Blog

14 August 2020
executive-protect

There are various risks that you face anywhere that you go. Whether you’re in the city or in the sticks, thousands of miles from home or just down the street, dangerous situations can always present themselves. Ex-boyfriends/girlfriends, ex-wives/husbands, former employees, or even complete strangers. Anyone can pose a threat or seek to intimidate at any time, so it’s important to always be prepared. Just like the Boy Scouts. In this post, I will be teaching you the best ways to protect yourself and others.

There are usually indicators that your safety may be compromised—the guy at the deli is being especially pesky, that creepy guy keeps on popping up on your route during your morning run, your rabbit’s been boiled. You get the idea. You’ll have a spidey-sense that something isn’t right, even if you’re not entirely sure what it is. That’s your human intuition. Don’t just ignore it with rationalization because you’re “in a good neighborhood”.

Dan Ribacoff‘s 3 Personal Protection Principles:

  1. Constant awareness
  2. Scanning your environment
  3. Taking proper precautions

Constant Awareness

Some people are completely oblivious. You could tail them for 100 miles and they would never notice. Others are on the complete opposite side of the spectrum and become alert the second that someone walks near them or drives behind them for more than a few minutes. They have constant awareness. If you were a stalker, whom would you follow, Mr. Ignorant or Mr. Cognizant? Exactly. By being aware, you make yourself so much more protected than you would be otherwise. You can’t just walk around like everything’s rosy all the time with your headphones in, because situations change based on who you are, where you are, and even when you are (The New York City subway is a lot safer at 9:00 AM than it is at 11:00 PM). It’s time to raise your level of awareness, especially if you suspect that you’re being harassed, followed, or stalked.

Just as the United States Government has its yellow, orange, and red threat levels, you need to have those as well. I once had a client who’s daughter’s college boyfriend was staying with them over the summer to take some classes, as they lived much closer to the university. My client said that his daughter was head over heals for this guy and him and his wife liked him too—he’s a nice kid, and his father’s a police chief. Sound’s like a match made in heaven, right? Wrong. Systematically, money started to go missing from my client’s house. He then noticed that his wife’s jewelry and the pills in medicine cabinet started to go missing as well. I told him he should have called me the first time that something went missing, and I would’ve hidden cameras installed. “Yeah,” he said, “but I didn’t want to believe it.” If my client would have raised his level of awareness the first time something went missing, he could have solved the problem much sooner and caught the runt red-handed.

Scanning Your Environment

Arson, acts of terrorism, street crime—these are all dangers that we face in today’s world. You have to be mindful of your surroundings not only for your own protection, but also to protect others as well. I see so many people with their head buried in their phones, totally oblivious to everything going on around them. They concentrate more on what they are doing rather than what’s going on in the environment around them and call it “multi-tasking”. The human mind can only do so many tasks at a time before it overloads itself, so it’s important to focus on your personal safety in addition to your twitter feed or what you’re planning on having for dinner. Think tactically:

  1. Locate all exits: Whenever you enter a building, familiarize yourself with the location of all the nearest entrance and exit points (The same way that you would on an airplane).
  2. Use your peripheral vision: When I’m walking around a city or on a main, busy street, I am always using my peripheral vision. It may seem like I’m looking into a store window, but I’ll actually be using the reflection in the glass to see what’s going on behind me.
  3. Plan Scenarios: Ask yourself, “If something dangerous were to happen right now, how would I find safety?” Would you have a plan? Would you know what to do?

Taking Proper Precautions

On an average day, your personal threat level is on yellow. Even if you’re sitting in a police station, you don’t know if some lunatic is going to come in with an AK-47 (he would be Swiss cheese in a matter of seconds, but you get the point). That’s why it’s alway best to maintain a routine state of alertness. It’s no different than keeping a jack in your car; you want to be prepared just in case. However, if you feel you’re being stalked or followed, your everyday state of awareness needs to be raised and accompanied by a call to action:

  • Seek Help: Obviously, locate a police officer. That’s what the police are there for. They don’t charge and you pay taxes, so don’t be afraid to approach one. If there are no officers around, duck into the nearest restaurant, store, or place where there are lots of people around. Tell the clerk, security guard, somebody bigger than you who looks respectable, “This guy is following me.” Most people are willing to help somebody in distress. If you’re in the car and and feel like you’re being tailed, dial 911, describe the car that’s following you as best as you can (make, model, color, any digits of the license plate that you can see). Make sure to keep moving to avoid getting boxed in. You can even drive to the nearest precinct if you know where that is. If you’re on the highway, go to a rest area with restaurants and a gas station.
  • Alter your Schedule: The more predictable you are, the easier you are to find. Leave at different times to go to work. Use different entry and exit points of a building. Take a later train.
  • Vary your Routes: Mix it up a little bit! Cross the street when you don’t necessarily have to (remember to look both ways). Stop and look in a store window for a few seconds. If you find that a certain person is always there, even if you change up your walking speed or route, seek help immediately. The same goes for driving as well. When I was a jewelry salesman, I often had to check for tails, so I would never go directly from jeweler to jeweler. These days, however, a stalker has the ability to track your car with GPS, which is illegal. Normally a GPS will be in the form of a magnet stuck under your car, so take a look underneath or bring it to a mechanic or even a bug-sweeper to take a look as well.
  • Change up your Appearance: If you want a good way to throw off a tail, you can change up your look every day. I had a client in the diamond business who would come to and from work every day in a bunch of different wigs, hats, sunglasses, baggy clothes, etc. and it worked to perfection. Refrain from wearing any signature items that might give you away, like an Indiana Jones fedora or big-rimmed sunglasses.
  • Dress Appropriately: If you’re going to wear a pencil skirt and 4 inch heels, you’re not going to be able to protect yourself or run away from anybody.
  • Protect your Personal Space: This is very important. The space between you and another person should be an arm’s length at the very least. Why? Personal space gives you reaction time. Think of when you’re driving a car and someone is right up your tail. If you hit the brakes, bang. Same with personal space—if a person is walking too closely to you, you have less time to react if he or she tries to physically harm you.
  • Make a Scene: You shouldn’t be afraid to scream or make a commotion when you feel immediately threatened. The police won’t arrest you for jumping up and down like a lunatic, but it will certainly get their attention. When you draw attention, the bad guys lose the element of surprise, and their natural reaction is flight.

Pepper Spray

Pepper spray is a useful and nonlethal self-defense weapon. It is also perfectly legal to carry if you are 18 or older (just don’t carry it onto an airplane or into any stadium or arena). An inflammatory agent, pepper spray, which typically comes in canisters, is a chemical compound that irritates the eyes to cause tears, pain, and temporary blindness. It is often confused with mace, which is an irritant and is not legal for personal use.

Pepper spray can render an assailant for anywhere from 15 minutes to an hour. The police use it, mail carriers use it, and civilians should most definitely carry it, especially women living alone or taking public transportation at night. You can purchase it at any local sporting goods store, drugstore, gun dealership, or online.

It’s important that you receive some pepper spray training because pepper spray can be used against you as well. There are several rules to effectively using pepper spray:

  1. Aim for the chest. Your initial reaction may to be to go for your assailant’s head, but the head is a much smaller target. Rather, aim for the chest and then tilt up from there.
  2. After you pepper-spray the assailant, get out of there. Run, scream, yell. You don’t have to stick around, nor should you.
  3. Pepper spray doesn’t belong at the bottom of your purse or backpack. Keep it in your coat pocket for quick and easy use if you do need to protect yourself.
  4. Be mindful of the wind! You can actually spray yourself if the wind is blowing towards you.
  5. If you do end up getting pepper sprayed—either from wind blowback or your assailant using it against you—rinse your eyes thoroughly with fresh running water. When I was in the police academy and working as a reserve, the higher-ups would ask the cadets, “Why did you stick that guy’s head in a toilet bowl and flush?” The answer, “He got pepper-sprayed! Plenty of fresh running water!” Cop humor.

Don’t be a Bling-A-Ling

jeweller-hand

When you advertise, you usually get clients, so always keep your valuables at home or under wraps. Who is a thug going to rob: An upper-middle-class woman with the diamond ring and an expensive suit or some lady who looks like she’s borderline homeless? The nicer you look, the more likely you are to attract attention, and cellphones are just as much of a target as jewelry, so keep them out of sight.

