Author name: Robert Mann

Blog

How to Catch a Cheating Spouse: 8 Top Tips from an Expert Private Investigator

When you suspect that your spouse is being unfaithful, it can eat away at you until you can’t think about anything else. Suspicion isn’t enough for most to end a committed relationship, but no one wants to continue on with a partner they don’t trust. Trust is absolutely everything that holds a marriage together. How to Catch a Cheater: It’s important for your future and for your mental sanity that you find out the truth. People are often reluctant to immediately hire a private investigator when they suspect cheating but there could be signs in your relationship that you need to dig a little deeper. HERE IS A LIST OF THE SERVICES WE PROVIDE Infidelity Investigations Cheating Spouse Investigations Surveillance Investigations Civil and Criminal Investigations Locate Investigations Executive Background Investigations Employee Misconduct Workers’ Compensation Fraud Keep reading to learn how to catch a cheater and what you can do to learn the truth and finally put your suspicions behind you one way or another! What’s Changed? The biggest thing that tips people off to a cheating partner is usually a change in their behavior. While men are more worried about and feel more betrayed by physical cheating (having sexual contact), women tend to be more upset by the emotional betrayal of infidelity. No matter which part of a partner straying is worrying you, you owe it to yourself to find out what is really happening. They say hindsight is 20/20 but if you stop to put all the signs together, you’ll realize all the small things actually amount to some major differences. Change in Appearance If your mate is suddenly taking much better care of themselves and their appearance, you might be wondering why. There are some indicators that these changes could be due to having a new love interest. When a spouse starts wearing new clothes that seem out of their comfort zone or they are suddenly more particular about hygiene before going out alone could be a red flag. They may start watching what they eat or have a new interest in working out and getting into better physical shape. Change in Behavior It’s not just how good they look that changes when someone is being unfaithful. Often there are blatant signs of cheating in the changes in their personality or behavior. They may start picking fights so they have a reason to leave or can ease their conscience regarding their infidelity. Some individuals will be more attentive and affectionate when they are home. Bringing gifts or flowers out of the blue. This too is often due to feeling guilty for cheating. Working late or unexplained absences, long hours when they can’t be reached, and new excuses for trips out of town are telltale signs that something might be going on. Change in Privacy Settings If someone has something to hide they usually start taking steps to make sure they do. New passwords on their phone or computer, changes in privacy settings on social media or new profiles. Check their phone for new contacts that don’t provide details about who they are for. You may also want to check the phone call history and text messages they’ve sent and received. Most people who are cheating know how to hide things better than that though. There are apps that hide conversations and communication so be sure to check for unrecognizable apps that seem to be new. Checking Up on Them You don’t want to spend your life following them around and checking every move they make but if you still suspect you’re being cheated on, it’s in your best interest to find out the truth. If you are still questioning your spouse’s fidelity, you may want to consider having them investigated so you can learn the truth. The Experts Know How to Catch a Cheater You don’t have to turn into Dick Tracey and do the leg work yourself. In fact, it can be almost impossible to know for sure how to catch a cheater when you’re the one being cheated on. If you’re still worried about your relationship, connect with us. We’re experts in private investigation and we know how to catch a cheater so you can sleep better knowing the truth.

