Litigation Support – White Collar Fraud Investigation – Corporate Fraud Investigation

Back in the old days (when I say “old” I mean a few years ago), making anonymous payments was pretty easy. Dealing in cash is about as anonymous as it comes. You could also get a money order or a bank check and mail it to whomever you needed to and it couldn’t be traced back to you. In those transactions, when money exchanged hands, the transaction was not recorded or linked to anyone.

Easy enough.

In today’s online world, where credit card transactions are the norm, it’s not as simple. Your credit card is linked to you, as are other forms of payment such as wire transfers or PayPal.

Case Study

We recently worked on a case where we needed to purchase services for several thousand dollars and we needed to do it completely anonymously. Also, we wanted this transaction to appear as “normal” as possible so as not to raise any suspicion from the party that we were purchasing the services from, so ideally, we wanted to pay via credit card or PayPal.

Since it was an online transaction, sending a money order or a bank check was not an available option.

PayPal was also out, as we would have to register our name and address with the transaction.

And using a personal credit card was not an option, as we didn’t want any of our names attached to the transaction.

Prepaid Credit Cards

After some research, it seemed like a prepaid credit card was the best option. But after some more research, we learned that many of these prepaid credit cards must be associated with a name/account.

However, we found a card offered by American Express, called the Serve card, that you can buy at stores such as CVS, Walmart or 7-Eleven and simply add cash in the store, up to $2,500 per day or $5,000 in a month. American Express told us that we would not be required to provide a name or identification to use the card. There’s also a nice little video that explains how it works.

So there you have it – $4,000 worth of services paid anonymously with a prepaid credit card from American Express.

Pretty simple.

Just makes me wonder how easily crooks can launder money or how easy it is to make anonymous bribes.

Guide to Hiring a Private Investigator

Enjoyed What You Read?

Join 2,000+ others to get insider tips and tricks delivered to your inbox from what has been voted the best blog in the investigative industry!

In July 2014, hedge fund billionaire Raj Rajaratnam’s younger brother was acquitted of insider trading charges, breaking a streak of 85 cases without a single defeat, making it quite clear that white collar criminal defense attorneys have an uphill battle.

Nobody likes losing.

Here are eight ways that a private investigator can help you come out as the winner in the battle.

1Vetting Expert Witnesses

Expert witnesses can play a key role in the outcome of a white collar criminal defense case. There is nothing more exciting than punching holes in the background of a purported “expert.” There are a number of experts who have embellished and completely falsified professional and academic backgrounds – like the expert lip-reader with the fake degree.

2Vetting the Defendant

Rest assured, the prosecutors are going to dig up every last detail they can about the defendant. It’s critical to get ahead in this game and gather as much intelligence as you can so you are not caught playing catch-up.

3Vetting Key Cooperators

Because of the complexity of white collar criminal defense cases, government cooperators can play a critical role for the prosecution. Not-so-reliable cooperators or witnesses can be just the narrow opening you need to bring into question character, bias and credibility issues to sway the jury.

4Conducting Interviews

Interviews with key parties, character witnesses, fact witnesses, supporting witnesses, reluctant parties or eyewitnesses can play a crucial role in any white collar criminal defense case. While gathering details and information to support your case is crucial, so too is understanding what may not be so helpful.

5Vetting the Jury

Even the avid experts on jury selection will tell you that picking a jury is a complete crapshoot. But obtaining critical details relating to the background of these jurors can help you make a more informed decision or may help you dismiss an undesirable juror in voir dire.

Secondly, an attorney’s job during a trial is to win over the jury. While that seems easier said than done, wouldn’t it be valuable if you knew their pain points?

6Reviewing Documents

Documents have become an integral part of any white collar criminal defense and, in some cases, that trail of paper can be overwhelming. While in most cases it might be more effective to hire a team of contract lawyers to review documents, investigators can conduct targeted inquiries based on information developed during the course of their investigation.

7Corroborating Facts

An attorney once told me that lawyers go to law school to learn about the law and that private investigators are trained to obtain facts. A private investigator can find difficult-to-find facts, witnesses or information to help support the defense while lawyers concentrate on the legal aspects of the case.

8Providing a Different Point of View

Having worked on several white collar criminal defense cases, one thing’s for sure: attorneys and private investigators think differently. Having someone on your team who can provide a different point of view might be the difference between success and failure.

Sometimes, the people who bring a different point of view are the ones people want to listen to.

Guide to Hiring a Private Investigator

Enjoyed What You Read?

Join 2,000+ others to get insider tips and tricks delivered to your inbox from what has been voted the best blog in the investigative industry!

