#VENGE A2V - Advocate Training
DEFALCATION METHODOLOGY
TEAM: Volunteer Analysts, Programmers & Advocates Formed a Collective DEDICATED To Eradicating Vulnerable Person Exploitation.
Volunteer programmers, research analysts & vulnerable person rights advocates focus on specific evidence relevant to elder financial exploitation, negligence, POA/financial document abuse, living trust/estate planning attorney chicanery, collusion, fiduciary defalcation, mandatory reporters who fail to report first hand elder abuse, Probate Court corruption, professional cronyism as well as premeditated exploitation, intentional negligence, facility, Civil Process and Model Rule ethics violations.
Financial exploitation often consists of embezzlement: the act of withholding assets for the purpose of conversion of such assets, by one or more persons to whom the assets were entrusted, either to be held, distributed per long-held intentions or to be used for specific purposes. Embezzlement is a type of financial fraud, e.g. 1) an estate planning lawyer, care provider or guardian/conservator might embezzle funds from bank or trust accounts of their vulnerable, dependent or cognitively impaired clients; 2) a financial advisor/firm embezzles funds of an elderly investors or a family member or trusted friend will embezzle funds from a bank account jointly held with their vulnerable victim.
Affiliated research TEAMs are both human as well as trained machines. This enables 24/7 lead-sourcing based on AI programming for our Analytic Gamut Projects. Any witness to potential fraud and exploitation events are; in essence, also TEAM members once they share their experience or observations. If your situationally aware of exploitation events in your community please leave leads in your region's online newspaper articles comment sections, social media & local blogs to alert the public of the Who, What, When, Where, Why and How of your witnessed account of white-collar fraud, exploitation, abuse and negligence circumstances specific to your city, county or state. You can post online comments & make crowd-sourced or geo-location reports anonymously.
Sherlock AI ™ data-curating, machine learning detectives periodically track and curate national news articles comment sections, social media, public safety forums, regional blogs and local online news editions via algorithm tracking for repeating patterns of vulnerable person (VP) or elder exploitation, abuse and negligence information.
Advocates Tracking Exploitation Events Use The Fiduciary Abuse, DEFALCATION Model(s)
D.E.F.A.L.C.A.T.I.O.N PROCESS
White-Collar Professional NETWORKS Operating In Concert DEFALCATION Model (partialy based on RICO Act):
D - Dependence
E - Exploitation/Embezzlement
F - Financial Control
A - Abuse/Authority Breech
L - Larceny/Loss
C - Collusion/Chicanery
A - Attorney Misconduct
T - Trust Betrayal
I - Isolation/Intimidation
O - Oppression
N - Negligence
-
DEFALCATION
- CONTACT US VIA EMAIL
View the Sherlock AI ™ Whitepaper: 24/7 Crowd-sourcing; AI Programming & Analytic Gamut Project.
EMAIL TO SUGGEST TRACKING IDEAS AND CONTENT FOR AI AGENT PROGRAMMING IN YOUR COMMUNITY.
F - Financial Control
A - Abuse/Authority Breech
L - Larceny/Loss
C - Collusion/Chicanery
A - Attorney Misconduct
T - Trust Betrayal
I - Isolation/Intimidation
O - Oppression
N - Negligence
-
DEFALCATION
- CONTACT US VIA EMAIL
View the Sherlock AI ™ Whitepaper: 24/7 Crowd-sourcing; AI Programming & Analytic Gamut Project.
EMAIL TO SUGGEST TRACKING IDEAS AND CONTENT FOR AI AGENT PROGRAMMING IN YOUR COMMUNITY.
L - Larceny/Loss
C - Collusion/Chicanery
A - Attorney Misconduct
T - Trust Betrayal
I - Isolation/Intimidation
O - Oppression
N - Negligence
-
DEFALCATION
- CONTACT US VIA EMAIL
View the Sherlock AI ™ Whitepaper: 24/7 Crowd-sourcing; AI Programming & Analytic Gamut Project.
EMAIL TO SUGGEST TRACKING IDEAS AND CONTENT FOR AI AGENT PROGRAMMING IN YOUR COMMUNITY.
A - Attorney Misconduct
T - Trust Betrayal
I - Isolation/Intimidation
O - Oppression
N - Negligence
-
DEFALCATION
- CONTACT US VIA EMAIL
View the Sherlock AI ™ Whitepaper: 24/7 Crowd-sourcing; AI Programming & Analytic Gamut Project.
