<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Private Investigations Blog</title>
	<atom:link href="http://gseinvestigations.com/private-investigator/feed/" rel="self" type="application/rss+xml" />
	<link>http://gseinvestigations.com/private-investigator</link>
	<description>Private Investigator Information</description>
	<lastBuildDate>Thu, 20 Jul 2017 15:41:00 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0.1</generator>
		<item>
		<title>TECH SUPPORT SCAM</title>
		<link>http://gseinvestigations.com/private-investigator/164/fraud/tech-support-scam/</link>
		<comments>http://gseinvestigations.com/private-investigator/164/fraud/tech-support-scam/#comments</comments>
		<pubDate>Thu, 20 Jul 2017 15:41:00 +0000</pubDate>
		<dc:creator>Leonard Golino</dc:creator>
				<category><![CDATA[Fraud]]></category>

		<guid isPermaLink="false">http://gseinvestigations.com/private-investigator/?p=164</guid>
		<description><![CDATA[In a new version of tech support fraud, scammers will freeze your computer. A message will come on telling you your computer has been infected with malware. Then it will instruct you to call the number on the screen immediately. Sometimes it will be accompanied by a loud voice telling you to call the number. [...]]]></description>
			<content:encoded><![CDATA[<p>In a new version of tech support fraud, scammers will freeze your computer. A message will come on telling you your computer has been infected with malware. Then it will instruct you to call the number on the screen immediately. Sometimes it will be accompanied by a loud voice telling you to call the number.<br />
If you call the number, a technician will claim he is from Microsoft, Apple or some other company, and that they will diagnose the problem for free. Next they will inform you there is a problem, but that they can fix it on their end for a fee. The fees vary and can cost up to $250. They may even offer a protection service for about $25 to $100.00 a month.</p>
<p>What should you do if the message comes on your computer?</p>
<p>NEVER call the toll free number provided. DO NOT click on any of the pop up windows. Close the browser, or turn off your computer to get rid of the message.</p>
]]></content:encoded>
			<wfw:commentRss>http://gseinvestigations.com/private-investigator/164/fraud/tech-support-scam/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Clever Credit Card Scam</title>
		<link>http://gseinvestigations.com/private-investigator/159/private-investigator-news/clever-credit-card-scam/</link>
		<comments>http://gseinvestigations.com/private-investigator/159/private-investigator-news/clever-credit-card-scam/#comments</comments>
		<pubDate>Wed, 17 May 2017 19:10:18 +0000</pubDate>
		<dc:creator>Leonard Golino</dc:creator>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Investigation News]]></category>

		<guid isPermaLink="false">http://gseinvestigations.com/private-investigator/?p=159</guid>
		<description><![CDATA[Thief uses credit card info gained during delivery of flowers and wine to empty mark&#8217;s bank account? Be very careful out there!  Beware of people bearing gifts. The following is a recounting of the incident from a victim. &#8220;Last Wednesday I had a phone call late morning from Express Couriers to ask if I was [...]]]></description>
			<content:encoded><![CDATA[<p><strong>Thief uses credit card info gained during delivery of flowers and wine to empty mark&#8217;s bank account?</strong></p>
<p>Be very careful out there!  Beware of people bearing gifts. The following is a recounting of the incident from a victim.</p>
<p><img class="alignleft size-full wp-image-160" title="aa" style="margin-right:20px;" src="http://gseinvestigations.com/private-investigator/wp-content/uploads/2017/05/aa.jpg" alt="" width="246" height="164" />&#8220;Last Wednesday I had a phone call late morning from Express Couriers to ask if I was going to be home as he had a delivery for me. He said he would there in roughly an hour. He turned up with a beautiful basket of flowers and wine. I expressed my surprise as I wasn’t expecting anything like this and said I was intrigued to know who was sending me such a lovely gift. He said he was only delivering the gift and the card was being sent separately (the card has never arrived).</p>
<p>There was a consignment note with the gift.</p>
