The late Dr. Donald Cressey was the first to recognize the relationship between behavioral transgressions and the ability to rationalize. As a sociologist and criminologist, Cressey expressed his theory in what has become known as the fraud triangle. Of its three elements, opportunity, motivation and rationalization, according to Cressey organizations can only control opportunity. Though created to assist in the design of organizational internal controls, this model is useful in understanding the mind of the organizational malfeasant and the significance of his ability to rationalize. Cressey was quick to point out that even the best systems of internal control and forbearance cannot provide absolute safeguards against irregular activities perpetrated by insiders.

Anthony Cantanese, Ph.D. takes another view. With over thirty years in academia and study in the field of public planning and development he believes good people are not only capable of doing bad things intentionally but also because of their susceptibility to common human foibles. Cantanese cites five possible factors:


  1. Timing and the push toward deadlines. Urgency breeds mistakes because decision-makers sometimes value the importance of time more than outcomes;
  2. Distractions—the cause of most accidents and mishaps also influence our decision making. When we allow them, distractions divert our attention and energy;
  3. Bad information often leads to bad decisions. If our assumptions are inaccurate our ability to make good decisions is greatly diminished;
  4. Poor advice. Combining bad information with poor advice multiplies the probability of ruin; and
  5. “Satisfizing”.


According to Cantanese decision makers often make profound decisions not based on the best information available, but in the pursuit of outcomes that will satisfy the largest number of constituents. Thus, they opt to satisfize and in doing so compromise the inner voice of their conscience and sometimes even their personal ethics. Cantanese however does not minimize the role influencers. Influencers are usually insiders. They are often members of the decision maker’s inner circle. They are trusted and thus believed. When they create distractions and intentionally provide bad information, decision makers, inevitably make bad decisions.

Mistakes play a role as well. Consider the condition known as innumeracy—the unfamiliarity with mathematical concepts and methods. Even the brightest people suffer from this common malady. Unfortunately, innumeracy can lead to disastrous outcomes. The bias it fosters provide its victims a false sense of assurance when making decisions. To make the point, consider your understanding and appreciation of simple probability. In a randomly selected class of thirty students, what is the probability that two or more will share the same birthday?

While an approximate answer to this seemingly simple question may appear intuitively obvious, only the decision-maker who has exceptional intuition will likely answer correctly. Intuition is an expression of probability and reflects the current state of knowledge about the problem being worked. This sort of leader sees things others do not, that is; he demonstrates that unique creativity we sometimes call genius. What’s more, intuition is an attribute that is usually derived from life-long personal experiences and not necessarily from formal education. As such, incisive insight is a corresponding attribute that allows the prediction of events and the ability to visualize unexpected patterns, periodicity or structure amid apparent chaos. It is likely your intuitive answer of to the Birthday Paradox is surprisingly wrong.


Answer: The probability of at least two students with the same birthday in a group of 30 is a whopping 70%. In fact, we find that in a group of 23 students, the odds are better than 50% to find at least two with the same birthday. Here’s the formula:






The exclamation point means “factorial”. Factorials are defined as n*(n-1)*(n-2)… (3)(2)(1). For example, 6! = 6*5*4*3*2*1. In this example, n is the number of students.


Thus, if our initial presumptions are not accurate or contain imperfect data, the final conclusion we draw will likely be inaccurate. When innumeracy is combined with intentionally inaccurate information provided by members of the decision maker’s inner circle, doom is almost certain. The belief that all members of our chosen team, share a agenda is the bane of many fallen leaders.


Hollywood loves psychopaths. The movie Wolf of Wall Street is a prime example of this destructive disorder’s ability to entertain us. The story contains a little bit of everything; financial corruption, lack of impulse control, drugs, sex, money and unbridled greed. It’s also a rags-to-riches and back to rags story of a real-life New York stockbroker, Jordan Belfort, who broke the law to find his way to the top. But like any fairy tale, it had to end. In 1999, he pleaded guilty to fraud and related crimes in connection with stock-market manipulation and a host of SEC violations as part of a penny-stock pump and dump scheme. Belfort spent 22 months in prison as part of an agreement under which he gave testimony against numerous partners and subordinates. He subsequently published his memoir The Wolf of Wall Street in 2007, which was adapted into a film of the same name, which released in 2013.

