Mica Miller Timeline – Pastor John Paul Miller’s Wife Found Dead – Ruled Suicide – True Crime

Mica Miller death ruled suicide. John Paul Miller is eyed, by many, as suspicious behaviors.

Mica Miller Death Timeline of Events

* February 4th – Pastor John-Paul preaches a sermon on Korah and Moses and how it’s wrong to rise against religious leaders.

* February 23rd – Pastor John-Paul files for spousal support.

* February 25th – In another sermon to his congregation Pastor John-Paul says a mentally ill person doesn’t know they’re sick. “You have to trust people around you. The thing that’s sick is your mind and your mind is what you need to realize that you’re sick.”

* March 10th – Pastor John-Paul preaches a sermon and reveals he went through two years of messages on his wife’s phone. He found that 18 people reached out saying to her, “If you ever want to talk about your husband you can talk to me and I’ll keep it confidential.” Visibly upset, the Pastor followed up with, “That’s a demon talking…”

* March 10th – Pastor John-Paul says to his congregation, “One thing I’m going to preach about is gettin’ rich, strong, healthy, and finding a hot wife that loves Jesus.” … while wearing his wedding ring.

* March 10th – Pastor John-Paul tells his congregation that his wife was in the hospital and as soon as she got out, she left him. “She gets out and she just leaves. Just completely leaves me. Leaves everything, drains the bank account and just goes. Guess what? While you’re talking bad about me out there I’m building a school in Africa for over a hundred kids to be able to be fed.”

* March 12th – Pastor John-Pauls request for spousal support was dismissed. There’s no explanation as to why.

* March 17th – Pastor John-Paul tells a story of a Pastor whose wife left him for a member of his staff. The pastor had to hire a third party company to find her. Once he found her, divorce papers were drawn up. When the time came to sign the papers, the Pastor couldn’t do it because, “Bible says divorce is wrong…” and if she wanted out she would have to leave him.

* March 17th – In a social media post made on Facebook by Mica’s sister, Sierra Francis, says she keeps an eye on her phone, “…for fear of my sisters safety due to others behaviors towards her.” She goes on to mention the sermon from March 17th and calls out the congregation of Solid Rock Church.

* March 18th – Mica posts a video encouraging others. She says, “I’m just making sure my heart doesn’t have any unforgiveness, bitterness, resentment… Just forgiveness and hope for the future… and peace.”

* March 22nd – Mica posts another video suggesting she was being abused physically and mentally. She also says, “God hates divorce. But how does God feel about abuse?” She also suggests her husband forced her to take illegal drugs.  

* April 16th – Mica files for spousal support. 

* April 23rd – A hearing notice was sent out for Mica’s request. A court date for June 5th was set.

* April 27th – Mica Miller is found dead.

2:54 p.m.

  • 911 call was made from an 843-area code number
  • Mica Miller asked if her phone could be located and then “threatened suicide”
  • Mica hung up the phone before further information could be gathered by dispatch
  • The telecommunicator tried to call Mica back multiple times and was unable to make contact
Mica Miller seen leaving her apartment.
Mica Miller seen leaving a residence in Myrtle Beach on April 27, 2024, on Margarita Drive. (Credit: Tonya Brown/WPDE)

3:03 p.m. – Robeson County deputies were dispatched to the Lumber River State Park for a well-being check and to attempt to locate Mica
3:05 p.m. – Contact was made with the Lumber River State Park superintendent
3:20 p.m. – Deputies request phone ping
3:31 p.m. – Deputies arrive at Lumber River State Park and begin the search with State Park rangers
3:33 p.m. – Robeson County Sheriff’s Office; Aviation Division; Air3 sUAV drone were dispatched to Lumber River State Park
3:42 p.m. – Telecommunicator contacted Verizon to request an updated location ping
3:50 p.m. – Detectives with Air3 sUAV arrived at Lumber River State Park

While conducting an aerial search, detectives were approached by a person who said he found a bag while fishing with Mica’s ID inside. Detectives took possession of the bag. The Robeson County Sheriff’s Office findings said this person heard crying while fishing and then a gunshot. The person stated he went further into the slough where he found the bag about two feet from the water’s edge.

4:23 p.m.

  • An individual contacted Robeson County 911 and said he located a body in the water. He had been fishing on his kayak when he found the body.
  • Searching deputies secured the area for an investigation.

5:30 p.m. – Chief of Detectives for RCSO arrives at the incident location

5:54 p.m.

  • Detectives and RCSO arrive at the incident location
  • The medical examiner was contacted and requested
  • CSI technician photographed the area of investigation to include the vehicle belonging to Mica Miller. Items of evidence were collected from her car and the incident location.

7:11 p.m. – Firearm is located in the water

Mica Miller's body found at Lumber River State Park.
The gun was found in the water at Lumber River State Park after Mica Miller died by suicide. (Credit: Tonya Brown/WPDE)
Gun used to kill Mica Miller - 9mm handgun.

Detectives also shared ring camera footage, which showed Mica at a residence on Margarita Drive in Myrtle Beach at 11 a.m. on April 27.

Security footage then showed Miller at Dick’s Pawn Shop on Mr. Joe White Avenue in Myrtle Beach at 12:13 p.m. on April 27.

Mica Miller seen on security footage at a pawn shop.
A photo of Mica Miller at Dick’s Pawn Shop on Mr. Joe White Avenue in Myrtle Beach on April 27, 2024. (Credit: Tonya Brown/WPDE)

Officials also released findings of her husband, John-Paul Miller’s location.

The investigation revealed that John-Paul traveled to Charleston for a sporting event on April 26, the day before Mica died. This was proven through eyewitnesses and license plate readers. Detectives confirmed he stayed overnight in the Charleston area.

John Paul Miller's truck was seen traveling from Charleston to Myrtle Beach on the day of Mica's death.
John Paul Miller was traveling from Charleston to Myrtle Beach on April 27, which was proven through license plate readers. (Credit: Tonya Brown/WPDE)

John-Paul Miller returned to Myrtle Beach on April 27. While traveling to and from Charleston, he was with other people.

Mica’s family met with deputies to discuss their investigation findings. However, John-Paul Miller asked the Robeson County Sheriff’s Office to meet him in South Carolina. Sheriff Burnis Wilkins said they do not plan to travel to South Carolina.

Memorial for Mica Miller held at Solid Rock Church where John Paul Miller is the pastor.
(Credit: Jenna Herazo/WPDE)

Friends and family held a rally Sunday out front of Solid Rock Church

* April 28th – Pastor John-Paul announces to his congregation, at the end of service, that his wife was dead and it was, “self induced.” He also reminds the congregation of her mental illness. 

* April 28th – Mica’s sister, Sierra Francis, posts on Facebook saying, “Don’t listen to the false stories being told about her (Mica).”

* May 2nd – In an interview with ABC 15, Pastor John-Paul Miller says, “She was probably the greatest wife anyone could ask for.” He also, once again, points out her mental illness.

Mica’s family also held a memorial service Sunday afternoon – at the same time a memorial service, hosted by Mica’s estranged husband Pastor John-Paul Miller, was held at the Solid Rock Church.

John Paul Miller and Mica Miller
(Courtesy of John-Paul Miller)

An announcement made by the church Monday said Pastor John-Paul Miller was released from his ministerial functions for “a time of healing, counsel, and guidance, pursuant to our governing instrument.” The church’s website was also suspended over the weekend.

Do Private Investigators Find Hidden Bank Accounts & Uncover Assets?

Find hidden assets.

Why Hidden Bank Account Searches Are Important

Bank accounts, brokerage accounts and other financial holdings are considered very important when considering divorce, pursuing alienation of affection claims, investigating inheritance claims, fraud investigations, and solving financial disputes. Illegal acts, such as tax evasion and money laundering can be very difficult to discover. This is mainly because international and even domestic laws can be extremely complex and the financial system isn’t as transparent as one would hope. Discovering hidden bank accounts is crucial in ensuring a fair distribution of assets, identifying potential fraud, and resolving legal disputes.

