Serving Houston, TX
Articles
Defending The Defender
Our agency was employed by an attorney, that represented a security guard company in a negligence lawsuit. The facts of the case involved a security company that had the contract at a college to provide 24-hour on-site armed security. During registration, a security guard was sitting in a room assisting with taking money as the students paid for their classes. Two men with ski masks entered the building and fired several shots from their firearms. The security guard was struck in the head and killed instantly. Several students were wounded, but recovered from their injuries. As the perpetrators left the building, two additional armed security guards came face-to-face with the perpetrators who were at different ends of the hallway. The security guards were surprised to find guns pointing at them and taking this, along with the safety of other students into account, elected not to pull their weapons. The two perpetrators exited the building, entered a nearby car and fled the scene. The security company was subsequently sued by students who were present at the time, alleging that the security guards did not act reasonable in this situation. Although the security company was a solely owned company, they petitioned the college to have them listed as employees of the college. This would have enabled the security guard company to be protected due to a government entity having limited liability. The college refused and the lawyers for the security company then counter-sued the college to include them as a defendant in the case. Obviously, from an investigative stand-point, this limited access to college records and personnel.
In cases such as these, there are several issues that must be over-come for a successful defense to be mounted. These include: (1) foreseeability (2) crime rate (3) proper licensing (4) proper training (5) adherence to the written contract (6) reasonable actions of the security personnel (7) physical access and limitations and (8) equipment. Although other issues may evolve during the investigation, these are some of the fundamental building blocks in these types of cases.
Foreseeability: Foreseeability is based on available information from law enforcement agencies, crime statistics, experience, and news sources. In an article entitled, “No Room for Liability,” published in the June 1997 edition of Security Management, the article deals primarily with hotels and the issue of foreseeability. However, the article has implications in this incident. The article indicates that a hotel in Atlanta was sued after an assault. Initially, the court ruled in favor of the hotel but the appeals court reversed the decision finding that the trial court had imposed too narrow a definition of foreseeability. Three nearby hotels had suffered more than 400 crimes in their parking lots in the same period. The ruling indicated that the high crime rate in and around the hotel should have been enough to warrant extra security. The article continues by stating that security cases hinge on four major elements:
- whether the owner owed a duty to provide a safe environment to the injured party
- whether the owner breached the duty to provide a safe environment
- whether the breach constituted the “proximate cause” of the injury
- whether the plaintiff suffered actual injury or damage.
The duty to provide a safe environment is pretty basic. In the incident in question, the plaintiffs had reasonable expectation that they would be safe from such an assault while on the campus. Whether the security company or college breached the duty is more difficult. In Chapman v ESJ Towers (U.S. District Court, Puerto Rico, 1992), the appeals court ruled in favor of the plaintiffs stating the defendant should have had “reasonable foreseeability.” The court reasoned that among other things, that only one security guard was on duty, working a 12 hour shift without a break and watching 10-15 CCTV monitors simultaneously. The court also found that cars could get out of the property without going through an access control system. In the case of this incident, there were a reasonable amount of security officers on duty at the time of the incident. However, the surveillance cameras were apparently not functioning properly and no one had been assigned to monitor the cameras. Additionally, the parking lot area did not have an access control system. The article points out that “the property owner’s breach of duty must be the proximate cause of the victim’s damages. Inadequate security alone is not enough to warrant a ruling in favor of the victim..”
The article continues by stating that the case laid out other relevant elements pertaining to foreseeability including:
- compliance with industry standards in protecting its premises
- the presence of suspicious people around the premises
- peculiar security problems of the facility, including the design of the facility
In this incident, contact with other colleges and universities revealed that the security company appeared to operated within industry standards. Most of the colleges and universities contacted revealed that they do not handle registration day any different than any other day as far as security is concerned. In addition, most of their officers are unarmed.
Crime Rate: The crime rate and crime history in the area of the incident played a role in determining whether the college and security company should have foreseen the probability of an incident such as this. In this situation, the security company did not have access to their reports as they were filed at the college and were not readily available. Therefore, interviews had to be conducted to determine the general recollection of the crime rate.
Next, we conducted a neighborhood canvass to find out about crimes and the perception of crime in the area near the college. Outside of a few burglaries and auto thefts, the area appeared to be free of crime, especially violent crime. We then obtained a break down of police calls within a two mile radius of the college. There were only 17 assaults, 3 weapon related calls, 7 robberies and 130 suspicious person calls. We also checked with the local media and the reporters covering the police beat who indicated that they believed the area around the college to be relatively safe. A check of the FBI statistics was then performed and it was determined that the specific city and those around it had experienced an average decrease in crime of 7%. Compared to cities throughout the U.S. with similar populations, the crime rate was even lower.
To take this a step farther, our investigators contacted other colleges and universities in the state to determine if they had experienced any similar incidents and their crime rate. None of these had reported any incidents where there was a victim of a robbery and/or physical assault with a weapon.
A review of current written material related to the topic of foreseeability was conducted. In a recent court proceeding, Timberwalk Management -v- Cain, 972 S.W. 2d 749 (Tex. 1998), the court stated: “Crime may be visited upon virtually anyone at any time or place but criminal conduct of a specific nature at a particular location is never foreseeable merely because crime is increasingly random and violent and may possibly occur almost anywhere...” In the incident in question, the incident was “specific in nature” as it was obviously a predetermined act of assault and robbery. In addition, the act was “specific in location” and could not have been a random act that could have been forseeable based on related crime in the approximate area. In this same case, the court continued by stating: “A duty exists only when the risk of criminal conduct is so great that it is both unreasonable and foreseeable. Whether such risk was foreseeable must not be determined in hindsight but rather in light of what the premises owner knew or should have known before the criminal act occurred.” In the incident at the college, “the risk of criminal conduct being both unreasonable and foreseeable” did not appear to exist. Further, there was not any information or other indicators that would have prompted the security company to foresee an event such as this.
