Thursday, May 12, 2011

Can A Reverse Email Search Report Be Used As Evidence In Court?


If you are a victim of a cyber stalker or some kind of online fraud, deflation or harassment you may be considering using a reverse email search to identify the person behind the email address that you are having trouble with. One major factor to consider is whether or not you can use that report in a court of law. This is a very serious consideration and we will attempt to address that question in this article. Because there are many misconceptions about this topic. Some people mistakenly feel that the only evidence that could be used in court must be obtained through a subpoena on the ISP.


If you go online and search for a reverse email search most of the services you'll find are simply instant data base searches. These are instant searches that makes use of large data bases like Facebook users and MySpace users and people that use their email address to subscribe to online newsletters and such things. While this may be a nice simple first step in an investigation it is not evidence that can be used in court.


If you need to locate or identify a person from an email address and you are not able to use the subpoena process but you need a report that can be submitted to law enforcement or used in court your first step is a reverse email trace report. This is a thorough investigation into the real identity behind the email address. A private investigator will take he time to not only run the email through several different databases but also examine the headers, trace the IP address and also email the email with several pretexts to trick or trap the person into revealing their identity.


This kind of investigation will return a report in email format. In some cases this basic report can be turned over to law enforcement or used as an exhibit in lower courts such as small claims, TPO court or Family court appearances. But if you need something more that is available also.


The investigator can provide a report supported by a notarized affidavit of his findings outlining his investigation step by step and explaining exactly how he obtaining the identifying information on the email without a subpoena and without breaking the law.


This can be incredibly hard evidence, including an audio recording of the subject of the investigation identifying himself as the person behind the email.


So if anyone tells you that you can't use a reverse email trace report in court and can only use evidence obtained via subpoena they are simply misinformed.


Copyright (c) 2011 Opperman Investigations Inc








Ed Opperman is president of Opperman investigations. If you need a reverse email search to locate a con man, bail jumper, runaway or parental kidnapper please visit www.emailrevealer.com.


Article Source: http://EzineArticles.com/?expert=Ed_Opperman




Wednesday, May 11, 2011

How to Catch a Cheater With Modern Technology


This sad situation has been played time and time again in all kinds of families. A spouse suspects their spouse is cheating, they have that sickening feeling inside, but they have no solid proof and aren't sure how to get the proof they need.


You don't want to confront your spouse without any proof because you are afraid of confronting an innocent person, don't want the guilt associated with that, and don't want to start any unnecessary fights.


While the internet and other technology such as cell phones, pagers, blackberries make it easier than ever to cheat and easier than ever to be tempted, the silver lining of the cloud is that you can get proof that your spouse is cheating so you don't have to make false allegations or confront an innocent person.


If you are sick with stress that your spouse is cheating, it's time to find out the truth and remove all doubts for good.


With modern technology, there are several different ways you can catch your spouse cheating. You can pick which method you are most comfortable with.


There are online infidelity investigators to combat the rising problem of online cheaters and to help spouses catch their spouse cheating and to uncover the truth.


These investigators have all the modern technology that will remove any doubts or second guessing you may have.


It's time to put a stop to the stress, doubts, guilt, the confusion, sickening feeling, and get to the bottom of the situation. You don't deserve to live like this. You deserve to know exactly what's going on. If you are in the dark, it's your spouse making that decision for you.


But it's your life, and it's your decision to make on how you want to live it. Nobody else should make that decision for you, especially without you knowing it.


By providing an online investigator your spouses email, they can tell you if that email is registered with any of the thousands of dating sites out there in only 1-2 days.


By sending an online investigator your spouses cell phone, they can uncover all of the secrets, even deleted secrets, it may contain. You can see for yourself any deleted text messages, deleted pictures, deleted phone calls, phone call logs, and more.


With a computer forensic examination, you can see all secrets that your spouse has been keeping from you on the computer. You will be able to look at deleted emails from your spouse's lover, deleted pictures, deleted documents, and deleted files.