Individuals are increasingly locking down their Facebook profiles by implementing some basic privacy features, but there is a little trick to find “hidden” photos of a particular user.

Investigating through social media, and Facebook in particular given its wide use (a couple of billion people and climbing), has become an increasingly important tool for any professional (or amateur) sleuth.

Over the past few years, with the heightened awareness about privacy and some “brutal reminders” that you can get in big trouble for what you post on Facebook, users have become more careful about what they share with the world.

These days, more often than not, if you stumble on a Facebook page of a user (even that is becoming more difficult), you will find there is absolutely nothing available to see. An empty timeline and friends, photos and likes are all hidden to the public.

But have no fear. All is not lost.

When you come across a profile page with little information, there are two possibilities: 1) the person does not use Facebook all that often (which is entirely possible), or 2) the owner of the profile turned on some privacy features that limit information to certain groups of people like friends.

So what do you do?

There are a lot of fancy tricks and dirty little secrets that you can use to mine Facebook, such as finding photos commented on by the person and places the person has checked in (there is a whole list of tricks), but one of the most useful is finding photos that the person has been tagged in.

There is a handy Google Chrome Extension called PictureMate. Once it’s installed, you can click on the PictureMate extension and it will find hidden photos that were uploaded and tagged by other people, even if the user has set his privacy settings to not show any photos.

Case in point, here is random profile. As you can see, there are only a few photos that he has publicly posted on his profile.

Hidden Facebook Photos 1

But once you install and click on the PictureMate extension, you get a whole slew of photos that other people have uploaded and tagged the user in.

Hidden Facebook Photos 2

There you have it. A handy little trick to find hidden Facebook photos.

Guide to Hiring a Private Investigator

Enjoyed What You Read?

Join 2,000+ others to get insider tips and tricks delivered to your inbox from what has been voted the best blog in the investigative industry!

This is a guest post by Matthew Brotmann, Esq., founder of B4 Strategic Solutions.

The reason most people choose to retain the services of a private investigator is to gain access to information they would not otherwise have access to.  After all, that’s what they’re there for.

Right?

But what happens when the private investigator gains access to information he or she should not have or uses methods to gain access that are questionable or downright unethical?

This is an issue, which has particular significance to attorneys or those bound by ethical constraints as part of their professional practice.  Recent headlines have drawn attention to this matter and it is worth further consideration.

Quite often the use of a private investigator makes sense from a strategic and financial perspective.  The private investigators expertise means they may be able to dig up relevant information efficiently and a cost effective manner.  Particularly when the alternative is to have highly paid associate attorney attempt to gather that same information through a series of Lexis and Google searches.  Even worse, you have to spend doing the research yourself.  Thus, the private investigator.  But, unlike you or your young associate, the private investigator may not be subject to the same ethical considerations as you.

Crack-Down on “Hackers-for-Hire”

Recently, federal prosecutors have been cracking down on private investigators who have been functioning as “hackers-for-hire.”  In other words, the investigators have been retained by law firms to gather information for a pending case and have gone beyond the ethical limits of where an attorney himself or herself could go.

In one case, federal prosecutors have charged two private investigators in the San Francisco area with hacking into email and Skype accounts in order to obtain information for pending matters.  Whether or not the attorney knew that they would use this “backdoor” has yet to be established but either way, it doesn’t look good and any perhaps more importantly, evidence gained in this manner may be inadmissible.

Whether it be “pretexting”, in other words, pretending to be someone you are not to obtain private details, hacking or any other method that would not be permissible for an attorney, the attorney retaining that private investigator can be held responsible for this conduct and pay the price.  It’s not OK to turn a blind-eye without delving into how the information is gathered. And, it’s not OK for a lawyer to hire a private investigator to skirt the law in a way that gives them plausible deniability of any potentially illegal or unethical activity.

More often than not, using the “front door” to gain the information can be just as productive, particularly when the person walking through that door is an experienced private investigator.  In addition, information gained in this way does not run the same risk of exclusion at trial.

Ultimately, it is up to private investigator and the attorney (or anyone retaining a private investigator) to discuss ethical constraints and expectations.  These conversations should be memorialized in writing so that there is no misunderstanding down the road.

Enjoyed What You Read?

Join 2,000+ others to get insider tips and tricks delivered to your inbox from what has been voted the best blog in the investigative industry!

I am not a violent person. Other than a few fistfights with my younger brother, I have been in only one fight in my life. It was in the rear of a rival high school when I was in 10th grade. I got my butt whupped. And he was about half my size.

