Wednesday, February 24, 2010

Perhaps your question can be answered if you review the EmailRevealer.com FAQ

Perhaps your question can be answered if you review the EmailRevealer.com FAQ

Q: Can you identify or locate an email if its an anonymous account like:
Hotmail.com , Gmail.com, Yahoo.com, AOL.com etc?


A:Yes. Even if it is a free anonymous email account EmailRevealer.com can still identify or locate the sender. Our investigators have been locating and identifying bail jumpers, run aways and prank telephone callers for years. Even before Email was in popular use. We have developed techniques to identify and locate people from very little identifying information.

Q: What if the information they used to open the account is fictitious?


A: We assume the information used to open the account is fictitious. We do not even look at that. Our investigation will return a report about the actual information of the actual sender of the email. Not the false information they entered when opening the account.

Q: Are your email tracing investigations limited to the USA or are you able to trace emails internationally?

A: Yes EmailRevealer.com can trace Emails that originate or terminate in other countries. We have conducted successful email investigations involving every continent around the world.

Q: I don't know how to obtain the headers. What do I do?


A:You can use the "How to obtain header information" instructions to obtain the headers but even if you can't just fill out the form and we will be in touch to help you obtain the headers. Many times we can obtain the headers for you.

Q: Your service says no hit no fee. Will my credit card be charged when I place the order?


A: Yes. You will be charged as you place the order. If we cannot obtain the information to return your report we will reverse the transaction.

Q: What exactly does "No Hit No Fee" mean ?


A: When a NO HIT/NO FEE DISCLOSURE is posted - that means exactly that should NO INFORMATION WHATSOEVER be able to be obtained on a SUBJECT - then NO FEE WILL BE CHARGED for the Search.

Q: I don't have all the information to completely fill out the order form. Can I fill it out partially?


A: You you can fill out the order forms with the information you know and we can attempt to locate the rest of the information for you. i.e.: Headers, SS# but this is not covered under a flat fee search and is not covered under the No Hit No Fee policy.

Q: Can I change or cancel my order once submitted?


A: Orders placed online are processed immediately. It is therefore impossible to cancel an online order once submitted and the credit card has been approved. You may need to place a new order with the right information. If your original order was placed for the wrong search and no information is found, you mostly likely won't be charged, however if you know the information or search was wrong, please contact us immediately by email at our email address.

Q: How will I receive the results of my search?


A: You will receive the results of your search by email unless you specified otherwise at the time you place the order. This has proven as the fastest and most convenient means of delivery for most clients. Please make sure we have your complete and correct email address. Without a working email address, we may be unable to deliver the results of your search promptly. Providing a working email address is the responsibility of the client.
If you prefer to receive the results of your search by fax or regular mail, please provide your fax number and/or send us a separate email with your invoice number in the subject line and complete mailing address.

Q: How soon will I receive the results?


A: Please review the "Estimated Turn Around Time" for each search. Most are completed and results delivered within 1 - 10 business days of receipt of order and payment unless otherwise noted. Results will be sent to you as soon as they become available. Please note that our "turn around" times are ESTIMATED based on an average of searches performed. Each investigation or search is unique and may require additional time. The turn around times are just an estimation and should not be construed as a "dead line" for your order to be completed.
The processing of all orders is as expedient as possible. Unfortunately, inquiring about the status of your order will not result in faster processing. We want to serve you as quickly as possible. The moment we have the information, we will email it to you.

Q: Can I get an update or progress report on my order.


A: Yes you can. If you have paid for Telephone or Email Consultations .The searches we offer online are for the most part a "flat fee" search. We offer them that way in order to save the client money. If you require updates or progress reports or other email or telephone consultations it is billed at $75 per hour. Please include the Order number for your Telephone or Email Consultations in the subject line of all correspondence so that your account can be billed accordingly.

Q: Are the searches confidential?


