Darcie Parton-Scoon Investigation & Consultation
Federal law defines a missing person as
· any person who cannot be located and that has a proven physical or mental handicap;
· is under the age of 18 and the legal custodians do not know the whereabouts of the child;
· cannot be found after a natural disaster;
· disappeared under circumstances that indicate the missing individual is in danger or did not leave voluntarily;
· a young adult under the age of 21 who meets the above mentioned criteria;
· or any person who cannot be located and there is reasonable concern for their safety.
*Federal law also regulates the time in which a youth under 18 must be placed into the National Criminal Information Center. From the time a family reports not being able to locate their legal ward, law enforcement has two hours to enter the ward into the National Criminal Information Center.
Human Trafficking (HT)
Around 90% of children entered into the NCIC are categorized as “runaways” in the NCIC . Within forty-eight hours of the juvenile’s departure, a trafficker approaches one in three of these juveniles and it’s estimated that nine of every ten children approached wind up performing commercial sex or labor acts. Recent raids across the United States targeting the predators of HT victims, indicate that 80 percent of the recovered victims were advertised online in some manner.
In Oklahoma guardianship of minors emotionally drains both the children and parents/guardians involved. In Oklahoma, judges review a host of information some of which include backgrounds of those wanting custody, past or present drug use, financial stability, past, present or likelihood of domestic abuse, which party transported the children to school, and medical appointments, and the kid’s ties to local community, schools, and extended family.
This term refers to the ability to find someone whom a company or person needs to locate through social media, court records, software, utility searches, and field work. Skip tracing is an excellent resource for lawyers who need a person served, estate or wills attorneys who seek to allocate trust or inheritance, banks or businesses filing small claims cases, and other professional industries such as insurance companies.
Both Federal and State courts mandate that a defendant, respondent, or other parties to legal action be notified in some manner. In some cases, the Federal Rules of Civil Procedure and Oklahoma Rules of Civil procedure mandate that a person be served in person or at their place of residence through substitute service.
Rental or Roommate Backgrounds
Criminal history check on possible renters or roommates. While credit checks help with knowing if your tenant can pay their rent, criminal backgrounds help landlords keep up their property value through keeping their neighborhood and properties safer.
Victims of sex crimes experience levels of trauma that can often result in long term mental trauma such as Post Traumatic Stress Disorder. Studies indicate that homes that have a history of violence, sexual abuse, and a general lack of supervision contribute to both the risk of being abused and the risk of becoming an abuser.
Defrauding insurance companies can occur through a variety of methods such as false claims, health insurance claims, claims for service on warranties that were never provided. Insurance fraud results in increased premiums and profit loss to companies.
Every person has the right to a jury trial and competent defense. Criminal defense can range from misdemeanors like DUIs to felonies such as robbery. The state has the burden of proof for each element of the crime though. Private detectives working on these cases help ensure that each case is thoroughly investigated.
Corporate theft accounts for millions of dollars in lost profits to companies. Investigating corporate theft should involve formal interviews, and interrogations. In some cases, companies may need undercover work and surveillance.
Whether it’s continuing education or training, most organizations need training on how to identify certain behaviors in their organization. For example, security organizations and surveillance teams train on how to identify behaviors that would create a threat to the physical security on their premises.