EMAIL TO SUGGEST TRACKING IDEAS AND CONTENT FOR AI AGENT PROGRAMMING IN YOUR COMMUNITY.
I - Isolation/Intimidation
O - Oppression
N - Negligence
-
DEFALCATION
- CONTACT US VIA EMAIL
View the Sherlock AI ™ Whitepaper: 24/7 Crowd-sourcing; AI Programming & Analytic Gamut Project.
EMAIL TO SUGGEST TRACKING IDEAS AND CONTENT FOR AI AGENT PROGRAMMING IN YOUR COMMUNITY.
N - Negligence
-
DEFALCATION
- CONTACT US VIA EMAIL
View the Sherlock AI ™ Whitepaper: 24/7 Crowd-sourcing; AI Programming & Analytic Gamut Project.
EMAIL TO SUGGEST TRACKING IDEAS AND CONTENT FOR AI AGENT PROGRAMMING IN YOUR COMMUNITY.
View the Sherlock AI ™ Whitepaper: 24/7 Crowd-sourcing; AI Programming & Analytic Gamut Project.
REPEATING PATTERNS OF FIDUCIARY PREDATORS & WHITE-COLLAR CRIMINALS:
These persons are defined as predators and are either a single person acting alone or a group that works in concert to ruthlessly exploit vulnerable others trusted to their care.
The character of these persons are driven to repeated misrepresentation to obtain an advantage over their vulnerable prey, such as;
- Dubious tactics include manipulation of evolving estate documents, illicit financial & property transfers and dubious business transactions,
- these person are predators because they prey on elderly and vulnerable persons with physical and mental frailties,
- Typically these persons isolate their target victims from those whom can assist and inform these targets of manipulative, exploitive and criminal acts,
- Often these predators operate via collusion with others whom assist with or cover up crimes, such as; crony Attorneys, Court Evaluators, Doctors, Investment Advisors/Bankers, Real Estate Agents, Lenders.
- The types of collusion patterns by "crony" business alliances operating "in concert" (cronyism) are more common in rural and sparsely populated regions due to smaller number of professionals servicing the needs of elders and vulnerable person.
- These professionals are networked, established in the community and they assist one another with clandestine transactions and acts of concealment.
- Central to these activities is the vulnerable persons nefarious family member or friend whom gains a position of authority (often under false pretences or trickery) over the person needing assistance managing the financial assets, properties and/or health care & ADL needs.
These criminal, dark triad personality types consistently use misrepresentation to obtain an advantage over others whom are weaker, naive, overly trusting, gaslit, unduely influenced, intimidated, coerced or in denial. Predators often project, scapegoat and blameshift as a means to deceive and deflect their illicit & clandestine actions on to innocent persons.
Gain Fraud Awarness Through:
1) EDUCATION,
2) EVIDENCE-SHARING AND SUPPORT,
3) RESEARCH AND EVIDENCE CROSS-REFERENCING,
4) EXPOSURE OF WHITE-COLLAR CRIMINALS AND THIER REPEATING CRIME PATTERNS,
5) UNDERSTANDING FRAUD REWARDED IS FRAUD REPEATED,
6) EXPOSURE OF THE WHITE-COLLAR COLLUSION NETWORKS CONSISTING OF:
• DARK TRIAD PERSONALITY TYPES,
• PREDATORY CAREPROVIDERS,
• PREDATORY POWER OF ATTORNEYS/ATTRONEY IN FACT,
• PREDATORY ESTATE PLANNING ATTORNEYS,
• PREDATORY GUARDIANSHIP - STATE/BAR LICENSED PROBATE ATTORNEYS and SOCIAL WORKERS,
• PREDATORY PRIMARY CARE PHYSICIANS,
• PREDATORY NEUROCAPACITY EVALUATORS/PSHYCOLIGISTS,
• PREDATORY GUARDAINSHIP LICEANCED SOCIAL WORKS (LSW) & THIER COMPANYS,
• PREDATORY CONSERVATORS & THIER COMPANYS,
• PREDATORY COURT VISITOR LSW & THIER COMPANYS,
• PREDATORY HEALTH CARE WORKERS & PATIENT ADVOCATES,
• PREDATORY HOME HEALTH CARE WORKERS & THIER COMPANYS
• PREDATORY ELDER CARE FACILITIES,
• INTENTIONALLY BIASED COURT REPORTS, FRUADULENTLY CONCEALED DIAGNIOSIS IN PHYSICIAN DECLARATIONS AND COURT MOTIONS AND,
Matters that define the characteristics necessary to meet the court criteria for Undue Influence, exploitation, negligence and abuse.