<p>He went on to explain that because the gift contained alcohol he has to charge the recipient $3.50 as proof that he has actually delivered to an adult, and not left it on a door step if the recipient is out, to be stolen or taken by children.</p>
<p>This seemed logical and I offered to get the cash. He then said that the company required the payment to be by Eftpos (short for Electronic Funds Transfer at Point of Sale) so he’s not handling cash and everything is properly accounted for.</p>
<p>Frank was there and got his credit card and ‘John’ swiped the card on this small mobile machine that also had a small screen upon which Frank entered in his pin number. A receipt was printed out and given to us.</p>
<p>Between last Thursday and Monday $4,000 was withdrawn from our credit account at ATM machines in the north shore area. It appears a dummy credit card was made using the details in the machine and of course, they had Frank’s pin number.</p>
<p>The Bank has stopped our cards and I’ve been to the Police this morning, where they confirmed that it is a definite scam and many households were hit during the first 3 days of October.</p>
<p>So PLEASE be wary of accepting a gift you’re not expecting especially if the card is not with it. We’ve all received gifts like this and would never dream that it could be such a despicable act.&#8221;</p>
<p>WARNING: Be wary of accepting any “surprise gift or package”, which you neither expected nor personally ordered, especially if it involves any kind of payment as a condition of receiving the gift or package. Also, never accept anything if you do not personally know and/or there is no proper identification of who the sender is.</p>
]]></content:encoded>
			<wfw:commentRss>http://gseinvestigations.com/private-investigator/159/private-investigator-news/clever-credit-card-scam/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Credit Card Skimming</title>
		<link>http://gseinvestigations.com/private-investigator/150/private-investigator-news/credit-card-skimming/</link>
		<comments>http://gseinvestigations.com/private-investigator/150/private-investigator-news/credit-card-skimming/#comments</comments>
		<pubDate>Tue, 21 Jun 2016 14:56:32 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Investigation News]]></category>

		<guid isPermaLink="false">http://gseinvestigations.com/private-investigator/?p=150</guid>
		<description><![CDATA[Credit card skimming is a type of credit card theft where thieves use a small device to steal your credit card information. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details in the cards magnetic strip. Most common locations skimmers are used: - ATM Machines [...]]]></description>
			<content:encoded><![CDATA[<p>Credit card skimming is a type of credit card theft where thieves use a small device to steal your credit card information. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details in the cards magnetic strip.</p>
<p>Most common locations skimmers are used:</p>
<p>- ATM Machines<br />
- Gas pumps<br />
- Retail stores<br />
- Restaurants</p>
<p><a href="http://gseinvestigations.com/private-investigator/wp-content/uploads/2017/03/card-skimming.pdf" target="_blank">Read the Full Article Here</a></p>
]]></content:encoded>
			<wfw:commentRss>http://gseinvestigations.com/private-investigator/150/private-investigator-news/credit-card-skimming/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Catfishing &#8211; Online Dating Scams</title>
		<link>http://gseinvestigations.com/private-investigator/145/private-investigator-news/catfishing-online-dating-scams/</link>
		<comments>http://gseinvestigations.com/private-investigator/145/private-investigator-news/catfishing-online-dating-scams/#comments</comments>
		<pubDate>Wed, 20 Jan 2016 14:49:39 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Investigation News]]></category>

		<guid isPermaLink="false">http://gseinvestigations.com/private-investigator/?p=145</guid>
		<description><![CDATA[Catfishing is setting up a false personal profile on a dating site or online social media for fraudulent or deceptive purposes. Motives for Catfishing: - Lonely and dupe others into having online relationships they would never have in real life. - Attention and sensation seekers who feed off the attention they receive from others and [...]]]></description>
