Tuesday, June 18, 2013

Celebrity Private Investigator Ed Opperman Signs Book Deal

Colorado Springs Colorado 04/23/2013 รข€“ Ed Opperman of Opperman Investigations Inc, the Private Investigator and Digital Forensic Investigator known for his involvement in many high profile celebrity investigations, such as Tiger Woods, Todd Palin, and Aston Kutcher is putting his years of experience into an easy to follow "how to" book. The book will cover the many areas of expertise that has brought Ed into the public spotlight; email tracing, digital forensics and data recovery, Internet Infidelity Investigations, cyber stalking investigations and more.

"This is the kind of book I wish I had when I was young and trying to break into the profession," says Opperman. "But it will also address the questions I get everyday from seasoned investigators interested in expanding their practice into computer and Internet Investigations"

The book will also cover state licensing laws, telephone recording laws, GLB Compliant Asset Search Investigations and much more. PI Opperman will also be sharing some of his sources he has gathered over the years.

"Everything from running a license plate to testifying in court as an expert witness will be covered," says Opperman.

The book will be available on Amazon as well as Mr. Opperman's web site www.emailrevealer.com and at many of Opperman's public speaking engagements.

All those interested in a copy can attend The Super Soldier Summit at The Fiesta in Henderson NV May 17th thru May 19th where Mr. Opperman with be featured as a speaker.

Contact :
Ed Opperman
PO Box 777381
Henderson NV 89077
800-448-0772

Saturday, February 9, 2013

There are many reasons a person may have to attempt to identify the real name and address behind a PO or PMB mail box but there are also many reasons that may not be permissible. Some motives could be interpreted as harassment or stalking. For instance many people will open a PO Box and use that address simply to provide extra privacy in their personal life. It would not be appropriated to violate this persons desire for personal privacy.

However if a person has set up a PO Box to conduct less than honest business dealings they you may have a legitimate reason to trace down their actual location or residence. Many fly by night outfits will set up a business out of a PO Box and literally take the money and run. They will advertise for goods or service, accept payments then never deliver. They will simply close up shop and move on. In a situation like that a PO Box search will uncover the real name and address behind that mail box

The most common of all permissible reasons is probably in the pursuit of collecting on a debt or unpaid bill. Perhaps you have a court ordered judgment or a vehicle repression order and need to locate where the vehicle or other are assets are located.

Another legitimate and permissible reason would be for the legal service of process. A process server may not have a physical name or address for a person or business. He may only have a PO Box or PMB. In this situation it is reasonable and legal to obtain their physical address.

In fact the USPS has a process and procedure where a private investigator or attorney can provide them with a court case number and they will turn over all the information they have about the owner of that PO Box. This information may or may not be current information. It could be the information that was used to open the box account years ago and may no longer be accurate.In that case a private investigator can use data bases or other sources to identify and locate the real owner of the PO Box. The investigator may even use a pretext to mail items to the box in order to trick the owner into revealing their location and identity. But whether it is a protect, public records, data base or through a subpoena it is a simple a routine matter to obtain this information.

Copyright (c) 2011 Opperman Investigations Inc
For assistance in performing a PO Box break contact Ed Opperman Pres of Opperman Investigations Inc through his web site http://www.emailrevealer.com/
Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/6174520

Friday, February 8, 2013

Can You Trace An Email If You Don't Have The Headers?

Do you have an email address and need to locate or identify that person? If so you may be thinking that the only way to locate or identify someone from an email address is to examine the headers and trace the IP address back to the ISP (Internet Service Provider). Then you would have to get a subpoena or court order for the ISP to turn over account holder information. If this is what you're thinking you're wrong. It is possible too trace an email address right back to the sender even if you do not have the headers. In most cases you won't need a court order or search warrant, just an experienced private investigator that knows what he's doing.

There's a great deal of misinformation all over the Internet about this subject. If you Google "how To Trace an Email" you'll get hundreds of hits from well meaning people on how to examine a header, obtain the Internet Protocol Address (IP). But that's not the information you are looking for. What you want is a name address and phone number for the person using that email address.
While examining the headers for identifying information is an important step it s not by any means the most important step.

