Saturday, December 15, 2012

More Steps To Ensure Privacy and Be Anonymous On The Internet

In our last article in this series we discussed the many reasons why people would want to remain antonymous on the Internet and the best first step they should take to create a firewall between them self and the world. That being a Nevada Corporation, with proxy service and nominee service. Once you have the NV corp you can set up a DBA for the corp, this will be a second name and even a second layer of protection for you, that DBA can set up a checking account as well. Your offline identity will the NV corp, your bank, your phone, auto registration, utility bills will all be under that name.

Now the next step is your online identity. Let's create your online persona. We can begin with a domain name registration. Pick a very common name like Ann Smith, if a stalker searches for the name Ann Smith they will get millions of hits. Use your NV corp bank account to buy a prepaid debit card and use that card number to buy the domain name AnnSmith.com. Then take the extra step to buy the proxy registration offered by the hosting company. By using the proxy registration anyone doing a whois lookup on the domain name will not be able to see who the domain is registered to.

Now you can set up an email address on annsmith.com. Such as Ann@annsmith .com. Anyone reading that would assume your name is AnnSmitth. You can take this a step further by using that email to set up some online social networking accounts using that name and email. People checking up on that email address will see plenty of "proof" that Ann Smith is a real person with a real email account.

When setting up your email on your domain you want to be sure not to use a PC based email program like Outlook Express, you only want to use the web based version on Gmail. Gmail will strip your IP information from your email headers if you have it set up correctly.

Now if you notice we are not only taking steps to conceal your real identify, we are also creating an alternate Internet identity so that stalkers trying to locate or identify you will only find information about the fictitious "Ann Smith". Use your imagination and create blogs and blog posts. Place some ads on craigslist using your email. Let your potential stalker find a whole lot of information about the fictitious Ann Smith. Her pets , her vacations, where her kids go to school, the church she attends. If you ever have the unfortunate experience of being the target of a cyber stalker , it is this kind of information they are looking for, so give it to them in droves , but all for the fictitious Ann Smith.

What if your stalker is really slick and uses online data base searches that he pays for? Well we can fool those too. The fictitious AnnSmith is going to fool those data bases as well. These data base services obtain information from people from credit headers and other sources where people voluntarily but unknowingly give their real name and phone number when filling out credit applications, give a real name and address and phone number when ordering a pizza from large chains and or subscribe to magazines. While you live in Kansas , AnnSmith@annSmith.com lives in a penthouse in NYC, she orders pizzas to her manhattan address using her prepaid cell phone and loves to fill out applications for fun. AnnSmith@annSmith.com has left quite a paper trail for herself.

ed Opperman of Opperman Investigations is a Private Investigator and a Paralegal, if you need assistance setting up a corporation contact www.emailrevealer.com

Step One To Ensure Privacy and Be Anonymous On The Internet

As a private investigator that specializes in email tracing and Internet investigations I am often asked about Internet privacy. One particular question involves sending an anonymous untraceable email. Where a person wants to convey a message to another person via email but do not want their identity revealed.

Other concerns are privacy and protection from online cyber stalkers and online cyber bullies. People want to enjoy the Internet and engage in online discussions and social interactions with out the fear of attracting unwanted attention from an obsessive person that may take things too seriously. Often celebrities such as a model, actress or entertainer and they want to be online and interact with fans but do not want overzealous fans to be able to locate their home address

Others may conduct business online that is of a sensitive nature,such as adult entertainers or perhaps a private investigator or bounty hunters, investigative reporters and whistle blowers. These are people that may want to share information online without having their identity or location revealed.

There are steps you can take to ensure your privacy online and some are extreme and others less extreme.

Step One A Nevada corporation. Having a NV corporation is quick, easy and not very expensive. You can use a registered agent and nominee service to keep your personal name and address private. You can then use that corporate name to set up a bank account, PO box and register your cars, phones etc.

Now all of your online activity will have to filter through that corporate name. Your Internet Service Provider, web site domain registration etc. A good way to set up your Nevada corporation is by using a paralegal. They always cheaper than hiring a lawyer and setting up your corporate shield is a very simple and quick process. Many private investigators are also paralegal's and will have unique insight into privacy matters. So if you can find a paralegal that is also a PI that's a bonus.