odyguard Services New York Los Angeles
Blog

NEED A BODYGUARD? WHAT TO LOOK FOR

For the past twenty- eight years, Worldwide Intelligence Network has been providing highly skilled Professional Bodyguards for dignitaries, politicians, high net-worth individuals, executives, celebrities, and the general public. Knowing which Bodyguard, aka a Personal Protection Agent, is best suited to protect you and those closest to you is a vital decision. Making the wrong choice could negatively impact you and your family forever. All too often, people seeking protection assume a big nasty looking male will deter someone intent on harming them. Unfortunately a huge scary-looking male without the proper training and experience is apt to cause more trouble than they prevent, and you as the client could wind up on the wrong end of a lawsuit. A Professional Bodyguard’s primary duty is to keep their client safe and avoid a confrontation at all costs rather than mixing it up with a hostile individual. The primary responsibility of your Bodyguard is to familiarize themself with your surroundings; be it while you’re at a conference, hotel, restaurant, a venue, airport, or a train terminal. Your Bodyguard should learn where all the exits closest to you are and be ready to immediately remove you from any unforeseen incident. Your Bodyguard should continually monitor persons with you or in and around you for any unusual or sudden movements toward you. Whenever our Bodyguards are provided with advance information on the client’s itinerary for a day, week, or month they will conduct an advance survey on all of the locations where the client is going,and they’ll learn where the nearest emergency facility is and whether the location(s) the client will be visiting is known to be safe. For the past twenty-eight years Worldwide Intelligence Network has maintained an outstanding safety record on behalf of our clients all over the world without a single client injured, robbed, or kidnapped on our watch. Should a client receive a threat of any kind, our international investigative division will immediately initiate a thorough and, if necessary global background investigation on the perpetrator, and we will work closely with law enforcement whenever necessary. LEARN MORE ABOUT OUR BODYGUARD SERVICES: Los Angeles Bodyguard Services Personal Protection Services Celebrity Bodyguard Services Corporate Bodyguard Services Stalker Investigations and Protection Services SOME TESTIMONIALS; I want to thank you for your superb services and to tell you that I appreciate all you have done for me over many years first by providing excellent Bodyguards for my wedding reception, and assisting me with the removal fraudulent Yelp reviews. I truly appreciate your service and have always trusted you. Kevin T., President Save-on Insurance Services, Inc. I cannot thank you and your team enough. Your Personal Protection team was fantastic today. I’ve never seen my uncle as calm as he was when your team was here today. My uncle knows when to act out and when not to. He is a very dangerous man, and he played the good guy today thanks to you and your team who kept him calm the entire time. I am SO grateful to you and your team. Please let them know how much I appreciated their presence today. Thanks again! – Lauren I cannot thank you and your team enough. Your Personal Protection team was fantastic today. I’ve never seen my uncle as calm as he was when your team was here today. My uncle knows when to act out and when not to. He is a very dangerous man, and he played the good guy today thanks to you and your team who kept him calm the entire time. I am SO grateful to you and your team. Please let them know how much I appreciated their presence today. Thanks again! – Lauren Thank you for the great team you put together, both guys were really professional and knew what they were doing. We will definitely be using your services again. – Paul Thank you all again for your services. We were all very impressed with your preparedness and professionalism. I hope that you will be able to visit UT-Knoxville in the future. Please let me know if you need anything else from me. Thank you, Jordan V., The University of Tennessee, Knoxville, Young Americans for Freedom   Los Angeles [310] 385–8200 win@wincor.com www.wincor.com California License # 15757 

