• Categories

  • Pages

  • Archives

Profiling A Perpetrator & Distinguishing an M.O. From Signature

profile

NEW NEWS: IRS releases 2017 Standard Mileage Rates for Business: 

  • 53.5 cents per mile for business miles driven, down from 54 cents for 2016

============================================================================

BEACON BULLETIN

Based on crime scene evidence, one basic method of characterizing  offenders divides them into three categories:

  • Organized offenders: These criminals are more sophisticated in their approach, and their crimes show evidence of planning. These types tend to be of average or better intelligence, employed, and in active social relationships such as with spouses and families. Even though they’re driven by their fantasies, they maintain enough control to avoid being impulsive. They prepare and even rehearse. They tend to target specific victims or types of victims and use control measures such as restraints to maintain victim compliance. They bring the tools they need to gain access to and control of the victim and avoid leaving behind evidence. As killers, they generally hide or dispose of the body and are likely to have a dumpsite already selected.
  • Disorganized offenders: These criminals usually live alone or with a relative, possess lower-than-average intelligence, are unemployed or work at menial jobs, and often have mental illnesses. They act impulsively, or as if they have little control over their fantasy-driven needs. They rarely use ruses to gain the victim’s confidence, but rather attack with sudden violence, overwhelming the victim. The crime scene often is messy and chaotic. This type of offender doesn’t plan ahead or bring tools along, but rather uses whatever is handy. As killers, they typically leave the body at the scene and exert little effort to avoid leaving behind evidence. Some have sexual contact with the victim after killing him or her.
  • Mixed offenders: Some offenders leave behind mixed messages at crime scenes. They show evidence of planning and a sophisticated MO, but the assault itself may be frenzied or messy, which may indicate some control over deep-seated and violent fantasies.

Profilers have developed categories of descriptors, describe the types of individuals who commit the crimes. Some of the descriptors used in serial killer profiling are as follows:

  • Age: Most serial killers are in their 20s or 30s.
  • Sex: Almost all are male.
  • Race: Most don’t cross racial lines. That means, in general, White offenders kill Whites, while Black offenders kill Blacks.
  • Residency: Organized offenders may be married, have a family, and be well liked by their friends. Disorganized offenders, because of their mental instability and immaturity, tend to live alone or with a family member.
  • Proximity: The location of the perpetrator’s home in relationship to the crime scene is important. Most kill close to home, a factor that is particularly true with the first few victims. The area close to home is a comfort zone. With experience, however, the killer may move his predatory boundaries farther and farther from home.
  • Social skills: Killers who use a ruse to ensnare their victims, like Ted Bundy did, typically possess good social skills, whereas those who use a blitz-style attack are less comfortable with conversation.
  • Work and military histories: Organized offenders more often have a stable work history and are more likely to have left any military service with an honorable discharge. Disorganized offenders often are quite simply too unstable to hold a job in the long term or to complete military service.
  • Educational level: Organized offenders tend to have more schooling than their disorganized counterparts.

Using these descriptors, profilers can create a pretty good picture, or profile, of the type of person who likely committed the crime.

  • Method of entry
  • Tools that were used during the crime
  • Types of objects taken from the crime scene
  • Time of day the crime was committed
  • The perpetrator’s alibi
  • The perpetrator’s accomplices
  • Method of transportation to and from the scene
  • Unusual features of the crime, such as killing the family dog or leaving behind a note or object to taunt the police

In contrast to an MO, a signature is an act that has nothing to do with completing the crime or getting away with it. Signatures are important to the offender in some personal way. Torturing the victim, overkill, postmortem mutilation or posing, and the taking of souvenirs or trophies are signatures. These actions are driven by the killer’s psychological needs and fantasies.

Unlike an MO, a signature never changes. It may be refined over time, but the basic signature remains the same. For example, if a serial killer poses victims in a religious manner, praying or as a crucifix, details such as candles, crucifixes, or other ceremonial objects may be added later. The signature has changed, but its basic form and theme remain the same.

Obviously, a professional profiler should be contacted if you believe there is a need for such; the above is simply a broad explanation of criminal profiling.

BNI Operatives: Situationally aware.

As always, stay safe.

 

How To Access Your State’s Victim Compensation Funds.

crimevictimcompensation

Although we hope our readers never need to access their state’s victim funds, they should know that these services and compensation are available.  (We use New York as the example state for this article but the process is virtually identical in all of the states. There is also a federal Office for Victims of Crime (OVC).  The OVC’s mission, however, covers such areas as human trafficking, mass violence (riots) and terrorism. The purpose of this article is to provide more local information.)

