Saturday, June 17, 2023

'Don't talk to strangers.' Top scams on seniors for 2023 and how to defend yourself.


Almost a century ago, the likes of Bonnie & Clyde and John Dillinger robbed banks, then made getaways by driving to the nearest state border.

But these days?

"You could be in your mother's basement and rob a bank in all 50 states," said Brian McDonough, an assistant U.S. attorney and elder justice coordinator for the Northern District of Ohio.

Evolving computer technology continuously breeds new criminal scams. Almost like a soup of the day, he told a group of about 135 people gathered at First Christian Church on Friday morning.

From 2017 through 2021, the FBI Internet Crime Complaint Center received 2.76 million complaints, which amounted to $18.7 billion in financial loss to victims.

McDonough was a featured speaker at the 12th annual "Justice for All: Protecting the Elderly & Disabled Seminar," hosted by Stark County Probate Court and Judge Dixie Park, along with the Stark Multidisciplinary Advocacy and Protective Resources Team.

He told stories about cases he's handled in the state's 40 northern counties; how his own father fell for scams; even how William H. Webster — who was a former federal judge, past director of the FBI and one-time CIA director — was targeted.

"If he can be a target, ... anyone can," McDonough said.

Phishing, vishing, smishing and pharming

His more than 90-minute "Fighting Back Against Elder Fraud: Top Scams for 2023" presentation explained a variety of scams, and offered tips on how to avoid becoming a victim.

The top-five frauds for this year, in order, fall within these general schemes: Business email compromise, romance scams, cryptocurrency, ransomware and tech support.

McDonough estimated that 70% of scams are initiated from outside the U.S. Criminals often try to mine personal data by phishing (through email), vishing (phone or VoIP), smishing (text messaging) and pharming (hacks of your computer).

"And they're very good at it," he said.

Criminals can easily make victims believe they are getting emails from their bank, or phone calls from hospitals or law enforcement, McDonough said. Seniors, he explained, are targeted because they tend to answer phone calls more than younger generations, and most importantly, they're more likely to have money to steal.

"Don't talk to strangers," he advised.

If it's important, the caller will leave a voice message.

Reporting crimes can helps catch criminals.

McDonough has seen cases where wealthy seniors have lost $1 million and poor seniors have lost half their monthly income. He's witnessed everything from sextortion and lottery fraud to a church member who thought she was sending gift cards to her church pastor, so they could be used to help the poor.

"If anyone says pay with a gift card, that's a scam," he warned.

New twists on old scams will continue to make them even more convincing, McDonough warned.
"If anyone says pay with a gift card, that's a scam," he warned.

New twists on old scams will continue to make them even more convincing, McDonough warned.

For example, there's one where grandparents have been duped into handing over thousands of dollars, based on a phone call plea that one of their grandchildren has been arrested after an auto accident and needs bonded from jail.

"Now, with (artificial intelligence) ... that scam can (get really effective)," he said, describing how a teen's social media clips can be harvested by a criminal to create an entire vocabulary — in the teen's voice.

Sometimes, the best advice is to remain calm.

"Slow down and verify," McDonough said.

And one newer scam, which he said, could wake him up in a cold sweat in the middle of the night, is SIM swapping.

After gathering key personal information, the criminal contacts your cellphone carrier and gets them to switch your phone number to another SIM card, placed in the scammers phone. It enables them to trample through the two-factor authentication many institutions now use, to access your money and even more data.

Too many victims, he said, are ashamed and embarrassed, so they never report being scammed. However, reporting and sharing information is key to catching scammers, he added.


Victims, McDonough said, don't have to sort out if it's a local, state or federal scam. He said they may simply call the National Elder Fraud hotline at 1-833-372-8311.

That's 1-833-FRAUD-11
Tim Botos
The Repository

Saturday, March 11, 2023

Dr. Ralph Greenson

Can you please send this letter in an email to the people listed at the end of the email?





I'm writing to you about box 39 at UCLA Library archives, which belongs to Dr. Ralph Greenson. Marilyn's death has long been a source of speculation and conspiracy theories - some suggesting she may have been murdered due to her alleged affair with the Kennedy brothers, John and Bobby. 


Located in the archives are Box 34, 35, and 36, which were viewed by a private investigator, Becky Altringer. These boxes contained books and newspaper articles about Marilyn Monroe and her death. You can only view folders 6 and 8 from box 39. 


