Author name: Robert Mann

stalker protection
Case Study

Case Study: Lindsay Protects Herself From a Stalker

How Lindsay protects herself from a stalker. We received a call from Janet (not her real name) about her daughter, Lindsay (not her real name). Lindsay was a young adult who had been receiving very graphic, violent and disturbing text messages and emails from an anonymous person. Lindsay lived with her significant other (a female). They were both terrified by the verbiage in the texts and emails. Feeling extremely threatened and in fear for their lives, they both eventually resigned from their soccer team and never returned to the practice field. The reason they discontinued playing on the team was because they believed that the messages were being sent from one of their teammates. It was unfortunate, because soccer was the one thing they enjoyed doing. Our take on this private investigation was that the clues were simply too obvious and we thought we should look elsewhere other than at the teammates. Commencing our stalking investigation, we learned that the text messages and emails on Lindsay’s cell phone would suspiciously disappear, even though she did not delete them. This was a clue that it had to be someone very close to Lindsay, since they would have access to her phone to delete the messages. The one person who would have constant access to the victim’s phone was her significant other. With her permission, we interviewed Lindsay’s significant other. During the interview, she revealed certain aspects of her life, including a Court Ordered Restraining Order and a host of other women she lived with prior to the victim. After conducting a Superior Court record search and background check, we found the Court Ordered Restraining Order and set out to find the person who filed it. We found her, and after interviewing that person, we began to see a frightening parallel between the actions of the significant other and Lindsay. The actions of the significant other were identical to those both victims. All of our evidence lead us to the significant other as the perpetrator, who was clearly mentally disturbed. When given all the evidence we gathered, Lindsay packed up all of her belongings and immediately severed ties to her significant other. This was a case that was very difficult to handle because the victim was in love with her significant other, who was also her stalker. Lindsay had a very difficult time trying to understand how a person who professed to loving her could be so hateful and vicious. This is far from a typical stalker investigation but it is one that should be told for the benefit of others. Stop your stalker and free yourself from the fear.

man taking wedding ring off finger
Case Study

Case Study: Elizabeth’s Experience With A Cheating Husband

Elizabeth‘s experience with a cheating husband story goes like this. We recently conducted an infidelity investigation for Elizabeth (not her real name). Elizabeth told us that her husband was very cruel and verbally abusive, constantly telling her that she was old and ugly. Her husband eventually moved out of the family home and left her and his three children. Elizabeth was devastated when she met us.  She asked us to help her identify who the other woman was. The doorman at her husband’s apartment building gave her a license plate number of the alleged other woman’s car. We ran a check on the license plate to identify the other woman and showed Elizabeth a photo of her. A few weeks later Elizabeth called to say that she gave us an incorrect license plate number and now she had another license plate number from the same doorman on a second woman’s car. Elizabeth asked us to check out the registered owner of the car and to find out her identity. When we met with Elizabeth this second time to present her with the identity of the second woman she looked like an entirely new woman. She had gotten a facelift and she looked fantastic, all because she finally learned the truth about her cheating husband! She met with a wonderful matrimonial therapist to help her through her ordeal. The good news is that Elizabeth was able to move on and realize that she deserved so much better. And the happy ending—Elizabeth just met a new man who is crazy about her! The message here is that you don’t have to live your life at the mercy of someone else.