How to Find Hidden Bank Accounts & Uncover Unknown Assets

Discovering hidden bank accounts can be very difficult and sometimes impossible without the assistance of an attorney, but there are several methods available to assist in the process. Every technique has their advantage and difficulties. The success of each approach will depend on the circumstances encompassing the bank account search.

Online Asset Searches to Find Hidden Assets and Property

There are ways to search for assets online. These online asset searches could discover information regarding the hidden bank accounts. Examples of the information that may be discovered are:  the financial institution, account balances, account numbers, and details about the owner(s) of the account. However, these searches may not always be comprehensive, and they might not reveal all the necessary information required to identify a concealed bank account.

Searching multiple online resources is highly recommended to help validate your findings. In order to confirm certain information, a subpoena may need to be issued, as privacy laws protect you and unfortunately the person wanting to hide the truth too. Combining various online resources and retaining a savvy attorney and private investigator can increase the chances of uncovering hidden financial assets.

Should You Hire a Private Investigator to Find Hidden Bank Accounts

Retaining the investigative services of a PI may help in locating hidden bank accounts. Some private investigators have the specialized expertise and resources that enable them to successfully conduct asset searches and reveal concealed financial holdings.

With that said, hiring a private investigator could prompt unwanted ramifications. By hiring a the wrong PI – one that is incompetent or unqualified could cost you money and perhaps put you in legal “hot water”. Utilizing questionable tactics and techniques or if the investigator exceeds the scope of their assignment, it can prompt legal action and even criminal penalties.

The best way to avoid these risks is to do your due diligence into the private investigator. Verify their credentials and try and determine their expertise (or lack thereof) regarding bank searches. Look closely at their reviews to ensure they have a proven track record of success in locating hidden assets.

Making Legal Requests for Financial Information & the Power of Subpoena

In matters such as divorce or inheritance cases, sending a subpoena or legal requests for financial information and bank statements is usually an effective way to reveal hidden bank accounts, balances and transactions. This process typically involves submitting a formal request (or subpoena or even court order) to the relevant financial institutions. You will need to provide the owner of the accounts name any other details the financial institution may need.

While legal requests can be powerful tools, there are associated risks to consider. Financial institutions may deny the request for bank account information or impose strict requirements for disclosure. Additionally, the individual whose financial information is being requested may become aware of the inquiry, potentially leading to further concealment or obfuscation of assets.

Public Records Websites and Resources

Many states and government agencies provide online resources and databases of public records. This public information can help you locate unclaimed bank accounts, tax refunds, lost accounts, life insurance accounts and more. Below are just a couple of these resources that you can use in your quest for answers:

  • MissingMoney.com & the National Credit Union Administration (NCUA)

So, if you’re currently looking for hidden bank accounts, you may just discover a forgotten savings account, investment account, or tax refund or even a utility bill refund. However, it is important to note that these resources may not always provide comprehensive information, and additional investigation may be necessary.

However you decide to seek out this information, just be sure to know and obey the law and follow ethical standards. Combining multiple strategies and consulting with experienced professionals, such as attorneys or financial investigators, can increase the chances of success in locating concealed financial assets.

Offshore Bank Account Search to Uncover Hidden Assets

When it comes to keeping finances secret, offshore bank accounts are like the ultimate secret stash spot. Whether you’re trying to keep some cash away from your better half, business buddies, creditors, or even Uncle Sam, parking your money in one of those hidden havens can be a real lifesaver.

But let’s be real, uncovering those slick offshore and overseas accounts is no easy feat. It’s almost like trying to find a needle in a haystack… Except the haystack is protected by a maze of confusing laws and regulations.  

Between the jurisdictional hurdles, those pesky bank secrecy laws, and the complex ownership structures that make your head spin, locating an offshore account can feel like Mission Impossible. It’s like trying to solve a riddle wrapped in an enigma, wrapped in a burrito…wait, scratch that last part.

But here’s the thing, with the right strategies and resources up your sleeve, it’s totally possible to uncover those hidden gems. It might take some serious detective work, it IS possible.

So, whether you’re trying to settle a divorce, claim your rightful inheritance, or just satisfy a debt owed to you, don’t let those offshore accounts stay buried forever. With a little perseverance and the right tools in your arsenal, you might just crack the code and unveil those elusively hidden assets.

Investigation Strategies to Uncover Offshore Bank Accounts

1.   Hiring a Private Investigator:  Private investigators that specialize in asset searches can be a critical component to locating offshore bank accounts. Often times a spouse has hidden or secret bank account overseas. Investigative services may reveal spousal financial infidelity. Spouse infidelity adultery is where only one spouse is privy to financial holdings, expenditures, excessive debts and even purchases made for a paramour. Certain PI’s have the expertise and resources to navigate the complexities of international laws and banking regulations.

2.   Retaining an Attorney:  Getting a qualified attorney to help with crafting legal request, subpoenas, or obtaining court orders can be vitally important in revealing offshore accounts. Experienced attorneys can provide the necessary guidance when entering a complex process and ensure compliance with local and international laws.

3.   Utilizing Asset Search Databases:  There are various online databases and resources that can be used to search for overseas bank accounts and other hidden assets. These tools can provide valuable information and lead to potential leads in asset discovery. 

Asset Search Cases: Divorce & When a Spouse is Hiding Assets

Divorce settlements can often involve finding accounts that one spouse doesn’t want the other to know about. In the beginning stages of the divorce, attorneys may issue a set of interrogatories (questions & requests) to the estranged parties. If one or both parties come across as untruthful about their finances, one or both attorneys may look into getting an asset search performed by a professional. One notable case involved a spouse who discovered offshore accounts containing millions of dollars, leading to a more equitable settlement. One or both spouses hiding assets, in divorce case, is very common.

Can a Private Investigator Agency Find Hidden Bank Accounts and Assets

How to find hidden bank accounts.

Locating Hidden Bank Accounts – Hire a Private Investigator to Find Hidden Assets

Private investigation firms frequently receive requests from clients who suspect that their spouse, business partners, or individuals who owe them money have concealed assets or are involved in fraudulent activities. One of the most common services sought from private investigators is the location of hidden bank accounts.

The Search For Hidden Bank Accounts

While the concept of hiding money in a bank account, whether domestic or offshore, may seem straightforward, the reality of concealing financial resources can be more complex than it appears. The question arises:

Can a private investigator successfully locate hidden bank accounts?

To address this inquiry, it is essential to consider various factors and challenges involved in the process of uncovering concealed financial holdings.

Firstly, the legalities surrounding the investigation must be carefully maneuvered. Private investigators are bound by specific laws and regulations that govern their actions, including the acquisition and handling of sensitive financial information and personal details. Adherence to these legal frameworks is crucial to ensure the validity and admissibility of any evidence obtained during the investigation.

Additionally, the expertise and resources of the private investigator play a significant role in their ability to locate hidden bank accounts successfully. Experienced investigators often possess specialized knowledge and techniques for conducting financial investigations, as well as access to proprietary databases and networks that can aid in the search process.

Furthermore, the level of complexity involved in concealing assets can vary significantly. In some cases, individuals may employ sophisticated methods, such as offshore accounts, shell companies, or complex ownership structures, to obscure the trail of their financial holdings. These intricate schemes can pose significant challenges for even the most skilled private investigators.

It is also essential to consider the potential risks and implications associated with uncovering hidden bank accounts. Depending on the circumstances, the revelation of concealed assets could have legal, financial, or personal consequences for the parties involved.

While private investigators have the potential to locate hidden bank accounts through various investigative methods and resources, the success of such endeavors is influenced by factors such as the investigator’s expertise, the complexity of the concealment methods employed, and the legal and ethical boundaries within which they operate.

Ultimately, the decision to engage a private investigator for the purpose of locating hidden bank accounts should be made after careful consideration of the specific circumstances, potential risks, and the investigator’s capabilities and track record in conducting financial investigations.

More Places Where Property and Money are Concealed

Individuals may employ various methods to conceal their assets, ranging from legal strategies to unethical practices. One approach involves the creation of private corporations or limited liability companies to hold valuable possessions. Another method involves the use of offshore accounts, which can be used to obscure wealth from authorities, subject to applicable laws and regulations.