Proper Licensing: In this case, a check with the State Board revealed the security company was properly licensed and insured. In addition, the security officers were properly licensed at the time of the incident.
Proper Training: At the time of the incident, the security officers in question had completed the required training set forth by the State Board. In addition, each were also properly trained and licensed to carry a weapon on duty.
Adherence to Contract: A review of the contract between the security company and the college revealed that the contract was weak and little was specified about the actual duties and responsibilities of the security officers. The security company was found to not only have complied with the contract, but exceeded it when appropriate. According to the contract, the security company was only required to have 2 officers on duty for registration. The security company, however, elected to have 3 present.
Reasonable Actions of the Security Officers: According to the author of “Trial by Fire,” published in the Security Management May 1998 edition, San Diego State University had a student who shot and killed three instructors on August 15, 1996. The University’s security personnel approached the shooter and were able to take him into custody. According to the author, “legally, they could have done so, (shot the student), but in the university’s view, the additional bloodshed was not necessary, because the officers were in full control of the situation and would have been able to react to any threatening movement. The officers responded appropriately, displaying judgment and sensitivity while maintaining proper officer safety techniques.... Had the officers been unarmed or poorly trained or supervised, the events following the shooting could have escalated an already tragic incident.” Accordingly, as noted in this article and “Keeping Crisis Cool,” the manner in which security officers react to a potential threat will have a direct bearing on how the situation escalates. In the incident in question, the security officers who were not wounded reacted in an appropriate manner by not drawing their weapons. In the interior of a building composed of brick and concrete, any bullets missing their mark would have richoceted and may have hit innocent bystanders. Additionally, the security officers reacted properly by not attempting to cut-off the escape route once the robbers attempted to flee.
Physical access and limitations: According to the authors of the textbook Introduction to Security, building design should be considered as a part of security. The authors state, “The cause of security can be furthered simply by making it more difficult (or to be more accurate-less easy) for criminals to get into the premises being protected. And these premises should then be further protected from criminal attack by denying ready access to interior spaces in the event that exterior barriers are surmounted by a determined intruder.” The authors continue by stating, “Yet few such buildings are ever designed with any thought given to the steps that must eventually be taken to protect them from criminal assault. A building must be many things in order for it to satisfy its occupant. It must be functional and efficient; it must achieve certain aesthetic standards; it must be properly located and accessible to the markets served by the occupant; and it must provide security from interference, interruption, and attack.”
In the incident in question, the perpetrators were able to access a parking lot next to the registration building as there was no type of controlled access for the parking lots. The perpetrators parked within 20 feet of the door to the building where the cash was being held. Once out of their vehicle, there were several small trees that prevented anyone from observing the door. In addition, the door was set back in a recessed area. The building where the registration was being conducted did not have any windows. A combination of these factors made access into and out of the property virtually undetectable.
Equipment: According to the contract, the college was suppose to supply all equipment for the security guard company to use at the college. This included CCTV cameras with a monitoring room. However, the contract did not provide for a security officer to monitor the cameras. Additionally, many of the cameras were not functional.
The investigation revealed that the security company provided the right amount of manpower, training and equipment as required by the contract and industry standards. The actions of the security guards were found to be reasonable and prudent, and may have actually prevented additional injuries. The evaluation of the college revealed that they did not adhere to the contract responsibilities, failed to limit access to the college, did not have adequate lighting, and had landscaping and other building design issues that prevented observation of criminal activities. By the end of the investigation, the security guard company was provided with a capable defense, while at the same time, demonstrating that the real liability rested on the college.
Why Every PI Should Say No
Any PI who has a full-time business with employees and normal overhead hates to turn a case away. However, there are times when the best thing you can do is walk away from a client. Domestic cases are the most common types of investigations that call for all of the investigator's senses to be on-guard. I have learned that dealing with individuals has the potential to go astray more than your normal corporate or insurance case. Failing to lay the groundwork or short cutting a consultation can create major problems in the end. I always spend more time interviewing the potential client in a domestic case than I do in most other cases. One case in particular had the potential to backfire more than most.
I had a male subject named Ken who called and had to meet with me as soon as possible. My schedule allowed some time that same afternoon and the subject presented himself as a nice, easy to get along with man. He indicated that his wife had dropped him off at work the day before and failed to pick him up after work. He caught a ride home and when he arrived, all of the furniture and household belongings were gone alone with his five-year-old son. Ken indicated that he would understand if his wife didn't want to continue their marriage, but he wanted to know where his son was and to see him on a regular basis. At one point during the consultation, I boldly stated that she probably got tired of his beatings and decided to run from him. This would tend to antagonize most men, but he kept his cool and continued to stress the need to find his son. Convinced that he posed no problem, I agreed to help. Ken gave me the name of his wife's sister, who lived in another town, but did not know where she lived. He was convinced that his wife was hiding out with her sister.
I began attempts to locate the sister. Fortunately, he gave me the wrong name and I pursued a person that didn't exist. Several days later, I walked in the house just in time to see his mug shot on the TV and the news indicating a warrant for his arrest was outstanding. He had located the mother-in-law and shot her execution style because she wouldn't tell him where her daughter's were. In the mother-in-law's purse was a piece of paper that directed him to a storage unit. Ken broke into the unit, found other documents that directed him to the sister and her apartment. He conducted surveillance and one morning observed his wife and son exiting the apartment. Ken approached his wife, who shot at him with a handgun but missed. He returned the fire, striking her but not killing her. Ken grabbed his son and fled. Several days later, police were called to a bank for a suspicious person call and found Ken and his son sitting in his car. He shot himself with his son sitting next to him in the car.
