Protecting a company’s assets includes protecting its senior executives.

Investment & Venture Capital Scams

 

For more information on debugging sweeps visit us at http://www.corpa.com

The Financial Post

By Laura Ramsay, For The Financial Post. June 4, 1990.

Protecting a company’s assets includes protecting its senior executives.

A growing number of corporations are turning to security consultants to help ensure that top people — and the information they’re privy to — aren’t compromised by competitors. terrorists, extortionists or disgruntled employees trying to even a score.

Kevin Bousquet is president of a Scarborough, Ontario-based Protect Your Business, which provides security analysis to corporations, arranges to have corporate offices “swept” to determine whether listening devices have been planted in them, and markets counter electronic surveillance (anti-bugging) products.

“There’s a growing demand,” he says. “It’s still not a huge business, but it increases every year.”

With improved technology and a growing reliance on telephones and facsimile machines as business tools, it’s easy to eavesdrop on important conversations going on in a boardroom or over the phone. Conversations conducted on car phones are notoriously easy to intercept or misdirect. And it’s not hard to intercept messages sent by computer modem or fax.

Robin Ingle, president of Worldwide Security & Protection Corp. in Toronto says “if a company has spent five years and hundreds of thousands of dollars researching and developing a new product, its competitor can spend five minutes and $10,000 and get the same product on the market at the same time.” simply by stealing information by bugging the company’s boardroom.

He says people have been bugging corporate offices in the U.S, for years. But in Canada, information was more likely to have been gleaned from overly talkative employees.

Bousquet says almost all the companies he deals with are publicly traded corporations attempting to make sure that company secrets stay secret.

“It’s extremely competitive out there.”

He says there are three basic ways to eavesdrop on conversations. In addition to the basic telephone bug, budding eavesdroppers can use a radio frequency (RF) device, which can be purchased for about $30 from a mail-order catalogue or easily made by someone with a basic knowledge of electronics. The other device, similar to a baby monitor, uses all electrical current to transmit conversations conducted in another part of the building.

Counter electronic-surveillance equipment is designed to warn speakers when their conversation is being bugged or taped and to prevent third parties from listening. It can also emit high-frequency background noise to prevent tape recorders from picking up a conversation.

Many products are designed to be worn by executives, such as a device that fits in a suit pocket and starts to vibrate if a tape recorder is being used in the room.

“It’s quite popular with people who are afraid of reporters recording their conversations,” Bousquet says.

Telephone scramblers convert a telephone conversation into one of 52,000 codes which are unscrambled at the other end of the line. These are particularly useful for airplane and car phones, Bousquet says.

“It’s probably one of the best products going because it would take a real trained professional to descramble it.”

A similar product is available to scramble sensitive messages sent by fax.

Ingle’s company also arranges physical protection, including bodyguards, and self-defence training for executives who may find themselves in physically threatening situations.

The ideal bodyguard is someone who is well-trained and physically fit, but is not noticed in a crowd. Rambo types with mirrored glasses and bulging biceps aren’t welcome– they don’t fit in at embassy cocktail parties.

Executives are also taught how not to be a victim.

“We try to teach them simply how to strike and run if they get caught in a situation they can’t get out of,” Ingle says.

Other tips include how to safely enter a building and how to walk down a street alone at dusk. Executives traveling to foreign countries — especially ones with turbulent political situations– should be careful who they’re friendly with, avoid mingling with military people and never sit in outdoor cafes, where it’s easy for to strafe the crowd.

Also, executives should double-lock their hotel door and bring an inexpensive gadget that can be used to jam doors. For good measure, a device marketed to parents of young children that sets off an alarm when a doorknob is turned can be an effective deterrent to intruders.

“If you add some difficulty to the situation, the criminal element will usually look for an easier target,” Ingle says.

Al Guy, president of Continental Security Consultants in Toronto, and a former security adviser to senior executives in the oil-and-gas industry, says executives traveling to politically troubled nations should always contact the Canadian embassy in that country to let staff there know when they’ll be arriving and find out what security precautions should be taken.

Common sense is important, too. Don’t announce to everyone in the hotel that you’re president of a large firm. Avoid drawing attention.

“A lot of high-profile executives show up in Fortune 500 listings,” Guy says. “My advice is to avoid that sort of thing. Avoid having your picture taken and avoid being quoted in the media on controversial issues, especially on controversial political issues.”