History

The State of New York’s commitment to its innocent victims of violent crime began with the creation of the Crime Victims Compensation Board in 1966, now named the Office of Victim Services (OVS). As of June 22, 2010, the Crime Victims Board (CVB) became the Office of Victim Services (OVS) and has been providing compensation and other services to one of the most vulnerable populations in our State – innocent victims of crime – for more than 40 years.

Mission

OVS has a three-tiered mission to:

  • provide compensation to innocent victims of crime in a timely, efficient and compassionate manner;
  • fund direct services to crime victims via a network of community-based programs; and
  • advocate for the rights and benefits of all innocent victims of crime.

Compensation

OVS provides substantial financial relief to victims of crime and their families by paying unreimbursed crime-related expenses, including but not limited to: medical and funeral expenses, loss of earnings or support, counseling costs, crime scene clean-up expenses, the cost to repair or replace items of essential personal property, reasonable and necessary court transportation expenses, assistance to crime victims acting as a good Samaritan, the cost of residing at or utilizing the services of a domestic violence shelter, and limited attorney fees.

The agency is a payer of last resort, which means:

  • A crime victim or family member must exhaust all other sources of compensation before OVS can assist.
  • For example, benefits must first be obtained from health or other insurance policies or workers’ compensation before the agency can provide compensation.

Who may be eligible for compensation?

  • The victim must be an innocent victim of the crime. By law, OVS can reduce an award or deny a claim if the agency determines that a person’s conduct contributed to their injuries.
  • Victims of crime who were physically injured as a result of the crime
  • Victims of crime who are under 18, 60 and over, or disabled, who were not physically injured
  • Certain relatives and dependents, including surviving spouse, child, parent, brother, sister, stepbrother, stepsister, stepparent or person primarily dependent on the victim for support
  • Those who paid for or incurred burial costs for an innocent crime victim
  • Child victims, a child who witnesses a crime, and the child’s parent, stepparent, grandparent, guardian, brother, sister, stepbrother or stepsister
  • Certain victims of unlawful imprisonment or kidnapping
  • Certain stalking victims
  • Victims of terrorist acts outside of the US who are a resident of New York State
  • Victims of frivolous lawsuits brought by a person who committed a crime against the victim

What other steps are necessary to be eligible?

  • Report the crime within one week to police or another criminal justice agency
  • File a claim with OVS within one year of the crime
  • If late with either crime reporting or claim filing, justify the delay in writing
  • Cooperate with police, the district attorney’s office and OVS

If you believe you are eligible for relief or reimbursement from the NYS OVS, file a claim here.  To ensure process efficiency, have all of your related documentation together before contacting the agency.

And now, this week in:

NEW NEWS:  “All New York State IDs are currently acceptable to use for REAL ID purposes, such as getting into federal buildings and for use to board domestic flights,” said DMV Executive Deputy Commissioner Terri Egan. “We anticipate that all documents now issued will remain acceptable until October 1, 2020.

BNI Operatives: Situationally aware.

As always, stay safe.

 

Class Action Lawsuits: How To Research, Initiate or Submit Claims.

 

class-action

Whether it is a credit card APR suddenly shooting through the roof or a defective product that has caused  serious injury, if you have been on this earth long enough, sooner or later you will scream, “Someone should sue these people!”  Now you can check and see if someone has done just that – initiated litigation about a product, service or company.

TopClassActions.com hosts a very informative site that provides information on the following:

  • Class Action Suit News (On consumer products, drugs, medical devices, labor & employment, stocks & securities, etc.)
  • Settlements (Open and Closed)
  • Investigations (Into class actions, product liability, personal injury and more)

You can even submit a claim on the site on open class action suit that have been resolved and a pay-out fund established.  There are dozens of these settlements that you can review, from the Uber gratuity charge action to the My Pillow refund due all who purchased this product.  Check the up-to-date settlement database here. 

