DANGERS OF ONLINE DATING FOR ALL GENERATIONS

DANGERS OF ONLINE DATING FOR ALL GENERATIONS

DANGERS OF ONLINE DATING FOR ALL GENERATIONS

danger of online dating

PART TWO – THE DIVORCЀ

As discussed in my previous posting, The Widower, Lauth Investigations International, Inc. has handled several cases of scam and fraud in relation to online dating sites. The elaborate lengths these scammers go to get what they want is overwhelming. Lauth Investigations has uncovered several different scams as they have related to our clients. The scariest part of these scams is the commitment and dedication these criminals put into their deception.

The following Lauth Investigations fraud case focuses on a fifty-five year old, successful divorced gentlemen. It is widely believed women are the main targets and victims of online scams; however, Lauth Investigations has found men are just as affected falling victim to these criminals.

Dating Infographic

The Fifty-Five Year Old Divorcé

A year after Bill and his wife of 30 years divorced, Bill was looking to get out into the dating world again. He is an accountant for a large firm so he works most of the time, he hasn’t been on a date in over 30 years, and he doesn’t know where to go to meet anyone. A friend suggests online dating. One night, Bill decides to set up his profile on a dating site just to see what happens. Bill’s nightmare begins.

Within a few weeks of being on the dating site, Bill connects with a beautiful younger woman from Russia, we’ll call her Ava. Ironically, even though they are from completely different cultures, Bill and Ava have a lot in common. Although Ava struggles with English, she communicates enough via phone, texting and emails to make a strong enough connection with Bill. He ends up falling in love with her without meeting her.

money hero

Once Ava knows Bill is hooked, she starts pulling at his heart strings. She tells him how hard it is to live in Russia because jobs do not pay more than a few hundred dollars a month. On top of her low salary, she must take care of her ill mother because her father was killed in a car accident. Now, Bill feels the pull to play the hero.  All a part of the ploy. He wants to swoop in and help Ava to show her how much he loves her.

Ava never had to ask for any money. She plays the role perfectly and Bill starts offering money. When Ava pretends to be embarrassed about taking Bill’s money, he insists she let him help her out. Ava “reluctantly” provides Bill her information so he may Western Union her money. The money starts flowing in the direction of Russia.

After months of Bill sending money to “help” Ava, she claims her mother died. Being the good boyfriend, Bill sends money for the funeral. He offers to bring Ava to the States to live with him and get married. Ava is excited to start a new life with him; however, a new snag occurs when she tries to her obtain her visa. The only way it will be resolved is money, which Bill sends, excited to finally meet Ava in person. He is ready to start their new life. The final payment is sent for Ava to purchase her plane ticket. Once sent, Bill never hears from Ava again.

investigator cartoonLauth Investigations International, Inc. is hired when Bill worries Ava was harmed trying to leave the country. He has not yet realized he is a victim of a scam. After much investigation, Lauth proved to Bill that Ava was not the woman’s real identity. The information she provided him led to no one. Research into finding the individual(s) who picked up the Western Union payments revealed nothing. These scammers utilize this payment method because the payments cannot trace who picked them up and they can be picked up anywhere in the world.
After Bill gave away $75,000 and his heart, he now is picking up the pieces and moving on to better things. He was a victim of an elite fraud. He lost a lot of money and his dignity. Bill is not the only one in this position. This fraud is consistently pulling men and women in making the scammers extremely wealthy. Do not let yourself or a loved one be fooled into this fraud. Always err on the side of caution and spend a little money up front to have a potential partner researched by a private investigator. Being too careful never hurt anyone!