A: YES, Absolutely, Positively. All EmailRevealer.com searches are completely confidential. EmailRevealer.com will never make our clients' information available to a third party.

Q: Will the person I requested information about know that I am trying to find his/her information?


A: No, never. EmailRevealer.com never contacts the owners of phone numbers searched. The owner has no way of knowing about the search or who ordered it. The same holds true for any type of search we provide -- no one will know about your search unless you tell them yourself.


Q What is a trap line?

A. A trap line is a telephone number equipped with Call Capture or Automatic Number Identification (ANI).
While similar to Caller ID. A trap Line cannot be blocked using *67.

Q. How do I set up a trap line?

A. Simple
Step 1. You simply place an order at this link.Provide a number you want your incoming calls to "ring to" and an email where you want to receive email notifications of the incoming caller's unblocked telephone number.
You will receive an email with your trap line number.

Step 2. You forward your incoming calls to that number using a standard call forwarding feature provided by your carrier.

Step 3. Test your trap line. Call the incoming number that is receiving the harassing calls. Check to see if the phone rings at your ring to number. Check to see if you received an email notification of the incoming callers phone number..

Q. What about Caller ID spoofing? Will A trap line be able to detect the real caller information

A. There is no way to know for sure until the system is tested. There are hundreds of different methods used to spoof caller ID.

Q. Will an EmailRevealer.com trap line work on a cellular phone.

A. Yes.

Q. Can the number I forward to the trap line be the same number as the "ring to" number?

A. NO, these must be two different phone numbers. If you forward the incoming calls to the trap line then have them ring to the original number it will create an endless loop and the phone will never ring.

Q. Can I change the outgoing greeting ?

A. Yes for $10 per month extra.

Q. Can I get some consultation on the best way to use a trap line for my personal situation.

A. Yes for $75 an hour.

Q. How do I cancel my trap line rental.

A. You must give us 30 days notice to cancel. An email will suffice. Please be sure to put your order number in the subject line of all correspondence.

Q. Are there any hidden charges?

A. You will be billed 10 cents per minute for every incoming call. A deposit may be required.

Saturday, February 6, 2010

Six Digital Footprints We Accidentally Leave Behind

Marc and Angel Hack Life (View Profile)

We live in a world of constant connection where the products of our existence interrelate in such a way that we rarely leave a clean slate behind us. Many people fail to see the correlation between technological convenience and disruption of privacy. Even when nobody is watching, it is quite plausible that a computer somewhere is. The data tracks we leave behind are traceable, and when the dots are connected, the trail leads right back to us.

I have compiled a list of six digitally traceable tracks we unconsciously leave behind as we trek through our daily routines. I have also included a hypothetical example of how easy it can be to track someone down online by tracing their online affiliations and dabbling with the information that is found.

1. Username or Alias
While passwords are always private, usernames are generally available to the public. Many people use the same username on every single digital account they access. Likewise, many usernames also double as online aliases used for identity on various searchable social media sites, discussion forums, etc. This means that you can Google someone’s username, discover other Web sites where they’ve used it, and see if any of these other sites publicly associate an email address with the username. The email address can then be Google’d in an effort to uncover the real name of the individual who owns it. Another option would be to send the person a well-crafted email in hopes that that they will reply from an email client that includes their real name in the headers.

2. IP Address
When you connect to the Internet you are assigned a unique Internet Protocol (IP) address that allows your computer to communicate with others. Unless you use an anonymizing service such as Tor, or a free anonymous web proxy, your IP address is fairly easy to trace. Your IP address is logged by every web server you visit and associated with every email you send. There are numerous websites that offer free IP lookup services capable of telling someone the city, state and Internet service provider for any given IP address. How do you think the RIAA tracks down all those vicious (just kidding) fourteen-year-old peer-to-peer music pirates?