Common Household Items

When it comes to self-defense, a weapon is not really a weapon until you use it as such, and many common household items can moonlight as weapons when needed to protect yourself:

  • Keys
  • A rolled up magazine
  • Handbags
  • Belts
  • Umbrellas (my personal favorite)

Self-Defense

No normal person wants to fight, but if you’re attacked, you need to win and you need to win quickly. You want to render your assailant incapacitated or injured, and leave quickly. Achieving this can be relatively easy if you know where to strike. There are various places of vulnerability on the human body. Use them:

  • Groin: The old tried and true. The groin offers a great target, especially for close encounters when most people are focused on the upper body. Always try to hit low first—bam with a knee strike. At the very least, your assailant will step back in pain, increasing your space and reaction time. And if you’re grabbed from behind, reach back and go for the “family jewels”. Squeeze and twist!
  • Throat: In a life or death situation, it doesn’t matter how big you are, you can’t protect your Adam’s apple, even if you’re a professional UFC fighter or an NFL linebacker. It only takes about 3 pounds of pressure to break a trachea, and you can’t strengthen it in any way like you can a bicep or pectoral muscle. If you ever find yourself in a situation where someone is on top of you and choking you, go on the offensive and hit their Adam’s apple as hard as you can or grab their trachea and try to crush it.
  • Brachial Plexus: The brachial plexus is a bundle of nerves that runs down the side of the neck and through the shoulders; it controls movement and feeling for arms forearms and hands. By striking it with a fist or the side of your hand, you can interrupt motor activity and cause temporary dysfunction and near paralysis to that side of the upper body. All you have to do is aim right for the spot where the neck and shoulder meet. Like the throat, there is no way to protect it.
  • Fingers: Snap the pinky or ring finger. When you break someone’s finger, they may lose the will to fight. In a life or death situation, you can even use your teeth to bite off someone’s finger if you really have to. It only takes the the amount of pressure that it would take to bite through a carrot.
  • Nose: If you’re grabbed from behind, throw your head back and head-butt the assailant’s nose. Being hit in the nose is incredibly painful and will cause the assailant’s eyes to tear up, temporarily blinding them.
  • Eyes: If the bad guy can’t see, he can’t harm you. If someone is on top you and trying to harm you, use your thumbs to gouge their eyes out. Start in the corners by the nose and apply pressure. Do what you need to do to be safe.

Staying Safe from Shootings

Unfortunately, nowadays, we have to contend with all kinds of shootings—mall shootings, street shootings, school shootings—and it’s imperative that we learn how to protect ourselves. In order to do this, we have to mentally prepare ourselves and our families to know what to do and what to look for before and incident takes place, because once it does, there’s no time to think.

  • Cover: Most people freeze when they see or hear gunfire. The best thing that you can do his get behind something to shield the fire:
    • Fire hydrant: Although it won’t protect you fully, you can squat down and turn sideways behind a fire hydrant, making you a much smaller target.
    • The engine part of a car: Duck down and huddle behind the front of a car by the front tire. A bullet can’t penetrate an engine block and the tire will shield you from any ricochets.
    • Brick wall: Most walls are sheet rock and won’t protect you from a bullet. You want to hide behind solid wall of brick, concrete, etc.
    • Lie Down Flat: If you can’t find cover, try to lie flat on the ground and protect your head with your arms. It’s better to take a bullet to the arm than the head. If you are shot, the best thing you can do is play dead.
  • Concealment: If you can’t find cover, the best way to protect yourself is to look for concealment. Look for something to hide behind that will keep you hidden. Bad. guys typically don’t shoot what they cannot see.
  • Empower your children: When I was a kid, we had nuclear drills and fire drills. Today, there should be numerous shooting drills taught in all schools. Unfortunately, most schools are unprepared when this occurs and the first thing they yell is “Everybody hide in the closet!”. While it may work, we can instead teach our children to protect themselves with simple techniques in the unlikely even that a school shooting occurs:
    • Knowing exit points of the building
    • Run as far away as possible from the source of the gunfire as fast as possible
    • Knowing safe and concealing hiding places
    • Knowing to use their resources for cover or concealment (turning over tables, desks, etc.)

How we can Protect You

securities-and-armed-3

Here at The International Investigative Group, we have a team of licensed agents who are highly trained and experienced in both security and protection. Our team of former law enforcement has been protecting our clients with a a variety of armed and unarmed services for over 30 years.

If you need professional assistance for any type of corporate/private investigation, physical security, or cyber security, do not hesitate to contact us at hello@iigpi.com, or at (212) 987-0808

10 August 2020
we-work-with-insurance-2

When you hire someone, you’re not just giving them a job. You’re allowing them to be a member of your team, believing in them to bring something special to the table, and relying on them to represent your business the right way. When considering the magnitude of your responsibility to your business and your employees to hire the right person for the position, a background check on every candidate that you’re considering is absolutely essential… But what sort of things should you be looking out for on these background checks? Dan Ribacoff, an expert private investigator, describes the top 5 things to do before hiring someone:

#1. Are They Really Who They Say They Are?

Let’s say that you put out an ad that your business is in need of a new Operations Manager. You’re searching and searching, but you just can’t find a good fit for the job. Finally, you get an application for the position and the candidate’s resume says that they graduated at the top of their class from Harvard with a 4.0 GPA, they’ve had tons of work experience in operations, they’ve done charity work in South America, and they’re proficient in 3 different languages. Sounds like the perfect man/woman for the job, right? Not really… Odds are that pretty much none of that stuff is true.

According to an employment screening benchmark study, 85% of job applicants lie on their resumes in some way or another. While most of those lies are only small exaggerations that don’t make a huge difference, there are still quite a few applicants who will forge their entire resume to land a job that they are in no way qualified for. According to Dan Ribacoff, in addition to a background or reference check, a good strategy to spot the frauds is to ask each applicant to walk you through their resume as one of the first few interview questions, then ask detailed questions about each aspect of the their resume or LinkedIn profile. He states, “You can easily tell who knows their stuff from memory and who is making it up as they go if you’re really looking out for it.”

#2. Criminal Record Search

we-work-with-police

The last thing you want to do is hire the next Jeffrey Dahmer or Ted Bundy. A lot of employers forget the importance of looking up candidates’ criminal records, so sometimes they have to learn the hard way. If you hire someone who was arrested for embezzling funds from the firm that they used to work for, what’s to stop them from doing it again to your firm? If a guy was charged with sexual harassment or sexual assault, do you really want that guy working in the same office as all of your female employees? These are things that you have to be aware of when you are making your hiring decisions because you never truly know what people are capable of. As an employer, recruiter, or human resources professional, it is your responsibility to make sure that everyone you hire does not pose a threat to your business or the well-being of your employees and customers.

#3. Drug Tests

Drug testing your candidates or even current employees is a great way to uncover more about who you’re hiring. If you run small business, like an ice cream shop, and hire high school or college kids part-time, don’t have high hopes for negative test results. However, if you are a firm that only hires professionals with high forms of education and industry experience, drug tests can be a useful tool to ensure that you are hiring serious and healthy candidates.

In most states, drug testing applicants is completely legal as long as the applicant is made aware that the drug test is just a part of the interview process. Drug testing prior to the offering of the position is allowed sometimes, but most of the time, the applicant is offered the position first, so it’s normally the final step of the hiring process. A simple urine test is relatively inexpensive and is all that is necessary. It can detect marijuana use up to a month prior and harder drugs 3-7 days prior, which may not seem like a lot, but if someone can go without addictive drugs for over a week, it means that they are not regular users, nor are they dependent on them.

#4. Social Media Analysis

social-media

Taking a look at a job candidate’s instagram is a great way to learn more about their personal life and what they do outside of the office. A lot of the time, you’ll be surprised at what you may find. A lot of people think that what they post on social media stays private between them and their friends/followers, so they’re more likely to post things that truly represent who they are and how they feel about certain things.

Let’s take a second to look (and laugh) at some big social media mistakes that employees and job applicants have made:

Bonehead #1
Bonehead #2
Bonehead #3
Bonehead #4
Bonehead #5

#5. Prior Employment Verification

Listing 2-3 references are a standard part of any interview process and provide a great perspective on how others felt as their employer. The biggest problem that we’ve seen is that often times, candidates will lie about their reference: they’ll give you contact information of their former employer, but the phone number that you call will actually be the phone number of a friend or family member who will pretend to be their reference and will provide them with a stellar that they would not have gotten otherwise.

There are 2 different but effective steps in conducting prior employment verification to get the most accurate information about a job candidate. The first is to verify that the contact information given to you is real. You can do this by calling the number and speaking to the person and asking clarifying questions about their business, emailing the reference at a verified company email address, or even meeting the reference in person. The second step is to use their resume to contact previous employers who were not listed as references. Obviously, if the candidate was fired from a job or an employer had a negative experience with them, they will not list them as a reference, so you’ll have to do some research in contacting them, but by contacting non-listed references, you can uncover things that the candidate planned on leaving out of their application.

What We Can Do For You

computer-forensic-3

After reading this, you can tell how much time and effort goes into screening just one candidate. We know that as a working professional, you may not have the time to do all of the things listed above, so we’re here to help. Here at International Investigative Group, we have over 30 years of experience in conducting background checks, drug tests, criminal history searches, social media analysis, prior employment verification, education verification, financial checks, and much more! Feel free to check out our Pre Employment Screening Services.

If you need professional assistance for any type of corporate/private investigation, physical security, or cyber security, do not hesitate to contact us at hello@iigpi.com, or at (212) 987-0808
5 August 2020
stealing-the-work

According to Dan Ribacoff, a break in is defined as: When one or more persons illegally forces entry into a home or private property, usually to cause harm to others or to engage in further illegal activity. Most break in attempts are targeted, meaning that an intruder normally doesn’t just break into a random home or place of business. There is almost always a motive for their actions. During my 30 years of being a private investigator, I’ve seen and solved numerous break in cases that occurred for many different reasons:

1. Burglary

When you think of an intruder breaking into a home or place of business, you immediately think of burglary and you should. It’s very common (A burglary occurs in the United States every 26 seconds). Most home/business break in cases involve the attempted theft of physical items or even electronic information stored on a computer. On average, these burglaries end up costing victims roughly $2800. Luckily, in the past 10 years, the amount of burglaries in the United States have drastically decreased, most likely due to the increase in burglary preventative technology, such as home security products like Ring.

