The National Epidemic of Identity Theft

Tick Toc, Tick Toc… two seconds have gone by and statistically there is a new identity theft victim (ITV). ITV is a National epidemic; many experts agree that Globally we are three times more likely to fall victim to identity theft as Americans. To put this in perspective, next time you are shopping at your local mall, look around you and pick 14 people. Then you use your psychic superpower and determine that they have not fell victim to Identify fraud. You look at yourself and realize it is you that have fell victim to Identity theft because 1 out of every 15 Americans have their Identity stolen. Unlike lightening Identify theft can strike more than once, one in five Identity Theft Victims (ITV) revisit that vulnerability of being a victim of theft. Did you realize that millions of children, and family members who have passed are also victims of Identify theft? The Elderly is one of the most common targets of Identity Theft. So much so many State Laws upgrade crimes against the elderly in an attempt to deter crime.


Prevent being an ITV by applying best practices:
Protecting personal data
Computer Practices
Use a firewall and secure browser.
Don't download files from strangers.
Update current virus protection.
Password-protect any personal or financial information.
Avoid automatic log-in processes (which store your account name and password).

Passwords:
create secure random passwords
use different passwords for different accounts
Do not write them down in accessible areas to view.
Shred bills and documents with personal information.
Take prescription labels off the bottles before you discard them.
Social Media (SM) awareness – people can harvest information from your SM account(s)including but not limited:
Age and or dates of birth
Pets names
children’s names
Names of School you attended
Some of that information noted above may be used as your security questions. Control your settings and your content.
Phone calls- Do not give personal information over the phone unless you are sure the call is legitimate. If someone asks you to verify information, ask them to give you the information if you are comfortable verify it and do not add additional information.
What do I do if I become a victim of Identity theft and Fraud?
If your Social Security number was used to file a tax return to the IRS:
IRS TAX FRAUD WEBSITE
https://www.irs.gov/newsroom/taxpayer-guide-to-identity-theft

Identity Theft Contact Information for CREDIT REPORTING AGENCIES
https://www.transunion.com/fraud-alerts
https://www.experian.com/fraud/center.html
Experian: www.experian.com to add an alert and view your report immediately; 1 888 397 3742.
Equifax: 1 800 525 6285, www.equifax.com.
TransUnion: 1 800 680 7289, www.transunion.com.
Credit Reporting Agencies (For a family member that has passed)
Immediately contact all three national credit reporting agencies by telephone to report the death: Experian (888-397-3742), Equifax (800-685-1111) and TransUnion (800-888-4213). Request the credit report is flagged as “Deceased. Do Not Issue Credit”
Sample letter- http://www.meyercapel.com/sites/default/files/Notification-of-Death-Sample-Letter.pdf


When reporting the Identity Theft (Fraud)to the Police
As a Detective Supervisor (OIC) working for Sheriff Donald Fleming at Flagler County Sheriff’s Office Economic Fraud Division. I was surprised to see how little the Police and Prosecutors know about Fraud, identity theft Investigations, and theft schemes.
Tips from me when talking to the Police
If you are elderly report the crime with a competent family member.
Do not assume that a uniformed Police Officer will know how to navigate your incident at first or even designate it as a crime. In most jurisdictions you can ask the officer to make an Information Incident Report if the Officer doesn’t classify the event as a crime.
Come prepared and provide a timeline with a chronology of events that include:
Dates / Times, Places of the incidents and other case related information (credit card numbers, statements, etc.)
When and who you spoke to at the bank and or credit card companies. Provide their full names/ titles, phone numbers, emails and other contact information. Also provide a brief account of what was said.
When the Police ask you questions answer the who, why, when how and why if applicable.
Get the officer’s full name (s), phone numbers and email addresses when possible.
Ask the officer what you can do to help yourself.
Ask them what is the Detective’s name that will be assigned to your case and if he/she will be contacting you and when.
Do not give them unrelated information or spend time on the phone talking with them about things other than the case.


Summary
Tick Toc, Tic Toc two seconds have gone by and statistically are you going to be a victim of identity theft (ITV)? Be vigilant to prevent and terminate your vulnerably to identify theft fraudsters. In addition, be tenacious during the process. Understand it will take time to reverse the financial injury.


John Gaspar, B.S., M.S., C.F.E., C.S.T
A2800136 B1400220 C8700342 D1631055 G 1703613 MB1500122 National Firearm permit under HR218
Florida Justice Administration Commission (JAC) Investigator
Board Accredited Investigator-BAI Program Director
Board Member for Florida Association of Private Investigators
Florida Association of Private Investigators List -serve Moderator
www.afipi.com jgaspar@afipi.com
Phone: 1-888-697-3478 Facsimile: 386-845-9265

John Gaspar

Additional attribution
https://www.acfe.com/
https://www.acfe.com/article.aspx?id=436
http://www.leg.state.fl.us/statutes/

Decrypting the Interrogation Process: Balancing Quality and Efficiency

BY ANTHONY J. LUIZZO AND JOHN M. GASPAR

March/April 2020 | www.pimagazine.com

DEFINITION OF INTERROGATION

An interrogation is analogous to essentially peeling back an onion layer by layer on people’s lives, places and/or things. Seasoned sleuths systematically probe and draw out information from willing and/or unwilling individuals by asking precise and trenchant questions to test the validity of information. An interrogation is quite different from an interview in that the interviewee is often directly or indirectly connected to the incident under review. Further information on interviewing can be found in a November/December 2019 article by the undersigned: “Demystifying the Investigative Process” – PI Magazine. Prior to performing an interrogation, investigative sleuths normally spend countless hours following leads and testing theories before walking into the interrogation room armed with a strong cross-examination strategy.