This is an extreme case example, but a realistic one. Fortunately, as soon as I discovered what was occurring, I contacted the police department who reviewed my file and concluded that I had nothing to do with Ken finding his wife. This was one of those times that cause you to stop and review policies and procedures. I now have strict guidelines on accepting domestic cases. In addition, my disclaimer on the front of all reports also include the following, "The client and/or their representatives has represented to Kelmar and Associates that the information enclosed in this report will be utilized in a lawful and non-violent manner and agrees to hold Kelmar and Associates and their representatives harmless from miss-use of any or all of this information." Trust me, this does not prevent this from happening, but is one of many steps that we as PI's should take.
One of the most important aspects of a consultation is making sure that the client understands what to expect from the PI. Everything from what will be in the report to the cost and time frame should be outlined. Remember that they probably have never had any prior experience with a PI. As a PI, we have to treat our business like a business, but we should remember that we can say no to a new case!
An Historical Summary Of Spying
Ask a cross-section of people when “spying” came into being and you will get a variety of answers. Most of these answers will probably deal with Vietnam, WW II, the Cuban Missile Crisis or possibly a little earlier. For the most part, people are unaware that spying and investigations have been occurring since the beginning of mankind. As the founder of the Association of Christian Investigators, I often get asked similar questions that have their origin in the Bible. The Bible is quick to point out some cases in which spying was used. Whether you believe in God or not, the Bible has been accepted as a true and accurate account of the history of mankind. Therefore, we can see that spying has it’s roots as far back as 1450-1410 B.C. In Deuteronomy, the Israelites were seeking a new land in which to inhabit. Many of the men were concerned about the territory they were preparing to enter and voiced their concerns to Moses. Chapter 1, verse 22 states, “Then all of you came to me and said, Let us send men ahead to spy out the land for us and bring back a report about the route we are to take and the towns we will come to.” At this, 12 men were sent out to investigate and returned with their reports.
The next time we hear about spying is in Joshua 2:2, which states, “The king of Jericho was told, look, some of the Israelites have come her tonight to spy out the land.” Later, in Joshua 7:2, we see that once again the Israelites set out spies, “Now Joshua sent men from Jericho to Ai, and told them, go up and spy out the region. So the men went up and spied out Ai.”
We see that between 1400-1000 B.C., the technique of using a double-spy came into being. In Judges 1:23 it states, “When they sent men to spy out Bethel, the spies saw a man coming out of the city and they said to him, show us how to get into the city and we will see that you are treated well. So he showed them, and they put the city to the sword but spared the man and his whole family.” Later in Judges 18:2 we see spying once again, “ So the Danites sent five warriors from Zorach and Eshtaol to spy out the land and explore it.”
In 2 Samuel 10:3 and 1 Chronicle 19:3, we see where “counter-spying” took hold. The verses indicate, “Do you think David is honoring your father by sending me to you to express sympathy? Haven’t his men come to you to explore and spy out the country and overthrow it? So Hanun seized David’s men.”
Jump ahead in time to 49-52 A.D. and we see in Galatians 2:4 that spying was still occurring. “This matter arose because some false brothers had infiltrated our ranks to spy on the freedom we have in Christ Jesus and to make us slaves.”
The Roman army became interested in spying in their attempts to uncover the identities of early Christians so that they could persecute these subjects. From this, the Roman army also utilized the technique against other armies that they conquered. According to India history, they had two ministers in ancient Indian history, Chanakya and Kautilya who were reputed to have created a network of informants and spies in other kingdoms . By doing this, they were able to assist their kings in consolidating their empires and in becoming more powerful.
Our own country has been filled with accounts of spying. Early on, the military referred to them as “scouts,” and they were used by the Spanish, French and English explorers. The scouts became early recruiters of double-spies simply by winning the friendship of the Indians so as to learn more about their strengths and weaknesses. Jump forward again in time and you will recall how the U.S. Calvary used Indian spies to seek out the opposing forces.
Eventually, came the Pinkerton Security agency which was originally established to maintain security for the railroad and eventually branched out into detective work. Everyone interested in the criminal justice system knows about Pinkerton.
With the onset of WW I, came a new sense of urgency in spying. New technology designed specifically for spying was manufactured and the welfare of the United States became an ever increasing burden. The responsibilities of keeping the U.S. up-to-date on the actions and intentions of possible aggressors helped to usher in spying as we know it. However, the earliest foundations of spying are seldom discussed. This is truly one of the oldest professions with a long and respectable history.
Privacy Issues & The Internet
In this technology driven age most private investigators have a working knowledge of computers and email as they relate to crime. However, the ability of senders to destroy messages either remotely or automatically, without a recipient’s consent or cooperation can create issues in privacy, documentation and rules of evidence. This ability gives senders unprecedented control over what they distribute as well as the ability to post egregious statements. Fortunately, this is new technology that few are using. New record keeping methods are unfolding in a budding new industry and employers are being required to deal with how to preserve privacy without going to the extreme.
In one of the many infamous cases arising from the UBS scandals equities trader Laura Zubulake won a $29 million award in a federal gender discrimination suit. The presiding judge penalized UBS for failing to recognize that missing e-mails would end up being relevant to future litigation, This is one of several cases that put the corporate world into a tail-spin regarding privacy, evidence, legal issues and general business practices. Many companies chose to "tape over" the electronic tapes of stored data, basically shredding e-communications. Of course that solution works if it were not for the fact that copies exist elsewhere on email servers, in transit, copies sent to others, printed documents and in backup tapes. Many employees also have the habit of forwarding business emails to another personal account. The need for systematic procedures to purge old messages thereby becomes an obvious. There are software companies that provide the ability to keep embarrassing or incriminating messages from surfacing later by offering self-destruct emails within a given time frame. They also have the ability to “copyright” emails by restricting what a recipient does with the messages by preventing them from forwarding, copying, or printing.