2. Revenge

More often than not, the intruder actually knows the victim who’s home or business they are breaking into. Most of the time, they are doing it to get back at a person who they feel wronged them in some way. I’ve seen it a lot with crazy ex-boyfriends and ex-girlfriends who’s relationship ended badly. In their deranged minds, these people feel that breaking into the other person’s home or business will make them even for whatever it is they believe was wrongfully done to them. If you are the victim of a break in and want to find out who did it, the first thing you should ask yourself is “Who would have a motive to hurt me/my family/my business?”.

3. Arson

fire

If their intentions are to harm others, arsonists may break in to a home or building to cause a fire, as fires intentionally set from within a structure are much more dangerous and difficult to put out than fires set from the exterior. The most common places in a home or building where an arsonist may start a fire are in trashcans or anywhere where they can have access to flammable chemicals, such as a janitor’s closet or a laundry room. That’s why it’s important to install and maintain smoke detectors in these areas where a fire could easily be caused.

4. Abduction/Kidnapping

While it’s not incredibly common for a break in to result in an abduction or kidnapping, it does still happen and should be taken very seriously. Most commonly, a break in for kidnapping is actually done by a non-custodial parent who wants to take his/her child away from the other parent who was legally given custody. With those cases, it’s very easy to track down the intruder/kidnapper. Only a fraction of a percent of these abduction/kidnapping cases are similar to what you see or hear about in TV and movies like Taken or All the Money in the World.

5. Planting Electronic Bugs/Spy Equipment

Some people will break in to homes or buildings to spy on others to gather evidence. They’ve watched too many James Bond movies and don’t even think twice about illegally entering somewhere in order to “complete their objective”. As a licensed private investigator, I’ve planted plenty of electronic bugs and spy equipment in my day (See How to do Your Own Electronic Surveillance). There are plenty of completely legal and effective methods of electronically spying on people, but breaking in to do it is definitely not one of them. It’s a job best left to the professionals.

6. Needing a Place to Stay

This reason is sad, but unfortunately not everyone has a place to stay every night. You’ll see these cases increase in colder months, so make sure to keep your house or place of business secure during the winter months if you don’t want to wake up to a complete stranger snoozing on the couch in your living room or lobby area (You have no idea how many people break into office buildings just because of how warm and cozy their lobby looks).

Staying Protected

surveillance

In order to stay protected from a break-in there are a few precautions you can take that will make an intruder think twice about illegally entering your home or business. The first would be to install motion detection cameras around the perimeter of your home or building (Bonus points if they have automatic lights that turn on when they detect motion). It’s also a good idea to install locks and alarms in all of your windows, doors, and other possible places of entry. Make sure that they ring and automatically alert the authorities when triggered. If an invader sees that they’re being captured on camera or hears an alarm going off, I’ll bet that they won’t stick around much longer.

If you need professional assistance for any type of corporate/private investigation, physical security, or cyber security, do not hesitate to contact us at hello@iigpi.com, or at (212) 987-0808
3 August 2020
new-sites-3

With so many employees suddenly working from home, often with very little time to prepare, businesses are at potential risk for a wide range of issues, including cyber crime. A lot of them are left wondering what can/should they be doing to protect their business interests, their employees and their client/customer data? What are the risks? What are the potential cyber security protections? How does business insurance come into play? To answer these questions, I had the pleasure of speaking to Dan Ribacoff, one of the world’s most foremost private investigators.

Dan Ribacoff states, “The risks of working from home are that the internet connection and computer may not be as secure as those in your office. With your office, an admin can track the internet connection and computer usage in the building, who is using it, and what they are using it for. When your employees are out and about, connected to the internet from different locations, you lose that control that you had previously.” He then explained to me that to secure important data, it is imperative that certain procedures be followed:

You should have a password protected computer

For your computer, you’ll need a password complex enough that it can’t be guessed by roommates or family members. While they may not be trying to steal your information or harm you in any way by using your computer information, they can still accidentally put your cyber security at risk. If they use your computer to access their email or do a quick Google search, they run the risk of having malware or other harmful programs downloaded on your computer if they click on something as small as a bugged link.

When creating your password, you should refrain from using commonly guessed pass-phrases, such as pet names, children’s names, birthdates, anniversaries, digits in your address/phone number, and school names. These are things that anyone can find out about you from just a quick google search. Everybody posts pictures and videos of their pets and children on their social media (I know I definitely do). The first place that a hacker will look for potential passwords is on your social media for the names of your pets and children.

After each work session, the computer should be logged off and shut down

From what I’ve seen over the years, when most people are done working on their work computer, they just turn off their monitor or put the computer in power-saving mode so they can just resume what they were working on the next day… bad move. When you do this, your computer is still logged in and running, making it much easier for a hacker to get onto your computer and access all of your data. That’s why it’s always important to double check that there are no lights coming from the computer itself when you turn it off to make sure that it is off and not on sleep mode.

The internet log in password should be complex

You may think that someone else being on your WiFi is no big deal, but in reality, it’s almost as dangerous as someone having access to your phone or your computer. Think about it… everything you do on your computer that requires an internet connection runs through your WiFi router. If a hacker is able to get on to your home Wifi, it makes it pretty easy for them to see everything you do while connected to the internet.

When setting a home WiFi password it should be practically un-guessable. Similar to setting a computer password, avoid using easily guessable passwords, such as pet names or child names. Instead, make it complete nonsense words with numbers, capital letters and special characters. Something like, RedHotPotatoSalad170% or 23BumblebeeTree!, because absolutely nobody will ever think of that.

A high quality virus scanner should be installed in the computer. When it comes to which one to download, I recommend either McAfee or Norton. I first mentioned this in a previous blog post (Identity Theft: 10 Ways to Protect your Identity), but these anti-virus services basically act as a bodyguard for your computer and all of the data that you have stored inside of it. Don’t be cheap when it comes to protecting your computer because a data breach will be a whole lot more expensive. I recommend to all employers who currently have their employees working from home to invest in anti-virus programs for all of their employees. If you are an employee, it would also be a good idea to talk to your employer about having these programs installed. They will most likely pay for the installation and it will make you look pretty good as well (Did somebody say “promotion” or “salary raise”?).

Use a VPN if possible

A Virtual Private Network, or VPN, allows you to securely connect to another network through the internet. You can use them for numerous activities, such as accessing sites in other regions or countries, but in this case, it would be used to protect your IP address and browsing activities from any hackers. As stated before, if a hacker is on the same network as you, they can see what you are doing or what you access while you are connected to that network. By using a VPN, they would not be able to see which network you are using, nor would they be able to have any sort of access to it.

Do not work from any public locations that have open internet connections

Public WiFi Might Finally Become Secure After All | Hacker Noon

Sure, the WiFi at Starbucks has great internet speed and it’s a relaxing place to work and sip a Frappuccino, however, they have a public network with open internet connections, which means poor cyber security. That means that anybody within the network’s reach can join and have access. That’s why you get a little warning symbol when you join an unsecured network. The non-threatening hipster guy with the nose ring who’s sitting two tables away, with the right technology, could easily use that network to steal your information without you even knowing it. That’s why employers should not allow work to be conducted from public networks, or they should supply their employees with a VPN for their computers in order to maintain optimal cyber security for their businesses.

Insurance

As far as insurance goes, speak to your broker about having adequate insurance for data breaches, ransomware or other cyber risks. These breaches can be very detrimental to your business and could really break the piggy bank. Remember when Sony Pictures was hacked in 2014? 100 terabytes of data were stolen and numerous unreleased films were leaked to the public, causing Sony to lose millions in the process. Don’t let something like that happen to you!

If you need professional assistance for any type of corporate/private investigation, physical security, or cyber security, do not hesitate to contact us at hello@iigpi.com, or at (212) 987-0808
31 July 2020
personal

Identity theft, also known as identity fraud, refers to a crime in which somebody wrongfully obtains and and uses another person’s personal data to defraud, defame, or deceive, typically for financial or economic gain. It has become one of the largest and most problematic white-collar crimes today. According to Dan Ribacoff, “With the ease and accessibility of technology and platforms like the dark web, any document or transaction has the potential to be a scam. Identity thieves conduct identity fraud, both online and off, so you have to always be ready for them. To protect your personal privacy, adopt the same vigilance as you would to protect your home and valuables.”

The Different Kinds of Identity Theft

●Financial Identity Theft: This can occur when credit reports and bank accounts are breached. It is the type of identity theft that people are often most familiar with.
●Insurance Identity Theft: You may not realize it, but this illegal practice can yield big money for criminals. Medical care is one of the hottest commodities in the United States today.
●Medical Identity Theft: Scammers visit hospitals, emergency rooms, and pharmacies to receive medical care… and you’re actually the one paying for it.
●Social Security Identity Theft: Social Security Numbers can be sold to those who need US citizen statuses, such as illegal immigrants, along with driver’s license ID numbers.
●Income Tax Fraud: Scammers use your identity and file a false tax return, claiming a refund. They receive the refund, while you get stuck with an audit by the IRS. With e-filing, they can, while sitting around in their underwear, transfer the funds straight into a bank account, then withdraw the money and close the account… causing the trail to go cold for the authorities (but not for a private investigator).