SPECIAL VIRTUES THAT ALL GOOD INTERROGATORS POSSESS

Good interrogators are taught to always remain composed, never interrupt and/or disrupt the ebb and flow of the interrogation, listen twice as much as talk, never be afraid to leave the land of the familiar for the land of the unfamiliar, and always shine a bright light on inconsistencies. These and other attributes help to make a solid soldier in the war on criminality.

DIFFERENCE BETWEEN LAW ENFORCEMENT AND PRIVATE SECURITY INTERROGATION?

Law enforcement interrogators must follow strict legislative requirements, including Mirandizing interviewees when setting out to perform an official interrogation, whereas private security interrogators have fewer legislative restraints placed upon them. According to the Encyclopedia Britannica: interrogation, in criminal law involves questioning by police to obtain evidence. Private investigators also have the power to interrogate suspects but lack the power to compel testimony or detain witnesses and are not required to Mirandize suspects. Consequently, private investigators can be more creative in their efforts to legally extract truthful information from unwilling witnesses and suspects during interrogations. Differences do exist, however, in the way an interrogation is conducted. Police normally have the benefit of extensive resources far beyond what their private counterparts have, such as access to criminal reports, subpoena process, crime labs, video footage, etc. Moreover, they can take their investigation to another jurisdiction(s), including state and federal task forces, and share information. Private security interrogations do not enjoy the enormous resources that their counterparts have at their disposal. The big difference between conducting a police interrogation versus a private security interrogation is that private security interrogators do NOT have to advise the persons of interest of their constitutional rights—an exception may be if the interrogation is being performed on behalf and/or promoted by the law enforcement.

WHAT ARE THE OBJECTIVES OF AN INTERROGATION?

Plain and simple, the objective of an interrogation is to gather and test the validity of information. The investigator(s) working the case need to:

1. Learn the facts and develop the evidence

2. Extract truthful information from reluctant, evasive, lying or hostile witnesses

3. Decipher the plan or conspiracy

4. Identity possible suspects, accomplices or conspirators

5. Obtain corroborating testimony, supportive evidence and admissions of guilt or confession

6. Recover purloined fruits of the criminal enterprise

7. Establish guilt or innocence of the suspect(s) being interrogated

8. Obtain written, audio statements, admissions or confessions

9. Ascertain related evidence, such as hideouts, weapons, gang affiliations

10. Locate and catalog all case-related evidence

THE ABCs OF SELECTING INTERROGATORS

Selecting the right person to perform an interrogation begins and ends with EDUCATION, PERSONALITY, AND TEMPERAMENT. Specifically, the person must be inquisitive, possess an excellent moral compass, embrace truthfulness, retain excellent interpersonal skills, and enjoy laboring in criminological career surroundings. All interrogators should have the ability to:

• Pay attention to detail

• Conduct independent research

• Examine physical evidence

• Decipher human motive responses

• Solve problems

• Listen intently

Further guidance can be found in an excellent criminal justice degree school guide: “How to become a criminal investigator” https://www.criminaljusticedegreeschools.com/criminal-justice-careers/criminal-investigator/

PREPARING THE PRE-INTERROGATION CHECKLIST

Before conducting an interrogation, it’s critical that interrogators prepare a needs assessment checklist to ensure that the interrogative exercise goes off without a hitch. One of the most important attributes that an interrogator needs to bring with him or her into the interrogation room is patience. Other  considerations include:

• Framing an appropriate game plan

• Selecting the right interrogation site

• Arranging room furniture, lighting, water glasses, ashtray

• Allowing ample time for the interrogation

• Devising an appropriate questioning strategy

• Outfitting the room for audiovisual serviceability

• Ensuring that note-taking does not interrupt the ebb and flow of the interrogation

ARRANGING THE INTERROGATION ROOM FOR OPTIMUM EFFECT

The physical layout of an interrogation room should be designed to maximize a suspect’s discomfort and their overall sense of powerlessness from the moment he or she steps into the room. The room should have video/audio capability and related signage announcing that the session will be recorded. The room should be a small soundproof chamber with limited seating and bare walls, and the interviewee should never be physically seated near light fixtures or thermostats. Additional information on interrogation logistics can be found in an excellent book Criminal Interrogation and Confessions by F. Inbau, et el: Abe Books – 1967.

HOW IS AN INTERROGATION PERFORMED?

In general, an interrogation takes place in a formal interview room and is often tape-recorded. It’s important to note that a video recording is always preferred over a non-video session. For the most part, the seating should be comfortable, and the chairs positioned for a face-to-face confrontation. It’s important that the interrogator not stand over the interviewee so as not to make him or her feel intimidated. The interviewee should be offered a cold beverage and/or food and advised of where the restroom is located. Prior to beginning the interrogation, an interrogation schematic needs to be prepared. Interrogation schematics often include the who, what, when, and where of the incident under review. It is said that “doing one’s homework helps to ensure success of any and all undertakings.” Further information on interrogation and process can be found in an excellent book by Rod Gehl and Darryl Plecas, “Introduction to Criminal Investigation: Process, Practices and Thinking” – Justice Institute of British Columbia Press: August 1, 2017.

UTILIZING INTERPRETERS

It’s always a good idea to have a certified non-partial bilingual interrogator available to perform the interrogation. If an interpreter is required, however, it’s important to make sure that all communication is between the interrogator and the interpreter, and not between the interviewee and the interpreter.

WHAT IS SOCIAL MEDIA HARVESTING?

