Showing posts with label ed opperman. Show all posts
Showing posts with label ed opperman. Show all posts

Thursday, February 7, 2013

How To Use A Reverse Email Search To Locate Someone

Are you in a situation where you are desperately trying to locate someone. It could be an estranged lover, a run away teenager or even a dangerous bail jumper. But you need to find this person ASAP and you have tried every trick known to man. One thing you may not have considered is a reverse email search. This is where you investigate an email address to locate and or identify the person behind that email address.

A private investigator trained in email tracing can use an email address to locate someone. Don't be confused about this. many times when you read up about email tracing you'll get instructions on examining email headers and tracing an IP address back to an ISP.That would only return general information about where an email was sent from. That';s not going to help you locate someone from an email address.

Also don't try to use a free or instant data base search to reverse email search your email address. That may only return a recent or past address or even fake information used when they opened up the email account. What you want is a reverse email search investigation. This kind of thorough investigation will not be free or instant but it will return information you can use to locate the person you're seeking.

Although this investigation will include an examination of available headers and even data base searches it will also include limited anonymous email contact with the suspect. This kind of contact is often described as pretexting. That's where you trick the subject of the investigation into revealing their location. A pretext can be as simple as asking where they are. But it can also be much more elaborate sting to pin point their exact location with the suspect realizing they're being traced.

If a subject is emailed and the email contains what's known as a web bug the sender can know general geographic information about the subject just by them opening the email. If they reply you'll get even more information. The investigator may also include a link inside the pretext email. Once the subject clicks on that link even more identifying information is revealed.

Remember a seasoned investigator has been locating and tracking people down long before email or the Internet came into popular usage. They have the skills to locate people with very little identifying information. Having contact information like an email address makes this kind of reverse email search investigation very easy.

The investigator may use a ruse of inserting personal contact information in the email. As the reader tries to check out that information they will find themselves falling into numerous traps that the investigator has set for them. This is often how an email address can be used to locate a runaway teenager or danger bail jumper.

Copyright (c) 2011 Opperman Investigations Inc
Ed Opperman is president of Opperman investigations. If you need a reverse email search to locate a con man, bail jumper, runaway or parental kidnapper please visit www.emailrevealer.com.
Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/5823969

Thursday, June 28, 2012

Can A Husband Or Wife Spy On Their Spouse's Emails?

Can A Husband Or Wife Spy On Their Spouse's Emails?

By Ed Opperman

Article Word Count:
409





If
you suspect your husband of infidelity you may be tempted to hack into
his email account in order to read his private emails. This could be a
huge mistake. Even if you suspect your man is cheating you do not have
a right to invade another persons privacy with email hacking. In fact
recently a husband who logged onto his wife's email account was
arrested and is now facing up to 5 years in prison.This man is
being charged with felony computer misuse, and faces up to five years
in prison after logging into the email account of now ex-wife on a
shared laptop using her password.So while it may be tempting to
try to do it yourself when investigating infidelity it's really
something that's best left up to the professionals. A professional
investigator will know what is and isn't legal when investigating
infidelity. Had this man consulted with a professional he could have
saved himself a great deal of time, money and aggravation.There
are many legal ways through digital forensics to obtain evidence of
infidelity. There are also methods to trace emails to online dating
sites and social networks that will return the evidence of infidelity
you are seeking. if a professional is investigating and obtaining this
evidence they will know how to carefully document their efforts and
maintain a chain of custody so that the evidence can be used in court.As
an investigator many times a client will contact me and ask me to get
their spouses email passwords or commit some other kind of crime. As a
professional it's up to me to explain what can and cannot be done
legally.Computer forensics, cell phone forensics, Internet
infidelity searches are just a few ways to legally recover evidence of
cheating spouse activity. But these are only a few of the things a
professional investigator can do for you to expose a cheating spouse.
Legally.It's so important to remember that every step taken in
any investigation must be done in complete compliance with all the
applicable laws. Before consulting with a private detective be sure to
ask if they have experience in this field of investigation. Be wary of
online web sites offering do it yourself spy gear and wire tapping
equipment. while it may be lawful for them to sell the devices it still
may be illegal for you to misuse the equipment to spy or your husband
or wife.

Ed Opperman is President of Opperman Investigations Inc. If you need help with a Computer Hard Drive Examination investigation visit http://www.emailrevealer.com


Article Source:
http://EzineArticles.com/?expert=Ed_Opperman

Wednesday, April 18, 2012

Cyber Stalking Laws Enacted in California to Put an End to Cyber Bullying

More innocent residents of California than ever before are experiencing the frightening situation of being harassed by a cyber-stalker. What makes this issue hard to deal with is it only happens more as the use of computer systems and the Internet from people partaking in these crimes rises higher. However, California cyber stalking laws have been put in place specifically for the protection of innocent victims that have been targeted by cyber stalkers.

If you or one of the members of your family is facing frustrations associated with cyber bullies, you may well find the laws listed under Penal Code Section 646.9 of the California cyber stalking laws to be very helpful. These are laws that are in addition to the ones you will find listed in the Civil Code Section 1708.7.