The site even contains a section where you can check the top class action lawsuits in the news and in which you may have a stake.  For example, the current top class action suits include:

POPULAR SETTLEMENTS

Ford Lincoln spark plug class action settlement

Ford, Lincoln Spark Plug Class Action Settlement

Electrolux class action lawsuit

Electrolux Dryer Class Action Settlement

Johnson's Bedtime Bath class action lawsuit

Johnson’s Bedtime Bath Products Class Action Settlement

car class action lawsuit

Auto Parts Price-Fixing Class Action Settlement

milk price-fixing settlement

Fresh Milk Products Price-Fixing Class Action Settlement

NEC-disk-drive

Optical Disk Drive Indirect Purchaser Class Action Settlement

**************************

New News: The National Insurance Crime Bureau (NICB) has gotten hold of a “mystery device” that thieves have been spotted on security cameras using to electronically open and start cars. More.

BNI Operatives: Situationally aware.

As always, be safe.

 

Favorite Tools Of The Literate P.I. – And Others Who Work For A Living

pi-tools

I’m often asked which tools simplify my life as a private investigator. I’d have to say that the top three on that list are:

  1. Truthful witnesses
  2. Forthcoming clients
  3. PayPal

Aside from that:

Evernote – I scan and save important documents and things I may want to refer to later when browsing the web.

Bitly – I share links on social media, in emails and when writing reports dozens of times daily. Bitly helps me shorten those long, ugly links. I also have a cool branded link for my business if that is interesting for you.

Zapier – This helps me automate tasks between web apps. So if I put a new client into QuickBooks, Zapier automatically adds their contact details into my client newsletter in MailChimp or WordPress. And that’s just the tip of the iceberg.

Email

MailChimp – This is one of the easiest email marketing platforms to use to market your content to your email list.

Social Media and Content Marketing

Constant Contact – With Constant Contact, you can schedule, publish and analyze all your social media posts in one place.

Canva – I use Canva to create images for social media, blog posts and just about anything else. It can instantly turn you into an amateur graphic designer.

Feedly – Add your favorite blogs and websites to start filling up your feed with content that rocks.

Google Analytics – Easily track site traffic and visitor behavior to see how your content is performing.

File Sharing

Dropbox – Dropbox has become synonymous with online file sharing, and for a good reason.

 

Business

QuickBooks Online – We switched from QuickBooks to QuickBooks Online about four years ago, and have not looked back. It’s become better and better every year.

Google Docs – I use Google Apps for Work and Google Docs to collaborate with other investigators on documents. It’s the best collaborator that I have worked with for things like word processing documents and spreadsheets.

Microsoft Office 365 – Even though I am huge fan of Google Docs, I still use Microsoft Office to write reports. In part, because Google Docs does not have all of the advanced formatting options that Microsoft Word does.

Security

LastPass – With access to hundreds of databases and websites, it’s not easy keeping track of passwords. But LastPass stores difficult-to-crack, encrypted passwords in the cloud that can be used on multiple platforms.

Google Authenticator – I am a huge proponent of two-factor authentication, which protects your accounts with a second form of authentication by adding an extra layer of security to your account. Google Authenticator protects your account with both your password and your phone, by providing a “secret” code so that nobody can get in.

StrongVPN – A VPN secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes. I have been using StrongVPN for several years without a glitch, primarily because it allows me to have a static IP, but there are a number of great services out there.

Website Hosting / WordPress Theme

Synthesis – I used a number of different web hosts for the first few years until I came across Synthesis. It’s probably not the cheapest service out there, but it’s reliable and fast, and the support is great.

StudioPress Themes for WordPress – If you like the way this website looks, then you need to have a WordPress site from StudioPress. These are the best WordPress themes out there.

Editing

ProofreadNOW.com – I can write like the wind, but I am no grammarian. I leave that up to ProofreadNOW.com. For a nominal fee, they will have professional proofreaders make sure that every blog post I write has every “t” crossed and every “i” dotted.

BNI Operatives: Situationally aware.

As always, stay safe.

Your Credit Card May Pay For Rental Car Damage

car-rental

I recently had an incident with a rental car while in assignment out of state.  (Incident is one level below accident.  I scraped the side of the gas pump while refueling.  Long story for another day.)

The rental car company called me and asked me about my deductible as they had gotten in touch with my auto insurance company.  The damage wasn’t that much, all things considered.  $678.  Ok, so I figured I’m biting the $500 deductible as, to this point,  I’d been incident-free this year.  The rental car customer service rep asked me if I had checked with my credit card company about the deductible. At first I thought she’d simply made a mistake and meant to say insurance company.  Nope.  Credit card company.  “Why would my credit card company have any involvement??” “If you check, many credit cards cover the cost of deductibles and more on rental cars as a card benefit.” “Ohhhhh really?!?”  She is correct so I thought I’d pass it along to my faithful readers.

