Small Business Acquisitions as a Growth Strategy

I remember when 9-11 happened and the tremendous shock that resonated throughout our country. The pain felt for all the lives lost. The fear that an enemy could attack us the way they did. The crash of our economy and the uncertainty of what was ahead. President Bush told America that the stock market was, “on sale” , and it was a great time to invest. At the time, I remember questioning that. However, I now understand it and embrace it.

Fast forward to today and I am feeling a lot of the same feelings. Economically, we must embrace a new normal. Small business owners are now adapting to these changes. I have been watching it across multiple industries and many have surprised me by their creativity. Learning to look at things differently and adapting to change can be very beneficial to the small business owner.

I can’t help but wonder if this is a good time to consider small business buyouts. Would this be a beneficial growth strategy? We hear about this all the time with large corporations, but is it smart at the small business level?

Acquisition of a Small Business

According to McKinsey, “acquisitions as a growth strategy can be used to meet many business goals. A business owner may want to acquire a competitor and consolidate their market. It may also make sense to acquire a new product, which you can then scale. It may be faster and cheaper to acquire a competitor that has better technology, so you don’t have to build the tech yourself. Lastly, you may identify a business that you believe you could grow substantially and turn into a winner. All of these strategies should be on the radar for small business owners who want to grow their companies.”

Identifying a business you believe could grow right now, after we are through this COVID-19 pandemic, may be a smart move for your company.

Do you have a company in mind? Start with a solid plan and investigate. Investigative due diligence refers to the research and analysis of an individual or organization done in preparation for a business transaction. A proper due diligence check list covers corporate filings, finance, operations, management and employee health, just to name a few. This occurs after preliminary discussions have taken place between the parties involved.

Online Background Check

But, sometimes things are not always as they appear to be. Conducting a thorough online background check on a business and key owners/executives may either give you the confidence to move ahead or justify a pause to collect more information.

More and more documents are stored online and are open sourced; you only need to know and understand where to look.

I will be writing more on this subject in the weeks to come because I think it is valuable information right now. We are seeing a rise in this type of online research and if you would like to discuss this further, please feel free to reach out.

Linkedin Loop Holes: How to Use Them in Your Search

Could Linkedin be an OSINT analyst’s secret weapon? Whenever we speak to Private Investigators about OSINT techniques, we always point out that each social media platform can be used like a search engine. Trial and error is the course of action many of us experience when searching for a business or person in social platforms and Linkedin is not an exception. This can be time consuming but if you hit it right, it can reveal a lot about a business or person. Linkedin indexes pages within the platform to Google.

Facts About Linkedin

  • As of 2017 Linkedin got rid of their advanced search option.
  • There is a difference of what you will uncover if you have a free version vs. paid subscription.
  • You can use Boolean Search techniques.

When I conduct manual searches, I like to use whatever string of words I can to highlight, right click and search Google. The same holds trues when you are in LinkedIn. In other words, don’t be limited to the name of an individual or their profession. Another rule of thumb here is to think outside the box. Not everyone puts their title in their description field. In fact, many people will place all kinds of info there, depending on where they are in their career.

Linkedin profile example

This result was found by searching “looking for a new opportunity” in Linkedin. It is a good example of what I am referring to.

Recently, a team member was working on a potential fraud case for a client. The individual was a Pharmacist. He did not list his name as “John Doe”, rather he used his middle name. He listed himself as “Ryan J. Doe” and instead of using “Pharmacist”, he used Pharm. That was a tough one, but when someone doesn’t want to be easily found, they will use all kind of name combinations. When I search for a white collar professional, and I can’t find a Linkedin profile, I figure something is off. That is when further digging can really pay off.

Don’t Forget About Image Search Using Linkedin

Many times the photo that a person uses for their Linkedin profile. they use in other spots on the web as well. Take advantage of that by doing a reverse image search on your POI.

The above example shows my photo being linked to an article in Customerthink.com , where I commented on the article written by someone else. This is also an example of how you can find information in the deep web. A recent blog post, “The Devil is in the Details” explains more about deep web searches.