Blog

Eye Opening Federal Criminal Case Dismissed

I’ve been a Private Investigator in Los Angeles for twenty-eight years and have investigated several challenging criminal investigations but none quite as challenging as this one. What you are about to read might resemble the preface to a crime novel, but this is a true story about how I, as a Private Investigator, was tasked with uncovering the truth against insurmountable odds. LOS ANGELES PRIVATE INVESTIGATOR VS. US GOVERNMENT     Author; Robert Mann, Director of Worldwide Intelligence Network HERE IS A LIST OF THE SERVICES WE PROVIDE Infidelity Investigations Cheating Spouse Investigations Surveillance Investigations Civil and Criminal Investigations Locate Investigations Executive Background Investigations Employee Misconduct Workers’ Compensation Fraud INTRODUCTION Upon meeting the subject of this article, which became my client (herein referred to as Steve), the first words out of his mouth were he reluctantly pled guilty to bribing a  Special Agent for Immigration and Customs Enforcement (ICE). Steve owned a very successful freight forwarding and redistribution business. His warehouse was enormous at 500,000 square feet, located in Dominguez, California, on the outskirts of Compton. He employed about a hundred people. WHY AM I HERE? I was more than curious to know why Steve requested my services since the cow already left the barn. “What would you like me to do for you,” I asked. He handed me sixty pages of exculpatory evidence the US Justice Department turned over to him and asked that I, please review them. I asked who his attorney was, and he told me he decided to plead guilty after retaining three different top Los Angeles’ criminal attorneys that cost him approximately $350,000. All three told him he would be better off entering a guilty plea rather than to go up against the US Justice Department. I thought what the heck, I drove an hour to get to Dominguez Hills from Century City, and rush hour was in full swing I might as well take a look. Steve provided me with a private room to review the government’s documents, and what I found in those pages blew my mind. THE ANONYMOUS TIP All sixty pages were on INS letterhead (Homeland Security had not been formed yet), and they all appeared to be written by someone who did not have an academic command of English. The author appeared to be educated outside of the United States. The first page was titled “Anonymous Tip,” which stated that Steve employed about three hundred illegal aliens and was paying them under the table to avoid payroll taxes. It also stated Steve was paying off US Customs Agents to gain more random truck inspections for his company. Steve told me that he was a vetted/approved USA Independent Contractor for the United States Customs office. The anonymous tipster further alleged Steve was transporting illicit drugs in his company’s trucks all across America. Other pages pertained to various investigative assignments allegedly conducted by INS Agents, all initialed by an alleged INS supervisor. Each page had those initials in the same place on each page. The assignments supposedly approved by the INS Supervisor were surveillance of Steve’s warehouse along with several undercover investigations in and around the warehouse to identify all of the alleged illegal aliens working for Steve, under the table. The supervisor’s initials appeared to be copied and pasted on each page. The anonymous note ended with a statement saying that the person calling in this anonymous tip would be willing to testify if asked. So much for it being “an anonymous tipster.” The government’s entire case hinged upon information provided by INS Special Agent Avestro, who alleged the entire investigation, was initiated by an anonymous tipster. A GLIMMER OF HOPE I have conducted hundreds of document examinations over twenty-eight years and developed an innate ability to identify certain aspects in a document that is questionable. I had no doubt those sixty pages were all bogus. I told Steve his only course of action was to try and have his guilty plea withdrawn, which was no easy task. I recommended two partners at Loeb & Loeb law offices for whom I’ve done a considerable amount of investigations for. Both attorneys were former prosecutors at the State and Federal levels. I told the Loeb & Loeb attorneys my interpretation of the government’s documents. Steve told me that not one of the three attorneys he retained wanted to review any of the sixty pages. The Loeb lawyers met with Steve and agreed to take on his case after reviewing Steve’s plea. They filed a motion in Federal Court to withdraw his guilty plea and requested Steve to proceed to trial. MOTION GRANTED Loeb lawyers and the AUSA appeared before US District Judge Terry J. Hatter. The motion to withdraw Steve’s plea was granted. A trial date was set. THE IMPETUS – WHY THIS HAPPENED I learned Steve and his brother dated two Filipina women who were in Steve’s employ. Over time, both Steve and his brother David ended their relationship with their respective girlfriends, which evolved into the two women becoming unhinged. They turned to a mutual Filipino friend who was a Special Agent for the INS named Avestro. The women told Avestro how badly the brothers treated them, and they wanted to teach Steve a lesson by destroying his business. I sat with Steve and David conducting in-depth interviews for days to learn everything that transpired from their first date to their last dates with two scorned women. The brothers explained that Avestro began hanging around the warehouse all the time, acting like a good friend of two ex-girlfriends. I interviewed many of Steve’s employees, especially those who were knowledgeable about the two Filipina ladies lifestyle. The more I heard, the stronger our case became. I learned that Steve’s former attorneys hired private investigators to interview the two ex-girlfriends and other employees who might be helpful to Steve. Not a single employee would speak with those investigators. During my investigation, I interviewed all of the crucial witnesses. Failure in my mind