#1: Beware of Dumpster Divers

You can tell a lot about someone just by seeing what they throw away. Garbage retrieval is one of the many ways that someone can get a hold of your stuff, but this method is actually legal. That’s why you need to trash your trash can!

Most people believe that only throwing out items with personal information like their name, address, date of birth, and Social Security Number is unsafe. However, any personal information is desirable to an identity thief. This includes documents that you may think nothing of, like correspondence from your child’s school, your spouse’s company, the stores that you shop at, your bank, etc. For example, if you receive a brochure from Bank of America, and a thief discovers it in your trash, he now knows where you bank and can try to deceive you:

“Hello, Mrs. Jones, my name is Sarah and, I’m calling from Bank of America to make sure that you received our flyer regarding your preferred customer status, dated March 24th. we are so thankful for your loyalty to Bank of America that we’d like to present you with an even better offer! Let me look up your account, so I can see the best interest rate that you qualify for. Would you please confirm the last 4 digits of your Social Security Number for me?”

Sounds pretty legitimate, right? The thief may already have the other digits of your Social Security Number, as they can be obtained by using commercially available databases and even some public records filings that just redact the last 4 digits. If they have that, all they have to do is connect the pieces of that number to become you on paper. The more believable a person sounds, the more likely you are to fill in the blanks for them.
In order to foil these dumpster divers, crosscut-shred, or confetti-shred, all personal documents. A crosscut shredder uses 2 contra-rotating drums to cut rectangular, parallelogram, or diamond shaped shreds, completely destroying documents so that not even Rain Man can reassemble them. Be sure to shred your personal documents and mail regularly, whether it’s when you’re watching TV or reading the Sunday paper. Make it part of your daily routine.

#2: Be Able to Spot Mail scams

You’ll find a lot of old-school conmen who still try to use snail mail to defraud someone. Here’s what they do:

Issue fake checks and money orders.
Offer fraudulent financial opportunities in the form of lottery and work from home scams.
Offer fraudulent refunds from banks

As technology has gotten better over the years, so have mail scams! Publishing software applications like Adobe Photoshop allow scammers to effortlessly create posters, brochures, and flyers that look like the real deal. That’s why it’s so important to scrutinize all correspondence that you receive by mail. Always consider the following:

Does this offer seem too good to be true?
Is it poorly or unprofessionally written?
Is the return address correct and complete?
Is is addressed to you directly or to “Dear Resident” or “Dear Sir/Madam”?
Does the company or organization even exist? (It’s as easy as a simple Google Search)
Are greetings and closings correct? Does it say “Yours Sincerely”?
Does it require you to send money or write a check? (Biggest red flag)

When in doubt, always contact the company directly. Also, to a Google Search to see where the company is headquartered, and contact the state’s secretary of state/division of corporations to make sure it is a legitimate entity.

#3: Look Over Your Shoulder

In addition to watching you at home, scammers will follow you around as you run errands or travel to and from work. Sometimes they can get close enough to glean credit card or bank card information. Once they get that, they’ll shoulder surf, or look over your shoulder as you punch in your pin or access code, or they’ll take a quick photo of your card with their phone as you slide it into the card reader. Shoulder surfing is most prevalent in crowded areas or close quarters where it’s easy to observe and not be noticed, such as the ATM vestibule of the bank. Make sure to always be aware of your surroundings when using credit/debit/bank cards and always cover the keypad when entering access codes.

#4: Be Able to Identify ATM Skimmers

ATM skimmers are pretty easy to miss at first glance, which is why they are very much a threat to your personal information. Scammers will install hidden devices, called overlays, illegally on ATMs that enable them to view your account information from a nearby computer once you insert your card. It is very important that pay attention to the condition and design of any ATM that you use. An overlay can be inserted onto any type of unit that processes ATM, debit, or credit cards. The overlays are wafer thin and may not be noticeable unless you’re really looking for them.

#5: Look Out for Monitoring Software on your Devices

Monitoring software, AKA computer surveillance software, allows for a hacker/scammer to observe and track your computer usage. As discussed in How to do Your Own Electronic Surveillance, it can be used for electronic surveillance legally if you install it on a computer that you own. However, many times these kinds of software are used for illegal purposes with malicious intent:

Malware: Software that is used to damage or disable a computer. Computer viruses are the most common example of malware.
Spyware: Software that allows hackers/scammers to monitor and steal your computer records and activities by transmitting all of your stored data onto their hard drive
Key-logging: Software that records every keystroke (button-press) made on a computer. This allows hackers to gain access to passwords or other confidential information accessed on a computer.

The best way to protect yourself from these kinds of theft-programs is to utilize services of an identity theft protection company, such as LifeLock. Sure it’s a few extra bucks a month, but it’s a lot cheaper than dealing with the repercussions of getting your identity stolen. What each identity theft protection companies will do is safeguard your credit, financial data, and your good name. Utilizing a good antivirus program on your computer would also be a wise decision. I would recommend either McAfee or Norton, which will basically act as your computer’s virtual bodyguard. These antivirus programs will detect monitoring software or viruses found on websites that you visit. Don’t be cheap when it comes to protecting your devices, it’s very much worth it!

#6: Be Careful with Peer-To-Peer File Sharing

Peer-to-peer file sharing, or P2P for short, is a very popular way to share photos, videos, documents, etc. with others online. The way it works is you download software that connects your computer to other computers that use the same software, which could potentially connect you to millions of other computers at the same time (What could possibly go wrong?). Because you’ve now open up your computer to potentially millions of strangers, it puts your information at risk of being stolen or could allow others to give your computer some nasty (and expensive to fix) viruses. It’s very important to understand the P2P software that you may use and as said before, it’s always a good idea to install a reputable security and antivirus program (Think of it as a condom for your computer).

#7: Keep Safe of Phishing

For those who are unfamiliar with it, phishing is the act of attempting to acquire sensitive and personal information like usernames, passwords, credit card numbers, and Social Security numbers, by disguising oneself as a trustworthy entity via a website or email address. Think of an email sender line as you would Caller ID: it announces who is trying to contact you. Scammers will disguise themselves behind credible looking names or designations in order to gain access to your personal information. Like mail scams, phishing has become more and more sophisticated over the years. Here are some warning signs that something may not be what it seems to be:

You are receiving customer notifications from a retailer or company, but you have never actually been a customer of that said company
The email is not addressed to you. Instead, it is addressed to an unknown email address or undisclosed recipients
There is an ominous warning of some kind. Some scary-sounding message, like “If you don’t respond to this email within 48 hours, we will shut down your account permanently!”
Sloppy misspellings, improper punctuation, and awkward phrasing might be present in the message sent to you. Virtually no email sent to you has perfect grammar, but phishing scams often have more than their fair share of errors.

If you suspect that you have received a fraudulent electronic communication:

Do not reply
Do not click on any provided links from the sender
Do not download or even click on any attachments
Do not copy and paste any links into your browser

Instead, do contact the organization in a separate email, by phone, or through the official website and be very cautious of where you click.

#8: Listen closely for Vishing

Vishing, or voice phishing, is the attempt to acquire sensitive and personal information via voice calls made to a landline or mobile phone. Criminals go to great lengths to convince you that they are who they say they are in order to gain access to your private personal information. They’ll say something like, “I’m calling from your gas company and we want to update our client records. Can I just verify your social before we begin?”. A security-savvy person will never give our their personal information over the phone, especially when the person you are giving it to is the person who initiated the call and asked directly for it. Always remember that banks and credit-card companies already have your information; they will never call you and ask you to recite it for them. If you get a call that you suspect may be a vishing attempt:

Tell the person that you will call them back, then call the 800 number on the back of your credit card, bill, or statement to report the call that you have received and verify that it was not actually them who called you.
As a test, offer a fake account number. If the person says “Yep, that’s correct. You’re in”, hang up and call the authorities immediately.

#9: A Word on Passwords

Passwords are one of the most secure and important lines of defense against identity theft. Every account that you have should require a password for access. That includes cell phones, banks, email addresses, credit cards, etc. It’s an extra layer of protection beyond those security questions that ask things like the name of your first pet or your father’s middle name.
When selecting a password, too many people make the mistake of choosing something personal—the name of their dog or child—because it’s easy to remember. The problem is that it’s also easy for a scammer to figure out. All they have to do is look you up on social media, find a picture of your dog, zoom in on the tag of its collar, and BOOM, they’ve got access to all of your accounts. Do you know how many people know of my dog, Harley? There might be more pictures of Harley than Kim Kardashian on the internet. If I make “Harley” my password, I may as well write out a blank check for a scammer. Some password tips:

●Make your password ridiculously stupid: FrenchToastAndKetchup1985 or MyBananaOpenApplesauce2000. Who in the world is going to think of that?
●Don’t even use real words: Try something like blickypuckanow.
●Store passwords where people cannot gain access to them: There are free apps out there called password keepers that protect your password information for you and require face/fingerprint identification to access the app. They are a lot safer than just writing it down on a piece of paper.
●Change your password regularly: People get too complacent and may have the same password for the last 30 years. However, it’s a good idea to change your password every 6-12 months. If you think there’s been a breach of any kind or you’ve clicked on a sketchy link, run a virus scan on that device and then change your password on another device incase there’s been any spyware installed on the original device.