Converting Money and Assets into Different Forms & Methods to Find the Truth

In some cases, individuals may attempt to convert their assets into different forms, such as investing in high-priced real estate, vehicles, boats, planes, recreational vehicles, jewelry, art, or other luxuries. When making these investments, the owner may use cash to acquire the asset and potentially misrepresent its true value on official documents.

Less conspicuous assets, such as retirement accounts, equities, bonds, life insurance policies, annuities, and safe deposit boxes, can also be used to conceal wealth.

Additionally, assets that have not yet been received may be considered “hidden.” Examples include stock options, deferred bonuses, or anticipated salary increases. In situations such as divorce proceedings, one party may attempt to delay the receipt of these assets until after the finalization of the divorce to avoid dividing them with the other party. Similarly, individuals may postpone signing new business deals for the same reason.

Income underreporting can occur when individuals have child support or creditor obligations, as they may be tempted to retain additional income generated from employment or self-employment.

In some instances, third parties may be involved in asset concealment, either knowingly or unknowingly. Parents may utilize custodial accounts or other methods to obscure assets from others. There have been cases where one partner pretends to owe money to another, only to repay the debt and subsequently request its return. Businesses can legally make payments to a spouse or creditor under the guise of a fictitious individual.

Individuals may also conceal possessions in safety deposit boxes, with friends, or at relatives’ residences. In cases of infidelity, a partner may purchase apartments, high-end clothing, expensive jewelry, or even hold cash for their own benefit. It is important to note that while some asset concealment methods may be legal, others may involve unethical or illegal practices. Proper due diligence and adherence to relevant laws and regulations are crucial when dealing with asset-related matters.

How to Hire a Private Investigator: A Comprehensive Guide

How to hire a private investigator.

Life’s complexities often requires the expertise of professionals who possess specialized skills and resources that can assist in traversing such complexities. When faced with situations that demand discreet and thorough investigations, hiring a private investigator (PI) can be the key to uncovering the truth. However, the process of selecting the right PI can be daunting, as it involves entrusting them with sensitive information and entrusting them to handle delicate matters with utmost discretion and professionalism. In this comprehensive guide, we’ll walk you through the essential steps to hire a private investigator, ensuring you make an informed decision to achieve the desired results.

Understanding the Needs to Hire a Private Investigator

Before getting to far into the hiring process, you should assess, firstly, whether your situation warrants the services of a private investigator or not. PIs are often sought for various reasons, including but not limited to:

Background Checks

Whether you’re considering hiring a new employee, vetting a potential business partner, or exploring a romantic relationship, conducting a thorough background check can provide invaluable insights and help mitigate potential risks.

Infidelity Investigations

Suspicions of infidelity can strain even the strongest relationships. You can hire an investigator to discreetly gather evidence, allowing you to make informed decisions about the future of your relationship.

Locating Missing Persons

If you’re searching for a long-lost relative, friend, or debtor, a PI’s skip tracing expertise can be invaluable in locating individuals who have seemingly vanished.

Asset Search and Net Worth Investigations

In cases involving financial disputes, asset searches, and net worth investigations can uncover hidden assets, income sources, and potential fraudulent activities. Hire a pi to uncover assets or hidden accounts.

Choosing the Right Private Investigator

With a clear understanding of the investigative services you need, the next step is to identify and select the most suitable private investigator for your case.

Licensing and Credentials

It’s essential make sure the investigator you’re considering is licensed and operates within the legal boundaries of your state or jurisdiction. Reputable PIs should be transparent about their credentials and/ or certification provide proof of licensing upon request.

Experience and Specialization

Different types of investigations may require specific skills and experience. Look for a PI who specializes in the area relevant to your case, whether it’s to conduct surveillance, perform infidelity investigations, corporate espionage, or skip tracing.

Reputation and References

A PI’s reputation and references can speak volumes about their professionalism, discretion, and track record of success. Seek recommendations from trusted sources, read online reviews, and make sure you ask for references from potential candidates.

The Hiring Process

Once you’ve identified a few potential candidates, it’s time to hire someone and ensure a smooth working relationship.

Initial Consultation

A good PI will offer a free & confidential initial consultation, during which you can discuss the details of your case, ask questions, and gauge their level of expertise and approach.

Pricing and Contract Terms

Be prepared to discuss pricing and contract terms upfront. Reputable PIs should provide transparent pricing structures and clearly outline the scope of their services, deliverables, and confidentiality agreements.

Communication and Progress Updates

Establish clear communication protocols and expectations regarding progress updates. A professional PI should keep you informed throughout the private investigation and promptly address any concerns or questions you may have.

Ethical and Legal Considerations

Victory Investigations - scales of justice

Hiring a private investigator can be complex, regarding the legal and ethical concerns. It’s essential to understand the boundaries and ensure that the PI you hire operates within the extent of the law.

Privacy and Confidentiality

Private investigators must respect the privacy rights of individuals and maintain strict confidentiality regarding the information they gather. Discuss these expectations upfront and ensure that your PI adheres to industry best practices.

Legality of Surveillance Techniques

Certain surveillance techniques, such as wiretapping or intercepting communications, may be illegal without proper authorization. Ensure that your PI employs only legal and ethical methods of investigation.

Evidence Admissibility

If your investigation may lead to legal proceedings, it’s crucial to ensure that the evidence gathered by the PI is admissible in court. Discuss this aspect with your PI and seek legal counsel if necessary.

Building a Productive Relationship

A successful investigation often hinges on the relationship between the client and the private investigator. To foster a productive partnership, consider the following:

Open and Honest Communication

Provide your PI with all relevant information upfront and maintain open lines of communication throughout the investigation and provide additional information, as needed. This transparency can help streamline the process and avoid misunderstandings or delays.

Reasonable Expectations

While PIs are skilled professionals, it’s important to have realistic expectations. Discuss timelines, potential challenges, and limitations to ensure you’re on the same page. A PI cannot guarantee an outcome of a case. They can merely offer their time and expertise and best efforts to reach an optimal conclusion. 

Trust and Confidentiality

Building trust and maintaining confidentiality are paramount in the client-PI relationship. Respect the PI’s need for discretion and allow them to conduct their investigation without unnecessary interference or micromanagement.

Hiring a private investigator can be a complex and delicate process, but by following these guidelines and exercising due diligence, you can increase your chances of achieving the desired outcomes. Remember, a reputable and experienced PI can be an invaluable asset in uncovering the truth, resolving conflicts, and providing the peace of mind you seek.

Mastering Surveillance Techniques: A Guide for Private Investigators

How do private investigators conduct surveillance?

surveillance vehicle

Private investigators conduct surveillance by using various techniques and strategies to gather information discreetly. When hiring a private investigator for a case such as suspected infidelity, the pi will often use a combination of physical and digital surveillance tactics. This may include mobile surveillance where the investigator stakes out at a suspect’s location or passive surveillance using specialized equipment. The investigator must approach surveillance operation with caution and professionalism to obtain the best results.

Private investigators must be well-versed in different types of surveillance and expert surveillance techniques to effectively gather evidence. Experienced private detectives working for a private investigation firm may utilize advanced surveillance equipment and technology to track a subject’s movements and activities.

Types of Surveillance

Surveillance is one of the key techniques used by private investigators to develop information on individuals or groups. There are various approaches to surveillance, including physical surveillance and technical surveillance. Physical surveillance depicts private investigators trespassing to capture footage or gather evidence. On the other hand, technical surveillance involves the use of electronic devices such as hidden cameras and GPS trackers. The best surveillance techniques for private investigators depend on the specific situation at hand, with vehicle surveillance being a common tactic utilized in surveillance services. Private investigators do surveillance in a discreet manner to gather information for their clients, always aiming to stay within legal boundaries.

Top Surveillance Techniques Used By Private Investigators

Physical surveillance 

can be broken into several segments. Mobile, static, and remote are a few types. Most commonly, physical surveillance is often used when investigators need to follow a target in person and gather evidence through observation. This may involve following someone on foot or in a vehicle to document their activities and interactions. Physical surveillance can be risky as it requires investigators to remain inconspicuous and avoid detection by the target. However, it can provide valuable information that may not be captured through other means.