Social media harvesting is a way to collect data unobtrusively and automatically from social media platforms, such a Facebook and the like, by employing simple programming tools to extract relevant messages from these platforms for various research purposes. Data harvesting, as its agricultural name suggests, is like gathering crops because it involves collection and storage with the expectation of future reward. Data can be harvested in different ways, ranging from simple copy-and-pasting to more complicated programming strategies. Media mining is the process of obtaining data from social media sites and the internet. There are many social media research companies available to investigators. The prices of these services range from $5 to $500.00.

WHAT IS A FORENSIC INTERROGATION?

A great many private investigative firms are called by major corporations to perform financial investigations. Company X believes they have a financial loss problem. Oftentimes, these specialized investigations require specialized audit-related investigative expertise that not all private investigation firms offer. Over the past forty years, however, private investigators and accounting professionals began working and training together to perform these specialized forensic investigative assignments. Looking back at the evolution of forensic auditing and investigations, it was not until the savings and loan crisis of the 1980s and 1990s hit businesses smack in the pocket that forensic audit investigation made its official debut. In response to the hue and cry from business to do something, professional organizations specializing in fraud examination began making their debut. One such organization, the Association of Certified Fraud Examiners, began cross-training security and accounting professionals to find fraud forensically.  Further information on how investigators and accountants often work together on a financial investigation can be found in an article co-authored by the undersigned, “Team Partners in Fraud Detection” (October 1992) The CPA Journal. The article crystallizes how these new team fraud fighters go about conducting a forensic audit investigation. It’s important to note that, as of today, forensic accounting professionals’ number in the tens of thousands.

WHAT ROLE DO BACKGROUND CHECKS PLAY IN AN INTERROGATION?

As a matter of course, once the interrogation is completed, it’s time to commence verifying the information gleaned from the interrogation. Beyond reaching out to verify persons, places and locations, etc., the tool often used to assist interrogators in ascertaining information accuracy about individuals is the background check. According to an excellent article featured in Good Hire -- https://www.goodhire.com/blog/complete-guide-to-background-checks “The Complete Guide to Background Checks,” a background check, simply put, is a process a person or company uses to verify that a person is who they claim to be. The purpose of a background check is to furnish helpful information about a person’s history. Additional information on performing due diligence and background checks can be found in an article written by the undersigned, “Background Checks: A Diagnostic Tool to Decipher Deception”: (2014) Journal of Healthcare Protection Management – Vol. 30., No.2, pp 57-65.

CONCLUSION

Conducting an interrogation is a five-phase undertaking.

1. Phase one - selecting the right interrogator

2. Phase two - selecting the right interrogation facility

3. Phase three - selecting the right interrogative game plan

4. Phase four – selecting the right question/note taking strategy

5. Phase five – selecting the right interpreter arrangement

The information herein is intended to offer a road map for security administrators to follow when formulating interrogation policy. Seasoned security administrators instinctively know that programmatic success is never permanent and only rented and should always be on the lookout for skilled artisans to shepherd their institution’s interrogative exploits!

REFERENCES:

Luizzo, A. & Gaspar J. “Demystifying the Investigative Process” PI Magazine – November /December 2019 pp. 6-9. “How to become a criminal investigator” https://www.criminaljusticedegreeschools.com/

criminal-justice-careers/criminal-investigator/

Inbau, F. et el: “Criminal Interrogation and Confessions” Abe Books – 1967.

Gehl, R. & Plecas, D. “Introduction to Criminal Investigation: Process, Practices, and Thinking” Justice Institute of British Columbia Press – August 01, 2017.

Luizzo, A & Calhoun C. “Team Partners in Fraud Detection” CPA Journal – October 1992.

Good Hire: The Complete Guide to Background Checks” https://www.goodhire.com/blogcomplete-guide-to-background-checks

Luizzo, A., et el: “Background Checks: A Diagnostic Tool to Deciphering Deception”

Journal of Healthcare Protection Management – Vol. 30., No. 2. pp. 57-65 – 2014.

Anthony J. Luizzo, PhD., CFE, CST, PI (ret. NYPD) is a member of the board of advisors of Stage One Screening Solutions, LLC & Vault Verify, LLC. He was a former Detective Specialist with the New York City Police Department and held senior executive security positions with the NYC Mayor’s Office of Economic Development and NYC Health & Hospitals Corporation (largest public healthcare system in the united states). He is the past president of the Society of Professional Investigators and former elected eastern region governor for the Association of Certified Fraud Examiners and founding member and president emeritus of the New York Chapter: Association of Certified Fraud Examiners. He is a former editorial advisory board member: Reuters/ WG&L/RIA Group – Thomson Publications.

John M Gaspar, B.S, M.S, CFE, BAI CSI is a licensed private investigator in the State of Florida. Presently, the President of All Florida Investigations & Forensic Services, Inc. He is a former President of the Society of Professional Investigators (SPI), current board member of FAPI, Intel Net Education Board BAI program Director , former Keiser University Academic Dean & Department Program Coordinator for CSI, St John’s University adjunct professor C.J, Bethune Cookman University adjunct professor C.J, retried Daytona State Colleges Adjunct Professor and FDLE Instructor for advanced and specialized courses. John is a retired NYC Detective working in Major Case Squad, Retired Flagler County Florida Detective Supervisor in charge of the Economic Crime Division. He has written curriculum for FDLE, NYPD, Keiser University Daytona State College on Criminal & Crime Scene Investigations. John’s published works include: Fraud Magazine November/ December 2013 Volume 28,  the “Shutter Bug case” ($800,000 Construction Fraud Scheme), and Co-authoring “Demystifying the Investigative Process” -PI Magazine November/ December 2019.

