Blog

terrorist
Blog

(updated) Your Awareness Could Prevent A Terrorist Attack

Prior to 911 (September 11 attacks), we would not have paid attention to a suitcase left unattended at the entrance or inside an airport terminal. Today that suitcase should be an immediate safety concern to everyone at that airport. It takes only a moment to dial 911 and report the presence of an unattended suitcase. True, the suitcase could have been accidentally left behind or perhaps it could be a bomb waiting to be detonated. Each and every one of us must try to remember to be hyper-aware and diligent of any unusual observation or occurrence. Our minds as unfortunate as it sounds, must now intellectually accept that we are at war with an enemy that has absolutely no regard for human life be is an infant, a mother, father, sister, brother or even an elderly person in a wheelchair. None of us ever dreamed we would be living our lives fearful of being in or around a train, a bus, an airplane or even visiting a tourist attraction overseas or in the USA.  Each and every one of us literally have a responsibility to be more diligent and aware of anything or anyone that appears to be out of place or who is acting weird or abnormal. We can no longer presume we will not become a victim of a terrorist attack. None of the victims in Paris, Turkey, Belgium or San Bernardino thought they would be killed or torn apart by bullets or bombs. Could any of those victims being aware of a potential attack, most likely not but all of us need to be much more aware of our surroundings? A perfect example of due diligence and awareness was the Belgium taxi cab driver who went to the police immediately after the bombing at the airport to report the bizarre conversation he overheard in his taxi cab while driving the three bombers to the airport. Most of the world’s population are a culture of kind considerate and accepting  people most of whom prefer to keep their opinions to themselves and many follow the adages “if you can’t say something nice about someone, say nothing at all.” Today we can no longer think something odd is none of our business because anything that appears to be out of place, threatening or peculiar could very well be very harmful and should not be ignored. All of us have a responsibility to report someone or something that appears odd and out of place to law enforcement. If you notice that someone’s disposition is off the charts, report that person to law enforcement. We are not suggesting that you become a lay psychologist and begin reporting every person who looks or acts oddly in your opinion but rather reports anything that you instinctively feel is very strange or out of place. Worldwide Intelligence Network(WIN) can be contacted for any such civil, criminal investigations all over the world. Our Agents are highly active for private investigations in New York and Los Angeles. We can be contacted at (310) 385- 8200 or email to win@wincor.com.      

Kylie and Jessica
Blog

Kylie Jenner’s Bodyguards Get’s a Bad Rap

“Kylie Jenner’s Bodyguards got too pushy and shoved fellow VIP Jessica Alba at the packed Opening Ceremony fashion show. Jenner and her boyfriend, Tyga, were there Sunday night, along with guests including Miguel, Tinashe, Laverne Cox, Natasha Lyonne, Spike Jonze, Alexa  Chung, Kelly Osbourne and Rose McGowan. But after the inventive show wowed the crowd with models from the New York City Ballet and choreography by Justin Peck, spies said Kylie’s Bodyguards were anything but graceful. After the show as guests were trying to leave the venue, “it was very crowded,” said a source. “Everyone was in the crush and Jessica had stopped briefly to say hi to someone when all of a sudden from behind came Jenner’s Bodyguards. They just shoved Jessica out of the way. She just looked astonished!” This is what happens when a non-professional, unskilled Bodyguard is assigned to protect their charge. Kylie Jenner’s Bodyguards were unprofessional indeed. Her Bodyguards appeared to performed rather like bullies by pushing a female aside. A Celebrity’s agent or manager should have personally vetted those Bodyguards because they would have most likely learned that their backgrounds were likely to reveal that they worked as bar bouncers rather than trained skilled Bodyguards . There are clear and precise vetting procedures Worldwide Intelligence Network follows when we assign a Celebrity Bodyguard also known as a Personal Protection Specialist.  One of the first questions we ask a candidate is “have you ever been in a physical altercation while on a protection detail.” If the answer is yes, we ask the candidate to explain and if it sounds to us that the altercation could have been avoided if a calm, polite yet assertive communication was initiated by the Bodyguard, the candidate is not hired. A true professional Bodyguard is observant, polite and trained to move within a crowd with grace, perseverance and dignity. Pushing anyone aside is absolutely unacceptable unless someone was charging at the client.  