Investigators will be called upon to understand these dilemmas as they conduct investigations in the near future. Our clients come to us for resolution that will require a working knowledge of this part of the industry.
Likewise many investigators are becoming involved in tracking email messages and a tremendous asset can be found at www.visualware.com. The software allows for the unique ability to identify the geographical location of routers, servers, and other IP devices. This is highly valuable information for security purposes as it aids in identifying the source of network intrusions and Internet abusers. The software also allows an e-mail address to be tracked to the server, providing a useful tool to troubleshoot email problems and to identify/report spammers. An additional tool they offer is called CallerIP that shows who is connecting to your system at any given time.
The Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center, released its 2008 annual report on Internet crime. According to the statistics, Internet fraud complaints to the FBI increased over 33 percent in 2008 over 2007. A total of 275,284 complaints were filed during the year, compared with 206,844 in 2007. Online fraud is also tracked by region, with the District of Columbia ranking highest in the nation in terms of per capita ratio. In terms of raw numbers, the most incidents came from California.
Fraud cases referred to federal, state or local law enforcement accounted for a dollar loss of $246.6 million, or an average of $931 per complaint. The greatest dollar losses came from check fraud, with an average of $3,000 per incident; confidence fraud at $2,000 per incident, and Nigerian advance fee scams at $1,650 per incident. Email fraud is the tool of choice for committing fraud with 74 percent of all reported frauds using email as the primary method of contact. Twenty nine percent of the reported frauds used the Web as primary contact.
Another useful tool for the investigator who is trying to stay up-to-date is a website touted as “the email scam resource” located at www.scamdex.com. The site is useful for following the latest trends and information regarding email fraud.
Internet related fraud continues to be a plague with over $590 million dollars paid by consumers who have been victims. Credit cards were the most common methods of payment reported for Internet related fraud complaints during 2006 at 35%, followed by wire transfer (22%) and bank account debit (18%). Only 15% stated the initial method of contact was via a web site while more than 45% indicated the initial contact was through email. The two most common age groups reporting online fraud were 30 - 39 and 40 - 49 at 24% each.
The Top 5 Fraud Complaint Categories (Internet & Non-Internet)
- Identity Theft
- Shop-at-Home/Catalog Sales
- Prizes/Sweepstakes and Lotteries
- Internet Services and Computer Complaints
- Internet Auctions
Although as investigators we certainly cannot render legal advice, we need to be able to identify if and where a violation may have occurred in order to properly assist our clients in defending or prosecuting these cases. While criminal cases are more obvious, civil transgressions are more difficult and fall under several of the Categories outlined below.
Tortuous Interference in Cyberspace
In the United States, tortuous interference claims are made when someone publishes statements designed to interfere with another normal course of business. In the U.S., the defamed party must prove that the statement is false while in Canada, the UK and Australia, libel laws are biased in-favor of the injured party. It is up to the libeler to prove that their statements are true.
International Cyber Libel Laws
According to Canadian courts, the Internet is a "Broadcast medium" subject to the same rules of libel as traditional broadcast media such as TV and radio. This ruling has far-reaching impact for cyber libel. Making these cases more difficult is the requirement that people harmed by a libel must file a claim within six-weeks of publication, and those who discover a libelous web page after six weeks has no cause-of-action for a libel claim. In some countries such as Australia, defamation and libel laws can be so restrictive that they can be criminal offenses.
The Center for Democracy and Technology in the United States has addressed the growing "spyware" problem. The term spyware is used to describe computer programs, such as key stroke loggers and "adware", which are often installed without the user's knowledge to monitor online behavior and collect information.
The report describes several categories of spyware. The first category, “snoopware” comprises key stroke loggers and screen capture utilities and are installed by a third party to capture the user's key strokes and record periodic screen shots. This category of spyware has legal uses, as in limited situations of employee monitoring, and illegal uses. The second category concerns "adware" that is installed covertly by piggybacking on unrelated applications and downloads that are resistant to being uninstalled. These programs transmit information about the user or the user's computer back to a central location. They are the most problematic because they fall into a legal grey-zone.
There are three existing US laws that may address the most extreme examples of spyware: 1) The Electronic Communications Privacy Act (ECPA), 2) The Computer Fraud and Abuse Act, and 3) Title 5 of the Federal Trade Commission Act, which allows the US Federal Trade Commission to take action against unfair and deceptive trade practices.
The privacy issues related to the Internet will continue to evolve, causing the investigator to respond in like fashion. Keeping up to date on these and other issues is key to assisting our clients.
Transportation & Cargo Investigations
The transportation and cargo industry is a beckoning ground for the private investigator that recognizes opportunity and economic fundamentals. Nearly every company, business, government and consumer in the world is dependent to some degree on the transportation and cargo industry. This makes private investigations a ready-made fit for a large industry that battles an increasing organized crime problem, growing pilferage, equipment thefts, and international border concerns.
In a post 9/11 environment where Homeland Security has taken center stage in all aspects of America, how can only one-quarter of executives at trucking firm’s state that homeland security would be a priority over the next twelve months? The Transportation Security Survey prepared by Deloitte and Touche indicated that more than eighty percent of these same executives anticipated an increase in spending for security over the same twelve months. This conflict points to the fact that transportation executives feel compelled to deal with security but are doing so in an ineffective manner. Action for the sake of action does not always equal a positive outcome. The U.S. legislature has passed countless laws with more pending, placing a heavier burden on the transportation industry. While executives have an obvious desire to uphold security initiatives and compliance directives, many are flailing their arms like a boxer missing the mark.