WE ARE RESEARCHERS & VOLUNTEER VICTIMS TRACKING AND CROSS-REFERANCING ILLICET CONDUCT.
WE EMPLOY THE LATEST TECHNOLOGY IN UNISON WITH STATE & FEDERAL VULNERABLE PERSON ACTS & STATUTES.
WE CAN PROVIDE EDUCATIONAL RESOURCES, CONTACTS, ADVICE ON HOW TO SUBMIT COMPAINTS TO VARIOUS GOVERNMENT & LIKE-MINDED GRASS ROOT ORGANIZATIONS & MEDIA OUTLETS.
National Research Indicates: These types of white-collar criminals operating in collusion or "in concert" is typically more common in rural and sparsely populated regions due to smaller number of professionals servicing the needs of elders and vulnerable persons. These professionals are networked and therefore assist each other on a frequent basis.
They often require the assistance of a nefarious family member or the vulnerable persons “friend” whom often retains their assistance for the specific intent of exploiting the vulnerable persons financial assets, properties or health care & ADL needs. The larger the vulnerable persons value of assets or estate and the greater the person physical/mental impairments the greater risk the victim is for exploitation especially when a group of so called “trusted” individuals are operating in concert.
Other Intimidation Crimes Include:
- Extortion
- Blackmail
- Conspiracy
- Wire/Mail Fraud
- Fraudulent Concealment
- Embezzlement
- Money Laundering
- Theft
- Fraudulent Concealment
- Fraud in the Inducement
- Fraud in the Procurement
- Fraud in the Factum
Other Fraud Crimes Include:
Our non-government knowledge collective is volunteer and not funded. We operate on altruism business model understanding the elderly are at substantial risk and underserved by law enforcement and the Courts. We donate our time, knowledge, collective skill-sets and efforts to fill the expansive void that allows these white-collar crime rackets to consistently go unchecked since Courts, social services and law enforcement budgets and their ability to assist, in what they may view as merely civil matters, restricts their investigation and intervention. Moreover, since elder abuse & exploitation is a vital revenue stream to the vast underground economy of white-collar professionals, estate service attorneys, officers of the Probate Court, attorney funded State Bars, profit-driven Conservatorship/Guardianship enterprises, wealth management firms, geriatric care physicians, social worker evaluators, CPAs and many others feeding of vulnerable person estates. As a result many of these professionals are clandestinely adverse to the policing or elimination of such a lucrative practice and how elder exploitation serves to achieving there own financial interests.
If you Do Not Undestand Attorney Drafted Documents Always Ask Questions, Listen, Learn, So you Can Assist Those Whom Can't Help Themselves & Trust Your Gut Instincts.
VP TASKFORCE PROJECTS
AFFILIATES & ALLIANCES OF LIKE-MINDED, PASSIONATE GRASSROOT LEGISLATIVE MOVEMENTS, COURAGEOUS INVESTIGATIVE PUBLISHERS, RESEARCHERS, SOCIAL MEDIA EXPERTS, THERAPISTS, NURSES, PROGRAMMERS AS DEDICATED CORRUPTION FIGHTERS. WE ARE CITIZENS USING OUR EXPERTISE TO AID OUR FELLOW ELDERLY CITIZENS.
Adovocates Work and Data Share Information with Experential Experts in the Ever-expanding Network Of Grassroot Stakeholders and Government Agencies Dedicated to Securing The Rights and Protecting Those Whom Can't Protect Themselves.
139
MILLION IN ILLICET TRANSFERS
427
VULNERABLE PERSON VICTIMS
1150
WHITE COLLAR CRIMES
377
RESEARCH AND LITIGATION CASES
CPSN Co-Developer of VP Task Force™
Anayltic Researchers/Data-Journalists, Programmers, Elder Rights Advocates, Investigative Reporters and Grassroots ORganizations Dedicated to Eradicating Organized "White-Collar" Crime, Fraud, MALPRACTICE, CIVIL, ETHICAL, Unifrom Code, Federal Act, Statutory & Fiduciary Violations, Probate Court Cronyism and Elder exploitation crimes.