Technical surveillance

on the other hand, involves the use of electronic devices to monitor a target’s activities. This may include installing hidden cameras in a target’s home or vehicle, tracking their movements using GPS devices, or monitoring their phone calls and online communications. Technical surveillance can be a highly effective tool for gathering evidence, but it also raises legal and ethical concerns about invasion of privacy.

Vehicle surveillance

is a common tactic used by private investigators to track a target’s movements. This may involve following a target in a vehicle, monitoring their activities at a distance, or tracking their movements using GPS technology. Using GPS trackers (where legal) is a key vehicle surveillance technique. It can be a valuable tool for gathering evidence in cases involving infidelity, fraud, theft or other types of misconduct.


The best surveillance techniques for private investigators really depend on the specific circumstances of each case. By using a combination of physical surveillance, technical surveillance, and other tactics, private investigators can gather the information their clients need to make informed decisions. It is essential for private investigators to conduct surveillance in a legal and ethical manner to protect the rights and privacy of all parties involved. 

Top Tips For When Private Investigators Do Surveillance in the Field

Learn to blend in or “Hide in Plaint Sight”

Private investigators have the same rights as anyone else when it comes to public spaces. However, they must adhere to the law and are not permitted to trespass on private property or unlawfully access buildings, devices, or storage areas without proper authorization. Despite what Hollywood might show, real private investigators do not engage in trespassing or breaking into private property. Such actions are not only illegal but also contradict the ethical standards of the profession.

Use online resources to start

Private investigators should use online public resources to start their investigations. Social media, forums, and data aggregation sites can provide excellent nuggets of intel on the subjects of the investigation. In addition, most pi’s also have access to paid databases, which can have more detailed and accurate information than what’s readily available to the general public. Starting online is a fantastic way for the investigator to brief themselves on the habits, whereabouts, physical characteristics, and much more of the subjects.

Avoid making eye contact

This goes hand-in-hand with blending in. This is particularly important when observing your subject in a restaurant or bar or within a small area like a store. Since COVID, people have become more alert and aware of their surroundings. Trust has diminished, so being unnoticed has become more difficult, but a good private investigator should learn to be as discreet as possible for an effective surveillance.

Be prepared for the subject’s next move – Chess not Checkers

Anticipating your next move(s), based on what the subject may do is a game of strategy. Seasoned private detectives understand the importance of this technique and goes along with our next bullet point – Don’t get to close. Being able to respond to a subject’s moves is key. Will they turn left? If so, what’s my best lane options without drawing attention to myself? If they go through this light and it starts to change, can I make it through? Is there a car between us that may stop at the yellow? There are too many scenarios to cover, but you get the point.

Don’t get too close 

But also don’t let your subject too far out of sight either. This is a delicate balance, but one that must be mastered in order to be a great private detective. Getting too close may draw attention to yourself, but putting too much distance between you and your subject may also cause you to lose them. This is particularly true in rush-hour traffic or congested areas. Utilizing one of the best surveillance vehicles is an important aspect of this technique.

Have a cover story

Private investigators are confronted often. It can be a nosy neighbor or even the subject themselves. Having an alibi or a good cover story for why you are where you are and who you are is your best weapon in these situations. Props, disguises, changes of clothes, or just adding a hat to your attire can be enough to make you seem like a different person than they thought they saw three other times. Dog leashes, car magnets signs, clipboards, etc. are props that can be used to throw the inquisitive person off. Never tell them the real reason you’re there. And if they call the police and depending on your state’s laws, you still may not have to tell law enforcement your true purpose for being there. North Carolina is a state where pi’s do not have to divulge their true purpose for being where they are.

Document and video EVERYTHING

It is crucial for your case and for your protection to document everything while on a job. You never know what might be important and you never know when you’ll be accused of something that you did not do. I know this seems like a no-brainer, but private investigators can get overwhelmed and forget this important step. You can never document too much. Get it all and just cut out what is unnecessary when reporting time comes.

Passive Surveillance

Passive surveillance can be just monitoring the GPS tracker or even deploying a passive GPS tracker or logger. This provides a wealth of information like the subject’s most common places visited, routes, speeds, and more. Monitoring social media and gathering open source intelligence can also provide a treasure trove of information. 

Surveillance Equipment

We’ve mentioned a number of tools and equipment of the top private investigators in this article. I have listed them and few more below:

  • GPS Trackers
  • HD video camera (camcorder style with great zoom and night enhancement)
  • Various styles of audio recorders – be aware of the laws in your state regarding audio recording
  • Binoculars 
  • Tinted windows
  • Blackout curtains
  • Tripod and monopod
  • Notepad or legal pad
  • Change of clothes and a couple of hats
  • Flashlights of various types
  • Night vision (not totally necessary, but I have found it to be an excellent investment and particularly useful)
  • Great surveillance vehicle
  • Cell phone (duh)
  • Covert cameras of different styles (i.e. key fob, black box, cell phone, pen, etc.)
  • Props
  • Batteries, charging cords, SD cards, and other accessories
  • Common sense and a sense of awareness

Witness Interviews and Statement Taking: Best Practices for Effective Evidence Collection

The Importance of Witness Interviews and Statement Taking

A critical component in many types of investigations is the ability to conduct thorough witness interviews and statement taking. These processes are vital for gathering valuable evidence, corroborating facts, and building a strong case. Witness statements can provide crucial insights, shed light on key events, and help establish timelines, motives, and potential suspects. Effective witness interviews and statement taking require a structured approach, attention to detail, and adherence to best practices.

interview interrogation statement taking

Preparing for the Interview & Interrogation

Background Research

Before conducting a witness interview, it’s essential to gather as much background information as possible. Research the case, the individuals involved, and any relevant details that could aid in the questioning process. This preparation will help you formulate targeted questions and identify potential inconsistencies or areas that require further exploration.

Choosing the Right Environment

The environment in which the interview takes place can significantly impact the witness’s comfort level and willingness to provide information. Opt for a neutral, quiet, and private setting that minimizes distractions and ensures confidentiality. A good interviewer will avoid incident locations or nearby areas when speaking with witnesses, so that the interviewee doesn’t feel intimidated. Conducting interviews in a neutral setting is best.

Conducting the Interview Process

Building Rapport

It’s super important to connect with the witness to encourage them to open up. Start the interview with a friendly vibe, introduce yourself, and let them know why you want to chat with them. Listen closely and genuinely care about what they have to say; it builds trust and makes them more likely to cooperate. Just keep the tone calm throughout the conversation.

Questioning Techniques / Interview Techniques

Utilize a variety of questioning techniques to elicit comprehensive and accurate information from the witness. Open-ended questions prompt witnesses to give a narrative version of the events. It is important not to lead a witness or suggest how events might have taken place. Follow up with clarifying questions to fill in gaps or address inconsistencies. Avoid leading questions that may influence the witness’s responses.

Documenting the Interview

Accurate and detailed documentation is essential during witness interviews. Consider recording the interview (with the witness’s consent) or taking meticulous notes. Capture verbatim quotes whenever possible, as they can be powerful evidence in court or during legal proceedings. Body language can be very telling. Take note of these non-verbal cues, as they may indicate whether the witness is being truthful.

Witness Statement Taking

Precision and Clarity

After the interview is complete, be sure to obtain the witness’s formal written statement. Ensure that the statement is clear, concise, and accurately reflects the witness’s account. Use precise language and avoid ambiguities or vague descriptions that could be open to interpretation.

Review and Verification

Be certain that the witness is clear about their statement. Have them read it allowed and make sure they agree with the accuracy and completeness of their account. Allow the witness to make corrections or clarifications if necessary. Once the statement is finalized, have the witness sign and date it to authenticate their account.

Handling Sensitive Information

In some cases, witness statements may contain sensitive or confidential information. Implement appropriate measures to protect the privacy and safety of the witness, as well as the integrity of the investigation. Redact or withhold sensitive information as necessary and follow established protocols for handling and storing confidential materials.

