Related Links



Informative Articles

A Customer complaint management system
Background The company was experiencing an increase in the number of customer complaints and an increase in the cost of processing them and we were hired to analyze the current situation and develop recommendations to increase the effectiveness of...

Data Recovery: Beginners Tips
Right now you probably in a lot of mental pain, and all you’re concerned about is recovering your data as quickly as possible - so we’ll refrain from comments on the wisdom of regular back ups. The time for preventative measures has gone - the...

Does it worth to backup emails from clients like Outlook Express?
How often do people loose their email data? Is this important to backup your email client before loosing important emails? Are you thinking it won't happen to you? Well, for those who use an email client and loosing their emails is one of the...

How Multiple Server Hosting impacts your website's uptime
Please consider the following article for your ezine, ebook or web site. It is free to use as long as you include the resource box at the end. It contains 792 words. If you use this article, please send a brief message to let me know where it...

Ready For A Business Recovery?
Ready For A Business Recovery? by Robert A. Kelly Who wants to face the challenges of a business recovery without a ton of firepower? Especially when getting your piece of the action almost certainly depends upon how well you modify the...

Asset Searching for Recovery Actions - The Decision Maker’s Most Critical Tool – Part 1

As certified fraud examiners (CFE), we all know the nuts and bolts of our respective areas of specialty, and hopefully, we are all growing professionally at an astounding pace. Crime does, unfortunately, pay – just not for the criminal.

After conducting asset research for over 14 years for such demanding institutions as FDIC, FSLIC, and RTC, as well as major hotels and casinos in the gaming industry, property management firms, and many of the nation’s larger law firms, one thing that has emerged is a distinct lack of information – not about the type of items searched, but the depth and quality of other searches. In cutting to the chase, the following is the result of the compilation of asset search guidelines, and should serve to assist in setting at least a baseline standard for developing a viable domestic asset search strategy.

Subject Identification

Prior to beginning the acquisition of information on any subject of an asset search, the subject should be properly identified. Studies have shown that as much as 30% of the American population uses undisclosed aliases and/or “akas” to conduct and transact various levels of personal and professional business. This statistic does not take into account the existence of corporate, DBA and/or partnership entity names, which are created to transact the various forms of business on behalf of the principals of said entity. To properly identify a non-corporate subject, the following minimum recommendations are made for non-law enforcement environments: Obtain credit reports from the three major credit bureaus, per Fair Credit Reporting Act (FCRA) requirements.

However, make sure that obtaining the reports is in compliance with permissible purposes as defined in Public Law 91- 508, Title VI (FCRA), to avoid tainting your pursuit should the matter ever be litigated. Remember, in the context of this discussion, we are focused on asset searches as recovery medium, and the basic assumption is that the asset search has already been determined to be sanctionable. This could be determined, for example, by a loan in default, a judgment that has been rendered, or a court order obtained for the release of the credit information in cases that are not clearly defined under the FCRA.

Remember this simple guideline: credit reports are legal post-judgment, for purposes of collection, and/or where consent has been given somewhere in the stream of the creditor/debtor relationship. In the case of a receivership institution
(i.e., where a director is being scrutinized for alleged conversion of assets), consent may also have been given for a credit history during pre-employment evaluation or as a policy-based condition of employment.

This is referred to as “extended consent,” and constitutes valid use, especially in matters where a criminal investigation is under way, and where the conversion of assets is factually alleged as the result of a forensic audit or proven by admission. Be careful, though, as “extended consent” from the employment perspective is still a gray area under the law. The following two items are available from credit bureaus and their sub-vendors but have less coverage extended to them under the FCRA, yet the “FCRA compliance attitude” should be used when accessing them:

•Obtain social security traces from the three major credit bureaus.
•Obtain address update/credit report header information from the three major credit bureaus.
•Obtain voter registration information for the applicable jurisdiction germane to the primary, or most recent, residence of the subject. Some states have compiled voter data through private repositories, which should be checked for movement.