estate security
Blog

Surveillance Is Not Easy

To appreciate how difficult it is to conduct surveillance try this easy test? Drive to a nearby market. Park your car and follow anyone you chose who drives out of the lot. Chances are you may not make it three blocks before you lose that person. Surveillance is an art and it takes years of practice and experience to become a qualified surveillance investigator. All too often we hear from some clients who suspect their significant other is cheating that they decided to follow them. Within minutes they were either discovered or they lost sight of the car within thirty minutes. Surveillance is a dangerous occupation because it causes one to focus on the vehicle being followed while driving in and out of traffic lanes and also trying to take video. Inadvertently you might drive through a stop sign or red light and wind up receiving a very expensive traffic ticket. Our advice is never attempt to conduct surveillance on your own and don’t ask a friend or relative to do it for you. Your best course of action is to retain the services of a licensed and professional private investigator at Worldwide Intelligence Network who has years of experience and who uses state of the art video equipment.    

Using Cell Phones to Reveal Cheaters
Blog

Infidelity Surveillance Using Cell Phones to Reveal Cheaters

Infidelity – Cheater Surveillance – Using Cell Phones to Reveal Cheaters Did you know that it is now possible to track the exact location of your spouse or significant other anywhere in the world via your cell phone? An infidelity private investigator can help! The Story We recently were assigned to assist a private investigator who flew in to Los Angeles from Mexico City to conduct an infidelity surveillance on the wife of his very wealthy entrepreneurial client in Mexico City. The wife and her husband had an argument and she decided to fly to the US to get away from her husband. No matter where his wife was in Los Angeles the private investigator was able to track her movements and her exact location on his cell phone. There are times while conducting a moving surveillance a subject is lost due to severe traffic conditions. But the Mexican investigator was not at all concerned if he lost her in traffic. He simply clicked on his cell phone to acquire the wife’s exact location. To visualize this software, it’s very much like an address appears on Google Maps. This software cannot be loaded remotely as the user must have the cell phone they want programed in hand.  As it turned out the wife was simply meeting with old friends and she was being very loyal to her husband.   We have been conducting infidelity surveillance for over 22 years with great success because we have the finest surveillance investigators in Los Angeles, New York and around the world. View some of the most common signs of a cheater  that we have experienced over the years.

Your Teenager and ISIS a Tragedy
Blog

(Updated)Your Teenager and ISIS a Tragedy

Who would have imagined parents finding themselves concerned about their child running away from home, from their family and friends to join a terrorist group such as ISIS?  Unfortunately, this issue has become a reality for parents who must now take notice and become extremely vigilant as to their teenager’s Internet activities. Granted, parents have more than their fair share of stress dealing with all of the life’s issues. Try to imagine how you would feel to open your front door and be greeted by the FBI telling you that your teenager has been communicating with ISIS recruiters and was apprehended at the airport about to board a plane for Turkey with a detailed map of entry points into Syria. We imagine that would be a staggering and incomprehensible moment for you. There are ways to prevent this from happening such as acquiring Software programs that can monitor your teenager’s Internet activity. We appreciate that no parent wants to spy on their child and we respectfully recommend you be completely upfront with your teenager and explain it is your responsibility as their parent to monitor their Internet activity to make sure they are not corresponding with an ISIS recruiter. There is a fairly good chance your teenager may be offended, so be it. Better to be offended than beheaded, raped or killed. ISIS’s recruiting efforts are incredibly sophisticated and appealing to teenagers. Should your teenager become outraged, rebellious and/or incorrigible by what you tell them to show them the videos of ISIS beheadings and ask them to read articles about ISIS? Here is an excerpt from one article; “Mass executions, beheadings, crucifixions, burying them alive, selling them as sex slaves, using them as suicide bombers and shields, and sexually abusing them are some of the heinous crimes being committed against innocent children by the Islamic State militants.” No one ever said teenagers are easy to communicate with. But it is more productive to approach your teenager in a calm, assertive and sincere manner than appearing hysterical, controlling or demanding. The correct approach should encourage your teenager to listen to you about ISIS and ISIS’s psychological recruiting methods which have been very successful in manipulating teenagers in America and Western Europe to join them. ISIS offers teenagers a horrific existence of terror in Syria and Iraq. ISIS promises their recruits they will to convert them to the Muslim religion except for their interpretation of the Muslim religion is nothing less than a  fanatical interpretation of the Muslim religion. Please do not wait to discover evidence of your teenager’s communications with ISIS before raising the issue with your teenager. Begin now to research Internet Software Monitoring Programs for Mac and Windows PC’s.  Some programs are offered free of charge. We do not sell those programs and therefore we do not list the names of the companies who sell or offer them for free. According to the FBI, over one hundred teenagers left the United States to join ISIS and those were the ones the FBI knew about. Can you imagine how many the FBI doesn’t know about? The United Kingdom has their hands full with their teenagers leaving home to join ISIS.  You might want to seek assistance from your child’s high school counselor or even try to arrange a school seminar or meeting with the teenagers at your child’s high school. We hope you consider this a genuine effort by us to protect the child you love. All the best, the staff at Worldwide Intelligence Network.