Best Practices for Effective Witness Interviews and Statement Taking

Maintain Objectivity

Throughout the interview and statement-taking process, it’s essential to maintain objectivity and avoid bias. Approach each witness with an open mind and refrain from making assumptions or judgments. Your role is to gather accurate information, not to validate or dismiss any particular narrative.

Respect Privacy and Legal Rights

Respect the privacy and legal rights of the witness at all times. Inform them of their rights, including the right to legal representation if applicable. Ensure that the witness understands that their participation is voluntary and that they can choose not to answer certain questions or terminate the interview at any time.

Follow Legal and Ethical Standards

Adhere to all relevant legal and ethical standards when conducting witness interviews and taking statements. This includes obtaining proper consent, avoiding coercion or intimidation, and preserving the integrity of the evidence. Familiarize yourself with applicable laws and regulations, as well as your organization’s policies and procedures.

Continuous Training and Improvement

Witness interviews and statement taking are skills that require ongoing training and refinement. Participate in professional development opportunities, such as workshops, seminars, or online courses, to stay up-to-date with best practices and emerging techniques. Additionally, seek feedback and learn from experienced colleagues to continuously improve your interviewing and documentation abilities.

The Importance of Witness Interviews and Statement Taking in Investigations

Being an effective interviewer and having the ability to transpose witness’s accounts into formal statements is essential to the success of many criminal, civil, and corporate cases By adhering to best practices, maintaining objectivity, and respecting legal and ethical standards, private investigators can gather reliable and admissible evidence that can strengthen their cases and ultimately serve the pursuit of justice or organizational integrity.

How to Stop Your Smart TV From Spying on You

Protecting Your Privacy: Preventing Smart TVs from Becoming Surveillance Devices

In the age of the connected home, smart televisions have become ubiquitous centerpieces, offering a wealth of entertainment and convenience features. However, these advanced devices also raise significant privacy concerns, as they are often equipped with an array of sensors and data collection capabilities that can be used to monitor and spy on users.

Is your TV spying on you?

The Unsettling Surveillance Capabilities of Smart TVs

Smart TVs are designed to collect a wide range of personal data, including:

Voice Recordings: Integrated microphones enable voice control features, allowing users to issue commands through spoken input. However, these microphones could potentially be used to eavesdrop on private conversations.

Viewing Habits: Automatic content recognition (ACR) technology tracks what you watch, for how long, and which advertisements you’re exposed to. This data is often shared with content providers, broadcasters, and third-party advertisers.

Biometric Data: Some smart TVs come equipped with cameras capable of facial recognition, which can be used to identify users and monitor their activities.

Geolocation: Smart TVs may collect location data through IP addresses or built-in GPS sensors, potentially exposing information about your whereabouts.

This wealth of personal information is frequently transmitted to the TV manufacturer, streaming services, and advertising networks, raising significant concerns about privacy and the potential for misuse.

The Troubling History of Smart TV Surveillance

Over the past decade, there have been several high-profile incidents that have exposed the privacy-invading capabilities of smart TVs:

Smart TV's can listen in and collect your data.

In 2015, security researchers discovered that Samsung’s “always-listening” smart TVs were transmitting users’ voice commands to third-party servers for processing, including sensitive personal information.

A year later, it was revealed that some Samsung TV models were sending unencrypted voice data to external parties, potentially compromising users’ private conversations.

In 2017, the Federal Trade Commission (FTC) took action against television manufacturer Vizio, fining the company for secretly collecting and selling customer viewing data without their knowledge or consent.

Even the FBI has warned consumers about the surveillance risks posed by smart TVs, advising users to cover cameras when not in use and be mindful of the devices’ microphone capabilities.

These incidents have underscored the urgent need for smart TV owners to take proactive measures to safeguard their privacy and prevent their living rooms from becoming unintended surveillance hubs.

Securing Your Smart TV: A Comprehensive Approach

Fortunately, there are several steps you can take to significantly reduce the risk of your smart TV spying on you and protect your personal information:

1. Adjusting Privacy Settings

Begin by thoroughly exploring your smart TV’s settings menu and adjusting the privacy-related options. Look for the following capabilities and turn them off if possible:

Microphone access: Disable the ability for apps and voice control features to access the built-in microphone.

Camera access: If your TV has an integrated camera, restrict or disable access to it.

Data sharing: Opt-out of data collection and sharing with the TV manufacturer, content providers, and advertisers.

Personalized advertising: Turn off targeted advertising features that track your viewing habits.

By proactively limiting the access and data collection capabilities of your smart TV, you can substantially mitigate the surveillance risks.

2. Deploying a Virtual Private Network (VPN)

One of the most effective ways to protect your smart TV from spying is by using a reliable virtual private network (VPN). A VPN encrypts your internet traffic and masks your IP address, making it significantly more difficult for third parties to monitor your online activities and access your personal information.

When selecting a VPN for your smart TV, look for providers that offer the following features:

Strong encryption protocols: Ensure the VPN utilizes industry-standard AES-256 encryption to safeguard your data.

No-logs policy: Choose a VPN service that has a proven track record of not storing or sharing user activity logs.

Extensive server network: Access to a vast global network of VPN servers will allow you to bypass geographic content restrictions.

High-speed performance: Look for a VPN that delivers fast, reliable speeds to support seamless streaming on your smart TV.

Some top VPN providers that meet these criteria include ExpressVPN, NordVPN, and Surfshark. By connecting your smart TV to a VPN, you can significantly enhance your online privacy and security.

Victory Investigations highly recommends using either Proton VPN or NordVPN for your protection.

3. Disabling Voice Commands

Many smart TVs come equipped with voice control capabilities, allowing users to issue commands and navigate the user interface through spoken input. While convenient, these voice-activated features also pose a privacy risk, as the microphones could potentially be used to eavesdrop on private conversations.

If your smart TV has voice control, consider disabling this functionality altogether. Locate the relevant setting in your TV’s menu and turn off the microphone access to prevent unintended recordings.

4. Avoiding the TV’s Web Browser

Smart TVs often include built-in web browsers, which can be vulnerable to various security threats and tracking mechanisms. To minimize your exposure, avoid using your smart TV’s browser for general internet surfing and online activities.

Instead, consider using a separate device, such as a laptop, tablet, or dedicated streaming media player, for web browsing, online shopping, and accessing sensitive websites. This way, you can isolate your smart TV’s internet usage to strictly entertainment-related tasks, reducing the opportunities for data collection and compromised security.

5. Reviewing App Permissions

Smart TVs, much like smartphones and tablets, often allow users to install a variety of third-party apps and services. These apps may request access to sensitive device features, such as the microphone, camera, or location services, which could be exploited for surveillance purposes.

Carefully review the permissions granted to each app installed on your smart TV and revoke access to any features that you deem unnecessary or potentially invasive. By limiting the app permissions, you can restrict the data that these applications can collect and help prevent unauthorized surveillance.

6. Keeping Software Up-to-Date

Maintaining the latest software updates for your smart TV is crucial for addressing known security vulnerabilities and ensuring you benefit from the latest privacy protections.

Manufacturers regularly release firmware updates that patch security holes and improve the overall security posture of their devices. Enable automatic software updates or regularly check for and install the latest firmware to stay ahead of potential threats.

7. Utilizing a Guest Mode

Many smart TVs offer a dedicated guest mode or user profile feature, which allows visitors or secondary users to access the device without exposing your personal settings, preferences, or data.

By enabling the guest mode when others use your smart TV, you can help prevent unauthorized access to your accounts, viewing history, and other sensitive information. This added layer of segregation can enhance your overall privacy and security.

8. Monitoring Network Activity

To gain a deeper understanding of your smart TV’s network activity and potential security threats, consider using a network monitoring tool or a router with advanced security features.

These tools can help you identify and block suspicious traffic, detect potential intrusions, and gain visibility into the data your smart TV is transmitting. By closely monitoring your home network, you can better protect your smart TV from becoming a conduit for surveillance and data breaches.