#10: Keep your Wits when Shopping Online

There’s no denying the ease and convenience of online shopping. Who wants to go out to the store in the cold rain or snow to buy a Valentine’s Day gift when all you have to do is click a few buttons on your computer or smartphone? However, online shopping has its hazards and cautions, so it’s important to shop smart—this means not only knowing the best sites to to buy shoes on, but also how to avoid the perils of identity theft:

Make sure the retail stores that you shop with are legitimate. Always manually type in URLs and email addresses
Use your credit card rather than your debit card. Credit cards will protect you against fraud, while with debit cards, it’s way more difficult to recover lost funds.
When reviewing items on credit card bills, look for small purchases—$1 here, $2 there. Thieves will test a stolen credit card with a few small purchases first to make sure that the number is good.
Use things like Apple Pay, Google Wallet, or similar mobile-payment software. There is much less risk of other people getting your information when all you do is click a button, rather than entering in all of your information manually. By doing this, you completely eliminate the risk of spyware (It can’t track your keystrokes if you don’t type anything). You will also receive a notification every time you make a payment, so you’ll be immediately notified for any fraudulent payments.

Final Thoughts

Unfortunately, even with all the best-laid security protocols, your personal information may still be at risk if there is a date breach at any of the the businesses that you do business with. Scammers will find vulnerability wherever they can. The best thing you can do is take care of your end. Educate yourself, Install protective services. Be mentally prepared. As a private investigator, I use ruses all the time to extract information from targets of my investigations (See how I conduct Physical Surveillance and Electronic Surveillance). Don’t fall for people like me.

If you need professional assistance for any type of corporate or private investigation, do not hesitate to contact us at hello@iigpi.com, or at (212) 987-0808

29 July 2020
matrimonial1

We’ve all seen the classic movies where two detectives sit in an unmarked car and eat fast food while on a stakeout. Seems like a pretty good time, right? The truth is that physical surveillance is pretty difficult work. It’s not as easy as sitting in the car and waiting. Detectives in real life train for years before conducting a stakeout to make sure that they do the job right. You’ve got to blend in like a chameleon for hours at a time with no sleep or food to see as much as possible without being spotted yourself. It’s a tall order and should be taken very seriously. In this post, expert private investigator, Dan Ribacoff, teaches how to conduct physical surveillance.

The Risks of Physical Surveillance.

Traffic Violations: Obeying traffic laws to the best of your abilities is a must if you want to conduct a safe and successful operation. Careless driving will not only lead to you getting in trouble, but can put others in danger of physical harm.

Assault or Physical Injury: You can’t go around knocking over elderly women and common pedestrians while you’re chasing somebody.

Trespassing: Even if you believe it to be necessary for your investigation, entering private property without consent of the of the landowner is still against the law. Also, any photo or video evidence that you obtain while trespassing cannot be used in a court of law.

Roping & Entrapment: This is one that you often hear about on TV, such as on Law & Order. Roping is the act of obtaining -information by legally deceiving others. This differs from entrapment, which is an illegal form of deception where someone creates a condition in which the target of an investigation is required to perform a certain action. For example, if you need to prove that someone is faking a disability, you can’t let the air out of his/her tires to get photos and videos of them jacking up their car. You just need to be a bystander and let the target prove themself guilty on their own.

Stalking & Harassment: Stalking is defined as instilling fear into a person; harassment as aggressive pressure and intimidation. If someone notices you following them or conducting surveillance on them and they detect you, the jig is up. You have to leave no matter what, or else it’s crime! You can definitely try again in a few days—wear a disguise, drive a different car and watch from somewhere else. In this case, it’s 2 strikes and you’re out, because if you’re caught again, they can file a complaint and you can be arrested for stalking or harassment.

Pre Surveillance

Before you go full surveillance mode, you need to understand the area that you’ll be working in. It’s always best to physically visit a location to get a feel for your surroundings. You can also use technology like Google Earth or Google Maps if going to the location isn’t an option. In doing this, you can establish vantage points, locate possible exits and identify traffic flow.

What kind of details should you be looking for in pre-surveillance? Let’s say that you think you husband is having an affair. You choose to do surveillance on the woman who you suspect him to be with because she doesn’t know you and he does. You will need to know things like, which trains are near her house, does she have a car, are there any one way streets, where most concealed area to watch from, etc. These are the kinds of questions you need to ask in order to be well prepared for surveillance.  

Most times, on the first day of surveillance, you go from 0 to 1. Then you have to come back the next day and take it from 1 to 2. Make a plan, but be prepared to change the plan if unforeseen circumstances occur. For example,  if you are following someone, but they get the last parking spot and get on the train, while you’re still trying to park, do not panic. Take a second to analyze what you’ve learned: “They get on the train at 7:45 AM on weekdays.” Now you know for tomorrow to wait in the parking lot and get parking spot early. Think smart and gather intel!

Stakeout Essentials

Pee Bottle (Wide-Mouth For Ladies):

Any detective or FBI Agent will tell you that this is the #1 must-have on a stakeout

Water: 

It’s important to stay hydrated at all times, but remember, more water = more pee bottles.

Snacks: 

You have no idea how long you’ll be there for, so bring plenty of nonperishables. Remember to avoid simple carbs, as they will cause you to feel more drowsy.

A Friend: 

If you’re going to be there for a while, having a friend to carry the load can make the operation much easier and run much smoother. One of you can sleep while the other watches. If you’re a woman, maybe having a friend there for safety purposes is something to consider as well.

Cell Phone: 

I mean, who leaves the house without it? It can be used for communication and the newer iPhones have impeccable camera quality.

Digital Camera: 

Although cell phone cameras can have great quality, many investigators prefer stand-alone digital cameras for better zoom capabilities and better picture quality.

Adaptor: 

The last thing that you want is to be getting good surveillance evidence and then all of a sudden, your recording device’s battery dies.

Dark or Inconspicuous Clothing: 

Definitely no Hawaiian shirts on a stakeout (unless you’re in Hawaii and it’s necessary to blend in). You want to choose something that’s not going to make you stand out. If you’re going to Downtown Manhattan, wear business attire. If you’re going to a sports game, wear a hat and jersey. For most stakeouts, jeans, a dark shirt/sweatshirt and a dark cap or hood will work just fine.

A Change of Clothes: 

During a surveillance, you may have to change your appearance at a moment’s notice. Wear a blue baseball cap, and carry a red one. It takes a person 3 looks to recognize someone if they don’t know them already (if they know the person, it only takes 1). Wear a reversible jacket or start walking with a limp when you pull a collapsible cane out of your backpack. Basically, do anything that you can so that the target thinks that they’ve only seen you once, even if that’s not the case.

Full-Windshield Sunshade: 

A simple tool, but it can be used to cover yourself from people who try to look through you front or back windshields.

ID and Vehicle Paperwork: 

There’s nothing illegal about conducting a stakeout, but if a police officer roles up to you for being in a No Parking Zone, you have to be prepared for that.

A Believable Cover Story: 

This one might even be as important as the pee bottle. Again, stakeout’s aren’t illegal, but its always best not to tell people (including cops) what you’re up to. For example, if you’re doing surveillance on your husband in a store and you tell a cop what you’re doing when he asks why you’re just sitting in your car, that cop will go into that store and give you right up 10 out of 10 times. We want to steer observers away from what’s going on in order to maintain our cover.

Keys For an Effective Stationary Surveillance

1. Distance:

In a stationary surveillance, distance is your best friend. The farther away you are from the target, the better. I’ve seen other private investigators. pull up right outside a target’s house. All I could think was “What a bunch of morons!” You always want to go down the block and watch from there. You can even use binoculars to get the best view from a distance.

2. Concealment:

The main idea of a stakeout is to not be seen. Even if you’re far away, you should do your best to hide yourself by:

-Sitting in the backseat of your car

-Face your car away from the target (It gives the illusion of disinterest)

-Installing tinted windows on your car

-closing your sunroof to make the inside of the car as dark as possible

Monitoring a Vehicle

If you ever have to disrupt or leave a surveillance and need to return at a later time, you may want to monitor if the target has moved their vehicle in your absence. Here are 2 pro-methods that you can use to do that:

1. Use a Rock: 

If you want to know if a person has left a particular location, place a rock on the top of their back tire before you leave. If it’s not still sitting there when you return, it means that the wheels on the car have rolled and they drove somewhere while you were away.

2. The Watch Trick: 

My favorite way track car movements is to buy a dull, colorless, inexpensive watch at Kmart for about three to four dollars. Place the watch on the passenger side, underneath one of the tires. If the target moves his/her car, they will crush the watch and break it. Because the watch will no longer work, it will be stuck at the time that it was broken, giving the exact time that the target left.

Moving Surveillance in the Car

When you tail someone by car, you have an extra layer of cover. However, you’re also at the mercy of the traffic gods: a bus will cut you off, the traffic signal changes, etc., so be prepared for everything out there.