			<content:encoded><![CDATA[<p>Catfishing is setting up a false personal profile on a dating site or online social media for fraudulent or deceptive purposes.</p>
<p>Motives for Catfishing:</p>
<p>- Lonely and dupe others into having online relationships they would never have in real life.<br />
- Attention and sensation seekers who feed off the attention they receive from others and care little about who they hurt in the process.</p>
<p><a href="http://gseinvestigations.com/private-investigator/wp-content/uploads/2017/03/catfishing.pdf" target="_self">Read the full Article Here</a></p>
]]></content:encoded>
			<wfw:commentRss>http://gseinvestigations.com/private-investigator/145/private-investigator-news/catfishing-online-dating-scams/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>AVOIDING IDENTITY THEFT</title>
		<link>http://gseinvestigations.com/private-investigator/139/private-investigator-news/avoiding-identity-theft/</link>
		<comments>http://gseinvestigations.com/private-investigator/139/private-investigator-news/avoiding-identity-theft/#comments</comments>
		<pubDate>Mon, 15 Jun 2015 14:09:00 +0000</pubDate>
		<dc:creator>Leonard Golino</dc:creator>
				<category><![CDATA[Investigation News]]></category>

		<guid isPermaLink="false">http://gseinvestigations.com/private-investigator/?p=139</guid>
		<description><![CDATA[Ways you can protect your identity: At home: Keep you financial records, social security and credit cards in a safe place. Shred papers that have your personal information. Take mail out of your mailbox as soon as possible. On the computer: Use passwords that are not easy to guess. Use numbers and symbols. Do not [...]]]></description>
			<content:encoded><![CDATA[<p><strong>Ways you can protect your identity:</strong></p>
<p><strong>At home:</strong> Keep you financial records, social security and credit cards in a safe place. Shred papers that have your personal information. Take mail out of your mailbox as soon as possible.</p>
<p><strong>On the computer:</strong> Use passwords that are not easy to guess. Use numbers and symbols. Do not respond to emails or other messages that ask for personal information. Do not put personal information on a public computer.</p>
<p><strong>In business:</strong> Do not give out personal information to someone who calls you on the phone.  Only give your social security number to someone you are sure is legit.</p>
<p>It is a good idea to check your bank, credit card statements and credit report frequently. There are companies like credit karma and credit genie that will let you check your credit as much as you like without affecting your credit score.</p>
]]></content:encoded>
			<wfw:commentRss>http://gseinvestigations.com/private-investigator/139/private-investigator-news/avoiding-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CHOICE PARENTING</title>
		<link>http://gseinvestigations.com/private-investigator/136/private-investigator-news/choice-parenting/</link>
		<comments>http://gseinvestigations.com/private-investigator/136/private-investigator-news/choice-parenting/#comments</comments>
		<pubDate>Thu, 15 Jan 2015 14:07:32 +0000</pubDate>
		<dc:creator>Leonard Golino</dc:creator>
				<category><![CDATA[Investigation News]]></category>

		<guid isPermaLink="false">http://gseinvestigations.com/private-investigator/?p=136</guid>
		<description><![CDATA[We are proud to announce that we have partnered with Choice Parenting, a childcare consulting service for expectant and new parents. Founded by Holly Flanders, she has a vision and passion for helping professional families find quality childcare. Choice Parenting helps parents who are expecting a baby and need to create a childcare plan for [...]]]></description>
			<content:encoded><![CDATA[<p>We are proud to announce that we have partnered with Choice Parenting, a childcare consulting service for expectant and new parents. Founded by Holly Flanders, she has a vision and passion for helping professional families find quality childcare.</p>
<p>Choice Parenting helps parents who are expecting a baby and need to create a childcare plan for their return to work. Helping to decide if daycare, nanny, nanny shares or au pairs are best suited for their families. She also offers how to search for or hire a nanny or nanny share on their own without an agency. In addition, Holly also offers childcare coaching sessions, childcare workshops, nanny training classes, nanny vetting and custom hourly services.</p>