Government compliance has become a myriad of frustration and confusion. As an example, one analysis concluded that there are more than 25 different jurisdictions charged with managing U.S.-Canadian cross-border freight movements. Homeland Security, the Transportation Security Administration, Immigration Customs Enforcement and other premier law enforcement agencies all have their requirements for transportation companies. Since the inception of the Homeland Security agency, every law enforcement department has had to re-think their duties and responsibilities while being reconfigured and set back into a new puzzle. During this transformation process, executives within the transportation industry have repetitively been given different and often conflicting marching orders. The average company assigns the task of security to a mid-level or senior executive that is already overtaxed and who has little, if any experience with security compliance. Budgets are quickly developed with assumptions that adding or upgrading CCTV systems or other technology will bring the company up to speed with security. This “patch the hole and move on” tactic has been costly and mostly ineffective to date. Even with all of the new regulations and technology available, transportation and cargo thefts continue to increase.
“The Unfinished Agenda-Transportation Security Survey”, Deloitte & Touche, LLP“Homeland Security and the Trucking Industry”, Center for Transportation Studies, University of Minnesota.
Organized crime has found this industry to be particularly fruitful because of the relative ease in attacking their prey while at the same time having only their hands slapped when caught. Since this is a white collar crime that affects “large companies” and those that insure them, the victimless crime continues to be perpetuated. Making the most of technology, organized groups of criminals and specifically Cubans, have been productive in infiltrating their victims. They typically have someone obtain a job in the warehouse of popular manufacturing or distribution warehouses to gather intelligence on shipments. Armed with this information, they are able to discretely place a GPS device in the load to allow their compadres to tail the shipment from a distance. When the driver stops for any length of time, they move in and hijack the load with little to no effort. To no surprise, the states with the main interstate thoroughfares are also the hardest hit.
You can see from the figure above that Texas and Georgia are the two hardest hit states when it comes to cargo theft. Texas, with the proximity to Mexico and international trade is an obvious choice. Likewise, Georgia is a good staging ground for loads coming out of the Florida ports and the Atlanta hub. Both Texas and Georgia have major highways that intersect and cross through their states allowing great opportunity for criminal activity. Prosecution often becomes entangled in these and other locations due to the mobility of the shipment through various jurisdictions.
Other useful information related to transportation and cargo thefts evolve around the business cycles. The most opportune time for thefts is when there are less people around and the longest time between the theft and the chance for discovery. The weekends are therefore the best time for thefts to take place and are usually not found until Monday when workers return to their normal shifts.
Armed with this knowledge, investigators can more readily identify trends and help clients become more proactive. There are many factors that make the recovery of stolen equipment and cargo more successful and include:
- Rapid reporting of theft to law enforcement. Although few jurisdictions have a task force specifically for these types of crimes, having the items entered on NCIC and the particular state’s similar system allow recovery when officers come in contact with the unit. A private investigator can benefit their client by insuring that the information has actually been entered and broadcast in a timely manner.
- Rapid on-scene investigation by a private investigator is crucial. Statistics have shown that if a load is not recovered within the first 24 hours, the success rate dramatically decreases. For those transportation, cargo and insurance companies that work closely with private investigators, the theft of an 18-wheeler or the cargo is immediately reported to the local PI and response to the theft location is mandatory within a 2-4 hour framework. The information gathered by talking to the driver, witnesses, reviewing CCTV video and acting as a liaison with law enforcement is crucial.
- Developing a team effort with law enforcement officers who work in auto, fraud and other divisions will allow information, leads and intelligence to be shared.
- Reviewing crime trends in the area helps to identify new methods being utilized by the criminal element. Some of these include special methods for stealing or hijacking loads, areas where truckers are often paid thousands of dollars for the load in exchange for delaying calling law enforcement, areas where make-shift paint booths are set up to disguise the equipment, etc.
- Working with the client to authorize rewards and flyers to be posted at truck stops, industrial areas, or similar settings.
While these types of investigations are not usually “tough” investigations, there are circumstances that arise that create obstacles such as the load being taken into Mexico, driver involvement, arguments between the driver and employer over pay issues giving the driver an idea that they can hold the load hostage until paid, lack of law enforcement response, failure to add the information on NCIC, inability on the part of the owner to prove ownership through titles and related issues.
In a review of investigations conducted by Kelmar Global, we discovered that an aggressive response time, immediate canvass of the areas, interviews that generate leads, utilization of B.O.L.O posters and rewards as well as working with our extensive law enforcement personnel and sources were responsible for the following statistics:
- 77.2% located and recovered in the Dallas/Ft. Worth area (2006 – 2010)
- 60.7% located and recovered in the Houston area (2006 – 2010)
- 47.3% located and recovered in the South Texas/border area (2006 – 2010)
- 69.1% located and recovered in Mexico (2006 – 2010)
The PI can be a huge asset to their client in helping not only recover the loads but working through these types of situations. Developing a plan of action and being able to institute this when a loss occurs is instrumental in the successful recovery of stolen cargo and equipment.
Useful Tips For The Serious PI
Most of you who have been at it a while know that there are ways to get the job done and then there are the things you can do to get the job done in a much easier and more simplistic way. With that in mind, I would like to offer up many of the tricks I have developed over the years. In the area of surveillance, being covert inside a vehicle has always posed a special problem. I refuse to use vans unless absolutely required and instead prefer SUV's as they attract less attention. In most states, you can put dark tint on all the windows except the driver and passenger door windows. I have found the perfect solution for these windows. Take a piece of newspaper, hold it against the door glass and trace the pattern. Lay the newspaper mold on Plexiglas and trace the outline. Using a utility knife and hacksaw cut the Plexiglas out. Put the dark tint on the Plexiglas and you can then roll the Plexiglas up in the window tract to hold it in place. Put a window sunscreen in the front window and you are ready to go!
