Author name: Robert Mann

Blog

(Updated)How Many Of Your Social Media Friends Have A Key To Your Home?

For those who enjoy posting on Social Media, ask yourself these questions: Have you posted information about where you live,  the names of your children and pets and where you work? Have you posted information about the party you are going to this weekend? What about when your getaway vacation starts or your plans with your children tomorrow? If you posted any of these examples, you need to be aware that you may have provided information that is extremely helpful to hundreds of potential burglars or worse yet, kidnappers. You might as well have posted where you hide that extra key to your home, your social security number and your bank account number on Facebook or Twitter. Try to imagine arriving home to find it in shambles, draws opened; nightstands ransacked, closets torn apart looking like a tornado struck and everything of value taken. You are shocked, terrified and wondering who did this. How did a burglar know when to break-in?  Suddenly panic hits “how can I ever replace everything stolen from me?” When the police arrive, they ask whom you might suspect. Could it be someone you know quite well or casually? Then they will inquire if you are active on Social Media. Assuming you are active; you will soon discover that your list of suspects catapulted into the hundreds. Social media enthusiasts love sharing their life experiences with family, friends and often with anyone who “Friend’s” them. By doing so, they invite virtual strangers into their lives in ways they cannot begin to imagine. Protect Your Personal Information & Property From Social Media Social media enthusiasts need to understand that the more information they provide about themselves on social media, the more likely they will become a target of stalkers, burglars, and kidnappers. Criminals use the information about you and your family to plan their break-in or worse yet, a kidnapping. You must take responsibility for your actions if you continue to expose yourself and your family by posting your whereabouts and plans for the future. You should enjoy your social media and interaction with your friends and family without revealing a timetable for future plans. It is a lot safer to post about the good time you had after the trip, or the event is over. Police are usually overwhelmed with investigations of home invasions and burglaries many of which are associated with social media, while others could be random acts or inside jobs. We are confident you do not want to be a burglary victim who is compelled to wait weeks or months for an overwhelmed police department to start investigating your case. No one is suggesting that you stop enjoying your social media. However, you need to be aware that you can become a victim of a crime because you revealed too much personal information on your social media. What to do if the police cannot help you? Should you experience a long delay for the police to get around to your case, you might want to contact a private investigator in your area to begin looking into your case. Social media enthusiasts, may not be aware of the consequences of posting updates on Twitter, Facebook and other social media sites about their every move, or their latest adventure. They might as well distribute keys to their home to hundreds of strangers if they continue posting status reports. Social media presents an abundance of opportunities to steal your identity as well as breaking into your home. Plans referencing going out of town open your door to a burglary or worse yet; you may leave your family vulnerable to assault or robbery. Have you ever considered that the videos you posted of your family on YouTube provided a tremendous insight and observation of your family and your home? You should take into consideration that any video you upload to the Internet will provide information to certain deranged individuals who might act out on fulfilling their sick fantasies or criminal intent. Having an adorable child of any age that some mentally disturbed individual thinks should be theirs is a reality to be aware of.  Even sharing the name of your pet, enables a perpetrator to friend your pet, kidnap your pet and even harm your pet. So why offer the world the name of your pet? Think about that!

confirming infidelity
Blog

Confirming Infidelity: Are You Delusional or is Your Partner Cheating on You?