<p>For more information on Holly and the services she offers, go to her website <a href="http://www.choice-parenting.com" target="_blank">www.choice-parenting.com</a></p>
]]></content:encoded>
			<wfw:commentRss>http://gseinvestigations.com/private-investigator/136/private-investigator-news/choice-parenting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CARLIE CRUSADE FOUNDATION</title>
		<link>http://gseinvestigations.com/private-investigator/129/private-investigator-news/carlie-crusade-foundation/</link>
		<comments>http://gseinvestigations.com/private-investigator/129/private-investigator-news/carlie-crusade-foundation/#comments</comments>
		<pubDate>Mon, 27 Jan 2014 05:06:12 +0000</pubDate>
		<dc:creator>Leonard Golino</dc:creator>
				<category><![CDATA[Investigation News]]></category>

		<guid isPermaLink="false">http://gseinvestigations.com/private-investigator/?p=129</guid>
		<description><![CDATA[Gold Shield Elite Investigations is proud to be in partnership with the Carlie Crusade Foundation. It is a not for profit organization located in Marlboro, N.Y. dedicated in memory of Carlie Brucia, a beautiful eleven year old Long Island girl, who was abducted , sexually assaulted and brutally murdered in Florida on February 1, 2004. [...]]]></description>
			<content:encoded><![CDATA[<p>Gold Shield Elite Investigations is proud to be in partnership with the Carlie Crusade Foundation. It is a not for profit organization located in Marlboro, N.Y. dedicated in memory of Carlie Brucia, a beautiful eleven year old Long Island girl, who was abducted , sexually assaulted and brutally murdered in Florida on February 1, 2004.</p>
<p>The program teaches children of all ages about abduction prevention, internet safety and self preservation. Over the past five years they have brought their workshops to over 75 schools in 7 counties in New York State. Anyone interested in learning more about this worthy foundation, or would like to make a donation, please go to their website at <a href="http://www.carliescrusade.org">www.carliescrusade.org</a> or call Dominick Magistro or Bob Fisch at 1-800-496-6720.</p>
]]></content:encoded>
			<wfw:commentRss>http://gseinvestigations.com/private-investigator/129/private-investigator-news/carlie-crusade-foundation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Telephone Collection Scam Related to Delinquent Payday Loans</title>
		<link>http://gseinvestigations.com/private-investigator/127/fraud/telephone-collection-scam-related-to-delinquent-payday-loans/</link>
		<comments>http://gseinvestigations.com/private-investigator/127/fraud/telephone-collection-scam-related-to-delinquent-payday-loans/#comments</comments>
		<pubDate>Thu, 26 Sep 2013 12:41:27 +0000</pubDate>
		<dc:creator>Leonard Golino</dc:creator>
				<category><![CDATA[Fraud]]></category>

		<guid isPermaLink="false">http://gseinvestigations.com/private-investigator/?p=127</guid>
		<description><![CDATA[12/01/2010—The IC3 receives a high volume of complaints from victims of payday loan telephone collection scams. In these scams, a caller claims that the victim is delinquent in a payday loan and must repay the loan to avoid legal consequences. The callers purport to be representatives of the FBI, Federal Legislative Department, various law firms, [...]]]></description>
			<content:encoded><![CDATA[<p dir="ltr">12/01/2010—The IC3 receives a high volume of complaints from victims of payday loan telephone collection scams. In these scams, a caller claims that the victim is delinquent in a payday loan and must repay the loan to avoid legal consequences. The callers purport to be representatives of the FBI, Federal Legislative Department, various law firms, or other legitimate-sounding agencies. They claim to be collecting debts for companies such as United Cash Advance, U.S. Cash Advance, U.S. Cash Net, and other Internet check cashing services.</p>
<p dir="ltr">One of the most insidious aspects of this scam is that the callers have accurate information about the victims, including Social Security numbers, dates of birth, addresses, employer information, bank account numbers, and names and telephone numbers of relatives and friends. The method by which the fraudsters obtained the personal information is unclear, but victims often relay that they had completed online applications for other loans or credit cards before the calls began.</p>