Match the information obtained through the independent sources to the information presented by the candidate in the form of the credit application with
the institution, and/or the information developed independently by the institution in the initial credit qualification process.

Many other methods of identification exist, but the above represents the very least that should be done. The reason for obtaining the information from all three bureaus, instead of only one, is to develop any alias and/or aka data, as well as current addresses (not specified), and/or any additional addresses that may provide venue data. This will assist the asset searcher in determining whether to advise the client to proceed with asset discovery in additional areas unknown to the client at the time the asset search was requested.

Address verifications are usually difficult without a physical inspection of the address in question, including a visual identification of the subject entering and/or leaving the address. Address information that is cross-referenced and verifiable through the major credit bureau repositories is usually presented in an asset search, and in most cases is very reliable.

To discover the current telephone number of the subject, methods available to the fraud examiner include nationwide telephone directories, criss-cross directories, directory assistance contact, and attempts at contact existing telephone numbers known by the client. There are other methods of telephone number development available. However, these methods should not be utilized by a CFE in order to avoid tainting the legality of the pursuit, in the even that litigation is ultimate undertaken.

Assets Determination

Assets determination usually constitutes an integration of certain liability data to offset the assets “worth” in order to arrive at a net equity position. This is especially true in identifying and analyzing real property assets. There are multiple forms of asset determination, which are described as follows: Real

Property Ownership: A search should be conducted of the applicable county jurisdiction. The exception is in California where a statewide assessor’s index is available, usually through the “lien date” of the prior year. This repository is made available through a private company, and is in no way sanctioned by any public jurisdiction. For traditional searches throughout the rest of the U.S., per jurisdiction research is conducted at the assessor’s office to determine if the name exists on the assessor’s roll, and/or if the known property (address) crosses-verifies to the suspect owner.

A search of the applicable jurisdiction’s Recorder’s Grantee/Grantor index (or general index as it may also be known) is then undertaken to determine if the property is still vested to the subject, and if any open Deeds of Trust and other liens exist which identify liabilities against the property. The search in the recorder’s venue should also identify (in jurisdictions where this is possible) the
Documentary Transfer Tax Stamp amount, which should be divided by the applicable factor.

This yields a sales price for the property, which should then be scrutinized by contacting a local realtor to verify the current market value. This “thumbnail” market value determination would then be subtracted from the outstanding Deeds of Trust (encumbrances) for a net equity

value of the property.

Additional research of real property ownership comes in the form of updating the assessor’s rolls through the recorder’s offices to determine if the subject’s name has come into title to additional parcels of property, subsequent to the “lien date” of the assessor’s records, which is in many jurisdictions up to sixty to ninety days old.

The searches in the recorder’s offices should also identify recent transfers of ownership of an individual’s real property, wherein the ownership may have been transferred to a family member, closely held corporation, or other entity. Based upon the guidelines established by the client, the searches can be permutated to include additional research on additional names developed during the study, which the examiner may feel has a direct relationship to the subject of the report. It is important to note that asset searches are usually requested on specific names of individuals, and it is an industry standard of practice to conduct the research on the specific subject name. Competent investigative agencies contact the client in some way to disclose additional names discovered during the searches.

Searches should also include information developed on real property assets jointly held in the name of the husband and wife. This information is usually indexed by virtue of the husband’s name, or the first name that appears on the conveying deed.

It is important to understand that an asset search does not automatically search property held in the name of a wife unless the asset search is specifically ordered on the wife’s name. If so, the wife’s name would then be included as a primary search name (parameter), and assets held in the wife’s name would then be covered. Quite simply, an asset search on a husband should usually also reveal information on spousal assets held jointly, but not necessarily include assets held by the wife individually or as sole owner, or under different name styles such as aliases or maiden names.