The bottom line is that if you want to locate or identify someone hire an investigator. Private investigators have years of experience in tracking people down with very little identifying information. Long before email or the Internet was in popular use PIs have been locating bail jumpers and run away teenagers and tracing people down who use pay phones and fake Ids. This is not unfamiliar ground for private investigators.

Usually when a person wants to trace an email they will turn to their IT dept. Now the IT dept may be great at installing a network, removing a virus or upgrading Windows but stop and think. How many people have they ever tried to locate before embarking on their first email trace investigation? Zero!

The examination of the header and IP address is one step in an email trace investigation but it is only one step among many steps. So even if you do not have the headers the PI can usually trace the email successfully anyway. many times the PI can obtain the headers for you. But even without headers there are still many steps in an email trace investigation that will still result in obtaining the name and address and phone number behind an anonymous email account.

In fact in most cases an investigator can obtain the information behind an email not by examining the incoming header but by sending an emaail to the stalker and obtaining information when that person opens an email.
Far more information is obtained that way than is obtained by examining incoming headers.

Copyright (c) 2011 Opperman Investigations Inc
Ed Opperman is president of Opperman investigations. If you need a reverse email search to locate a con man, bail jumper, runaway or parental kidnapper please visit www.emailrevealer.com.
Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/6249547

Thursday, February 7, 2013

Most Common Reasons For an Asset Search Investigation

An Asset search investigation and reveal an incredible amount of information about a person. There are many reasons why a person may hire a private investigator to conduct an asset search investigation. But some reasons are more common than others. This is a brief description of the most common reasons for an asset search.

1. Judgment Recovery - A litigant will win a lawsuit and obtain a judgment. This is an order from the court compelling a person to pay. But unless you can uncover a person's hidden assets you may never be able to collect on a judgment. So you need to locate their hidden assets. Once the funds are located you can follow the legal procedures to seize the funds from the account.

2. Divorce Litigation - When a couple is going through a divorce proceeding many time one spouse will suspect the other of hiding assets. It could be cash, property, vehicles or business holdings. But the one thing most people are seeking in these types of investigations are hidden bank accounts.

3. Child Support Collections - You may have a judgment for child support but the ex refuses to pay and is working off the books so you cannot garnish their paycheck. An asset search can uncover hidden business interests, stocks, and secret bank accounts. Sometimes the search will include employment information as well. If not there are specific investigations regarding current place of employment that could be bundled in with the asset search.

4. Pre-Litigation - You may have a very good case against someone but if they have no insurance and no assets to pay a judgment there may be no point in going through the expense of litigation. A pre-litigation will spare the expense of a pointless trial.

5. Disputes Over Wills and Probates - There are often disputes between heirs after a death. many times family members feel that the executor of the will is keeping them in the dark about the deceased's assets. An heir may feel better if no stone is left unturned.

A typical asset search investigation will locate property, real estate holdings, vehicles, bank accounts, trust accounts, businesses and even PayPal accounts. It can uncover a wealth of information and when used in conjunction with subpoena power and a forensic accountant or other professional can solve every one of the problems listed above. There may be other reasons why people will hire an investigator to perform an asset search but these are the most common.

Copyright (c) 2011 Opperman Investigations Inc
For assistance in performing an Asset Search Investigation contact Ed Opperman Pres of Opperman Investigations Inc through his web site http://www.emailrevealer.com/
Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/6447405

Saturday, December 15, 2012

More Steps To Ensure Privacy and Be Anonymous On The Internet

In our last article in this series we discussed the many reasons why people would want to remain antonymous on the Internet and the best first step they should take to create a firewall between them self and the world. That being a Nevada Corporation, with proxy service and nominee service. Once you have the NV corp you can set up a DBA for the corp, this will be a second name and even a second layer of protection for you, that DBA can set up a checking account as well. Your offline identity will the NV corp, your bank, your phone, auto registration, utility bills will all be under that name.