binoculars
Case Study

Case Study: Finding Peter

We recently received a call from the father of a teenage son, Peter (not his real name). Peter hadn’t been heard from in over 48 hours, and his father was anxious so he called us to help find him. Peter was 18 years old and lived alone in Santa Monica, California. He had no relatives, girlfriend or friends the father could call upon to find his whereabouts. The young man’s father told us that he had tried calling Peter’s cell phone but it constantly went to voicemail. He was missing. Within 48 hours, we found Peter through the use of our exclusive proprietary and sophisticated technology. Peter was located just on the outskirts of San Diego, California, almost a two and a half hours drive from Santa Monica. San Diego is very close to the Mexican border and we were concerned that if he went into Mexico he might be kidnapped. There was no way our investigators could make it to San Diego by plane or car in time to secure his location and start surveillance. We reached out to our associates in San Diego and explained the situation. We asked them to assign someone they trusted to commence an immediate surveillance of Peter. One of their private investigators was sent on site within the hour and as we drove to San Diego, we were in constant contact with the private investigator. He maintained the surveillance for us until one of our investigators arrived. By the time we pulled into the parking lot of the motel where Peter was staying, he had just pulled into a space in front of one the guest rooms. The only way to handle this situation smoothly was to simply walk up to Peter and identify ourselves. Since he was over eighteen years old, he was considered an adult so we could not force him to come with us. He had to want us to help him and he had to want to return home to his parents. We explained to Peter that we were retained to find him by his father and that we were not going to force him to go back to him. We further explained that he had the option to speak with us or not. Peter was clearly shocked that we had found him. He was very depressed and lonely. We consoled him and explained to him how frightened his family was and how much they loved him and wanted to speak with him. He agreed to speak only with his sister at first, and then later on with his mother and father. While we maintained a twenty-four hour surveillance of him outside of his room, his mother flew out from Ft. Lee, Florida, the following day. When we asked Peter what he would like to do while we waited for his mother to arrive, he replied that he had planned on going to the San Diego Zoo. We accompanied him there and he had a wonderful time. We established a rapport with Peter and in time, he revealed the reason why he had chosen to disappear. He had dropped out of college due to unsatisfactory grades and had not told his parents, who were supporting him thinking he was still enrolled in college. Peter felt guilty and unworthy, but he certainly was not. He was a fine young man who really needed then to be with his family back home. He departed San Diego with his mother in a far happier state than when we had located him. You can reunite with your missing family member.

celebrity protection
Case Study

Case Study: Protecting the Safety of a Female Celebrity

A day protecting the safety of a female celebrity. Oh how glamorous it appears, watching all the beautiful people parading down the red carpet, dressed to the nines. They all look deliriously happy to be on the red carpet because that is a symbol of artistic success. However, what might have transpired prior to their arrival might paint an entirely different picture as to how they really feel. Celebrities, in spite of their outward appearance, have more than their share of anxiety about the safety of themselves and their family. Such was one case we handled for a hugely successful, underage actress in this case study of female celebrity protection. Worldwide Intelligence Network Call To Action We received a call from the actress’s lawyer who told us that she had received several heinous letters mailed to her home address. There was also a blog on the internet that had her face pasted on nude bodies. We were tasked with identifying the person who mailed the letters and the creator of the blog. Celebrity Protection Step 1: Removing The Celebrity’s Home Address From Easy Public View Our first objective was to learn how the perpetrator obtained the residence address of the actress. Our investigation revealed that her address was available on several online public databases (along with the addresses of her parents and her nanny/personal assistant’s), including all three major credit bureaus. Although the actress was a minor and was not legally able to obtain credit, further investigation revealed that many notable retail establishments allowed her to open charge accounts in her name despite this. Since the law was clearly on our side, we contacted all three bureaus and explained the situation. They immediately removed her from their databases. Following that, we asked the parents and assistant to change their mailing address and the actress’s to either her business manager’s office or a PO Box. Everyone complied, effectively replacing their home addresses with their new mailing addresses. Step 2: Identifying The Anonymous Blogger Besides the nude photos, the blogger had also written that he planned on kidnapping the actress when she turned eighteen years old and taking her to his mountain cabin to rape her repeatedly. After our IT Cyber Specialists traced the IP address of the blogger, we found out his personal information and contacted him. He was given an option; either remove the blog and never post another thing about the actress again, or have criminal charges filed against him and be sued for multiple civil causes. The blog was taken down and it never resurfaced. Step 3: Identifying the Letter Writer Identifying the letter writer proved to be a more difficult task. It was not possible to trace him. We tried to extract fingerprints off the envelope and letter but the perpetrator most likely used gloves and he was never located. We had to accelerate our efforts to protect the actress, her parents and the nanny/assistant. The contents of the letters clearly indicated that the perpetrator had been by the house and had observed certain events taking place at the house. Assessing The Risk Our team conducted a risk assessment of the family home, the actress’s school and the residence of the nanny/assistant. With the consent of her parents, we had a highly secure but very attractive security fence installed around their home. Motion detection lights and a state of the art closed circuit television system were installed. The CCTV system was viewable by the family on their televisions, their computers and by us remotely. A new and improved security alarm system replaced their old one. Personal Protection Specialists were assigned to provide residential and personal security around the clock. A Personal Protection Specialist was assigned to the actress wherever she went. Having just received a new car for turning sixteen, our technicians designed a special device that went under the driver’s seat to alert her Bodyguards if an unauthorized person was attempting to get into her car. The actress asked that her Bodyguard not ride in her car, so we surveiled her instead in what is commonly known as a chase car. After all she was a young lady who had a right to her privacy and we respected her request. Just prior to our involvement, we learned that the nanny/assistant was the victim of an attempted home invasion robbery. Fortunately, she was able to keep the perpetrator out of her apartment and he subsequently ran away. Learning this, we immediately had a state of the art alarm system installed in her apartment. The Best Result Is No Negative Incident The moment we initiated the security, not a single incident occurred to place her or her family and her assistant in harm’s way no matter where she went, including multiple film locations in Rome, Mexico and Australia. Protect yourself and your family from overzealous fans and stalkers.