For more information on debugging sweeps visit us at http://www.corpa.com

 


Advertisements

We’re not Promoting fear, we’re promoting concern !!!

Investment & Venture Capital Scams

For more information on debugging sweeps visit us at http://www.corpa.com

Globe & Mail

February 13, 1990

The company honcho talking on the telephone bemoans the fact that the corporation has lost the business deal. “the second time this month that we’ve lost a bid by less than $1000.”

Meanwhile, a headline on the newspaper in front of him reads: “Local Executive Charged in Wiretap.” An electronic sweep of the office nets listening devices in the adding machine, telephone, power outlet, and a cord that stretches along the floor.

This scene, portrayed in a demonstration video, and its message — “You may be bugged” — are part of a growing world-wide industry dealing in the technology of surveillance and counter-surveillance for corporations and individuals.

“We’re not Promoting fear, we’re promoting concern,” said Kevin Bousquet, who shows the video to demonstrate the CPM-700 counter-surveillance sweep device, one of the products and services he sells at his Scarborough, Ontario., company called Protect Your Business.

Security experts say that corporate and personal eavesdropping is a growing problem, with computerization, increased information technology and global competition, the crowding of communication airwaves and the availability of electronic surveillance products from sophisticated miniature devices to simple products available in many department stores.

The growth of such problems is being countered by an arsenal of products and services that detect hidden telephone, room and body bugs and tape recorders. The protection company also provides facsimile machine scramblers, hidden video cameras and microphones and sophisticated night vision surveillance equipment that would rival the gadgets in a James Bond film.

Among the fastest selling items in Mr. Bousquet’s inventory are telephone scramblers, which he calls “the yuppie toy of the 90s.” The devices, which cost $1,000 a pair, are strapped over the receiver and mouthpiece on two telephones and set to a special code to scramble the conversation.

The scramblers are especially useful for cellular telephone communications, which are conducive to accidental eavesdropping when signals get crossed and are easy prey for some frequency scanners sold in electronics shops.

Another item, which “sells well to lawyers,” is a bug detector resembling a simple smoke detector hanging over an office door. It sounds an alarm when someone walks in with a recording device.

“Under no circumstances am I promoting paranoia,” Mr, Bousquet said.

Robin Ingle, owner of Worldwide Security and Protection Corp., said that even large corporations have only limited security provisions. However, he said that awareness is growing as electronic eavesdropping gains ground in Canada.

“The threat is there,” Mr. Ingle said. The company’s Mississauga, Ontario showroom features a selection of more than 2,800 counter-surveillance and personal protection devices and new paraphernalia is added almost daily, largely from U.S. manufacturers.

Mr. Ingle said there is a need for the products because electronic eavesdropping technology is more and more accessible. Disgruntled employees, competitive businesses or simply the curious are apt to make use of it, he said.

“A lot of people don’t mind trying to gain an advantage” in whatever way they can, he said. “There’s a slipping in morals.”

Russ Donaldson, associate director of security for bell Canada, said that privacy is a concern with the growing volume of data such as computer and facsimile information transmitted over telephone lines.

“Trying to keep your data private and out of the hands of hackers is an ongoing challenge that everybody faces,” he said. “Anyone who is not protecting themselves is leaving the door unlocked.”

Security consultants say that while high-technology products are advertised in magazines and catalogues and a wide variety is available at stores such as Radio Shack, some can also be easily modified or made by hand.

Alvin Gabrielson, a buyer for Radio Shack in Canada, said the company stays away from products that can be used to intercept private conversations or telephone calls, but he realizes that a customer can try to use an item such as a radio frequency scanner to listen to private calls.

“There’s no way I can hold his hand and say, ‘You shouldn’t listen to that,’ ” Mr. Gabrielson said. “It is legal to sell the scanner.”

One of the most prevalent surveillance devices is a simple nursery or baby monitor, which is plugged into an outlet in one room and transmits sound to a receiver plugged into another outlet as far as several hundred metres away. It costs from $40 to $60.

“You put it behind a potted plant and you’ve got yourself a full-fledged bug,” Mr.Bousquet said.

The security companies themselves sell products that can he used to surreptitiously intercept private communications, such as “taping briefcases” equipped with audio or video and even microphones disguised as pens. However, the items come with disclaimers that they should not be used for illegal purposes

Security experts say companies can help protect themselves against “low-technology” theft and surveillance from inside and outside by shredding documents and restricting access to sensitive areas.