 

Online Dating Investigations – Part One

Online Dating Investigations – Part One

From the Desk of Kristen Justis, Director of Marketing and Client Relations

DANGERS OF ONLINE DATING FOR ALL GENERATIONS

PART ONE – THE WIDOW

Online Dating Danger

A sixty-year old widow, a fifty-five year old divorcee, a professional woman in her mid-thirties or a twenty-three year old Army soldier, these are just some of the individuals Lauth Investigation International, Inc., a private investigation firm, have helped while being scammed through online dating. Scammers do not discriminate, they throw out a line and see who bites. Hence the name Catfish Scams. Over the next few articles, I will discuss each of these Catfish scams.

catfish definition

The Sixty Year Old Widow

A wonderful forty-year marriage, three children, a mortgage paid off and ready for retirement, then the life altering death of Jane’s husband occurs. Jane deals with the loneliness and grief of losing her life partner. A year later, she decides to join an online dating site to find a companion to spend time and share her life. She is matched with several gentlemen; however, one pursues her in the charming, exciting way she was hoping for.

Jane and the new guy, Joe, begin talking via e-mail. He tells her all about his life and the exciting traveling he has done. They have so much in common, she can’t believe how much she enjoys communicating with him. The communication then moves to phone calls and text messaging. They laugh, he compliments her, they have late night talks. The excitement of this new relationship begins to mount.

Two weeks into the relationship, Joe tells Jane he received a contract for work and he will be leaving in a couple of days to Malaysia. He is unsure how long he will be there. Jane requests to meet him in person prior to him leaving. Joe states he has too much to do before he leaves so he is unable to meet her. This makes sense to Jane, so she doesn’t push the issue.

After months of talking every day, Joe tells Jane he owes money to a hospital for some medical expenses and he cannot get to his money because he must be present at his bank to withdrawal money. Of course, his bank is in the United States. He even showed her a screenshot of his bank account with $2.8 Million. The hospital is holding his passport so he is unable to come home to her. He suggests she sends him the money to cover the debt so he can come home. Jane sends him the money.

Next, Joe asks for more money because now he owes money to his attorney in Malaysia. The attorney is now holding his passport until the debt is paid. Jane has to refinance her paid off house to pull money out, but she does it so Joe can come home to her.

Once the attorney is paid off, Joe needs further money as he now owes money to his landlord, who again is holding his passport as collateral. Jane, once again, sends him the money. Now, Joe claims he cannot come home because his visa has since expired and he has to pay fines before he is allowed to leave Malaysia.

A year and $100,000 sent, Jane begins to question Joe about his history. He explains there is lot he can’t share over the phone or text messaging and he will tell her everything when he returns to the States. She questions his accent because he is supposed to be American. He explains this away stating his father was in the military and he lived overseas in different countries throughout his childhood; therefore, he has a mix of accents. Jane asked him on numerous occasions to send her pictures of him. He claims he does not have a phone that takes pictures.

Finger-print-investigation-4Once Jane looked past her emotions, she hired Lauth Investigations International, Inc. to investigate Joe. Private Investigators found no one exists under the name, birth date and addresses Joe provided to Jane. The bank account he provided was on a fake site. After much investigations, Lauth Investigations was able to link Joe to a scam stemming from Nigeria.

The catfishing scam out of Nigeria is a well-organized group of criminals, men and women, who troll online dating sites in the United States. They are trained to know the region around their victim to convince them they are from the area. The have training on how to connect with the victim and make them fall in love. Once they know the victim is hooked, they pull the line to get them to send money. The requests begin as a small amount and continues to grow over time with more requests for money.

The Nigerian criminal organization operates out of several different internet cafes, use a multitude of computers and phones, maintain various false identities and fake photos, and have fake websites. They utilize all the fraudulent documentation to scam individuals out of millions of dollars a year. Therefore, once the scam is discovered, the money is gone and unrecoverable.

nomoney

Watch out for your loved ones and yourself for any suspicious relationships formed through an online dating service. Unless you meet the person face to face, do not fall prey to the eloquent words they are able to write or say over the phone. Never send money to someone you do not know personally. If you have any questions about someone you have met, spend your money hiring a private investigator. It’s better to be safe than sorry and broke.