You have an uncomfortable feeling that your life’s partner is unfaithful to you and that they are cheating. You made up your mind to confront your partner and asked if they are unfaithful.   IS YOUR PARTNER A CHEATER? Learn how to confirm infidelity in your relationship Your partner replied, “are you delusional?” You expected a denial but not such a harsh response. That answer moves you closer to contemplating severing the relationship knowing it will break your heart not to mention how afraid you are of being alone again. Every fiber in your body is telling you that you cannot remain in a relationship when there is no longer trust. You question, which is worse, having no trust or being alone?   It is time for you to learn whether your intuition is correct and if your partner is not the person you thought they were or is their alternative attitude attributable to something else that is disturbing them. Confirm infidelity within your relationship now so that you can gain peace of mind. HERE IS A LIST OF THE INFIDELITY SERVICES WE PROVIDE Infidelity Investigations Cheating Spouse Investigations Surveillance Investigations Civil and Criminal Investigations Locate Investigations Executive Background Investigations Employee Misconduct Workers’ Compensation Fraud You owe it to yourself not to bury your head in the sand pretending you are in a perfect relationship. The emotional turmoil you are experiencing is affecting your relationship with your children, your health, your career and your appetite. You can no longer enjoy your downtime because the thought of the person you love cheating on you has taken over your life and that has to come to an end. Let us help you confirm infidelity so that you can get back to what matters. CONFIRMING INFIDELITY: HERE IS HOW TO GET THE TRUTH You may have watched a TV show about catching cheaters and seeing the jilted partner go ballistic after finding their lover with someone else. In real life, there is no need for hysterics. Your safest option is to retain the services of a highly regarded private investigator who has excellent references and testimonials from their clients. It is also advisable to check if they have a Better Business Bureau rating. Upon making your selection of a good infidelity private investigator, you should compare their fees and experience. Almost all investigators charge an hourly fee plus mileage. Be wary of any investigator who quotes a flat fee because they may not devote all the surveillance hours that are necessary. The infidelity private detective you select should present you with a written retainer agreement that describes the services you requested, naming your partner, the surveillance dates and the hours dedicated to the surveillance. A qualified infidelity private investigator should ask you for: A recent photo of your partner The make, model, color and license plate of your partner’s car The address where your partner lives (if not with you) The name and address where your partner work’s The hours he/she works, start time and end time Whether your partner follows a regimental routine such as going to a gym or on a run The name of any person he/she may be involved with The address of the individual, your partner, might be seeing The hours your partner leaves and usually returns home Ask the private investigator if they have a covert camera for videotaping activities inside of a restaurant, hotel, nightclub or bar. The investigator should voluntarily tell you that they will take “integrity video” every hour on the hour to establish their location as evidence to the fact that they are indeed working the hours you retained them for and the video will show their location which should correspond with their written report. Without integrity video, you will not know if the investigator put in the hours you paid for.   HOW INFIDELITY SURVEILLANCE WORKS Only a very experienced private investigator should be selected to conduct infidelity surveillance on your behalf because knowing how to conduct an infidelity surveillance takes years of on the job experience. Surveillance should only start very early in the morning while your partner is still at home and has not yet departed their residence. The investigator will take up a strategic surveillance position near your partner’s home long before your partner leaves. The video will commence upon your partner’s departure from home. Video will be filmed of everything your partner did and of everyone your partner met throughout the day and evening. USEFUL TIPS TO IMPROVE YOUR SURVEILLANCE OUTCOME Be forthright with your investigator, do not be afraid to tell them how and why you came to suspect they are being unfaithful. Your investigator should assure you and also memorialize it in writing, that everything you say to them will be kept confidential. Share any information you may have in your possession such as unfamiliar telephone numbers found in your partner’s devices along with any suspicious emails, text messages and provocative photos. Check if your partner is using Snapchat, Instagram or Twitter to communicate with persons unknown to you. Any information in those areas could be very valuable to help your investigator familiarize themselves with people your partner might be meeting. It is important to tell your investigator where your partner usually goes to on the day’s they will be followed, such as a doctor’s appointment, a gym, a park a movie and etcetera. In summary, almost all persons subjected to infidelity will state “that not knowing is worse than knowing.”