Psychopathy is traditionally considered a personality disorder characterized by persistent antisocial behavior, impaired empathy and remorse, and bold, disinhibited, and egotistical behaviors and pursuits. Most significantly, psychopaths have no conscience. Most lack empathy and are immensely narcistic. They are both in love with themselves and the image of themselves which they have fabricated. They are desperate, incapable of love and compassion, and believe that you, me, this world, and our universe have been created for their pleasure and benefit. They recklessly careen through life as if there are no guardrails, smashing and destroying everything in their path. And while they know the difference between right and wrong, they simply don’t care.

However, in business it can be extremely difficult to distinguish between the new corporate genius and the psychopath. Without going so far as to physically harm others, workplace psychopaths are unburdened by the pangs of conscience that moderate the rest of us. As such, they can be found wherever power, status, or money is accessible. Apparently normal and almost always charming, their lack of empathy, shame, guilt, or remorse enable them to destroy anything or anyone, including the organizations that they seek to control or into which they are hired. They seek positions and organizations that appreciate skilled management and visionary leadership, and offer them financial opportunity and the fame otherwise unavailable or accessible by honest means.

Decreasing the ability to identify them and their insidious intentions, in advance of their hire, psychopaths often recruit organizational insiders. Usually in positions of authority, the insiders themselves often seek more power and influence. They frequently feel under-appreciated and undervalued. They almost always consider themselves smarter than the people that hired them and whom they report. Once identified, these insiders are targeted with enticements and rewards in exchange for switching their loyalties and compromising their integrity. When finally recruited, these agents then collude with their recruiter(s) to take control of the target organization and overthrow and/or eliminate the organization’s founders, owners and original management team.

To advance their plan, the newly hired and his or her colluders begin to undermine the leader(s) who hired them. Secretly scheming, they begin discrediting existing management and convincingly deflect any questions or criticism that comes their way. Unknowingly and to my ultimate disappointment, I have worked with and employed such people.

Here are some of the behaviors of which they engaged and I later discovered:

  • Lying about their past, military service, amount of education and people of influence they knew and considered personal friends;
  • Materially misrepresenting the quality and magnitude of their prior business accomplishments and successes;
  • Routinely claiming the accomplishments of others as theirs;
  • Insisting they should be promoted and if not, threating to resign and go to a competitor;
  • Altering and/or fabricating important documents, contracts, and corporate records; and
  • Making false promises and misleading statements.

So, what can be done to prevent the hiring and onboarding of such people? Here are just a few ideas:

  • Review organizational recruiting and screening procedures and ensure that only the best and most qualified applicants are offered employment and hired;
  • Ensure your organization’s mission, vision, values, policies and internal procedures and practices are up to date and properly aligned;
  • Listen to what your employees are saying or telling you about the behavior of coworkers;
  • Provide your employees access to an externally managed whistleblower hotline that enables them the ability to anonymously report suspicious and improper workplace behavior;
  • Investigate all suspicious behavior and irregularities, and to the extent possible, take decisive action when necessary, and finally
  • Set an example and be the best role model you can be.

Developing and contributing to an organizational culture which managers and employees are able to express concerns about their colleagues and superiors without fear of reprisal is essential and a benefit to everyone.

But sometimes, it is impossible to escape your Wolf of Wall Street. Under such circumstances, seeking the assistance of the authorities and/or litigation may be your only options.

If interested in learning more about this topic, reach out to me at Gene.Ferraro@ForensicPathways.com or call me at 303.816.1638.


As anyone in business knows, recovering organizational property issued to remote workers when they leave can be difficult and frustrating. Our clients report that the problem is growing and losses due to unreturned organizational property is mounting since the economy began to recover two years ago. Increasingly, former employees are not returning organizational property when then leave says the Wall Street Journal. “It growing problem of which no one seems to have a solution” says, Ron DeMember, the HR manager of the mid-size Midwest trucking outfit and client. As such, with great pleasure, I congratulate our Asset Recovery team and Investigations Manager, Don Johnson for their 100 percent recovery rate for 2018! “For the first time, since our inception three years ago, we have recovered every item we sought for our clients for twelve straight months”, says Johnson.