Now the next step is your online identity. Let's create your online persona. We can begin with a domain name registration. Pick a very common name like Ann Smith, if a stalker searches for the name Ann Smith they will get millions of hits. Use your NV corp bank account to buy a prepaid debit card and use that card number to buy the domain name AnnSmith.com. Then take the extra step to buy the proxy registration offered by the hosting company. By using the proxy registration anyone doing a whois lookup on the domain name will not be able to see who the domain is registered to.

Now you can set up an email address on annsmith.com. Such as Ann@annsmith .com. Anyone reading that would assume your name is AnnSmitth. You can take this a step further by using that email to set up some online social networking accounts using that name and email. People checking up on that email address will see plenty of "proof" that Ann Smith is a real person with a real email account.

When setting up your email on your domain you want to be sure not to use a PC based email program like Outlook Express, you only want to use the web based version on Gmail. Gmail will strip your IP information from your email headers if you have it set up correctly.

Now if you notice we are not only taking steps to conceal your real identify, we are also creating an alternate Internet identity so that stalkers trying to locate or identify you will only find information about the fictitious "Ann Smith". Use your imagination and create blogs and blog posts. Place some ads on craigslist using your email. Let your potential stalker find a whole lot of information about the fictitious Ann Smith. Her pets , her vacations, where her kids go to school, the church she attends. If you ever have the unfortunate experience of being the target of a cyber stalker , it is this kind of information they are looking for, so give it to them in droves , but all for the fictitious Ann Smith.

What if your stalker is really slick and uses online data base searches that he pays for? Well we can fool those too. The fictitious AnnSmith is going to fool those data bases as well. These data base services obtain information from people from credit headers and other sources where people voluntarily but unknowingly give their real name and phone number when filling out credit applications, give a real name and address and phone number when ordering a pizza from large chains and or subscribe to magazines. While you live in Kansas , AnnSmith@annSmith.com lives in a penthouse in NYC, she orders pizzas to her manhattan address using her prepaid cell phone and loves to fill out applications for fun. AnnSmith@annSmith.com has left quite a paper trail for herself.

ed Opperman of Opperman Investigations is a Private Investigator and a Paralegal, if you need assistance setting up a corporation contact www.emailrevealer.com

Step One To Ensure Privacy and Be Anonymous On The Internet

As a private investigator that specializes in email tracing and Internet investigations I am often asked about Internet privacy. One particular question involves sending an anonymous untraceable email. Where a person wants to convey a message to another person via email but do not want their identity revealed.

Other concerns are privacy and protection from online cyber stalkers and online cyber bullies. People want to enjoy the Internet and engage in online discussions and social interactions with out the fear of attracting unwanted attention from an obsessive person that may take things too seriously. Often celebrities such as a model, actress or entertainer and they want to be online and interact with fans but do not want overzealous fans to be able to locate their home address

Others may conduct business online that is of a sensitive nature,such as adult entertainers or perhaps a private investigator or bounty hunters, investigative reporters and whistle blowers. These are people that may want to share information online without having their identity or location revealed.

There are steps you can take to ensure your privacy online and some are extreme and others less extreme.

Step One A Nevada corporation. Having a NV corporation is quick, easy and not very expensive. You can use a registered agent and nominee service to keep your personal name and address private. You can then use that corporate name to set up a bank account, PO box and register your cars, phones etc.

Now all of your online activity will have to filter through that corporate name. Your Internet Service Provider, web site domain registration etc. A good way to set up your Nevada corporation is by using a paralegal. They always cheaper than hiring a lawyer and setting up your corporate shield is a very simple and quick process. Many private investigators are also paralegal's and will have unique insight into privacy matters. So if you can find a paralegal that is also a PI that's a bonus.

The NV corporation will be like a firewall between you and the world but it's only one firewall we will create many as you will soon see in follow up articles. We will be looking at trusts, web site proxy registration online anonymizer services that will conceal your IP address, prepaid debit cards and prepaid cell phones. We will also be discussing online payment services that and steps you can take to send and receive money anonymously.

 Ed Opperman is President of Opperman Investigations Inc. If you need help with a cyber stalking investigation visit http://www.emailrevealer.com