But every once in a while, I come across something that gets me fired up. The types of people who give private investigators a bad name.

These are the people that I would love to send an envelope of glitter.

If you have actually been around glitter, you know that it’s completely impossible for it not to go everywhere. While it sounds like harmless fun, it’s actually one of the worst creations of mankind and will literally ruin your day. There is even a whole industry of websites who will do this for as little as $7 (and it’s a business expense).

The “I can get medical records, prescription information and the results of their last colonoscopy” private investigator

Just last week I received a spam email from some “investigative” firm that provided a laundry list of information it could obtain for a few hundred bucks. I get these emails all the time. First off, 100% of the time it is total spam. I guess these guys must take a page from the playbook of the Nigerian scammers or Viagra pushers. Quite a business model they are copying.

About 95% of the time, they say they can provide bank account information anywhere in the world for $249.95. Their website is almost always from the 1990s, and they never list any physical address or any people associated with the firm.

But this one was a little different — in addition to the various bank and investment accounts that they could obtain (illegally, or at least shadily, no doubt), they were also promoting the fact that they can provide prescription information and medical records — the same information and records that are protected by federal law, with fines of up to $250,000 and imprisonment of ten years for each offense.

The fact that anyone would openly promote the fact that they are violating federal law is mind-boggling.

They also advertised a host of other investigative offerings, like credit card activity, salary history and even frequent flyer activity.

Are there ways to get this information? Through a subpoena or consent, absolutely. Anything less would require either (1) stepping into muddy/illegal waters (e.g., calling a credit card company and pretending to be someone else or hacking into someone’s computer) or (2) putting someone in a position that violates the law or company policy (e.g., bribing someone for information that is not publicly available).

The “I can find you any bank accounts in the entire world” private investigator

I talked about this in a previous post. In short, there is no central way to identify bank accounts in the world. Period. If there were, do you think the government would have such a difficult time finding the overseas accounts of convicted fraudsters?

In short, in the United States the Right to Financial Privacy Act prohibits financial institutions from disclosing bank records or account information about individual customers to governmental agencies without (1) the customer’s consent, (2) a court order, (3) a subpoena, (4) a search warrant or (5) other formal demand, with limited exceptions.

The rest of the world is a bit of the Wild West, but in general, unless you have some sort of consent or court order, you cannot obtain information relating to a bank account or the amount in the bank account.

I am not blind to the fact that investigative firms advertise that they do this work all the time. I will tell you that nearly every time, they are either doing something illegal (shady at the very least) or they are putting somebody in an extremely compromising position, most likely by using some sort of bribe or payment, by asking them to give out unauthorized information.

If that is up your alley, be my guest — there are plenty of private investigators who will illegally obtain offshore bank records.

As for me, I would rather keep my private investigator license and my rap sheet clean.

The “I am above the law” private investigator

A while back, I was contacted by a client regarding a situation in Virginia in which a concerned family wanted to place a GPS device in the vehicle of an elderly woman. The woman had Alzheimer’s, and they wanted to keep track of her. It seemed like a totally reasonable request and one that I imagine a lot of families might consider.

I spoke to one local private investigator, who came recommended from another investigator in DC. In part, I wanted to see if he was capable of doing this, but also to see what the applicable laws were in Virginia. He told me he could “put a device on any car, anytime, anywhere.”

I was flabbergasted.

I am no expert in GPS tracking, but it’s widely understood that you can install a GPS tracking device only if you share ownership of the vehicle.

The truth of the matter is that there is no cut-and-dried answer regarding GPS tracking, especially with non-law enforcement individuals. The law has not kept up with technology. But any car, anytime, anywhere? This was about a month or two after the landmark 2012 Supreme Court ruling that warrantless GPS tracking is unconstitutional.

So I asked him about the Supreme Court ruling.

His response: “It said nothing about private investigators. It only had to do with law enforcement. Until there is a specific law that states that private investigators can’t do it, I’m doing it.”

I was shocked. So, the police can’t install a GPS without a warrant to catch a criminal, but a private investigator needs no authorization to install one in the car of a private citizen? And you need a specific law to stop you?

I never used him. And I told the investigator who referred him about my conversation. He’s never used him again either.

The “If I told you where I got the information, I’d have to kill you” private investigator

This is my favorite, and it typically means one of two things: (1) It’s so simple to get the information that it’s embarrassing to say, or (2) the information is obtained through shady/illegal means that might land someone in jail.

Here is my philosophy: If you can’t tell me where the information came from, it is (almost always) no good to me. As Canadian private investigator Richard McEachin so accurately points out:

Secret sources always introduce reliability problems into an investigation … Is the secret source doing something illegal to obtain the information? Is the data fabricated?