3. Mobile Phone Transmission
As you drive around town chatting on your mobile phone your signal is being handed off from one mobile phone tower to the next. Most urban areas have several towers serving the vicinity. If you are near at least three towers your exact whereabouts can be pinpointed to within a few hundred feet via a measurement process called triangulation. Your location can usually be measured within a mile or so even in rural areas lacking three available towers. Many large service providers make these capabilities widely known. Sprint/Nextel calls it “Mobile Locator.” Newer phones that include GPS capabilities can make the tracking process even easier.

4. Vehicle Telematics and GPS Monitoring
These systems are used for a variety of purposes including, but not limited to, stolen vehicle tracking, emergency collision notification, mechanical diagnostics reporting, and driver navigation assistance. General Motors’ OnStar service is one of the more mainstream examples of a vehicle telematics system. OnStar can instantly transmit detailed vehicle data back to their support center, including information about the mechanical condition and exact location of the vehicle. Advocates say vehicle telematics systems provide an essential driver security service. Critics say it’s a major privacy concern, comparing it to that of “Big Brother” tracking your every move. One thing is for sure, with vehicle telematics you’re leaving digital tracks everywhere you go.

5. Public Transit Cards
Most urban areas with public transit systems now rely on some form of passenger payment card to keep track of passenger fares. Each card is equipped with a data strip and serial number unique to that specific card. The transit computer systems use the serial number and data strip to keep track of the prepaid fare balance on each card. Frequent passengers typically recharge the dollar balance on their transit cards automatically via a credit card, thus tying the passenger’s full name and credit info to the unique serial number on their card. When a passenger swipes their transit card to board a public transportation vehicle the location and timestamp are recorded in the transit system’s computer database. Although access to these records is restricted, police often use them to tie criminals to the time and place of a crime.

6. Malware
Malware (also called spyware or adware) is a generalized term describing computer software programs that automatically download and install themselves onto your computer without your permission or knowledge. Much like a Trojan horse, malware can be hidden on malicious web pages or within other computer programs. A user is infected when they use the web page or infected application. The most common kind of malware will keep track of the Web sites you visit in order to target relevant pop-up ads to display on your computer as you browse the web. Many of these same malware applications will also send your web browsing habits back to the creators for statistical evaluation purposes. There are also more ruthless malware Trojans that record your keystrokes, steal your passwords, and even allow your computer to be remotely controlled by a computer cracker’s botnet. If you’re not using a decent anti-malware suite your computer could be silently spilling your every move to the bad guys.

BONUS: Tracking Someone Down Online
I thought it would be fun to give a brief example of how a complete stranger could track someone down using the seemingly innocuous data we all regularly leave behind online. I’m not suggesting that anyone should actually do this; it would be pretty darn creepy and stalker-like. The point here is not to create paranoia, but to instead spread awareness. Most people don’t realize how easy it is phish out pieces of information online and connect the dots. Consider the following hypothetical scenario:

You’ve been chatting online with someone via MySpace for a couple of weeks now. You decide you want to find out more about them. Without asking them any personal questions, you take the following steps:

You type their exact MySpace username/alias into Google. Google returns a variety of results including a series of posts on a discussion board forum. The discussion board has a user profile page that displays basic information on the user including the user’s email address.
You could now Google the email address, but instead you decide to run it though the Flickr Friends search tool. This tool will tell you if a Flickr account has been opened using a specific email address. Flickr is a popular photo sharing site. Lo and behold, an account exists that matches the email address.
You visit the user’s Flickr page which has various photo galleries of people at social gatherings. After awhile you find a photo tagged with captions from a first-person perspective. The caption clearly indicates which person in the photo owns the gallery, whom also happens to be the target you’re tracking down. Now you know what they look like. Hmmmm … interesting.
You create a free Gmail account with a username similar to one of the aliases found on either your target’s MySpace friends list or their Flickr contacts list. You craft a well written email to the target claiming to be the person whose alias you stole. The goal is to get the target to reply to your email. This email also contains an HTML embedded photo that you placed in a very obscure place on your public web server. You placed it in an obscure place so that no body else would accidentally find it.
Your target checks the email and believes that you probably are who you claim to be, so they happily reply. The email they send back to you has a “From:” header that includes their full name. In the process of checking the email they also opened/accessed the random embedded photo housed on your web server. You check your web server logs to see what IP address accessed the photo. (Note: You may also be able to get their IP address from the full headers in the reply email.)
You take their IP address and plug it into the WhatIsMyIP IP Lookup tool which returns the geographic location and city where their IP address originates.
So let’s recap. You started off knowing only a person’s online alias, but now you know their full name, city and location, email address, and you have their photo. Finding their physical street address at this point is a cakewalk. One could make the argument that not everyone is quite this easy to track down online. But you do have to wonder, how people actually are? I bet there are thousands of them … and I’m also pretty confident that you know a least a few of them personally.

