All posts by admin

Navigating the Online Criminal Background Check Labyrinth

More and more individuals wish to protect themselves, their businesses and their loved ones from the possibility of falling prey to criminal activity. One popular safeguard against unnecessary access to unsavory characters is a criminal background check. Whether performing due diligence on a potential employee, securing safe childcare or vetting a new online love interest, criminal background checks have become a regular part of our interactions. As a result of this increased interest in access to criminal histories, many people turn to the most readily available option, the Internet, in order to obtain the information they desire.

A cursory Google search for “online background check” astonishingly returns over 10 million results. The logic is apparent, if the Internet works for shopping in your pajamas and reconnecting with high school classmates, why wouldn’t it work equally as well for background screenings. However, as is typically the case with most endeavors, quantity does not necessarily directly translate to quality.

Often, clients express their utter disbelief when we uncover evidence of a prior criminal history during the course of an investigation. “But I paid for a criminal search online and it was all clear. How could this ever happen?” or some equally confused equivalent are all too common responses. These reoccurring complications center largely on the quality of the information utilized in the search. The old adage stands true; output data quality is only as reliable as the quality of the input data.

Websites offering statewide and nationwide background searches typically perform searches through one of several available databases and pass along the results to the consumer at a highly inflated cost. Essentially, they act as a middleman, selling you someone else’s services without concern for quality or cost. While this alone is unnerving, under further examination you will often find that the databases they utilize are actually severely outdated and or startlingly incomplete. Add the possibility of spelling and data entry errors into this already maladroit mix and your reliable online criminal background check quickly begins to resemble an attempt to catch fire ants with a butterfly net.

It is true that computer aided searches provide the benefit of speedy access to vast amounts of past criminal case files. This in itself sounds substantial, but the reality is often vastly different than initial impressions. For example, some states do not require their judicial offices to report criminal convictions to database agencies. There is also variance at the county level within individual states for requirements of which, if any, criminal history data is sold to third party vendors.

This situation creates a strange paradox in which you can receive a “clear” criminal check from an alleged “statewide” online search, while the subject could actually have a serious and lengthy criminal record in a non-reporting county within the state. The reality that online searches often only produce records from reporting counties that are available post implementation of computerized record systems only compounds this confusion and further augments the margin of error.

The chaotic mix of contributing factors all greatly impact the accuracy and reliability of online record searches. Consequently, the most secure option for a comprehensive criminal background check available to the public remains utilizing an experienced private investigator to physically research the individual. Investigations of this nature ensure that all areas are fully investigated and greatly reduce the likelihood of unknown records under aliases. In fact, physical research is still utilized for most high-level security clearances and positions directly related to personal safety. While technology does aid these screenings, human efforts remain the gold standard over computerized convenience in this sector.

Summer Vacation Safety Tips

The days are longer, hotter and the schools halls are once again silent and empty. All around sunscreen and pool floats have long since replaced the sweaters and raincoats of fall. As of June 20th, it’s official. Summer is in full effect.

For many, summer represents a time to get away with the family, spend quality time with the kids while they’re out of school and enjoy a good ol’ fashioned family vacation. However, before you throw on your Bermuda shorts and don your sunglasses to head out for some hard earned R&R, remember that you may not be the only one excited about your summer vacation.

According to FBI statistics, the crime rate typically rises approximately 10% during the months of June, July and August. Whether this bump is on account of the scorching heat, criminals’ own lofty vacation plans or an overabundance of idle teens is debatable.

What is clear though is that these numbers provide a sound warning for summer fun seekers; however, it certainly shouldn’t prevent you from making the most of the warmest months of the year.

 

A Guide to Keeping Safe While Away at Play

Keep in mind these simple tips and stay safe this summer.