close up of dictionary definition of evidence
Case Study

Case Study: The “Injured Foot”

Insurance companies retain private investigators to conduct surveillance investigations when they suspect a claimant might have filed a fraudulent claim. This is considered worker’s compensation fraud. Worldwide Intelligence Network was assigned a case to surveil a claimant who alleged a severe injury to his foot that made him incapable of work. Having had an accepted claim, he had been off from work for over a year. When we started the investigation for the insurance examiner, he was still off from work. The insurance examiner suspected fraud due to a report issued by an independent medical doctor. The report stated that nothing wrong could be found with the claimant’s foot. It appeared that this claimant was cautioned by his attorney that he might be placed under surveillance and to be careful when he was out in public. While we surveiled the claimant exiting his home, he was videotaped limping—but on the wrong foot! And then, just before he walked into his chiropractor’s clinic, video was taken of him putting on a foot brace and taking out a pair of crutches from the trunk of his car. When he exited the clinic, he took off the brace, put his crutches in the trunk of his car, then drove over to a soccer field where he participated in a soccer game. Fortunately, all of this was videotaped, including the entire soccer game! However, the claimant’s attorney asserted that his client took pain killers that day in order to participate in the soccer game. So, we simply continued our surveillance. Once again, the claimant was caught running, this time from a grocery store during a snow storm while pushing a shopping cart. The claimant ceased receiving payments from the insurance company when a copy of the videotape was shown to his attorney. The attorney resigned from representing the claimant.

infidelity surveillance
Case Study

Infidelity Surveillance: A Case Study

Sometimes a cheating spouse case improves a marriage and here is a case study of infidelity surveillance that saved a marriage. Her husband was caught cheating by our surveillance team and if you expect to hear what a disaster their marriage turned out to be hold on tight because you may not believe how this case study worked out. A very calm and intelligent sounding woman called our office to ask about our infidelity surveillance services. She explained that she had recently seen her husband’s American Express bill listing charges from all of the cities he traveled to for business, including Los Angeles, but in reviewing his American Express bill she noticed that her husband had not rented a car when he was in Los Angeles. That discovery was a red flag that caught her attention, since her husband always rented a car whenever he traveled to another city. She wondered how he got around in the sprawling metropolis of Los Angeles. She knew he was not the kind of person who took limousines, taxis or Uber. She found herself speculating that someone had picked up her husband, but who was it? Her husband told his wife he was going to Los Angeles to meet with prospective clients and would be running from one meeting to another for a couple of days. Upon his return home from Los Angeles, prior to the American Express bill arriving, he told his wife he had arranged another set of meetings in Los Angeles two weeks from the day he returned home to Boston. Another Red Flag emerged as that was unusual behavior for her husband. How Infidelity Surveillance Begins The wife, now our client, asked us to commence surveillance upon her husband’s arrival at the Beverly Hills Hotel in Los Angeles. She told us that her husband booked a bungalow at the hotel, which many people referred to as a small villa. We explained to the client that to cover her husband’s bungalow with a clear view of his activities we would require she reserve a bungalow for our surveillance team and we would make certain that our bungalow was near his. We have maintained an excellent relationship with the management staff at the Beverly Hills Hotel over the years and it was not a problem for us to ask for and be provided with our preferred bungalow. Our assignment covered several days, and during our surveillance we immediately observed her husband with another woman who stayed with him overnight and into the following days. We captured video of the woman with him and as promised to our client we called her with updates and to what we observed. Normally we would not engage in updating a client while surveillance was ongoing but we felt comfortable after having numerous conversations with this client that she was in total control of her emotions throughout our surveillance period and our level of confidence was high enough to trust her not to reveal to her husband what she was doing. We were correct. She never violated our agreement and on the last day of surveillance and after unequivocal confirmation of her husband’s infidelity, she confided in us that she had been to see every renowned family law attorney in Boston to discuss her pending divorce. By meeting with those attorneys her husband would not be able to retain any of them because she had already created an attorney-client relationship with each attorney she met with. I, as the director in charge of this particular assignment, found this client’s behavior psychologically sound and intelligent. She absolutely earned my respect. When a husband, wife or significant other eventually hear from us that their life partner has cheated on them, they usually go ballistic, crying, screaming or hanging up the phone on us being unable to cope. Not this client. She was composed throughout while listening to all of the disturbing details we revealed to her. On or about the time when the information was revealed I was with our lead female investigator and director of Infidelity Surveillance, Desi Riley. We were just about to leave the Beverly Hills Hotel. Something told me that Desi should get on the phone with this client and offer her some emotional support because at this moment in time no matter how composed the client appeared what we disclosed to her had to be devastating. I thought it would be the ideal time to introduce Desi to the client and I asked the client if she would like to speak with our female investigator. Desi handles nearly all our infidelity cases but was assigned elsewhere when this case first came in. Desi is extremely bright and very sensitive to the emotional turmoil a client can go through when they hear what they really don’t want to hear, whether male or female. The client agreed to talk with Desi and they seemed to hit it off immediately. Their conversation went on for quite some time that evening and then continued over several weeks. Desi and the client talked about whether the client wanted to or could stay married to her husband which she admitted she truly loved. They also talked about what happens down the road should the client seek to divorce her husband or if she wanted to try and make her marriage of 25 years continue with assurances from her husband that he would promise to maintain a magnanimous relationship. A Happy Ending Well, it’s been nearly eight years since that surveillance. The client and her husband are still together and their marriage is flourishing! The client and Desi are very best friends to this day and the client is admittedly indebted to Desi for without Desi’s friendship and encouragement to try and make her friend’s marriage work, this might have turned out to be just another infidelity-cheater story.

