The invention of direct-deposit payments in electronic banking have likely saved companies millions of dollars over the years in labor hours, materials, and fees that previously caused problems for companies. However, in an age where your paycheck is sent automatically to your checking account, phishers are seeking to exploit this automation for personal gain.
The Internal Revenue Service has reported an upswing in various types of fraud that directly target a company’s payroll. While the ruses come in many forms, one of the most popular is phishing emails disguised as legitimate correspondence from an employee or upper management. It’s always an instruction to alter payroll information so that funds would be rerouted to the scammer’s bank account. Once the deed is done, the money is withdrawn and the company is responsible to replace the missing funds. While the FTC and the IRS are constantly reevaluating their strategies for containing these types of fraud, this particular scheme is hard to detect and often goes unreported. The email can outsmart security measures set down by the company or within a company’s email server, and scammers take amounts that can just be written off as unfortunate missteps on behalf of personnel.
Frauds such as these have gone through an evolution as security technology becomes more sophisticated and what we know about internet culture continues to grow. Internet frauds used to be about volume and inattention to detail—thus the birth of phishers, who sent emails rife with spelling and grammar mistakes out to mile-long email lists, casting a wide net throughout the web. Education about fraud has forced scammers to be more cautious. Today, companies who have seen this scam in its newest form remark that these phishing emails look so authentic that there may not be a question in their mind before obliging their request. Security measures that have risen from the nucleus of electronic banking combat wire fraud every day in the United States. Large sums in wire transfers now throw up giant red flags. Phishers and scammers are getting more bang for their buck by taking smaller amounts with more frequency, lurking below the radar. This does not require sophisticated hacking skills. Just the ability to open a Gmail account. Phishers make the account look cosmetically convincing, then throw out the lure. One of the most targeted entities is non-profit organizations, because of the benevolent nature of their business. The idea of someone ripping off a charity or relief organization is horrifying, but the simplicity of scams like this make the opportunity too lucrative to pass up.
It’s frightening how simple the fraud is to pull off, but there is recourse for businesses who are vulnerable to such a scam. One of the non-profits who fell prey to this scam was KVC Health Systems, an agency for child welfare in Kansas City. Their IT director, Erik Nyberg, says it starts with comprehensive education on company procedures, “The CEO is never going to email you out of the blue and ask you for any deposit changes. And if you have any sliver of a doubt, call the person who is making the request.” He goes on to discourage executives and upper management employees from using their personal email accounts to send staff correspondence, and to set email filters that will catch suspicious incoming messages. Social media managers are also cautioned against posting any company information to their pages that could serve to bolster a phisher’s credibility.
If your business has been the target of this wire fraud scam, you are encouraged to report them to the Federal Bureau of Investigation’s IC3 tip line.
Every business—from the mom-and-pop shop to corporate America—will encounter some form of crisis during their operation. Crises come in all shapes and sizes, including employee malingering, internal theft, brand protection, and a myriad of lawsuits that could bring an established business to its knees. When disaster strikes, it is the reflex of most companies to handle the matter internally, often delaying important investigative measures out of uncertainty, ignorance on how to proceed, or both. While an internal investigation allows a company to control available information and minimize any consequences, an independent external investigation conducted by a private investigator is the best course when it comes to finding a comprehensive solution to any corporate crisis. The important thing to remember is you cannot wait when a crisis arises, and hiring a private investigator should be one of the first items on your to-do list.
Independent private investigatiors provide the best solutions from the onset of the investigation. Investigators too often run into roadblocks during investigations because they are working from a narrative and timeline that has already been established by an internal party. When you have a qualified and objective investigator handling the investigation from the beginning, it lays a solid foundation that will lead to credible leads, proper gathering of evidence, and quality conversations with potential witnesses.
During a fact-finding process, internal investigators may not have considered all angles and left many leads unexplored. Potential witnesses within the workforce need to be interviewed and their statements recorded, but an internal investigator—usually a Human Resources representative or upper management employee—may not have the qualifications. Any witness testimony may be tainted because the investigator is not properly trained in interview and rapport. Witness statements could also be false or inconsistent because they fear reprisal from an internal investigator who may have clout when it comes to the employee’s future at that business. When a private investigator is retained weeks after the onset of the investigation, witness’s memories may be inaccurate or even non-existent. In some cases, an employee may have already left the company, or changed addresses. This results in more investigative measures required to locate that employee, which costs money and labor hours to the investigator.