<p dir="ltr">The fraudsters relentlessly call the victim’s home, cell phone, and place of employment. They refuse to provide to the victims any details of the alleged payday loans and become abusive when questioned. The callers threaten victims with legal actions, arrests, and in some cases physical violence if they refuse to pay. In many cases, the callers even resort to harassment of the victim’s relatives, friends, and employers.</p>
<p dir="ltr">Some fraudsters instruct victims to fax a statement agreeing to pay a certain dollar amount, on a specific date, via prepaid visa card. The statement further declares that the victim would never dispute the debt.</p>
<p dir="ltr">These telephone calls are an attempt to obtain payment by instilling fear in the victims. Do not follow the instructions of the caller.</p>
<p dir="ltr">If you receive telephone calls such as these, you should:</p>
<ul>
<li dir="ltr">
<p dir="ltr">Contact your banking institutions;</p>
</li>
<li dir="ltr">
<p dir="ltr">Contact the three major credit bureaus and request an alert be put on your file;</p>
</li>
<li dir="ltr">
<p dir="ltr">Contact your local law enforcement agencies if you feel you are in immediate danger;</p>
</li>
</ul>
<p dir="ltr">File a complaint at <a href="http://www.ic3.gov/">www.IC3.gov</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://gseinvestigations.com/private-investigator/127/fraud/telephone-collection-scam-related-to-delinquent-payday-loans/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rental and Real Estate Scams</title>
		<link>http://gseinvestigations.com/private-investigator/123/fraud/rental-and-real-estate-scams/</link>
		<comments>http://gseinvestigations.com/private-investigator/123/fraud/rental-and-real-estate-scams/#comments</comments>
		<pubDate>Mon, 19 Aug 2013 12:39:07 +0000</pubDate>
		<dc:creator>Leonard Golino</dc:creator>
				<category><![CDATA[Fraud]]></category>

		<guid isPermaLink="false">http://gseinvestigations.com/private-investigator/?p=123</guid>
		<description><![CDATA[—Individuals need to be cautious when posting rental properties and real estate on-line. The IC3 continues to receive numerous complaints from individuals who have fallen victim to scams involving rentals of apartments and houses, as well as postings of real estate online. Rental scams occur when the victim has rental property advertised and is contacted [...]]]></description>
			<content:encoded><![CDATA[<p dir="ltr">—Individuals need to be cautious when posting rental properties and real estate on-line. The IC3 continues to receive numerous complaints from individuals who have fallen victim to scams involving rentals of apartments and houses, as well as postings of real estate online.</p>
<p dir="ltr">Rental scams occur when the victim has rental property advertised and is contacted by an interested party. Once the rental price is agreed-upon, the scammer forwards a check for the deposit on the rental property to the victim. The check is to cover housing expenses and is, either written in excess of the amount required, with the scammer asking for the remainder to be remitted back, or the check is written for the correct amount, but the scammer backs out of the rental agreement and asks for a refund. Since the banks do not usually place a hold on the funds, the victim has immediate access to them and believes the check has cleared. In the end, the check is found to be counterfeit and the victim is held responsible by the bank for all losses.</p>
<p dir="ltr">Another type of scam involves real estate that is posted via classified advertisement websites. The scammer duplicates postings from legitimate real estate websites and reposts these ads, after altering them. Often, the scammers use the broker’s real name to create a fake e-mail, which gives the fraud more legitimacy. When the victim sends an e-mail through the classified advertisement website inquiring about the home, they receive a response from someone claiming to be the owner. The “owner” claims he and his wife are currently on missionary work in a foreign country. Therefore, he needs someone to rent their home while they are away. If the victim is interested in renting the home, they are asked to send money to the owner in the foreign country.</p>