Case in point is Joseph Dwyer, a private investigator from Investigative Resource Group, who was bribing a police officer to gain access to the National Crime Information Center (NCIC) database and is now facing up to 45 years in prison. I am pretty sure that he couldn’t tell me where he was getting his information.

Lessons Learned

Don’t fall into the fictional world trap of the hard-drinking gumshoe with the dark, smoky office and a ready bottle of Scotch in the drawer, fraught with underworld danger, high-speed chases and the commonplace practice of breaking the law to obtain information.

In the real world, there are real implications fraught with legal and ethical issues.

Photo courtesy of ShipYourEnemiesGlitter.com

Enjoyed What You Read?

Join 2,000+ others to get insider tips and tricks delivered to your inbox from what has been voted the best blog in the investigative industry!

1Don’t take on clients who are more interested in the mysterious, secretive, shady, working-on-the-edge-of-the-law mystique

2Follow the facts

3Don’t get hung up with what other people think

4If at any point you think you know everything, it’s time to get out of the business

5If you are not an expert in something, become one (or find someone who is)

6It’s much easier to tell the truth, than to remember all of the lies

7If you can’t tell me where the information comes from, it’s not really any good to me

8Don’t make promises you can’t keep

9Understand your client’s motives and intentions

10Put yourself in a position to win

11Even a whiff of any unscrupulous behavior might undermine a client’s best interest, your reputation and your license

12Follow your ethical and moral compass

13Don’t do anything your children wouldn’t be proud of

14Learn by doing

15The little things can make the biggest difference

16Practice what you teach

17Stick to your principles

Enjoyed What You Read?

Join 2,000+ others to get insider tips and tricks delivered to your inbox from what has been voted the best blog in the investigative industry!

A few weeks ago we received a call from a local hedge fund manager who was being harassed through a series of text messages by someone who had threatened to create a website detailing the hedge fund manager’s infidelities. It had not reached the point of extortion or blackmail, but it was clear that this person had some inside information and was not going to go away.

The hedge fund manager was concerned that his “private life” would be released to the public, and he wanted to track down the person who was sending the text messages.

All we had to go on was a telephone number that the person was texting from. That’s not much to go on. As I explained to him, there are a 1,001 ways to mask a telephone number so that it would be nearly impossible to track down the owner of the phone without some sort of help from law enforcement.

The problem is that this situation was not at the point where law enforcement would even “take a sniff of it.” The personal issues of a hedge fund manager are not high on the totem pole for the local police department. After all, no criminal offense had been committed.

As a first step, I offered to run some database research on the phone number through a series of professional and proprietary databases to see if the number popped up somewhere. If we had any leads, we could try to track down the person and get a sense of who they were.

But the hedge fund manager had other plans.

He wanted me to call and/or text the person and “threaten” and “intimidate” (his words, not mine) the person into revealing their identity and tell them that they would be arrested and prosecuted if they sent another message or released any information about the hedge fund manager.

Intimidating a person and throwing out empty threats on behalf of someone who called me out of the blue is not a case that I would covet.

It would have been a completely empty threat. You can’t be arrested or charged with anything based on a few texts that say you have some information about someone’s infidelity. Especially if it is true (which I suspect it was).

I nicely told him that it was not something that we would want to get involved with. Intimidating a person and throwing out empty threats on behalf of someone who called me out of the blue is not a case that I would covet.

His reply? “I thought that is what you guys do.”

Intimidate people?

Throw out empty threats?

With all due respect, no we don’t.

Nor would we ever.

Enjoyed What You Read?

Join 2,000+ others to get insider tips and tricks delivered to your inbox from what has been voted the best blog in the investigative industry!

A few months ago, we received a call from a law firm that was representing a CEO of a major public company. Day after day, the CEO had been receiving phone calls at all hours from an anonymous caller; they were believed to be from an irate investor. Concerned for his family’s safety, he did some searching and found several websites that not only published his home telephone number but also his home address and other details about his personal life.

The obvious answer to his immediate problem was to change his telephone number. But, as I explained to him, preventing this from happening again would be a bit more complicated than that.

Your Information is Available, Whether You Know it or Not

There are a number of formal, legitimate Internet companies, as well as less formal and illegitimate ones, that collect, maintain and distribute personal information about individuals, including home addresses and telephone numbers, cell phone numbers, personal email addresses and related information. These data brokers obtain personal information from telephone companies, credit reporting agencies, government agencies, Internet sales transactions, magazine subscriptions, utility companies and other sources.