Preparing your Property

  • Inform a trusted neighbor of your trip and ask them to keep an eye out for any unusual activity.
  • Ensure ALL doors and windows are securely locked. Install locks if needed.
  • Use a security checklist the day you leave.
  • Do not “advertise” your trip on social media or to unfamiliar people
  • Consider installing a security system in advance

 

The Occupied Property illusion

  • This strategy essentially attempts to simulate an occupied property in order to reduce the risk of becoming a target. One only needs to make it appear as if someone is home, in order to make their home less appealing to potential burglars.

Strategies include:

  • Use timers on inside and outside lights
  • Hold mail at the Post Office or have someone collect it
  • Schedule regular lawn maintenance
  • Install motion activated lights, especially near entrances
  • Hire a house sitter to inhabit the property or visit often

 

Ensuring a Safe Stay

Once you’ve covered all the possible issues you can on the home front, remember to use the same common sense and awareness while you are away. Often, theft occurs during a vacation because people are more relaxed than normal and not focused on taking normal safety precautions.

  • Use the room or hotel safe in order to store valuables and cash
  • Do not leave personal electronics visible in your room or in your bags while out
  • Familiarize yourself with the hotel door locks and double check that they are fully secured when you leave
  • Secure and lock all windows and balcony doors when away from the room, in the bathroom and at night
  • Always use the deadbolt lock while sleeping
  • Check online hotel reviews in advance for any possible safety issues
  • Keep valuables close to your person, in zipped pockets is possible, especially when in large crowds
  • Exercise the same vigilance and awareness you would use while traveling in a large city or foreign country

 

So remember that while summer is a time for family vacations, backyard barbecues and sandy feet at the beach, it is also a time of increased criminal activity. This increase however does not need to negatively impact your plans this year. Use these tips to protect your home and ensure a fun and safe summer season for the entire family.

Romance Scammers and the Online Dating World

Love. Romance. A soul mate. These are things almost everyone seek at some point in life. While the quest itself is as old as time, the places people search for love have changed significantly in recent years. More and more love seekers are steering the search for their own Romeo (or Juliet) into the digital realm. Talk to your close friends or family, chances are one of them has recently found, or at least tried, a romantic relationship via a virtual rendezvous.

This may sound like a shiny, wondrously new benefit of our increasingly technological world at first glance. And it is certainly not without its benefits for those seeking romance. It gives you access to more potential matches, the ability to filter your potential suitors by preference and of course the ever valuable sneak peak at their appearance before you meet. But before you set up your account and roll the dice with digital cupid, consider who might actually be lurking behind your new sweetheart’s profile picture.

Online dating sites serve as a virtual goldmine for a growing horde of criminals and scammers panning for victims. These criminals seek to identify, contact, groom and exploit individuals’ emotional vulnerability for financial gain. Essentially, they employ a combination of identify fraud and mass marketing fraud. While victims overall are indiscriminately exploited, the most common targets are older females, widows and the recently separated.

To be frank, these crooks masquerading as keyboard Lotharios are not typically innovative criminal masterminds. Their methods are a field-tested routine that is as simple to spot as polar bear in Time Square once you know their game.

Let’s breakdown this boilerplate strategy:

  • Scammers utilize false photographs to present a potential partner they think their victim will find attractive.
  • After initial contact, the paramours quickly escalate the relationship by over zealously declaring their unwavering love for the victim.
  • The fraudster then moves all communication from the dating site to an email account allowing them to maintain more anonymity.
  • Once email contact is established it increases with a flurry of intensity often over a period of weeks, months or even years. This is the “grooming” period. It serves to create the illusion of intimacy with their victim.
  • Gifts are often used to “test the waters” in terms of the victims willingness to comply with instructions. Criminals may send small gifts to show a relationship is “genuine” however following receipt they will make requests for minor amounts of money.
  • Victims sending money to the perpetrators, even extremely small amounts, is essentially a green light for the large-scale shakedown to begin.
  • Virtual “lovers’ are almost always unexpectedly impacted by a serious event that requires the victim’s financial support to rectify. The events can vary from medical expenses to robbery and everything between, but the solution is always money.