Vehicle Searches: Searches should be conducted of the applicable states Department of Motor Vehicles to identify all vehicles owned under the name and address given to the state repository for search purposes. Several states do not provide this service, as the tax registration responsibility for vehicular ownership rests with a county or parish jurisdiction. Where states will not provide this information, the applicable jurisdiction or jurisdictions should be researched to determine if vehicles are owned by the name given as primary search parameter. It is also important to understand that most assets search requests are not only based upon single name searches, but usually single jurisdiction searches as well.

Some examiners may feel justified in providing additional “over-the-county-line” information in order to bolster the information developed without an additional asset search. However, single county or parish jurisdictions should be expected as an industry standard. Analyze credit reports to determine if current outstanding) and/or previous loans may have existed, linking this type of asset to the subject. Many times vehicular, vessel, and aircraft assets are not identified through standard search parameters, but are identified if the subject may have the asset registered in a different jurisdiction; if the asset may be registered under different name; or if the subject may be a guarantor on the loan.

Vessel Ownership: There are three possible forms of accessing vessel ownership information. The first is on a state-by-state basis at the Departments of Motor Vehicles. The second is at the county or parish level. The third is a search of the U.S. Coast Guard’s Watercraft Index, a nationwide repository of registered vessels over a certain length. Depending upon the location of the asset search to be conducted, one or all of these methods should be utilized.

Aircraft Ownership: Other than by “intelligence” information which may have been submitted to the institution at the outset of the credit qualification process, the only method of developing aircraft registration information is to perform an FAA
Airman’s Search to determine if an FAA Pilot’s license has been issued, and/or if an individual has an aircraft registered in his or her name within the Federal Aviation Administration’s files. As with the vessel ownership search through the
U.S. Coast Guard Watercraft registration, there is only one national root repository that makes this service available. The service is resold through other database repositories, yet it is advised that the “root” repository be utilized in order to minimize data transfer/loss from vendor to vendor.

Banking Information: Bank account searches may be the world’s “second-oldest profession.” There is no specific way to access bank account information, other than by a multitude of artistic pursuits including the development of information within a consumer’s credit history; director contact with a banking institution; the use of sources in the U.S. Federal Reserve Clearinghouse System; or by sources and contacts developed by the fraud examiner with local, state, or national banking institutions.

This is truly the “art and science’ of an asset search, in that the ability to successfully identify banks rests heavily with the fraud examiner’s prowess in this arena.

The standard guidelines for bank account searches are “exact name basis only” searches, with less emphasis placed on jurisdictional lines, since most bank account searches are developed via intelligence leads. In many instances, an asset search will refer “no record found” to a banking institution under an exact subject name.

The subject’s name may appear as a signatory on an alternate account, possibly under the name of a disclosed or undisclosed entity, or as a signatory on an account held under the name of another. Bank accounts will not usually be disclosed in this fashion. Unauthorized information pertaining to a no searched consumer could compromise that person’s privacy under federal privacy laws, the FCRA and the CCPA, as well as many other statutes.

It is safe to say that most agencies are quick to obtain at least some banking information. This should rest with the successful Write of Execution language, constructed by counsel as served upon the institution’s regional administrative and/or corporate offices (for examples send a request to

In Part 2 of this article, we’ll look at other financial and business information that should be gathered during an asset search, liability-related data which impacts the subject’s net worth as well as other information.

About the Author

Thomas C. Lawson, CFE, CII is President and Founder of APSCREEN International, the world’s leading full service Consumer Reporting Agency since 1980. Lawson is called “one of the real pros” as he has helped to reshape laws including those for employment screening, permissible credit reporting, asset discovery and fraud examination. Tom is a Life Member of: ACFE, ASIS, SHRM, PIHRA, PNRRA, PRRN, CII, WAD, WIN, FCAOC and OCEMA.