 

When Technology is Taken Hostage

When Technology is Taken Hostage

We expose more of ourselves on a daily basis than at any other time in history. Most people have some form of social media an enterprising sleuth could build a profile based off of just by pressing the “older posts” button. There’s been a lot of news about wiretaps lately, but something under most people’s radar are the Smart TV’s and toys that have been listening to their owner’s conversations.

While it’s scary enough to consider how many things in your home could be listening in on you this very moment, what’s even more concerning is how quickly you can lose control of these devices and extorted to get them back. And it’s not just individuals having their devices and data taken from them, it’s also hit schools, hospital and private businesses hard over the last year.

One of the most common forms of extortion today is the use of “ransomware” to lock people or companies out of their electronics and data. Ransomware is a term for a particular kind of hacking that’s been on the rise as internet reliance has increased. Victims of ransomware typically receive a message on their device’s display saying something to the effect of “pay us this money and we’ll give you back your data.”

In an interview with CNN, South Carolina public school administrator Charles Huck, highlighted the dilemma presented by ransomware when he said, “You get to the point of making the business decision: Do I make my end-users — in our case teachers and students — wait for weeks and weeks and weeks while we restore servers from backup? Or do we pay the ransom and get the data back online more quickly?”

If the targets of ransomware want their systems or data back then they don’t have much choice, but to pay the fee. The hackers have repeatedly targeted hospitals since their technology working is literally a case of life or death there is significant pressure on the hospitals to simply pay the ransom.

When Hollywood Presbyterian Medical Center had some of it’s communication devices taken over by hackers last year, the criminals demanded $17,000 to be paid in bitcoin. The hackers asked for that amount, because it’s low enough most places will pay under the impression it’s the quickest way to get it all over with.

“The malware locks systems by encrypting files and demanding ransom to obtain the decryption key. The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” Chief Executive Allen Stefanek said when the LA Times asked why they paid the hackers. “In the best interest of restoring normal operations, we did this.”

 

One of the scarier things about ransomware is this is only the beginning. The FBI reported ransomware to be a $1 billion industry in 2016. In a follow-up story CNN reported:

At that rate, ransomware is on pace to be a $1 billion a year crime this year. The FBI told CNN that the number “is quite high” because a few people “reported large losses.”

The agency also said that the losses could even be bigger once other related costs from these extortion schemes are factored in. Plus: Some victims may choose to pay and not report the crime.

Paul Roberts, founder and editor of a website called The Security Ledger told CNN, “The ransomware criminals understand this. Their business in some ways is a volume business so they don’t set their ransom so high that you can’t pay it. They set it at a level so they can get their money and move on to the next victim.”

This crime has even made its way into consumer electronics like smart phones and TVs. Last Christmas a photo of an LG TV stricken with ransomware went viral.

The hackers demand far less money to relinquish control of personal devices, but $500, especially if it’s on Christmas Day after you’ve spent money on gifts, is still a lot. In December, Slate reported:

“Ransomware works by taking over a system until a user pays a fee, often in the form of cryptocurrency or digital gift cards. One recent high-profile ransomware attack shut down much of San Francisco’s public transit system while another targeted a Hollywood hospital. More mundane ransomware has been reported on Android devices since at least 2014, and Frantic Locker first began to show up on phones in 2015.

Keep your systems operating systems up to date and don’t download files that aren’t from  trusted site to help avoid ransomware. If you do all these things and still end up under attack, contact your systems administrator or the manufacturer of your device. Take precaution, because ransomware isn’t going away anytime soon.

 

David Schroeder, Blog Writer, Lauth Investigations International

How to Protect Against Burglars

This was a big week for news in America. It seemed like a new story broke before you could finish reading about the first one. All of the major networks and newspapers were scrambling to report on everything taking place, but one story in the private investigation world stood out me more than the others.

