Investigating Executives & White Collar Crime

Investigating Executives & White Collar Crime

Don’t let executive misconduct ruin your corporation…

When it comes to running a business, the executives who are the visionaries and decision-makers that shape a company should always remain above reproach. White collar crimes have the potential to pull a business up from the root with devastating consequences. Unfortunately, Americans know from media coverage and social media that there’s few things we are more attracted to than stories about high-ranking officials and the misconduct that negatively impacts their businesses—both in profits and in public relations.

Many will be familiar with the recent news of Amazon CEO Jeff Bezos’ high-profile divorce following allegations of infidelity, in which his ex-wife became the richest individual in history by virtue of divorce proceedings. The fallout from executive misconduct can leave a trail of legal fees, government sanctions, violations, and public relations-related crises that can devastate a company from the top down.

Thought to be coined in 1932, the phrase “white collar crime” now refers to a spectrum of frauds and other crimes committed by high-ranking executives and officials. The most common characteristics of white collar crime contain aspects of deceit, concealment, or violation of company policies and/or state and federal law. The motive is financial, with executives skimming off the top of a company’s profits for their own use. These crimes are sometimes thought of as “victimless crimes,” with no regard to how the fallout from a fraud or scheme can impact the company, and therefore the families of its employees. The types of fraud include, but are not limited to:

  • Bank fraud
  • Blackmail
  • Bribery
  • Cellular phone fraud
  • Computer fraud
  • Counterfeiting
  • Credit card fraud
  • Currency scheme
  • Environmental schemes
  • Extortion
  • Forgery
  • Health Care Fraud
  • Insider trading
  • Insurance fraud
  • Investment schemes
  • Kickbacks
  • Larceny/theft
  • Money laundering
  • Racketeering
  • Securities fraud
  • Tax evasion
  • Telemarketing fraud
  • Welfare fraud
  • Weights and measures

Corporate fraud and white collar crime of this nature remain one of the Federal Bureau of Investigation’s top priorities when it comes to identifying and indicating perpetrators. While involvement by government agencies may seem like the end of the line, there are ways companies can get out in front of executive misconduct by hiring a private investigator to investigate these matters.

Private investigators have a unique reputation as slick operators who fly under the radar, but they are invaluable professionals to companies in the throes of a corporate crisis because they are independent and objective. Objectivity is the priority when dealing with executive misconduct and white collar crime, as any allegations or evidence presented against the executive must be presented by an individual with no stake in the outcome of the investigation. Private investigators are independently contacted by a business or corporation to investigate the alleged executive misconduct, and can gather evidence and collect witness statements without the air of bias. Because private investigators are independent contractors, there is no fear of reprisal on behalf of coworkers and other employees at the company. This leaves no lead discounted or ignored. They can investigate employees at all levels, and determine how (if at all) the executive is receiving assistance in their fraud from subordinates. One of the most attractive qualities in a private investigator is that their objectivity makes them crucial witnesses in any legal proceedings that may result from the investigation.

Businesses and corporations should never be beholden to CEOs, presidents, and other high-ranking executives who behave badly. Executive misconduct and corruption are like aggressive weeds that must be pulled from the root in order for businesses to flourish. When it comes to rooting out bad leadership, consider hiring a private investigator to navigate a tricky investigative path that can end in quality operations and peace of mind for businesses large and small.

If you have a corporate crisis like executive misconduct, we can help. Call Lauth Investigations International, a family-owned-and-operated investigative firm with over 30 years of providing successful solutions to clients in Indianapolis and throughout the nation. Call 317-951-1100 for a free consultation, or to learn more about our services, please visit our website.

Phishers Want Your Direct-Deposit

Phishers Want Your Direct-Deposit

money lockedThe invention of direct-deposit payments in electronic banking have likely saved companies millions of dollars over the years in labor hours, materials, and fees that previously caused problems for companies. However, in an age where your paycheck is sent automatically to your checking account, phishers are seeking to exploit this automation for personal gain.

The Internal Revenue Service has reported an upswing in various types of fraud that directly target a company’s payroll. While the ruses come in many forms, one of the most popular is phishing emails disguised as legitimate correspondence from an employee or upper management. It’s always an instruction to alter payroll information so that funds would be rerouted to the scammer’s bank account. Once the deed is done, the money is withdrawn and the company is responsible to replace the missing funds. While the FTC and the IRS are constantly reevaluating their strategies for containing these types of fraud, this particular scheme is hard to detect and often goes unreported. The email can outsmart security measures set down by the company or within a company’s email server, and scammers take amounts that can just be written off as unfortunate missteps on behalf of personnel.