Data Recovery Software and Undelete from R-TT
Disk management software including utilities for data recovery, drive imaging, disk wiping and access control.
Data Recovery | Email Data Recovery by Ontrack
Data recovery services, data recovery software, file repair software, and diagnostic software from Ontrack. Software for email recovery, file recovery and ...
Data Recovery by DriveSavers | Hard Drive Data Recovery
Worldwide data recovery service for all operating systems and storage media. Authorized by all drive manufacturers.
Hard Drive Data Recovery Software Tools, Disk Recovery Utilities ...
Offers data recovery software,data recovery services for hard drive recovery and data safety software services for your computer. Buy award winning data ...
Data Recovery by FADV – Hard Drive, RAID, Tape, Database and more ...
Offers data recovery services for all hard drive models. RAID, MS SQL, Exchange, Tapes, Camera and USB media, CD and DVD. Service available 24/7.
Data Recovery Software - File System Utilities
Data recovery software for all Windows file systems. Recover deleted files, corrupted hard drives, and partitions.
Professional Data Recovery Software from Bitmart. File Recovery ...
Data Recovery Software Restorer2000. Undelete & File Recovery utility for FAT and NTFS file systems. Data Recovery from damaged disks and partitions.
Data Recovery Services - ActionFront - Critical Server Data Recovery
ISO certified data recovery services with labs in Atlanta, Santa Clara, Dallas, Chicago, Toronto (also Buffalo and Tokyo Japan)
Hard Drive Data Recovery Software: Recover Deleted Files- Recover ...
Data recovery software for recovering files that have been deleted or lost due to the hard drive format, virus infection, unexpected system shutdown or ...
Data Recovery Group - Hard Drive Data Recovery Services
Data Recovery is Our Only Business! Data Recovery Group's a complete data recovery service that specializes in recovering data from hard disk drives.
Data Recovery by CBL: Hard Drive Recovery Services
Worldwide Data Recovery Services at CBL. Specializing in data recovery, hard drive recovery, hard disk drive recovery and RAID data recovery.
Data Recovery Software, File Repair Utilities, Hard Disk Recovery ...
Hard drive data recovery software to perform data recovery & recover deleted files from Novell, Linux, Unix, Mac, Windows & data recovery services for hard ...
AT&DR: Data Recovery and Liabillity
Associated Technologies offers complete data recovery solutions with services for any type of data storage device, including the following: hard drives, ...
Ontrack UK - Data recovery services & recovery software - hard ...
Ontrack offers data recovery services & software for: hard drive recovery, file recovery, server recovery, email recovery, tape recovery, RAID recovery.
Beginners Guides: Hard Drive Data Recovery -
Beginners Guides: Hard Drive Data Recovery -
File Recovery and Data Recovery Software. Hard Drive recovery utility
Data recovery software for FAT, NTFS, Ext2FS file systems. File recovery after FDISK, MBR destruction, FAT damaged, virus infection. Dynamic disk support.
Data recovery - Wikipedia, the free encyclopedia
Data recovery is the process of salvaging data from damaged, failed, ... Although there is some confusion as to the term, data recovery can also be the ...
Active@ UNDELETE Data Recovery. Recover Deleted Files. Windows XP ...
Active@ UNDELETE - Data Recovery Software for all Windows File Systems. Recover deleted files from lost, damaged, formatted or reformatted partitions.
New Zealand Data Recovery & Computer Forensics Experts
New Zealand data recovery specialists & computer forensics investigation experts. Recovering lost data for businesses or legal evidence is all we do.
Canada Data Recovery Services: Hard Disk Drive Recovery, Raid Data ...
Provides data recovery solutions for companies experiencing data loss from failed hard drives, raid arrays, and server systems.