Originally published on MarcandAngel

Internet Affairs

Dr. Roher Psychotherapy – Blog

Internet affairs have become a new way of reaching out to people outside one’s marriage for companionship, love and sex. In this article we discuss the differences between these affairs and real time affairs.

Internet infidelity is an issue of endemic proportions not only for the sheer number of people involved in them, but also because of the endless possibilities at one’s fingertips that cyberspace contacts offer.

I see the following as some of the main differences between cyberspace and real time affairs:

Anonymity. This encourages people to share more personal and intimate parts of themselves; to verbalize fantasies and wishes that might be more difficult to discuss with someone in real time, and to be bolder and more experimental with specific desires and interests.

Containment. Lack of physical and sexual contact online makes people feel less at risk of exposure. They don’t have to be afraid to be seen; they don’t have to worry about explaining to a partner where they spent the last few hours, or where they have been, and they don’t have to worry about safe sex. This feeling of safety is illusory and misplaced, however. 50% of people who meet on line progress to communicating with one another over the phone, and 31% end up having sex with one another at some point in the course of their relationship. Other people, however, prefer to maintain a virtual-only relationship, and resist meeting and getting to know each other in real life.

More room for fantasizing. Because the person at the other end of the screen is not a person in flesh and bones, she or can easily become an image onto whom all kinds of fantasies can be projected.
Unlimited pool from which to choose the person who meets one’s fancy and desires. This almost unlimited pool is available twenty four seven, across the globe.

Dissociation from reality. This element contributes to secrecy, compartmentalization and denial. All affairs, including those in real time, are kept somehow dissociated from reality. However, online affairs are even more so. A large proportion of people who engage in Internet infidelity do not even believe they are having affairs. This belief reduces their guilt and responsibility about what they are doing, and discourages them from stopping these behaviors.

Easier to begin intimate relationships. Fears of being rejected, of being inadequate, unattractive and socially awkward are greatly reduced in online affairs, due to the lack of physical contact, at least at the beginning.

Relationships become intimate much faster than real time ones, due to lowered inhibitions and ease of communication by text only, rather than face-to-face interactions.

Easier to end relationships, without awkward explanations, guilt and repercussions. The concept of “de-friendling” used in some social networks is an example of the ease with which people on line end relationships.

Because of all these characteristics, online affairs paradoxically tend to be deeper and more intimate and at the same time more superficial than real life ones. In internet intimate relationships, the sense of time is skewed; the normal progression from superficial to more intimate knowledge of each other is different, as couples can become very intimate right away, while in other areas they may continue to be total strangers to one another.

The biggest danger of online affairs is the illusion that what is happening is real, when in fact it is walled off from reality, and totally dissociated from it. These walled off experiences represent an altered reality that is often maintained isolated, unintegrated from the rest of one’s life and secret. Its presence prevents people involved in it to deal with the problems they face in real time relationships. Instead of addressing real life challenges, people retreat in opportunities and fantasies provided by access to the internet, maintaining two realities that don’t communicate nor interact with one another.