Just because your spouse deleted something, doesn't mean it's gone. It's still on your hard drive, you just need an investigator to uncover it all for you. After seeing everything on the computer that your spouse has deleted and tried to hide from you, you will know without any doubt whether you are being cheated on or not and who with. There will be no more secrets and you no longer have to worry about confronting your spouse without any proof.


Copyright (c) 2009 Ed Opperman


Tuesday, May 10, 2011

Retrieve Deleted Text From a BlackBerry to Get Answers


If you are married or in any type of long term relationship the question of whether your partner is loyal to you will most likely come up at some point. For many of us this question eats at us to the point that we look for many ways to determine if there are any grounds for our suspicions. Secrecy between partners is often a huge issue and can lead to false accusations and feelings of resentment and distrust. In most cases you can retrieve deleted text from someone's cell phone to get definite answers to this question.


The technology of forensic science has grown by leaps and bounds over recent years and it is now possible to retrieve deleted text messages and many other key pieces of information. In the past the technology was not available to do this, therefore once information was deleted it was simply gone with no way to recover it. Now, however, there are ways of retrieving large amounts of information from a cell phone even after it has been deleted. This type of forensic investigation can be performed on pretty much any cell phone including the newer BlackBerry devices which are so popular right now.


A forensic investigation on a BlackBerry or other cell phone can retrieve deleted text and so much more. For instance this type of investigation can recover things like who has been called, who calls have been received from, how long each call was, contact numbers that have been erased, text messages sent or received that have been erased and even deleted picture messages. In fact these investigations can often uncover almost anything that has been done with a particular device even after the information has been deleted.


Once you have made the decision to retrieve deleted text from your partner's cell phone it is important to leave this to the professionals. These forensic investigators are specially trained in the many ways of recovering this information without causing any damage to the device. In most cases this type of investigation is successful and completed within a relatively short amount of time, however time often depends on specific caseload of the investigator and the complexity of the particular device that the forensic investigation is being performed upon. In either case the information which is uncovered often makes it more than worth the wait because it gives individuals the much needed answers they are seeking.


Copyright (c) 2010 Ed Opperman








Ed Opperman is President of Opperman Investigations Inc. He is considered an expert in computer and cellular phone forensics.To learn more about how to recover deleted text messages and images please click here now:===> http://www.emailrevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman


Ed Opperman



EmailRevealer.com in the NEWS!


Monday, May 9, 2011

How To Catch Someone Reading Your Private Emails


If you think someone is spying on you and reading your private emails you're probably right. Most people get an uneasy feeling when they are being watched or get a gut instinct when something just isn't right. In this case it's an uneasy feeling that someone has access to your private email account and they are secretly spying on you and reading your emails.


There are many signs that your email account has been hacked. Maybe people in your life seem to know things about you that they could not possibly have knowledge of unless they have read your private email messages. maybe you went into your mail box and found mails marked read that you haven't read yet. Or perhaps messages you have read are marked unread. Or items have been moved to or from your spam folder or recently deleted mail section.


Any kind of unusual activity or traces of activity that arouse your gut instinct that something is just wrong. If you feel this you have to trust your instincts and rely on that gut feeling. Hasn't it always been right in the past?


You have to be careful who you consult with about investigating a hacked email account. Friends and family may just tell you you're being paranoid or they may actually be the person that has somehow gained access to you emails. They may be the ones spying on you. You have to consult with a professional that has experience in this kind of investigation. Find a professional investigator familiar with the Internet and computer hard drive forensics. Find one that actually specializes in computer and email security investigations.


A private investigator that specializes in Internet investigations, email tracing and computer hard drive forensics will have the tools and software necessary to not only investigate and catch the stalker but also record and document their activity and reduce it to a report that can be used in court.


Most of all don't ignore the problem of a hacked email account. It's not going to just go away because you ignore it and bury your head in the sand. In fact this kind of stalking behavior can escalate if gone unchallenged. If a person is obsessed enough to go to the trouble to hack into your email account just to spy on you there is no way of knowing how unstable they are and how far they can take their obsession.