Dr. Greenson was obsessed with Marilyn because he had every book, magazine, and newspaper written about her. Two folders were letters from people all over the World blaming Dr. Greenson for Marilyn's death, one man even telling Greenson to put a 45 caliber gun to his head. 


One known fact is that Box 39 does hold a manuscript written by Greenson's daughter Joan about her ties with Marilyn and what happened that night. Box 39 is sealed and can't be opened until 2039. That manuscript was already read by several book authors.


Joan claims in her manuscript that her father got the call about Marilyn at midnight - not 3:00 AM - which would make more sense given that the neighbors say they saw an ambulance at 11:30 PM. Was it Greenson who sealed these boxes, his daughter Joan, or somebody else? 


Why 2039 - is it because all the people involved will be deceased? We believe the answer to what happened to Marilyn could be found in Box 39 since it states it is about Marilyn Monroes Death. At the very least, there might be more information that people need to see. 


I'm 100 percent positive Marilyn did not commit suicide - not if you go by all the facts of the case. There are so many unanswered questions, and there shouldn't be. Box 39 could contain all of the answers. Please do the right thing and open box 39 for the public to view. 



Name

Sharon Farb

UCLA Archives

Email farb@library.ucla.edu


Name

Michael S. Levine

Vc Acad Personnel, Academic Personnel

Email: sritea@stratcomm.ucla.edu


Name

Greg Payne, PH.D

Director UCLA

Email: gpayne@mednet.ucla.edu


Name

Gene Block

UCLA Chancellor

Email: chancellor@ucla.edu


Name

Darnell Hunt

Office of the Executive Vice Chancellor and Provost

Email: evc@conet.ucla.edu


Name

Joan Greenson

Daughter of Ralph Greenson

Email: Joanaebi@yahoo.com


Name

Joan Greenson

Office, title, or organization

Daughter of Dr. Ralph Greenson

Email: jgaebi@gmail.com


Name

Andreas Aebi

Husband of Joan Greenson 

Email: aebi@hss.caltech.edu


Name

Katie Aebi Rodriguez

Granddaughter of Dr. Ralph Greenson

Email: karodriguez@pasadena.edu


Friday, March 10, 2023

FIVE THINGS ABOUT VIOLENCE AGAINST AMERICAN INDIAN

FIVE THINGS ABOUT VIOLENCE AGAINST AMERICAN INDIAN AND ALASKA NATIVE WOMEN AND MEN



1. Most American Indian and Alaska - Native adults are victims of violence.

More than four in five American Indian and Alaska Native adults (83 percent) have experienced some form of violence in their lifetime. That’s almost 3 million people who have experienced psychological aggression or physical violence by intimate partners, stalking, or sexual violence.

2. Men and women are victimized at similar rates but in different ways.

American Indian and Alaska Native women and men have been victimized at similar rates (84.3 percent
for women and 81.6 percent for men). They have experienced similar levels of psychological aggression and physical violence by intimate partners. But women have experienced significantly higher levels of sexual violence (56.1 percent versus 27.5 percent for men) and stalking (48.8 percent versus 18.6 percent for men).

3. Victimization rates are higher for American Indians and Alaska Natives.

The lifetime victimization rate is 1.2 times as high for American Indian and Alaska Native women as for White women; for men, it is 1.3 times as high.

  4. American Indian and Alaska Native female victims are more likely to need services, but they are less likely to have access to those services.

More than two in five American Indian and Alaska Native female victims reported being physically injured, and almost half reported needing services. The services most commonly needed were medical care and legal services. Unfortunately, more than a third (38 percent) were unable to receive necessary services.

Research continues to highlight the disparities in health outcomes and access to health care for American Indians and Alaska Natives. These results highlight the need for additional services for American Indian and Alaska Native victims of crime — a need that was also documented in the Office for Victims of Crime’s Vision 21: Transforming Victim Services — Final Report.

5. For American Indians and Alaska Natives, interracial violence is more prevalent than intraracial violence. 

Although the exact number of victimizations per person is unknown, it is clear that most American Indian and Alaska Native victims have experienced at least one act of violence committed by an interracial perpetrator (97 percent of women and 90 percent of men). Fewer victims (35 percent of women and 33 percent of men) have experienced one or more acts of violence by an American Indian or Alaska Native perpetrator.