For more information on debugging sweeps visit us at http://www.corpa.com


Ever wonder if the walls have ears !!

Investment & Venture Capital Scams

For more information on debugging sweeps visit us at http://www.corpa.com

Toronto Real Estate News

By Laura Morrison. June 1, 1990.

Ever wonder if the walls have ears? Many companies are no longer taking chances — they’re investing in counter-surveillance equipment to ensure boardroom secrets stay that way.

Kevin Bousquet of Protect Your Business says since January he has sold counter-surveillance equipment and services to 90 firms listed on the Toronto Stock Exchange.

And his clients aren’t paranoid, he said. “When it comes down to dollars and cents, everything goes.”

Whether it’s a proxy battle, a hostile takeover or corporate espionage, things can get dirty. said the former private investigator. So companies are taking measures to protect themselves against electronic eavesdropping.

No security system will ever be infallible, Mr. Bousquet said. Even the most elaborate system can’t prevent a disgruntled employee from spilling the beans to a competitor.

And short of television spy Maxwell Smart’s cone of silence, there’s probably no way to beat the more sophisticated surveillance techniques. such as a laser that’s beamed on to a window from the outside to pick up vibrations while the occupants of the room are talking.

But interior security sweeps can prevent bugging from within. The security consultant recommends electronic sweeps of company boardrooms shortly before all important meetings.

The sweeps will detect any RF (radio frequency) bugs or hidden tape recorders. The firm Mr. Bousquet contracts out to charges $325 an hour for a sweep. The firm is operated by an ex-RCMP officer experienced in surveillance.

Those attending a meeting can be checked for bugs as they enter a room and a paper shredder should be placed inside to destroy confidential material at the conclusion of the session.

For those who really want to make sure they aren’t recorded, an audio jammer can be installed in the board room. This device will create background noise that will foil any attempts at tape recording. However, it will also make it difficult for those attending the meeting to hear what’s being said. For that reason, Mr. Bousquet recommends against using this type of equipment.

Business people can also purchase equipment to conduct their own security sweeps. These devices can detect RF bugs, tape recorders and even video cameras and range in price from about $900 to more than $3,000, depending on their capabilities.

Some detectors are so small they can be hidden in a suit pocket and will sense a bug or tape recorder when you shake hands with the person carrying them. “The government is very big on this stuff.”

Another popular device is the telephone scrambler. These come in pairs and work somewhat like walky talkies. Partners, for instance, can install them on their phones to ensure they have a safe line of communication that can’t be tapped. The battery-operated units can be attached to any phone including car phones. They retail for about $1,000 a pair.

Fax scramblers are also available for firms who conduct extensive business together and want safe lines of transmission. Like the telephone scramblers, the fax scramblers must be attached at both ends of the line. They retail For about $3,000 a pair.

Other James Bond-like gadgets available to the office market include electronic tap detectors ($395 to $1,300); phone censors that only accept calls with the proper pass code ($50); and call controllers that either prevent long distance calls from being placed or record record the telephone numbers of long distance calls and the extensions from which they were placed ($189 to $3,000, depending on capabilities).

And if your objective is to record your conversations rather than cloak them, there are long-play tape recorders you can attach to a telephone ($289 to $325) and briefcases with hidden tape recorders activated by the case’s handle ($725).

For more information on debugging sweeps visit us at http://www.corpa.com


HOME, OFFICE, VEHICLE, OR PHONE DEBUGGING

Investment & Venture Capital Scams
For more information on debugging sweeps visit us at http://www.corpa.com
tscm
HOME, OFFICE, VEHICLE, OR PHONE

More and more each day competitors, ex-associates, new start-up ventures, and unscrupulous individuals are using electronic eavesdropping as a way to gather information that could seriously damage your business.

“Bugs” telephone taps and video transmitters (above) are readily available that can compromise your business secrets for as little as $30.00. The manufacture, sale, installation, and monitoring of these devices is a multi-billion dollar industry in North America.
Unless you are a law enforcement agency with an Order or Warrant for a wire tap, it is a criminal offence to record the conversations of two or more persons without their consent.

Is Your Office or Phone Line Bugged?

How Do You Know If You’re Bugged ?

Confidential information seems to be getting out to competitors.

Competitors seem to be just one step ahead all of the time.