From NerdWallet:

Benefits by network

Visa, MasterCard, American Express and Discover all provide rental car insurance above and beyond what your primary insurer and rental company will offer. Here’s a quick overview of each network’s benefits and limitations:

Visa: Visa is often touted for its excellent rental car insurance benefits, mostly because it’s widely available for cardholders. Unlike many other networks, it offers rental car insurance on all of its cards — standard, Signature, rewards, the works. However, it limits its rental car coverage period to only 15 consecutive days domestically and 31 consecutive days abroad.

MasterCard: Its benefits are similar to Visa’s. However, rental car insurance is not offered on all cards, and it limits its coverage period on all rental cars to 15 consecutive days or fewer. According to customer service, it’s available only on Platinum, Gold, World and World Elite cards.

American Express: American Express is the only network to offer premium coverage for a small fee. It offers free secondary coverage up to $50,000 ($75,000 on The Platinum Card® from American Express and the Delta Reserve Credit Card), but will offer primary coverage with a higher limit and protection against injury and property damage if you choose it.

American Express Exemptions:

Students: A Personal, Gold or Rewards Plus Gold cardholders who are enrolled in an accredited four-year college or graduate program in the United States, and are receiving student benefits provided by card membership, are ineligible.

California: Maximum coverage costs $17.95 for:

  • $100,000 car damage
  • $250,000 accidental death and dismemberment
  • $15,000/person medical expenses
  • $5,000/person property damage, maximum $10,000 overall

Florida: Property damage is capped at $15,000 per person, $25,000 overall.

Discover: Discover’s coverage is limited to a handful of cards. Unlike the other three networks, Discover doesn’t cover loss of use fees, only collision damage up to a $25,000.

Good info to have in case needed.

BNI Operatives: Situationally aware.

As always, stay safe.

 

 

Conducting A Pre-Placement Nursing Home Investigation

nursing-home

Given that people are now living well into their 80s and commonly, their 90s and 100+ years of age, nursing home placement is a valid option for seniors.  Family members may wish to conduct a thorough investigation before selecting a place to live for their aging loved one. We suggest doing the following:

  • Conduct several physical walk-throughs of the facility with at least one or two unannounced visits being on different days/times,
  • Make note of facility staffing levels and responsiveness of caregivers at random times.
  • Observe the overall cleanliness conditions of the facility.

The leading cause of abuse and neglect in nursing home is insufficient staffing.   You may want to pay particular attention to the number of staff members and the adequacy of their response time and effectiveness when responding to assistance requests from elderly residents, especially those with significant health issues.

Our friends at Montlick & Associates also suggest the following:

An effective pre-placement investigation also might include interviewing the administrator about hiring practices and background check; minimum and average staffing levels; procedures to prevent falls, pressure sores, infection or wandering; procedures to ensure proper nutrition, hydration and medication; and other issues related to safety and quality of care. A valuable resource that you may wish to consult is Medicare.gov Nursing Home Comparison Website. This site provides detailed reviews, comparisons and inspection histories for nursing homes that accept Medicare.

Confirm Implementation of Safety Protocols: Nursing homes generally are required to implement special procedures for elderly residents that suffer from physical or mental impairments that pose a greater risk of injury. Family members should inquire about such special procedures if a love one has limited mobility, or an aging family member is prone to falls or wandering. The administrator usually will outline such special safety precautions during the intake process. It may be advisable for family members to follow-up regarding these special procedures to ensure they are actually implemented.

Once you finally do settle on a nursing home, be alert for and follow up on unexplained injuries or changes in mood.  While there are innocent explanations for bruises, dislocations, abrasions, broken bones or depression, any injuries or sudden changes in behavior or mood by a senior merit closer examination. While it can sometimes be difficult to determine the cause of such injuries or changes in personality if an elderly nursing home resident suffers from dementia or Alzheimer’s disease, it is important to pay careful attention to these signs. If serious or repeated injury occurs, this may constitute an even greater cause for concern.

All sound advice and remember, the elderly deserve our appreciation, attention and guardianship as they enter the twilight moments of their lives.  Quality of life is important at every age in life.

BNI Operatives: Situationally aware.

As always, stay safe.

Pros and Cons of Conducting A Pre-Employment Social Media Background Check

social-media-bgc

It is safe to assume that a review of a prospective employee’s social media content will be conducted as part of the new hiring norm as it relates to pre-employment background checks.