As with other types of surveillance, you want to put as much distance as possible between you and the target. Try to leave a car or two between you and the target when you’re tailing them. That way, you can still see where they’re going and they can’t spot you unless they’re outwardly looking for you. If the target starts to drive dangerously (running red lights, making illegal u-turns, speeding, etc.), it may be an indication that they know they are being followed. Remember that your safety and the safety of others comes first.

Moving Surveillance on Foot

The same rules apply on foot⁠—distance, concealment and safety. Crowds can be a huge problem if you’re following a target. If you look away for even a second, you can lose the target completely. Everyone looks the same from behind, so you won’t be able to relocate them either. The point is to always have your eyes on the target and to stay close enough that you won’t lose them, but not close enough that they’ll spot you. If it’s too difficult to keep up (like if you’re following a jogger), you can consider using a bike.

Practice Makes Perfect

At one point or another, you’re going to lose your target. It happens to everyone, newbies as well as professionals sometimes. Surveillance is like any other skills, it takes a lot of practice. You can’t just wake up one morning and say “I’m gonna go follow my husband around” and expect to be successful. You have to get yourself prepared and you have to use common sense. If at first you don’t succeed, eat your Wheaties and try again tomorrow. Also, consider using electronic surveillance as an alternative if physical surveillance isn’t working out.

If you need professional help for a stakeout or any investigation for that matter, do not hesitate to contact us at hello@iigpi.com or at (212) 987-0808

28 July 2020
howtomaximizecellrec.jpg

Earlier this week, I was able to speak with Dan Ribacoff, a licensed private investigator with 30 years of experience to gather some information on how to do your own electronic surveillance. He immediately told me “For the art of surveillance, modern-day technology has been an absolute godsend and has created a new form of surveillance: Electronic Surveillance. Before there was GPS, Private Investigators were all over the place trying to do surveillance. Follow that cab! Follow that guy in the red shirt! This way, that way. It was an absolute nightmare. GPS would have saved us a lot of trouble (and a lot of headaches too).” Ribacoff then explained all of the Do’s and Don’ts of electronic surveillance:

What is Electronic Surveillance?

Electronic Surveillance is technically defined as the observation and gathering of information⁠—usually on the sly⁠—with the aid of electronics such as cameras, microphones, and digital recorders, among other devices.

Why do Electronic Surveillance Instead of Physical Surveillance?

1. You can’t physically be at the surveillance location: Often times, when you are conducting surveillance, it must be done in private, cramped, and indoor locations that you cannot physically access or blend in.

2. You don’t want to be at the surveillance location: Maybe it would be too much effort and money wasted to either track many people at once, travel many miles to investigate, or miss work to investigate.

Electronic Surveillance Has Many Applications

Business Owners: Watching employees to make sure that they are not slacking off during work or stealing products/money from 

the business.

Moms and Dads: Making sure that their nannies/babysitters are not up to no good or possibly harming/mistreating their child.

People with Elderly Parents: Checking in to make sure that they haven’t fallen and can’t get up or to make sure that they are being properly cared for if they have elder-aids in their home.

Pet Owners: Monitoring their furry friends while on vacation or out of the house for a few hours.

The Rules of Electronic Surveillance

Permission: You must have permission or the legal authority to perform electronic surveillance. For example, you can’t just download Find My Friends onto someone else’s iPhone and use it to track them. That would be eavesdropping or invasion of privacy, punishable crimes.

Ownership: If you’re looking to install tracking software onto a computer or a cell phone, you have to ask yourself: Who owns this device? If it’s you, your husband who gave you permission to do it, or the guy next door who has legally contracted with you to perform electronic surveillance, then you’re in the clear. If the answer is your mother in law who has no idea that you’re tracking her, not a great idea from a legal standpoint.

Audio Surveillance: This can be pretty tricky. Telephone recording laws govern the civilian recording of telephone conversations. By federal law, at least one party taking part in a call must be notified of an audio recording of a telephone conversation (That’s why they they tell you that your call is being monitored for quality assurance when you call a customer service line). This means that if you live in an all-party-consent state, you have to tell somebody if you are recording your conversation with them. It also means that putting a recording device in someone’s car is illegal if you’re not present, whether you’re in an all-party-consent state or a one-party consent state.

Video Surveillance: For the most part, security cameras are completely legal in the US as long as they do not invade anyone else’s privacy (That’s why you can’t put cameras in restrooms or changing rooms). 

Using Cameras

More and more people are using surveillance cameras to keep an eye on family members, employees, babysitters, etc. Newer technology is making it much easier to put the cameras into inconspicuous places like teddy bears, clocks, houseplants, and many others.

Cameras that record audio and video can be very useful for any He said/She Said scenario. When I do polygraphs, I always get my client’s consent to record audio and video so that if they confess to something and then deny that I ever asked them that question, I can say, “Let’s go to the videotape!”.

Using Spyware

Spyware is software that is installed on a computer and gathers information about a user’s browsing habits, intercepts personal data, and transmits this information to a third party, which, as a private investigator, is you. Companies around the world use all different kinds of spyware to make sure that the business is protected and secure. as an employee or visitor of a business, you have absolutely no right to privacy when using a company computer or device. If you work for a large company like Amazon or NBC, and you start sending out e-mails or watching porn on your work computer, they’re gonna know about it because it’s not technically your computer… so make sure to keep it classy in the workplace.

Let’s say that you have a family computer and you have children. You want to install spyware on that computer to make sure that your children aren’t communicating with any creeps out there online. That’s perfectly fine because minors don’t have that expectation to privacy or their rights to privacy. The same goes for any of their personal computers that you’ve bought for them. If you bought it, you own it and you give them permission to use it under your supervision, just like an employee at a business.

Although it’s rare, there can be confidentiality issues to spyware sometimes. Let’s say that your spouse is a lawyer or doctor or is working for a government agency and they work with confidential information. If they buy a laptop or computer for work, you can’t really monitor what he/she does on that computer because they are working with confidential information. There are gray areas, but, of course, when in doubt, contact an attorney for advice. That’s always the safest move to make sure that you’re not accidentally breaking the law.

Monitoring by Phone

There are tons of cell phone monitoring softwares out there, or you can use cell phone locators that are specifically designed to track lost phones to actually track your family members, friends, or employees (Because who in their right mind would go anywhere without their cellphone anymore?). A lot of businesses today are issuing smartphones and tablets to their employees so they can track their employees movements during business hours. It’s sort of like punching a time clock and monitoring their actions while working. For example, look at this scenario with a meat company and their deliveryman:

“Where’d you go today?”

“I made deliveries at these 15 delis around town.”

“Are you kidding me? That’s bullshit. It says right here that you sat in a movie theater parking lot for 3 hours.”

A little while ago, my friend who worked as a salesman for a brewery told me that the company gave him an iPad to use. They told him outright, “We are going to use this to track your location. We want to make sure that you’re not playing a round of golf or doing something else on company time.” My friend then came to me asking how to turn the damn thing off. I’m like “Tom, try doing some work for once…”

Using Caller ID

Caller Identification, better known as Caller ID, is a great tool for keeping tabs on who is calling your home or business. For those who are unfamiliar with what Caller ID is, it’s a service that allows you to identify the phone number of incoming callers before even answering calls. But what about when you want to make a call and not have your number displayed? As a Private Investigator, you need to remain private at all times.

Let’s say that you want to call your husband to see if he’s really at the office when he says he is, but you don’t want to call from your cell phone or the house phones because he’ll recognize them and he’ll know that you’re checking up on him. You can’t do Caller ID Spoofing (using a service to masquerade as someone else by falsifying the number that appears on Caller ID as that person’s number), because that’s now illegal. You also don’t want to use the private number feature on your phone because it’s incredibly unlikely that your husband will answer a phone call from a private number. What do you do?

The answer is Burners (Mobile apps that offer temporary, disposable phone numbers). They’re sort of like a legal way of Caller ID Spoofing, because you’re not sending electronically false information. Google also offers phone numbers, but they’re not as burnable.

Using Burners

As a private investigator, burnable numbers are a go-to tool, because a lot of the times, I want to find out information about someone and I want to probe. If I want to find out somebody’s work history, I can call them from a burnable cell phone number and say “I’m calling from Who’s Who and we’re doing a page on you for the internet. It’s completely free. I just need your employment history for the page.” If they answer the phone and I’m convincing enough, they’ll tell me everything that I want to know about them. I can even leave a message and have them call me back on the burner number because it’s technically a real number. Eventually, once I’ve gathered all of the information that I need, I can burn the phone number, and it’s basically untraceable.

So now that you’ve gotten another burner and you’ve called your husband and discovered that he’s not at work and he’s been lying this whole time, you can burn that number that you’re using without him ever knowing that it was you. The only way for him to trace it is if he somehow gets a subpoena (which he won’t get) or a for law enforcement to issue a court order (which they won’t do as long as you don’t break any laws).

Remember that a burner phone doesn’t make you invincible. If you call up the authorities using a burner phone number and make a threat like “I’m gonna plant a bomb on a subway”, they will find you. They’ll get a subpoena, they’ll trace the number back to you, and you’ll be behind bars faster than you can say “Hey man, it was just a prank”. Long story short, you don’t want to commit a crime while burning. You don’t want to make threats, defraud someone else, or steal money. You only want to use this for investigative purposes. If your husband calls up the authorities and says “Someone called me asking for my employment record and now the number’s not in service”, they’ll probably just laugh at him as say “You got played buddy”.