This finding offers strong support for the sovereign right of federally recognized tribes to criminally prosecute non-Indian perpetrators. Until recently, federally recognized tribes did not have this authority, even for crimes committed on tribal lands. This gap in jurisdictional authority provided immunity to non-Indian perpetrators and compromised the safety of tribal communities. The Violence Against Women Reauthorization Act of 2013 partially corrected this problem by providing special domestic violence criminal jurisdiction to federally recognized tribes. But more progress can be made to provide justice for American Indian and Alaska Native victims.

Saturday, February 18, 2023

The State of New Mexico Violated Constitution Rights


Ms. Caroline was hit by a drunk driver, William Urick, on February 28, 2022. I'm a private investigator, and I have been trying to seek justice since the accident. Ms. Marz is 78 years old, has been in ER twice, in physical therapy for her back and neck, and has an injured eye. This man was very drunk and needed to be prosecuted before he killed someone. He has shortened her life and caused her pain every day. She is still seeking medical treatment for her neck and back.


The DA has ignored me, and now I found out by searching New Mexico criminal records that they did file a case against him for "Great Bodily Harm by Vehicle (Driving While Under Influence of Intoxicating Liquor" on October 13, 2022, without notifying Ms. Marz. I have contacted the DA since the accident, only to be ignored, and they have yet to tell us they filed charges. Two cases were filed against him, and both were dismissed without them notifying the victim, even though we reached out to them continually for over a year. We had to find out by searching the records on February 14, 2023. I would like to know who William Urick knows to get his cases dismissed.


The Mayor, Ken Miyagishima, told me he would investigate it and let me know what was happening. MADD ignored me, NM State District Attorney Hector Banderas wouldn’t help, and the Governor told me she would look into it, and she never did. She later stated she had no authority to overturn any ruling, yet she grants clemency. Senators Ben Ray Lujan and Martin Heinrich ignored us as well.  The Las Cruces District Attorney Gerald M. Byers, Judge Joel Cano, and Judge Norman E. Osborne failed to allow Ms. Marz to appear or even notice of hearing. Heather Cosentino Chavez was continually rude and ignored most of my emails. I thought these people were here to defend us, not make us victims. 


Below are three of the Constitution Article II, § 24. violated for great bodily injury by vehicle


(1) the right to be treated with fairness and respect for the victim's dignity and privacy throughout the criminal justice process;

(2) the right to notification of court proceedings;

(3) the right to attend all public court proceedings the accused has the right to attend;

the right to restitution from the person convicted of the criminal conduct that caused the victim's loss or injury;





WILLIAM J. URICK

FIRST CASE - M-38-DR-201400201

DISMISSED 11/20/2015

SECOND CASE - U-107-DR-202200587

DISMISSED BY PROSECUTOR - 06/07/2022

THIRD CASE - M-14-IR-202200010

The State of New Mexico


Monday, January 9, 2023

Sisters of the Holy Family of Nazareth

The Martyrs of Nowogrodek were eleven Roman Catholic nuns in Poland who offered to sacrifice their lives in place of Polish civilians who were scheduled to be executed by the Nazis.

Nowogrodek was in eastern Poland at the time (now it is in Belarus). When the Nazis and Soviets both invaded Poland in September 1939, Nowogrodek was in the agreed Soviet portion of Poland.

But when the Nazis began the invasion of Russia in June 1941, the Germans occupied the town.

In 1942 the Nazis exterminated the 10,000 Jews in the town, then turned on the Polish Catholics. Thousands of Poles were arrested. Relatively few Poles were executed, but two priests were among them.

The nuns, members of the Sisters of the Holy Family of Nazareth, contacted the Gestapo and offered their own lives in exchange for the release of 120 Poles who had been slated for execution.

The Nazis actually took the nuns up on their offer. Most of the 120 condemned Poles were spared and sent to labor camps; a few were released.

Then on 31 July 1943, the sisters were packed into a van, driven to the forest outside of town, and gunned down. They were buried in a mass grave. 

On 28 June 1999, Pope John Paul II confirmed that the eleven sisters were martyrs, and beatified them.

After the war, the grave of the sisters was located and today their remains are in the local Church of the Transfiguration.

The word “courage” gets tossed about rather carelessly these days. This is a reminder of what real courage is.

Friday, December 23, 2022

A Private Investigator Should Ask When Surveilling a New Location


Private Investigator Industry News

We’re always looking for ways to help PIs stay on the right side of the law and avoid any issues that come with accidentally breaking laws. That could mean failing to solve a case, rendering evidence useless in court – or even opening your PI business to large lawsuits.