lana del rey
Blog

Where Were Lana Del Rey’s Bodyguards?

Lana Del Rey is a singer / songwriter who is set to release her new album, Ultraviolence, later this year. But there is trouble brewing for the songstress. This is what happens when professional Personal Protection Specialists and celebrity bodyguards are not retained to manage the paparazzi at a film shoot. Del Rey’s production company is currently being sued for $1million after a video shoot for her song, Tropico, turned ugly. Karl Larsen, a photographer who works for Rolling Stone magazine, claims that he was attacked by 3 members of Del Rey’s entourage who wanted him to stop taking pictures of the songstress after stumbling upon the shoot on the L.A. River last summer. The 3 members, production staff members of Black Hand Cinema, threatened to destroy Larsen’s camera, then after taking the camera from his hand, removed its memory card. In the lawsuit, Larsen claims that one of them also slashed his finger with a box cutter, which left him requiring stitches. A simple courteous dialogue would have prevented this from happening! The key to defusing a volatile situation is to remain calm and courteous. While we weren’t there to know what actually happened, we have encountered many of these types of situations before and have successfully prevented them from becoming detrimental.

online dating tips scams
Blog

You’re In Love With Someone You Met Online-Be Very Careful!!

We so often receive investigative requests from men and women who are involved in very personal relationships with someone they met online. They have come to point where they are uncomfortable and want us to investigate whether their lover is who they say they are and if they are married or committed to another relationship. Many of these people readily admit they are very much in love even though they have never met face to face with their online lover. Usually, these investigative requests occur when the online lover promises to fly out to meet them and then suddenly comes up with a last-minute excuse why they cannot leave their home country. Another reason we might be called to investigate their online lover is due to their online lover telling them that they are in very serious financial trouble. They will usually say their problem is due to a tax issue in their country or a medical emergency for which they have no money for. The most disheartening call we receive is when we’re told the funds were already wired and that their alleged lover has never been heard from again. Once retained by our client were asked to track down where their so-called lover actually lives and to confirm whether he or she is really the person in the photo they posted online. In almost all cases the photo was hijacked from someone else social media profile and we usually learn the perpetrator works in a boiler room operation where hundreds of potential victims are sent emails through online dating sites. These crooks troll night and day for men and women on dating sites, they have no conscience or concerns about their victims because they feed their families based upon a percentage of the money they steal from their victims. Their job is to study hundreds of profiles of registered users all over the world and then pick their targets. We have identified where most of these boiler room operations are located. They are usually in Nigeria, Russia, Ukraine, Serbia, and India. Those victims who wired funds will never recover their money and the person who scammed them will never be prosecuted. Foreign governments could care less as they have not the funds to deal with these scams. Worldwide Intelligence Network can confirm for you if your lover is a real person by conducting an advance background investigation on them anywhere in the world. Here are a couple of very helpful websites for you. Men, please check out this site: http://www.inter-mariage.com/en/scamlist.php Ladies and gentlemen, please look at this site from the FBI: http://www.fbi.gov/sandiego/press-releases/2013/looking-for-love-beware-of-online-dating-scams Not all online romances turn out bad. However, you should allow us to a background investigation prior to you committing to a relationship.