 

A massive fraud of this nature could only previously have been attempted by a skilled and experienced con man and require numerous face-to-face interactions. However, anonymity is readily available on the Internet and the limitations of physical locations do not exist. In turn most of the keyboard Romeos perpetrating these romance schemes fit a similar profile. This shared similarity makes pinpointing would be fraudsters simple.

Consider the following points to help you sort out crooks attempting fraud from the real catches:

  • Scammers claim to be a native-born U.S. citizen, however they have a thick accent and/or display extremely poor grammar indicative of a non-native English speaker.
  • The overly emotional confessions of love utilized in the grooming phase are often plagiarized completely, if not partially, and presented, as ones own thoughts. A simple Google search of text of this nature can help identified stolen content.
  • This example we identified in an online romance con is clearly found on poemlovers.com: “I live to live, to spend a lifetime with you and to grow older with you, loving you for all times from now to eternity. I love to love you so much and am so happy that soonest we will be together”.”
  • The perpetuators of these crimes often use the same accounts to lure multiple victims. Research any usernames or email addresses used in communication to see if they are routinely used to commit fraud.
  • The unexpected emergencies that inevitably befall these crooks almost always occur outside the US. This requires the victim to send money to a foreign country, which in turn makes persecution and retrieval highly unlikely.
  • Be seriously suspicious of ANY request for money or support. Remember this is a person you have not met in person and in reality you know nothing about them.
  • It is extremely important that you separate yourself from all emotions if you recognize any of the signs discussed. We are all subject to emotional vulnerability, which can seriously impact otherwise sound judgment.
  • Always share information about any new online relationships with your friends and family. Gaining an additional perspective from outside the situation can help you avoid the fog of emotional vulnerability.

 

While there are numerous scammers and fraudsters lurking in wait for their next victim, avoiding them is not difficult once you know their con. Remember these signs and tips during your online search for the new Mr. or Mrs. Right and you can avoid the scheming Internet inamoratos.

If you think you have already been the victim of an online romance scheme we recommend the following actions:

What To Do If Your Child Is Missing

 

  1. Notify your local police department or county sheriff immediately. Ask them to fill out a normal police report. They will try to gather as much information as possible that will aid them in finding your child. They will follow police protocol and procedures to most effectively proceed in your best interests. Be fully cooperative and do as they instruct.

  2. Call the National Runaway Safeline if you sense your child or teen has runaway. The toll-free number is 1-800-RUNAWAY or 1-800-786-2929. The National Runaway Safeline will assist you free of charge. Safeline has access to thousands of resources throughout the country, including support groups, counseling and drug treatment centers, runaway shelters, and homeless housing. They also have a wealth of information regarding legal issues and medical concerns. Among the services they offer are crisis intervention, and “home free” travel via Greyhound bus. They also provide a message center where you could leave a message in the event your child calls Safeline.

  3. Spread the word to everyone you know that your child or teen is missing. Ask people to report any information, no matter how seemingly insignificant. Let everyone know that you have reported your child missing to the National Runaway Safeline and that this service will act as an intermediary. It could be that your child’s friends know more than they are willing to admit. It is important that you emphasize you are not angry, just anxious to be reunited, and concerned about your child’s welfare.

  4. Contact the media in your area: all local newspapers, TV and radio stations. Create one sheet of information about your missing child with a picture and contact details. Ask for help from the media. Coverage might act as a catalyst to generate more information, to keep people’s attention on your missing child. Also, your child or teen may hear a broadcast or read a story about their case.

  5. Visit your child’s school.Talk with the principle and teachers in person. Ask for any information, anything, no matter how small or inconsequential. Perhaps a teacher might know of some out-of-character behavior or has overheard information that might end up being useful.

  6. Lock down your child’s computer. Turn it off and do not let anyone have access to it except for law enforcement or a reputable private detective. This is important because your child’s computer will have information about their habits, friends, schedule, and emails. Try to construct a timeline of the last days before your child went missing.

  7. Social Networking sites and chat rooms can also provide valuable information about the life your child is living online.