Your office was broken into yet very little or nothing was taken.

Sockets or switches show signs of being moved slightly, ie: the wallpaper may be disturbed.

Vehicles parked near to your premises, that appear to be empty.

Your telephone rings but no one speaks or you just hear a short tone.

Unusual sounds (crackling, clicks, volume changes) on your telephone handset.

Indications that your handset may have been exchanged, ie: numbers in memory may be lost.

Repairers or utility companies turn up to carry out work when they have not been called.

Furniture or items appear to have been disturbed.

Interference on your radio or television.

Unexplained brick or plaster dust on floor.

PROFESSIONAL DEBUGGING SERVICES BY TRAINED PRIVATE INVESTIGATORS AND TSCM TECHNICIANS IN BUSINESS FOR OVER 22 YEARS.

RF SPECTRUM ANALYSIS TO 6 GIG, , NLDJ, PHONE TAP DETECTION, TRACKING DEVICES, VLF, MICROWAVE, PHYSICAL INSPECTIONS !!

Is Your Office or Phone Line Bugged?

http://www.corpa.com/tscm.html

http://www.corpa.com/livevideopicks.html

Prices Starting From $500.00 and up !!

905-331-1333 – Sam Labella – TSCM

For more information on debugging sweeps visit us at http://www.corpa.com

TSCM, information leak, residential bug sweep, financial records compromised, Phone Wire Tap, Bug Detector, Anti-Spy, Telephone Line Wiretap, Counter Measure Electronics, Gadgets, Building Debugging, Bug Sweep, Boardrooms, GPS tracking detection, surveillance detection, bug sweep detection, Canada, Ontario, Quebec, Toronto, technical surveillance counter-measures, Boardroom office sweeps, Home bug sweeps, hidden transmitter, hidden transmitter, Bug detection vehicles, bug detection cars, bug detection vehicles, bug detection planes, sweep, meeting rooms for eavesdropping, GPS tracking device, Conference rooms bug detection, Conference room hidden microphone detection, TSCM specialists, professional sweeps for bugs, phone taps, hidden microphones, cameras other eavesdropping, wiretapping equipment, conference security, industrial espionage, litigation issues, marital disputes, private conversations to remain private, bug sweeping, technical counter-surveillance specialists, electronic listening devices, hidden cameras, licensed private investigators, videos of Doug Ralph of Comsec Services, recording devices, cameras, listening devices, competitor listening, competitor bugging, competitor information leak, competitor hidden video camera, ex partner bugging, stalker, industrial espionage, share holder bugging, company’s image and reputation, computer security, computer hacker, server hacker, private investigators Toronto, private investigators Ontario, private investigators Canada, Private Investigators Quebec, private detective Toronto, private detective Ontario, Private detective Canada, Private detective Quebec, Law offices, Trading floors, Executive suites, Conference rooms, Board meeting inspections, monitoring, Info-loss vulnerability survey included, Eavesdropping & GPS Tracking Detection, Limousines, Aircraft, Yachts, Corporate apartments, Executive homes & offices, Off-site business meetings, Hotel rooms & resort conference areas, Cell Phone Spyware Detection, Cell phone tap, Spycams, Covert CCTV, Microcams, Minicams, Wireless Spy Cameras, Information security surveys, Business espionage prevention, Wi-Fi Security & Compliance Audits, Whole building / floor security audits, Compliance surveys, HIPPA, GLBA, Sarbanes-Oxley, PCI-DSS, FISMA, DoD 8100.2, ISO 27001, Basel II) Information security recommendations.

For more information on debugging sweeps visit us at http://www.corpa.com
________________
World Wide Private Investigation – Results or You don’t Pay !!
www.corpa.com

Bugs & Telephone Taps

Investment & Venture Capital Scams
For more information on debugging sweeps visit us at
The ProblemMore and more each day competitors, ex-associates, new start-up ventures, and unscrupulous individuals are using electronic eavesdropping as a way to gather information that could seriously damage your business.
“Bugs” telephone taps and video transmitters (above) are readily available that can compromise your business secrets for as little as $30.00. The manufacture, sale, installation, and monitoring of these devices is a multi-billion dollar industry in North America.
Unless you are a law enforcement agency with an Order or Warrant for a wire tap, it is a criminal offence to record the conversations of two or more persons without their consent.
How Do You Know If You’re Bugged ?