IRS issues a fresh consumer alert Beware of the suspicious calls
Blog

(Updated)Beware of Phony Creditor Calls Asking for Payment

There is a new and very ugly scam being perpetrated upon hundreds if not thousands of Americans across the country by low life’s seeking to steal hard earned money and savings from uninformed individuals who are randomly selected by the scammer thieves. These thieves will call and identify themselves as a creditor who is owed money. They will tell their victims that a police report has been filed for failure to pay their debt and a subpoena will be served upon them in a matter of minutes if they don’t issue payment within 24 hours. The calls will be consistent coming in at all hours of the night and day in the victim’s home and workplace. They will use very threatening language and attempt to intimidate the victim. The alleged creditor will instruct the victim to pay them via a prepaid debit card on by a money gram. The intensity of the scammer’s calls is unrelenting and extremely stressful and that is their strategy. Once they feel that their victim is terrified and that the victim hasn’t a clue about how credit and collections are actually governed by State and Federal laws they usually will prevail until the victim demands proof of the debt from the alleged creditor or constantly hangs up their phone the moment they hear the scammers voice. For those victims who receive calls at their work place and at home need to file a police report. Once the police report is filed, victims should call their cell phone provider to find out how they can block the scammers call and they should also call their landline provider for their home and work telephone numbers and explain what is happening and request a trap line be put in place to capture where the calls are coming from. In almost all instances the scammers use prepaid cell phones that are not traceable but occasionally they slip up and use a landline that can be traced. In order for the trap line to work, the victim will be required to keep a log each and every call they receive with the date and time by their landline provider such as AT&T. The victim will be asked to present their calls received log to the police and their phone provider. Also Read Case Study on ATM Robbery.

corporate security
Blog

(Updated)Corporate Security Breaches Come In All Shapes and Sizes

Worldwide Intelligence Network has not been asleep at the wheel while American companies have been infiltrated by Chinese and Eastern European hackers. Los Angeles and New York based, Worldwide Intelligence Network, has consistently maintained a strict discipline in countering security breaches being launched internationally to compromise the security of American Corporations. All too often Corporations become complacent with regard to evaluating and updating their networks and protocols to combat the possibility of security breaches designed to invade their company and that is exactly what the perpetrators look for. In almost all instances of a security breach there has been one Corporate Security Director with a vast knowledge of one particular area of security but unfortunately insufficient knowledge of all the other security breaches that could be perpetrated against his company. Worldwide Intelligence Network has consistently maintained a philosophy that when in battle it is best to know the “entire” arsenal of the enemy and in this instance they are; an adversarial competitor or a terrorist regime determined to undermine the security of your company and the United States. Robert Mann is the founder and Director of Worldwide Intelligence Network which is a global investigation, risk management, and personal protection company. Mr. Mann states “Security breaches have been detected in approximately 85% of companies and government agencies. According to the FBI, the pending caseload for economic espionage losses to the American economy totaled more than $13 billion. The number of arrests the FBI has made associated with economic espionage has doubled in the past few years, and convictions have risen eight-fold. As a result of inadequate corporate security, companies are losing billions of dollars every year. Robert Mann believes Worldwide Intelligence Network can help effectively diminish the enormity of those losses.” Preventing a breach of Corporate Security is comparable to looking at how many ways can a burglar break into a safe. To professionally evaluate the possibility of a security breach, Mann put together a cohesive team of experts in multiple disciplines of corporate security to analyze the vulnerabilities that could affect the security of a company. These experts are not in the business of selling security devices or protocols because in doing so would be biased. They merely report on vulnerabilities and if appropriate, they will introduce innovative security options that can prevent attacks on your company’s security. Worldwide Intelligence Network Corporate Security team is an elite group of Security Professionals comprised of former members of the FBI, Secret Service, CIA, DOJ and many other Law Enforcement Agencies. Robert Mann has appeared in the media as an expert in investigations and security and has been featured on national television, radio, and magazines.

Scroll to Top