Friday, April 29, 2016

The Achilles' Heel of Social Media Snooping

There are people out there who are being stalked, that need to stalk their stalkers. Some are victims whose family members are in search for the predators, who killed their loved one. Others are survivors of bullies and stalkers. I have come across this information for those who want to find out information about their stalkers, bullies and predators. Information and knowledge is power.


" It reported that social media posts were being used as evidence in 75 percent of litigation cases and, in one particular case in which a man claimed to own nothing, one of his children posted pictures of the family’s £12 million super-yacht in the Bahamas.


Nevertheless, what the Telegraph story highlights is something that professional snoopers have known for a long time – the Achilles’ heel of snooping on social media is “naive” family members and friends.


We just wrapped up a large background investigation project on about 20 individuals that related to a complex legal matter, and about half of them had absolutely zero social media accounts. But we found photos and other details of their private lives on every single one of them through the Facebook and Instagram accounts held by their children, wives and friends.


So while you (or the person you are investigating) will do everything you can to protect your privacy when it comes to social media, chances are your information is out there somewhere....."


Read complete article written at:  Diligentia Group

Thursday, April 28, 2016

101 Things A Private Investigator Can Do

1-100 read at: Diligentia Group


101 - "We will tell you what those bastards are up to"!

How To Find Out Everything About Someone

"What if you wanted to find out everything about someone? Literally everything, including what they ate for lunch yesterday.


Would that be possible?


I often tell clients that anything is possible. Any motivated party can find out (just about) anything about someone. But everything?


Absolutely.


This, of course, means sticking to all legal and ethical boundaries that we have. I am sure some other people might have some more nefarious methods, like hacking into someone’s computer or phone, either of which is pretty much the hub of all personal information (if you don’t believe me, just ask the FBI). So here we go…"


Public Records


"I would even go to the extent of contacting every police department in each town/city the person lived in, checking by name, aliases and addresses to see whether they ever had any run-ins with the law, regardless of how minor they were (jaywalking included). I learned my lesson recently when doing some research on a person who seemed like a perfectly nice gentleman, until I found out that he had been harassing his neighbors for the past 15 years.


And I would go back to every town, city, county and state that the person had lived in since turning 18 (most everything before that would have occurred when a person was a minor, which in most states means the information is off limits)."........


Open Source Searches


"Next I would tackle open source searches. This means anything that may not necessarily fall within public records (e.g., some type of government document), such as historical news media, employment history, education history and professional affiliations.


I would even go to the local libraries where the person had lived and scour the local newspapers for anything I could get my hands on. College newspapers too. High school and college yearbooks also might be a good source. I’d be looking for not-so-flattering information, gaps in employment history, downright lies or ties to nefarious characters......."


Social Media


"Next, I would dive into social media. Whether or not the person is active on social media, chances are they are somewhere out there; you just need to find them or their footprint......"


The Internet


"Everyone can do a Google search. But at this level, you will need to go beyond simple search engine searches. You need to scour the depths of the Internet to find fake profiles that the person might have created or identify them on lists they shouldn’t be on (Ashley Madison, anyone?). Maybe they posted on some historic message board under one of their various alter egos or handles.


Don’t underestimate the power of the Internet......"


Surveillance


"Everything we have done up to this point provides a pretty good picture about someone. But when you want to find out everything about someone, you need to know what they are up to right now. What their routines are. Where they shop, work and bank. And of course, who they meet up with...."


Read the entire article at: Diligentia Group

Red Flags In A Background Investigation - [INFOGRAPHIC]

"In the context of a background investigation, a red flag can be classified as a piece of information which represents any sort of potential misrepresentation or omission of fact, which, if known by a client, could be of value when making a critical decision. While most people would not do business with the proverbial axe murderer, there are numerous other red flags that can be uncovered during a background investigation which can ultimately lead to making better decisions."  Read more and view infographic here: Diligentia Group

Tuesday, April 26, 2016

#RiseUp

"On this day of action, we’re showing survivors around the country that we’re fighting for them through our #RiseUp photo campaign. And we want you to join us. The ask is simple: just hold up a white sign or piece of paper that says #RiseUp and snap a selfie or have a friend take a photo.


Show your support for survivor rights by taking part in the #RiseUp photo campaign and sharing it with us on Facebook,Twitter and Instagram."


Read more and send photos here: Rise Up For Sexual Assault Survivors

Wednesday, April 20, 2016

Lifelock Used To Electronically Stalk Woman

Here is an extreme stalking case, like the one I have been dealing with. When you did not know someone was stalking you and then you find out.


"We’re distressed that someone was able to use our service to victimize his (ex-)wife,"  Kelley Bonsall, LifeLock's vice president of media relations and corporate social responsibility, said in a statement. "There’s often little a company can do to stop someone who is intent on causing harm using the personal information of a partner, but we owe this victim an apology because we did not assist her with the speed and care that the situation required."


Read full story: Lifelock Used To Electronically Stalk Woman