Another useful tool for the serious surveillance expert is a "kill switch." You simply run a wire to the solenoid/starter and have a toggle switch in the driver's compartment. When you have a case that requires you to get close to the person and there is no where to view the subject without getting close, use the kill switch. Coast to the position you need to get to, throw the kill switch and your engine will turn over and over without actually starting. You can then get out, raise the hood and act like you have engine problems. Let the subject see you talking on the cell phone so he thinks you are calling for help. In the meantime, get back in your vehicle and shoot the video. When done, close the hood, throw the kill switch and you are on your way.
We are all using the Internet and there is a lot of sites and information out there. The question is, "which ones are the best without spending hours looking for them?" Here is a list of my favorites:
- www.pac-info.com is a site that provides property records nationwide. In addition, they have a list of specific sites associated with each particular state.
- www.knowx.com has minimal fees for the searches but is well worth it. I was checking on a trucking company recently to see how many lawsuits they had. I checked nationwide and found 187 on file instantly. You can do state specific searches or national searches. Some of the searches include property, judgments, liens, bankruptcy, DEA registrations and much more.
- www.iqdata.com is another site that offers social security traces, department of motor vehicle records, property and much more. Again, the small fees are well worth the money.
- www.memphisdailynews.com provides access to state wide criminal searches in 22 states for $3.00 each.
Remember that any information you get off the Internet is an unconfirmed source until you verify the information with a second known source. One other useful tool is available on my web site (www.kelmarpi.com)free of charge and is more than 110 pages of links to web sites and is accessed by topic (boat, bankruptcy, criminal history...). Click on "record search" and then on "Internet on Demand" and download the information!
A search that many people do not seem to know about or utilize involves the police department. Most agencies allow the public to request a "name survey" or an "address survey." You give them the name or the address and they provide every call associated with the name or address. I have found subjects that I couldn't find any other way because they got into a small accident in a private parking lot and it wasn't in any other record.
I often get asked to locate insurance because someone was in an accident and the other party didn't have insurance. Run their license plate and check to see who holds the lien on the vehicle. Contact them and they will usually provide the information. You can also do a check for prior accidents. Chances are whatever insurance company they listed on a previous report will still be their current insurance company.
I hope you will find some of these tools useful as I have developed these over many years of experience. Feel free to contact via my email (kelmar@stic.net) if you have a question or idea you would like to pass along.
Do Not Become a Victim of a Scam
As the owner of a private investigation company and having more than 20 years experience, I never cease to be amazed when people allow themselves to become a victim of a scam. Yes, even the most prudent person can be a victim of unscrupulous businesses, but many of us are victims of our own lack of research. Since the mid 1980's, records have been pouring into databases that are readily available for us to review. I have found doctors and attorneys that are not licensed, men that have been married to more than one person at a time, businesses with more than 150 lawsuits against them and banks that are not actually a bank. I am sure that the lady who married a man who was already married with several kids didn't think she could be a victim. The people that sent funds to an off-shore bank had no idea that the bank was just a shell and a scam. I wish I had a $100 for every person that paid a contractor good money and never had the work completed.
The issue of privacy always seems to present itself anytime the topic of information research arises. As a reminder, we are taxpayers and our money is used to compile, store and access these records. As a taxpayer, we have the legal right to this information whether you want it to be open or not. More importantly, if you have a child in a daycare and suspect an employee of being a pedofile, you want to know the answer to that question. What about those of you who have a parent that you are considering placing into a nursing home? I am sure that you would like to know the way to research these facilities.
So if information is so readily available, why do scams still happen? Most of us have lives, jobs and families that take up our valuable time. Spending time searching the millions of Internet web sites for the one that can actually help requires more time than most are willing to spend. Even if you find information on the Internet, who has time to go to the courthouse to review the file? I will provide you with the tools you need to protect yourself in a summarized manner. The following web sites are useful tools in protecting your assets:
Criminal Records: www.memphisdailynews.com provides on-line criminal records for 22 states. By searching this database, you will be able to identify if the person has been arrested and charged with any crimes in that particular state. The record will identify the date, case number, court, charge and disposition of the case. This information will allow the person to identify if the person has tendencies towards physical abuse, thefts, fraud or other criminal activity.
Lawsuits/Judgments/Liens: www.knowx.com provides on-line searches state-by-state or nationally. This site will allow the user to key in the person or company name and identify any whether they have a history of being sued for bad debts, poor workmanship, failure to abide by contracts and other useful information. If liens are found, they may be a result of failing to pay federal or state taxes, another sign that the company may be having financial difficulties.
Doctors and Health facilities: www.healthgrades.com provides information and ratings on doctors and health care facilities. This sites allows the user to search the credentials of a particular doctor and identify the types of drugs they can legally prescribe. The site will also provide information on hospitals and nursing homes including the type of medicine they practice, if they have emergency care available, the number of beds in the facility and overall ratings.
State specific searches: www.pac-info.com provides records searches at the state or local level by clicking on the particular state. The records available for each state differs, however, most have access to property records, state corporate records and county specific records. You will be able to determine if a company is registered as a corporation in the state, when they became incorporated and if they are in good standing with the state. This site will also allow you to access property records in a chosen county. You will have access to the owner, value of the property, mortgage company, taxes on the property and whether or not the taxes are paid current. This is a good place to start if you are considering purchasing a piece of property.
Reverse Directories: www.555-1212.com provides cross-reference directories. You can find a person's address and telephone number by just having their name. A great feature about this site is you can do reverse searches. If you have a telephone number, you can get the name and address that it is listed to or do the same with just an address. The site also has searches available in other countries. The user can find a person or business or verify information using this site.
Business Reports: www.DnB.com provides business reports on companies. This site will provide information on the owners of a company, their industry, financial stability, average debt and much more. The user can determine if a company appears to be financially secure before dealing with the business.
Vital Records: www.vitalrec.com provides access to birth, death and marriage records. The site can help an individual track down relatives and/or confirm the identity of someone who appears too good to be true!