Staying Vigilant and Taking Control of Your Privacy

In the era of the connected home, smart TVs have become increasingly ubiquitous, offering a wealth of entertainment and convenience features. However, these advanced devices also pose significant privacy risks, as they are often equipped with surveillance capabilities that can be exploited to monitor user activities and collect personal data.

By taking proactive measures, such as adjusting privacy settings, using a VPN, disabling voice commands, and regularly updating your smart TV’s software, you can substantially reduce the risk of your living room becoming an unintended surveillance hub. Remember, maintaining vigilance and taking control of your privacy is crucial in the age of ever-evolving smart home technologies. Ultimately, safeguarding your personal information and preventing your smart TV from spying on you requires a multi-faceted approach. By implementing the strategies outlined in this comprehensive guide, you can enjoy the benefits of your smart TV while ensuring that your privacy remains firmly under your control.

Cyber Scams Target Bank BRI Accounts in Indonesia: A Stark Contrast to US Protections

bank cyber scams phishing email
Bank BRI Indonesia

The Anatomy of the Bank BRI Cyber Scams

The modus operandi behind these cyber scams is alarmingly simple yet effective. Fraudsters have been employing a combination of phishing emails, malicious websites, and even SMS messages to trick Bank BRI customers into revealing their login credentials and one-time passwords. Once the criminals gain access to an account, they quickly transfer the funds to other accounts under their control, leaving the rightful owner financially devastated.

What makes these attacks particularly insidious is the level of sophistication employed by the cybercriminals. They often impersonate legitimate Bank BRI personnel, exploiting the trust and familiarity customers have with their financial institution. The scammers’ messages may even include convincing branding and language, further luring victims into a false sense of security.

Inadequate Cybersecurity Measures in Indonesia

The surge in Bank BRI cyber scams can be directly attributed to the country’s comparatively lax cybersecurity standards and protections for consumers. Indonesia has been slow to implement robust digital security frameworks, leaving its financial institutions and citizens vulnerable to the increasing threats posed by cybercrime.

Unlike the United States, where stringent regulations such as the Gramm-Leach-Bliley Act and the FFIEC Cybersecurity Assessment Tool have mandated heightened security measures for banks, Indonesia’s cybersecurity regulations remain fragmented and under enforced. This regulatory gap has allowed cybercriminals to exploit vulnerabilities in the country’s banking infrastructure with relative ease.

Compounding the problem is the limited availability of advanced cybersecurity technologies and the shortage of skilled professionals in the field. Many Indonesian banks, including Bank BRI, have been slow to invest in cutting-edge security solutions, such as multi-factor authentication, real-time fraud monitoring, and sophisticated data encryption.

The Stark Contrast with Cybersecurity in the USA

In contrast, the United States has made significant strides in safeguarding its financial sector against cyber threats. The implementation of robust regulations, coupled with heavy investments in cybersecurity technology and personnel, has helped to create a more secure environment for American banking customers.

The Gramm-Leach-Bliley Act, for instance, mandates that financial institutions implement comprehensive data protection measures, including the use of advanced encryption and access controls. The FFIEC Cybersecurity Assessment Tool further requires banks to regularly evaluate their cybersecurity posture and address any identified vulnerabilities.

Moreover, the US banking industry has been at the forefront of adopting innovative security solutions, such as biometric authentication, behavioral analytics, and artificial intelligence-powered fraud detection. These technologies have proven effective in thwarting sophisticated cyber attacks and safeguarding customer accounts.

The Urgent Need for Cybersecurity Reform in Indonesia

The recent spate of cyber scams targeting Bank BRI accounts has underscored the pressing need for Indonesia to overhaul its approach to financial sector cybersecurity. Policymakers and regulators must act swiftly to implement stringent security standards, mandate the use of cutting-edge technologies, and ensure robust enforcement measures are in place.

“Banks are targets because banks are where the money is,” BRI’s head of information Muharto, who like many Indonesians goes by only one name, said at a forum in Jakarta in June.

Additionally, banks in Indonesia, including Bank BRI, must prioritize cybersecurity as a strategic imperative. Increased investment in security solutions, enhanced customer education campaigns, and the recruitment of skilled cybersecurity professionals will be crucial in mitigating the growing threat of cyber attacks.

Failure to address these vulnerabilities could have far-reaching consequences, not only for individual bank customers but also for Indonesia’s entire financial system. The country’s economic stability and the public’s trust in its banking institutions are at stake, making cybersecurity reform an urgent national priority. As the world becomes increasingly digitized, the contrast between Indonesia’s and the USA’s approaches to financial sector cybersecurity highlights the critical importance of proactive, comprehensive, and well-enforced security measures. By learning from the successes of the US banking industry, Indonesia can take decisive steps to safeguard its citizens’ hard-earned savings and secure the future of its financial ecosystem.

Digital Detectives At Victory Investigations

As Digital Detectives, Victory’s private investigators are experienced in discovering spyware, malware, surreptitious monitoring, and sometimes intrusion. A Digital Detective is a specialized investigator that has skills in ethical hacking (including social engineering) and digital forensics. With these specialized skill sets, these detectives examine computers, cell phones, tablets, servers and more for unwanted and unwelcomed spying software and potential “breadcrumbs” or digital footprints left behind be a perpetrator or attacker. Digital Forensics can uncover vital evidence artifacts that would normally go undetected by the user. Spyware and malware are designed to be transparent to the user, so that they can do their dirty work behind the scenes.

The Manila Envelope – A Private Investigator’s Tale of Sex, Money, and Murder for Hire

Private Investigator Greensboro – Victory Investigations Office

Chapter 1

Cold Delivery – Infidelity & Betrayal

The harsh fluorescent lights of my private investigations office gave everything a sickly palor as I pored over the stack of photos and surveillance notes scattered across my desk. The cold evidence was damning – image after image of the curvaceous brunette, Marissa Calhoun, locked in intimate embraces with Greensboro City Councilman Peter Hardaway.

I shuffled the 8×10 glossies as my mind wandered back to the meeting where my client, real estate mogul Franklin Calhoun, had laid out the simple assignment – tail his wife and get proof of her suspected infidelity. At the time, it seemed like one of the cushier gigs I took in between the higher-stakes corporate espionage cases and digital forensics work. Just some routine surveillance to confirm a wandering wife. How little I knew…

The truth was, stumbling into this toxic web of lies, political corruption, and outright criminality had caught me completely off-guard. And now, with the mounting evidence before me, a sinking pit formed in my stomach – I realized I was firmly caught in the crosshairs. 

A loud thump against the door snapped me out of my self-absorbed trance. I instinctively drew my .38 special from the top desk drawer as a manila envelope slid under the door, coming to rest on the dingy industrial carpet.

“Who’s there?” I shouted, rising from my chair with the revolver extended. “Show yourself!”

Only silence answered my demand. Cautiously, I crept over and nudged the ordinary-looking envelope with the toe of my leather oxford until it opened enough for me to peek inside.

My blood instantly ran from my face.

There, nestled amidst the folds of cheap brown paper, was a single photograph – an overhead shot capturing me in my car on Stumptown Road three nights ago, staking out that seedy motor lodge where Marissa and her city councilman boy toy would tryst. Above the unsettling image were four neatly typed words that hit me like a boxer’s uppercut:

YOU’RE NEXT ON ICE.

Chapter 2

The Extra-marital Affair

The hairs on the back of my neck stood at attention, my gut recoiling at the implication behind those four menacing words. On ice – it was an underworld code, a lingering calling-card threat from one of the area’s more insidious organized crime outfits. It meant they were fixing to snuff you out, permanently.

But who would go to such extremes to silence me? And over what amounted to a glorified marital case? My mind raced, struggling to find the intersection between this open-and-shut infidelity expose and the shadowy criminal forces apparently seeking to eliminate me. 

As if the answer was taunting me, my gaze returned to the surveillance photos strewn about my desk – sweat-soaked images of Marissa and Peter locked in throes of unbridled passion. Of course, that was it! 

While the dalliance between a wealthy socialite and the slimy bureaucrat scratching her itch was certainly tawdry, it wasn’t something that would typically draw the ire of the city’s underworld elements. No, there had to be something else at play, some larger scheme afoot that I’d unwittingly foiled by uncovering their torrid tryst.