Demystifying the Investigative Process

Published in PI Magazine - Nov/Dec 2019

Generic definition of an interview

Over the years, many investigators have come up with several generic definitions for the investigative exercise. Our definition: “an investigation is the medium through which facts are discovered, gathered, preserved and prepared as evidence for legal proceedings”.

The difference between an interview and an interrogation?

An interview is a leisurely conversation with a person of interest which can elevate to a fact finding excursion where warranted. An interrogation is a probing conversation with normally unwilling or unknowing subjects to extract secretive information. The primary objective of the interrogation is to obtain incriminating evidence and ultimately get to the truth of what happened.

A window into the investigative process

One of the tenets of the investigative process is to gather as much pertinent information as possible during the interview. Oftentimes the interview is analogues to a written play and the interviewer and interviewee are the lead actors. The interplay between both are analogues to a well-rehearsed symphony wherein the interviewer tries to marry the apparently connected to the unconnected and the interviewee tries to either answer the questions forthrightly or attempt to dance around the truth. The investigative process follows the universal academic learning model: “assess the facts, criticize assertions, and integrate conclusions”. From the business perspective, private investigators often term this exercise “connecting the dots” or “pealing the onion”. As the layers of the onion are pulled back the onion begins to reveal its true nature.

Whether performing a law enforcement or business-related interview/interrogation, it’s most important to always come to the interview or interrogation prepared. Being prepared includes but is not limited to:

• using control type questioning – a control question is an incident-related query intended

to elicit a psychological response

• observing kinetics

• establishing rapport

• controlling the flow of the interview

• allowing uninterrupted dialogue

• keeping an open mind

• following the facts wherever they may lead


Investigative experts instinctively know that active listening is the fulcrum upon which effective interviews are constructed. Often the interviewee is ready and able to tell what he or she knows, and interviewers should always allow him or her to tell their story uninterrupted. At times, interviewees are not interested in cooperating and in these instances the interviewer needs to wear two hats and try to conduct both the interview and interrogation in one session. This takes tremendous skill and should only be performed by seasoned sleuths. The interrogation on the other hand, is a formal session designed to elicit a confession of guilt and involves probing and extracting information from an unwilling subject by asking trenchant questions. The objective is to seek evidence and an admission of responsibility or guilt. The interviewer needs to leave the impression that the incident at hand has already been solved and that the interviewee is somehow involved.

Interview types:

Initial Interview – identifies the circumstances surrounding the incident, lists possible witnesses/suspects, catalogs physical evidence and classifies the incident as a crime, civil event or as an informational report.

Canvas Interview- is usually completed as a follow-up to the initial interview and involves canvassing of neighborhoods, searching out witnesses and following any and all possible leads. Oftentimes these canvasses are door to door inquires of residences, business establishments, bus stops, delivery carriers (Federal Express, USPS, Parcel Post etc.,) and transportation companies (Uber, taxi cabs, car services, buses). In many instances the canvasser is searching for evidentiary materials including: video camera footage, eye or ear witnesses, or any related information that can shine further light on the incident under scrutiny.

Victim Interview – often involves searching for the who, when, why, how and where of the incident.

Witness Interview - the object of these interviews is to obtain eye-witness information from a wide variety of locations (stores, apartment complexes, shopping malls, etc.) captured during the initial interview leading to sketch characterizations and other evidence-related exhibits.

Suspect Custodial Interview – is defined as the questioning of a person regarding their involvement or suspected involvement in a criminal offence or offences. As a matter of course, suspect interviews are performed by law enforcement officers as part of their regular criminal justice process.

Non-Custodial Interview: these interviews are usually performed by private security personnel and are fact finding exercises. In this type of interview its important that the interviewer establishes rapport with the interviewee and ensures that the interviewee is comfortable and relaxed.

National vs. international investigative considerations

In a June 1995 article by the undersigned “Investigating in a New Environment” – Security Management Magazine discusses the unique differences associated with performing investigations in foreign lands. It’s important to recognize that performing investigations and conducting interviews and interrogations abroad could be a perilous episode indeed. Seeing that many corporations have multi-national footprints, the way interviews and interrogations are performed internationally should be carefully researched.


First and foremost, it’s imperative that investigative professionals entering these markets understand that they pose a markedly different and sometimes dangerous, cultural and legal landscape. Many issues that are taken for granted in domestic investigative interviewing and interrogating exercises must be addressed in the context of the host country’s political, legal, and cultural climate. One of the most important issues that needs to be researched before commencing to interview and/or interrogate anyone is to seek legal counsel and checkout the host country’s legal system thoroughly. Every country has its own legal system, which affects all aspects of the criminal and civil justice process, including security and investigations. These systems vary greatly from country to country.


Permissible investigative approaches in Mexico, for example may be prohibited in France. Protections that are taken for granted in the United States pertaining to search and seizure, self-incrimination, Miranda Warnings, interview taping, etc. most likely are quite different than our justice system requirements. The major exceptions to this rule are the United Kingdom and India. The U.S. legal system, of course is an outgrowth of the English common law system, and many of the principles of the American justice system apply therein. Beyond the legal system, its equally important that the investigative specialist become extremely familiar with the host country’s culture and language. It’s also important that the investigative professional read as much about the host country as possible before endeavoring to jump in and perform any due diligence excursions.

Aspects of preparing for the interview / interrogation: the homework phase

The key to ensuring success is to be prepared. A successful interview and/or interrogation begins and ends with getting all your ducks in a row before beginning the exercise. Before contacting a witness or the subject of an investigation, whenever possible, review police / civilian reports, CSI reports, do comprehensive background/ social media searches, (CAD) computer assisted dispatch reports on the subject and location. When possible talk directly to the responding officers and/or interested parties to obtain detailed accounts of the incident. Finally, it’s most important that the interviewer determine whether one party or two-party consent is required for electronically taping potential proceedings. This is especially important if electronic taping is to become part of the investigative envelope.