corporate security service wincor
Blog

Corporate Security Services

Statistics show that inadequate and inefficient corporate security measures cost American companies billions of dollars every year, and security breaches have been detected in approximately 85% of companies and government agencies (a number that accounts for only those that have been reported). Failure to protect against threats and resolve crises negatively impacts a company’s performance and can even shorten its lifespan. Worldwide Intelligence Network has been rated as being in the Top Five of the Best Corporate Investigation Companies in America by Conde Nast Publications. An effective corporate security program protects a company from internal and external threats affecting its ability to function as a business entity, primarily by becoming an integral part of your company culture. Worldwide Intelligence Network does this by identifying, anticipating, preventing and resolving threats efficiently, without interrupting the daily activities of the company or negatively impacting its bottom line. Our elite team consists of former intelligence, military, and law enforcement officers who have extensive experience in providing corporate security in the public and private realm. Some are IT Cyber Specialists, security network designers, and software engineers. The Worldwide Intelligence Network Advantage 1. We do not offer a cookie-cutter approach to corporate security because every company is unique. For this reason, a comprehensive assessment is initially performed to devise a security program that is the most effective and efficient, as indicated by specifics regarding location, size, employees, objectives and other key factors. In providing corporate security to privately owned and multinational corporations around the world for over 23 years, we have also found that any program should be scalable so that it adapts easily and fluidly to growth and expansion. It will not hold your company back. Rather, it will do the opposite and foster advancement because your operations will be secure and protected, thereby reducing losses caused by threats and crises. Corporate Security To Protect Your Livelihood Corporate security vulnerability comes in all shapes and sizes. There are cybersecurity breaches, physical security breaches, corporate espionage, and counterfeiting. All target fortune 500 companies every hour of every day in America, causing CEO’s, CFO’s and COO’s many sleepless nights. An online search will provide you with approximate quotes of how many billions of dollars are lost due to a lack of professional security oversight. Readers might be enlightened as to the magnitude of those losses, however, you are probably not interested in that. Rather, you want to know how to prevent the security of your company from being severely compromised, so that your stockholders won’t become alarmed and commence an exodus to abandon ship. The more profitable your company is, the more prone it is to being compromised. There are many alleged experts in the various fields of countering corporate security breaches, but while they might be doing well in their one area of expertise, there could be another attack being readied and working its way into your company undetected. Are all these security breaches manageable at the same time? Of course, they are providing your company understands that they are vulnerable to an assortment of security breaches and/or cyber attacks. The key to preventing these various security breaches is to have a small but select team of highly qualified experts in all the various security protocols of which your company could become a victim. It is a daunting task to locate one person or company who has the experience to assemble a cohesive team of experts to verify that the security protocols you have in place are adequate, and make recommendations on additional protocols. Worldwide Intelligence Network is the company with the experience and know-how to organize that team of experts. When security is a concern, companies are expected to deal with these situations professionally, responsibly, decisively and swiftly, no matter what security controls they were able to afford or implement beforehand. Being the victim of a security breach has, rightfully or not, the latent stench of incompetence to it, so any attempt to limit the damage to the organization’s brand will be an uphill battle from the start. The effectiveness of the incident response plan is dependent on how well it is aligned with the corporate reality and the skill level of the personnel expected to carry it out. Blindly applying an incident response template that does not fit the environment could in the worst case cause confusion and hamper response processes. To ensure your plan will work as expected when you actually need it the organization should schedule regular test runs. Worldwide Intelligence Network is prepared to assist your company in supervising the selection process of professionals for your corporate officers to meet with and to hear their recommendations on how your company can counter any number of security breaches. Worldwide Intelligence Network has a global network with the resources to assemble the caliber of experts required to perform this service.