I felt a new wave of dread crest within me – whatever Marissa and Peter’s deeper motivations, the fact that I’d photographically caught them in the act had clearly fouled their machinations in a serious way. And judging by that ominous photo delivery, they weren’t afraid to play hardball to bury the truth I’d exposed.

I found myself again fixated on the images of Peter and Marissa, as if staring deeper into their awkwardly contorted poses would reveal some hidden insight. Suddenly, a flash of recollection lit up my consciousness – something Peter had growled at Marissa as they hurriedly dressed after one of their liaisons.

“Once your fool of a husband signs over that real estate portfolio to me, we’ll finally be able to escape this provincial burg together…” he had sneered while tucking his sweat-stained shirt back into his slacks.

Of course! The extramarital affair was merely a smokescreen for a bigger, insidious plot – one involving siphoning the substantial wealth Franklin had amassed through his various commercial and residential real estate holdings. 

Marissa was gaslighting her wealthy husband, stringing him along with the affair to disguise her true motivations. With inside intel and undo influence from Peter’s public office, the two of them were conniving to pilfer the Calhoun family assets through a combination of corporate chicanery and political strong-arming. 

And in exposing their sexually-charged charade, I had effectively blown the lid off their lucrative little scheme. No wonder they were now arrayed against me with lethal intent – my clumsy sleuthing had put tens of millions of dollars in potential ill-gotten gains at risk. I stared down at the haunting surveillance photo tucked inside that ominous manila envelope, the gravity of my perilous circumstances solidifying. If I didn’t act fast to batten down the hatches and unmask this conspiracy, I would indeed be the next one “on ice” — permanently silenced, just another untidy loose end in the trail of Marissa and Peter’s avaricious ambitions.

To Be Continued…..

How to Run a Background Check for Rentals – Tenant Background Checks in Greensboro NC

how to run a background check on a tenant greensboro nc

Rental properties are an excellent source of passive income. However, managing them comes with a fair share of accountability, responsibility, and potential liability. If you want to manage rental properties successfully and ensure the safety, reliability and financial stability of your tenants, then engaging in robust tenant background checks becomes crucial. They are a way for landlords to examine prospective tenants, identify any potential red flags and choose the best renter for the rental property. A typical tenant background check includes the following –

  • Verification of the prospective tenant’s identity
  • Examining his/her criminal history at the county, state and federal levels
  • Checking for prior evictions
  •  Checking global watchlists
  • Check for liens or other indebtedness
  • Follow up with prior landlords – previous rental history – were they a problematic tenant

Importance of Rental Background Checks – A Concise Guide for Greensboro North Carolina

A rental background check is crucial for every landlord or property manager who is serious about the safety of his/her property and also about the well-being of other tenants. A rigorous tenant screening process helps identify the potential red flags of a potential tenant, such as criminal or anti-social behavior, and inability or unwillingness to pay debts, etc.

When you review the rental payment history of a potential tenant, it becomes easy to understand whether or not they will be able to pay their rent on time. So, you are saved from the hassle and headache of rental fraud. Likewise, a tenant application with a crystal clear record also ensures that the passive income you receive from your rentals is steady, smooth and consistent.

A tenant with a history could bring unwanted problems your way. You will want to speak with the previous landlord or have a private investigator in Greensboro speak with them, in addition to running a background check on a prospective tenant.

What Is A Tenant Background Check – Top 3 Components

 Before getting into the basics of how to conduct a rental background check, let’s examine some essential components of a rental background investigation.

 Eviction Records & Previous Rental History

One of the most important components of background checks for rentals is looking for eviction records. Eviction records are big warning signs that something is wrong with the individual who might become your future tenant. It might hint at the applicant’s inability to pay rent on time, misconduct, or any type of anti-social behavior. These types of records may be difficult for landlords and property managers to obtain on their own. Victory Investigations’ private investigators, in Greensboro NC, have access to information that is not readily available to the general public that can potentially help validate the findings of a reputable tenant screening service. 

Request a Criminal Background Check on Tenants

A criminal record check offers insight and details into the criminal history of the applicant, including convictions a person may have. They are important to ensure everyone’s safety and minimize your liability as a landlord. However, there are regions that have laws prohibiting landlords from asking prospective tenants about arrest or conviction records, such as Oakland and Berkley California. Landlords should always be aware of local laws and regulations when conducting criminal history checks.

It is important to note that there are NO central criminal databases available to anyone outside of law enforcement. However, background screening agencies and private investigators for Greensboro know how to locate and combine criminal records from all 50 states.

Another important piece of information is that PI’s and background screening agencies provide “human-audited” background information. You cannot rely on online, automated background reports. Although many many have useful and accurate information, more often than not, they are riddled with inaccuracies, stale data, and cross-contamination from others with similar attributes. 

Request a Credit Report Through the Three Major Credit Reporting Bureaus

Credit reports and scores provide invaluable insight into the financial stability and payment records of your prospective tenant. An assessment of the same is crucial to ensure that you are renting your property to someone who can pay the rent on time, something that can be easily analyzed by checking their credit report and scores. TLO’s SmartMove service can help determine whether the applicant’s credit behavior is aligned with their self-reported income. The three major credit bureaus  or major credit reporting agencies are:  Equifax, Experian, and Transunion. One or more of these are often used to screen prospective tenants. Just be sure to bone up on tenant rights before you run a credit report.

How to Run a Background Check on a Tenant in Greensboro NC – Four Best Practices

Get Written Consent to Run a Credit Check & Tenant Screening Report

The first and probably the most important step is to get written consent, from the applicant. You and the applicant should be aware of the Fair Credit Reporting Act (FCRA) and that he or she feels okay if you conduct their background check. You can provide them with an FCRA disclosure and it is best that they sign saying they have received it.

You may also want to have copies of the Fair Housing Act, printed off, to provide the rental applicant. Without written consent, rental background investigations could result in fines and other legal actions. All of this can be included in the complete rental application.

It’s probably not enough for them to verbally provide this information or just write it down. We suggest making copies of their driver’s license and social security card and keep them in their file.

If you do require their driver’s license information, it’s a good idea to provide them with Driver License Protection Act (DLPA) disclosure as well. Covering your bases will prevent a lot of potential future headaches – trust us.

Collect Required Information

Once you’ve decided to screen prospective tenants, for your rentals, you should ask for the right documents and information. This includes –

  • The full name of the applicant
  • Date of birth
  • Social security number
  • Current and previous addresses
  • Income (possibly verification of income i.e. paystub)
  • Employment history
  • References, including previous landlord(s)

Choose Trusted Background Check Service in Greensboro North Carolina

The third and very crucial step of a rental background check is to choose the best screening service. A reputable tenant screening service, like E-Renter, adheres to federal and state laws and provides accurate and updated information promptly. Request a thorough background check, including checks on credit, income, rental history, eviction history, and criminal records to ensure quality assurance. Also, look into the services reviews and reputation. Make sure they’re on the up and up and have all the proper credentialing.

You should prioritize services that comply with FCRA regulations and also provide comprehensive reports, including credit history, criminal records, eviction history, and more.

criminal background check greensboro north carolina

Analyze the Results and Make an Informed Decision 

The fourth step of a tenant background screening is to analyze the reports fetched by the tenant background screening service and determine the applicant’s suitability as a renter. Some of the things you can do are – evaluate the debt-to-income ratio. It reveals how much of a person’s income goes towards paying debts. A low DTI reveals that the application has a good balance between income and debt and can probably clear its pending dues on time. A good DTI ratio is anything below 37 percent. Likewise, it is essential to consider the property type, the demographics, etc, while finalizing the suitability of a prospective tenant.

Wrapping Up – Background Checks on a Tenants 

….should always be considered before leasing your precious property. They should be considered a vital part of the rental application and it doesn’t just protect you, the landlord, but also the applicant. 

Once the applicant has been thoroughly screened, landlords need to take further action, like reaching out to references, confirming employment details, and ultimately determining the applicant’s suitability. This decision-making process should align with relevant laws and tenant rights.