Frauds such as these have gone through an evolution as security technology becomes more sophisticated and what we know about internet culture continues to grow. Internet frauds used to be about volume and inattention to detail—thus the birth of phishers, who sent emails rife with spelling and grammar mistakes out to mile-long email lists, casting a wide net throughout the web. Education about fraud has forced scammers to be more cautious. Today, companies who have seen this scam in its newest form remark that these phishing emails look so authentic that there may not be a question in their mind before obliging their request. Security measures that have risen from the nucleus of electronic banking combat wire fraud every day in the United States. Large sums in wire transfers now throw up giant red flags. Phishers and scammers are getting more bang for their buck by taking smaller amounts with more frequency, lurking below the radar. This does not require sophisticated hacking skills. Just the ability to open a Gmail account. Phishers make the account look cosmetically convincing, then throw out the lure. One of the most targeted entities is non-profit organizations, because of the benevolent nature of their business. The idea of someone ripping off a charity or relief organization is horrifying, but the simplicity of scams like this make the opportunity too lucrative to pass up.

It’s frightening how simple the fraud is to pull off, but there is recourse for businesses who are vulnerable to such a scam. One of the non-profits who fell prey to this scam was KVC Health Systems, an agency for child welfare in Kansas City. Their IT director, Erik Nyberg, says it starts with comprehensive education on company procedures, “The CEO is never going to email you out of the blue and ask you for any deposit changes. And if you have any sliver of a doubt, call the person who is making the request.” He goes on to discourage executives and upper management employees from using their personal email accounts to send staff correspondence, and to set email filters that will catch suspicious incoming messages. Social media managers are also cautioned against posting any company information to their pages that could serve to bolster a phisher’s credibility.

If your business has been the target of this wire fraud scam, you are encouraged to report them to the Federal Bureau of Investigation’s IC3 tip line.

Don’t Wait to Hire a Private Investigator

Don’t Wait to Hire a Private Investigator

lauth investigations Every business—from the mom-and-pop shop to corporate America—will encounter some form of crisis during their operation. Crises come in all shapes and sizes, including employee malingering, internal theft, brand protection, and a myriad of lawsuits that could bring an established business to its knees. When disaster strikes, it is the reflex of most companies to handle the matter internally, often delaying important investigative measures out of uncertainty, ignorance on how to proceed, or both. While an internal investigation allows a company to control available information and minimize any consequences, an independent external investigation conducted by a private investigator is the best course when it comes to finding a comprehensive solution to any corporate crisis. The important thing to remember is you cannot wait when a crisis arises, and hiring a private investigator should be one of the first items on your to-do list.

Independent private investigatiors provide the best solutions from the onset of the investigation. Investigators too often run into roadblocks during investigations because they are working from a narrative and timeline that has already been established by an internal party. When you have a qualified and objective investigator handling the investigation from the beginning, it lays a solid foundation that will lead to credible leads, proper gathering of evidence, and quality conversations with potential witnesses.

During a fact-finding process, internal investigators may not have considered all angles and left many leads unexplored. Potential witnesses within the workforce need to be interviewed and their statements recorded, but an internal investigator—usually a Human Resources representative or upper management employee—may not have the qualifications. Any witness testimony may be tainted because the investigator is not properly trained in interview and rapport. Witness statements could also be false or inconsistent because they fear reprisal from an internal investigator who may have clout when it comes to the employee’s future at that business. When a private investigator is retained weeks after the onset of the investigation, witness’s memories may be inaccurate or even non-existent. In some cases, an employee may have already left the company, or changed addresses. This results in more investigative measures required to locate that employee, which costs money and labor hours to the investigator.

Witness statements are valuable, but not so much as hard evidence that cannot be interpreted for a particular spin. One common example is surveillance footage. An internal investigator may think to pull surveillance footage from a single camera near the site of the incident or crisis, but the investigator may not pull surveillance footage from other cameras that could contain valuable information. Most companies invest in security systems that recycles surveillance tape after a short period of time, sometimes as little as five days. Once an independent private investigator is retained, valuable footage is gone, and other fact-finding measures will be necessary—again, more time and money at the cost to the company.

It is possible for an internal investigation to play out smoothly—at least at first glance. Even if the internal investigator is well-qualified to conduct the investigation, there will always be the question of objectivity when dealing with an internal investigation. A successful investigation that concludes with the termination of an employee who was found to be at fault for the crisis or incident has the potential to result in legal action. In this example, it would be a wrongful-termination suit. When argued in a court of law, it’s easy for the terminated employee to cast doubt on their former employer by citing the investigation into their wrongdoing was conducted by an internal employee with a direct stake in the outcome. When a private investigator handles the investigation from beginning to end, there will never be a question of objectivity, because a private investigator’s task is to find the truth—not manufacture a solution that will mollify their client.

When your company encounters a crisis, do not hesitate to retain a private investigator to find a solution. The time and resources spent on an internal investigation may all be in vain when the chips are down. To protect your business and its profits, take immediate action when a corporate crisis arrives by retaining a private investigator that will provide you with the expertise and objectivity for a successful solution.