One of the trickier situations is when an investigator is first visiting a new area with plans to look for evidence. In these cases, PIs may be looking to document a subject in the act of a crime, or when breaking a contract. They could also be looking to collect physical evidence at the location. To help avoid any liability issues from breaking laws, here are several questions PIs should always ask when first arriving.

Where Are the Boundaries of the Property?

Private investigators have a lot of freedom in public spaces, like streets and public sidewalks. This is where legal surveillance can take place, so it’s always good to look at nearby public spots with good vantage points for watching people, taking photos, and other activities. Note where public spaces end – you may even want to pull up a map app or consult online information about property lines if necessary. Crossing over into public property is considered trespassing for PIs, who don’t have any legal authority to do it.

Do I Need to Ask Permission for What I’m About to Do?

PIs do have one powerful tool when going on private property – the ability to ask permission. If the owner gives express permission to the PI, they’re no longer in legal trouble. This is also true of anything at the location that the PI may want to take a closer look at, like a personal computer: If they get permission from the owner, they are in the clear.

Keep in mind, PIs can’t impersonate authority figures to get permission to be on a private property. They can’t pretend to be police officers, for example. It’s legally dicey to trick a current owner by other means, too, so be careful what you say. When possible, such as with a domestic case, PIs should ask the person who hired them if they can grant permission to go on private property. Keep this in mind for companies hiring PIs to investigate commercial properties, too.

Where Are the Trash Cans Located?

This may seem like an odd question at first, but it’s a common part of many cases, PIs regularly look in trash for thrown-away documents, receipts, letters, and much more. That’s why many PIs eye trash locations when first investigating a new place. If that kind of evidence is on your list, make sure that trash is located in a public space before you go dumpster diving. Just because it’s in the trash, doesn’t always mean it’s fair game.

Where Is Privacy Expected?

This is a vital question for PIs that plan on taking photos or video to collect evidence. They may be looking for signs that an employee isn’t fulfilling their duties while remote working, for example, or seeking evidence of an affair. Laws about this kind of surveillance typically depend on a concept called expectation of privacy. If a person, especially on their own property, has an expectation of privacy in a specific place, that makes it illegal to snap photos or video of them. That includes obvious places like bathrooms, as well as bedrooms spotted through home windows. Depending on the circumstances, it may also apply to backyards and gardens.

When possible, PIs should document people entering and leaving homes, which is generally allowed, and gather evidence of what people do in public places.

Where Are Alternative Vantage Points?

If a PI is planning on long-term surveillance of a property, it’s good to look around and find a few different spots where surveillance will work – both in and outside of a vehicle, if necessary. Generally, PIs don’t want to park their vehicle in the same spot every day over the course of several days. This may attract a lot of unwanted attention. When possible, find a couple of different vantage points to switch between. Some PIs also have the ability to switch between vehicles to avoid suspicion, which could be helpful, too.

How Do I Get Out Carefully and Smoothly?

Keep an eye on streets and turns that will allow you to easily drive out of an area if necessary. PIs often want the ability to quickly tail someone leaving a home or move away to avoid suspicion – and they want to do it without attracting too much attention. It’s always a good idea to review maps of the area, but when first arriving make note of the most practical ways to drive away, make a quick turn out of a neighborhood, and so on.

The Right Surveillance Techniques

With a little preparation beforehand, it’s easy to avoid accidentally breaking laws and ruining investigations. The right surveillance techniques will help you gather evidence like photos and documents without getting into any trouble. Keep these questions in mind, and it will soon become second nature. If you have any questions about the specific laws in your area or how courts tend to view specific actions, don’t hesitate to arrange a consultation with a local attorney who specializes in criminal law.


Posted on December 1, 2022
Private Investigator Industry News
El Dorado Insurance Agency, INC.

Thursday, December 22, 2022

What’s a Pig Butchering Scam? Here’s How to Avoid Falling Victim to One.

Thousands have lost huge sums after being lured into fraudulent online investment schemes by seemingly attractive strangers who strike up online conversations with them. Here’s a guide to spotting the telltale signs.


If you’re like most people, you’ve received a text or chat message in recent months from a stranger with an attractive profile photograph. It might open with a simple “Hi” or what seems like good-natured confusion about why your phone number seems to be in the person’s address book. But these messages are often far from accidental: They’re the first step in a process intended to steer you from a friendly chat to an online investment to, ultimately, watching your money disappear into the account of a fraudster.