It’s crucial for landlords to prioritize confidentiality and compliance with relevant regulations post-background check. Through vigilance and adherence to guidelines, landlords can effectively manage their rental properties while remaining lawful and respectful of tenant rights.

Just as an aside… Victory Investigations, in Greensboro, has assisted landlords and leasing agents with locating tenants that have “skipped-out” on their lease and payments and when they have left behind significant damages. Our private investigators have helped hundreds of landlords locate their former renters in order to have them served with legal process. If you have a situation that requires locating someone or skip tracing a debtor, former tenant and the like, reach out to our experts to assist.

Digital Forensics: Recovering Deleted Text Messages and Other Hidden Truths

digital forensics examiner gets deleted text messages
Digital Forensics Examiners North Carolina

Smartphones have become indispensable devices for communication and connectivity in our time. Almost everyone you see, at any given time, has one in their hand. They’re either browsing the web, making a call, texting a contact, or taking a picture. Smart cell phones are truly a wonder… One that moves data and information continuously. Voice calling capabilities on smartphones now encompass video calling options as well as traditional audio calls. Text messaging applications on smartphones allow for sending messages without strict character limits, incorporating graphical elements like emojis, customizing the appearance through features like handwriting fonts, and in some cases providing the ability to unsend or recall previously sent messages.

Recovering Deleted Text Messages an More

Our lives are intertwined with technology, which ultimately leaves behind a trail of digital footprints, with every interaction. From text messages and emails to social media posts and browsing history, our digital activities can provide valuable insights into our actions, relationships, and even thought processes. However, the deletion of data does not necessarily mean it is gone forever. Digital forensics, although not new, is constantly changing and getting better. Digital private investigators have developed advanced techniques and tools to recover deleted data, analyze it, bring it to light crucial evidence in various contexts, including criminal investigations, corporate disputes, and personal matters. Data that was once believed to be lost forever, can often times come back to haunt criminals, make dishonest employees sweat, and threaten secret affairs.

Recovering Deleted Data – Reveal Invisible Data to Bring the Truth Forward

The process of deleting data from a device does not erase it completely; instead, it merely removes the pointers or references that the operating system uses to locate and access that data. This means that the data itself still exists on the storage medium until it is overwritten by new information. Digital forensics experts leverage this concept to recover deleted data, employing specialized software and techniques to scour the nooks and crannies of storage devices, extracting valuable information that may have been thought lost forever. Some of these storage devices or containers of data have designated areas were deleted data is stored. Of course, this will vary depending on the device and/ or the operating system.  

Text Messages and Emails – Recovering the Crucial Conversations & Communications

Text messages and emails are among the most sought-after forms of digital evidence, as they can reveal critical communication patterns, timelines, and potentially incriminating or exonerating information. Digital private investigators can recover deleted text messages and emails from various sources, including mobile devices, cloud backups, and email servers. These recovered conversations can provide valuable insights into relationships, motives, and even alibis. Geo-location data is highly sought-after, revealing where the user may have been, at the time of a crime. Texting while driving is not only frowned upon, but is illegal in many states. We have been called to the defense of some folks that have been accused of using their phones when they’ve been involved in an accident. These can prove to be particularly difficult, as smart phones are constantly “talking” with the cellular networks and even exchanging data, behind the scenes with applications on the phone.

Images and Videos – Getting Deleted Pictures and other Media

Visual evidence can be equally powerful, and digital forensics has developed techniques to recover deleted pictures and videos from various sources, including smartphones, cameras, and computer hard drives. These recovered files can shed light on events, locations, and even emotions captured in those moments. Digital Forensics experts can also analyze metadata, such as timestamps and geolocation data, to establish timelines and verify the authenticity of visual evidence.

Other Online Activities – Show the Hidden Patterns

Beyond text messages, emails, images, and videos, digital forensics can also recover other forms of communication, such as social media activity, chat logs, and even deleted internet browsing history. These recovered data points can help piece together a comprehensive picture of an individual’s digital footprint, revealing patterns, associations, and potential motives. Virtual private investigators are experts in recovering the following”

Computer and mobile device forensic analysis can extract a wide range of data, including:

– Call logs detailing incoming, outgoing, and missed calls

– Contact lists/address books 

– Message content across SMS, messaging apps, and multimedia messages

– Multimedia files like photos, videos, audio recordings, and in some cases voicemail messages

Internet history including browsing activity, search history, cookies, analytics data

– Calendar events, task lists, notes

– User-created documents, spreadsheets, presentations and other files

Passcodes, passwords, unlock patterns, account credentials

– Historical geolocation data and cell tower location information 

– WiFi network connection details

– User dictionary/learned words

– Data from installed applications

– System files, usage logs, error logs

– Potentially recoverable deleted data

Mobile devices can contain a significant amount of personal information and data related to a user’s activities and communications. When such information is relevant to a particular matter, digital forensics investigators can provide data extraction and analysis services to recover and examine this device data.

Spyware and malware detection is another aspect of digital forensics investigations. Suspicious activities like unexplained device behavior, rapid battery drain, indications of monitoring, or coded/unknown communications could potentially be signs of spyware or surveillance software installed on a computer or mobile device. Virtual private investigator firms offer spyware detection services to identify if such malicious software is present and active on a system. Common capabilities of spyware include monitoring calls, texts, locations, app usage, multimedia files, internet activities, emails, contacts/calendars and enabling remote control functionality over the compromised device.

Top Digital Forensics Tools and Software for Deleted Data Recovery

To navigate the intricate world of digital evidence, digital private investigators rely on a range of powerful tools and software. Here are a few of the industry’s leading solutions:

Forensic Toolkit (FTK)

Developed by AccessData, Forensic Toolkit (FTK) is a comprehensive digital forensics platform that offers a suite of tools for data acquisition, analysis, and reporting. It supports a wide range of file systems and can recover deleted data from various sources, including hard drives, mobile devices, and cloud storage.

EnCase Forensic

EnCase Forensic, created by OpenText, is a widely used digital forensics solution known for its robust data acquisition and analysis capabilities. It features advanced search and filtering options, allowing investigators to quickly locate and examine relevant evidence.

AXIOM

AXIOM, developed by Magnet Forensics, is a powerful digital forensics platform designed for both mobile and computer forensics. It offers advanced data carving techniques, allowing investigators to recover deleted data from various sources, including cloud storage and encrypted devices.

Oxygen Forensic Detective

Oxygen Forensic Detective is a specialized tool for mobile device forensics, capable of extracting and analyzing data from a wide range of smartphones and tablets. It supports over 36,000 device profiles and can recover deleted data, including messages, call logs, and location data.

These tools, along with many others, equip digital forensics experts with the necessary capabilities to uncover deleted data and unveil hidden truths, ensuring that justice prevails and accountability is upheld in the digital age.

How to Completely and Permanently Delete Text Messages and Other Data

So, if you want to completely and permanently delete your data, you will need to perform a factory reset of your device. Now you ask, how do I permanently delete ONLY specific items? Well, you would need to delete the target items, from your cell phone. Then make a complete backup of the phone. You will want to perform a factory reset, at this time. Once all of that is done, then restore the backup you made to the cell phone.

This does not cover you for any data that may be store in cloud backups. You would need to delete those backs to once and for all and forever get rid of the data you targeted for deletion. Couple of things to note, however…. IF your phone is subject to subpoena or you have been provided a notice not to alter, delete, compress, conceal, etc., and you do, you could be held in contempt or worse, charged criminally. These spoliation clauses are very commonly used in domestic divorce cases and other types of cases. And many many times we have had the opportunity to examine a spouse’s device to gather evidence of their illicit affair. It can be quite embarrassing, but if you do delete, we will either recover the evidence OR we will be able to tell if you’ve made attempts to permanently delete data. Ultimately, you will be held accountable, so chose your battles wisely.

Digital Private Investigators – Victory Investigations

If you feel that you are in need of a virtual private investigator that is skilled in recovering deleted text messages or other data, reach out to the digital forensics experts at Victory Investigations.

Call Now Button