orange binder labeled with the word claims
Blog

Workers’ Compensation Investigation Services

Worldwide Intelligence Network has been conducting AOE/COE and Sub Rosa Workers’ Compensation Investigation Services for the past twenty five years. Interviews of  claimants and witnesses number in the thousands. Sub Rosa and Activity Check investigations number in the hundreds and are performed by superb experienced field investigators with proven track records.  In addition to providing investigative coverage throughout California and New York we provide Workers Compensation claims investigations through our associate network of investigators all across America. Our Workers’ Compensation investigations have led to several millions of dollars saved by our clients who are insurance companies, self- insured entities and municipalities. Our record of success for establishing fraud is far above the average and our clients are consistently pleased with the quality, efficiency and professionalism of our investigative ability and knowledge of the laws governing Workers’ Compensation claims. We have uncovered potential insurance fraud in over 80% of our investigations – yet no investigation was ever conducted with a preconceived notion that a claimant filed a fraudulent claim. Throughout our twenty five year history we never failed to submit an investigative report on time.  Some of our clients: State Compensation Insurance Fund Los Angeles County Risk Management Division Third Party Administrators; Tristar, Aims, Intercare MTA Risk Management City Attorney of Los Angeles Hughes Air Craft El Segundo . Two Case Studies on Workers’ Compensation Insurance Fraud [Case Study 1] A claimant reported that he fell down some stairs at work and hurt his back. The claimant saw a doctor who signed a doctor’s note saying the claimant could not return to work for several weeks. When the claimant returned to work he presented another doctor’s note addressed to the “return to work supervisor” stating the claimant was to be given restricted work assignment avoiding any physical lifting of boxes or files. We were assigned to conduct a surveillance investigation on this claimant after our client received an independent physician’s report stating that no injury to the claimant’s back could be found. On the first day of this assignment, video was captured of the claimant lifting and moving furniture into his home which lasted over an entire weekend while he was allegedly incapable of any physical activity. Our date and time stamped video of the claimant’s activities had a dramatic effect on his claimant’s workers’ compensation claim which was denied and subsequently referred to the District Attorney’s Workers’ Compensation Fraud Unit. Over the past several years numerous physicians and attorneys have been investigated, arrested and charged with insurance fraud. [Case Study 2] We were assigned a surveillance investigation on a claimant who alleged a severe injury to his foot. He had been off work on an accepted claim for over a year. Our client suspected fraud due to an independent physician’s report stating he could not find anything wrong with the claimant’s foot. During our first day of this surveillance we did not find a car parked in front of or in the driveway of the claimant’s home. Further investigation revealed that the claimant’s car was parked in a driveway of a vacant home directly across the street from his house. We found that suspicious since the claimant’s driveway and street were clear of any other vehicles. As the claimant exited his home we captured video of him limping. The problem with his limp was that he was limping on the wrong foot. It appeared most likely to us that the claimant’s attorney may have cautioned him that he could be placed under surveillance and to not leave his car in his driveway or in front of his house so investigators would be unable to know the car he was driving and subsequently have a difficult or impossible time following him. That same day he was observed limping on the wrong foot he was followed and videotaped entering a Chiropractor’s clinic. Prior to walking into the clinic video was taken of him putting on a foot brace that he had in his car and then he took out a pair of crutches from the trunk of his car. When he exited the clinic he took the brace off of his foot and he put the crutches back in the trunk. Surveillance continued for several more days. We then noticed that the license plate on the claimant’s car had been switched which we presumed was an additional effort on his part to avoid detection. We followed the claimant again and videotaped him running in a rain storm without a limp pushing a shopping cart from BevMo’s market through a parking lot. The claimant ceased receiving workers’ compensation and was arrested and charged with workers’ compensation insurance fraud and he is currently awaiting trial. We welcome Defense Attorneys, TPA’s and Insurance Companies to call or contact us to inquire about our rates and availability. (310) 385- 8200  

lana del rey
Blog

Where Were Lana Del Rey’s Bodyguards?