Witness statements are valuable, but not so much as hard evidence that cannot be interpreted for a particular spin. One common example is surveillance footage. An internal investigator may think to pull surveillance footage from a single camera near the site of the incident or crisis, but the investigator may not pull surveillance footage from other cameras that could contain valuable information. Most companies invest in security systems that recycles surveillance tape after a short period of time, sometimes as little as five days. Once an independent private investigator is retained, valuable footage is gone, and other fact-finding measures will be necessary—again, more time and money at the cost to the company.
It is possible for an internal investigation to play out smoothly—at least at first glance. Even if the internal investigator is well-qualified to conduct the investigation, there will always be the question of objectivity when dealing with an internal investigation. A successful investigation that concludes with the termination of an employee who was found to be at fault for the crisis or incident has the potential to result in legal action. In this example, it would be a wrongful-termination suit. When argued in a court of law, it’s easy for the terminated employee to cast doubt on their former employer by citing the investigation into their wrongdoing was conducted by an internal employee with a direct stake in the outcome. When a private investigator handles the investigation from beginning to end, there will never be a question of objectivity, because a private investigator’s task is to find the truth—not manufacture a solution that will mollify their client.
When your company encounters a crisis, do not hesitate to retain a private investigator to find a solution. The time and resources spent on an internal investigation may all be in vain when the chips are down. To protect your business and its profits, take immediate action when a corporate crisis arrives by retaining a private investigator that will provide you with the expertise and objectivity for a successful solution.
If your business has encountered a corporate crisis, call Lauth Investigations International today for a free consultation. Call 317-951-1100 or find us online at www.lauthinveststg.wpengine.com
When growing a business, executives and owners have to go the extra mile when it comes to protecting trade secrets. In the pursuit of their company’s business, a common practice for corporations of all sizes is implementing non-compete clauses in their employees’ contracts. This ensures, should an employee leave the company for any reason, they cannot utilize trade secrets for the purpose of building a similar business of their own. It’s in a business owner’s best interest to be preemptive in protecting themselves from client poaching, theft of company secrets, and possibly even slander when it comes to current and former employees who violate their non-compete agreements.
Though they go by several names and the laws concerning them vary state to state, non-compete agreements are generally a legally-binding contract between an employer and an employee, whereupon acceptance of a job offer by a company, an individual agrees during their employment and following their termination they will not enter into any competing business for a predetermined period of time. Whether it’s working for a company’s top competitor, or striking out in their own business, non-compete agreements protect trade secrets, sensitive company information, and prevent competing businesses from poaching successful employees with promises of a handsome pay-raise in exchange for the expertise they might have gleaned from their time at their previous position. This kind of information can range from client bases to business operations to future products and services. The duration of the non-compete agreement following an employee’s termination have to be well within reason, as no employer can permanently preclude a former employee from any line of work.
Not every company experiences difficulties by virtue of a former employee violating their non-compete agreement, and some companies do not see the need for non-compete agreements at all, but the consequences of trade secrets being used to steal a company’s business can have devastating effects, ending in the worst possible circumstances with a business closing and an owner in debt. Even if a company is able to quash a non-compete violation in court, the cost to the company in legal fees can be astronomical, especially for smaller businesses. That’s why it’s important for owners and executives to be preemptive and proactive when it comes to potential violators. Luckily, a private investigator can help at all stages of a non-compete violation investigation.
Human resource employees are the salt of the earth, and can have a great influence on how a company develops based on the individuals they select for their workforce. However, human resource employees are not lie detectors, and do not always have access to legitimate, comprehensive background screening tools. Background screenings and checks are among the most common service associated with private investigators. If there is something suspect in a candidate’s past, licensed private investigators have the tools and experience to find it out. Private investigators can pull a candidate’s criminal history, financial history, and interview persons in their lives who can speak to character and work ethic. They can also spot patterns in a person’s work history or lifestyle that could be high-risk factors in a hypothetical non-compete violation—things like transience, long periods between positions, or financial destitution.
Some malingering employees can’t wait to be terminated before violating their non-compete agreements. It’s not uncommon for these individuals to exploit trade secrets for their businesses own gain while on company time and dime. While on a business trip, an individual might use company per diem to buy drinks for a person who could be a potential investor in their new business. Employees might use company supplies to supplement their project, such as printers, fax machines, computers, and other equipment. Private investigators can conduct diligent investigations within a company’s workforce to root out the source of the theft. Private investigators can interview witnesses, including upper management and other staff, review vital documents like bank records, and conduct surveillance of the company’s operations as needed to expose the perpetrator. Their objectivity makes them an ideal candidate to conduct such an investigation because they do not have a stake in the outcome.