Preparing for the interview:

Interview tips:

• pre-plan interview questions

• put the interviewee at ease-develop a rapport

• structure interview questions so that they are easily understood

• show a personal interest in the interviewee

• always keep interviews conversational

• listen carefully to verbal and non-verbal dialog

• refrain from interrupting the interviewee

• determine information requirements before beginning the interview

• schedule interviews at the time of the day when you have the most personal energy

• select an interview location free from distractions

• always allow ample time to conduct the interview

• always maintain control of the interview flow

• try to establish rapport with the interviewee

• always accept emotive responses without criticism

• refrain from taking extensive notes during the interview – shorthand helps

• refrain from interrupting the interviewee

• always leave the door open to follow-up interviews

• obtain a written statement of facts at the conclusion of the interview

• when using interpreters, make sure that all communication takes place between the

interviewer and interviewee – not between the interpreter and the interviewee


Note taking tips:

• Refrain from trying to write verbatim responses-audio or video taping should be practiced whenever possible (in many states you need to let all parties consent to the being recorded).

• Avoid becoming distracted by your note taking

• Always preserve interview notes for future use

Shorthand note-taking suggestions:

• Q&A: question and answer

• RQ: repeat question

• RA: repeat answer

• IE: interviewee

• IR: interviewer

• IW: interview

• MVI: motor vehicle information

• PI: police information

• AKA: aliases

• MPH: miles per hour

• POB: place of birth

• DOB: date of birth

• NA: not applicable

• ID identification

• CM: crime method

• ICB: internal control break – fraud and audit term

• SSF: security system failure

• AF: audit failure - fraud audit term

• SF: security failure

• BSR: background search required


Interview methods:

1. Good Guy – Bad Guy-One interviewer attacks the interviewee – whilst the other defends

2. Role Reversal – The interviewer reverses roles with the interviewee i.e. “if you were

looking into this matter, what would you do?

Interview techniques

• Pregnant Pause – Asking a question……. pausing, this often-uncomfortable silence

creates the opportunity for the interviewee to continue conversing

• Trade Off Technique – offering a promise of helping the interviewee by suggesting that

their assistance will be taken into consideration later if necessary

• Breaking Down the Story Technique – the gradual process of obtaining the truth by

pointing out inconsistencies in the facts, thus hopefully getting the interviewee to make

broader remarks and possible admissions

• Graceful Exit Technique – Allowing the interviewee to furnish excuses for their

behavior by offering a sympathetic ear – thus keeping the door ajar for future

interactions.


Deceptive behavior traits: types of liars:

• Panic Liar – Rarely wishes to face the consequences of his or her confession

• Occupational Liar – has lied for years – it’s a way of passage

• Tournament Liar – Loves the challenge lying brings

• Ethnological Liar – taught over the years to never squeal on another

• Sadistic Liar – Will never give the interviewer the satisfaction

• Psychopathic Liar – No conscience whatsoever.


Helpful investigative hints

More astute interviewers never fail to take special notice of the clothing, jewelry, tattoo’s, accents and other personal identifiers. To the perceptive sleuth a college ring identifies schools attended, sports jackets, elbow patches and button-down shirts signify possible academician affiliation, bow ties often signify non-conformist characteristics, lapel pins showcase organization / association affiliation, and the list goes on and on. It really pays to observe!

Performing due diligence: testing information accuracy

Once the interview and/or interrogation is completed, it’s time for fact-testing. Each assertion offered during the interview and/or interrogation must be truth-tested. Witnesses must be located and interviewed, background checks and related due diligence performed, tips and leads verified, etc.

Conclusion

In the court of protection wisdom, conducting interviews and interrogations is truly both an art and a science. The art involves setting the proper environment and stage for the interview, whilst the science embodies using your observation and intuitive abilities to capture the ever-elusive truth. Interviewers spend countless hours probing, examining, researching, listening, observing and pondering before they tear a page from their “RX” pad and begin preparing their final report.

References

• Lyman: publisher Pearson 6th edition ibsn# 3-978-0-13-506057-5

https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-9-interviewingquestioning-and-interrogation/

• Luizzo, A. Van Nostrand G.: “Investigating in a New Environment” – Security

Management Magazine – June 1995.

• Luizzo, A. “Interview Vs. Interrogation”: Financial Fraud Report - Warren Gorham &

Lamont / RIA Group Reuters - Thomson Publications - December 1999.

• Luizzo, A., Calhoun, C., “Fraud Auditing: A Complete Guide”: The Foundation for

Accounting Education / New York State Society of Certified Public Accountants – 1992, Rev. 1995.

About the Authors

Anthony j. Luizzo, PhD, CFE, CST, PI (Ret. NYPD) is a member of the Board of Advisors of Vault Verify, LLC. He is a former detective specialist with the New York City Police Department’s Crime Prevention Division and held senior security positions with the NYC Mayor’s Office. He is a past President of the Society of Professional Investigators (SPI) and president-emeritus and founding member of the NYC Chapter: Association of Certified Fraud Examiners. He has written dozens of articles for professional journals and magazines and is the co-author of “Fraud Auditing A Complete Guide” a fraud detection/prevention workbook for CEOs, CFOs, and Security Administrators published by the Foundation for Accounting Education and the New York State Society of Certified Public Accountants: 1992 Rev. 1995. He is a former editorial advisory board member: Reuters/WG&L/RIA Group – Thomson Publications.