Untraceable Phones

Another thing that you can do when you want to place an untraceable call is to get yourself an untraceable phone. All you have to do is go to Best Buy or any other electronics store and buy a Tracphone. It’s a prepaid phone with no contract. When you call with a Tracphone, the general calling area of the call is known, but the ID of the person who made the call is unknown because the phone is not registered to anyone in particular. However, you have to take certain precautions when buying a Tracphone:

-Credit cards are traceable, so make sure that you pay with cash.

-You don’t want to get caught on security camera buying the phone, so wear a hat/wig and sunglasses when you buy it. Also, refrain from looking up at any cameras in the store.

-Your real cellphone can track you 24/7, so don’t bring your real cellphone with you when you buy the Tracphone.

-Your E-ZPass can also track you, so don’t take that with you either.

Remember that mistakes are easy to make, and that even one slip-up is Game Over.

ID-ing Private Numbers

Now, let’s say that instead of making the call, you’re receiving calls from a private number at your home. You suspect that your wife has a secret boyfriend and he’s the one calling at night (I guess nobody sleeps anymore). She keeps rushing to the phone every time it rings. Is there a way to find out who’s number that is? Yes, there is.

1. You can use TrapCall: a free mobile app that can unmask the blocked and restricted Caller ID, blacklist harassing callers and even record incoming calls. It’s a simple install on your mobile device and requires minimal set up.

2. Use an 800 number: Callers can’t block their phone numbers when they call 800 numbers; It strips the Caller ID and will always register the calling number. How do you obtain an 800 number? Contact the International Investigative Group. We have a series of fake 800 phone numbers that we use to intercept the phone numbers of private callers. We can then have calls to your house forward to the 800 number for a day or two and find out who’s really been calling. Even if they don’t leave a message, we’ll still be able to see the real number that they called from, so the joke will be on them!

If you need professional assistance for surveillance or any investigation for that matter, do not hesitate to contact us at hello@iigpi.com, or at (212) 987-0808
22 July 2020
Armed Guard on Suit

Basic investigating is a pretty easy task, but it’s important to remember that nearly all fifty states in the US require private investigators to be licensed, and many government municipalities are starting to crack down on unlicensed operations. What does this mean for you? It means that you, as a civilian, start your own business as a private investigator without a proper license, nor are you allowed to conduct any private investigations for hire. However, there is nothing illegal about conducting your own private investigations for personal matters. Virtually anyone with the proper training and lots of practice can conduct their own investigations, but, according to Dan Ribacoff, there’s a few questions that you need to ask yourself first if you want to be successful in getting the results that you want:

1. Are you willing to work around the clock?

Being a private investigator isn’t your typical Monday through Friday, 9 to 5 job. You’ve got to be able to work holidays, weekends, late nights, weather storms, or whatever it may be. Sometimes, you can be on a stakeout doing surveillance, having to “sit on” a guy for sixteen, seventeen, or even eighteen hours at a time (See how to conduct physical surveillance). You have to be willing to put in the work at any time.

2. Are you willing to do your homework?

For licensed professional investigators, private investigation is a para-law enforcement-type of position. Often times, you have to testify in court, so you have to familiarize yourself with the legal dos and don’ts of investigating. Amateur investigators also need to understand lawful matters, such as citizens’ rights and privacy laws. You don’t want to do anything illegal by accident and you definitely don’t want to end up on the wrong end of a civil lawsuit.

3. Do you have a good poker face?

Sometimes, in order to find out the truth, you have to tell a lie and make it seem believable. Private investigators and even police officers do it on a daily basis. Once, I was conducting a stakeout outside of a target’s house and then all of a sudden, a guy comes up and knocks on my car window.

He asked, “What are you doing here?”

Without hesitation, I answered “I’m an auto repossessor.”

“Who’s car are you here to repossess?”

“I can’t tell you that, because then the guy’s not going to give me the car.”

“You’re not here to repossess my car, are you?”

“Do you drive a Mercedes?”

“No.”

“Then you’re find bro.”

After that, he left me alone and didn’t even give me a second glance. As long as you look and act credible, you’re polite, respectful, and not breaking the law—it’s pretty likely that they’re going to believe you.

4. Are you a good actor?

Sometimes, telling a good lie isn’t convincing enough. If you’re trying to gather information by deception, you have to be able to play different roles, just like an actor. One day, I’m a news reporter working on a groundbreaking story. The next day, I may be your old high school classmate looking to organize a thirty year reunion party. I could also be doing a background check for an employer. Hell, I may even be your long-lost Uncle Fred. (Trust me, Tom Hanks and Meryl Streep have got nothing on me.) You have to ask yourself if you can convince somebody that you’re someone else? As a private eye, you may have to.

5. Are you willing to travel out of your neighborhood?

A good friend of mine is a veterinarian. He owns a chain of veterinary clinics and, at this point in his career, he just does the management and lets his staff take care of the rest. Long story short, he gets bored and needs something to occupy his time every day. He calls me one day and says, “I’d love to be a private investigator. It seems so exciting. Would you hire me?” I told him “Yeah, I need to interview a couple of people in the Marcy Houses project in Brooklyn for an investigation, why don’t you come with me.” He goes, “Are you kidding me? I’m not going to the housing project!” Guess what? That means that you’re not cut out to be a private investigator.

Lots of people come up to me asking to be a private investigator because they think that it’s glamorous work all the time. It most definitely is not. We often rate neighborhoods based on how many guns we need to carry when we’re conducting an investigation there—a one-gun, two-gun, or three-gun neighborhood. I’ve had to investigate in plenty of three-gun neighborhoods and trust me, it’s not a fun experience. As a private eye, you have to go wherever the job takes you.

6. Are you willing to travel out of your comfort zone?

Remember those old Motorola beepers that everyone had in the 90’s? We used to have a beeper that had a little pinhole camera with a wire that you could attach to a video recorder. My agents would put it in a backpack and walk around the streets of Manhattan like messengers, and they’d have the beepers in their pockets and they could then film people in public areas without being spotted. One time, an insurance company executive came to me and said, “This girl was in a car accident. She says she can’t work, but we think that she’s working and I need proof.”

It turns our that the woman who we would have to investigate was an exotic dancer in the New Jersey area. We followed her, and she went to this place called Heartbreakers, the strip club that she worked at. I put one of my best agents on the case, a Puerto Rican guy named Carlos. (You can put a Latino guy anywhere—in the city, the suburbs, a farm—and he’ll fit right in. That’s why it is so important and effective to have a diverse team of investigators.)

I said to Carlos, “You have to get footage of this girl dancing to prove that she’s not injured and able to work. Be careful because they search you when you go into these clubs to make sure that you can’t get in with a camera.” So Carlos goes into his car, takes apart his camera equipment and sticks it into his pants by his crotch, knowing that security won’t reach down there when they search him. When he got into the place, he went into the bathroom and put the camera back together. He then stuck the unit back into his pants and put that beeper camera through his shirt, puncturing a hole for the wire.

He took a seat near the stage and waits for the target. All of the dancers come out and get into a circle, including the girl who was supposed to be injured, but she was dancing with full range of motion and not wearing the back brace that she claimed she needed at all times (Though, she wasn’t wearing much else either).

In the video, you can see that all of the guys who are watching give her $10, too which she opens up her bikini top and lets them have a squeeze. Eventually she gets to Carlos, and what does he do?… he gives her $10 and has himself a squeeze… on the video that I would have to show in court! I’m like, “Carlos, we have to show this to a judge, and he’s gonna see the insurance investigator squeezing a stripper’s boobs!” He said, “I had to do it. Everyone else was doing it and I had to blend in.” He was absolutely right. This is a prime example of being able to get out of your comfort zone. This is the kind of craziness that you are bound to wind up doing as an investigator.

7. Can you be adaptable?

As a private investigator, you always have to expect the unexpected. I had a client who wanted me to follow her husband. No problem. She says he’s planning a trip to the Poconos in Pennsylvania to go fishing with some friends, so I put two of my agents on him. The husband had a Ford Expedition and my agents both had smaller Hondas. All of a sudden, the guy starts heading north instead of west, where he said he was going, and he just keeps on driving further and further for hours. My guys call me up and say, “We’re in Vermont and we’re almost out of gas.” I told them to keep going because if they stop for gas, they’ll lose the target for sure.

Finally, when they were quite literally running on fumes, the husband pulls into a motel and meets his girlfriend. Here we thought we would just have to follow him for about two hours to the Poconos, and end up driving all the way to Vermont. You just never know what’s going to happen during an investigation. Once you’re tailing someone, you could be gone for a few hours, days, or even a week.

8. Can you be discreet?

One of my part-time agents, Bill, previously was an FBI surveillance operative. He’s a real nebbishy, nerdy guy—no wife, no girlfriend, no kids. whenever I had a surveillance in New York City, I would use him as a foot agent. I’d go with Bill and a few other agents on a job to follow a target, and I’d say into my phone, “Bill, the target is looking in the window at Men’s Wearhouse.” And Bill would say, “Yeah I’ve got him.” Meanwhile, I’m looking around and I say to myself, “Where the hell is Bill?”