Congress and Industry Leaders Call for Crackdown on Hospice Fraud

“Pig butchering,” as the technique is known — the phrase alludes to the practice of fattening a hog before slaughter — originated in China, then went global during the pandemic. Today criminal syndicates target people around the world, often by forcing human trafficking victims in Southeast Asia to perpetrate the schemes against their will. ProPublica recently published an in-depth investigation of pig butchering, based on months of interviews with dozens of scam victims, former scam sweatshop workers, advocates, rescue workers, law enforcement and investigators, along with extensive documentary evidence including training manuals for scammers, chat transcripts between scammers and their targets and complaints filed with the Federal Trade Commission.

“We’ve had people from all walks of life that have been victimized in these cases and the paydays have been huge,” said Andrew Frey, a financial investigator for the Secret Service, the federal agency that is taking a lead role in combating online crime and trying to help victims recover their stolen funds.

These swindles are not only highly organized but also systematized. Here’s how the fraudsters typically go about it, including photographs, excerpts from text exchanges between scammers and targets, advice from training guides for fraudsters and police reports from pig butchering cases:

1. Create a fake identity

Pig butchers most often begin by creating a phony online persona, typically accompanied by an alluring photo (which itself might have been stolen) and images that convey a glamorous lifestyle.


This Instagram profile was reported to the Federal Trade Commission by a Florida resident who complained of losing $89,000 to a pig butchering scam. (Meta, which owns Instagram, said it’s investigating the account, whose owner didn’t respond to a request for comment.) 

2. Initiate contact

Once they’ve got an online profile, fraudsters begin sending messages to people on dating or social networking sites. Alternatively, they may use WhatsApp or another messaging service and pretend to have stumbled on a “wrong number” as they contact you. (A spokesperson for Meta, which owns WhatsApp, previously told ProPublica that the company is investing “significant resources” into keeping pig-butchering scammers off its platforms.)

In December 2020, a Connecticut man received these messages on WhatsApp from a seemingly friendly stranger. He responded and eventually ended up getting tricked into two scams that cost him a total of $180,000.

3. Win the trust of the target

The next step is starting a conversation with a potential victim to gain their trust. The scammers often initiate benign chats about life, family and work with an eye toward mining their targets for information about their lives that they can later use to manipulate them. They’ll fabricate details about their own life that make them seem similar to you. After all, people like people who are like them.

When a Houston woman revealed that her brother was born with cerebral palsy, a crook countered with a similar-sounding tale:


4. Sign them up

Before long, the swindlers will pivot to a discussion of investing. They’ll make claims about their own purported investing successes, perhaps sharing screenshots of a brokerage account with gaudy numbers in it. They’ll try to convince targets to open an account at their online brokerage. Unbeknownst to the target, the brokerage is a sham, and any money deposited will go straight to the scammer. Most victims don’t figure out that last part until it’s too late.

5. Get them to put real money into the fake account

Once marks agree to learn investing tricks, the scammers will “help” them with the investment process. The fraudsters will explain how to wire money from their bank account to a crypto wallet and eventually to the fake brokerage. Typically the fraudster will ease the process by recommending a modest initial investment — which will inevitably show a gain.


A woman in Michigan became intrigued by her online boyfriend’s references to making money trading gold and offered to become his student. Two days later, he was teaching her how to get started investing in a fake brokerage accessible through MetaTrader:


6. “Prove” that it’s legitimate

Scammers often allay initial doubts by letting targets withdraw money once or twice to convince them the process is trustworthy. For example, fraudsters allowed a Canadian man named Sajid Ikram to withdraw 33,000 Canadian dollars, according to a statement he filed with the Royal Canadian Mounted Police. That returned money helped convince him that his investment was real. He reported ultimately losing nearly $400,000, including money borrowed from several friends.

7. Manipulate them into investing more

That’s only the beginning. Pig butchering guides offer insights on how to exploit marks’ emotional and financial vulnerabilities to manipulate them into depositing more and more funds. It starts with assurances that the investments are risk-free, then escalates into pressure to take out loans, liquidate retirement savings, even mortgage a house.

Over a period of nine days, one scammer (who called herself Jessica) escalated her pressure, pushing the target, a California man, first to use his cash on hand, then to tap his retirement savings, then to borrow money.


8. Cut them off

Once targets reach a limit and become unwilling to deposit more funds, their seeming investment success comes to a sudden stop. Withdrawals become impossible, or they suffer a big “loss” that wipes out their entire investment.