  8. Gather paperwork with potential clues. As you fill in the blanks of what happened, this additional information will add to the picture. It includes records such as phone bills, credit card activity, bus or airline tickets, bank statements, and employment records.

 

Install Caller Identification on your phone and be sure your answering machine or voice mail service is working properly. You may hear from your child, or someone may phone you with an anonymous tip.

How to Use Public Wi-Fi Networks Safely

Nothing Is Private on Open Wi-Fi

In a coffee shop, at the airport, or a library, people connect to public Wi-Fi without thinking much about it. Though using an unencrypted connection to check a baseball score or a flight status might be not too risky, reading e-mail or performing any Web activity that requires a login is like connecting your laptop to a stadium Jumbotron that broadcasts everything you’re doing. Wi-Fi hotspots in public places are convenient, but they’re usually not secure. When using a hotspot, it’s best to send information only to websites that are fully encrypted.

You can be confident a hotspot is secure only if it asks you to provide a WPA password. If you’re not sure, treat the network as if it were unsecured.

How Encryption Works

Encryption is the key to keeping your personal information secure online. Encryption scrambles the information you send over the internet into a code so that it’s not accessible to others. When using wireless networks, it’s best to send personal information only if it’s encrypted – either by an encrypted website or a secure Wi-Fi network. An encrypted website protects only the information you send to and from that site. A secure wireless network encrypts all the information you send using that network.

How to Tell If a Website is Encrypted

If you send email, share digital photos and videos, use social networks, or bank online, you’re sending personal information over the internet. The information you share over the internet is stored on a server. Many websites, such as banking sites, use encryption to protect your information as it travels from your computer to their server.

To determine if a website is encrypted, look for https at the beginning of the web address (the “s” is for secure). Some websites use encryption only on the sign-in page, but if any part of your session isn’t encrypted, your entire account could be vulnerable. Look for https on every page you visit, not just when you sign in.

Don’t Assume a Wi-Fi Hotspot is Secure

Most Wi-Fi hotspots don’t encrypt the information you send over the internet and are not secure.

If you use an unsecured network to log in to an unencrypted site – or a site that uses encryption only on the sign-in page – other users on the network can see what you see and what you send. They could hijack your session and log in as you. New hacking tools – available for free online – make this easy, even for users with limited technical know-how. Your personal information, private documents, contacts, family photos, and even your login credentials could be up for grabs.

An imposter could use your account to impersonate you and scam people you care about. In addition, a hacker could test your username and password to try to gain access to other websites – including sites that store your financial information.

Protect Yourself When Using Public Wi-Fi

So what can you do to protect your information? Here are a few tips:

  • When using a Wi-Fi hotspot, only log in or send personal information to websites that you know are fully encrypted. To be secure, your entire visit to each site should be encrypted – from the time you log in to the site until you log out. If you think you’re logged in to an encrypted site but find yourself on an unencrypted page, log out right away.
  • Don’t stay permanently signed in to accounts. When you’ve finished using an account, log out.
  • Do not use the same password on different websites. It could give someone who gains access to one of your accounts access to many of your accounts.
  • Many web browsers alert users who try to visit fraudulent websites or download malicious programs. Pay attention to these warnings, and keep your browser and security software up-to-date.
  • If you regularly access online accounts through Wi-Fi hotspots, use a virtual private network (VPN). VPNs encrypt traffic between your computer and the internet, even on unsecured networks. You can obtain a personal VPN account from a VPN service provider. In addition, some organizations create VPNs to provide secure, remote access for their employees.
  • Some Wi-Fi networks use encryption: WEP and WPA are the most common. WPA2 is the strongest. WPA encryption protects your information against common hacking programs. WEP may not. If you aren’t certain that you are on a WPA network, use the same precautions as on an unsecured network.
  • Installing browser add-ons or plug-ins can help, too. For example, Force-TLS and HTTPS-Everywhere are free Firefox add-ons that force the browser to use encryption on popular websites that usually aren’t encrypted. They don’t protect you on all websites – look for https in the URL to know a site is secure.