Well Don, congratulation to you and your team. Thank you! For more information about our asset recovery services call away or email Gene.Ferraro@ForensicPathways.com today.


A proper investigation requires a mixture of skill, experience, and patience. The fundamental rules: Be fair, thorough, and professional.

One after another, reports involving allegations of sexual misconduct continue to be made public. Many of these reports follow a similar scenario—a middle-aged, executive-level man allegedly uses his power and influence to target, and sometimes sexually assault, a person over whom he has power. When true, the events behind these stories can leave the victims and their families scarred and damaged for life. Given what’s at stake, many victims and their advocates have turned to Twitter to express solidarity and expose their alleged abusers, using the #MeToo hashtag. By now, the #MeToo movement has become a worldwide phenomenon, and its impact has put employers of every stripe on notice. In the United States, the federal government’s Equal Employment Opportunity Commission (EEOC) has been vocal on the topic. Recently, EEOC Commissioner Chai Feldblum publicly offered three overarching recommendations to employers attending an Ogletree Deakins Workplace Strategies conference: Change workplace culture; hold people accountable…

Go to https://sm.asisonline.org/ASIS%20Issue%20PDFs/SM0119_LR.pdf [see page 46 for full article]


The following is an excerpt from a forthcoming book by E.F. Ferraro entitled:

How to respond and recover when falsely accused of sexual assault or other serious misconduct in the new #MeToo world where men are guilty until proven innocent

The #MeToo movement (or sometimes simply referred to as the MeToo movement), with its many local and international alternatives, is widely acknowledged to be ground zero of the grassroots response against sexual harassment and sexual assault that shook the globe. #MeToo spread virally in October 2017 as a hashtag used on social media in an attempt to demonstrate the widespread prevalence of sexual assault and harassment, (especially in the workplace) and the solidarity of those who opposed it and supported its victims. The movement bloomed soon after sexual misconduct allegations against Harvey Weinstein, a successful American film producer became public.

Ms. Tarana Burke, an American social activist and community organizer, is credited for having first used the phrase “Me Too” as early as 2006 on the then trendy, social media platform, Myspace. The phrase was later popularized by Ms. Alyssa Milano, an actress using Twitter in 2017. Ms. Milano encouraged victims of sexual harassment to Tweet about it in order to “give people a sense of the magnitude of the problem”. Her campaign enjoyed quick publicity and success after supportive posts by high-profile Hollywood celebrities, including Gwyneth Paltrow, Ashley Judd, Jennifer Lawrence, and Uma Thurman which were then retweeted and retweeted.

Milano had Tweeted her first “Me Too” around noon on October 15, 2017, and by the end of the day it had been used more than 200,000 times. By the next day it had been retweeted more than 500,000 times. On Facebook, the hashtag was used by more than 4.7 million people in 12 million posts during the first 24 hours. Facebook later reported that 45 percent of users in the United States had a friend who had posted using the term.

Everyone mobilized. Less than a month later, Congress Woman, Jackie Speier proposed the Member and Employee Training and Oversight on Congress Act (shortened to read, the ME TOO Congress Act). The full language of the bipartisan bill was revealed by the House on January 18, 2018 as an amendment to the Congressional Accountability Act of 1995. The purpose of the bill is to change how the legislative branch of the U.S. federal government treats sexual harassment complaints. Under the old system, complaints regarding the legislative branch were channeled through the Office of Compliance, which required complete confidentially through the process and took months of counseling and mediation before a complaint could actually be filed. Any settlement payments were paid using federal taxes, and it was reported that within a decade, $15 million of tax money had been spent settling harassment and discrimination complaints. The bill would ensure future complaints could only take up to 180 days to be filed. The bill would also allow the staffers to transfer to a different department or otherwise work away from the presence of the alleged harasser without losing their jobs if they requested it. The bill would require Representatives and Senators to pay for their own harassment settlements. The Office of Compliance would no longer be allowed to keep settlements secret, and would be required to publicly publish the settlement amounts and the associated employing offices. For the first time, the same protections would also apply to unpaid workers, including pages, fellows and interns.  To the dismay of many, the bill has yet to become law.

