titlesearch

Home/Dave

About Dave

This author has not yet filled in any details.
So far Dave has created 49 blog entries.
12 12, 2014

Private & Public Investigative Techniques

By |2014-12-12T22:35:36-04:00December 12th, 2014|Uncategorized|0 Comments

Investigative tools, procedures, and resources used by private investigators are very similar in the private and public sectors.  For property to be seized or restrained, most jurisdictions require evidence of probable cause which demonstrates that the property was acquired through some sort of illegal activity. A couple techniques used for private investigations include search warrants, surveillance, garbage pickups, and internet and public record data searches. Typically, search warrants are used to obtain evidence or contraband [...]

2 12, 2014

The Importance of Corporate Due Diligence

By |2018-08-20T20:41:26-04:00December 2nd, 2014|Uncategorized|0 Comments

Corporate due diligence is taking on a new role in business. Many companies are now doing some type of research, due diligence, or background checking on vendors and business partners to help prevent fraud. Recently, I have seen two different cases relating to this. First, we came across a situation where a company had been doing business with our client for a long period of time. The company had been buying inventory from our client [...]

23 07, 2013

Fake online and Yelp reviews

By |2019-04-05T16:05:55-04:00July 23rd, 2013|Uncategorized|0 Comments

As consumers turn more frequently to online reviews to make buying decisions, the role that the sources of these reviews takes on becomes more important. Industry leader Yelp has started taking some steps to prevent these reviews, but it is a moving target for the business model. Fake or exaggerated reviews can misrepresent the true nature of the business or product either for good or bad. In some cases a competitor or disgruntled customer can [...]

21 02, 2013

Insurance claims investigations and settlement

By |2019-04-05T16:07:28-04:00February 21st, 2013|Uncategorized|0 Comments

Casualty insurers are facing a more difficult claims settlement environment as the number of claims with questionable factors is increasing. The National Insurance Crime Bureau is reporting that 2012 saw an increase of 26% in questionable claims. “Suspicious theft/loss (not vehicle)” had the highest increase in volume to 10,680 in 2012 from 7,152 reached in 2011. In 2012, the top five states generating the most questionable claims were: California (21,935), Florida (10,693), Texas (10,368), New York (9,059) [...]

12 02, 2013

Is it possible to get back 100% of assets for fraud victims?

By |2013-02-12T22:21:30-04:00February 12th, 2013|Uncategorized|0 Comments

Recovery losses in a fraudulent investment case is not a hopeless endeavor. If you are a victim of any type of fraud, or have a valid judgement against a debtor, do not give up on getting back the funds which belong to you. The key to successful recovery is exploiting all available resources. Do not take the position that your scenario is a "collection" matter. Collection implies that the money belongs to the fraudster and that the efforts [...]

8 02, 2013

Top 5 corporate fraud prevention and discovery methods

By |2013-02-08T22:01:12-04:00February 8th, 2013|Uncategorized|0 Comments

Employee embezzlement can happen at the intersection between trust and reasonable security. People who are valuable parts of an enterprise need to have sufficient latitude to take action and get things done. The CEO or owner cannot do everything personally, so key people are entrusted with important roles including managing money and critical information within the firm. Reasonable internal controls help protect the company from exposure to loss due to errors or fraud, but the [...]

4 02, 2013

Corporate fraud investigations

By |2013-02-04T23:20:04-04:00February 4th, 2013|Uncategorized|0 Comments

Corporate fraud is a hot area of investigations in 2013. From embezzlement to corporate due diligence, the activity level is high. The Economist magazine presents an article talking about some of those areas. "One big source of work is the growing complexity of business regulation. Multinationals can never be sure that some employee, somewhere has not violated America’s Foreign Corrupt Practices Act, or some other anti-bribery law." One investigator described how the job sometimes goes: [...]

18 01, 2013

Criminal background checks

By |2013-01-18T18:15:48-04:00January 18th, 2013|Uncategorized|0 Comments

The definition and perception of what goes into a criminal background check varies. For a private investigator it is important to serve the needs of a client by doing a thorough search so that he or she receives the complete information that they need. Be aware that within the investigative industry we have the knowledge that a one click "FBI Background Check" does not exist, and it might be necessary to describe the methods to [...]

17 01, 2013

Surveillance for divorce and infidelity cases

By |2013-01-17T21:35:26-04:00January 17th, 2013|Uncategorized|0 Comments

Private investigators are often called upon to document cheating in a relationship. Whether in a divorce case or checking on a relationship partner it is important that the investigator go beyond simply observing that the subject is having an affair. Collecting supporting information and pursuing the related activity is even more valuable to the client. In most cases the client already knows that the subject is having an affair. Finding out the extent of all [...]

17 01, 2013

Importance of verifying timing devices in a private investigation.

By |2019-03-13T11:45:18-04:00January 17th, 2013|Uncategorized|0 Comments

Investigations of people or events span many locations and time periods. When a private investigator works a case, his observations and efforts connect the movements and surroundings of the subject. To provide relative timelines the dates and time of each event is reported. It is critical to synchronize the timing of devices used to record these events.Most of the time the clocks built into different devices are not exactly in sync, which can have consequences when the [...]