The NV corporation will be like a firewall between you and the world but it's only one firewall we will create many as you will soon see in follow up articles. We will be looking at trusts, web site proxy registration online anonymizer services that will conceal your IP address, prepaid debit cards and prepaid cell phones. We will also be discussing online payment services that and steps you can take to send and receive money anonymously.

 Ed Opperman is President of Opperman Investigations Inc. If you need help with a cyber stalking investigation visit http://www.emailrevealer.com


Thursday, June 28, 2012

Can A Husband Or Wife Spy On Their Spouse's Emails?

Can A Husband Or Wife Spy On Their Spouse's Emails?

By Ed Opperman

Article Word Count:
409





If
you suspect your husband of infidelity you may be tempted to hack into
his email account in order to read his private emails. This could be a
huge mistake. Even if you suspect your man is cheating you do not have
a right to invade another persons privacy with email hacking. In fact
recently a husband who logged onto his wife's email account was
arrested and is now facing up to 5 years in prison.This man is
being charged with felony computer misuse, and faces up to five years
in prison after logging into the email account of now ex-wife on a
shared laptop using her password.So while it may be tempting to
try to do it yourself when investigating infidelity it's really
something that's best left up to the professionals. A professional
investigator will know what is and isn't legal when investigating
infidelity. Had this man consulted with a professional he could have
saved himself a great deal of time, money and aggravation.There
are many legal ways through digital forensics to obtain evidence of
infidelity. There are also methods to trace emails to online dating
sites and social networks that will return the evidence of infidelity
you are seeking. if a professional is investigating and obtaining this
evidence they will know how to carefully document their efforts and
maintain a chain of custody so that the evidence can be used in court.As
an investigator many times a client will contact me and ask me to get
their spouses email passwords or commit some other kind of crime. As a
professional it's up to me to explain what can and cannot be done
legally.Computer forensics, cell phone forensics, Internet
infidelity searches are just a few ways to legally recover evidence of
cheating spouse activity. But these are only a few of the things a
professional investigator can do for you to expose a cheating spouse.
Legally.It's so important to remember that every step taken in
any investigation must be done in complete compliance with all the
applicable laws. Before consulting with a private detective be sure to
ask if they have experience in this field of investigation. Be wary of
online web sites offering do it yourself spy gear and wire tapping
equipment. while it may be lawful for them to sell the devices it still
may be illegal for you to misuse the equipment to spy or your husband
or wife.

Ed Opperman is President of Opperman Investigations Inc. If you need help with a Computer Hard Drive Examination investigation visit http://www.emailrevealer.com


Article Source:
http://EzineArticles.com/?expert=Ed_Opperman

Wednesday, April 18, 2012

State of Texas Cyber Harassment Laws Enacted for Your Protection

The Lone Star state is known by many people as a place where a large amount of problems occur from cyber harassment. Part of this is due to the large population of the state. However, a large amount of cyber harassment occurs these days simply because a vast majority of all people now own or use a home computer system. There are a few helpful steps that residents have available to them when they find themselves dealing with the frustration, annoyance, and fright that is often associated with cyber harassment. This is to have a reverse email look-up performed by a private investigator, and to review the Texas cyber harassment laws that have been created.

Under the Texas Penal Code Section 33.07 of the state of Texas cyber harassment laws, states that an offense is in fact committed if someone’s persona or name is used by another individual to post various messages on one of the many social networks websites found on the Internet, or to create a website or web-page. This particular crime occurs when the person has not been contacted for consent, or their name is used with the intentions of causing a threat to them, the intent of harming or intimidating them, or defraud them in any way.

The Texas cyber harassment laws also state that a crime is committed when text messages, emails, instant messages, or communication that is similar is sent which gives reference to a specific domain address, name, telephone number, or other information that is used to identify a particular person. The crime occurs when there is intent to defraud or cause harm to the person, when the person has not been contacted for consent, and when the person receiving the information is led to believe the other individual has in fact given their permission for it to be transmitted.

Just as it is with a majority of other states, cyber harassment is taken very seriously and should never be ignored. The Texas cyber harassment laws have been created and put in place for the protection of yourself and each of your family members. By consulting an experienced private investigator to perform a reverse email look-up investigation at the first sign of cyber harassment, it will supply you with the identity and other helpful identifying information you can supply the authorities. Although it may have been hard to get cyber harassment stopped in the past, the Texas cyber harassment laws, and a reverse email look-up search makes this a much easier achievement.