Penal Code Section 646.9G states that it is unlawful to carry out threats that are done verbally, in written form, or communicated electronically, such as with a cell phone or home computer system. This is one of the California cyber stalking laws that does not require a person to actually show proof that the person doing the cyber stalking has intentions of carrying out the specific threats they are sending. It simply protects victims that are receiving threats of harassment from others that are capable of carrying out the activities they have in fact threatened.

In the event the guilty party is given probation for the cyber stalking activities they have been a part of, one condition they may receive is to complete counseling. However, it is solely up to the court to actually impose this specific requirement.

The courts may also issue a restraining order against the defendant, which will ensure protection for the victim for up to ten full years, depending on the courts final decision. As per the California cyber stalking laws of this Penal Code, the time imposed on a restraining order is determined by different factors of the case. The key factor is the safety of the victim or family members that have been targeted in cyber stalking, the probability of the future posing further offenses, as well as the seriousness of the offense.

In the event that the offense is serious enough, or the problem has been ongoing even after prior convictions, time spent with The Department of Corrections may be warranted and imposed by the courts. If this is in fact the ruling for violations of the California cyber stalking laws stated in Penal Code Section 646.9, victims are to receive a 15 day prior notice of the defendant being released from the county jail or state prison system.

In the event you have been targeted by a cyber-stalker, it would be well worth your time to look into the specific California cyber stalking laws stated in this Penal Code, as there is quite a bit more valuable information that could be of great help to you.

Monday, October 31, 2011

Common Reasons Why People Recover Deleted Text Messages

There are many reasons why a person may have to send their cell phone to a cellular forensic consultant to retrieve deleted text messages. But it seems that there a few reasons that are the most common.

1. Infidelity Investigations Almost everyone is suspicious of their spouse or lover. They also suspect their partner is cheating on the,.They want to snoop in their spouses cell phone text messages but their partner deletes all the texts before they get the chance. Initially they want to read the texts but after finding out all the kinds of data that can be recovered and documented they want to see everything. Like location tracking reports, deleted pics, call logs and calendar, date book.

2. Criminal Defense A criminal defendant is accused of making text threats or violating a TPO and they need to document the exact content of the text messages they sent or received. Also drug conspiracy cases, or alibi evidence. Proving you were at one place when you are accused of being at another place.

3. Civil Litigation Today many contracts or business deals are negotiated over text messages and emails sent and received from mobile devices. A forensic examination can recover and document the exact language used in negotiations or agreement.

4. Clearing Your Name Often a client will be accused of inappropriate texting or sending inappropriate pictures. A forensic examination will recover the evidence to prove your innocence and clear your name.

5. Employee Misbehavior or Theft The owner of a business may need to check up on employee behavior or possible theft investigation, location tracking etc. A yearly check up on an employees phone can show who's working hard and who's stealing.

6 Teen Misbehavior Parents like to check up on their teens and see where they have been, who they are communicating with, possible drug, sex or alcohol abuse. Teens are especially likely to send and receive sexually explicit pictures. Remember an under age child receiving sexually explicit pics is still guilty of possessing child porn. A quarterly check up on a kid's phone can save a kids life.

7. Accidental Deletion Sometimes people accidentally deleted important information from their device and they desperately need to recover the deleted data. A forensic examination can recover important text or sentimental pics from a phone. Even if the screen is cracked or the phone is otherwise damaged.

If any of these reasons apply to you be sure to consult with a cellular forensic consultant to examine your phone in a professional manner.

Copyright (c) 2011 Opperman Investigations Inc

Ed Opperman is President of Opperman Investigations Inc. He is considered an expert in computer and cellular phone forensics.To learn more about how to recover deleted text messages and images please click here now:===> http://www.emailrevealer.com

Article Source: http://EzineArticles.com/?expert=Ed_Opperman


Article Source: http://EzineArticles.com/6448656

Saturday, October 29, 2011

How Do Police Investigate Cyber Bully Cases?

Have you ever wondered how police in real life trace emails and locate and identify cyber stalkers? Is it really like they show on those TV CSI cop shows? Unfortunately no, in real life there are many limitations on local police when it comes to locating and identifying cyber stalkers. On tv you'll see a high tech computer crimes lab full of expensive equipment and manned with dozens of officers. In reality a local police dept computer crimes unit may be as small as one officer and one computer.

Wen a victim of a cyber bully becomes concerned about their safety and well being they will usually turn to the local police dept. Once the local police take that compliant several things may happen. hey may choose not to investigate further thinking that it is not a serious enough threat to devote manpower and recourses to investigate further.

If they do deem it a serious threat they may assign your case to an investigator, perhaps in their computer crimes unit or maybe just an investigator that normally investigates harassment and stalking cases.If the crime crosses over state lines they may refer your case to a federal agency such as the FBI to investigate. depending on the nature of the threat and other factors.

But the typical response by any law enforcement is usually the same. They will investigate the incoming email threat by opening up the headers and obtaining the IP address from within the header. Then they will take that information and use a common tool like samspade.org or dnsstuff.com to run the IP address through a"whois" feature and discover what Internet Service Provider (ISP) is associated with IP Address or Internet Protocol Address.

