Proudly Serving Clients Nationwide       1 (216) 678-9111

logo

We Are Experts


Copyright

Copyright & Patent Infringement (AKA Intellectual Property)

Violation of intellectual property rights, "infringement" with regard to patents, copyright, and trademarks, and "misappropriation" with respect to trade secrets, can be a breach of civil law or criminal law, which depends on the type of intellectual property involved, the jurisdiction, and the nature of the action.

Patent infringement is the using or selling of a patented invention without permission from the patent holder. Permission is typically granted in the form of a license. In many countries, a "use" is required to be commercial (or to have commercial purpose) to constitute patent infringement. Think of articles from the NFL, NBA and MLB.

The scope of the patented invention is defined by the claims of the granted patent, which is always on file with the USPTO.

Patents are territorial, and infringement is only possible in a country where a patent is in force. For example, a patent granted in the United States prohibits anyone in the United States from making, using, selling, or importing the patented item, while people in other countries may be free to exploit the patented invention in their country.


Event 2

Elder Financial Exploitation

Financial exploitation takes many forms. While the vast majority of reports to APS involve perpetrators who are related to, or in a trusting relationship with, the victim, scams and frauds by strangers are also very common.

Types of Scams:

  • Lottery & sweepstakes scams “You’ve already won! Just send $2,500 to cover your taxes”
  • Home repair/traveling con men “We’re in your area and can coat your driveway / roof really cheaply”
  • Grandparent scam: You’re called and told your grandson is in jail and needs you to send money immediately
  • Charity scams: falsely soliciting funds for good causes; very common after disasters
  • I’m from the utility company; I need you to come outside with me for a minute (while accomplice steals valuables)
  • Roof repair, yard work, home repair scams
  • Telemarketing scams and accompanying threats
  • Money sent via telegraphs to people claiming lottery winnings
  • IRS Scams where the caller threatens Law Enforcement action for not paying taxes owed
  • Computer repair scams where the caller pretends to be from Microsoft and requests access to the victims computer.

Event 3


Executive/Dignitary Protection

Executive protection (EP), also known as close protection, refers to security and risk mitigation measures taken to ensure the safety of VIP’s (Very Important Persons) or other individuals who may be exposed to elevated personal risk because of their employment, high-profile status, net worth, affiliations or geographical location.

Executive protection is its own highly specialized field within the private security industry. Elite executive protection professionals will have specialized training in executive protection, driving, first aid, and marksmanship.


Event 3

Polygraph Examinations

You hear about lie detectors all the time in police investigations, and sometimes a person applying for a job will have to undergo a polygraph test (for example, certain government jobs with the FBI or CIA require polygraph tests). The goal of a lie detector is to see if the person is telling the truth or lying when answering certain questions.

When a person takes a polygraph test, four to six sensors are attached to him. A polygraph is a machine in which the multiple ("poly") signals from the sensors are recorded on a single strip of moving paper ("graph"). The sensors usually record, the person's breathing rate, pulse, blood pressure, perspiration and sometimes leg and hand movement.

Both during and after the test, a polygraph examiner can look at the graphs and can see whether the vital signs changed significantly on any of the questions. In general, a significant change (such as a faster heart rate, higher blood pressure, increased perspiration) indicates that the person is lying.

When a well-trained examiner uses a polygraph, he or she can detect lying with high accuracy. However, because the examiner's interpretation is subjective and because different people react differently to lying, a polygraph test is not perfect and can be fooled.


Event 3


Computer Forensics

Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines and faces similar issues.

It is not just the content of emails, documents and other files which may be of interest to investigators but also the ‘metadata’ associated with those files. A computer forensic examination may reveal when a document first appeared on a computer, when it was last edited, when it was last saved or printed and which user carried out these actions.


Event 3

Bug Sweeps and Technical Surveillance Counter Measures (TSCM)

The TSCM Program provides expert technical and analytical capability to detect, deter, isolate, and nullify technical surveillance penetrations directed at classified and sensitive unclassified information and technical security hazards within client facilities.

These could include: 

  • Listening devices
  • Cameras
  • Trackers.

It also educates employees about the TSCM Program and associated technical and physical security risks and vulnerabilities.


Event 3

Forensic Accounting/Bank Fraud

These specialized accountants examine tax and business records to identify irregularities that can impact major criminal and civil cases. They are often certified public accountants (CPAs) who use forensic accounting to detect and/or find evidence of embezzlement, corruption, and other financial crimes.

Whoever knowingly executes, or attempts to execute, a scheme or artifice to defraud a financial institution; or to obtain any of the moneys, funds, credits, assets, securities, or other property owned by, or under the custody or control of, a financial institution, by means of false or fraudulent pretenses, representations, or promises.

The term bank fraud also refers to attempts by a person to obtain money from a bank’s depositors by falsely pretending to be a bank or financial institution.


Event 3

Money Laundering

Money laundering is the generic term used to describe the process by which criminals disguise the original ownership and control of the proceeds of criminal conduct by making such proceeds appear to have derived from a legitimate source.

The processes by which criminally derived property may be laundered are extensive. Though criminal money may be successfully laundered without the assistance of the financial sector, the reality is that hundreds of billions of dollars of criminally derived money is laundered through financial institutions, annually. The nature of the services and products offered by the financial services industry (namely managing, controlling and possessing money and property belonging to others) means that it is vulnerable to abuse by money launderers.

ADDITIONAL SERVICES


Quick Links

credit cards

Contact Us

1-216-678-9111

Proudly Serving Clients Nationwide

Associations

ASIS
NRA Business Member

Check the Date