As for Weinstein, following the sexual abuse allegations against him he was dismissed from his company and expelled from the Academy of Motion Picture Arts and Sciences within weeks of Milano’s first Tweet. By October 31, over 80 women had made allegations against him. His “dirty little secret” had been exposed. The allegations against Weinstein sparked hundreds of sexual abuse allegations and the termination of powerful men around the globe. In memoriam, the phenomena has been called the Weinstein effect.

On May 25, 2018, Weinstein was arrested in New York, charged with rape and other criminal offenses, and released on bail. As of the date of this writing, he is awaiting trial. For someone who apparently thought a job interview includes stuffing his penis in the mouth of a female applicant, a stiff stint (no pun intended) in a creepy prison surrounded by angry and sexually frustrated men seems rather lenient…


Recovering organizational property issued to remote workers when they leave can be difficult and frustrating. Our clients report that the problem is growing and losses due to unreturned organizational property is mounting. For more than three years ForensicPathways, Inc. has successfully offered a powerful and effective solution. Not only can ForensicPathways, Inc. locate and recover computers, cell phones, tools, vehicles and other valuable items which were issued but not returned, we can recover files, records, client lists, and any trade secrets or intellectual property that may be in the possession of a former employee. Our approach begins with identifying the former employee’s new email address, current residential address, any currently registered vehicles, and his or her new place of employment and job title. Without using threats or intimidating calls and emails we politely communicate with the former worker and request the property we seek be immediately returned at our expense. When necessary, we contact the individual’s current employer and request assistance. Generally, the first outreach is the individual’s current supervisor or manager. If he or she is not immediately responsive we escalate and contact the Director of HR and/or executive management via telephone and/or registered mail (or both) and demand immediate cooperation.

If that cooperation is still not provided, we will contact the new employer’s Security Director, Ethics and Compliance Officer, Chief Legal Officer, and/or CEO. In the most extreme cases we contact law enforcement and facilitate the filing of a crime report and Form 1099 MISC with the IRS. In addition to potential criminal prosecution for theft of physical property and trade secrets by the local authorities, the IRS may seek taxes and penalties for unreported income relative to the value of the property which was not returned and compounded interest on the taxes which the former employee surely did not pay.

Civil ligation is also an option. Potential defendants of course include the former employee, but may also include his new manager and employer. In such cases we not only assist in the recovery of the property sought, we assist our client recover economic damages from both the former employee and his or her new employer.

Don’t waste your organization’s time and resources chasing former employees to recover the value property which they have not returned. Contact us and we’ll eliminate that burden and get your stuff just as fast and economically as if it were our stuff. Our highly effective asset recovery services are just a call away or email Gene.Ferraro@ForensicPathways.com to learn more.


On September 8, 2018, the Bureau of Consumer Financial Protection (“Bureau”) issued an interim final rule updating two model disclosures to reflect changes made to the Fair Credit Reporting Act (FCRA) by recent legislation.

In May 2018, Congress passed the Economic Growth, Regulatory Relief, and Consumer Protection Act, which requires nationwide consumer reporting agencies to provide “national security freezes” free of charge to consumers. The “national security freeze” restricts prospective lenders from obtaining access to a consumer’s credit report, which makes it harder for identity thieves to open accounts in the consumer’s name.

The Economic Growth, Regulatory Relief, and Consumer Protection Act mandates that whenever the FCRA requires a consumer to receive either the Summary of Consumer Rights or the Summary of Consumer Identity Theft Rights, a notice regarding the new security freeze right also must be included (confused yet?). The Summary of Consumer Rights is a summary of rights to obtain and dispute information in consumer reports and to obtain credit scores. The Summary of Consumer Identity Theft Rights is a summary of rights of identity theft victims. The FCRA requires the Bureau to write model forms of these documents. Consumer reporting agencies and other entities can use the Bureau’s model forms or their own substantially similar forms.