At this stage of the investigation law enforcement has a huge advantage because they can take the documented threat or harassment in the form of an email and present it to a judge as probable cause to issue a search warrant. That warrant will be served upon the Custodian of Records of the ISP, They will be compelled to turn over detailed information about the billing, location and activity of that person or people associated with at IP Address.

The problem for law enforcement at this stage is proving who that actual person was physically at the keyboard at the time the alleged crime took place. The suspect can claim he was not there that day, that many people borrow the computer or that several people live at the address and they call share the computer. This is why it's so difficult for law enforcement to make arrests and prosecute these kids of cases without getting a confession from the suspect. Unfortunately it's not as high tech and quick as you see on TV crime shows where to police are able to use some type of computer program to instantly identify a person from an email or IP address.

Copyright (c) 2011 Opperman Investigations Inc

Ed Opperman is President of Opperman Investigations Inc.If you need help with a cyber stalking investigation visit http://www.emailrevealer.com

Article Source: http://EzineArticles.com/?expert=Ed_Opperman


Article Source: http://EzineArticles.com/6417876

Tuesday, October 25, 2011

Useful Email Tracing Tips



If you have been on the internet for any amount of time you probably receive many emails. It is the number one reason people use the internet. Normally you do not need to know where the email came from exactly, but you do want to know who sent it. Most people just check the sender email to make sure they know the email address that sent it and then they don't worry about it anymore.


However, there could be a time that you need to figure out exactly where an email came from. When this is the case you need to know how to trace email directly to the sender. There are a couple of different ways that you can do this. You just need to make sure that you choose the right method to get the information you need. So here are some ways that you can trace email back to the sender.


You can sign up with a website that offers this service. Normally there is a one time charge that will cost you some money. It isn't very expensive either.


If you would rather to it yourself you can. There are guides online that you can get a tutorial to help you figure out how to trace email. When you want to find an email address it is not hard to do but you will need some help the first time you try it. Once you have done it a few times you will find it easy. It doesn't matter why you need to trace email to the sender but you need to make sure you decide the best way for you to do it. Before you decide look into how to trace email. If you have never tried to find an email address before you will want to learn how to do it before you try.


Otherwise, you might end up messing up something on your computer unless you are a computer whiz.


If you don't want to sign up for this service or you are not comfortable doing it yourself you can always find a friend or family member to do it for you. It is important to understand how to trace email the right way before you attempt it. So come up with the best way to locate an email address. You will be glad you did when you are able to find the address that you are looking for.



Ed Opperman invites you to visit his dating service search website for all of your trace email online needs. They offer reverse email searches, online infidelity investigations, telephone investigations, and more. To learn how you can catch them cheating online please click here now: http://www.emailrevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman



Article Source: http://EzineArticles.com/833817

Monday, October 24, 2011

How Can I Trace an Email Address Back To The Sender?

By

I'm a private investigator and see this question asked online everyday. Usually some nice normal person going about their life has received a disturbing email. They do not recognize the sender and they want to identify exactly who the email sender is. The email could be something small like "I don't like the way you coach the little league team" or it could be something serious like "I'm sleeping with your husband". It could be defamatory accusation that was sent to you and CC'd to a hundred people you know or work with. So you can see the reasons for wanting to trace an email account vary greatly in subject and seriousness. That makes my job interesting.



Now usually when I see the question "How Can I Trace an Email?" the reply is a something along these lines: First you need to obtain the email headers by going into your email account and clicking on your settings. Then you need to get the IP address from the headers and run a trace on that to find the senders ISP.


Well that's great advice if you want to find out the senders Internet Service Provider but usually they want to find out who the heck says they're sleeping with their husband! My next problem with this advice is that it can return very misleading information. For instance when you are examining a header you will find the senders IP address but you will also find your own. In fact it appears the information in the header is somewhat reversed and it is incredible easy for a novice attempting to examine a header to wind up tracing their own IP address and not the senders.


When a person asks "How can I trace an Email" they really want to know how to identify the sender of the email. Many times the question is being answered by a computer expert more interested in technical IP#s and not a professional investigator interested in locating and identifying a real person. So to answer the question in the spirit of how it was asked is an entirely different answer. In fact I don't believe it could be answered in the average question and answer section of the average "How To" site.


The simple answer is to perform an reverse email search in various free online reverse email look up sites. If it's not there or it's obviously fictitious information then move on.


Next you can try to put the email address in the search engine and see if anything turns up there. If you have tried these methods and still need an answer you need to hire a professional at finding people and someone who specializes in email tracing and online investigations.


There are more and more professional investigators that have taken the time and expense to educate themselves of the subject and get the proper training to conduct this type of investigation. But you must beware of the online sleuth software scams that promise miraculous results. If you are going to hire a professional do your homework and due diligence. A professional email trace report can take weeks to complete. So you can't expect some online instant search to provide you the accurate information you require.