There are many circumstances under which a business owner might come to suspect a former employee has violated their non-compete agreement. Word might have traveled through business circles that a similar business is starting up. Employees might start disappearing in clusters. Clients may suddenly decide to sever business ties in favor of a new contender in the competition. Whatever transpires, one thing is certain—documenting and exposing this exploitation is imperative, because the consequences can be costly. Retaining a qualified private investigator who specializes in corporate crises is crucial to resolving non-compete violations quickly, before the exponential costs begin to erode profits. Private investigators can perform surveillance on suspected former employees to document their movements, record with whom they met, and collect evidence such as pictures of a brick and mortar establishment, marketing materials, vital documents, and filings with the Secretary of State. Private investigators can send undercover operatives to infiltrate a workforce to get information the business privy only to employees. They can also enlist the aid of a confidential informant—an individual already within the company to provide information. This requires quality interviewing skills and developing a natural rapport with potential witnesses, both important qualities in a qualified investigator.
When non-compete violations are at their ugliest, not only do violators seek to siphon off their former employer’s business by exploiting trade secrets and knowledge of their operations, but they can also play dirty by exposing this information publicly. Another method involves deliberately spreading lies about the competition in order to drive business towards the former employee’s company. That’s known as slander and it’s legally actionable. Documenting the perpetuation of these lies and proving they are in fact false are crucial in these cases. Diligent fact-finding is the cornerstone of any private investigator’s expertise. Private investigators can conduct cyber investigations to track down the users behind profiles that post false negative reviews, follow rumors back to their roots, and forensically track how information left the competition and made its way into the former employee’s business nucleus. They can implement many of the strategies aforementioned: surveillance, interviewing witnesses, documenting evidence. Slander cases tend to have a divisive they-said, they-said narrative, which is where a private investigator’s objectivity becomes invaluable once more. Private investigators have no stake in the solution of an investigation. Their independence coupled with their expertise and resume make them spectacular witnesses in any subsequent litigation.
When a company has a non-compete agreement in place, it’s important that executives and owners are proactive when performing a risk assessment on a potential employee. It’s important that a healthy company culture fosters good comradery, honesty, and a policy of “if you see something, say something.” Building a case against a former employee who violated their agreement can be time consuming at the expense of company resources. Dealing with the fallout from litigation can bring a reliable business to its knees. Private investigators can assist in all phases of any non-compete agreement violation, and retaining their services will go a long way towards a body of objective evidence and testimony that can resolve a company’s crisis.
If you have suspicions that a current or former employee has violated their non-compete agreement, contact Lauth Investigations International today for a free consultation on how we can help you! Call 317-955-1100 or find us online at www.lauthinveststg.wpengine.com.
Carie McMichael is the Media and Communication Specialist for Lauth Investigations International. She regularly writes on investigations, missing person, and other topics in the criminal justice system.
The growing awareness of sexual abuse in the media has the public on high alert in all walks of life—a steady stream of investigations into allegations of sexual misconduct within religious communities, sport teams and franchises, civil service, and the workplace to name a few. It seems like every week the news cycle is dominated by another story in which a religious leader is denounced following allegations of sexual abuse against minor members of congregation. Investigations into United States Olympic teams have the parents of minor athletes with their ears to the ground, as the horror of Larry Nassar’s crimes continue to shake out in civil court. Leaders within these communities are educating themselves on how the power structure of these institutions leaves minors vulnerable and in many cases are depending on the services of independent private investigators to conduct unbiased, thorough investigations.
In cases where there are allegations of abuse, there is an immediate division between the survivor and the alleged predator. Many of the parties involved will immediately fall on one side or the other. Employers, colleagues, and public relations representatives in the alleged abuser’s life will begin a rash of character defenses, claiming that there’s no way an individual as friendly/respected/admired as them could be capable of such disgusting actions. Parents and loved ones in the survivor’s life will rally in support as they attempt to take on not just their abuser, but potentially an entire institution as well. All of the parties directly involved have a stake in the outcome of the investigation. Institutions that are suspicious of predatory behavior in their ranks often prefer to handle the investigation in-house, using their own investigators in the form of management, attorneys, or employees in another supervisory capacity to do the fact-finding. Not only can the qualifications of these individuals range across a spectrum of investigative prowess, but because they are employed by the employer of the abuser, they likely will have some sort of bias as an investigator. This is why it’s so important to hire an independent, third party private investigator from the onset of any allegations of abuse. Like any unimpeachable structure, the integrity starts at the foundation, with thorough fact-finding by an experienced, qualified investigator. Ethically, a private investigator’s only loyalty is to the truth, and without any stake in the outcome of an investigation, their findings can withstand a higher level of scrutiny than an investigator employed by the abuser’s corporation or institution.