Elder abuse can happen to anyone. It affects people of every ethnic background, gender, and financial status.
Whenever possible leave comments online in civic governance forums, online news article comment sections and social media platforms if abuse, negligence and exploitation events happened to you, your family, friends; especially when related collusion patterns amougst professionals are effecting your communities healthcare facilities or courts.
This is recommended because advocates and machine-learning data currating agents crawl regional online newspaper articles, social media and local blogs seaching for the Who, What, When, Where, Why and How relevant to witnessed accounts of white-collar fraud, exploitation, abuse and negligence circumstances specific to your city, county or state.
VP TASK FORCE ™ PUBLIC SAFETY TOOLS & Whitepaper
Exposing Vulnerable Person Exploitation, White Collar Corruption and Collusion Networks.




ADVOCATE PROJECTS
Advocates are front line defenders against elder abuse.
Everyone has a role in preventing and combating elder abuse. We have tools and guidance that can help you effectively take action. See our Advocate Programs, Platforms & Projects
RESOURCES & ARTICLES
Nationwide Elder Abuse and White-Collar Crime Is Epidemic. When the two criminal patterns consistly occur together local Police, FBI/US Marshals and the District Courts should investigate ir intervene. They dont, chosing to incorrectly classify elder exploitation crimes as civil matters. However, the Government Office of Accotability, American Bar Association with Dept. of Justice's Elder Justice Iniative(EJI)are providing partnership grants and hope to work with stakeholders to combat what many victims, family and friends of the exploited beleive to be systemically entreched organized crimes.
- ELDER JUSTICE INIATIVE (EJI) RESOURCES
- FEATURED GUARDIANSHIP ABUSE ARTICLES
- GOLD BAR REPORTER ARTICLES
- NORTHWEST JOURNAL NEWS
Elder abuse is a complex issue that intersects with many disciplines. Free educational resources provided online by experts, local, State & national elder exploitation news articles are a good sources for trending indicia. Listed below are real events that exemplify the problem and how focused citizen collectives can be a substantial part of the solution.
-
Tracking & Profiling.
Tracking & Profiling.
-
Tracking & Profiling.
Tracking & Profiling.
-
Tracking & Profiling.
Tracking & Profiling.
-
Tracking & Profiling.
Tracking & Profiling.
-
Tracking & Profiling.
Tracking & Profiling.
-
Tracking & Profiling.
Tracking & Profiling.
-
Tracking & Profiling.
Tracking & Profiling.
-
Tracking & Profiling
Tracking & Profiling.
Predator Stories
PREDATORY PROBATE COURTS

Urgent Need For Probate Court Reform Legislation.
Tracking & Profiling Probate Cronyism.
ADVOCATES & EVIDENCE
EVIDENCE GATHERING DATA FEED-to-DATA MINING & PLATFORMS. REGIONAL Projects Currently TRACKING.
ADVOCATE & EVIDENCE DATA TAGGING PROJECT: WHITE-COLLAR CRIME #VENGE DATA FEED>to>DATA MINE TAGS REPOSITORY.
CROWDSOURCING
Regional Geospatial Platform
Unlimited "Geo Tacticle" Profile Submissions
Free Profile Setup Assitance
Relevant Threat Alerts & Educational Support
Level 1 & 2 Profile Access
Geospatial White-collar Crime Trendspotting
Research Reports
Public Safety Tools
Advocate Data Share Platform
Human Intelligence Gathering
Data Curating Access
Regional Repeating Pattern Reporting
Investigative Journalist Review & Publishing
Legislation Initiative Tracking
Group Advocacy & Legislation
Consultation & Support
MACHINE LEARNING
Artificial Intelligence Platform
Insight on which professionals to avoid and what profesionals to retain
Regional Evidence Sharing/Support
Resources on how to document, track & combat abuse, exploitation & fraud
Strategies based on patterns, evidence and perpetrators
Collusion patterns, violations and what opposing parties do not want you to know
COMBATING FRAUD & ABUSE.
HELP US, HELP THE HELPLESS
IN CASE OF AN EMERGENCY CALL 911, THEN CALL YOUR LOCAL APS.
Evidence@VENGE.org
CONTACT CEASE & VENGE TO ORGANIZE AN ELDER ABUSE "VICTIM ENFORCEMENT NETWORK GATHERING EVIDENCE" COLLECTIVE IN YOUR AREA.