John M Gaspar, B.S, M.S, CFE, BAI CSI is a licensed private investigator in the State of Florida. Presently the President of All Florida Investigations & Forensic Services, Inc. He is a former President of the Society of Professional Investigators (SPI), current board member of FAPI, Intel Net Education Board BAI coordinator, former Keiser University Academic Dean & Department Program Coordinator for CSI, St John’s University Adjunct professor C.J, Bethune Cookman University adjunct professor C.J, retried Daytona State Colleges Adjunct Professor and FDLE Instructor for advanced and specialized courses. John is a retired NYC Detective working in Major Case Squad, Retired Flagler County Florida Detective Supervisor in charge of the Economic Crime Division. He has written curriculum for FDLE, NYPD, Keiser University Daytona State College on Criminal & Crime Scene Investigations. John’s published works include: Fraud Magazine November/ December 2013 Volume 28 the “Shutter Bug case” ($800,000 Construction Fraud Scheme).

SHUTTER SCAMMER DEFRAUDS FLORIDIANS OF MORE THAN $450,000

November/December 2013

John M. Gaspar, CFE

Case in point: Case history dissection

    © HEMERA/THINKSTOCK

It was another Monday morning at Flagler County (Florida) Sheriff’s Office (FCSO) Criminal Investigation Division (CID). On the first day of the workweek, we’d review all the crimes committed over the weekend and return to a plethora of police reports and messages from citizen and deputies.

I’ve always taken an interest in patterns of behavior. In my more than three decades as an investigator, I noticed that fraud and theft schemes were on the rise not only nationally but also in Flagler County. I believe this increase was in part because of a difficult economy, availability of prime victims and a greater chance of getting away with fraud over crimes of violence. Also, some prosecutors and detectives don’t always see a fraudster’s modus operandi as criminal in nature. Other factors include limited resources, unreasonable detective caseloads and prosecutors’ and police personnel’s lack of understanding of fraud crimes. This leaves many fraud victims without closure.

I think I looked at fraud differently than many other law enforcement investigators. Of course, I would be upset if someone forcibly pushed me to the ground and took my Casio watch (valued at $125) and $20 of U.S. currency from my wallet. However, if someone defrauded me out of US$10,000 in a hurricane shutters fraud scheme (later we would nickname it “shutter bug fraud”) I would be severely financially injured, possibly for the rest of my life.

My interest in fraud cases at the police department spurred me to be more attentive to the many potential schemes that were classified as civil and not criminal. These crimes left a trail of devastated victims in their wakes. In Florida, like most other states, larceny occurs when someone temporarily or permanently deprives someone of something of value (currency, property, etc.).

According to the ACFE’s Fraud Tree, larceny of cash is one of the main components of asset misappropriation; identifying it is a good place to start when investigating fraud. The next step is gathering information to see if there’s a pattern and hence a fraud scheme or an isolated theft.

FIRST 'SHUTTER BUG' FRAUD VICTIM

So, in 2006, I was at my desk in the police station at about 8:30 a.m. with my second cup of coffee when I greeted Mary, 76, a citizen with a problem. She had purchased shutters from a franchisee of Roll-Away Shutters in Florida. She explained that she’d filed a police report months earlier; she’d made numerous inquiries about it, but no one had gotten back to her. I pulled the report up and saw that it was marked as a civil case information report and not a crime; that was why I wasn’t aware of the incident.

One of the things I learned as a NYPD detective working out of major case squad in Manhattan is to be an active listener. You learn a lot in life by just shutting up and paying attention. So I listened to Mary as she explained that she purchased shutters from a man named Daniel Quinn through a salesman named John more than 18 months previously. They took a 50 percent deposit. The State of Florida only allows 10 percent down on a purchase unless the work is completed within a designated time.

I asked Mary questions that would help me identify if this was a civil or criminal matter. Best practices, time and training via the ACFE had helped develop a skill set that would allow me to see beyond the veneer of the initial police report and look for information that may indicate the incident may not have been civil in nature. As a CFE since 1989, I’ve been exposed to a highly qualified and dedicated community of anti-fraud experts, and I’ve shared information with them about fraud schemes.

MY INITIAL INTERVIEW WITH MARY

Q: What efforts have you made to contact Mr. Daniel Quinn?

A: I called and wrote to him on numerous occasions, and he has not contacted me.

Q: Do you have phone records?

A: I do and I’ll bring them to you.

Her phone records showed she had called Quinn more than 30 times in the previous year; each call lasted about one to three minutes each. That coincided with her account that when she had left numerous messages on Quinn’s company voice mail. It’s important to have a witness’ testimonial evidence supported by forensic evidence for a good prosecutable case.

Q: Did you ever write Mr. Quinn about this business transaction, and if so, do you have a copy of that or those letters?

A: I did, and I can bring you those letters.

Mary provided me with several letters she had sent certified return mail in which she wrote that she wanted either the job completed or an immediate refund. Quinn’s business accepted some of these letters, and others came back stamped undeliverable.

At this initial stage of the investigation, I established that this was not a civil matter and it may be criminal because any reasonable person would believe that for 18 months Mary had $2,500 less in her bank account and no hurricane shutters.

In our police department, we would distinguish a civil complaint from a prosecutable criminal complaint by identifying if:

  1. The complainant made and documented reasonable efforts to resolve the compliant.

  2. The contractor made reasonable efforts to resolve the issue and return the deposit, funds or property.


For full access to story, members may sign in here.

Not a member? Click here to Join Now and access the full article.You must be logged in to leave a comment...