Most of these data brokers make this information available on the Internet, through databases such as Intelius, PeopleSmart, Spokeo and ZabaSearch. These databases are based in the United States and regulated by various federal and state privacy and other laws that provide opportunities for individuals who want to maintain personal privacy to opt out of these individual databases. As an example, here is the link for the Intelius opt-out.

There also are online tools, such as Abine’s DeleteMe and Reputation.com, that assist individuals with removing personal data from the websites listed above and monitor the web for new publications of personal information.

Unregulated Data Brokers

But there are other websites or data brokers that collect and distribute personal information related to noteworthy individuals, such as celebrities, high-net-worth individuals, public officials or corporate executives. These resources are not based in the United States, are beyond the regulatory reach of U.S. federal and state authorities, and do not provide any opportunity for individuals to opt out of their databases. There is little that can be done to effectively remove information or prevent republication of information distributed on these types of websites.

It is important to understand that it is extremely difficult to maintain anonymity and/or personal privacy in an Internet society.

First, it is important to understand that it is extremely difficult to maintain anonymity and/or personal privacy in an Internet society. Enhanced data analytic techniques have made it possible for legitimate and illegitimate data brokers to obtain and sort caches of personal information regarding anyone who is involved in regular commerce.

Paying a telecommunications provider fees to maintain a “private listing” will only protect a home telephone number if that telephone number is not used for any publicly available transaction, such as making online restaurant reservations or online purchases; listed on any record maintained by a federal, state or local government agency, such as a property tax assessor; or used as the contact number for any type of credit card, utility or other account. Legitimate and illegitimate data brokers buy lists from hundreds of government, retail, online and other sources on an ongoing basis.

There are steps that can be taken, however, that minimize the possibility of home addresses, personal email addresses, and home telephone and personal cell phone numbers becoming available for public dissemination. And there are also some steps that you can take to protect some of your other personal information.

  • Whenever possible, don’t use your personal phone number, email address or home address for regular commercial transactions. If you are not comfortable using your business address for personal, political or nonbusiness-related transactions, it may be worthwhile to acquire a P.O. box at either the U.S. Postal Service or a local shipping and business center. The advantages of setting up an account at a local shipping and business center are that you can get packages delivered and you can usually have 24-hour access to your mailbox.
  • When making any type of reservation, including travel or restaurant reservations, use your office telephone number and business email address or your P.O. box. Do not provide home address and telephone number information when you reach your destination, either.
  • When making any type of Internet purchase, use your office telephone number and business email address. Credit card and ship-to information may necessarily reveal your home address, but you can protect your home telephone number by NOT providing that information when engaging in these transactions.
  • When making political contributions, use your business address or P.O. box.
  • When providing personal information for charities, events, trade groups, community organizations, schools, memberships, etc., provide your office telephone number and business address and office email address. While most nonprofit organizations do not engage in data brokerage, many use vendors to conduct these transactions and those organizations may sell data.
  • If you don’t want to use your business telephone number for personal, political or nonbusiness-related transactions, it may be worthwhile (a) to acquire a second home telephone number or cell number or (b) to obtain a telecommunications account under the name of a trusted associate or personal staff member (to use for such nonbusiness transactions). Such auxiliary numbers would not be used to contact friends and family members, and would be turned off at night. Most telecommunications companies provide inexpensive minimal-usage accounts.
  • Limit your social media presence on the Internet, and if you do participate on social media sites, invoke the highest privacy settings available for those sites. Do not allow any portion of your social media presence to be accessible by anyone other than invited users. Many social media sites now include “geotag” options for postings. Make sure you disable this feature.
  • Instruct your teenage and adult children and anyone working in your home to protect home address and telephone number information using the same steps as you do, especially on social media sites.
  • When establishing any type of Internet account or presence, including a data drop-box, blog account, media comment account, etc., read the privacy policy of such web services carefully. Many include data opt-out provisions or explain that customer data is not sold or shared. If a vendor with whom you communicate on the Internet does not provide any type of privacy protections, consider not maintaining an Internet relationship with that vendor.
  • Set up Anonymous Call Rejection on your landlines and mobile phones. Most telephone services allow you to block all incoming calls that have their caller ID blocked. This may prevent unwanted intrusions. The person on the other end will hear a message stating that the line does not accept calls from callers who block their number.
  • Finally, never provide your Social Security number, date of birth or other personal information to anyone who contacts you over the telephone.

Enjoyed What You Read?

Join 2,000+ others to get insider tips and tricks delivered to your inbox from what has been voted the best blog in the investigative industry!