Confidential information seems to be getting out to competitors.

Competitors seem to be just one step ahead all of the time.

Your office was broken into yet very little or nothing was taken.

Sockets or switches show signs of being moved slightly, ie: the wallpaper may be disturbed.

Vehicles parked near to your premises, that appear to be empty.

Your telephone rings but no one speaks or you just hear a short tone.

Unusual sounds (crackling, clicks, volume changes) on your telephone handset.

Indications that your handset may have been exchanged, ie: numbers in memory may be lost.

Repairers or utility companies turn up to carry out work when they have not been called.

Furniture or items appear to have been disturbed.

Interference on your radio or television.

Unexplained brick or plaster dust on floor.

Kevin Bousquet Looking & Listening for RF Devices


The RF Sweep & Spectrum Analysis

The most commonly and widely used of all the devices is the RF (Radio Frequency) transmitter bug. These devices are inexpensive easy to use and require no specialized receiving equipment a simple AM or FM radio can be used to monitor the bug. Due to their low cost, there is very little incentive to recover these devices once planted.

The Spectrum Analysis (photo above) we use to detect RF devices is capable of monitoring frequencies up to 36 Gigaherts. This will also include very low frequency (VLF) devices which transmit on frequencies down to 15 Kilohertz.

Sam Labella Listening for Devices through the Power Lines

Power Line Analysis – Hard Wire Bugs


The next method is often known as the “wire tap” or a “hard wire bug”. The wiretap will use any existing wiring in the home or office ie: the electrical plugs (see photo above), alarm systems or even the telephone wiring. This is similar a typical baby monitor situation where you plug the transmitter into one room and the receiver in the other.


Many think that telephones are only a security risk when being used but a simple modification to the handset can leave the microphone connected, even when the phone is not in use.

Telephone System/Line Analysis

Wired and wireless transmitters must be physically connected to the line before they will do any good. Once a wireless tap is connected to the line, it can transmit all conversations over a limited reception range. Wired taps, on the other hand, need no power source, but a wire must run from the line to the listener or to a transmitter.

An ‘Infinity Transmitter’ or ‘Harmonica Bug’ must be installed inside the phone. When someone calls the tapped phone it rings, blows a whistle over the line, and the transmitter picks up the phone via a relay. The mike on the phone is activated so that the caller can hear all of the conversations in the room.

The telephone line analyzing equipment used during the sweep (photo above) is capable of determining illegal taps, defective phones, room listening devices, splices, VLF devices, infinity triggered devices, and selectively targeted phones in situations where a tap has been placed in a wire closet or a telephone room.

A signal is generated from your phone right to the Bell Canada Phone Centre (or the main phone centre of your particular State or Province). The purpose is to evaluate the current in the line and to discover if any device has been placed on the line that might be causing a drop in the current.

Globe and Mail.February 13, 1990.
The Financial Post.June 4, 1990.
For more information on debugging sweeps visit us at http://www.corpa.com

TSCM, information leak, residential bug sweep, financial records compromised, Phone Wire Tap, Bug Detector, Anti-Spy, Telephone Line Wiretap, Counter Measure Electronics, Gadgets, Building Debugging, Bug Sweep, Boardrooms, GPS tracking detection, surveillance detection, bug sweep detection, Canada, Ontario, Quebec, Toronto, technical surveillance counter-measures, Boardroom office sweeps, Home bug sweeps, hidden transmitter, hidden transmitter, Bug detection vehicles, bug detection cars, bug detection vehicles, bug detection planes, sweep, meeting rooms for eavesdropping, GPS tracking device, Conference rooms bug detection, Conference room hidden microphone detection, TSCM specialists, professional sweeps for bugs, phone taps, hidden microphones, cameras other eavesdropping, wiretapping equipment, conference security, industrial espionage, litigation issues, marital disputes, private conversations to remain private, bug sweeping, technical counter-surveillance specialists, electronic listening devices, hidden cameras, licensed private investigators, videos of Doug Ralph of Comsec Services, recording devices, cameras, listening devices, competitor listening, competitor bugging, competitor information leak, competitor hidden video camera, ex partner bugging, stalker, industrial espionage, share holder bugging, company’s image and reputation, computer security, computer hacker, server hacker, private investigators Toronto, private investigators Ontario, private investigators Canada, Private Investigators Quebec, private detective Toronto, private detective Ontario, Private detective Canada, Private detective Quebec, Law offices, Trading floors, Executive suites, Conference rooms, Board meeting inspections, monitoring, Info-loss vulnerability survey included, Eavesdropping & GPS Tracking Detection, Limousines, Aircraft, Yachts, Corporate apartments, Executive homes & offices, Off-site business meetings, Hotel rooms & resort conference areas, Cell Phone Spyware Detection, Cell phone tap, Spycams, Covert CCTV, Microcams, Minicams, Wireless Spy Cameras, Information security surveys, Business espionage prevention, Wi-Fi Security & Compliance Audits, Whole building / floor security audits, Compliance surveys, HIPPA, GLBA, Sarbanes-Oxley, PCI-DSS, FISMA, DoD 8100.2, ISO 27001, Basel II) Information security recommendations.