The California man was aghast when he discovered $440,000 he’d deposited was gone. Ultimately, the swindler persuaded him to invest another $600,000, which also disappeared into the swindler’s account.

Scammers will then turn the screws of manipulation tighter by telling victims there’s a potential solution: If they deposit more cash into the brokerage, they can regain what they lost. Sometimes, the claim is that the investment is successful — but there’s a “tax problem” that requires paying additional funds equal to, say, 20% of their total account value. If the victim pays, the scammer will claim that new obstacles have arisen that require paying new fees.

No matter how much targets pay, it’s never enough, as detailed in the FTC complaint excerpted below, which was filed by a pig butchering victim in Maryland. This person lost almost $1.4 million, in part because the person kept meeting scammers’ demands to pay taxes and various fees to get their money back:

“Once the trading has ended, I applied to withdrawal my money and profit from the website. The broker asked me to pay a tax on the profit of 88,587.90 usd on 8162021, this amount was wired again through Bank of America into a foreign account in Hong Kong. Another request for me to pay security deposit on my profits which was 83,950.00 usd wired out to a different foreign account in Hong Kong once again. The broker asked for a bank and withdrawal processing fee of 27,983.34 usd again was wired out to a different foreign account in Hong Kong. The very last wire was for expediting the withdrawal and the platform asked for 55,966.60 usd wired out to Hong Kong. At this point I already had to much money in the platform so I kept giving in.”

10. Taunt and depart

Once the targets are aware that they’ve been swindled, the fraudsters often insult or taunt them. They soon go silent, and the websites of their phony brokerages stop working. Then they relaunch a new website under a different URL and restart the process with other targets.

After nearly four months of chatting and $30,000 in losses for the Michigan victim, her scammer seemed to revel in unveiling the financial — and emotional — deception:


Ways to avoid holiday scams

  • Verify a retail website or person is legitimate
  • Use the Better Business Bureau’s website (www.bbb.org) to investigate retailers
  • Scrutinize things sold at significantly discounted prices
  • Make sure the site you buy from has "https" in the web address, otherwise your personal information is not safe
  • Beware of sites that require payment with a gift card.
  • Don't give someone your credit card information through unsolicited emails, don't click on links or reply in unsolicited emails
  • Routinely monitor your credit card statements
  • Verify requests for personal information by contacting them using the information on their website
  • Use strong passwords with banking, credit card and rewards accounts, change passwords regularly
  • What to do if you're a victim of a scam
  • Immediately contact your bank and stop transactions if you discover fraudulent or suspicious activity
  • Ask your bank to call the financial institution involved in the suspicious transaction
  • Report to the Internet Crime Complaint Center at IC3.gov


Monday, December 12, 2022

How To Become A Private Investigator: Skills, Salary And Job Outlook


Several pathways can lead to a career as a private investigator (PI). Typically, the best candidates have prior professional experience in law enforcement, law or the military, but prospective private investigators can also take other steps to open up and increase job opportunities in the field.

This article outlines how to become a private investigator, including common requirements for education, training, licensure and work experience. We also overview the top skills needed to excel in this role.


What Is a Private Investigator?

Private investigators’ clients include individuals, attorneys, businesses and organizations. Their services can range from gathering and analyzing critical information on personal, financial and legal matters to performing background checks, assisting with searches for missing persons and conducting surveillance.

The daily tasks of a private investigator can vary widely depending on the case. Typical duties may include the following:

  • Conducting interviews
  • Conducting thorough searches of computer databases, public records and other resources to compile critical information for investigations, missing person cases and other cases
  • Performing personal background checks, such as pre-employment checks, to acquire pertinent information regarding an individual’s personal history and financial status
  • Gathering and analyzing evidence for clients
  • Writing reports or case summaries

How to Become a PI

Depending on the jurisdiction and state in which you work, the steps to becoming a private investigator can vary. It’s essential to research state-specific private investigator requirements to determine the best course of action. However, most PIs follow the below below to progress in their careers.


Receive an Education

Each state sets its own requirements for PIs; however, at a minimum, most employers require candidates to have a high school diploma or GED certificate. It’s becoming more common for employers to require applicants to hold an associate or bachelor’s in criminal justice, criminal law, criminology, political science or a similar discipline.

Completing postsecondary education and earning a degree in a relevant field can help expand your job opportunities as a PI.