It’s also true that, often now, corporate counsel is advising HR managers to be careful with the information they glean from these social media site checks with regard to the manner in which it is used.   Using negative content to reject the candidate may backfire if it appears to be, for example,  racist or misogynistic in nature.  Conversely, one of the first things under the investigation microscope in a workplace violence case is the thoroughness of the background check of the alleged victimizer, to include social media content review.

From my collegaues at “the Background Investigator“:  Research from the Society For Human Resource Management, (SHRM) revealed that 76 percent of employers that don’t use social media when conducting background checks said they avoid this practice mostly because of the legal concerns.
Jonathan Segal, a partner at Duane Morris LLP in the employment, labor, benefits and immigration practice group, said that while there are risks in checking out social media when screening candidates, there are also risks in not looking at it.
“Sometimes, lawyers think [businesses] are taking a risk [by looking at social media], but they could be taking a bigger risk [by not looking], because then they hire the person that is dangerous or unproductive,” Segal said.

In May, the FTC gave a company called Social Intelligence the green light to run background checks of your  Internet and social media history. The Federal Trade Commission now allows companies to run social media background checks and to compile your information. Companies such as Social Intelligence. 

Contrary to initial reports, Social Intelligence doesn’t store seven years worth of your social data. Rather it looks at up to seven years of your history, and stores nothing.

It screens for aggressive or violent acts or assertions, unlawful activity, discriminatory activity (for example, making racist statements), and sexually explicit activity. And it doesn’t pass on identifiable photos of you at all. In other words, your drunken kegs stand photos are probably fine as long as you’re not wearing a T-shirt with a swastika or naked from the waist down.

Basically, it just wants to know if you’re the kind of misfit who will cause legal hassles for an employer.

If you do review social media in your employment process, make sure you preserve the items that you considered in your research.  (Don’t assume that the content you considered will remain available.  Many people remove objectionable material from their online profiles once they realize that it could reflect poorly during their employment search or simply, the content can drop off the site during updates.)

We advise all of our clients – when considering a prospective new hire – to have the candidate sign an attestation that all of the information that they have provided is accurate and true to the best of their knowledge and evidence of falsifying any information will be grounds for dismissal.   Also, it wouldn’t hurt to have him sign off on permission to review his social media content.

BNI Operatives: Situationally aware.

As always, stay safe.

 

 

Not Liking Your Online Profile? Clean It Up & Track Yourself.

online-profile

Cleaning up your online profile―and creating the one you want―is becoming easier for the layperson as we understand how information flows and accumulates on the internet.

First, find out about yourself.

Facts:

1. 85% of search-engine users do not venture beyond the first page when researching someone.

2. Nearly 90% of recruiters conduct some sort of online investigation into recruits, and of these,

3. Almost 45% dropped someone from consideration based on information they found online.

Solutions:

1. Enter your name in the search bar of Google, Yahoo!, and Bing, three of the most widely used search engines.

2. If you have a common name, like Susan Smith, do a few different searches, adding your current or past employers or your hometown to your name.

3. Search images as well for any potentially embarrassing sorority pillow fight pics.

If nothing appears about you, that’s great if privacy is your only concern. But if you want to create a good impression for clients, employers, or potential new acquaintances, it helps if results return with positive entries (a blurb about a promotion,  civic association membership announcement, a listing of volunteers at a charity events, etc.)  and these results will be at or near the top of page one if you have few other online notices.

If you see negative results (an embarrassing photo on a friend’s website, an inglorious, angry rant on FB or a really odd purchase you made), chances are others, including prospective employers, will see them, too.  The beer keg handstand that was funny back in the day isn’t so amusing to an HR manager considering you for a company position who may believe it depicts poor judgment.  I can’t tell you how many times we’ve been brought on to research and then polish up someone’s online profile (or, increasingly, from parents of intern or college-age children).   You can remove the items yourself, ask your friend on whose timeline these goofy pics show up to take them down, push down these unwanted results until they appear way further down in the Google search engine return by running a strong paid social media campaign or pay professional reputation companies or investigation firms that perform this task. But from your desk, at the very least, please keep an eye on your internet self by:

Setting up alerts. To get an e-mail when your name is mentioned in news stories, blogs, or videos, go to google.com/alerts and enter your name, your e-mail address, and how often you would like to receive updates (daily, weekly, as they happen). Again, if you have a common name, add your company, hometown, profession, or job title. This service won’t alert you to everything (Facebook entries, for example), but it will help you keep track of new information that might come up on search engines.