Blog

Locate Someone With the Help of a Private Investigator

PEOPLE NEEDING PEOPLE As an international private investigation firm, we often receive requests from clients to conduct a locate investigation to find an ex-girlfriend, boyfriend, ex-spouse or relative who they allegedly lost contact with.  We are in the business of finding people for those who are reaching out to find that special someone. However, we make sure their intentions are legitimate, and they are not using us to find someone they want to cause harm to. It is a tremendous responsibility to reveal a person’s location without first making sure they want to be found. ETHICAL & MORAL RESPONSIBILITIES  We have a professional and moral obligation as licensed private investigators to make certain that anyone asking us to locate someone has a valid reason or evidence to substantiate their purpose in wanting to find that person. Aside from legal issues such as locating a witness for an attorney, it is our policy to be upfront with anyone wanting to locate someone from their past that we upon finding that person, will ask their permission to release their contact information. If the subject of the locate assignment grants us authorization to release their contact information fine. Conversely, if the subject does not under any circumstance want us to release their location we will not. There are several ways in which to confirm whether a person has a legitimate reason to find someone. Some folks can provide evidence that they are either a relative or they can give us a notarized court document that clearly states a legal reason for them to find that person. UNETHICAL OR ILLEGAL MOTIVES Often, individuals who are owed money call us to locate a debtor and claim they have a court judgment. That caller must provide us with proof of their court judgment, or we will refuse to conduct their investigation. For requests other than a court judgment or any other legal and binding reason we exercise extreme caution by advising the client in advance that if the subject they asked us to find does not want their contact information released, we will not release their information. STALKERS- OBSESSED FANS- DERANGED INDIVIDUALS  It is scary how many times we receive requests from so-called prospective clients that have no court documentation or legitimate reason to locate someone other than a wrong idea. Those people refuse to accept our terms. You need not wonder why as it’s quite evident. In almost all instances, that prospective client had an ulterior motive for wanting to locate someone that very well may lead to a criminal act as occurred in the past with Amy Boyer in 1989  murdered by an obsessed stalker who shot himself after firing fifteen hollow point bullets into Amy’s head. Or the man who obsessed over actress Rebecca Shaeffer and killed her as she answered her front door in West Hollywood, California. That killer is in prison for life. Both of those murderers obtained their contact information from online public databases. Today, most online public databases are outdated or inaccurate.

Blog

Miley Cyrus Home Burglary

Miley Cyrus’ year recently went from bad to worse, with reports of a recent burglary pop sensation’s home. It was reported that two intruders, a man and a woman, broke into the singer’s home and stole purses, jewelry and her 2014 Maseratti Quattroporte. The burglary took place at 4:00 p.m on a Friday and police found no evidence of forced entry. The couple managed to scale a wall that surrounded the singer’s property and entered her home via the singer’s garage. 

Cyrus was not present at her home at the time, as she was conducting the European leg of her Bangerz tour. Reports from TMZ suggest that one of Cyrus’ employees returned to her home and noticed that a number of valuables were out of place. The employee immediately notified the Los Angeles Police Department. Her last break in was in 2013. It appears Miley needs a professional security audit.

Blog

(updated) Your Awareness Could Prevent A Terrorist Attack

Prior to 911 (September 11 attacks), we would not have paid attention to a suitcase left unattended at the entrance or inside an airport terminal. Today that suitcase should be an immediate safety concern to everyone at that airport. It takes only a moment to dial 911 and report the presence of an unattended suitcase. True, the suitcase could have been accidentally left behind or perhaps it could be a bomb waiting to be detonated. Each and every one of us must try to remember to be hyper-aware and diligent of any unusual observation or occurrence. Our minds as unfortunate as it sounds, must now intellectually accept that we are at war with an enemy that has absolutely no regard for human life be is an infant, a mother, father, sister, brother or even an elderly person in a wheelchair. None of us ever dreamed we would be living our lives fearful of being in or around a train, a bus, an airplane or even visiting a tourist attraction overseas or in the USA.  Each and every one of us literally have a responsibility to be more diligent and aware of anything or anyone that appears to be out of place or who is acting weird or abnormal. We can no longer presume we will not become a victim of a terrorist attack. None of the victims in Paris, Turkey, Belgium or San Bernardino thought they would be killed or torn apart by bullets or bombs. Could any of those victims being aware of a potential attack, most likely not but all of us need to be much more aware of our surroundings? A perfect example of due diligence and awareness was the Belgium taxi cab driver who went to the police immediately after the bombing at the airport to report the bizarre conversation he overheard in his taxi cab while driving the three bombers to the airport. Most of the world’s population are a culture of kind considerate and accepting  people most of whom prefer to keep their opinions to themselves and many follow the adages “if you can’t say something nice about someone, say nothing at all.” Today we can no longer think something odd is none of our business because anything that appears to be out of place, threatening or peculiar could very well be very harmful and should not be ignored. All of us have a responsibility to report someone or something that appears odd and out of place to law enforcement. If you notice that someone’s disposition is off the charts, report that person to law enforcement. We are not suggesting that you become a lay psychologist and begin reporting every person who looks or acts oddly in your opinion but rather reports anything that you instinctively feel is very strange or out of place. Worldwide Intelligence Network(WIN) can be contacted for any such civil, criminal investigations all over the world. Our Agents are highly active for private investigations in New York and Los Angeles. We can be contacted at (310) 385- 8200 or email to win@wincor.com.      

Blog

Kylie Jenner’s Bodyguards Get’s a Bad Rap

“Kylie Jenner’s Bodyguards got too pushy and shoved fellow VIP Jessica Alba at the packed Opening Ceremony fashion show. Jenner and her boyfriend, Tyga, were there Sunday night, along with guests including Miguel, Tinashe, Laverne Cox, Natasha Lyonne, Spike Jonze, Alexa  Chung, Kelly Osbourne and Rose McGowan. But after the inventive show wowed the crowd with models from the New York City Ballet and choreography by Justin Peck, spies said Kylie’s Bodyguards were anything but graceful. After the show as guests were trying to leave the venue, “it was very crowded,” said a source. “Everyone was in the crush and Jessica had stopped briefly to say hi to someone when all of a sudden from behind came Jenner’s Bodyguards. They just shoved Jessica out of the way. She just looked astonished!” This is what happens when a non-professional, unskilled Bodyguard is assigned to protect their charge. Kylie Jenner’s Bodyguards were unprofessional indeed. Her Bodyguards appeared to performed rather like bullies by pushing a female aside. A Celebrity’s agent or manager should have personally vetted those Bodyguards because they would have most likely learned that their backgrounds were likely to reveal that they worked as bar bouncers rather than trained skilled Bodyguards . There are clear and precise vetting procedures Worldwide Intelligence Network follows when we assign a Celebrity Bodyguard also known as a Personal Protection Specialist.  One of the first questions we ask a candidate is “have you ever been in a physical altercation while on a protection detail.” If the answer is yes, we ask the candidate to explain and if it sounds to us that the altercation could have been avoided if a calm, polite yet assertive communication was initiated by the Bodyguard, the candidate is not hired. A true professional Bodyguard is observant, polite and trained to move within a crowd with grace, perseverance and dignity. Pushing anyone aside is absolutely unacceptable unless someone was charging at the client.  

Blog

Surveillance Is Not Easy

To appreciate how difficult it is to conduct surveillance try this easy test? Drive to a nearby market. Park your car and follow anyone you chose who drives out of the lot. Chances are you may not make it three blocks before you lose that person. Surveillance is an art and it takes years of practice and experience to become a qualified surveillance investigator. All too often we hear from some clients who suspect their significant other is cheating that they decided to follow them. Within minutes they were either discovered or they lost sight of the car within thirty minutes. Surveillance is a dangerous occupation because it causes one to focus on the vehicle being followed while driving in and out of traffic lanes and also trying to take video. Inadvertently you might drive through a stop sign or red light and wind up receiving a very expensive traffic ticket. Our advice is never attempt to conduct surveillance on your own and don’t ask a friend or relative to do it for you. Your best course of action is to retain the services of a licensed and professional private investigator at Worldwide Intelligence Network who has years of experience and who uses state of the art video equipment.    