private investigating professionals
Blog

Why You Should Leave Investigating up to the Private Investigating Professionals

Private Investigating Professionals are here to help It’s understandable how some people rationalize that they alone can investigate and solve their disconcerting issue. Many people like to figure things out on their own, to discover the truth through their own eyes, but depending upon the seriousness of their issue things can spiral out of control, and one of those folks might find themselves involved in something they are ill-equipped to handle. Depending upon the circumstance of their particular issue, it can become rather dangerous to conduct their own investigation if it turns into an unpredictable horror show. When anyone experiences a disturbing issue it usually causes a degree of emotional turmoil, and trying to figure it out by acting as their own private investigator can be hampered because the injured party is too close to the situation. Believing they can conduct a completely logical, legal, and unbiased investigation is somewhat unreasonable.   Why Use Private Investigating Professionals Imagine that your spouse is cheating and you’re confident you can catch them in the act without creating a heated and possibly a brawling confrontation. Don’t delude yourself it’s a lot harder than you think to suppress your inflamed emotions which could turn into a violent domestic dispute. Be smart and leave this to a private investigating professional Infidelity Private Investigator. Highly regarded professional private investigators commence an investigation by remaining neutral, non-emotional, and focused on obtaining the truth and achieving the objective of their assignment. An experienced private investigator knows that more often than not, some clients do not always reveal all that they know for various reasons. Some of those reasons might be: they’re embarrassed, they don’t fully trust the investigator with knowing too much about them, or they do not want what the investigator learns to include what they (the client) are hiding. There is no college course or private academy to teach someone the “how-to” when it comes to investigating hundreds of various investigative scenarios taking place in any city or town like Los Angeles. It takes years of professional investigative experience to conduct an investigation, to know how to deep dive into specialized research, and to have highly reliable confidential sources. When a private investigator sets out to conduct an assignment they all share one common denominator and that it “the challenge” they are about to experience. So when it comes to taking matters into your own hands, think twice about the importance of having a licensed professional private investigator take care of your situation if you want it done properly and legally.   Worldwide Intelligence Network is proven credible.  We believe you will find comfort in knowing you have one of the finest private investigating professionals in America at your disposal.

Personal Security Specialist
Blog

Don’t Think You Need Personal Security? Think Again

Bodyguards as personal security aren’t just for celebrities to keep the paparazzi away or to protect them from overzealous fans. Celebrities in Los Angeles, while they are out and about are generally accompanied by their Bodyguards for multiple reasons, but they aren’t the only ones who require Personal Security Specialist anymore. Are you are on the list of people whose safety would benefit from hiring a Bodyguard? Personal Security for Divorcees and Domestic Dispute Victims In these types of unpleasant situations, emotions often run high and can get out of control, which can lead to either spouse becoming fearful for their safety. It’s not uncommon for anger or frustration to turn into a full-blown domestic violence act. Having a Bodyguard present deters a volatile confrontation. Bodyguards are trained to monitor the volatility between the spouses, thus keeping both parties safe by defusing the situation. Personal Security for CEOs and Executives Unfortunately there are times when a business person achieves enormous success and has amassed significant wealth only to become a target for kidnapping. All of these people are considered high profile clients who maintain a full time top tier Executive Protection team as they travel around the world. These highly successful CEO’s are often subjected to criminal threats such as extortion accompanied by threats of physical harm to their family members. CEO’s and their subordinates must always remain vigilant about disgruntled or terminated employees as well as unhappy customers or clients who might seek retaliation against the company. The Personal Protection provided by their Bodyguards closely resembles the tactics used by several government agencies such as the Secret Service. Personal Security for Owners of Valuable Goods or Information The transportation of high-end jewelry is always at risk of an armed robbery. The proprietors of high-end jewelry stores are also vulnerable to armed robbery, and they are well-advised to hire a Bodyguard to ensure they’re protected from theft and personal harm. What might not be known is that this would also include someone in possession of classified information or materials. With the increased rate of violence in America and around the world, high-net-worth individuals, executives, political figures, well-known jewelry lines, celebrities, and the public in general, have become increasingly concerned about their safety. There is a remarkable increase in the redesigning of residential and corporate security systems and an increase in hiring qualified Bodyguard personnel. Personal Security for Targets of Attention Others who might consider having personal security could become potential targets because they might have won a lottery or are a crucial witness to a criminal act or someone who stumbled into a worthy inheritance. All these examples relate to the need for a Bodyguard. Even if someone is momentarily in the public eye, threats do loom. Regardless of where you live and what you do, providing you have the means to hire a Bodyguard should you find yourself in a situation where you or your family’s safety is threatened, do not waste time contemplating the hiring of a Bodyguard.