The headline “Stranger enters Arizona woman’s home, eats food, uses shower, sleeps in her bed, police say” was attention grabbing and hard to forget. Most people would read this headline and quickly move on under the assumption that surely this was an outlier. This is a case of one dumb criminal who got far too cozy during a break, but if you do the slightest bit of googling, you’ll quickly find it’s really not that uncommon for home intruders to do these kinds of things. Here’s a rundown of some similar incidences and what you can do to protect your home and property.

 

Denver Police Warn Home Owners String of Break-ins, Burglars Eating their Food

In 2015 there were a series of break-ins across Denver. Each of the burglaries had something in common; the thieves weren’t stealing anything, but were breaking in and eating food at the houses. Wile nothing was stolen, it was happening so often that Denver police issued a warning to people in the area.

Denver police didn’t think the break-ins were related, but that almost makes it stranger. What are the odd all of these people were breaking into houses just to steal food? One of the burglaries was perpetrated by a kid. The homeowner walked into to find the kid watching anime on her tv while eating food. He ran from the scene when they cam home.

 

Arizona Man Enters Home, Sleeps in Woman’s bed, has Standoff with Police

The case referenced in the introduction took place in Mesa, Arizona last October. Joshua Forsgren broke into a home and took a nap inside the homeowners bed. Forsgren must have been pretty tired from all that burglarizing, because he was still asleep when the homeowner came arrived home with her children and found him in her bed.

She quickly exited the house and called police. When the police arrived they tried to get Forsgren to exit the home of his own volition, but he had other ideas. As police waited outside they observed Forsgen going through the house and eating food. After 90 minutes the police entered the home and took Forsgren down with a stun gun. He’s now in jail awaiting trial.

 

Man breaks into house, takes shower, eats pizza, but steals nothing

The Florida Man stories never cease to amaze us. If you’re unfamiliar with Florida Man, do a quick search and you’re mind will be blown. Whether it’s Florida Man setting his underwear on fire at a Starbucks or when Florida Man got body slammed by a pro wrestler after threatening him with a bb gun while trying to make him buy him a beer, Florida Man is always up to something.

While this story is surprising, Florida Man being the perpetrator sure isn’t. In September, 36-year-old Timothy Tomlinson broke into a home, showered, ate pizza and downed two bottles of water. Tomlinson didn’t steal anything, but he was charged with burglary for unlawfully entering the home. Luckily the homeowner didn’t lose any valuables to theft, but Tomlinson broke multiple kitchen windows to get in.

 

What does this mean to you?

It’s alarming to think someone could just enter your home while you’re gone. The fear of coming home while someone is still in your house is a scary proposition. One of the easiest things to do is make sure all of your doors and windows are locked whenever you head out. Porch lights are a great deterrent and they can help ward of would-be burglars by making it difficult for them to approach the home undetected.

Security cameras are excellent to catch in perpetrator in the act, but they’re also good at scaring burglars off. Some burglars are dumb enough to see cameras on a house and try to break in anyways, but most won’t. It’ll also give you excellent evidence to help the police catch any intruders.

Another great tip is is catalogue your property. By keeping an active inventory of all of your valuables, you’ll be able to immediately identify any property that’s stolen and provide pictures to police. This is as easy as snapping a picture with your phone and saving them to the cloud with a brief description you can write in your notes app.

If family heirlooms are stolen, consider contacting a private investigation firm like Lauth Investigations International. While the police would like to catch every single burglar and return property to their owners, their resources are limited and if it’s not a violent crime their motivation to catch the crook is low. Private investigators on the other hand work exclusively for you and know where to look for stolen goods. Armed with pictures and descriptions of the items, private investigators like Thomas Lauth can make short work of finding your belongings.

 

David Schroeder, Blog Writer, Lauth Investigations International

When Hiring a CEO Goes Wrong

When Hiring a CEO Goes Wrong

Hiring a CEO is a long and arduous process. Companies can’t afford to waste time and money on the wrong candidates. It’s bad enough when someone gets a CEO position and isn’t good at their job. It’s even worse when they have to resign in embarrassment.