<p dir="ltr">If you have been a victim of Internet crime, please file a complaint at<a href="http://www.ic3.gov/">http://www.IC3.gov/</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://gseinvestigations.com/private-investigator/123/fraud/rental-and-real-estate-scams/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fraudulent Notification Deceives Consumers Out of Thousands of Dollars</title>
		<link>http://gseinvestigations.com/private-investigator/121/fraud/fraudulent-notification-deceives-consumers-out-of-thousands-of-dollars/</link>
		<comments>http://gseinvestigations.com/private-investigator/121/fraud/fraudulent-notification-deceives-consumers-out-of-thousands-of-dollars/#comments</comments>
		<pubDate>Mon, 22 Jul 2013 12:36:41 +0000</pubDate>
		<dc:creator>Leonard Golino</dc:creator>
				<category><![CDATA[Fraud]]></category>

		<guid isPermaLink="false">http://gseinvestigations.com/private-investigator/?p=121</guid>
		<description><![CDATA[—The IC3 continues to receive reports of letters and e-mails being distributed pursuant to prize sweepstakes or lottery schemes. These schemes use counterfeit checks that bear legitimate-looking logos of various financial institutions to fool victims into sending money to the fraudsters. Fraudsters tell victims they won a sweepstakes or lottery, but to receive a lump [...]]]></description>
			<content:encoded><![CDATA[<p dir="ltr">—The IC3 continues to receive reports of letters and e-mails being distributed pursuant to prize sweepstakes or lottery schemes. These schemes use counterfeit checks that bear legitimate-looking logos of various financial institutions to fool victims into sending money to the fraudsters.</p>
<p dir="ltr">Fraudsters tell victims they won a sweepstakes or lottery, but to receive a lump sum payout, they must pay the taxes and processing fees upfront. Fraudsters direct individuals to call a telephone number to initiate a letter of instructions. The letter alleges that the victim may elect to take an advance on the winnings to make the required upfront payment. The letter includes a check in the amount of the alleged taxes and fees, along with processing instructions. Ultimately, victims believe they are using the advance to make the required upfront payment, but in reality they are falling prey to the scheme.</p>
<p dir="ltr">The victim deposits the check into their own bank, which credits the account for the amount of the check before the check clears. The victim immediately withdraws the money and wires it to the fraudsters. Afterwards, the check proves to be counterfeit and the bank pulls the respective funds from the victim’s account, leaving the victim liable for the amount of the counterfeit check plus any additional fees the bank may charge.</p>
<p dir="ltr">Persons may fall victim to this scheme due to the allure of easy money and the apparent legitimacy of the check the fraudsters include in the letter of instruction. The alleged cash prizes and locations of the financial institutions vary.</p>
<p dir="ltr">Tips to avoid being scammed:</p>
<ul>
<li dir="ltr">
<p dir="ltr">A federal statute prohibits mailing lottery tickets, advertisements, or payments to purchase tickets in a foreign lottery.</p>
</li>
</ul>
<ul>
<li dir="ltr">
<p dir="ltr">Be leery if you do not remember entering a lottery or sweepstakes.</p>
</li>
</ul>
<ul>
<li dir="ltr">
<p dir="ltr">Beware of lotteries or sweepstakes that charge a fee prior to delivering your prize.</p>
</li>
</ul>
<ul>
<li dir="ltr">
<p dir="ltr">Be wary of demands to send additional money as a requirement to be eligible for future winnings.</p>
</li>
</ul>
<p>If you have been a victim of this type of scam or any other cyber crime, you can report it to the IC3 at <a href="http://www.ic3.gov/">www.IC3.gov</a>. The IC3 complaint database links complaints for potential referral to law enforcement for case consideration. Complaint information is also used to identify emerging trends and patterns to alert the public to new criminal schemes.</p>
]]></content:encoded>
			<wfw:commentRss>http://gseinvestigations.com/private-investigator/121/fraud/fraudulent-notification-deceives-consumers-out-of-thousands-of-dollars/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