Blog

Personal Bodyguard Services You Can Trust

Researching personal bodyguard services can be overwhelming. We understand it can be frightening to learn that someone is seeking to harm you or your loved ones? Who can you trust to protect you and your family? PERSONAL BODYGUARD SERVICES: KNOW YOUR BODYGUARD’S CREDENTIALS If personal bodyguard services is what you would want, then you should be looking to hire a well-trained skilled Bodyguard also referred to as an Executive Protection Specialist who has either been in the military, performed diplomatic protection on behalf of the Department of State or was a former law enforcement officer. HIGH-NET WORTH INDIVIDUALS As a high –net worth individual, you appreciate the value of having qualified Bodyguards with you when traveling abroad. Many of our clientele travel worldwide several times a year sometimes on business or while on vacations with their families traveling either on a private yacht or plane. Over time, these high profile clients (many are celebrities) appreciate how vitally important it is to have rock-solid professional Bodyguards assigned to their family or concert tour during their travels, be it in China, South East Asia, Europe, The Bahamas, Majorca, the Cote De Azure, Japan, Latin America, and the USA. SECURITY WHILE SHOPPING Many of our clients enjoy shopping in the fashionable boutiques and elite department stores located in the major cities such as Paris, Berlin St. Trope, New York, Beverly Hills, Newport Beach, South Hampton, Las Vegas, Chicago, and Boston. These clients are seasoned travelers through previous bad experiences know it is best to be accompanied by Professional Bodyguards. Unfortunately, some of our clients personally experienced being robbed while going in and out of luxury boutiques carrying shopping bags containing exquisite purchases. Lessons learned they never again would shop without having a personal protection Bodyguard(s) with them. SECURITY DURING BUSINESS MEETINGS We accommodate many clients who are anxious about attending a contentious business meeting, a deposition, or court proceeding, and they will request personal bodyguard services. Sometimes it is intimidating to the attendees in the meeting when a mean looking Bodyguard walks in with a client. We instruct our Bodyguards to enter a room with the client with a cordial smile and nod to the attendees. We have experienced meetings where an overzealous Bodyguard from the adversarial party came in acting like an attack dog which caused all the attendees to leave the meeting. Expect your Bodyguard to conduct an advanced survey of the building where your meeting will be held to know where the closest exits are and where your transportation should safely park. SEVERE SECURITY RISKS Upon learning that a client received egregious verbal threats or worse yet was physically assaulted, we will conduct a thorough risk assessment of the client’s residence and place of business. We’ll inquire whether local police were notified and if the assailant is stalking the client. Testing will be conducted on the functionality of all existing CCTV and alarm systems in the residence and business locations. We will test the residential grounds for any attempt at underpinning the walls or landscape of the property. Electric gates to the property will be checked for functionality. Upon completion of our personal bodyguard services assessment and after consultation with the client, we will determine with the client’s approval how many Bodyguards will be assigned to the client and his family. Kidnapping for ransom is a serious concern of many clients we represent. OUR BODYGUARDS ARE NOT DAY DREAMERS Our Bodyguards are trained to react quickly and to remain diligent at all times. Our client’s safety is first and foremost. Many of our Bodyguards men and woman have endured life-threatening situations while deployed in the Middle East as well as on the city streets across the USA. There is one imperative take away from this article, which is vital to the safety of a client that is the Advance Survey and subsequent preparations. Please take a moment to peruse our accolades here. We believe you will find comfort in knowing you have one of the finest personal Bodyguard Services Companies in America at your disposal. Should you be planning a trip abroad, please know we maintain an active list of International Bodyguards to serve you anywhere in the world.