For a service that tracks your mentions on major social media platforms, including Twitter and Facebook, try the aptly-named Mention. The platform can also alert you whenever someone includes your keyword in a post.

The most important advice we can give people is: do not post anything that you yourself cannot wholly control, including the ability to retract the post entirely from the internet.

BNI Operatives: Situationally aware.

As always, stay safe.

 

Back To School; Back To Bullying

bullying

While many children look forward to going back to school this week, a significant number of kids dread what is to them, an ordeal.  They are the ones who fear being bullied.  According to stopbullying.gov :

What is Bullying?

Bullying is unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance. The behavior is repeated, or has the potential to be repeated, over time. Bullying includes actions such as making threats, spreading rumors, attacking someone physically or verbally, and excluding someone from a group on purpose.

Where and When Bullying Happens

Bullying can occur during or after school hours. While most reported bullying happens in the school building, a significant percentage also happens in places like on the playground or the bus. It can also happen travelling to or from school, in the youth’s neighborhood, or, more frequently now, on the Internet.

Frequency of Bullying (There are two sources of federally collected data on youth bullying:)

  • The 2012–2013 School Crime Supplement(National Center for Education Statistics and Bureau of Justice Statistics) indicates that, nationwide, about 22% of students ages 12-18 experienced bullying.
  • The 2013 Youth Risk Behavior Surveillance System(Centers for Disease Control and Prevention) indicates that, nationwide, 20% of students in grades 9–12 experienced bullying.

 What Can Be Done About Bullying?

While there are no federal laws pertaining to bullying, state and local lawmakers have taken action to prevent bullying and protect children.  Each state has laws on the books about bullying: Look here for your state’s regulations: http://www.stopbullying.gov/laws/

If you notice changes in your child’s behavior, and can eliminate drugs and or alcohol as the cause, look into whether they are being bullied.  Many children who are bullied are ashamed and feel insecure.  As a parent or guardian, you have the ability to help change this daily hell for these kids who are singled out for this type aggressive behavior.  No child should ever have to fear going to school or anywhere else for that matter.

BNI Operatives: Situationally aware.

As always, stay safe.

Convert Your Airplane Seat To A Workstation

Air travel has become common these days with technology trying to maintain pace.  So for those who wish to be more productive during their next flight, we recommend the below apps and tools that can help you convert plane time into valuable work time.

1. Connectify(Under $100)  A great way to connect all your devices to in-flight Wi-Fi — since most in-flight services make you pay for each device separately — is to get Connectify, which turns your Windows PC into a Wi-Fi hotspot.  You can even share your password with your seat mate – making for a much friendlier flight!

 

2. Jott Messenger(free). Jott Messenger is a networking app that uses Bluetooth and allows you to sent texts to people on your flight, even when there’s no Wi-Fi connection. This is perfect for business travelers who may not be seated right next to their co-workers or clients. Best of all, using the app doesn’t use any of your monthly data.

 

3. The Airhook(Under $25). This small, simple tray table mount offers two solutions in one. First, you can securely attach any electronic device that’s up to 8.5 inches tall, such as an iPad or smartphone, to the seat in front of you (the angle is adjustable if the person reclines). Second, there’s a cup holder that sits beneath the screen.

4. Solar Phone Charger(Under $45). Designed by GreenLighting, a Solar Phone Charger is great for business travelers needing to charge gadgets at 30,000 feet. The gadget works with your smartphone or iPad’s normal charger, adhering to the plane window and making use of the sun’s rays for a power boost. Keep in mind the Solar Phone Charger also needs its own juice, which takes about four hours when plugged into a laptop.

5. NeatReceipts(Under $150 for the scanner and one year of software). This portable 10-ounce scanner and software bundle helps road warriors streamline the process of expensing, invoicing and organizing business documents. Simply insert receipts, invoices and other paperwork into the scanner for their information to be analyzed, extracted and arranged within the NeatCloud (accessible via a paired app). For instance, receipts can be combined to instantly create expense reports to email or print. Like with Gmail, you can sort information into folder structures, and can also search keywords later on to find what you need (say, when you only remember the first name of someone whose business card you need to locate). NeatReceipts works with QuickBooks, Excel, MailChimp, TurboTax, LinkedIn and Constant Contact.

BNI Operatives: Situationally aware.

As always, stay safe.

%d bloggers like this: