Uncategorized

Mitigate 88% of Demand for Only 3%

Mitigate 88% of Demand for Only 3%: E-Newsletter Article In 2019, Texas Investigative Network, Inc. was retained by a law firm client to conduct a covert surveillance operation on a plaintiff who was involved in an auto accident, and was now suing for over two (2) millions dollars.  This plaintiff consequently alleged neck, back, shoulder, elbow, and chest injuries.  The plaintiff further alleged that she had become terrified of driving ...

Mitigate 88% of Demand for Only 3%2022-03-24T16:11:20+00:00

Texas Modern Mediation Conference

The Texas Modern Mediation Conference (TMMC) is 10 hours of free State Bar of Texas approved continuing legal education for family law mediators, lawyers, paralegals and judges interested in improving their preparation and participation in mediation. It will be hosted at the Texas Justice Center in Bellaire, Texas January 24, 2020 from 8 a.m. to 6 p.m. Everything is free including the conference, parking, beverages, lunch, the family law Giveaway ...

Texas Modern Mediation Conference2022-03-24T18:26:01+00:00

Background Investigation Reveals Criminal History Of An Employee

In November of 2019, a corporate client contacted Texas Investigative Network, Inc. to conduct a Background Investigation on a current employee (Subject), as our client was suspicious that the Subject was not being forthright about his past. Our client provided TIN Investigators the Subject’s name and some key identifiers.  Investigators were able to delve into criminal records and found several previous convictions, including a Failure to Appear charge and a ...

Background Investigation Reveals Criminal History Of An Employee2019-12-03T20:36:05+00:00

Scheme to Defraud

Subject Locate: Scheme to Defraud E-Newsletter Article Just recently, three individuals – with seemingly no professional profiles – formed an international business consulting group and targeted a very profitable company to defraud. While meeting with the shareholders over a period of months, the three fraudsters were able to obtain proprietary financial data under the ruse of using this data to entice venture capital groups to invest in the company. Instead, ...

Scheme to Defraud2022-03-24T18:10:03+00:00
Go to Top