Know private investigator
Blog

5 Common Misconceptions about Private Investigators

Often, when people hear the term, private investigators, they conjure up an image of a scruffy looking man wearing a raincoat or envision Sherlock Holmes, the infamous fictitious private detective. Some might picture that classic scene in Mission Impossible when Tom Cruise stealthily dropped down from the ceiling hanging by a cord (or was he a private investigator?) There are many common misconceptions of what a private investigator can do. So before hiring a private investigator, familiarize yourself with some of the more common misconceptions: They can make legal arrests In the U.S., private investigators are not authorized to make an arrest, per se, but they do have the ability to make a citizen’s arrest if need be. You can find an explanation about a citizen’s arrest here They can hack into social media or email accounts Although it might seem like everyone can do this in 2019, it’s not something you will see done at the hands of a private investigator. Even if Jerry O’Connell might portray otherwise on the TV show Carter. PIs help to identify hackers; they are not involved with hacking activity, albeit they don’t want to spend time in prison. They can access bank and medical records  This misconception isn’t so black and white. Although PIs cannot access medical records, they can interview witnesses who are familiar with the patient/subject they are investigating. The latter allows them to tap into useful information about the subject’s medical history, helping to further the investigation. Private Investigators cannot access banks or any financial institutions. They can record conversations without consent When a PI wants to record a covert conversation (without permission) they best check the laws in the state they are planning to record in. The law varies by state. For example, if you’re in Los Angeles California, you cannot record someone without their consent. However, should you be in New York, you can record someone without their permission. New York is known as a one-party State. They can trespass on other people’s property As dramatic as it might appear in the movies, private investigators cannot break into someone’s home, car, office, or any place the person inhabits without the consent of that person. Private Investigators cannot read other people’s mail or take a person’s mail from their mailbox. However, if the private investigator wants to find some useful information on a subject, they can take their trash as long as the trash is outside at the curb waiting to be picked up. The right to privacy ends at the curb, according to a United States Supreme Court decision. Boy oh boy would you be amazed at what private investigators learn from someone’s trash. Now that you’re informed about these common misconceptions, you will be way ahead of the game. In Los Angeles, infidelity investigations are among the most common investigations requested by clients of Private Investigators. Other more common investigations have to do with surveillance investigations, civil and criminal investigations, and background investigations. Set your expectations appropriately and know what you can legally find out. With the help of a qualified, reputable private investigator, you very well may learn the truth which can set you free.

Blog

Can You Depend On Your Bodyguard?

Have you wondered whether your Bodyguard would take a bullet meant for you? For the most part, no one can foresee the future or predict how someone will react under extreme stress. With over twenty-eight years’ of experience vetting Bodyguards for our Los Angeles and international clients the honest answer is you do not know. There is no surefire way of knowing but these two theories might help; 1.Is your Bodyguard in your opinion truly loyal to you and has he /she demonstrated overtime a sincere concern for your safety? 2. Has she/he been properly vetted by a professional Personal Protection Company who delved deeply into the Bodyguard candidate’s background? LEARN AS MUCH A POSSIBLE ABOUT YOUR BODYGUARD Worldwide Intelligence Network has been vetting of Bodyguards for twenty-eight years and thankfully we never had a single adverse incident occur. It takes years of knowledge and experience to recognize a true professional Bodyguard. Many Bodyguards enter the field of Person Protection after being discharged from the military. When vetting a veteran seeking Bodyguard employment, it is essential to inquire about their training and whether they were deployed to a theater of operation. We counsel veterans seeking a career as a Bodyguard also known as a Personal Protection Specialist to think about enrollment in a professional Bodyguard/Executive Protection Academy. Other candidates are former law enforcement officers many having served on dignitary protection details for the US Government. Retired or former Secret Service and CIA Agents also like working in the private sector because there is not that much traveling involved and they can spend more time with their families. For those who do not fall into the above categories but want to become Bodyguards are well advised to also enroll in Bodyguard academies and work as apprentices for several months while going through on the job training. WHEN FAMILY OR EMPLOYEES ARE THREATENED Predicated upon the threat and the Bodyguard’s knowledge of the person or persons making the threat, the first thing to do is to gather up all family members and immediately remove them from their residence, their work place, school or at a friend’s home. Then relocate them to a safe place until the threat is eliminated. Should a business be threatened the first thing to do is to lock all entrances and exits and call 911immediately. These procedures are referred to as neutralizing the threat by making it all the more difficult or impossible for the perpetrator to carry out the attack. Dressing up like a Bodyguard portrayed in the movies doesn’t make the client safe. ADVANCE PLANNING IS KEY TO PROTECTING CLIENTS A great amount of pre-planning is involved when protecting a celebrity, executive, high-net-worth person or privileged individual. It takes research, logistical planning, conferring with law enforcement, analyzing floor plans of venues, knowing where the closest emergency hospitals are in relation to the client’s itinerary. All of those preparations contribute to the health and safety of their client. Preparedness involves conducting a thorough advance survey of the location (s) where their client’s appointments will be or where the client will perform such as a venue or concert hall. Advance surveys involve knowing where the ingress and egress is at each location to make sure the client has immediate transportation available should an emergency arise and also to avoid overzealous fans, paparazzi or a vast group of news reporters. Click this link to see a perfect example of how poor planning almost jeopardized Lady Gaga safety. A simple check by one of her Bodyguards on the conditions outside of the hotel where Lady Gaga was exiting would have avoided the onslaught of paparazzi. The Bodyguard must take into account what if a demented individual is among the throng of people there to cause physical harm to Lady Gaga? Professional Bodyguards plan all of their client’s moves in advance, and they make sure their client remains out of harm’s way at all junctures. As this blog explains, there is much for a professional Bodyguard to do other than walk alongside, in front of or behind their client. The key to Personal Protection is being diligent, observant, aware, streetwise, and to always focus on how to take their client out of harm’s way. Here is an ideal example of being aware.