Lana Del Rey is a singer / songwriter who is set to release her new album, Ultraviolence, later this year. But there is trouble brewing for the songstress. This is what happens when professional Personal Protection Specialists and celebrity bodyguards are not retained to manage the paparazzi at a film shoot. Del Rey’s production company is currently being sued for $1million after a video shoot for her song, Tropico, turned ugly. Karl Larsen, a photographer who works for Rolling Stone magazine, claims that he was attacked by 3 members of Del Rey’s entourage who wanted him to stop taking pictures of the songstress after stumbling upon the shoot on the L.A. River last summer. The 3 members, production staff members of Black Hand Cinema, threatened to destroy Larsen’s camera, then after taking the camera from his hand, removed its memory card. In the lawsuit, Larsen claims that one of them also slashed his finger with a box cutter, which left him requiring stitches. A simple courteous dialogue would have prevented this from happening! The key to defusing a volatile situation is to remain calm and courteous. While we weren’t there to know what actually happened, we have encountered many of these types of situations before and have successfully prevented them from becoming detrimental.

online dating tips scams
Blog

You’re In Love With Someone You Met Online-Be Very Careful!!

We so often receive investigative requests from men and women who are involved in very personal relationships with someone they met online. They have come to point where they are uncomfortable and want us to investigate whether their lover is who they say they are and if they are married or committed to another relationship. Many of these people readily admit they are very much in love even though they have never met face to face with their online lover. Usually, these investigative requests occur when the online lover promises to fly out to meet them and then suddenly comes up with a last-minute excuse why they cannot leave their home country. Another reason we might be called to investigate their online lover is due to their online lover telling them that they are in very serious financial trouble. They will usually say their problem is due to a tax issue in their country or a medical emergency for which they have no money for. The most disheartening call we receive is when we’re told the funds were already wired and that their alleged lover has never been heard from again. Once retained by our client were asked to track down where their so-called lover actually lives and to confirm whether he or she is really the person in the photo they posted online. In almost all cases the photo was hijacked from someone else social media profile and we usually learn the perpetrator works in a boiler room operation where hundreds of potential victims are sent emails through online dating sites. These crooks troll night and day for men and women on dating sites, they have no conscience or concerns about their victims because they feed their families based upon a percentage of the money they steal from their victims. Their job is to study hundreds of profiles of registered users all over the world and then pick their targets. We have identified where most of these boiler room operations are located. They are usually in Nigeria, Russia, Ukraine, Serbia, and India. Those victims who wired funds will never recover their money and the person who scammed them will never be prosecuted. Foreign governments could care less as they have not the funds to deal with these scams. Worldwide Intelligence Network can confirm for you if your lover is a real person by conducting an advance background investigation on them anywhere in the world. Here are a couple of very helpful websites for you. Men, please check out this site: http://www.inter-mariage.com/en/scamlist.php Ladies and gentlemen, please look at this site from the FBI: http://www.fbi.gov/sandiego/press-releases/2013/looking-for-love-beware-of-online-dating-scams Not all online romances turn out bad. However, you should allow us to a background investigation prior to you committing to a relationship.

IRS issues a fresh consumer alert Beware of the suspicious calls
Blog

(Updated)Beware of Phony Creditor Calls Asking for Payment

There is a new and very ugly scam being perpetrated upon hundreds if not thousands of Americans across the country by low life’s seeking to steal hard earned money and savings from uninformed individuals who are randomly selected by the scammer thieves. These thieves will call and identify themselves as a creditor who is owed money. They will tell their victims that a police report has been filed for failure to pay their debt and a subpoena will be served upon them in a matter of minutes if they don’t issue payment within 24 hours. The calls will be consistent coming in at all hours of the night and day in the victim’s home and workplace. They will use very threatening language and attempt to intimidate the victim. The alleged creditor will instruct the victim to pay them via a prepaid debit card on by a money gram. The intensity of the scammer’s calls is unrelenting and extremely stressful and that is their strategy. Once they feel that their victim is terrified and that the victim hasn’t a clue about how credit and collections are actually governed by State and Federal laws they usually will prevail until the victim demands proof of the debt from the alleged creditor or constantly hangs up their phone the moment they hear the scammers voice. For those victims who receive calls at their work place and at home need to file a police report. Once the police report is filed, victims should call their cell phone provider to find out how they can block the scammers call and they should also call their landline provider for their home and work telephone numbers and explain what is happening and request a trap line be put in place to capture where the calls are coming from. In almost all instances the scammers use prepaid cell phones that are not traceable but occasionally they slip up and use a landline that can be traced. In order for the trap line to work, the victim will be required to keep a log each and every call they receive with the date and time by their landline provider such as AT&T. The victim will be asked to present their calls received log to the police and their phone provider. Also Read Case Study on ATM Robbery.

Scroll to Top