Copyright (c) 2011 Opperman Investigations Inc


Saturday, May 7, 2011

Internet Affairs Destroy Marriages


Do you suspect someone you love is having an Internet affair? Whether they are on a dating site, swinger site, a social network like MySpace or Facebook you can find them. Even if they are using a secret email account to visit escort service sites or porn cam sites every detail can be revealed.


You may wonder how something like that is possible. After all isn't the world wide web considered the modern equivalent of the wild wild west ? Not really. In fact every single keystroke a person makes on their key board is digitally recorded and stored ion their computer hard drive.


A private investigator trained in digital forensics and Internet investigations can not online perform a forensic examination of the computer hard drive to reveal infidelity. They can do an online investigation from thousands of miles away that can uncover all of your spouses unfaithful activities.


They don't don't need to use any ilegal hacking or cracking methods or download any software to your computer. All they need is the email address of the person you suspect is cheating and they can crawl all of the online personal ad sites until they find that email registered with a membership. The exact same technique is used for porn sites, swinger sites, escort services and the rest mentioned above.


It's very simple and fast. You can have all your suspicions either confirmed or releaved in just a few hours and for less that the price of a fancy dinner out.


There are many Internet investigation companies that can offer these services but before you hire one be sure to Google them and see if they are recognized as an expert in the field of online infidelity investigations.








Ed Opperman , president of Opperman Investigations Inc His web site http://www.emailrevealer.com can locate secret email accounts and discover deceptive online activities like personal ad memberships, porn site memberships and escort service usage.


Article Source: http://EzineArticles.com/?expert=Ed_Opperman




Friday, May 6, 2011

Reverse Email Search Investigation Can Prove Violation of TPO Or Restraining Order


Sometimes when a person has a TRO or restraining order prohibiting a person from contacting you. That person will set up a fake email account and use that anonymous fake account to continue harassing you. They think they are in the clear and untraceable because they are not using their usual email address. But is actually possible to trace that anonymous email account right back to the sender using a reverse email search investigation. You can prove that the email was written and sent by the person the court has ordered cease all contact and communication with you. Even the most savvy computer geek that thinks he knows about proxy servers and anonymous emails can be can be traced and caught by these trained investigators.


This type of investigation into the author and origin of an email and the accompanying report you can submit to the court will be devastating evidence against the person that is violating the courts no contact order. Conversely if a person is accused of violating a TRO by sending anonymous emails this same type of investigation can produce evidence exonerating the accused, proving they did not or could not possibly sent the emails in question.


A reverse email investigation is conducted by private investigators that specialize in tracing emails back to the senders and producing reports that can be used in court. These investigators have years of experience in locating and identifying people from very little information. Long before email was even invented PIs have been experts at locating people. Now in the digital age every keystroke on a computer will leave a trail that can be traced right back to the senders computer.


A reverse email investigation can also be used to clear a defendant that is accused of violating a TRO and sending emails to a plaintiff. The same investigative techniques can be used to trace the email and through a forensic examination and comparison of the headers prove that the email could not possibly have been sent by a defendant.


If you are a litigant in a court case, TPO or otherwise and you intend to use an email as evidence you had better not walk into court empty handed. Today the courts are aware of email tracing and also email forging. So you had better bring in a report of a reverse email search investigation prepared by a qualified investigator.


Copyright (c) 2011 Opperman Investigations Inc








Ed Opperman is president of Opperman investigations. If you need a reverse email search to locate a con man, bail jumper, runaway or parental kidnapper please visit www.emailrevealer.com.


Article Source: http://EzineArticles.com/?expert=Ed_Opperman



Article Source: http://EzineArticles.com/6163155

Thursday, May 5, 2011

Can You Get Deleted Cell Phone Texts Messages Without A Subpoena or Court Order?