See more helpful articles on cyber security and safety at On Guard Online, the federal government’s website offering very useful information about your online safety and security.

Couple Woes? Counseling Could be Your Answer

694686_34578692Many people wonder if couples counseling is right for them and their situation. When a marriage or partnership goes off course, whether suddenly or over time, deciding to see a counselor might be the smartest thing you can do to find renewed peace and love. When a partnership has been derailed, couples often hope that things will get better on their own. They continue on the same course, feeling the same anger, resentment or hopelessness.

A couple might feel their relationship is beyond a solution and believe ending the relationship is the only viable option. Counseling will help both parties explore whether each is invested in continuing the relationship, and develop strategies for moving forward. Therapy can teach couples conflict resolution skills and strategies to communicate better, teach the skills necessary to make arguing more productive, with the result of reduced anger and hostility.  Couples can be taught the rules of “fair fighting.”

Marriage counseling can help families deal with stressors such as budgeting problems, parenting differences, or the division of labor around the house.  It can also help families who are dealing with grief or loss issues. Dealing with an affair is an issue that can be addressed in counseling, bringing the couple to a clear understanding of the impact the affair has had on the relationship.

For partners who want to save their marriage, seeking counseling is a constructive starting point. In therapy, partners will be able to address both sides of an issue on a level playing field. Couples have the best prognosis when both partners are invested in treatment.  Both people must be willing to look at themselves and the things that they each can change to help improve the relationship, and not just point the finger at the other.  When a couple agrees to treatment, it can be the first step toward a happier and healthier marriage.

While You Go about Your Facebook Lives, a Stranger Could be Lurking

 

Maybe he used the Facebook search tool to seek out single girls or guys age 15-21 who live in towns near his and who are looking for “Networking.” Maybe your photo caught his attention.

If you have your privacy settings saved to “Everyone,” everyone can see your profile information and know as much about your as your close friends and family do.

From your hometown, your stalker might be able to find the address of your school. If you added your work address on your open profile, he would know that too.

He can learn the names of your close friends, can see the pictures you put up and the names you tag.

He can join one of your groups, if he wants to learn more about you. Somebody in the group invites members to a party using the Facebook events tool. You get an invite and accept it. He gets an invite too.

But even if he doesn’t accept, he knows where to find you. Even if he hadn’t been invited, he could have looked up the location when he saw on your profile that you had accepted an invitation. All he has to do is click on the link to the event that Facebook automatically placed in your mini-feed. He now knows where you will be that night.

Without ever leaving his home, a stranger has found you, can look at your pictures, can learn about your life.

He gets assertive and sends you a friend request. You’ve seen his name in one of your groups and on an invite list to the party you plan to attend, so you figure he must be safe. In the friendly spirit of social networking sites, you add him as a friend. Now he has your cell phone number too.

Maybe this guy is harmless, but do you want to take a chance?

How do you protect yourself from falling victim to a predator?

Make your profile private so that only friends can see it. Predators will always choose a readily available target over one that takes work to access. People from your past who look for you will still find your name in a search, but they won’t see your profile until you add them as a friend.

Make your profile limited by using the privacy settings. Use it for people from your past or people you don’t know well.

Don’t list your birth date. At the least, omit the year. Don’t list your school name or the name of where you work. Consider not listing your hometown,  political views or religious affiliations.

Don’t put your phone number on your profile. People you really know you will have other ways to get it.

Keep your personal statement limited. The more you reveal of your likes and dislikes, the more information a stranger will have to create a fantasy obsession or to seek out ways to connect with you in real life.

Never accept an invite to a party or event on Facebook. Decline all online invitations. If you really plan to attend, tell the host in person that you will be there.

Don’t tag your pictures. Strangers won’t know the names and faces of your friends. Never label specifics about where a picture was taken, such as the name of a club or restaurant. Instead label pictures with non-identifying titles like “Birthday Party ’11“, “Vacation” or “Randoms.”