Using Cell Phones to Reveal Cheaters
Blog

Infidelity Surveillance Using Cell Phones to Reveal Cheaters

Infidelity – Cheater Surveillance – Using Cell Phones to Reveal Cheaters Did you know that it is now possible to track the exact location of your spouse or significant other anywhere in the world via your cell phone? An infidelity private investigator can help! The Story We recently were assigned to assist a private investigator who flew in to Los Angeles from Mexico City to conduct an infidelity surveillance on the wife of his very wealthy entrepreneurial client in Mexico City. The wife and her husband had an argument and she decided to fly to the US to get away from her husband. No matter where his wife was in Los Angeles the private investigator was able to track her movements and her exact location on his cell phone. There are times while conducting a moving surveillance a subject is lost due to severe traffic conditions. But the Mexican investigator was not at all concerned if he lost her in traffic. He simply clicked on his cell phone to acquire the wife’s exact location. To visualize this software, it’s very much like an address appears on Google Maps. This software cannot be loaded remotely as the user must have the cell phone they want programed in hand.  As it turned out the wife was simply meeting with old friends and she was being very loyal to her husband.   We have been conducting infidelity surveillance for over 22 years with great success because we have the finest surveillance investigators in Los Angeles, New York and around the world. View some of the most common signs of a cheater  that we have experienced over the years.

Blog

(Updated)Your Teenager and ISIS a Tragedy

Who would have imagined parents finding themselves concerned about their child running away from home, from their family and friends to join a terrorist group such as ISIS?  Unfortunately, this issue has become a reality for parents who must now take notice and become extremely vigilant as to their teenager’s Internet activities. Granted, parents have more than their fair share of stress dealing with all of the life’s issues. Try to imagine how you would feel to open your front door and be greeted by the FBI telling you that your teenager has been communicating with ISIS recruiters and was apprehended at the airport about to board a plane for Turkey with a detailed map of entry points into Syria. We imagine that would be a staggering and incomprehensible moment for you. There are ways to prevent this from happening such as acquiring Software programs that can monitor your teenager’s Internet activity. We appreciate that no parent wants to spy on their child and we respectfully recommend you be completely upfront with your teenager and explain it is your responsibility as their parent to monitor their Internet activity to make sure they are not corresponding with an ISIS recruiter. There is a fairly good chance your teenager may be offended, so be it. Better to be offended than beheaded, raped or killed. ISIS’s recruiting efforts are incredibly sophisticated and appealing to teenagers. Should your teenager become outraged, rebellious and/or incorrigible by what you tell them to show them the videos of ISIS beheadings and ask them to read articles about ISIS? Here is an excerpt from one article; “Mass executions, beheadings, crucifixions, burying them alive, selling them as sex slaves, using them as suicide bombers and shields, and sexually abusing them are some of the heinous crimes being committed against innocent children by the Islamic State militants.” No one ever said teenagers are easy to communicate with. But it is more productive to approach your teenager in a calm, assertive and sincere manner than appearing hysterical, controlling or demanding. The correct approach should encourage your teenager to listen to you about ISIS and ISIS’s psychological recruiting methods which have been very successful in manipulating teenagers in America and Western Europe to join them. ISIS offers teenagers a horrific existence of terror in Syria and Iraq. ISIS promises their recruits they will to convert them to the Muslim religion except for their interpretation of the Muslim religion is nothing less than a  fanatical interpretation of the Muslim religion. Please do not wait to discover evidence of your teenager’s communications with ISIS before raising the issue with your teenager. Begin now to research Internet Software Monitoring Programs for Mac and Windows PC’s.  Some programs are offered free of charge. We do not sell those programs and therefore we do not list the names of the companies who sell or offer them for free. According to the FBI, over one hundred teenagers left the United States to join ISIS and those were the ones the FBI knew about. Can you imagine how many the FBI doesn’t know about? The United Kingdom has their hands full with their teenagers leaving home to join ISIS.  You might want to seek assistance from your child’s high school counselor or even try to arrange a school seminar or meeting with the teenagers at your child’s high school. We hope you consider this a genuine effort by us to protect the child you love. All the best, the staff at Worldwide Intelligence Network.