Social Security Traces: www.iqdata.com provides a method of obtaining a person's social security number. The user supplies the person's name and last known address and a social security number is provided. Once the number is obtained, a trace can be conducted through the same site to determine the person's current and previous addresses. Once again, the site will help locate someone that skipped out on a debt or confirm a person's identity.
You can see from these links that a wealth of valuable information is out there. The question is, "why get scammed" when you can quickly check them out?
San Antonio Business Journal
Sometimes, Kelly Riddle has to talk like a doctor. At other times, he tries his best to act like an attorney, or just an everyday employee.
Riddle isn't having an identity crisis. It's all part of his job as a gumshoe.
"You have to know how to blend," says Riddle, owner of private investigation firm Kelmar & Associates Inc. "I can introduce myself as a doctor or attorney, and as long as I can carry the lingo, I'm not compromised. I can be anybody I want to be."
Taking on different identities is a job requirement for investigating, Riddle says, who handles malpractice, insurance fraud cases and more.
But he's quick to note that the work isn't glamorous and that the life of a private investigator is far removed from that depicted on such television shows as "Magnum P.I."
"The majority of shows don't even come close," he says. "They either depict the P.I. as a little slow, a kicked-off-the-police-department type, or they're always in shoot-outs. None of that is correct."
But, Riddle says, while his business may lack glamour, it more than makes up for it in terms of challenge.
Since opening his investigation firm in 1989, Riddle has earned a reputation for integrity and honesty, culminating in being named the Private Investigator of the Year in 2000 by the National Association of Investigative Specialists (NAIS).
Call of dutyLaw has been something Riddle has been attracted to most of his life, he says. He earned a degree in criminal justice from the University of North Alabama in his native state and then served as a police officer for seven years in Florence, Ala.
While involved with law enforcement, he was a member of the SWAT Team, a training officer, emergency medical technician, evidence technician, arson investigator and traffic investigator.
Prior to founding Kelmar, Riddle worked with two other private investigation companies, including a nationwide operation. He also worked in the insurance industry as an adjuster and an investigator.
Riddle, who now lives in San Antonio, founded Kelmar with a friend, Mark Jones, after the insurance investigation firm where Riddle was employed went out of business. They set out to conduct a variety of corporate and general investigations, including workplace and general investigations.
Jones eventually left to become a marriage and family counselor.
Riddle has been designated an expert in physical surveillance and insurance investigations by NAIS, and also is a recognized specialist in nursing home abuse, computer and Internet investigations, and missing persons.
In its first year of business, the company had revenues of $250,000. Today, the company's revenues are in the million-dollar range, Riddle says.
That's not bad considering Riddle never intended to open his own company.
"I started the company out of necessity," he says. "I never wanted to be my own boss."
Nor did Riddle intend to be an author. But that was 10 books ago.
Among his written works are "Private Investigating Made Easy," and "To Serve and Protect: The True Story." Riddle is also at work on his first mystery novel.
"It's been an interesting walk. At first we started investigations in insurance then we started branching out to corporate work, and corporate work has been our mainstay ever since. That's where we make our bread and butter."
They have done investigations for H.E. Butt Grocery Co., Luby's and City Public Service (CPS).
"We're definitely expanding, getting big in security consulting, especially since 9/11."
Now Kelmar has a total of 12 employees, which includes three investigators in Dallas and three in Houston.
"Our mission is to provide excellent service to our clients," says Riddle. "We do this by exposing corruption and giving them the tools to make a decision."
Many of Riddle's investigators are retired police officers.
Finding a nicheRiddle doesn't get so engrossed in his cases that he forgets it's a business.
"To be a successful P.I., you have to treat it like a business. You have to know how to market, know accounting, just like any other business. You also have to find a new niche where you can make good money," he says.
Riddle says Kelmar stands out in the private investigating industry because of its manpower capabilities, which allow it to take on large assignments.
"Kelly is good people and I trust him," says Robert Galloway, head of Galloway Detective Agency. Galloway has done business with Riddle for six years.
"He's an associate and he's always willing to help. I'm glad he's a good friend of mine, I wouldn't want him to be investigating me," Galloway adds.
Riddle's reputation has earned him spots on television shows like "Montel Williams" and "Sally Jesse Raphael."
He believes that his firm's longevity and reputation for quality have put him in the public eye.
"There's a lot of here today, gone tomorrow people in this business," he says. "Here, integrity is upheld."
In addition to conducting investigations, Kelmar offers private investigation classes for individuals interested in joining the industry. The $235 cost includes some on-the-job training with students working alongside a P.I.
The company also sells a number of investigation-oriented products to the general public, including pinhole board cameras, GPS watch locators and night vision eyeware that ranges in price from $49.95 to $2,195.
On the caseRiddle says he enjoys his career because every phone call is something new. He admits that he stays motivated because he's driven to find that one piece of the puzzle that puts everything together.
"I knew that I wanted to have some kind of impact on a community, and I wanted to do some good," he explains. "I figured that by being a tool that is used to expose corruption, you're doing good."
Over his many years in the business, Riddle has worked on some unusual cases. One case he remembers is tracking a man who had three different families living on three different coasts where none of them knew anything about the other families.
Another case he worked was featured on "Montel" and "Real-TV." It involved Riddle investigating an employee suspected of stealing money from a cash register. A hidden video camera was placed in a smoke detector above the register. The employee was observed breaking into and stealing money out of the register.
Riddle says he wants his clients to walk away feeling relieved.
"We want them to be glad they came to us and that we helped them solve their problems," he says.
"They did an excellent job," says Dwight Lieb, owner of La Fogata. Kelmar was hired to investigate a suspected internal theft problem at the local restaurant.
"A client can expect a superior degree of professionalism and genuine concern for your case," Lieb adds. "To them, you're not just another number."
In all the cases Riddle has conducted, he has never been compromised. He credits his success to knowing how to relate to different types of people.