Complete Training

Working as a PI requires a diverse skill set, so training is an essential part of this profession. Many employers provide on-the-job training. Training requirements can vary depending on the position and your prior professional experience. Training may cover the following:

  • Techniques and procedures for conducting interviews
  • Strategies for collecting and evaluating evidence
  • Accident scene reconstruction methods
  • Surveillance techniques


Gain Experience

Gaining relevant hands-on experience can help aspiring private investigators develop the skills needed to perform the day-to-day tasks of this role successfully. Most public investigators have a background or prior professional experience in law, law enforcement or the military.

Enrolling in a criminal justice, criminal law or criminology program can help aspiring PIs gain foundational knowledge and skills for this profession. Some programs offer internship opportunities that allow students to gain hands-on experience.



Earn Licensure

Each state has its own licensure requirements for private investigators. Most states require PIs to obtain licensure, which often entails meeting specific educational and professional work experience criteria and passing an examination.


Consider Certification

While private investigator certifications are not required for this career path, certification can help validate your skill set and knowledge. Below are two professional credential options that private investigators can pursue.


Certified Legal Investigator (CLI)®

The National Associate of Legal Investigations (NALI) offers the Certified Legal Investigator certification. The CLI is a professional board certification that validates private investigators’ knowledge, skills and experiences through rigorous examination, oral ethical testing, statement-taking, role-playing and white paper authorship. To become a CLI, applicants must meet the following requirements:

  • Be employed by public defenders’ offices, law firms or privately owned investigative firms.
  • Meet your state’s licensure requirement.
  • Have at least five years of professional experience working as a legal investigator. Alternatively, applicants can substitute one year of work by completing 90 quarter hours or 60 semester hours at an accredited university or college.
  • Submit a white paper on any investigative topic. The paper must be at least 1,000 words. Applicants must submit the white paper at least 30 days before the exam.
  • Submit the fee and application no later than 30 days before the exam.
  • Agree to earn continuing education credits and submit reports of compliance.

You can visit NALI’s CLI requirement page for the most up-to-date certification requirements.


Professional Certified Investigator (PCI)®

ASIS International offers the Professional Certified Investigator certification, which demonstrates certifiable knowledge and specialized skills in security investigations. These skills include case evaluation and management strategies, the ability to collect valuable information through surveillance, interview techniques and interrogation strategies.

Eligibility requirements for the PCI certification include the following:

  • Three to five years of investigations experience (depending on your education level) and two years of case management experience
  • Have been employed full time in a security-related position
  • Have not been convicted of any criminal offense that would reflect poorly on profession, organization and certification program
  • Sign and agree to comply with the ASIS Certification Code of Conduct
  • Agree to adhere to the ASIS certification programs’ policies, which can be found in the ASIS International Board Certification Handbook 

You can visit ASIS’ eligibility requirements page for the most up-to-date information regarding PCI certification requirements.

To become certified, you must pass the PCI exam, which consists of 125 scored multiple-choice questions. The exam may also feature 15 randomly distributed, unscored pre-test questions, creating a total of 140 exam questions. Test-takers have 2.5 hours to complete the exam, which covers tasks, skills and knowledge in three primary domains: case management, investigative techniques and procedures and case presentation.

The PCI exam contents outline provides an overview of the specific tasks and areas of knowledge included in the exam.


Top Skills for Private Investigators

Private investigators need a diverse skill set that includes hard and soft skills. Below are just a few essential skills PIs need to fulfill the demands of the role.


Communication

Written and verbal communication is an integral part of private investigative work. PIs must conduct interviews, speak to family members of missing persons, collaborate with police officers and other law enforcement professionals and present their findings in court, which necessitates strong verbal communication skills. It’s critical for PIs to ask concise, straightforward questions and actively listen during these processes.

Not only do PIs need to communicate clearly and effectively, but they must also ensure they’re being considerate and compassionate toward individuals who may be going through difficult situations.

Private investigators are also responsible for documenting investigations, which entails writing and filing detailed case reports.


Patience

Private investigation involves many processes and procedures, requiring consistent effort, persistence and patience. These processes can prolong the duration of an investigation. Although a PI’s instinct may be to solve an assigned case as quickly as possible, it can take time to generate leads, perform surveillance, gather and analyze concrete evidence and solve cases.

Resourcefulness

PIs have access to a wide variety of resources. They must make full use of the information and tools available to them, such as public record databases containing driving records and criminal records, to efficiently solve cases.