Are Your Phones Bugged ???? http://www.c

Investment & Venture Capital Scams

 

 

Are Your Phones Bugged ???? http://www.corpa.com/programplay.asp?show=Undercover-DougRalphstudio

Forensic document examination Part 1 htt

Investment & Venture Capital Scams

Forensic document examination Part 1 http://www.corpa.com/programplay.asp?show=Undercover-Forgery1

PI TV Show.. http://www.corpa.com/livevi

Investment & Venture Capital Scams

PI TV Show..

http://www.corpa.com/livevideopicks.html

Why Canadian Businesses Fail

Business Bankruptcy in Ontario, Canadian Business Taxes, GST, Investment & Venture Capital Scams

PRESS RELEASE

Why Canadian Businesses Fail

By Kevin Bousquet

What would happen if you were given a key to a race car for which you had only the manual (a written plan), but you had no previous driving experience? 

You take your new race car out on to the track and find yourself surrounded by other race car drivers on fast moving track.  You try to follow the manual (your written plan), but you discover it’s useless without practical driving experience.

Within moments, you crash into a wall and bring down other race car drivers with you.  You suffer injuries that affect you and others for a very long time.

Banks, lenders, and business development organizations wonder why new start-up businesses in Canada continue to crash into the wall at record rates.  Even with the most perfect written business plan, many lenders no longer lend to new start-up businesses simply because the risk for failure is too high.   

A friend of mine was recently laid off from a job she had for many years.  Like most people she went on unemployment benefits while she struggled to look for work.  Realising her hope for employment in Canada was bleak she decided to start her own business.  She had no previous experience running a business.    

She discovered a government-sponsored program that would allow her to receive unemployment benefits while starting her own business.  The only catch to the deal was she would have to attend and complete the unemployment business training course on how to properly start her own business, or her unemployment benefits would be cut off.

While taking the class she came to me almost weekly seeking help with her business plan. I soon realised that her course was very focused on the written business plan, with very little practical training involved.

Every business scholar and successful entrepreneur would agree that a written business plan is crucial to the start-up process.  Before a building can be built there has to be a solid blueprint.  Essentials to a business plan are strategies such as the mission statement, target market, industry analysis, competition, marketing, financial projections and so on. 

There is, however, a limit to what can be learned in a classroom setting, without hands-on experience or through the examples of successful entrepreneurs. 

If government lenders, banks and others continue to focus exclusively on well-written business plans, they might as well attach a bankruptcy application form to each loan application.

There are many reasons why businesses fail, and in most cases failure has little to do with not following the actual business plan.

 

CANADA’S BUSINESS TAX SYSTEM

A new small business owner may not be properly prepared to handle Canada’s tax system.  

After a year or so in business, the owner can expect government envelopes to begin arriving almost daily in the mail.

All levels of government will be looking for their money. There will be Municipal, Provincial and Federal taxes, plus GST.  If your business qualifies you may also be subject to Retail Sales Tax and Workman’s Compensation dues.

Hiring an employee or two will launch the new business owner into Canada’s complicated and expensive payroll system.   Many business associations continue to lobby against Canada’s excessive business payroll tax.  They maintain the expensive payroll system alone is prohibiting new start-ups from providing job opportunities.  They say this is the true reason why there are few jobs available in Canada.  Entrepreneurs simply don’t want to do business here because of our tax system.

A business owner can expect that more than 50% of every dollar earned will be paid out in tax.  This means the tax man is your partner and you may not even know it.    That is of course if you’re a business that actually pays tax as many don’t.   If you do you may find yourself competing with competitors undermining your prices whom have given up and illegally joined the underground economy. 