Content Menu
  • 10 easy steps to speed up your computer without upgrading

  • 10 proven tips to survive a computer crash

  • 7 critical steps to protect your data

  • add value by documenting your business

  • an introduction to tape backup

  • an outsourcers passage to india how to do it part i

  • are you prepared for a hard drive crash

  • asset searching for recovery actions the decision makers critical tool part 2

  • asset searching for recovery actions the decision makers most critical tool part 1

  • a beginner guide to web hosting

  • a customer complaint management system

  • a fresh start for family finances in 2005

  • background of password cracking

  • backing up your stuff part 2 a solution

  • before you take the plunge essential information on data recovery

  • booting problem in pc

  • business continuity and disaster recovery a business not a technology issue

  • business continuity and disaster recovery business impact analysis

  • business continuity and disaster recovery reducing your risk profile

  • business continuity and disaster recovery risk analysis and control

  • business continuity and disaster recovery selecting a business continuity strategy

  • business continuity and disaster recovery the business continuity and disaster recovery plan

  • business continuity testing starts with the risks

  • business needs vs network performance critical challenges facing network managers

  • can raid systems fail

  • career paths for a comptia a certified technician

  • career paths for comptia a certified technician

  • choosing a data recovery company

  • choosing data recovery company

  • common problems why hard disks crash

  • comparing data recovery software

  • compensating for disruptions in the oil and gas industry

  • computer data recovery options

  • computer disposal throwing away your computer money and idenity

  • computer viruses the basics

  • coping with a serious data loss from your computer hard drive

  • corporate information security is our information more secure since september 11th

  • datarecoverynet com enters medical industry

  • data backups are the biggest security threats

  • data backups are the biggest security threats surprised

  • data backups one key to business survival

  • data recovery

  • data recovery 1 on 1

  • data recovery and data loss a costly proposition

  • data recovery and data safety tips

  • data recovery beginners tips

  • data recovery for less

  • data recovery from laptops

  • data recovery made easy

  • data recovery software at your rescue

  • data recovery software comparison

  • data recovery the best method is prevention

  • data recovery the easy way

  • data recovery what not to do

  • data recovery what you need

  • data recovery you can get it back

  • data security are your assets secure

  • dealing with your pending pc disaster a guide for small business

  • did you ever want to completely erase everything on your computer

  • dirty little computer viruses and how to protect yourself

  • disaster planning ­v how important is it to you

  • disaster preparedness in a post 9 11 world

  • disaster recovery more than meets the eye

  • disc and data recovery

  • document management features for 2003

  • does it worth to backup emails from clients like outlook express

  • do it yourself data recovery freezer method

  • do i really need to backup

  • drive solutions inc expands data recovery service

  • easy file recovery basic backup guidelines

  • easy guide to raid recovery

  • eliminating the risk of delivering network ready applications

  • email recovery good software can fix your lost mail trouble

  • esecurity

  • exchange disaster recovery with sanrad v switch planning guide

  • e commerce a no nonsense perspective for new business

  • flash usb drive backup easily conveniently and securely

  • focusstor launches a new data backup recovery software

  • getting more bang for the storage buck

  • get down with ocp evaluating dba job applicants in an ocp world

  • got virus

  • got virus your data is not lost forever

  • great plains accounting support overview for it specialist

  • great plains dos support notes for consultant

  • great site ranking in google the secrets out

  • hackers given access to irs computers

  • hard disk data recovery expert choosing yours

  • hard dive failure what is a head crash

  • hard drive crash avoid making a bad situation worse

  • hard drive crash the essential data recovery report

  • health and medical advice on the internet use it wisely to overcome illness and find more happiness in your life