Legal Knowledge

It’s essential for private detectives to have a strong foundational knowledge of local, state and federal law. Since private investigators are not considered law enforcement, it’s critical to understand the applicable legal parameters and constraints to ensure you’re not infringing on criminal or privacy laws. If evidence is collected unlawfully, a court can reject it, and it can even be prosecuted.


Computer Literacy

Private investigators use computers, surveillance equipment, GPS trackers and other technology in their day-to-day operations. Often, PIs must navigate through data banks and databases to collect pertinent information and evidence.


Private Investigator Salary and Job Outlook

The U.S. Bureau of Labor Statistics (BLS) reports that private investigators’ median salary is $59,380 per year. The BLS projects employment opportunities for private detectives and investigators to grow 6% from 2021 to 2031.


Frequently Asked Questions (FAQs) About How to Become a Private Investigator


Can you make a lot of money as a private investigator?

The BLS reports the median annual salary for private investigators as $59,380. Many PIs are self-employed, which allows them to negotiate their pay rates with their clients. Several factors can impact salary, including location, level of education, certifications and professional work experience.


How long does it take to become a private investigator in California?

At a minimum, it can take between two and four years to become a private investigator in California. This timeline includes the three years of compensated work experience required to qualify for California’s private investigator license or the time it takes to earn a law degree or bachelor’s in political science.


By Michelle Jones 

Forbes Advisor

Saturday, December 10, 2022

BBB: Don’t get bitten by online ‘puppy scams.'

Davis Enterprise 

        


























































































BYLAUREN KEENE
DECEMBER 9, 2022




With the holiday season underway, the Better Business Bureau issued a recent warning about “puppy scams,” which historically comprise about a fourth of online shopping frauds. 

“Puppy scams remain consistently profitable for scammers because their multi-tiered setup allows them to convincingly go back to a consumer several times to ask for money,” the BBB reported in a news release. 

“Because purchasing a pet can be such an emotionally charged experience, BBB urges consumers to be on high alert for scams.” 

California ranks first nationwide in online puppy-scam activity, with 167 reports totaling more than $130,000 in financial losses filed between Jan. 1 and Oct. 31 of this year, according to the website Veterinarians.org.

Many of the bogus websites appear and vanish quickly, making them difficult for authorities to track and prosecute. 

And while consumer losses across North America are on the decline, they’re still expected to exceed more than $2 million this year, with an average loss of about $850 per case, says the BBB.

The American Society for the Prevention of Cruelty to Animals (ASPCA) already cautions against giving pets as holiday gifts, recommending it only for those expressing a “sustained interest” in owning and caring for a pet responsibly. 

We also recommend that pets be obtained from animal shelters, rescue organizations, friends, family or responsible breeders — not from places where the source of the animal is unknown or untrusted,” the ASPCA’s website says. 

According to the BBB, puppy scammers typically lure in their victims with fake websites and promises of cute puppies, then seek additional money for add-ons such as shipping costs or special crates. 

Yorkies, dachshunds and French bulldogs account for nearly 30 percent of the scams, although victims mentioned more than 40 different breeds when filing reports with the BBB, “meaning that buyers should be cautious when shopping for any breed online.”

Those who try buying pets without seeing them in person, use hard-to-track payment methods such as payment apps and accept extra charges such as shipping insurance or special cages are at more risk of being scammed, the BBB says. 

The BBB offers the following tips for researching online puppy sellers:

  • See pets in-person before paying any money.
  • Try to set up a video call to view the animal.
  • Conduct a reverse image search on photos attached to ads.
  • Research the breed to figure out the average market price.
  • Check out a local animal shelter for pets to meet in person before adopting.

If you’ve fallen victim to a puppy scam, contact the following organizations for help: 

  • BBB Scam Tracker (www.bbb.org/scamtracker) to report online fraud.
  • Federal Trade Commission (FTC) at reportfraud.ftc.gov to file a complaint online, or call 877-FTC-HELP.
  • Your credit card issuer – Report the incident if you shared your credit card number, even if the transaction was not completed. Monitor your statements and request a refund if you suspect fraud.
  • Petscams.com (petscams.com/report-pet-scam-websites) which tracks complaints, catalogues puppy scammers and works to shut down fake pet-sales websites.

Meanwhile, in pet-gifting situations, the ASPCA suggests the recipient have a flexible schedule that allows for the pet’s easy transition into the home, “especially important during the holidays and other busy times,” the website says.