The May 2018 legislation also extends from 90 days to one year the minimum time that nationwide consumer reporting agencies must include an initial fraud alert in a consumer’s file. A fraud alert informs a prospective lender that a consumer may have been a victim of identity theft and requires that the lender take steps to verify the identity of anyone seeking credit in the consumer’s name. Congress set an effective date of Sept. 21, 2018 for the security freeze right, the notice requirement, and the change in duration for initial fraud alerts.

To assist businesses in coming into compliance with the new law, the interim final rule issued today updates the Bureau’s model forms, incorporating the new required notice and the change to the minimum duration of initial fraud alerts. The interim final rule also takes steps to mitigate the impact of these changes on users of the model forms published by the Bureau in November 2012 by permitting various compliance alternatives.

The interim final rule invites comment on these and any other aspects of the Bureau’s model forms to inform any possible further rulemaking.


The interim final rule is available at: https://www.consumerfinance.gov/policy-compliance/rulemaking/final-rules/summaries-rights-under-fair-credit-reporting-act-regulation-v/


The revised Summary of Consumer Rights is at: https://files.consumerfinance.gov/f/documents/bcfp_consumer-rights-summary_2018-09.docx


The revised Summary of Consumer Rights in Spanish is at: https://files.consumerfinance.gov/f/documents/bcfp_consumer-rights-summary_2018-09_es.docx


The revised Summary of Consumer Identity Theft Rights is at: https://files.consumerfinance.gov/f/documents/bcfp_consumer-identity-theft-rights-summary_2018-09.docx


The revised Summary of Consumer Identity Theft Rights in Spanish is at: https://files.consumerfinance.gov/f/documents/bcfp_consumer-identity-theft-rights-summary_2018-09_es.docx  


The Bureau’s educational material for consumers on credit reports and credit scores is available at: https://www.consumerfinance.gov/consumer-tools/credit-reports-and-scores/.


President Donald Trump has received no shortage of publicity or scrutiny. But the news of former campaign chairman Paul Manafort being ordered to jail last month made headlines. A judge jailed Manafort after prosecutors claimed he attempted to tamper with the testimony of two potential witnesses in a criminal case he faces involving a Ukraine-related lobbying campaign. Manafort denies all charges and reports initially claimed that the witness tampering charges arose after he allegedly had a one minute and 26 second telephone conversation with a potential witness. But it has subsequently been revealed by a prosecutor in the case that Manafort had also used “foldering” to secretly communicate with potential witnesses.

During the resultant court hearing, as reported by Politico and Mother Jones, Greg Andres, an attorney from the office of special counsel Robert Mueller, alleged that Mr. Manafort had engaged in sharing an email account and its password with one or more or more witnesses involved in his case. CNN’s Marshall Cohen summarized on Twitter: “He made an email account and shared the password. He wrote messages but saved them as drafts, never sending actual emails. Other guys open the draft, read it, delete.” Attorneys representing Manafort vehemently deny any wrongdoing by their client.

The technique of using a draft email folder to share messages without transmitting them is apparently an old one. Long known to cyber-intelligence experts, foldering has been used by criminals, spies and cheating spouses for some time.

In the early 1980s, storing electronic files in “folders” went digital. According to research found on the web, a 1982 article in Byte Magazine, geeks “decided to create electronic counterparts to the physical objects in an office: paper, folders, file cabinets, mail boxes, and so on.” A decade later, a 1991 advertisement for Microsoft Mail 3.0 read, “There’s even click and drag foldering. Which gives you a better, more intuitive way to store and retrieve messages.”

According to Wall Street Journal contributor, Ken Zimmer, Kurt Opsahl, deputy executive director of the Electronic Frontier Foundation, told him, “While I’ve been following use of the technique for a long time, the Manafort case was the first time I noticed the specific term ‘foldering’ being used to describe it.” According to Opsahl, “the draft folder technique” or “dead-drop email,” method of secretly communicating is not new. For years, spies have used, “dead drops” (or “dead letter box”) to pass information to one another by covertly placing material at a secret location known only to their counterpart. Few spy movies don’t include at least one scene involving a spy making a “drop”.