Related Links

2013 CFE Exam Prep Course, US Edition 2013 CFE Exam Prep Toolkit, US Edition 2013 Fraud Examiners Manual, US Edition ACFE Fraud Casebook Bundle Bribery and Corruption Casebook Financial Statement Fraud Casebook: Baking the Ledgers and Cooking the Books Fraud Casebook: Lessons from the Bad Side of Business

Download Article

ABOUT THE ACFE

MEMBERSHIP & CERTIFICATION

EVENTS, TRAINING & PRODUCTS

FRAUD RESOURCES

CAREER

COMMUNITY

© 2016 Association of Certified Fraud Examiners, Inc. All rights reserved.

MATRIMONIAL INVESTIGATIONS IN DAYTONA BEACH, FL & THROUGHOUT FLORIDA

— John Gaspar

MATRIMONIAL INVESTIGATIONS IN DAYTONA BEACH, FL & THROUGHOUT FLORIDA

No one likes to think about a spouse being unfaithful. But sometimes the signs are too hard to ignore. Whether you need to know the truth as part of divorce proceedings or you just want some peace of mind, you can count on our licensed, professional investigative team in Daytona Beach and throughout Florida to conduct a discreet surveillance of your spouse.

THE ANSWERS YOU NEED

Our infidelity investigation services are designed to give you all the information you need to plan your next move. Our private investigators can assist you by:

·Obtaining proof of infidelity

·Searching for hidden assets

·Tracking down vehicles

·Performing electronic surveillance

We at All Florida Investigations & Forensic Services Inc understand that infidelity is a sensitive, emotional matter, and when you work with us, you'll benefit from our compassionate approach to all that we do. So if you need answers about your spouse, it's time to enlist our help. Call today for more information or to schedule a consultation.

Child Custody Investigations in Daytona Beach & Throughout Florida

CHILD CUSTODY INVESTIGATOR IN DAYTONA BEACH, FL & THROUGHOUT FLORIDA

If there's been custodial interference and your child has been taken by your spouse, allow All Florida Investigations to assist you to find your child.  We will work hand in hand with local authorities to ensure that your child is returned safely and your spouse prosecuted.

As a parent, you want to make sure that your child is being taken care of properly. But sometimes it can be difficult to gauge how your child is faring when he or she isn't under your roof. Whether you're going through a divorce or are already involved in a child custody dispute, our compassionate, dedicated team in Daytona Beach and throughout Florida is on hand to serve you. We offer thorough, dependable child custody investigations designed to give you the answers and peace of mind you need and deserve.

YOUR CHILD'S BEST INTERESTS IN MIND

At All Florida Investigations & Forensic Services, Inc. we understand that matters relating to child custody are both sensitive and emotional. We also know that a lot is riding on the information we're able to gather and provide. After all, nothing is more important than your child's safety and well-being, and to that end, we'll work tirelessly to get you the answers you're after so that you can take the appropriate next steps.

Don't spend your days and nights worrying about your child. Get the information you need to pursue your child custody matter with our in-depth investigation services. Call the AFI office today to schedule an appointment.

http://www.afipi.com/child-custody/

 

 

John Gaspar, B.S., M.S. MBA, C.F.E., C.S.T 

Board Accredited Investigator

Florida License # A 2800136  C 8700343

www.afipi.comjgaspar@afipi.com

Phone : 1-888-697-3478        Facsimile: 386-845-9265

"DE-BUGGING" ELECTRONIC BUG & VIDEO CAMERA SWEEPS THROUGHOUT FLORIDA


Are you being watched or listened to without your knowledge?

This invasion of your privacy can cost you everything.

AFI has many technological services of which include electronic bug sweeping of:

·Offices

·Board Rooms

·Stand Alone Buildings

·Hotel Rooms

·Vehicles

·Houses

·Condos

·Recreational Vehicles

·Aircraft

·Boats & Yachts

Information is now the power tool of all industry. Hidden cameras and sophisticated audio bug devices are now a chronic issue in everyone's business and personal life. Technology has now made these devices extremely covert, inexpensive and internet accessible for purchase at very reasonable prices by the unscrupulous. Don't let the intellectual property of your corporation or your personal privacy and conversations be at risk for theft. In today's competitive business world, it is all about confidentiality, security and peace of mind. Not taking proper security measures can be catastrophic.

If you or your company has proprietary information that gives you a market edge, then there are others that know its value and will do virtually anything to get it. These people are called competitors and not partners for a reason. Corporate Espionage is a fact of the business world and those individuals are often employees that have been swayed by others.

AFI's Investigators have the technological ability and the newest of equipment to perform electronic sweeps in conjunction with physical searches to clear a room, office, vehicle or an entire stand-alone building. Electronic bug technology now comes in many forms such as: GSM, CDMA, 3G, Bluetooth, WiFi and WiMax transmitters. Camera technology is just as sophisticated and virtually invisible to the untrained eye and without the proper detection equipment, almost impossible to expose and eliminate the risk and liability that they impose. Once an electronic device is uncovered, AFI investigators will collect evidence and perform proper investigative Due Diligence for prosecution against those responsible for these illegal and unethical actions.

There is an old saying: if you have ever thought or suspected you might have a problem, you probably do!

Don't wait until you have a loss. Now is the time to eliminate the risk and discreetly investigate the culprit and put a stop to it. Remember, if you suspect you have been bugged, do not discuss this matter with anyone! Contact AFI from a secure line away from the location that is suspect and let us advise you on the next course of action. Again, many of these issues are caused by a trusted employee and you never know whose listening.

Contact AFI today for more information regarding a complete surveillance sweep of the confidential areas of YOUR life.