Reverse Email Look-Up Investigations Can Help Texas Victims of Cyber Stalking

Cyber stalking has become a serious problem for quite a few residents of the state of Texas. What makes it even worse is as more people begin using home computer systems, the issue ends up affecting even more people. It is quite shocking to find out just how many people there really are that carry out the act of stalking innocent targets on the Internet. Not only is this an issue that affects numerous men and women, but there are also a large amount of teenagers and even younger kids that get caught up in the vicious web created by a cyber-stalker. Although many of these people feel as if there’s no way to stop the constant emails containing threats of harassment a cyber-stalker is sending them, a reverse email look-up search can quickly reveal the person behind the threats.

The information that can be gained from this effective investigation provides victims of cyber-stalkers with everything needed to file charges with their local law enforcement agency. Under the Texas State Penal Code Sec. 42.07, it clearly states that any type of harassment that is done on an electronic device such as a computer system is a serious crime. A reverse email look-up investigation is the very tool that can help harassed victims see that cyber-stalkers are held accountable for the wrong-doings they choose to participate in.

When cyber stalking becomes an issue that you or one of your family members faces, it is extremely important to notify the authorities. This is simply because the frightening emails threatening bodily harm that you are receiving could very easily turn into a real life nightmare. The next step should be to consult a leading professional that knows everything there is to know about a reverse email look-up search. The expense that is involved with this search is very reasonable, and it only takes a short amount of time to receive detailed results.

The information that victims of cyber-stalking receive through a reverse email look-up investigation can actually help law enforcement officers in a lot of situations. This kind of search is so effective that it can easily identify the cyber-stalker who has been causing you a large amount of fright. In a majority of cases it will also reveal the address where they reside, their phone number, employment information, and a wide range of other very helpful details that can ensure the harassment you’re going through is stopped.

Friday, March 2, 2012

Things You Should Know About Instant Reverse Email Search Investigations


There are more people every single day
that fall into the trap of trying out websites that claim to offer an
instant reverse email search investigation completely free of cost.
There are several websites that regularly offer searches that provide
instant information free of cost that sounds much too good to be
true. What they do not tell you is that it is. To list a few of the
searches that a lot of these sites offer includes such searches as a
reverse email search, telephone number searches, criminal record
searches, and locate searches. What a lot of people frequently find
is they are initially offered services at no cost, but upon
completion of the first couple of steps there is almost always a fee
that is required.
Take
just a few seconds to consider a few facts. When a private
investigator is assisting the authorities in an investigation like a
reverse email search investigation, it generally takes several days
or even weeks to complete. Knowing this, you may wonder how in the
world any website can provide the information you are looking for
instantly. The truth of the matter is they can’t. What a lot of
people using these sites are not aware of is the databases they have
access to usually contain information that is inaccurate and old.
There
are quite a few reasons why the information these sites get their
hands on is inaccurate, and just a few of these reasons are as
follows:
Mistakes
that have been made when data was entered
Dates
on entries that were mistakenly inverted
Names
that were accidentally misspelled
Names
and addresses that have been reported incorrectly
While
most experienced and licensed private investigators and law
enforcement officers already know these errors exist, the websites
that offer instant reverse email search investigations are not going
to readily provide you with these facts. After all, even though you
may believe their main priority is to assist their clients, it isn’t.
Nine times out of ten the objective of sites like this is to make
money by providing information that is not in the least bit helpful.
An
expert private investigator has experience in obtaining identifying
information that can be useful to the client when they are hired to
perform a reverse email search investigation. They know just how
important it is to locate a missing teenager that has run away or
stop harassing emails that are being sent from an obnoxious cyber
stalker. They also have expensive equipment at their disposal that is
geared towards locating people that are using anonymous emails to try
and cause you harm.
While
it would be great if a person could obtain a long list of helpful
information on an email address with a reverse email search
investigation that promises instant results, this is just not the way
it works in the real world. When current and up-to-date information
is what you are looking for, you will want to rely on the specialized
services provided by a licensed private investigator with years of
experience.