Understanding Canada’s business tax system and how to manage and pay business tax on time can make the difference between success and failure.

Other Challenges

And what about other aspects of business that may not be covered in the business plan?  For example:

·        Renting space; dealing with commercial landlords who seek long term leases with hidden personal guarantees that may prevent your business from growing when you can’t break out of a lease. 

·        financing equipment and vehicles successfully

·         finding the right insurance for the business and its employees

·        Coping with suppliers or customers who don’t pay.   

·        Dealing with bad debt, insurance claims, lawyers, accountants, customs and freight brokers.

·        entering into contracts

·         Learning how to hire and fire employees, and discovering their rights under the employment legislation

Some of these issues alone are documented business killers. 

 

What is the Answer?

In the early days of the Internet there was a Dot Com Venture Capital boom.  Millions of dollars were being invested by Venture Capitalists and private lenders into new start-ups.  Some deals went well; others were disastrous.

During this time, I read about a few Venture Capital firms who made the decision to nurture the business in which they were investing on many different levels. 

For example, the new start-ups were not only well-financed by lenders/investors, they were provided with office space sometimes in the same building as the lender or on the same floor.   The owners and staff were given basic business training paid for by the lender/investors.   They virtually had a professional venture capitalist holding their hand each step of the way. 

Imagine one of Canada’s leading banks lending to new start-ups under a new training program.  Before a potential loan applicant could even get an appointment to see a loan rep, they would have to complete a joint government and bank sponsored professional business course. 

A course available day, nights, or weekends to accommodate any schedule, taught by qualified business professionals who were not only teachers but were successful entrepreneurs in their own right.  Entrepreneurs who focus not only on the written business plan but who could teach on all the expected struggles of running a Canadian business.  A course that could cover various aspects of industry, such as retail, construction, manufacturing, technology etc.

In Canada we have subsidized housing for those who cannot afford to pay expensive rent. Imagine government-subsidized commercial space for new businesses trying to grow 

 Why should we expect the government to pay or assist with such training?

Every new business created is a new tax payer to our system.  A company who will pay the government 50% or more on every dollar earned.   Each employee who works at the new company will also pay an array of other taxes. An employee who is making money will also spend money into the economy.

The failure of a company, from a government standpoint, is the death of a tax payer.  It is in the government’s best interest to keep businesses alive and offer incentives for business to be created and to grow, so that jobs can be created.    

Giving out government grants to new start ups using well-designed business plans to the untrained and unqualified only increases the financial coffers of bankruptcy trustees.  

The Author:

Kevin Bousquet is the president of The Corpa Group Inc; a Private Investigation and Due Diligence firm working for the Venture Capital Industry.

Facebook.com vs Your Privacy – By a Private Investigator

Alternative Investments, Ann Baskins, asset investigation, Blogroll, Buying a Business, California attorney, California Attorney General Bill Lockyer, child issues, child support, children and custody, children and the law, Commercial Real Estate, confidential board discussions, Congressional subcommittee, Corporate Law, Dating the Divorcee, divorce, divorce court, divorce law, facebook, facebook.com, family law, Fifth Amendment rights against self-incrimination, Fraud Alert, Fraud Avoidance, Fred Adler, Global Investing, government issues in Canada, government issues United States, Hewlett-Packard Scandal, House Energy and Commerce Committee, HP Securities Litigation Team, HR4709, Internet Fraud complaints, Investing Ideas, investment, Investment & Venture Capital Scams, Joseph DePante, Journalism, Kevin Hunsaker, Lt. John Garvin, lying about who you are, Mark Hurd, Massachusetts private eye, Massachusetts State Police Certification Unit, Mike Moeller, MoneyControl, Patricia Dunn is, Personal Investing, pretexting, privacy, private detective, private investigators, Real Estate News, Ronald R. DeLia's, Security Outsourcing Solutions, The HP Scandal, Theft & Fraud by Employees, Uncategorized, undergound economy, Venture Capital, venture capital blog

 

By Private Investigator – Kevin D. Bousquet

 

While I admit to joining the klan of facebook.com I find the site very dangerous in the way of personal privacy and people should be very concerned and warned.  

I have written articles and even did a tv show on how impersonation is out of control. People who have had their lives destroyed because someone got a hold of their personal information and applied for credit in their name.

