HomeAbout UsServicesResourcesContact UsHome

Truth is knowledge... only verified SM

The Library:
Whitepapers & Information


Topics in alphabetical order:


Corporate Security Articles
Information Services
Intellectual Property
Internet Resource Articles
Investigations
Miscellaneous Topics
Pre-employment Screening
Retail Security & Loss Prevention
Undercover Operations



A large majority of the articles and forms on this page are in PDF format. They can be read with the free  Get Acrobat Reader  version 4.05c or higher.

To download any of the following PDF files, "right click" a link... "save target as" and select the directory you wish to download the PDF file to. Due to the size of some files, viewing/downloading times may be long depending upon your Internet connection speed.

Authors retain all rights to their respective articles.

PDF to HTML Format Converter

Diogenes LLC also provides resources designed to assist people with visual disabilities access our information presented in the Adobe Portable Document Format (PDF). The tool below converts PDF documents on-the-fly to an HTML format that is immediately returned to your browser. In this format, the size of the browser text can be adjusted to meet a reader's needs.

Enter the URL of a PDFdocument below:




Investigations

FTC & Pretexting - PI Magazine Interview

FACT Act & Investigations

FCRA & Investigations

STATE OF NH v. JOHN W. GOSS (Garbage Collection)

THE ESTATE OF AMY LYNN BOYER v. DOCUSEARCH, INC., d/b/a DOCUSEARCH.COM

Attorney Must Testify About Talks With Experts - 02/29/03

GAO - OSI: Investigators' Guide to Sources of Information

FBI Handbook of Forensic Services

Financial Intelligence Unit - 100 case studies in money laundering

White Collar Crime/Fraud Statistics

National Money Laundering Strategy 2002 - DOJ & US Treasury Department Joint Report

Money Laundering: The State of Play

Money Laundering: The Role of Credit Cards

Economic Results of Money Laundering

Financial Information Privacy Act of 1998 (FIPA 1998)

High-Tech Investigations explained in general

Computer Forensics Tips

To Catch a Cyber Thief

Computer Crime Investigator's Toolkit

Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001

Employee Polygraph Protection Act of 1988

Polygraph Examination Checklist

Polygraph Examination as an Investigative Tool

Death Investigation: A Guide for the Scene Investigator

Protective Intelligence & Threat Assessment Investigations

Occupational Fraud and Abuse - 2002

Workers' Compensation Claim Red Flags

Check Fraud

Credit Card Fraud

Disaster Fraud

Healthcare Fraud

Identity Theft

State Drivers' License Formats

Securities Fraud

Telemarketing Fraud

Statement Linguistics

Adoption Searches: Ethics and Issues


Undercover Operations

Johnson v. K-Mart


Information Services

Available Information Resources


Pre-employment Screening

FCRA & Pre-employment Screening

Article One, Article Two, & Article Three

Screening Process Diagram

Pre-employment Credit Report

Sample Background Report

Applicant Pre-employment Screening Authorization Form

Pre-employment Screening Services Agreement

Are you asking your job applicants the right questions?

Illegal Interview Questions

Legal References for Dangerous Employees

When can you legally consider a criminal record when hiring?

Fair Credit Reporting Act (FCRA)

FCRA: A Balancing Act Discussed

References: Should Employers Say Nothing?

Privacy and the Workplace: An Employee Survey


Intellectual Property

Anticounterfeiting Consumer Protection Act of 1996

Digital Millennium Copyright Act (DMCA) of 1998

Economic Espionage Act of 1996

Trends in Proprietary Information Loss

Counterfeit Drugs

Online Counterfeit Pharmaceuticals

CyberCrime Treaty Issues

Wall Street Journal Article on Counterfeiting


Internet Resource Articles

Internet Security for Investigators

Introduction into E-mail Tracing

Another introduction into E-mail Tracing (HTML Version)

Finding the Origins of SPAM & Fake E-mail - Technical Discussion

Online Fraud and IP Address Tracking

America Online, Inc. (AOL) Civil Subpoena Policy

Internet Monitoring in the Workplace

Understanding Internet Privacy - General Information

Anatomy of a Computer Hack

A new approach to hacker hunting


Corporate Security Articles

Wrap It Up - Presenting a case for prosecution

Security & Company Culture

How to respond to terrorism & employees' concerns

Espionage against the United States by American Citizens 1947-2001

Handbook for Computer Security Incident Response Teams (CSIRTs)

Computer Crime in 2002, an Insider's Perspective

Using Computers to Catch Corporate Fraud

2002 Computer Crime and Security Survey

The Biggest Security Threat? Insiders

Early Investigation Reduces Fraudulent Claims

Antifraud Programs & Controls - Guidance to help Prevent and Deter Fraud

Red Flags of Internal Fraud

Suspicious Mail/Package Checklist

Workplace Homicides increase in 2000

Workplace Violence

Statistics about Workplace Violence

Workplace Violence Safety Checklist

Workplace Violence Prevention: Who, What, Where, When, Why & How

Checklist for Safety at Work, on the Road and Points In-Between

Executive Protection - Proactive Security

The Importance of Corporate Compliance

Summary: Current Trends in Liability Lawsuits


Retail Security & Loss Prevention

Why Teenagers Shoplift - A WebMD article

The "Thrill" of Theft - Newsweek Article 02/25/2002

GHH Senior Prevention Guide – February 2002

SBA - Retail Crime Prevention

Retail Theft Prevention - Itemized List

Burglary of Retail Establishments

Preventing Retail Theft - Suggestions for Small Businesses

Present Trends in Shrinkage Analysis (PowerPoint Presentation)

Shoplifting & Internal Theft Prevention

Reducing Shoplifting Losses

Controlling Retail Theft

2001 National Retail Security Survey - Final Report

2000 National Retail Security Survey - Executive Summary

Frequently asked questions about the 2000 National Retail Security Survey

Convenience Store Security for the Millennium

Various Articles Regarding Shoplifting (HTML format)

Miscellaneous Topics

Laws Governing Connecticut Private Detectives / Investigators

An Introduction to Encryption

A Manual: Personal Safety for Children

Child Identity Kit

Marital Misconduct: Does It Count?

Liability of One Spouse for Private Investigator Fees incurred by the Other Spouse during Divorce Proceedings

Liability of an Attorney or Spouse for Torts Committed by a Private Detective

CIA World Factbook 2002

Patterns of Global Terrorism 2002

Homeland Security: State & Local Actions (Very Large File)

2001 Anti-Terrorism Legislation

The 10 Commandments of Counterintelligence

10 Internet & Online Dating Safety Tips

10 Signs That Your Mate Is Cheating On You



To learn more, you may contact us by telephone (203.264.6802) or via email.

Close this Window to return to the Services Page.


home | about us | services | resources | contact us