The most qualified private investigators for sexual abuse investigations have a wide array of experiences in multiple areas of criminal justice. Unlike the resumes of corporation and institutional employees, they will have likely majored in an area of criminal justice, have worked law enforcement, have been retained by either the prosecution or defense to assist in a case, and have an intimate knowledge of criminal procedures and investigative methods. Independent private investigators have to be able to work multiple angles in an abuse investigation, vetting every statement by survivors and witnesses, as well as doing thorough fact-finding on the alleged abuser in the form of an extensive background check, with special focus on their work history and criminal record. This kind of comprehensive groundwork lays a strong foundation for any litigation that might take place following the solution of the investigation. And because the private investigator is an objective third-party, the case will have integrity in a court of law.
Another specialty of a seasoned private investigator is surveillance and undercover operations. An investigator who is able to move through a crowd completely unnoticed, melting into the background while they keep an eye on the subject. Sometimes it’s just a matter of looking like you belong, and surveilling the subject from a short distance, or keeping a digital eye on the subject in the form of a camera or tracking device. Regardless, subjects behave most naturally when they do not know they are being watched. Hiding in plain sight, private investigators are able to document an abuser’s movements, correspondence, associates, and schedule to establish means and opportunity with regard to the allegations. Private investigators specializing in undercover operations have an advantage when interviewing witnesses and subjects, building a rapport that allows them to open up to the investigator. This form of subterfuge is often crucial in abuse investigations, particularly if the allegations have not yet become public knowledge. This time is valuable to an undercover operative, because when there are abuse allegations in an institution, there is often a circumventing culture of silence within it. Employees and associates are instructed not to speak to press or law enforcement regarding the allegations, there has not been need for any sort of legal gag order, and these potential witnesses will have their guard down. Private investigators and their field investigators can garner credible leads, leading to a more comprehensive, thorough investigation.
There have been many institutions, particularly in the Catholic faith, that have been accused of what has been characterized as a “cup and ball” routine in which supervisory entities will transfer employees or members of clergy accused of sexual abuse to remote branches of their network, often in different jurisdictions, to prevent law enforcement and investigators from doing their due-diligence. Private investigators are given an autonomy that is free from bureaucratic or jurisdictional chains. They can follow leads to track down multiple witnesses and can track an abuser’s movements—all across state lines.
Regardless of an alleged abuser’s reputation or status, allegations of abuse must always be handled with due-diligence and a sense of urgency. Corporations and institutions have it only in their own interest to eliminate potential predators in their ranks. The cost to retain a private investigator to conduct a thorough, objective investigation is a small fraction of the potential cost to these entities in the form of lawsuits that result from an investigation, usually on the part of survivors who were vindicated in their accounts of trauma and betrayal on behalf of mentors and leaders in their lives. Retaining the services of a qualified private investigator can go a long way to bringing predators to justice and preventing potential ruin of institutions that otherwise provide a great service for individuals in communities across America.
Carie McMichael is the Communication and Media Specialist for Lauth Investigations International. For more information, please visit our website.
Smartphones have become such an integral part of our everyday lives that many users joke their devices have become grafted to their hands. We use them to maintain contact in our work and personal lives, correspond through email and social media, and a bulk of Americans have made the transition to conducting their banking through the use of mobile applications. As developers continue their bottomless pursuit to create an app for everything, more and more of our real, flesh-and-blood lives are being stored on our phones: personal details, account numbers, passwords, and other sensitive information that could be misused if it fell into the wrong hands. That’s why smartphone users have to educate themselves on the specifics of a scam called “SIM card swapping.”
What is SMS?
