How to Verify Background Investigators are Legit

Marko . . . Of more use might be a release explaining how others are attempting to undermine or take advantage of this process. How is someone not in the process getting the names and contact information for applicants, what information are the trying to gather and to what purpose?

I know that many of us had information released during the hack. This could have included both contact information and PI dates which would allow someone to determine WHO might be up for an investigation. But, what are they doing with the information.