So, it appears, foldering is just a cyber adaptation using nothing more than an electronic drop. Too bad for Manafort, the dead drop he used was on a computer that fell into the hands of his prosecutor. If true, all that can be said is, “better luck next time, chap”.


ASIS International (formerly the American Society of Industrial Security), the world’s largest association for security management professionals, today announced it will develop an Active Assailant Supplement to its existing ANSI/ASIS/SHRM Workplace Violence Prevention and Intervention Standard (WPVI). With the addition of this supplement, security professionals will have an enhanced standard for practical methods to develop an effective approach to prevention, intervention, and response to an active assailant—either acting alone or in a group.

“Workplace violence is one of the most significant security and personnel safety challenges facing organizations today,” said Gene Ferraro, CPP, PCI, SPHR, SHRM-SCP, chair of the standard technical committee and chief executive, Forensic Pathways, Inc. “Of the many facets of workplace violence, active assailant is the most concerning, because it is the deadliest. Globally, in both the public and private sector, security professionals are searching for solutions. This standard will provide much needed direction and guidance.”

The supplement will include security design considerations, protocols, and response strategies, as well as procedures for detection, assessing vulnerabilities, and managing and neutralizing immediately life-threatening behavior perpetrated by an active assailant. While the original WPVI standard focused on prevention and intervention, the supplement addresses onsite response specific to an active assailant or shooter event.

“As the leading association for security management professionals globally, ASIS International has the expertise and practical experience within its membership ranks to lead this effort,” said Michael Crane, CPP, co-chair of the technical committee. “By tapping into this expertise from across the public and private sector—as well as reaching out to key stakeholders across the security spectrum—we will deliver a standard that provides actionable information and guidance to effectively address these low probability, but high consequence, situations. Ultimately, proper preparation and planning will diminish casualties and save lives.”

Technical committee formation will take place in the coming weeks. Those interested in participating should contact standards@asisonline.org or reach out to me via email at: Gene.Ferraro@Probativity.com.


Mike LaCorte, First Vice President, World Association of Detectives

Edited and Reprinted with Permission

The new generation of social media and instant messaging users are creative innovators. Today, the young adaptors use an expansive set of abbreviations and text shorthand to communicate quickly and privately with one another. The ability to use instant messaging platforms and communicate efficiently with other individuals and/or groups of people has enabled the use of text shorthand to develop and flourish. Many of us know and maybe even occasionally use some of the common abbreviations, such as these:

LOL                 Laugh Out Loud

LYSM              Love You So Much

LMAO             Laughing My Ass Off

TBH                 To Be Honest

OMG               Oh My God

BTW                By The Way

BFF                 Best Friends Forever

IMHO             In My Honest Opinion

WTF                What The F**k

There are lesser known coded abbreviations that teens are commonly using to quickly communicate a message that may be monitored or intercepted. Understanding what these abbreviations mean and how they are used provide investigators (and parents) an insight into the mindset of their prey and children. Historical forms of instant messaging like ‘AOL Messenger’ were introduced many years ago. Among these, there was a common abbreviation used by those looking to meet others:

ASL                 Age, Sex, Location

This Acronym was predominantly used within chat rooms to enable users to reveal personal information within a group and enable other individuals to DM (Direct Message) the most suitable ASL user for a private chat. DM remains extremely popular. Common aps in use include WhatsApp, Facebook Messenger, Viber, Snapchat, Sling, WeChat, Twitter, and Instagram. Here are few of the more common abbreviations currently in use (those in bold are the most common):

2DAY              Today

4EAE               For ever and ever

ADN                Any day now

ADR                Address

AEAP              As early as possible

AFAIK             As far as I know

AFK                Away from keyboard

AF                   As F*** (Used as an addition to other words such as Sexy AF)

ALAP               As late as possible

ATM                At the moment

BFN                Bye for now

BOL                 Be on later

BRB                Be right back

BTW               By the way

CTN                Can’t talk now

CD9                 Code 9 – it means parents are around

DM                  Direct Message

DWBH             Don’t worry, be happy

F2F or FTF     Face to face

FWB                Friends with benefits

FYEO              For your eyes only

GAL                Get a life

GB                  Goodbye

GLHF              Good luck, have fun

GNOC             Get Naked on Cam

GTG                Got to go

GYPO             Get your pants off

HAK                Hugs and kisses

HAND             Have a nice day

HTH                Hope this helps / Happy to help

HW                  Homework

IDK                  I don’t know

IIRC                 If I remember correctly

IKR                  I know, right?