Call now to speak with an investigator for a free consultation:

888-634-4643

 

 

 

John Gaspar, B.S., M.S. MBA, C.F.E., C.S.T 

Board Accredited Investigator

www.afipi.com | jgaspar@afipi.com

Phone : 1-888-697-3478        Facsimile: 386-845-9265

Cyber Stalking Investigations & Consulting in Daytona Beach & throughout Florida

 

Cyber Stalking Investigations & Consulting in Daytona Beach & throughout Florida

The term of Cyberstalking is applies to the use of the Internet, e-mail, IM (instant messaging) or other electronic communication devices to stalk another person.

Stalking generally involves unusual behavior such as harassing or threatening an individual. Acts of cyberstalking can be simple things such as using Social Media to follow person online or in person at their home, school, and place of business or in public places. This is often followed by making harassing phone calls, electronic messages, posts, I.M.

Most stalking laws require that the perpetrator make a credible threat of violence against the victim. While others include threats against the victim's immediate family; and others require only that the alleged stalker's course of conduct constitute an implied threat.

Nature and Extent of Cyberstalking

Using Technology for Stalking

Many stalkers, whether online or offline, are motivated by a desire to exert control over their victims. That victim may be an adult, a child, or a business entity. We make it easy to be stalked. With every keystroke on the computer, website you visit, post you write, email you send, or electronic communication you are a party to, including hitting the “Like” button, all provide clues as to who you are, where you are, and how you operate. You also give details of what tools you are using in the way of browsers, phones, computers, desktops, operating systems, mac address, SSID, and IP address (es). Additionally most of these websites you visit sell your IP address to generate business revenue from their alliance partners. Therefore, each time you visit a website, whether you log in or not, your IP address is now linked to an average of 4 to 10 other websites. So, you can imagine the exponentially effect this has.

As with offline stalking, the available evidence (which is largely anecdotal) suggests that the majority of cyber stalkers are men and the majority of their victims are women, although there have been reported cases of women cyberstalking men and of same-sex cyberstalking. In many cases, the cyberstalker and the victim had a prior relationship, and the cyberstalking begins when the victim attempts to break off the relationship. Given the enormous amount of personal information available through todays Internet, a cyberstalker can easily locate private information about a potential victim with a minimal effort utilizing a computer.

Cyberstalking does not involve physical contact but may be just as threatening as physical stalking, which may escalate to physical violence. As the Internet becomes an ever more integral part of our personal and professional lives, stalkers can take advantage of the ease of communications as well as increased access to personal information through websites such as Instagram, Facebook, Pinterest, Myspace, and many others. The risk and/or danger may come from a potential stalker who may be unwilling or unable to confront a victim in person or on the telephone, he or she may have little hesitation sending harassing or threatening electronic communications to a victim. Most importantly, as with physical stalking, online harassment and threats may be a prelude to more serious behavior, which may include physical violence.

The Preliminary Investigation:

Once an investigator or law enforcement officer has determined that grounds exist for a cyberstalking case; that entity should encourage a preliminary criminal investigation. It is important to obtain specific information from the complainant. Obtaining all detailed information regarding the harassing behavior, including any personal contacts, such as telephone calls or being followed will be documented.

Step 1: Ask the complainant if he or she knows who is sending the harassing messages. If so, obtain an investigative interview statement regarding the specific information about the suspect: name, age, address, telephone number, vehicle information, and relationship to victim. Obtain a copy of the messages for the case file showing the e-mail address, Web site URL, nickname, screen name, and the content(s) of the message(s).

Step 2: Ask the complainant open probe questions such as, if he or she knows why he or she is being harassed. If so, record the complainant’s explanation in as much detail as possible in the narrative portion of the report. Knowledge of the reason can help lead to the identification of an unknown harasser.

Step 3: Establish when and how the harassment began. Has the contact been solely via the Internet (e-mail messages, chat rooms, mailing lists, instant messages, Web site) or has there been other harassment such as telephone calls, cell phone calls or texts, letters sent via USPS, or contacts at the complainant’s workplace or other locations, and whether any of the complainant’s relatives or friends has also been subjected to the harassment.

Step 4: Determine whether the complainant has been threatened with physical harm or physically attacked. Often, the electronic messages will threaten violence, rape, and even death. The investigation should document the details of how these threats were communicated. If the complainant has been attacked, it is apparent the threat has escalated beyond electronic threats. Details of the attack and results of the subsequent investigation of that incident become part of the case file.

Step 5: The investigation should then proceed to secure any physical evidence available and start the chain of custody to protect the evidence. The material should be saved in both paper printouts and electronic files on an electronic medium such as a disk or CD/DVD-ROM. Ask the complainant if he or she has any material evidence. Items to request include:

• E-mail messages
• Chat room messages
• Instant messages
• Web page images
• Social networking messages/wall posts
• Mailing list messages
• Message board messages
• Telephone/cell phone conversations or answering machine messages
• Text messages
• Postal letters
• Photographs

All Florida Investigations &

Forensic Services, INC.

FL. License#: A2800136 B1400220 & C8700342

All Florida Investigations & Forensic Services Inc., 140 S Beach St | Suite 200, Daytona Beach, FL, 32114888.697.3478info@afipi.com

Powered by Squarespace

 

 

John Gaspar, B.S., M.S. MBA, C.F.E., C.S.T

A2800136 B1400220 C8700342 K1400077

Florida Justice Administration Commission (JAC) Investigator 

Board Accredited Investigator

Board Member for Florida Association of Private Investigators

Board Member for The Legal Aid Society of the Orange County Bar Association, Inc.

www.afipi.comjgaspar@afipi.com

Phone: 1-888-697-3478  Facsimile: 386-845-9265

John Gaspar