Online Corporate Protection and Executive Security

Proactive approach to corporate security online.

One thing we know for sure; cyber criminals attack corporate executives. The bigger the company, the higher the stakes. Mid-size companies may also be a target because those executives are time poor & money rich. It is exactly that space that I believe Investigators have their biggest opportunity to grow their business by offering this protection. You may have even had opportunity to conduct this research for a client or two in your own experience. But doing an OSINT sweep once a year may not be enough. I would suggest an ongoing program and will walk you through how to pitch this to your business clients.

Understanding the Treat

Price Waterhouse Cooper (PWC) ‘s recent report, “23rd Annual Global CEO Survey,” reveals that around 80% of CEOs have changed their online behavior due to potential risks. Corporate Espionage is alive and well and needs to be taken seriously as more and more employees overshare in social media. This allows for competitors to gain excellent insight into a vast array of information that would not otherwise be easily obtained. Banning employees from using social media at work has proven to be a nightmare and monitoring their social media internally has major privacy concerns. However, when approached correctly this type of monitoring is very valuable to any business regardless of their size.

The Challenge of Balance

What makes this tricky, is that the company still has the responsibility to keep their employees safe, protect assets and data, mitigate risk for threats of fraud and monitoring reputation. High level executives travel to areas of the world that do not share the same security measures we do in the United States. All of this coupled with cyber security risks and you have a recipe for a potential disaster. In the photo below through the software we use, a Global Awareness search allows us to see natural disasters (i.e. earthquakes, fires, hurricanes,) as well as public security incidents’ in real time. A company’s HR team may wish to set a global awareness query around the area of travel and within the appropriate time frame. Real time alerts are set in place for immediate notification of potential risk.

In a nutshell, there are proactive steps that can be put in motion to ensure the safety of everyone.

COVID-19 Fraud: South Miami

Emerging scams due to the COVID-19 Pandemic.

The scams have begun around COVID-19 and it appears to be just starting. When people are hit with diversity, sadly we begin to see the good, the bad, and the ugly. In fact, Americans have lost over 12 million dollars to Coronavirus scams already. The concentration in South Miami has been because of numerous complaints. This alerted the US Attorney’s Office to launch a task force in connection with local authorities to combat this growing problem.

Education is the best defense and law enforcement is doing just that with a series of community alerts, media reports and social media posts. Alerting the public to the risks early in an attempt to counteract the schemes.

In one of our latest blog posts, Crime Never Sleeps COVID-19 Online Schemes & Insurance Fraud, we alerted our Private Investigators to what we were seeing as emerging trends in the insurance industry. Below, is a set of scams targeting individuals.

Here are some examples of COVID-19 scams, reported by Sabrina Lolo, of West Palm Beach News:

  • Unlawful Hoarding and Price-Gouging: The Department of Health and Human Services (HHS) has designated certain health and medical resources necessary to respond to the COVID-19 pandemic as “scarce,” including respirator masks, ventilators, and other medical protective equipment. These designated materials are subject to the hoarding prevention measures that trigger both criminal and civil remedies.
  • Testing Scams: Scammers are selling fake at-home test kits or going door-to-door performing fake tests for money.
  • Treatment Scams: Scammers are offering to sell fake cures, vaccines, and advice on unproven treatments for COVID-19.
  • Supply Scams: Scammers are creating fake shops, websites, social media accounts, and email addresses claiming to sell medical supplies currently in high demand, such as surgical masks. When consumers attempt to purchase supplies through these channels, fraudsters pocket the money and never provide the promised supplies.
  • Provider Scams: Scammers are also contacting people by phone and email, pretending to be doctors and hospitals that have treated a friend or relative for COVID-19, and demanding payment for that treatment.
  • Charity Scams: Scammers are soliciting donations for individuals, groups, and areas affected by COVID-19.
  • Phishing Scams and Cyber Intrusions: Scammers posing as national and global health authorities, including the World Health Organization (WHO) and the Centers for Disease Control and Prevention (CDC), are sending phishing emails designed to trick recipients into clicking on a link or opening an attachment that downloads malware that steals the user’s credentials, such as usernames, credit card numbers, passwords, and other sensitive information usually stored in internet browsers.
  • App Scams: Scammers are also creating and manipulating mobile apps designed to track the spread of COVID-19 to insert malware that will compromise users’ devices and personal information.
  • Investment Scams: Scammers are offering online promotions on various platforms, including social media, claiming that the products or services of publicly traded companies can prevent, detect, or cure COVID-19, and that the stock of these companies will dramatically increase in value as a result.
  • Stimulus Check Scams: Scammers are contacting people over email and are telling them that their check, as part of the stimulus package responding to COVID-19, is already waiting for them and that all they need to do is to provide personal information, such as bank account numbers and Social Security Numbers, which are the key pieces of information needed to perpetrate identity theft.
  • Other scams include fraudsters claiming to work for the government or banks/credit cards and offering assistance for student loan relief, foreclosure or eviction relief, unemployment assistance, debt relief, and direct financial assistance, like government checks.