The guy could basically disappear and still have the best view of the target. That’s how good Bill is. As a private investigator, you have to be like a chameleon and blend just like Bill did. If people are looking and staring at you, you’re not doing your job.

9. Do you have a network of friends to help you out?

A good private investigator will often utilize teams of operatives. The more sets of eyes and ears on the case, the better. When I have to do surveillance in New York City, I’ll always use another two agents at the very minimum. Together, we can watch all of the exits and entrances of a target’s building, forming a full 360 degrees of surveillance around them. I’ve been on operations where I brought five or six guys with me and it still wasn’t enough to get the job done. It always pays to have good friends!

10. Are you tech savvy?

A lot of investigations that I conduct today are done via my computer or smartphone: locating assets, tracking people, etc. It is incredibly essential that you have basic technology skills like using search engines, social media, digital cameras, and voice recorders.

11. Do you have the guts?

To be an investigator, you have to have guts, chutzpah, cojones. You have to be willing to put yourself into risky or potentially dangerous situations. Remember that with most cases, you will be dealing with lowlifes, liars and bottom feeders—fathers who walked out on their families, mothers who stole from their own children, employees who schemed their bosses. You have to track them down and interact with them, all while remaining as cool as a cucumber (even though you may be shaking in your boots).

One time, I was working with the NYPD on an insurance investigation and wearing a wire in order to enter the home of a very high-ranking member of the Gambino Crime Family and gather evidence. I was pretending to be an art buyer who was looking to purchase stolen artwork. The cops were waiting outside, and would come barreling in if they heard me say the code word, “How ’bout those Mets?”. Luckily, the operation went smoothly and I didn’t have to say the code word, but I had to remain calm and collected for that to happen.

12. Can you think on your feet?

When I was first starting out, I used to do a lot of disability and worker’s comp investigations for insurance companies. We often performed what is called a telephone activity check, where I would try to develop a pattern of when a target was home and when he wasn’t home so I could plan a surveillance.

Now, I couldn’t just repeatedly call this guy without raising suspicion, so I would create pretext of some kind. Sometimes I would say that I was calling from the programming department to conduct a survey to see what TV shows the subject was watching. Other times, I would tell them that if they cooperated with me, I’d send them a gift card, and then I actually would (otherwise I would be defrauding them.

My favorite one was when I would call a subject and pretend to be a crazy religious fanatic. I would say, “This is Virgil. I’m calling to praise the Lord.” They’d hang up, and then I’d call back and say, “How come you have so much hatred in your heart for the Lord?” and they would hang up again and again, but eventually, I would get a good feel of when they were home or when they were out. They’d be annoyed with me, but never suspicious.

One time, however, things didn’t exactly go as I planned.

“Is Richard home?” I asked when a woman picked up the phone.

“Yes, who’s calling?” she said

“This is Virgil. I’m calling to praise the Lord.”

She said, “Oh, hallelujah, brother. I go to church every day and my husband is reading the Bible right now.”

I was stunned and said “May I read you some passages from the scripture?”

“Yes!” she said.

Meanwhile, I don’t have a Bible in front of me. My secretary at the time, Jean, was a religious woman, and she was whispering, “Bible.com… Bible.com”, so I go on Bible.com and start reading a passage. That lady almost busted me! That’s why it’s so important to be able to think on your feet as a private investigator. Things don’t always go to plan, so you have to be ready the second that [you know what] hits the fan.

If you need professional assistance for any type of investigation, do not hesitate to contact us at hello@iigpi.com, or at (212) 987-0808
26 February 2020
Catfish

In the modern climate of technology advancements, it is becoming increasingly easy to scam someone using widely available dating applications such as Tinder or Internet chat rooms and social media platforms. Often times, it is hard for us to watch from a side when your family member or friend falls for a ridiculous romance dating scam that usually revolves around cheating them of money. As such, it would be wise for you to employ professionals who are experts in investigation and security. Here at International Investigative Group, we have a team of competent investigators who are experts on such dating scams and how to avoid a catfish or date scammer.

Types of Dating Scams

Online date scammers usually engage in scams that require victims to pay an “advanced fee”. They can request money from victims in exchange for promises of love or even sexual favors but disappear as soon as they receive their ill-gotten gains. Another type of scam involves the date scammer asking for money so that they can visit their victim, promising a date. However, they always seem to run into difficulties which require an even larger amount of money. Oftentimes, many victims fall prey to these scams or catfish techniques and end up losing large amounts of money. In severe cases, victims have become so convinced that they lose all their life savings. Below are some ways that you can spot a dating scam.

The Date Scammer Looks Too Beautiful to be True

Many old people who have low self-esteem and seem to perceive themselves as someone who is not attractive anymore often end up getting entrenched in such scams. It is always easier to fall for such dating scams when the person in question looks too perfect to be true. Scammers are known to use photos belonging to beautiful models in order to catfish their victims. In order to prevent this from happening, you can choose to take a screenshot of their profile photos and search them online. If there are no matches, chances are that the photos are original.

If you want to verify that the person who you are talking to is really who they seem to be in their pictures, it would be a good move to meet them virtually beforehand. Tools like FaceTime, Skype, Zoom, etc. can allow you to see a live view of the person that you’ve met on the internet before you meet them in person. If they don’t agree to a virtual meeting first or they cover their camera during the virtual meeting, then you have your answer right there about whether or not it’s a catfish. Lack of transparency and having something to hide have a strong correlation.

The Date Scammer Falls in Love Really Fast

Although this could definitely happen in real life, chances are that if a person who looks like a professional model chats with you online and claims to fall in love within a few days, it is an obvious dating scam. They are simply playing with your heart strings and making you think that they could never hurt you because they are in love with you.

This is a huge red flag to look out for especially if they follow up their declarations of love to you with a request for your money. From what I’ve seen, 99.9% of the time that someone asks someone they’ve met on the internet for money, it’s a scam.

Their Email Address Does not Match their Names

Usually when their email address is completely different from their “real name”, then you know that something is definitely off about that person. This is usually a sign that that they are using an alias so that they can trick you into doing favors for them without leaving a trace for them to be caught.

In this case, a background check can be your best friend and tell you everything that you need to know. With the name that they’ve given you and their said-location, finding them and their information shouldn’t be too difficult. The easiest place to start would be with their social media. If they look like a model in their pictures, but have under 100 followers on instagram or very few facebook friends, it’s pretty easy to tell that it’s just a fake burner account that they made for that alias.

The Scammer Wants to Know Your Personal Information and Email Really Quickly

Regardless of the platform that you meet the scammer on, they would want to move the conversation to email correspondence or some other form of communication because there is a higher chance that they might get caught on the original application. Furthermore, when they move the correspondence to a more private setting, they can carry on scamming their victims without the supervision of authorities (See Identity Theft: 10 Ways to Protect Your Identity).

19 February 2020
Hidden Assets

Unbeknownst to many, the easiest asset to hide is actually a bank account. It is important to note that there is no existing central database today that keeps bank account records of everyone in the country. As a result of this, locating hidden assets was extremely difficult and controversial up until 1999, when regulations were put in place to ensure that this was not the case anymore. Here at International Investigative Group, we have a team of professional private investigators who specialize in locating hidden assets for any case you might encounter.

What are some Common Hidden Assets?

Hidden assets can also come in other forms such as property and even vehicles. Under some circumstances such as a lawsuit which might threaten to seize an individual’s assets, people might try to transfer the ownership of these assets to other people to prevent seizure. The most common places to hide your assets are under different aliases, with close family members, in life insurance policies, bonds, vehicles and investments.

Investigating Tax Returns

It cannot be denied that a large percentage of Americans own more than one bank account or insurance policy. Therefore, a person’s tax returns are a good place to gather information about bank accounts and other forms of investments. In order to retrieve this information however, a subpoena is needed to give you the access that you require.

Real Estate vs. Cash Transactions

It is usually easier for most investigators to track fraudulent conveyance of property and real estate in comparison to cash transactions. This is because for real estate transactions, investigators can easily find out who the buyers and sellers are by searching online or at the state’s deeds office. Usually when investigating real estate assets, the date of the transfer of title or ownership is important. The closer the transfer is to the date of a bankruptcy filing or oversight, the higher the probability of a fraudulent conveyance.

The Debtor’s Examination

In the process of the debtor’s examination, it is your legal right to demand information from your debtor about where their bank account is located. Although this might seem like a convenient idea, there are certain drawbacks to it. For example, if you demand that they reveal this information, the debtor can quickly transfer money out from that account before you can even get close to it. Therefore, if you happen to locate a bank account that contains some money, it might be a more viable option to retrieve database records that are available at the bank.

Acquiring Hidden Assets Via The Turnover Order

Essentially, this procedure allows you to order your debtor to turn over any non-exempt property which they might own to the judgement holder. As such, the judgement holder would be able to better retrieve available assets in the case where a debtor’s property cannot be seized using normal legal procedures. This is usually done as a last option to satisfy the given judgement but does not require any post-judgement remedies by the judgement holder before executing it.

Call Now