The author has over 10 years experience in tracking down and identifying cyber criminals. He has expanded and developed these internet tracing skills into the areas of catching cheating spouses online and locating runaway kids or dangerous bail jumpers with only an email address or screen name.


http://www.emailRevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman



Article Source: http://EzineArticles.com/1528818

Friday, October 7, 2011

Evidence Of Internet Porn Addiction in Child Custody Litigation

By



What do you do if you decide to divorce your husband due to his addiction to Internet pornography. He gets liberal visitation and now your children are being exposed to Internet porn but now completely out of your supervision?


This is a very common problem. You discover your spouse has an addiction to porn and extreme fetish porn at that. You make the difficult decision to leave him but now he has unsupervised visitation with the minor children and you fear the children are exposed to the perverted material.


According to one study, early exposure (under fourteen years of age) to pornography is related to greater involvement in deviant sexual practice, particularly rape. Slightly more than one-third of the child molesters and rapists in this study claimed to have at least occasionally been incited to commit an offense by exposure to pornography. Among the child molesters incited, the study reported that 53 percent of them deliberately used the stimuli of pornography as they prepared to offend.


The habitual consumption of pornography can result in a diminished satisfaction with mild forms of pornography and a correspondingly strong desire for more deviant and violent material.


In a study of convicted child molesters, 77 percent of those who molested boys and 87 percent of those who molested girls admitted to the habitual use of pornography in the commission of their crimes. Besides stimulating the perpetrator, pornography facilitates child molestation in several ways. For example, pedophiles use pornographic photos to demonstrate to their victims what they want them to do. They also use them to arouse a child or to lower a child's inhibitions and communicate to the unsuspecting child that a particular sexual activity is okay: "This person is enjoying it; so will you."


There is a solution. If you can demonstrate to the court conclusively that the parent has an addiction to Internet porn the court can make orders in relation to that threat that will protect your children from that exposure. They could order anything from no visits to supervised visits to orders prohibiting the mere presence of a computer in the home.


It is surprisingly easy to obtain evidence of Internet pornography and interest in extreme sexual fetishes. You can hire a private investigator that specializes in this very specific field of Internet investigation. What they do is take your husbands email address and locate that email on extreme fetish dating services, porn sites and escort service sites. Then your lawyer can subpoena the records of those sites to determine the level of the activity your husband is involved with on those perverted sites. The times could easily overlap with court ordered times of visitation. Dramatically demonstrating he is unfit to care for the children.


If you decide to hire an investigator for this kind os search be sure that they are considered an expert in online Internet and pornography investigations. Do a Google search to see if they are recognized as an expert in this field. If you want to go this route you want to be sure it's done right the first time.



Ed Opperman is president of Opperman Investigations Inc. He is considered an expert in online infidelity investigations. If you need help finding your husband's dating service ,porn sites or escort service membership visit www.emailrevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Monday, September 26, 2011

Can A Husband Or Wife Spy On Their Spouse's Emails?



If you suspect your husband of infidelity you may be tempted to hack into his email account in order to read his private emails. This could be a huge mistake. Even if you suspect your man is cheating you do not have a right to invade another persons privacy with email hacking. In fact recently a husband who logged onto his wife's email account was arrested and is now facing up to 5 years in prison.


This man is being charged with felony computer misuse, and faces up to five years in prison after logging into the email account of now ex-wife on a shared laptop using her password.


So while it may be tempting to try to do it yourself when investigating infidelity it's really something that's best left up to the professionals. A professional investigator will know what is and isn't legal when investigating infidelity. Had this man consulted with a professional he could have saved himself a great deal of time, money and aggravation.


There are many legal ways through digital forensics to obtain evidence of infidelity. There are also methods to trace emails to online dating sites and social networks that will return the evidence of infidelity you are seeking. if a professional is investigating and obtaining this evidence they will know how to carefully document their efforts and maintain a chain of custody so that the evidence can be used in court.


As an investigator many times a client will contact me and ask me to get their spouses email passwords or commit some other kind of crime. As a professional it's up to me to explain what can and cannot be done legally.


Computer forensics, cell phone forensics, Internet infidelity searches are just a few ways to legally recover evidence of cheating spouse activity. But these are only a few of the things a professional investigator can do for you to expose a cheating spouse. Legally.


It's so important to remember that every step taken in any investigation must be done in complete compliance with all the applicable laws. Before consulting with a private detective be sure to ask if they have experience in this field of investigation. Be wary of online web sites offering do it yourself spy gear and wire tapping equipment. while it may be lawful for them to sell the devices it still may be illegal for you to misuse the equipment to spy or your husband or wife.



Ed Opperman is President of Opperman Investigations Inc. If you need help with a Computer Hard Drive Examination investigation visit http://www.emailrevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Wednesday, September 21, 2011

Want to Retrieve Deleted Text From Cell Phones?





One very popular question among several men and women that believe their spouse or partner may be sneaking around under their nose and committing infidelity is 'can you retrieve deleted text messages'. There are numerous innocent victims of infidelity AND cheating partners that are committing this devastating act that truly believe there is absolutely no way of recovering any data off of a cellular device once an individual has taken the steps needed to remove it from the phone. Thanks to many of the advancements that have been made in high tech technology, there is a very beneficial service that is performed by experienced private investigators that can help individuals obtain the evidence that they need in order to confront their spouse of the heartbreaking acts they are involved in.