Restrict your picture settings so that only friends can see the pictures you post or pictures that you are tagged in. Do this using the privacy settings.

Be selective in the applications that you add. Stay away from overly personal applications or applications that give away information you have purposely left out of your profile, like hobbies, social groups or favorite things.

How to Shop Online Safely for the Holidays

Be sure to take precautions when you shop online.

As more and more people turn to the convenience of online shopping for the holidays, make sure you use your common sense. Cyber criminals are usually one step ahead with ways to steal your money and personal information.

Be a savvy online shopper. Here are some tips you can use to avoid becoming a victim of cyber fraud:

·Do not respond to unsolicited (spam) e-mail.

·Make sure sensitive information is encrypted. Before you supply any sensitive information, look for a URL that begins with “https” instead of “http”. This indicates a layer of security. Also look for a padlock or shield icon, which indicates recognized encryption software.

·Use a credit card. Always use a credit card to pay for transactions, rather than a debit card, money order or other forms of “cash.” Credit card companies will provide a certain amount of protection against fraud, eliminating or at least limiting personal liability.

·Use different passwords for different vendors. Don’t use the same password for all your online shopping accounts. If a password is intercepted or stolen from one account, it makes all your other online transactions vulnerable as well.

·Avoid using open networks. Only shop on secure networks and avoid free “open” Wi-Fi networks, where data or shopping habits may be visible to third parties.

·Keep software up-to-date. Make sure your browser and operating software is up-to-date. Attackers are constantly looking for vulnerabilities in operating systems and manufacturers regularly offer updates to eliminate potential weaknesses.

·Do not click on links contained within an unsolicited e-mail.

·Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses. Only open attachments from known senders. Scan the attachments for viruses if possible.

·Avoid filling out forms contained in e-mail messages that ask for personal information.

·Watch out for seasonal scams. Be cautious with e-mails claiming to be shipping confirmations or package alerts, particularly if they contain a file attachment. Delete any message from a source that you don’t recognize.

·Always track transactions and shipments through the retailer’s or shipper’s web site. Always compare the link in the e-mail with the link to which you are directed. Determine if they match and will lead you to a legitimate site.

·Log directly onto the official website for the business identified in the e-mail, instead of “linking” to it from an unsolicited e-mail. If the e-mail appears to be from your bank, credit card issuer, or other company you deal with frequently, your statements or official correspondence from the business will provide the proper contact information.

·Contact the actual business that supposedly sent the e-mail to verify if the e-mail is genuine.

·If you are asked to act quickly, or there is an emergency, it may be a scam. Fraudsters create a sense of urgency to get you to act quickly.

·Verify any requests for personal information from any business or financial institution by contacting them using the main contact information.

·Remember if it looks too good to be true, it probably is.

Fraudsters direct victims, via e-mail, to a spoofed website. A spoofed website is a fake site that misleads the victim into providing personal information, which is routed to the scammer’s computer. Beware of e-mails or text messages that indicate a problem or question regarding your financial or bank accounts. Internet criminals will attempt to direct victims to click a link or call a number to update an account or correct a purported problem. The links may appear to lead you to legitimate websites, but they won’t. Any personal information you share on them could be compromised.


If you are expecting a delivery, the major legitimate delivery service providers, such as UPS or FedEx, do not e-mail customers directly regarding scheduled deliveries. You must have an existing account for this type of communication. Nor will they state when a package has been intercepted or is being temporarily held. E-mails about these issues are phishing scams that can lead to personal information breaches and financial losses. Do not respond to requests for personal information.

Be wary of buying products through classified ads on auction websites. Internet criminals post classified ads, often on auction sites, for products they do not have. They make the scam work by using stolen credit cards. Fraudsters receive your order, and then charge your credit card for the amount of the order. But they use a separate, stolen credit card for the actual purchase. They pocket the purchase price obtained from your credit card, and have the merchant ship the item directly to you. Consequently, an item purchased from an online auction but received directly from the merchant is a strong indication of fraud. Victims of such a scam not only lose the money paid to the fraudster, but may be liable for receiving stolen goods.