Copyright (c) 2011 Opperman Investigations Inc


If you have accidentally erased or deleted a text message from your cell phone it should be a very simple matter to contact your cell phone carrier and get a copy of that deleted text messages from your billing records. Right? Unfortunately it's not a simple process at all. Most cell phone carriers do not have that information available on your bill. You may be able to see the number that the text was sent to or received from but not the actual content of the text message. Other carriers will not even store the content of the message on their server and if they do it may only be for a few months. Now even if you get lucky and your carrier does save your messages and they do store them they still will not release the content of your own text messages to you unless you serve them with a court order or subpoena.


The only hope you may have to recover your own selected text messages is aa process called cell phone forensics. This is a procedure to forensically examine the internal memory and SIM card on your cellular device to extract and undelete the deleted text messages. This information will then be reduced to an easy to read report. It may seem like a big ordeal. After all you are only seeking to read your own text messages but unfortunately due to knew privacy laws passed in the last few years it's nearly impossible to get any cooperation from your carrier to help you get your texts back.


In fact most times when you call the customer service dept or visit the store where you purchases your phone the representative will have no clue at all about cellular forensics and will tell you it's impossible to recover deleted text messages. They will say that once it's deleted it's gone forever. This is simply untrue. Other well meaning sales people might refer you to a SIM card reader. But unfortunately many phones do not store the texts on the SIM and if they do it is only a very small portion of the data available from a cell phone data recover process.


The procedure to have your deleted texts recovered is quite simple and inexpensive. You simply need to locate a reputable private investigator or data recovery specialist. You send them your cell phone and they will perform the forensic examination and data recovery. Your phone is returned unaltered and undamaged., You will receive a report that will contain all the data recovered from the phone. This can be much more than just the deleted texts. If can also be pics, voice mails, videos, call logs and other deleted data.


Ed Opperman is President of Opperman Investigations Inc. He is considered an expert in computer and cellular phone forensics.To learn more about how to recover deleted text messages and images please click here now:===> http://www.emailrevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Wednesday, May 4, 2011

Is It Legal To Identify A Cyber Stalker With a Reverse Email Search Investigation?


As a private investigator that specializes in cyber stalking investigations and reverse email search investigations many times I'm asked if it is legal to trace an email back to the sender. I suppose this is because many people think the only way to identify the sender of an email is to hack or crack into their account or use some kind of password phishing technique. Honestly it's questions like those that make me wish clients would not assume so much and jump to wild conclusions.


A reverse email search investigation is perfectly legal. No laws are broken or even bent. Many time this kind of email trace can be accomplished with a simple data base search. The subject of the investigation has used the email before in an online transaction or profile and the email address has become available in a data base. There are many data bases of this type that are only available to licensed professionals, law enforcement and collection agencies.


Other times you can do an examination of the email headers and compare that information to known suspects in the case. Either obtaining an exact match or completely excluding that person as a suspect. You can continue this process until you narrow it down to the person you want.


Many times to can email the person and trick them into revealing who they are. You can do this is many ways that will nor arouse suspicion or adversely go out of your way to arouse their suspicion. This way they will turn around and try to investigate one of my pretext email accounts and fall into a clever trap that will ultimately reveal their identity. This type of pretext is very effective with the "computer savvy" type of cyber stalker that really believes they are untraceable on the Internet.


Another method would be to examine the headers and then trace the IP address back to the ISP, you can with subpoena the custodian of records of the ISP or if you have other resources or data bases you can often match that IP number to a name and address. Follow up investigation can attach that computer to an actual person.


The techniques mentioned above are all perfectly legal and only a fraction of the many tricks we investigators use to legally trace emails using reverse email search investigations to track down and identify cyber stalkers. In fact all of our information can be reduced to a report that can be used in court or for a police report.


Copyright (c) 2011 Opperman Investigations Inc








Ed Opperman is president of Opperman investigations. If you need a reverse email search to locate a con man, bail jumper, runaway or parental kidnapper please visit www.emailrevealer.com.


Article Source: http://EzineArticles.com/?expert=Ed_Opperman



Article Source: http://EzineArticles.com/6174395