A cell phone forensic investigation is a unique service that makes it possible for investigators to retrieve deleted text messages, and a wide variety of other data that a cheating spouse or partner has removed from their phone in the hopes that the innocent partner would not find it. A list of some of the other pieces of data that can also be obtained would include the following:


> Videos
> SMS messages
> Sext Messages
> Address Book
> Detailed call records to include the duration and time of dialed and received phone calls
> Caller ID
> Pictures and graphics
> Email addresses
> Names and phone numbers of contacts
> Other data that has been deleted


When you need to catch cheating partners or a teen child that you believe is engaging in bullying, sexting, or even illegal drug use, the help you need is not far away. Cell phone forensic investigations is also a service that does not require a large amount of time to perform. All that is needed is to send the blackberry or cell phone that you think contains evidence that you need to confront your teenager or cheating partner, to an expert in the field of cell phone forensics. The entire process used to retrieve deleted text messages and other data only takes about 48 hours. After it has been completed you will be sent a disk that holds a report of detailed information concerning the evidence you have been waiting for.


There is simply no reason to continue stressing and worrying about the actions of your partner or child when there is a service available that allows highly trained professionals to retrieve deleted text, pics, videos, and other important information, in such a short amount of time.


Copyright (c) 2010 Ed Opperman



Ed Opperman invites you to visit his cyber investigation website for all of your search needs. He offers employment locate, internet infidelity investigations, email tracing, telephone investigations, and much more. To learn more about how to recover deleted texts and other useful information please click here now:===> http://www.emailrevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman










Thursday, September 15, 2011

Are You Being Betrayed nBy A Cheating Husband??



When you say your vows in your marriage ceremony to the one you want to spend the rest of your life with, you want and believe that both of you will keep your vows.


As humans, we all want companionship and a soul mate to share our life with.


The last person you would want to betray you is your very own spouse. They are the person who is supposed to love you the most, who made vows to you, and who you have a higher standard for than any random person on the street.


Unfortunately, though there has always been cheaters and always will be. And unfortunately as great as the internet is, it provides a constant temptation for someone who has cheating on their mind and easy access to find someone to cheat with.


Long ago, the only way to get proof of cheating would be if someone caught them and told you, one of the cheaters confessed to you, you caught them yourself, you listened in on one of their illicit phone conversations or you hired someone to follow them and take pictures of the cheaters.


Now, catching a cheater is easier than ever. You don't have to hire anyone to follow your spouse around and take pictures. They don't even have to confess, which if you don't have proof, you probably wouldn't want to confront them anyway and start a fight. With no kind of proof you have nothing to go on except "that feeling". And "that feeling" isn't proof.


Online infidelity investigators have all the technology you need to give you the proof so you can know once and for all if your spouse is cheating or not. You either just need to provide your spouses email to see if they are trolling on dating sites, cell phone to see if there's incriminating evidence there, even if it was deleted, or your computers hard drive to see what secrets were deleted to hide them from you.


With personal computer and laptops and cell phones, that makes it even easier to cheat and keep in contact with their lover. You may not even have access to these items and even if you do, your spouse could have deleted anything that shows their affair to keep it hidden from you. Everything they deleted can be uncovered.


You may not have even heard of online infidelity investigators before, but they exist and they can use their technology to tell you if "that feeling" you have was right or not.



Ed Opperman , president of Opperman Investigations Inc is an expert in Internet Infidelity Investigations and Computer and Cell Phone Forensics. If you need help with an infidelity investigation visit http://www.emailrevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Tuesday, September 13, 2011

Can Divorce Litigants Successfully Hide Financial Assets?



It is very common in divorce cases for one spouse to suspect the other of hiding money from the courts. A person will take a look at their spouses affidavit of financial condition and see right off the bat with just a glance that most of the assets are omitted from the report. This is actually very common and it's at this stage of the litigation that the party will retain a private investigator to run an asset search on their spouse to uncover hidden assets.


This type of report will routinely uncover hidden accounts, property, trusts and corporations. Once the investigator returns his asset search report the attorney can subpoena the financial institutions and get all the records of transactions to see exactly when, where and how funds have been siphoned off of the accounts.


But is it possible to completely hide assets? Even from a professional investigator experienced in asset search investigations? How about a forensic accountant? Can funds and accounts escape his expertise? The answer is both a yes and a no.


There are many places and many ways to stash away funds anonymously. You can create a corporation in a state such as NV where and use a nominee service to maintain the corporation. You're name will not appear in the public corporate records so there would be no public record connecting you to the funds kept in that corp.


You can store cash in a safe deposit box. Many of these are privately owned companies that keep no records of box ownerships.


Another method is offshore or overseas accounts. These types of accounts have come a long way since the old days of numbered Swiss accounts, there are accounts in the Caymans and even international debit and credit cards that can be used at any ATM, shop or restaurant that accepts regular American cards.