For many telephone, internet, and smart device developers, SMS (short message service) text messaging is the cornerstone of their services. As of 2010, it was the most utilized service provided by communication companies with 3.5 billion users. It became a vital tool in direct marketing campaigns and remains one of the most popular forms of communication in younger users. Because of the ubiquity of smartphones, many companies that require a two-step authentication process for their users’ security implement SMS as a secure means of accessing information. For example, you attempt to log in to your bank account, correctly entering your username and secure password. It’s not uncommon for banking apps to prompt a second form of verification, so the app tells you it will now be sending a four-digit verification code to your phone that you must enter on the app to confirm that you are who you say you are. The code is sent to your phone via SMS. Once this information is transmitted over SMS, users are often derelict in deleting that information from their devices. This is where users are vulnerable to the scam.
How SIM swap scams work
Smartphone users who have lost their phone or who have been the victim of a theft often have the ability to call their mobile provider and provide their secure information in order to have the provider remotely wipe the SIM card and have that information transferred to another phone. Thieves in search of secure information will use tools like phishing mail campaigns, posing as legitimate companies like insurance and credit card companies to get the victim to willingly hand over identifying information such as date of birth, address, and phone number. Once they have enough identifying information, they will call the victim’s mobile provider and pose as a customer. They claim they’ve lost their phone or their phone was stolen from them. Then, using the victim’s identifying information, they will request that the mobile provider remotely wipe their old SIM card and rewrite it to the SIM card in their new device. Just like that, the thief has any and all information that has ever been transmitted via SMS text. This leaves accounts, email inboxes, and secure information vulnerable to fraud. “A high proportion of banking customers now have mobile phone numbers linked with their accounts,” fraud prevention consultant, Emma Mohan-Satta, told Digital Trends, “and so this attack is becoming common in some regions where this attack was not previously so common. Unlike mobile malware, SIM fraud attacks are usually aimed at profitable victims who have been specifically targeted through successful social engineering.”
Who is vulnerable?
Anyone who uses their smartphone as part of a two-step authentication is vulnerable to a SIM card swap scam. Once the thief has their hands on your personal information, they can devastate you in minutes by performing bank transfers, rerouting mail, and making purchases in your name. If the SIM card contained any compromising information, such as lewd photos or inappropriate communication with another person, the perpetrators can use that information to blackmail a victim into paying a tidy sum in exchange for the return of the compromising data. A victim named Tina told Motherboard, “This just happened to me over the weekend. I lost service late Saturday night and assumed it was an issue with my always buggy iPhone. Then on Sunday morning my husband got a text from T-Mobile saying that a line on our phone plan had been cancelled (mine) and i soon discovered that $1200 had wired out of my bank account to someone in [redacted] with my same last name.”
While the cost to a single individual can be devastating, a sophisticated thief can do even more to topple a business like a house of cards. It’s common practice for some types of employers to issue their employees a company cell phone to facilitate business, and in this day and age, that almost certainly means a smart phone. Correspondence between coworkers, appointments, account numbers, and sensitive company information can be exposed and exploited for gain. Companies that carry high financial sums in their accounts can be ruined before they even realize there’s a problem.
How to protect yourself
Dependence on smart phones to facilitate two-step authentication plagues many users throughout the country who enjoy the convenience of verifying their identity through SMS. Luckily, tech sites like Motherboard recommend a few ways you can protect your identity and your monies.
Beef up account security
Many major cell phone service providers are developing new methods of two-step authentication in light of the rise of SIM card swap scams. Many offer their customers the option to set up a secure PIN for their account, completely separate from the login information used to access their account. The PIN is used as a primary verification feature specifically for when customers call into the support center for SIM card-related issues. Previously, many providers opted for a security question for this type of authentication, but the answers to these security questions can often be found on a victim’s social media, such as, “Which high school did you attend?” This way, the PIN is never transmitted through SMS text messaging, and no personal information from a social media profile can be used against them.
Don’t link your number to your online accounts
Once a thief has access to your account, they can easily reset your password and other authentication methods, making it very difficult to quash the problem. Instead of linking your mobile cell phone to your accounts, you can choose a different sort of number, such as a Google Voice number.
Many individuals and companies bypass security measures for a number of reasons, such as lack of time, interest, or the mere belief that they could never be the victim of a SIM card swapping scam. The reality is that it can happen to anyone, and there’s no shortage of victims for scammers. Users who practice their due-diligence can build a security to block them out. When the scammer hits this wall, they simply move on to the next target. Educate yourself and ensure that target isn’t you.
Carie McMichael is the Communication and Media Specialist for Lauth Investigations International. For more information on investigation topics, missing persons, and corporate solutions, please visit our website.