Anyone who believes they were a target or victim of fraud, or knows about any hoarding or price-gouging of critical medical supplies, is asked to report it to the National Center for Disaster Fraud Hotline at 1-866-720-5721 or disaster@leo.gov.

Using Reverse Image in Your OSINT Research

When conducting OSINT research, don’t forget image searches, as they can reveal quite a bit. We have all heard the saying, ” A picture is worth a thousand words.” We understand its meaning and know it to be very true. However, when it comes to OSINT research, sometimes what is in the background of a picture is worth a million words!

A recent Netflix show comes to mind as I write this blog post. Have you seen The Tiger King yet? Some people can watch it, while others I have heard just can’t get through the series. At any rate, one thing I recall very well is how several social media posts worked in the favor of an investigation to find the fugitives who were on the run. The main character (who was on the run) and his husband posted many social media photos trying to make it look like they were in Mexico. Upon further attention, it was noticed that the background of the images made it very clear that they were indeed in Florida. Certain identifying clues led law enforcement to their exact location.

The more photos found when using OSINT research the better. Bing has an excellent built in option.

Bing’s Reverse Images

  1. Bing: Bing search engine has an image search that allows an upload of an image in the same way Google Image Search does. Below you will see what is produced when we uploaded the image on the left. All the images on the right are instantly populated.
Bing Reverse Image how to
Normal image search reveals a good amount of results.

If nothing comes up, try the cropping the image using the “visual search”. Let’s say we want to focus on one area of the image. The visual search allows you to crop the image in a way that may reveal different results.

Bing Visual Image as an additional search method.
Visual Image

You can see the difference between the two. This can be very helpful when you have a picture of someone in a public place. You may not be able to pinpoint exactly where they are. Using this Bing feature may produce more photos with an exact location.

Pinterest Image Search

  • Log into your Pinterest account.
  • Click on any pin in your home feed (or on any profile or board).
  • Click the icon in the bottom-right corner of the pinned image.
How Pinterest does search of photos
From Search Engine Journal

Simply click on the visual search icon, you can see everything else in Pinterest that is similar.

Instagram Has Over 95 Million Photos Uploaded Daily.

One of our recent blog posts discussed just how many photos are in the social media platform and how it can be used in investigation. In fact, we were recently able to help a client by identifying a person was at Walt Disney when they were trying to locate him to serve papers. It can be quite valuable!

Facial Recognition Apps

In the near future, facial recognition apps may be more readily available. Especially if companies like Clear AI has anything to say about it. An app that lets you identify anyone from a photo, and it is currently being used by law enforcement. Their mission, as stated on their website is:

Clearview AI is a new research tool used by law enforcement agencies to identify perpetrators and victims of crimes.

Clearview AI’s technology has helped law enforcement track down hundreds of at-large criminals, including pedophiles, terrorists and sex traffickers. It is also used to help exonerate the innocent and identify the victims of crimes including child sex abuse and financial fraud.

Using Clearview AI, law enforcement is able to catch the most dangerous criminals, solve the toughest cold cases and make communities safer, especially the most vulnerable among us.

What trick of the trade do you use?