Blog

ARTFUL MANIPULATION TO STEAL YOUR COMPANY’S MONEY | BANK FRAUD

A story of a bank fraud private investigation, authored By Robert Mann, Director of Worldwide Intelligence Network. Worldwide Intelligence Network is a global Private Investigation and Bodyguard Services company with our office located in Los Angeles. WHICH EMPLOYEE STOLE THE COMPANY’S MONEY Occasionally we share a bank fraud private investigation case we conducted with the public that we believe is vital intelligence that may prevent them from becoming a victim of a highly sophisticated cyber intrusion that would target their company’s bank account. The following is about an investigation we conducted on behalf of a Beverly Hills entertainment company who discovered a large sum of money was stolen from their bank account. They suspected the culprit might be someone in their employ and they asked our help in determining who could have perpetrated the crime. Prior to accepting the assignment our Director of Operations conferred with the prospective client and suggested that in addition to the employee interviews he would like one of our cybercrime specialists to look at the company’s computers. We learned all the company’s employees use Apple/Mac Laptops. WITH BANK FRAUD, ALL EMPLOYEES ARE SUSPECT We accepted the assignment and commenced interviewing all of the employees separately while our cyber specialist examined each of their laptops for any unlawful intrusion/hack. During the interviews, we learned that the entire staff had a meeting a week or two before the theft about how not to open any document or link that appeared suspicious. We found it rather unfortunate while interviewing one of the employees who admitted to opening a PDF link to a document she thought came from her boss. THE HACK IDENTIFIED Our cyber specialist tracked down that particular PDF document and identified it as one that contained rather sophisticated malware. The link to the PDF document was an instruction to this specific employee to send a wire transfer to a particular vendor. The document appeared to be signed not only by her boss but also by the CFO of the company. THE INCREDIBLE PATIENT HACKER As the investigation progressed, it became apparent that a very sophisticated hacker had studied the processes the company used to issue payments from their account payable system and duplicated a bogus account payable account and have it appear as if it had gone through all the proper channels with the authorized signers’ emails listed on the PDF document. It did not take long to uncover that an unlawful intrusion by someone with an infinite amount of patience and endurance penetrated their account payable system and pulled off a theft involving a rather large sum of money withdrawn from our client’s bank account. ALL EMPLOYEES CLEARED There was no happy ending to this bank fraud private investigation case, except to say that all of the employees were cleared of wrongdoing. It is also a lesson always learned verbally to verify any instrument requesting a wire transfer.