When purchasing from an auction site, carefully check the seller’s rating and feedback, along with their number of sales and the dates on which feedback was posted. Be wary of a seller with 100 percent positive feedback, with a low total number of feedback postings, or with all feedback posted around the same date and time.

Fraudsters will also offer reduced or free shipping to auction site customers. As for product delivery, fraudsters posing as legitimate delivery services offer reduced or free shipping to customers through auction sites. They operate their scam by providing fake shipping labels to the victim. The fraudsters do not pay for delivery of the packages. The delivery service providers, therefore, intercept the packages for nonpayment. The victim loses the money paid for the purchase of the product.


It’s safest to purchase gift cards directly from merchants rather than through auction sites or classified ads. If the merchant discovers the card you received from another source was initially fraudulently obtained, the card will be deactivated.

 

If you have received a suspicious e-mail, file a complaint with the Internet Crime Complaint Center: www.ic3.gov.

For more information on e-scams, visit the FBI’s E-Scams and Warnings webpage: www.fbi.gov/scams-safety/e-scams.

Stressed Out? Trauma-gen is a Helpful Remedy

As a private investigator, I have to deal with the unpredictable daily. My job is highly stressful and too often dangerous. When doing surveillance I must be hyper-vigilant and alert, not knowing what is coming next in volatile, possibly violent situations. I have had to experiment and learn ways to help me process the constant, prolonged stress I experience. In addition to physical exercise, proper diet, one product that helps me immensely to maintain calmness is Trauma-gen, a homeopathic remedy by Seroyal/Genestra.

Trauma-gen
Trauma-gen

Trauma-gen acts as a nervous system relaxant and sedative. It can be used in any situation that results in emotional, psychological, surgical or physical shocks to the system. Trauma-Gen can also be used as an anti-inflammatory agent.

Stress leaves its marks on all of us. Daily life is full of hassles, deadlines, frustrations and demands. Chronic stress has become commonplace, ever present. In small doses, it can help you perform under pressure and do your best. But when you’re continually in emergency mode, your mind and body pay the price.

If you feel frazzled and overwhelmed most of the time, it’s really important to bring your nervous system back into balance. Recognize the signs and symptoms of stress and take steps to reduce its harmful effects. Long-term exposure to stress can lead to serious health problems. Chronic stress disrupts nearly every system in your body. It can raise blood pressure, suppress the immune system, increase the risk of heart attack and stroke, contribute to infertility, and speed up the aging process. Long-term stress can even rewire the brain, thus leaving you more vulnerable to anxiety and depression.

The body can’t distinguish between physical and psychological threats. For example, when you’re stressed over a busy schedule, an argument with a friend, a traffic jam, or unpaid bills, your body reacts the same as if you were facing a life or death situation. If you are faced with demanding responsibilities, your body’s emergency stress response may be “on” most of the time. The more your body’s stress system is activated, the easier it is to turn on, the harder it is to shut off.

Become aware of the stressors in your life. Experiment and find what helps you: whether meditation, exercise, reading, socializing, etc. And consider including Trauma-gen as part of your stress-reduction regimen.

You can buy Trauma-gen here.


Trauma-gen 15ml

Each 10 Drops (0.5ml) Contain:

Black Alder (Alnus glutinosa) Bud Extract (1:20)     8.3 mg

Black Currant (Ribes nigrum) Bud Extract (1:20)     8.3 mg

Hawthorn (Crataegus laevigata) Bud Extract (1:20)     8.3 mg

Adult: Take five drops twice a day, or as recommended by your health care practitioner.

Contraindications:Refer to product label for details.

Available as: 15ml bottle

Suitable for vegetarians and vegans.

Invert bottle and shake lightly allowing for drops to fall directly under the tongue or into 1/4 oz of water. To promote drop flow, invert bottle and shake before each use.