• While billions of people are under stay-at-home and work from home orders, predators are taking advantage of people’s fears, anxiety, and losses at mind-numbing proportions. Children, who are now spending more time online for schooling, are targets for exploitation by pedophiles. Seniors are vulnerable from financial scams, and businesses are vulnerable from hacking, phishing, and cybercrimes. We are committed to serve the public by providing information on the latest scams, exploitation, and fraudulent activities as we are all in this together.
  • Evaluating Public Records Databases 

    Years ago it would have taken an investigator weeks and a great deal of financing to locate pertinent information for background checks and cases. Today there are a number of good public record vendors from which to choose.  
  •  

    But Wait - I Didn't Do It!

    In the United States, all persons are presumed innocent until proven guilty in a court of law. Does this mean your mugshot is removed from the Internet once you are proven innocent? Sure, if you pay a fee. Or maybe it won't be removed...
  • Look up: Cell Phone Number

    Social security numbers have been the mainstay of investigators since Hank Asher, the legendary father of data fusion, gave us the investigative data tool DBTxp. The social security number is the personal indicator that helps us identify one individual among millions. The cellular phone number, another one-out-of-a million identifying number, is likewise useful for locating a person, however, the cell number is not protected—and, should you dial that cell number, there’s far greater chance your intended subject will answer it.
  • Public Records Search Pitfalls

    This article focuses on some of the pitfalls that the modern investigator needs to be wary of when it comes to public record searching. Learn some of the issues you may come across and how to avoid them. Additional commentary from experts in the public records fields gives further insight into the public records industry.  
  • The Business of Finding Business Assets Business assets can be held in many ways—and buried in even more ways. Among the many creative money management methods available, business assets can be legally held in a foreign country, as a corporate shell, or a personal trust. Assets can be liquid (cash or easily converted to cash), intangible (hard to find or evaluate), or hidden (tucked way not to be found). Typical assets controlled by a business include: Real Property; Personal Property; Investments and Trusts (Financial Assets); Intellectual Property; and Subsidiaries/Spin-offs. For those assets that can be located, a discussion of some practical search procedures follows. Each asset type is examined, with examples of how to search for and investigate them. what you pay for.  
  • Locate Bank Accounts Legally

    Bank accounts for sale? Every day we receive advertising that offers to find someone’s bank account information—completely legally and FCRA compliant. It's still hard to figured out how this is possible to accomplish. Because it isn't. So what ways are legal, ethical and will get results?    
  • Professional's Review of Public Record Aggregators

    The collection of available public record aggregators span a range—from quick, no-nonsense, pay-as-you-go websites to high-end subscription services (that require compliance with Federal laws). The services reviewed here are useful for the investigative industry, including private investigators, bounty hunters, collection agents, law enforcement, fraud, and compliance research. For any of these specialists, choosing where to invest your database budget is a serious consideration: the results of these services have a direct impact on your cases—and you get what you pay for.    
  • Best of People Search and Company Search Engines

    Today’s commodity is data. Everyone is selling a specialized database in their particular arena. Our job as investigators is to find that database; doing so will greatly enhance our skills and give us the edge to set us apart from the rest.
  • Using Sayari Graph for Investigations

    This article examines the use of Sayari for intelligence analysts and corporate risk management professionals to collect, extract, and analyze data across borders and languages. Sayari can be used for due diligence to reduce risk or to enter a new market, to meet compliance or regulatory requirements, or to prevent fraud, financial crimes, and corruption.
  • DNA: The New Open Source

    This article examines how the growing trend of DNA testing can help the investigator, but also may be a damaging unwanted intrusion on personal privacy. We discuss how to protect yourself and how to remove any DNA you have left behind.
  • TikTok: An OSINT Tool of Today's Youth

    This article examines the quickly growing Chinese app and how from an open source intelligence perspective, this novelty app provides researchers and investigators with a plethora of knowledge and useful information.

Title

Go to Top