"You have to forget you're investigating and just use your people skills," he says. "If I'm investigating you, you won't know it."
Riddle isn't having an identity crisis. It's all part of his job as a gumshoe.
"You have to know how to blend," says Riddle, owner of private investigation firm Kelmar & Associates Inc. "I can introduce myself as a doctor or attorney, and as long as I can carry the lingo, I'm not compromised. I can be anybody I want to be."
Taking on different identities is a job requirement for investigating, Riddle says, who handles malpractice, insurance fraud cases and more.
But he's quick to note that the work isn't glamorous and that the life of a private investigator is far removed from that depicted on such television shows as "Magnum P.I."
"The majority of shows don't even come close," he says. "They either depict the P.I. as a little slow, a kicked-off-the-police-department type, or they're always in shoot-outs. None of that is correct."
But, Riddle says, while his business may lack glamour, it more than makes up for it in terms of challenge.
Since opening his investigation firm in 1989, Riddle has earned a reputation for integrity and honesty, culminating in being named the Private Investigator of the Year in 2000 by the National Association of Investigative Specialists (NAIS).
Call of dutyLaw has been something Riddle has been attracted to most of his life, he says. He earned a degree in criminal justice from the University of North Alabama in his native state and then served as a police officer for seven years in Florence, Ala.
While involved with law enforcement, he was a member of the SWAT Team, a training officer, emergency medical technician, evidence technician, arson investigator and traffic investigator.
Prior to founding Kelmar, Riddle worked with two other private investigation companies, including a nationwide operation. He also worked in the insurance industry as an adjuster and an investigator.
Riddle, who now lives in San Antonio, founded Kelmar with a friend, Mark Jones, after the insurance investigation firm where Riddle was employed went out of business. They set out to conduct a variety of corporate and general investigations, including workplace and general investigations.
Jones eventually left to become a marriage and family counselor.
Riddle has been designated an expert in physical surveillance and insurance investigations by NAIS, and also is a recognized specialist in nursing home abuse, computer and Internet investigations, and missing persons.
In its first year of business, the company had revenues of $250,000. Today, the company's revenues are in the million-dollar range, Riddle says.
That's not bad considering Riddle never intended to open his own company.
"I started the company out of necessity," he says. "I never wanted to be my own boss."
Nor did Riddle intend to be an author. But that was 10 books ago.
Among his written works are "Private Investigating Made Easy," and "To Serve and Protect: The True Story." Riddle is also at work on his first mystery novel.
"It's been an interesting walk. At first we started investigations in insurance then we started branching out to corporate work, and corporate work has been our mainstay ever since. That's where we make our bread and butter."
They have done investigations for H.E. Butt Grocery Co., Luby's and City Public Service (CPS).
"We're definitely expanding, getting big in security consulting, especially since 9/11."
Now Kelmar has a total of 12 employees, which includes three investigators in Dallas and three in Houston.
"Our mission is to provide excellent service to our clients," says Riddle. "We do this by exposing corruption and giving them the tools to make a decision."
Many of Riddle's investigators are retired police officers.
Finding a nicheRiddle doesn't get so engrossed in his cases that he forgets it's a business.
"To be a successful P.I., you have to treat it like a business. You have to know how to market, know accounting, just like any other business. You also have to find a new niche where you can make good money," he says.
Riddle says Kelmar stands out in the private investigating industry because of its manpower capabilities, which allow it to take on large assignments.
"Kelly is good people and I trust him," says Robert Galloway, head of Galloway Detective Agency. Galloway has done business with Riddle for six years.
"He's an associate and he's always willing to help. I'm glad he's a good friend of mine, I wouldn't want him to be investigating me," Galloway adds.
Riddle's reputation has earned him spots on television shows like "Montel Williams" and "Sally Jesse Raphael."
He believes that his firm's longevity and reputation for quality have put him in the public eye.
"There's a lot of here today, gone tomorrow people in this business," he says. "Here, integrity is upheld."
In addition to conducting investigations, Kelmar offers private investigation classes for individuals interested in joining the industry. The $235 cost includes some on-the-job training with students working alongside a P.I.
The company also sells a number of investigation-oriented products to the general public, including pinhole board cameras, GPS watch locators and night vision eyeware that ranges in price from $49.95 to $2,195.
On the caseRiddle says he enjoys his career because every phone call is something new. He admits that he stays motivated because he's driven to find that one piece of the puzzle that puts everything together.
"I knew that I wanted to have some kind of impact on a community, and I wanted to do some good," he explains. "I figured that by being a tool that is used to expose corruption, you're doing good."
Over his many years in the business, Riddle has worked on some unusual cases. One case he remembers is tracking a man who had three different families living on three different coasts where none of them knew anything about the other families.
Another case he worked was featured on "Montel" and "Real-TV." It involved Riddle investigating an employee suspected of stealing money from a cash register. A hidden video camera was placed in a smoke detector above the register. The employee was observed breaking into and stealing money out of the register.
Riddle says he wants his clients to walk away feeling relieved.
"We want them to be glad they came to us and that we helped them solve their problems," he says.
"They did an excellent job," says Dwight Lieb, owner of La Fogata. Kelmar was hired to investigate a suspected internal theft problem at the local restaurant.
"A client can expect a superior degree of professionalism and genuine concern for your case," Lieb adds. "To them, you're not just another number."
In all the cases Riddle has conducted, he has never been compromised. He credits his success to knowing how to relate to different types of people.
"You have to forget you're investigating and just use your people skills," he says. "If I'm investigating you, you won't know it."
Request Services
Get in touch with us by phone, email, or fill out the form and one of our security consultants will get back to you as soon as possible.
5718 Westheimer Ste. 1000, Houston, TX 77057
Monday to Friday 8:00am - 5:00pm Weekends: Closed
Due to Covid - By Appointment Only