by the buyer and it is damaged or not the correct item. The seller is unresponsive to contact attempts.

How to avoid it? Always make the sure the seller is active on the site. Look for reviews. If they have no reviews, they may be new to the site and started just to pull these scams. Never pay outside of auction site. Ask questions about the item. Get the seller to provide intricate details including extra pictures. Read the description of the item carefully to see if there are any keywords that stick out making the listing unauthentic.

  1. Facebook Sellers – If a seller posts an item to your newsfeed through Facebook, you have to click on the link and you are re-routed to a different page. facebook dislikeAt that point, you are no longer secure. Once you enter their site, all your personal information is provided to them. Should you buy an item, they then have all your credit card information as well. It is so easy to be scrolling through Facebook, see a cute item for sale, hit the link, and within seconds you have purchased the item.

How to avoid it? Stop and think about what you are purchasing. Do not leave Facebook. Do not click on that link. Check out the website on your own. Do your homework. Ensure they have a safety symbol on their website.

Cyber-Shopping is so easy and convenient, we often lose ourselves to the fast paced life that we go for convenience over common sense. Before shopping online, do your research. Are you at a safe, secure website? Does the website look authentic? Check out the reviews of the seller, whether it’s an individual or a company. Ensure the url states “https” as this indicates a secure site. Trust your gut. I cannot express this enough. We know when something doesn’t look right, if we take the time to pay attention. Finally, if the deal seems too good to be true, it is so walk away!

“Trust your gut. It knows what your head hasn’t figured out yet.”

Online Dating Investigations – Part One

Online Dating Investigations – Part One

From the Desk of Kristen Justis, Director of Marketing and Client Relations

DANGERS OF ONLINE DATING FOR ALL GENERATIONS

PART ONE – THE WIDOW

Online Dating Danger

A sixty-year old widow, a fifty-five year old divorcee, a professional woman in her mid-thirties or a twenty-three year old Army soldier, these are just some of the individuals Lauth Investigation International, Inc., a private investigation firm, have helped while being scammed through online dating. Scammers do not discriminate, they throw out a line and see who bites. Hence the name Catfish Scams. Over the next few articles, I will discuss each of these Catfish scams.

catfish definition

The Sixty Year Old Widow

A wonderful forty-year marriage, three children, a mortgage paid off and ready for retirement, then the life altering death of Jane’s husband occurs. Jane deals with the loneliness and grief of losing her life partner. A year later, she decides to join an online dating site to find a companion to spend time and share her life. She is matched with several gentlemen; however, one pursues her in the charming, exciting way she was hoping for.

Jane and the new guy, Joe, begin talking via e-mail. He tells her all about his life and the exciting traveling he has done. They have so much in common, she can’t believe how much she enjoys communicating with him. The communication then moves to phone calls and text messaging. They laugh, he compliments her, they have late night talks. The excitement of this new relationship begins to mount.

Two weeks into the relationship, Joe tells Jane he received a contract for work and he will be leaving in a couple of days to Malaysia. He is unsure how long he will be there. Jane requests to meet him in person prior to him leaving. Joe states he has too much to do before he leaves so he is unable to meet her. This makes sense to Jane, so she doesn’t push the issue.

After months of talking every day, Joe tells Jane he owes money to a hospital for some medical expenses and he cannot get to his money because he must be present at his bank to withdrawal money. Of course, his bank is in the United States. He even showed her a screenshot of his bank account with $2.8 Million. The hospital is holding his passport so he is unable to come home to her. He suggests she sends him the money to cover the debt so he can come home. Jane sends him the money.

Next, Joe asks for more money because now he owes money to his attorney in Malaysia. The attorney is now holding his passport until the debt is paid. Jane has to refinance her paid off house to pull money out, but she does it so Joe can come home to her.

Once the attorney is paid off, Joe needs further money as he now owes money to his landlord, who again is holding his passport as collateral. Jane, once again, sends him the money. Now, Joe claims he cannot come home because his visa has since expired and he has to pay fines before he is allowed to leave Malaysia.

A year and $100,000 sent, Jane begins to question Joe about his history. He explains there is lot he can’t share over the phone or text messaging and he will tell her everything when he returns to the States. She questions his accent because he is supposed to be American. He explains this away stating his father was in the military and he lived overseas in different countries throughout his childhood; therefore, he has a mix of accents. Jane asked him on numerous occasions to send her pictures of him. He claims he does not have a phone that takes pictures.