Blog

Cybersecurity Vulnerabilities by Mr. Peter Warmka

The following article is being published on our Blog with the permission of Mr. Peter Warmka whom we are most grateful to. What you are about to read in the following article is rather astonishing considering how complex yet how easy it was to accomplish. 01 September 2018 by Peter Warmka, CPP Peter Warmka, CPP, is director of business intelligence for Strategic Risk Management and an adjunct professor for Webster University’s cybersecurity masters program. He is a frequent speaker on social engineering threats at conferences for trade associations and wealth management advisory firms. Warmka is a member of ASIS International. Chief financial officer Malcolm Fisher never thought he would be victimized by cybercrime—until a social engineer successfully impersonated him and bilked his company out of more than $125,000. It was relatively easy for the criminal to identify Fisher as a high-value target given his crucial position within the company—his bio was readily available on the company website. And Fisher’s social media profiles on Facebook, Twitter, and LinkedIn revealed several bits of information that marked him as a dream target for a diligent social engineer. Fisher frequently participated in poker tournaments and was not modest in describing his success at the table. He posted about attending an upcoming tournament in Las Vegas and cataloged his travel plans across social media platforms. Shortly after his arrival to Las Vegas, Fisher received a text message from what appeared to be the tournament organizer providing a link to the updated schedule. When he clicked on the link, nothing seemed to happen—but he had just unwittingly provided the social engineer with entry into his company-issued mobile device. Knowing that the tournament started at 11 the next morning, the fraudster hijacked Fisher’s email account and sent an urgent message at 11:15 a.m. to a colleague. The email—supposedly written by Fisher—instructed the employee to immediately wire $125,000 to a vendor, noting that he would be out of touch for several hours because he was attending the tournament. The employee, never questioning his boss’s instructions, immediately processed the wire transfer. While Fisher left Las Vegas very pleased with his tournament winnings, he soon learned that he was the one who got played. This scenario is not unusual. With more focus than ever on enterprise cybersecurity and preventing data breaches, many executives believe that technology alone provides sufficient protection against such threats. But sophisticated threat actors—whether they be nation states, criminals, activists, or disloyal competitors—will frequently target the most significant vulnerability found in most organizations: the human factor. The interaction between human beings and the technology meant to protect the organization is commonly referred to as the weakest link in security. The most common method used by these threat actors to exploit the human factor vulnerability is social engineering. In fact, according to the 2018 Verizon Data Breach Investigations Report, more than 90 percent of successful security breaches start with some aspect of social engineering. Social engineering is the skillful manipulation of organizational insiders to undertake certain actions of interest to the social engineer. Insiders are not only employees of the organization—they include anyone who may have unescorted access into a target organization, including service providers such as the guard force, cleaning crews, catering companies, vending machine stockers, maintenance contractors, and more. Greater awareness and insight into this process provides a better opportunity to mitigate the risk of social engineering attacks. COLLECTING THE DATA Prior to launching any type of attack against the target, a professional social engineer will spend time collecting available open source information. While such collection may be from a variety of resources, the most frequent medium is simple online research. Almost every organization has a website with information about the company, its products and services, executive profiles, press releases, contact information, and career opportunities. While all such sections may provide useful information to a social engineer, executive profiles—which often contain full names, titles, pictures, and a brief biographic sketch—provide considerable insight into key insiders and where they fit into the organizational structure. Career opportunities, along with company contact information, provide exploitable details and a portal through which a social engineer may seek direct or indirect contact with the organization. Job postings and reviews. Whether posted on the organization’s website or advertised on online job boards, job postings can provide a wealth of information. At a bare minimum, such postings will usually reveal the basic preferred IT qualifications sought from an applicant, providing valuable insight into the operating systems and software programs the organization uses. The job description might also provide insight concerning potential expansion of the organization, whether it be geographically or through a new product or service. With a job posting, an organization is inviting contact with someone from the outside. It provides social engineers an opportunity to electronically submit a cover letter or resume—either directly through human resources or to someone else within the organization chosen by the social engineer to forward the resume onward. The email, along with attachments, can be a medium to introduce malware into the target’s system. While less frequently exploited, such job postings can also create opportunities for social engineers to interview with the employer and elicit sensitive information. Employer review sites such as Glassdoor can provide useful workplace insights posted by employees. These reviews inform the social engineer about the pulse regarding the morale within the organization. Generally, it is much easier to manipulate a disgruntled employee than someone who is happy and loyal to his or her employer. SOCIAL MEDIA AND SEARCH ENGINES While an organization may aggressively use social media to help promote their products and services, an unintended consequence can be the leakage of exploitable information. Employees often upload photographs of themselves and coworkers in the workplace, revealing information about physical workspaces to include actual floor plans, office configurations, security system hardware, IT systems, employee badges, or employee dress. Much of this information can be extremely useful if planning an actual physical intrusion into the company. Creative Google searches will take the social

Scroll to Top