  • highlights of irs list of 2005 tax scam

  • highlights of irs list of 2005 tax scams

  • how multiple server hosting impacts your websites uptime

  • how multiple server hosting impacts your website s uptime

  • how multiple server hosting impacts your web sites uptime

  • how safe is your success part 5 of 8

  • how safe is your success part 6 of 8

  • how secure are online data backups

  • how to avoid everyday sales mistakes

  • how to backup a pc

  • how to backup windows xp home edition

  • how to backup your computer files

  • how to backup your hard drive

  • how to check the status of your tax refund online

  • how to fight cyberterrorism

  • how to prevent computer security risk and how to keep your small business safe

  • how why gps offers affordable fleet tracking

  • how you can avoid my data recovery nightmare

  • hr managers use computer forensics to investigate employee allegations

  • hurricanes wilma katrina and rita force businesses to rethink computer

  • identity theft and credit reports

  • identity theft recovery the road back

  • identity theft safeguarding cant hurt

  • identity theft the road back

  • improving sql performance

  • index

  • information security for smes

  • insure your information backup software

  • internet network security policies need a radical rethink

  • intranet

  • iscsi vs fc for meeting mission critical requirements

  • its all in the planning disaster recovery

  • it department skills to support microsoft great plains and microsoft crm

  • it in house support microsoft great plains and crm

  • keep a diary of your computer

  • learn how to safely backup your hard drive

  • lightning season how to avoid data loss

  • linux or windows which is it

  • loans for bad debtors discarding debt disorganization to recover financial growth

  • local vs remote data backup the pros and cons

  • mcse 70 290 certification primer

  • microsoft great plains customization recovery upgrade for large corporation

  • microsoft great plains customization upgrade recovery visual studio vb 6 0

  • microsoft r exchange server utilities eseutil isinteg

  • microsoft sql 2000 disaster recovery with sanrad v switch planning guide

  • mr

  • need a copy of your tax return information

  • new generation of financial information systems makes crunching numbers faster and easier

  • new iomega tera series desktop hard drive with 1tb capacity

  • nucleus kernel for fat and ntfs

  • nucleus kernel for fat data recovery software

  • nucleus kernel for fat ntfs data recovery software

  • nucleus kernel for ntfs data recovery softwares

  • online investing and trading discussions at www streetplayer com

  • openly sharing your rfp objectives and information with vendors

  • options for computer data recovery

  • outsourcing it asset retirement

  • outsourcing multiplying it services

  • paragon drive copy 8 0

  • planning for 2002 business recovery use public relations firepower

  • protecting your identity on the internet

  • protect yourself before your hard drive crashes

  • quick system restore with asr backups

  • raid disk recovery

  • ready for a business recovery

  • recognizing a pc with malware

  • recover deleted data easily

  • reduce tco the java database way

  • reinstall windows xp on your computer

  • rotator

  • scalability testing 7 steps towards success

  • scalability testing 7 tips for improvement

  • secure offsite backup services and software online file backup and storage remote online backup

  • secure your data windows data backup computer software

  • small business computer security the basics

  • small business network security 101

  • software that takes care of other software

  • sql administrator skills required to support microsoft great plains

  • syi save your identity

  • teosoft cleanspace 9 software

  • the best data recovery choice for you

  • the day my laptop was stolen almost killed my business

  • the devastation of data loss and what you can do about it

  • the essential data recovery report

  • the google patent reveals the secret to great site ranking

  • the importance of engaging a qualified data recovery expert

  • the importance of proper security for your pc

  • the mystery of the unknown

  • the seven deadly habits of a dba and how to cure them

  • the seven golden rules of data backups

  • the worst case scenario how to protect your data

  • think you have a dead hard drive

  • top 10 ways to protect yourself from computer viruses

  • top 10 ways to protect yourself from online identity theft

  • top 5 backup tools you can pick up for pennies

  • top 7 reasons you should back up your data online

  • top computer problems leading to data recovery

  • trouble shooting hard drive problems part 2

  • using sanrad v switch as the vss hardware provider for windows backups

  • using system restore to save yourself from formatting your hard drive

  • webfarms ii balancing the load

  • welcome to the world of knoppix

  • what could macedonia learn from a tiger the asian tigers and the phenomenon of uninterrupted economic growth

  • what is data recovery

  • what is data recovery a brief introduction

  • why usability is important to you

  • will you recover

  • working from home for yourself or someone else

  • your hard disk failed dont panic

  • your hard disk failed don t panic

  • your hard drive is going to explode why a ups is essential

  • your privacy exposed computer forensics international uncovers secrets about recycled hard drives

  • you can recover deleted data

  • you lost your data dont panic

  • you need to backup