If your business has encountered a corporate crisis, call Lauth Investigations International today for a free consultation. Call 317-951-1100 or find us online at www.lauthinveststg.wpengine.com

Predators Use Online Gaming to Groom Minors

Predators Use Online Gaming to Groom Minors

predators online gaming

Advances in technology are constantly changing the dialogue about how we protect our children from potential predators. Over the last decade, parents have had to reform their strategy when it comes to protecting their child in the real world. Before, parents cautioned their kids on stranger danger, special code words, and remaining aware of their surroundings in public. In a new era of unfettered internet access through multiple smart devices, parents had to contend with the real world being brought into their homes, with predators targeting their children through social media. Now, it appears parents will yet again have to add some new pages to the playbook when it comes to protecting their children from predators on video game platforms with integrated social networking.

Parents with children between the ages of 12-25 will likely be familiar with the online first-person shooter video game known as Fortnite. In the game, 100 players at a time compete to be the last one standing in a battle-royale style of combat. The game features a chat feature allowing players to communicate in team efforts and other uses. It has great potential to foster team building and cooperation between young people, but also has a dark side recently illuminated by an arrest made in Florida in late January.

Authorities arrested 41-year-old, Anthony Thomas, a man who allegedly used Fortnite’s instant-messaging feature to groom over 20 minors, including a 17-year-old, with whom law enforcement allege he had a sexual relationship. The Florida Attorney General’s Office also stated Thomas has been charged with 22 counts of possession of child pornography, and other charges related to his unlawful sexual relationship with the minor. Investigators uncovered he groomed the minors by sending them gifts—including a cell phone so their communication could remain more private.  Ashley Moody, Attorney General, remarked about the predation perpetrated, “This case is disturbing, not only because it involves child pornography, but also because a popular online game was used to communicate with the victim.”

Grooming is defined as “a process by which a child predator gains the trust of a victim by building a relationship with the child and then breaking down his or her defenses.” Once a predator has earned their trust, they begin exploitation. Minors who are groomed in the gaming community are particularly vulnerable because the predator may literally be on their team. Cooperative play between players fosters a healthy, “there’s no ‘I’ in TEAM,” mentality, but predators use this relationship to manipulate the minor.

One of a predator’s greatest weapons when grooming a minor online is pop culture. The predator—perhaps unlike the minor’s parents—shows their target they’re “hip and cool”, and are able to converse at their level about something they enjoy. This causes the minor to lower their guard, and the predator begins their manipulation game, culminating in the exploitation of said  minor. Online gaming is becoming so ubiquitous predators have developed a way to sense when a minor’s gaming is suddenly being supervised. The moment a minor’s behavior changes—they stop responding to messages, or do so uncharacteristically—the predator can pick up on that and cease all communication before they’re caught.

Unfortunately, even if a parent is supervising the communication between their minor child and other players online, it doesn’t mean they cannot be groomed. In the grooming process, between the introduction and the beginning of the exploitation, predators often suggest moving their communications to a third-party app, like What’sApp or Snapchat. These are apps where communications disappear with ease, and a parent performing their due-diligence in supervising their child’s internet safety may not notice, or even know how to access. TeenSafe says it’s critical parents learn to recognize the signs of grooming in their minor child.

Signs of Groomingpredators and online gaming

  • Your child wants to spend more time online or playing games on a console, but won’t tell you why.
  • Your child does not want to discuss what he or she does online, or what websites he or she visits.
  • You notice your child is using inappropriate language he or she would not have heard within your home or at school.
  • When you walk in a room, your child quickly changes the computer screen, mutes the volume on their gaming console, or turns it off all together.

Fortnite and other games with similar messaging platforms have been on law enforcement’s radar for the last few years as the instances of these cases continues to grow. In August of 2018, Titania Jordan, a digital safety expert, appeared on The Doctors to provide parents with helpful tips—not just for supervising their children’s gaming—but also for establishing boundaries that can nip grooming in the bud.

  • Do not allow minors to have computers, game consoles, or tablets in their room without supervision. Keeping these devices in common areas will increase visibility and deter predators from targeting them.
  • Instruct your child to never reveal any personal information about themselves to people they’ve met online, especially very specific information, such as where they live or where they go to school.
  • Create a culture of openness in your home where children feel comfortable coming to you if they feel uncomfortable about an interaction they’ve had online.

People of all ages play video games, but the vast majority of players are either minors or young adults, and parents often find themselves overwhelmed with the strange new world of online gaming. Titania Jordan reminded parents knowledge is power, recommending they verse themselves in the games their children play. This can only heighten your ability to detect when something is off. This means doing research online, and actively listening when your children describe normal gameplay behavior.

Having an internet connection in your home may feel like you’re inviting predators into your home. And true, there’s no time to supervise every single activity your child does online. This is why it’s so important to nurture an open line of communication between parent and child. Not only will parents be able to sense when something is amiss in their child’s online interactions, but a strong bond between parent and child makes it less likely that an online predator will be able to isolate the child emotionally and manipulate them for the purposes of exploitation.