More frequently than you might suspect, companies hire someone for a top executive position without doing a thorough background check. Instances like these not only waste company resources, but they hurt the company’s image and make securing top talent in the future harder. Here are a few times a more thorough vetting process could’ve protected a company’s resources and reputation.

 

Monica Crowley

Monica Crowley was a research assistant to Richard Nixon in the 1990s. She received a PhD from Columbia University in 2000 and was a political commentator for The Wall Street Journal, Fox News and MSNBC, among others. She has published multiple books as well.

When Donald Trump won the presidency he initially nominated Crowley to be the Senior Director of Strategic Communications for the National Security Council. Quickly after her nomination reports began circulating that Crowley had plagiarized large portions of the books she had written.

Initially the Tump administration said they stood by Crowley and that the attacks on her were politically motivated. However more and more evidence of Crowley’s plagiarism began to mount.

Crowley was found to have not only plagiarize portions of her books, but also her PhD dissertation for Columbia University. Harper Collins, Crowley’s book publisher, withdrew her books from being sold and Columbia said they were reviewing their records.

Crowley’s plagiarism went from minor footnote to national spectacle overnight. After standing by Crowley during the initial accusations, the Tump administration ended up withdrawing her nomination. This whole scandal could’ve been avoided with basic cross referencing and data mining.

 

Gustavo Martinez

Gustavo Martinez was the CEO of J. Watler Thompson, a major company in the advertising industry. JWT has over 10,00 employees working in more than 200 offices across 90 countries.

Martinez is originally from Argentina and became Global President of JWT in 2014. In January of 2015 Martinez was named CEO. Within a year of his promotion, Martinez was named in a lawsuit alleging discrimination by a female employee.

The lawsuit claimed Martinez had made numerous racist remarks during a company meeting. Martinez is said to have told employees to double check their bags and belongings since the hotel where they were staying  had so many black people. Martinez is also accused of making comments about raping female employees.

One of the more shocking aspects of this case is the brazenness of Martinez. All of these comments were made in front of large groups of people. His comments about black people potentially stealing employees belongings are even on video. In fact, Martinez had been known to discuss his distaste for Jewish people.

Martinez’s willingness to speak this way publicly surely could have been discovered before he was made CEO. Instead J. Walter Thompson is now engaged in a high profile lawsuit and lost their CEO. Extensive background investigations can protect your company from embarrassing headlines and wasting money fighting lawsuits that should never have happened in the first place.

 

Scott Thompson

Scott Thompson is an American businessman with an impressive resume. Thompson had a long career in technology before becoming the CEO of Yahoo in 2012. He had been the Executive Vice President of Technology Solutions for Inovant, Chief Information Officer for Barclays Global Investors, Chief Technology Officer and then President of Paypal.

Thompson’s work history made him appear to be the perfect candidate for almost any job in technology. How could he have gotten so many high level technology jobs without any skeletons being rousted from his closet?

Despite his exceptional work history it turns out that Thompson had been falsifying his resume. After six months as the CEO of Yahoo, Thompson was forced to resign after it was discovered he lied about his college education. Thompson claimed to have received bachelor’s degrees in computer science and accounting from Stonehill College.

When Stonehill College was contacted about potential discrepancies on Thompson’s resume, they would only confirm he had received a degree in accounting. Thompson blamed a headhunting firm for the false information, but the firm strongly denied the allegation. Yahoo has been struggling to find stead leadership ever since.

 

All of these cases share a common theme; they were all 100% avoidable. There is no excuse for hiring a CEO who has to resign in disgrace with a year of employment or even before they begin the job. Private investigation firms like Lauth Investigations International can identity these issues before your company makes a move.

Companies aren’t just wasting time and money on unqualified candidates, but they’re risking their reputations. Appearing dysfunctional is bad for investors and makes it more difficult to secure qualified candidates in the future. Lauth Investigations International has the investigatory skills to protect your business from self-inflicted wounds.

 

David Schroeder, Blog Writer, Lauth Investigations International