Monthly Archives: March 2015

Workers Compensation Fraud-Investigation

What is Workers Compensation Fraud? Workers compensation fraud occurs when a claimant, employer, or health care provider knowingly lies in order to gain an advantage, savings, money, or other benefit. While many people believe that workers compensation fraud solely consists of employees lying about or exaggerating their injuries, workers compensation fraud can involve both employers…
Read more

Tricks and Tools of Private Investigators

Spying on other people has been around since cavemen hid behind rocks and watched their women bathe in the river, checking up to see if they were being faithful. As times changed, the most important aspect of the sleuthing business became the kinds of tools available for investigation. Technology has had the biggest impact; for…
Read more

Government Email Addresses: The Fastest Way to Communicate with Congress

Want to send an email to the United States Government? Emailing your senator, House representative or other member of Congress or the government s is an important part of keeping elected officials informed of our opinions.  Sending an email to your congressman is an efficient way to let the government and its elected officials know…
Read more

Restraining Order: Keeping Yourself Safe from Domestic Violence

A Restraining order is a form of legal injunction that is most commonly used in reference to domestic violence, harassment, stalking or sexual assault. In the United States, each state has some form of domestic violence restraining order law, and many states also have specific laws for stalking and sexual assault. Orders are issued by…
Read more

How to Report Crimes and Criminal Activity to the Authorities

The following is helpful information how to report crimes and criminal activities. Learn how to help stop crime in your neighborhood by reporting criminal behavior to the appropriate authorities. Report Internet Crime – http://www.ic3.gov/ – The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar…
Read more

Cyber-stalking – Anti-Stalking: How to Protect Yourself from Harm

Stalking / Anti-Stalking: How to Protect Yourself from Harm What is Stalking? Stalking is defined as a repetitive pattern of unwanted, harassing or threatening behavior that is committed by one person against another.  Acts that could be considered stalking include: being physically followed, harassment via telephone, receiving unwanted gifts, and other similar forms of intrusive…
Read more

Police 10 Codes for Law Enforcement Officer Radio Communication

What are Police 10 Codes and Scanner Codes? Ten-codes, 10-codes, police codes and sometimes “police scanner codes” are signals that are used by law enforcement and government agencies in two-way voice radio communication as numeric code words for frequently used messages. Ten-codes are also used by private citizens in Citizen’s Band (CB) radio transmissions. 10…
Read more

Business Email Compromise

Alert Number: I-012215-PSA The Business Email Compromise (BEC) is a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. Formerly known as the Man-in-the-Email Scam, the BEC was renamed to focus on the “business angle” of this scam and to avoid confusion with another unrelated scam. The fraudulent…
Read more

Fictitious – Work from Home – Scam Targeting University Students

FBI Warns of Fictitious - Work from home - Scam Targets University Students Alert Number: I-011315a-PSA College students across the United States have been targeted to participate in -work from home- scams. Students have been receiving e-mails to their school accounts recruiting them for payroll and/or human resource positions with fictitious companies. The “position” simply…
Read more

Be Crime Smart

Do yourself a favor: Be Crime Smart. Getting educated and taking a few basic steps may well keep you from becoming a victim of crime and fraud—and save you a great deal of time and trouble. You can also help us protect your families and communities by reporting suspicious activities and helping find wanted fugitives…
Read more

The Cyber Action Team

Rapidly Responding to Major Computer Intrusions It can be a company’s worst nightmare—the discovery that hackers have infiltrated their computer networks and made off with trade secrets, customers’ personal information, and other critical data. When such intrusions happen—and unfortunately, they occur frequently—the FBI can respond with a range of investigative assets, including the little-known Cyber…
Read more

Ransomware on the Rise

FBI and Partners Working to Combat This Cyber Threat Your computer screen freezes with a pop-up message—supposedly from the FBI or another federal agency—saying that because you violated some sort of federal law your computer will remain locked until you pay a fine. Or you get a pop-up message telling you that your personal files…
Read more

Guide for Requesting Military Records

Requesting military records? What is the turn-around time and what is available? Current Status for Active Members First, what if you need to check the status of a current service member? These questions come up frequently for investigators. For current status, visit https://www.dmdc.osd.mil/appj/scra/single_record.xhtml. Veteran Records For veteran records, its not so simple, but it has…
Read more