Finger-print-investigation-4Once Jane looked past her emotions, she hired Lauth Investigations International, Inc. to investigate Joe. Private Investigators found no one exists under the name, birth date and addresses Joe provided to Jane. The bank account he provided was on a fake site. After much investigations, Lauth Investigations was able to link Joe to a scam stemming from Nigeria.

The catfishing scam out of Nigeria is a well-organized group of criminals, men and women, who troll online dating sites in the United States. They are trained to know the region around their victim to convince them they are from the area. The have training on how to connect with the victim and make them fall in love. Once they know the victim is hooked, they pull the line to get them to send money. The requests begin as a small amount and continues to grow over time with more requests for money.

The Nigerian criminal organization operates out of several different internet cafes, use a multitude of computers and phones, maintain various false identities and fake photos, and have fake websites. They utilize all the fraudulent documentation to scam individuals out of millions of dollars a year. Therefore, once the scam is discovered, the money is gone and unrecoverable.

nomoney

Watch out for your loved ones and yourself for any suspicious relationships formed through an online dating service. Unless you meet the person face to face, do not fall prey to the eloquent words they are able to write or say over the phone. Never send money to someone you do not know personally. If you have any questions about someone you have met, spend your money hiring a private investigator. It’s better to be safe than sorry and broke.

 

Background Checks

Background Checks

 

background check magnifierLauth Investigations International is a private investigation firm. We are constantly questioned about what our background searches can provide that a personal background search cannot. All I can say, it’s all in the details. You pay for what you get. If you want all detailed, accurate information, you will pay for a Private Investigation Background Search. If you want high level information, you will conduct your own Personal Background Search.

 Personal Background Search

With the internet, so much information is at our fingertips, but are we getting the most up to date information? A personal background search will bring up the following information:

  1. Employment history. The search will bring up employment records; however, it may only bring up the last couple of positions held. It will not give details of all the employment information for the individuals.
  2. Academic and/or professional qualifications. The search will provide education information and any certifications. High level information will only be received.
  3. Criminal Records. The search will show all arrests and convictions.
  4. Financial Standing. The search will bring up any liens, judgments, bank accounts and property ownership.

The information obtained will be high level and up to the person’s own ability to read the results. In order to get deeper levels, the user has to continue to pay the further in depth they go.

background checks

 Private Investigations Background Search

Unlike a personal background search conducted by a novice user, a private investigations background search is not just putting a name in a database and seeing what comes up. Private Investigators have access to several databases which will show a variety of information.

  1. Employment history. The search will bring up employment records including all positions held, any discrepancies on a resume, the salaries affiliated with the positions and any other information a potential employer would need to know.
  2. Academic and/or professional qualifications. The search will show all academic history and certifications even if the individual did not complete the program.
  3. Criminal Records. The search will provide a detailed outline of all criminal activity from speeding warnings/tickets and arrests up to convictions and jail time served.
  4. Financial Standing. The search will show all liens, judgments, bank accounts, property ownership, previous ownership of properties, dates properties sold, NSF checks and bankruptcies.

Along with the typical information received through a personal background search, private investigation background searches also include:

  1. Worker’s Compensation Claims an individual has filed. Determining the character of an individual is just as important as their criminal history. For employment purposes, an individual who files numerous compensation claims reveals a dishonest, fraudulent individual.
  2. Ascertain causes of accidents or any criminal activity. DMV reports will show accident information; however, they do not show all causes of the accidents. The in depth reports by private investigators show the reasoning behind accidents and if there was criminal activity involved in the accident as well.
  3. In depth analysis of all findings in the research. Any individual can pull information; however, it’s how the information is analyzed and interpreted that makes it helpful.
  4. Information on employers, business partners, and personal partners.

The process of performing background checks is and should be more in depth than just putting in a name in a database. To ensure the most updated accurate information is received, a private investigation background check is the direction to take. The analysis and time put in from a private investigator along with their ability to understand the findings places the outcome far more beneficial. The personal background checks are general and only provide high level information. Without the knowledge needed to understand the reports, the information does not provide the detail generally needed.

Background checks can be used for all kinds of reasons. If you are looking into a potential business partner, potential employee, potential life partner, a detailed background check with concise analysis can provide you the information needed to make informed decisions. Do not rely on just an internet search without the knowledge to know what information is in front of you.