I interviewed a lady on my tv show who woke up one morning to a collection agency phone call.  She discovered that someone impersonated her identity and managed to purchase two houses in her name in Gretzky’s home town of Brantford Ontario.   She had no idea that someone had used her identity by applying for credit in her name.    It took  years for her to get her life back.

Yet people who register on facebook post their name and their date of birth right out in the open for anyone to see. 

Many on facebook will argue they use their privacy settings and only close friends see personal information.  This is great for those who actually use their privacy settings.  

There are  networks after networks of interest groups that allow people who you may not directly know to see your personal information.  They are allowed to see it because your privacy settings have allowed people in the same network to see your personal data.   

Many assume because they have an interest in common with someone, skiing, music, church, city events that a person in that network is not going to compromise their data.  Do you really know everyone in your network? 

Yet bigger city networks like “Toronto” or joining a network where in the city where you reside can be a great place for would be fraudsters to take your personal information and apply for credit.   

Your Name & Date of Birth is all it takes 

People need to realise that all it takes is your name and date of birth to steal your identity.

Facebook A Great Place To Harvest  

The word to be aware of is “harvesting”.  Right now I can go on facebook and within less that an hour I can harvest names and dates of birth of dozens after dozens of people.  If I really tried I could probaby average 100 names and dates of birth in an hour.   People who I don’t know,  who are not in any network.   

Personal data out in the open makes you vulnerable to attack by fraudsters to get your data to apply for credit in your name.   Problem is people don’t realise just how bad the problem is.  There is no recourse, you’re on your own trying to clean up your life if you’re impersonated.   Don’t expect the police to do it for you and don’t expect that the fraudster will actually get caught.   Act proactive rather then reacting to a crisis later.   

Impersonation fraud is the biggest growing crime on a world wide level.   If you have a home you could also be a victim of mortgage fraud or have your house sold right from under you with the aid of the data you gave up on facebook.com

 

Teenagers and children are the best targets.  Kids who have not yet established credit ratings.  A nice clean name, date of birth and address is all a fraudster needs to start applying for credit in your child’s name.  

The Federal Trade Commission just did a warning to the public that over 400,000 children and have already had their identity stolen and many don’t even know it yet. This will include teenagers.

 

 

If your address is posted all the better.   If they get a hold of your Social Insurance Number or Social Security Number you’re done like dinner you may never get your life back. 

You’ll spend years trying to clean up your credit rating convincing creditors and collection agencies that you’re you and not the fraudster who managed to swindle thousands from banks and credit agencies using your name.  

 

There was just a news article recently where a victim of impersonation was reported dead to the government, yet he was alive and well.  He spent months just trying to convince the government he was not dead and his problems continue.  

You could find the IRS or Revenue Canada knocking on your door or even the police or perhaps immigration. 

The answers to virtually all verification questions asked by a bank or credit agency to prove you are you can be answered on facebook.com 

Let’s start with the most common question that all credit card companies ask to verify you? “What’s your mother’s maiden name”?   Your dog’s name, where did you attend school.  Your previous addresses.   Take a look at the verification questions used by web based email services like hotmail.com when you sign up.   Many of these questions could be answered by looking on facebook.com.

There may be those who may want to use your name and date of birth to commit a crime or get a job when they don’t have status to work in the country.   

Ask yourself could  someone easily recreate your resume from facebook depending on the information you posted? 

 I am fascinated by those who post their resume.  Where you went to school, what degrees you have, your past jobs, your marital status.  Your interests, where you volunteer, you associations and degrees.  Even your religious beliefs.

What about child predators seeking to hurt and exploit children.   People continue to  post pictures of their children, some have posted where they go to school or daycare and even what time they are picked up.  Your toddler could even be at risk.

The security risks to openly

posted personal data are endless.

If you give away too much personal information your jugglar vein is exposed waiting for the kill.  If you’re impersonated there are only two things in the world that can prove you’re you.  Your DNA and your fingerprints.  You’ll spend a lifetime trying to get your life back.

Be careful what personal information you give up on any website.

 

Kevin Bousquet is a Private Investigator and President of Corpa Investigation www.corpa.com a 17 year old firm specialising in fraud investigation. 

 

He has his own tv show on Persona Cable which can be seen on the internet at http://www.resourceschannel.com/programs-undercover.html