So while it may be possible to hide funds it is not possible to hide the source of the funds. The funds have to come from somewhere and have to go somewhere. There has to be a transaction of deposits and withdrawals. The first step to uncover these hidden transactions is an asset search investigation. Next step is a court ordered subpoena to obtain the transactions and the next step is a forensic accounting.


With enough time, money and investigative resources money cannot be successfully be hidden in any litigation.


Copyright (c) 2011 Opperman Investigations Inc



For assistance in performing an Asset Search Investigation contact Ed Opperman Pres of Opperman Investigations Inc through his web site http://www.emailrevealer.com/


Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Use Evidence Of A Gambling Addiction For Child Custody

By



Are you are in the process of custody litigation and need to prove that your ex has a severe gambling addiction? If so there are ways for you to obtain that evidence and present it in court in support of your custody case. you may know that they have a gambling addiction but the court will want solid proof and evidence, not just your accusations.In fact if you are making too many accusations and cannot back them up with proof it can work against you and bring your credibility into question.


When you are seeking joint or full custody or your child or children the court my order a professional to evaluate your situation. The evaluator will take many things into consideration including such factors as addiction. There are many different kinds of addictions, drugs, alcohol, sex, pornography and gambling. In this article we will examine gambling addiction and how private investigators can obtain evidence of a severe gambling addiction so that evidence can be used in your custody evaluation or litigation.


The court ordered custody evaluator will take addictions into consideration because of the adverse affects addicts have on children and stability in the home. If you can prove addiction you can win custody.


Today gambling addictions are worse than ever before because in 20011 we have literally hundreds on Internet gambling sites. Anyone with a severe gambling problem will have several accounts with online betting, sports book,card gaming and race book sites. So the fact that there are so many online sites that require you to register and sign in using an valid email address. Makes it a very simple investigation for an Internet investigator that is trained in tracing email address back to secret online gambling sites.


The Internet investigator will take the suspects name and email address search thousands of Internet gambling sites. Until he obtains a list of Internet gaming sites the suspect is associated with. Once the investigator returns a list of addresses that the suspects email has been registered with then it is a very simple matter for a divorce or custody attorney to subpoena the financial records of the gaming site. This will show how obsessed the person is with gambling and the amount of time, money and focus they are spending on their addiction.This kind of evidence will be very valuable in a custody litigation or court ordered evaluation.


Copyright (c) 2011 Opperman Investigations Inc



Ed Opperman is the Pres of Opperman Investigations Inc. If you have noticed signs of a gambling addiction and need proof of gambling addiction please feel free to visit his web site.>>>> http://www.emailrevealer.com/


Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Sunday, August 7, 2011

What is Reverse Email Search?




A reverse email search is a great way to get into contact with people that already want to contact you. When you use reverse search for email, you will find out where an email originated and this can help you to determine the source of an email. There are many reasons you may want to use this and it can be an invaluable business tool.



There are many sites online that claim to do a reverse email search for free, but if you want true results you will need a thorough search and this requires time and you will have to pay a small fee for this service. You will get much better results if you stay away from these free sites and go with a professional company that will not try to get you to buy other products.


If you are a business owner you may need to use reverse email address search to find out how to contact potential clients. If you are receiving many emails and you do not know how they are from, you can use reverse email search to discover who the sender is and then contact them directly to help you with the sales in your business. If they have already contacted you previously, chances are they are already interested in your product or service, and this may be a very easy sale.


A reverse email address search can help you in other situations also. If you are receiving threatening, or harassing emails, you may have a hard time figuring out who is harassing you, but reverse search for email will be able to identify the sender and then you can take the necessary steps to remedy the situation.


Getting an email from a sender you cannot identify can be a past problem, once you discover reverse email search, you will not have any problems. You will be able to figure out who is sending you these emails and put a stop to it. Fraudulent activity on the internet is a major problem and identities are stolen, and ruined everyday. When you take a proactive approach to your security you will be able to combat this growing problem.


Reverse email address search is a great way to find out who the sender of received emails is. If you are concerned about any email you have received you may want to use this service to find out who this is, and if they are committing a crime, you will be in control of the situation and you can take the steps to solve the problem.


Copyright (c) 2010 Ed Opperman



Ed Opperman is president of Opperman Investigations Inc. He is considered an expert in email tracing. If you need a reverse email search to identify a Craig's list stalker visit www.emailrevealer.com.


Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Sunday, July 31, 2011

Do You Need To Have Active Cellular Phone Service In Order To Get Deleted Text?


Many people believe that the only way they can recover and read their deleted text messages in though their telco service provider. But this is simply not true. As long as you have the phone in your hand you can submit it for a forensic examination to recover all the deleted information from the internal memory of the cell phone.


A forensic examination can recover a great deal of information that is stored on the internal memory of the cell phone. Deleted text messages, pics, call logs even location tracking information can be recovered from certain models of cellular phones. All of this can be accomplished without the phone service being turned on or even contacting the service provider in any way.


Any time you use your cell phone it creates a digital footprint in the memory of the device. Anything that is stored digitally and later deleted can be undeleted. As long as the unallocated space has not been overwritten by new data. So if you want to have deleted data recovered it's wise to stop using the device and ship it off to a qualified forensic lab for recovery.