ILY / ILU          I love you

IM                    Instant message

IMHO              In my honest opinion / In my humble opinion

IMO                 In my opinion

IRL                  In real life

IWSN              I want sex now

IU2U                It’s up to you

IYKWIM          If you know what I mean

J4F                  Just for fun

J/K                   Just kidding

J/O                  Jerking off

JIC                  Just in case

JSYK              Just so you know

KFY                 Kiss for you

KOTL              Kiss On The Lips

KPC                Keeping parents clueless

L8                    Late

LMBO             Laughing my butt off

LMIRL            Let’s meet in real life

LMK                Let me know

LSR                 Loser

MOOS            Member Of The Opposite Sex

MOSS             Member(s) Of The Same Sex

MorF              Male or Female

MIRL           Meet in real life

MOS               Mom over shoulder

MPFB             My Personal F*** Buddy

NAGI              Not a good idea

NALOPKT      Not A Lot Of People Know That

NIFOC            Nude in front of computer

NM                  Never mind

NMU               Not much, you?

NP                   No problem

NTS                 Note to self

OIC                 Oh I see

OMG               Oh my God

ORLY              Oh, really?

OT                   Off topic

OTP                On the phone

P911                Parent alert

PAW                Parents are watching

PAL               Parents are listening

PCM                Please call me

PIR                  Parent in room

PLS or PLZ    Please

POS                Parent Over the Shoulder or Piece of Sh**

PPL                 People

PRON             porn

PTB                Please text back

QTC                Quick to cum

RAK                Random act of kindness

RL                   Real life

ROFL              Rolling on the floor laughing

RT                   Retweet

RUOK             Are you okay?

RU/18              Are You Over 18?

MorF               Are You Male OR Female?

RUH                Are You Horny?

S2R                 Send to Receive

SMH                Shaking my head

SorG               Straight or Gay

SOS                Someone over shoulder

SRSLY            Seriously

SSDD              Same stuff, different day

SWAK             Sealed with a kiss

SWYP             So, what’s your problem?

SYS                 See you soon

TBC                To be continued

TDTM             Talk dirty to me

TIME               Tears in my eyes

TMI                  Too much information

TMRW            Tomorrow

TTYL              Talk to you later       

TY or TU         Thank you

VSF                 Very sad face

WB                  Welcome back

WTF                What The F**k

WTH                What the heck/hell?

WTPA             Where the party at?

WUF                Where You From?

WYCM            Will You Call Me?

WYRN             What’s Your Real Name?

YGM               You’ve got mail

YOLO             You only live once

YW                  You’re welcome

zerg                 To gang up on someone


For an exhaustive list of chat acronyms and text shorthand go to http://www.netlingo.com/acronyms.php. BFN & TTYL IYKWIM…

The World Association of Detectives is a global alliance of investigators and security professionals. A Global Alliance of Investigators & Security Professionals. With origins dating back to 1921, W.A.D. is the longest established and largest association of its kind in the world. The World Association of Detectives was formed as a joint venture by the combined membership of the World Association of Detectives and the International Secret Service Association for the following purposes:

  • To promote and maintain the highest ethical practices in the profession of private investigator or security service;
  • To select for membership only those individuals whose personal and professional backgrounds and business affiliations have strictly observed the precepts of truth, accuracy and prudence;
  • To eliminate unreliable, incompetent and irresponsible members of the profession;
  • To foster and perpetuate a spirit of cooperation among its members and with all those engaged in law enforcement; and
  • To further and establish a mutual feeling of trust, goodwill and friendship among agencies throughout the world.