Truth is knowledge... only verified SMThe Library: Whitepapers & Information Topics in alphabetical order:
A large majority of the articles and forms on this page are in PDF format. They can be read with the free     version 4.05c or higher.
To download any of the following PDF files, "right click" a link... "save target as" and select the directory you wish to download the PDF file to. Due to the size of some files, viewing/downloading times may be long depending upon your Internet connection speed.
Authors retain all rights to their respective articles.PDF to HTML Format Converter
Diogenes LLC also provides resources designed to assist people with visual disabilities access our information presented in the Adobe Portable Document Format (PDF). The tool below converts PDF documents on-the-fly to an HTML format that is immediately returned to your browser. In this format, the size of the browser text can be adjusted to meet a reader's needs.
InvestigationsFTC & Pretexting - PI Magazine Interview
FACT Act & Investigations
FCRA & Investigations
STATE OF NH v. JOHN W. GOSS (Garbage Collection)
THE ESTATE OF AMY LYNN BOYER v. DOCUSEARCH, INC., d/b/a DOCUSEARCH.COM
Attorney Must Testify About Talks With Experts - 02/29/03
GAO - OSI: Investigators' Guide to Sources of Information
FBI Handbook of Forensic Services
Financial Intelligence Unit - 100 case studies in money laundering
White Collar Crime/Fraud Statistics
National Money Laundering Strategy 2002 - DOJ & US Treasury Department Joint Report
Money Laundering: The State of Play
Money Laundering: The Role of Credit Cards
Economic Results of Money Laundering
Financial Information Privacy Act of 1998 (FIPA 1998)
High-Tech Investigations explained in general
Computer Forensics Tips
To Catch a Cyber Thief
Computer Crime Investigator's Toolkit
Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001
Employee Polygraph Protection Act of 1988
Polygraph Examination Checklist
Polygraph Examination as an Investigative Tool
Death Investigation: A Guide for the Scene Investigator
Protective Intelligence & Threat Assessment Investigations
Occupational Fraud and Abuse - 2002
Workers' Compensation Claim Red Flags
Check Fraud
Credit Card Fraud
Disaster Fraud
Healthcare Fraud
Identity Theft
State Drivers' License Formats
Securities Fraud
Telemarketing Fraud
Statement Linguistics
Adoption Searches: Ethics and Issues
Undercover OperationsJohnson v. K-Mart
Information ServicesAvailable Information Resources
Pre-employment ScreeningFCRA & Pre-employment Screening
Article One, Article Two, & Article Three
Screening Process Diagram
Pre-employment Credit Report
Sample Background Report
Applicant Pre-employment Screening Authorization Form
Pre-employment Screening Services Agreement
Are you asking your job applicants the right questions?
Illegal Interview Questions
Legal References for Dangerous Employees
When can you legally consider a criminal record when hiring?
Fair Credit Reporting Act (FCRA)
FCRA: A Balancing Act Discussed
References: Should Employers Say Nothing?
Privacy and the Workplace: An Employee Survey
Intellectual PropertyAnticounterfeiting Consumer Protection Act of 1996
Digital Millennium Copyright Act (DMCA) of 1998
Economic Espionage Act of 1996
Trends in Proprietary Information Loss
Counterfeit Drugs
Online Counterfeit Pharmaceuticals
CyberCrime Treaty Issues
Wall Street Journal Article on Counterfeiting
Internet Resource ArticlesInternet Security for Investigators
Introduction into E-mail Tracing
Another introduction into E-mail Tracing (HTML Version)
Finding the Origins of SPAM & Fake E-mail - Technical Discussion
Online Fraud and IP Address Tracking
America Online, Inc. (AOL) Civil Subpoena Policy
Internet Monitoring in the Workplace
Understanding Internet Privacy - General Information
Anatomy of a Computer Hack
A new approach to hacker hunting
Corporate Security ArticlesWrap It Up - Presenting a case for prosecution
Security & Company Culture
How to respond to terrorism & employees' concerns
Espionage against the United States by American Citizens 1947-2001
Handbook for Computer Security Incident Response Teams (CSIRTs)
Computer Crime in 2002, an Insider's Perspective
Using Computers to Catch Corporate Fraud
2002 Computer Crime and Security Survey
The Biggest Security Threat? Insiders
Early Investigation Reduces Fraudulent Claims
Antifraud Programs & Controls - Guidance to help Prevent and Deter Fraud
Red Flags of Internal Fraud
Suspicious Mail/Package Checklist
Workplace Homicides increase in 2000
Workplace Violence
Statistics about Workplace Violence
Workplace Violence Safety Checklist
Workplace Violence Prevention: Who, What, Where, When, Why & How
Checklist for Safety at Work, on the Road and Points In-Between
Executive Protection - Proactive Security
The Importance of Corporate Compliance
Summary: Current Trends in Liability Lawsuits
Retail Security & Loss PreventionWhy Teenagers Shoplift - A WebMD article
The "Thrill" of Theft - Newsweek Article 02/25/2002
GHH Senior Prevention Guide – February 2002
SBA - Retail Crime Prevention
Retail Theft Prevention - Itemized List
Burglary of Retail Establishments
Preventing Retail Theft - Suggestions for Small Businesses
Present Trends in Shrinkage Analysis (PowerPoint Presentation)
Shoplifting & Internal Theft Prevention
Reducing Shoplifting Losses
Controlling Retail Theft
2001 National Retail Security Survey - Final Report
2000 National Retail Security Survey - Executive Summary
Frequently asked questions about the 2000 National Retail Security Survey
Convenience Store Security for the Millennium
Various Articles Regarding Shoplifting (HTML format)
Miscellaneous TopicsLaws Governing Connecticut Private Detectives / Investigators
An Introduction to Encryption
A Manual: Personal Safety for Children
Child Identity Kit
Marital Misconduct: Does It Count?
Liability of One Spouse for Private Investigator Fees incurred by the Other Spouse during Divorce Proceedings
Liability of an Attorney or Spouse for Torts Committed by a Private Detective
CIA World Factbook 2002
Patterns of Global Terrorism 2002
Homeland Security: State & Local Actions (Very Large File)
2001 Anti-Terrorism Legislation
The 10 Commandments of Counterintelligence
10 Internet & Online Dating Safety Tips
10 Signs That Your Mate Is Cheating On You
To learn more, you may contact us by telephone (203.264.6802) or via email.
Close this Window to return to the Services Page.
home | about us | services | resources | contact us |