Most people seeking this kind of information are completely unaware of the possibilities. They think the only way to obtain this information is to call their cell phone service provider. If the phone service has been shut off they think the data is gone forever. Unfortunately many well meany bloggers on the Internet will repeat this misinformation expounding on the urban legend.


Even worse is that very often if you contact the customer service dept of your cell phone provider they will also tell you it's impossible to recover deleted text messages. They may even tell you the only way to obtain such information such as call log records is with a court ordered subpoena. Even for your own information. But the fact is that all you need is the phone and a qualified forensic examiner to recover the deleted data and reduce that data to a report.


If you need to recover deleted data it's best to consult with a private investigator that is also a digital forensic consultant. These are the people with the experience to know what kind of a can be recovered by a forensic examination of the device and what kind of information has to be obtained from he cellular phone service provider.


Copyright (c) 2011 Opperman Investigations Inc


Ed Opperman is President of Opperman Investigations Inc. He is considered an expert in computer and cellular phone forensics.To learn more about how to recover deleted text messages and images please click here now:===> http://www.emailrevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Saturday, July 30, 2011

How to Catch an Email Stalker With A Reverse Email Search Investigation




Is it really possible to catch an email stalker? What if they use an anonymous email account like Hotmail or Yahoo? Is it still possible? What if they are really computer savvy? Is it still possible?The short answer is yes. An email stalker can be caught.



The first thing you must realize about an email stalker is that they want you to know who they are. They just don't want to get in trouble, so they think they can dance between the raindrops. Give enough clues to let you suspect them, throw in some false trails to follow and try to cover their tracks enough not to get caught and get in trouble. Whether it be civil or criminal liability depending on the severity of their activity.


So the typical email stalker will take steps to cover their tracks. They may use free anonymous accounts with fictitious information and even proxy servers or IP spoofing. But one thing they cannot hide is their obsessive compulsive antisocial behavior that causes them to stalk you in the first place. Make no mistake. A person that will go to lengths to create a fake email account and send you hate filled harassing emails is a potentially dangerous person. Their behavior should be taken seriously.
But that same dysfunctional behavior can be predicted and used to trap them into revealing their identity.


It goes back to the expression that if you give them enough rope they will hang themselves. This is especially true when it comes to email stalkers. In this type of situation a trained investigator experienced in tracking down and identifying cyber stalkers can use the predictable behavior of an obsessive stalker to set traps and trick the stalker into revealing themselves.


An expert email tracer will examine the headers, trace the IP's, compare header information to suspects, utilize pretexts and consult with inside sources and tipsters that they have developed and cultivated over years. They may, if they are truly an expert email tracer, have their own database of emails and the real names associated with them.


If you are a victim of an email stalker then the last thing you should do is ignore it and hope it goes away. You should consult with an expert. But before you do be sure to investigate the investigator. Be sure to do a Google search on the investigator and his web site to see if they are truly recognized an as expert email tracer.



Ed Opperman has over 15 years experience in tracking down and identifying cyber criminals. He has expanded and developed these internet tracing skills into the areas of catching cheating spouses online and locating runaway kids or dangerous bail jumpers with only an email address or screen name. http://www.EmailRevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Friday, July 29, 2011

EmailRevealer.com Launches Internet Gambling Addiction Investigation Service

Colorado Springs, Colorado July 29, 2011 -
A recent study revealed that in America, approximately 2.5 million adults suffer from compulsive gambling, about 3 million are considered problem gamblers, around 15 million adults are at risk of becoming problem gamblers.148 million fall under the low risk gambler category.

That's why EmailRevealer.com an Internet investigations service run by Ed Opperman of Opperman Investigations Inc has launched a custom designed investigative service aimed at obtaining evidence of Internet gambling addiction.

Retrieving evidence of an Internet gambling addiction, can prove to be beneficial when one is trying prove a parent is unfit in child custody litigation. However, due to legal restrictions and privacy laws, consumers are not generally able to access the membership lists of online gambling sites without a court ordered subpoena.. This is why Email Revealer’s new Internet Gambling Addiction Investigation can be helpful in child custody litigation.

According to Ed Opperman, the owner of EmailRevealer.com and the inventor of this new service, “This [Gambling Addiction Investigation] is an excellent legal method of obtaining evidence of a gambling addiction. So far we have had great sucess, much better than the dating Service Infidelity Investigation"

Opperman’s web site, EmailRevealer.com¸ describes Internet gambling investigation as being for people that have noticed signs of gambling addiction and suspect their partner is betting online with a secret online betting account.


"The way the search works is we take a suspected gamblers email address and use it to search all the online gambling web sites. We return a report of a list of sites the email is registered on " Says Opperman. "It's better than the dating site search because people use a real verified email address to gamble with because they want to get paid if they win"


Email Revealer’s email tracing services are not limited to gambling or infidelity, however. Alongside locating cheaters and gamblers, their Reverse Email Search Investigation services can locate or identify cyber stalkers or people engaged in Online defamation. It can also locate people like bail jumpers or run away teens.