Blog

Corporate Security Services

Statistics show that inadequate and inefficient corporate security measures cost American companies billions of dollars every year, and security breaches have been detected in approximately 85% of companies and government agencies (a number that accounts for only those that have been reported). Failure to protect against threats and resolve crises negatively impacts a company’s performance and can even shorten its lifespan. Worldwide Intelligence Network has been rated as being in the Top Five of the Best Corporate Investigation Companies in America by Conde Nast Publications. An effective corporate security program protects a company from internal and external threats affecting its ability to function as a business entity, primarily by becoming an integral part of your company culture. Worldwide Intelligence Network does this by identifying, anticipating, preventing and resolving threats efficiently, without interrupting the daily activities of the company or negatively impacting its bottom line. Our elite team consists of former intelligence, military, and law enforcement officers who have extensive experience in providing corporate security in the public and private realm. Some are IT Cyber Specialists, security network designers, and software engineers. The Worldwide Intelligence Network Advantage 1. We do not offer a cookie-cutter approach to corporate security because every company is unique. For this reason, a comprehensive assessment is initially performed to devise a security program that is the most effective and efficient, as indicated by specifics regarding location, size, employees, objectives and other key factors. In providing corporate security to privately owned and multinational corporations around the world for over 23 years, we have also found that any program should be scalable so that it adapts easily and fluidly to growth and expansion. It will not hold your company back. Rather, it will do the opposite and foster advancement because your operations will be secure and protected, thereby reducing losses caused by threats and crises. Corporate Security To Protect Your Livelihood Corporate security vulnerability comes in all shapes and sizes. There are cybersecurity breaches, physical security breaches, corporate espionage, and counterfeiting. All target fortune 500 companies every hour of every day in America, causing CEO’s, CFO’s and COO’s many sleepless nights. An online search will provide you with approximate quotes of how many billions of dollars are lost due to a lack of professional security oversight. Readers might be enlightened as to the magnitude of those losses, however, you are probably not interested in that. Rather, you want to know how to prevent the security of your company from being severely compromised, so that your stockholders won’t become alarmed and commence an exodus to abandon ship. The more profitable your company is, the more prone it is to being compromised. There are many alleged experts in the various fields of countering corporate security breaches, but while they might be doing well in their one area of expertise, there could be another attack being readied and working its way into your company undetected. Are all these security breaches manageable at the same time? Of course, they are providing your company understands that they are vulnerable to an assortment of security breaches and/or cyber attacks. The key to preventing these various security breaches is to have a small but select team of highly qualified experts in all the various security protocols of which your company could become a victim. It is a daunting task to locate one person or company who has the experience to assemble a cohesive team of experts to verify that the security protocols you have in place are adequate, and make recommendations on additional protocols. Worldwide Intelligence Network is the company with the experience and know-how to organize that team of experts. When security is a concern, companies are expected to deal with these situations professionally, responsibly, decisively and swiftly, no matter what security controls they were able to afford or implement beforehand. Being the victim of a security breach has, rightfully or not, the latent stench of incompetence to it, so any attempt to limit the damage to the organization’s brand will be an uphill battle from the start. The effectiveness of the incident response plan is dependent on how well it is aligned with the corporate reality and the skill level of the personnel expected to carry it out. Blindly applying an incident response template that does not fit the environment could in the worst case cause confusion and hamper response processes. To ensure your plan will work as expected when you actually need it the organization should schedule regular test runs. Worldwide Intelligence Network is prepared to assist your company in supervising the selection process of professionals for your corporate officers to meet with and to hear their recommendations on how your company can counter any number of security breaches. Worldwide Intelligence Network has a global network with the resources to assemble the caliber of experts required to perform this service.

Scroll to Top