About EmailRevealer.com

Email Revealer is an online investigation service that specializes in investigating extramarital activity. In addition to their computer and cell phone forensics services, Email Revealer provides personal ad investigations, porn and escort web site investigations, and dating service investigation. For more information on Email Revealer’s Gambling Addiction Search , visit http://www.emailrevealer.com/proddetail.php?prod=GamblingAddiction&cat=7


Contact:
Ed Opperman
Opperman Investigations Inc #211
1837 S. Nevada Ave
Colorado Springs CO 80905
702 897 0061

Email: EmailRevealer@aol.com
Website: http://www.emailrevealer.com

Common Reasons Why People Recover Deleted Text Messages



There are many reasons why a person may have to send their cell phone to a cellular forensic consultant to retrieve deleted text messages. But it seems that there a few reasons that are the most common.


1. Infidelity Investigations Almost everyone is suspicious of their spouse or lover. They also suspect their partner is cheating on the,.They want to snoop in their spouses cell phone text messages but their partner deletes all the texts before they get the chance. Initially they want to read the texts but after finding out all the kinds of data that can be recovered and documented they want to see everything. Like location tracking reports, deleted pics, call logs and calendar, date book.


2. Criminal Defense A criminal defendant is accused of making text threats or violating a TPO and they need to document the exact content of the text messages they sent or received. Also drug conspiracy cases, or alibi evidence. Proving you were at one place when you are accused of being at another place.


3. Civil Litigation Today many contracts or business deals are negotiated over text messages and emails sent and received from mobile devices. A forensic examination can recover and document the exact language used in negotiations or agreement.


4. Clearing Your Name Often a client will be accused of inappropriate texting or sending inappropriate pictures. A forensic examination will recover the evidence to prove your innocence and clear your name.


5. Employee Misbehavior or Theft The owner of a business may need to check up on employee behavior or possible theft investigation, location tracking etc. A yearly check up on an employees phone can show who's working hard and who's stealing.


6 Teen Misbehavior Parents like to check up on their teens and see where they have been, who they are communicating with, possible drug, sex or alcohol abuse. Teens are especially likely to send and receive sexually explicit pictures. Remember an under age child receiving sexually explicit pics is still guilty of possessing child porn. A quarterly check up on a kid's phone can save a kids life.


7. Accidental Deletion Sometimes people accidentally deleted important information from their device and they desperately need to recover the deleted data. A forensic examination can recover important text or sentimental pics from a phone. Even if the screen is cracked or the phone is otherwise damaged.


If any of these reasons apply to you be sure to consult with a cellular forensic consultant to examine your phone in a professional manner.


Copyright (c) 2011 Opperman Investigations Inc



Ed Opperman is President of Opperman Investigations Inc. He is considered an expert in computer and cellular phone forensics.To learn more about how to recover deleted text messages and images please click here now:===> http://www.emailrevealer.com


Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Sunday, July 17, 2011

Catch Cheating Partners by Recovering Deleted Text Messages



There are a large number of innocent spouses and partners in a relationship that end up finding themselves beating their own heads against the wall in trying to find a way that they can either prove or disprove the suspicions that they have been having about their partner committing infidelity. Unfortunately this is not always an easy task, and just when you thought you might be able to recover deleted text messages, you opened up their cell phone only to realize that they had already removed all of the SMS text messages from off the phone. When a couple begins to argue and they start lashing out threats of reading messages on cell phones, this is generally when all kinds of data gets removed, which permanently erases any type of evidence that the innocent partner would have been able to use against them. Or does it?


Thanks to the high tech advancements that are continuously being made in the technology of today, there is a way to successfully be able to retrieve deleted text messages, videos, and photographs from a cellular device and it does not matter when they were removed off the phone. When you choose to use the professional services of an experienced specialist that has extensive knowledge in cell phone forensics, there are several different types of data that they have the ability to recover from a cellular device. To list some of the deleted items that a forensic examination can recover from a cell phone would include the following:


- Address book
- Text messages
- SMS messages
- Sext messages
- Graphics and pictures
- Videos
- Caller ID
- Email addresses
- Contact names and telephone numbers
- Detailed information such as a call record listing both dialed and received calls and messages, along with the dates and times


The advantage of being able to use cell phone forensics has put countless individuals back in the playing field, giving them the ability to retrieve deleted text messages and other helpful information that gives them the evidence they need to confront their spouse when they are engaging in unfaithful acts. This type of service can also be very beneficial when it comes to proving the innocence of a spouse or partner.


It is very important that you do not mistake the services of cell phone forensics with that of a SIM card reader. Using a SIM card reader is a process that can completely destroy the data that is on the cellular device and make it impossible to be able to retrieve deleted text messages or pictures.


Copyright (c) 2010 Ed Opperman



Ed Opperman invites you to visit his cyber investigation website for all of your search needs. He offers employment locate, internet infidelity investigations, email tracing, telephone investigations, and much more. To learn more about how to recover deleted text messages and other useful information please click here now: http://www.emailrevealer.com