Saturday, February 9, 2013

A Reverse Email Search Can Identify A Facebook Bully

If you are the target of Facebook bully you may be able to use a reverse email search to identify them. That Facebook stalker can be identified even if they used a fake name to create the page. Also even if they used a fake email address to set up the Facebook page they can still be identified. Every cyber bull can be caught even if they think they are clever and computer savvy. in fact in many cases it's the cyber stalker that believes he is clever and Internet savvy that will trip up and give away his identity.

In order to create a Facebook page you need a working email address. Before the page can go live Facebook verifies the email is working. So at least on the day of creating that email has to be working and active. The stalker has already created a trail back to their front door. Many times even a Facebook stalker will leave that email address visible on their information page of Facebook. If that is the case you can use a reverse email search investigation to locate and identify the owner of that email. Please don't confuse a reverse email investigation with an instant reverse email search that relies on a data base. A reverse email search investigation is a thorough investigation into the location and identity of the actual person behind the email address not just the false information they used when creating the email account.

Now in the case where a Facebook bully has not allowed their email to be visible on the information page you may still be able to trace them. This is a little more involved that a standard email trace investigation but it does have many of the same ingredients. This would involve using a pretext

Facebook account to send messages to the cyber bully. Inside the message would be pretexts to get the recipients to reveal their identity through the use of trap lines, spider sites and web bugs. Of course as in any kind of investigation it helps if you have a list of possible suspects.

Before you contact a professional investigator to trace down and identify a Facebook bully you should make sure that the private investigator has experience in computer forensics and email tracing. Then as you prepare to contact the PI you should copy the URL of the Facebook page, try to locate any email addresses on that page and also make a list of possible suspects and the email addresses of the suspects. Remember most private investigators will bill for consultation time so you want to be prepared before you retain their services.

The most important thing to consider when trying to identify a Facebook stalker is that it's very unlikely that the stalker will stop his bullying activity until he is actually identified. Of course you can contact Facebook and have them remove the offending pages but there is nothing to stop the bully from just creating a new account and starting all over again. The trouble will not stop until you have them identified. Then and only then can you document their crimes and bring them to justice. Whether it is civil or criminal court you will need solid proof in a report that has been documented by a professional.

Copyright (c) 2011 Opperman Investigations Inc
Ed Opperman is president of Opperman investigations. If you need a reverse email search to locate a con man, bail jumper, runaway or parental kidnapper please visit www.emailrevealer.com.
Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/5939090

Labels: , , ,

Friday, February 8, 2013

What Is The Fastest Least Expensive Method To Catch a Cheating Husband?

All over the world women have one thing in common. They all know that any man can cheat and if they do they can ruin a marriage destroy a family and bring a horrible end to a once wonderful relationship. The sad fact is that any man can be tempted, most will resist but some will not. Nocturnally infidelity affects up to 70% of relationships so everyone must accept this a potential hazard to their relationship.

While most women may suspect at one time or another that their man may be about to stray the average woman may not know how to investigate or have enough money to investigate and catch their husband cheating. This is unfortunate because there are many affordable and easy methods to catch a cheater without shelling out a large retainer to a private detective to follow your husband around all day and night in hopes that you'll catch him in the act during that small window that a PI is right there on his trail and has eyeballs on the subject.

Today everything is digital. Our phones, computers, cameras, Internet. It's all digital and everything we do or say leaves a digital footprint. So it's far easier and far less expensive to begin our infidelity investigation in the digital area. The quickest and easiest method is an online infidelity investigation. You can trace your husbands email address back to secret online dating web sites, porn sites, social networks and even escort service sites. With this kind of simple initial investigation you do not need access to your spouses computer or phone. You just need his normal email.

This initial investigation is extremely inexpensive and only takes a few hours to return your results. If you do get some hits you can expand on that investigation and gather even more evidence of infidelity. A personal ad investigation would include a pretext ad from an attractive woman contacting your husband offering to exchange phone numbers and intimate photos. Now that would be damming evidence and not easy for the slickest cheater to talk their way out of.

Now this very basic investigation can even uncover evidence that can be used in court. Say a child custody hearing. Personal ads or social networking pages often have pictures, or conduct that a person is not proud of and would not want to see entered as evidence in court. For instance a man with pics and profiles on web sites that are focused on extreme sexual fetishes may be to embarrassed to pursue custody if they knew their secret life would be exposed in court.
So while many women may need an investigator to help with suspected infidelity they may think it's to expensive. But that's simply not the case. There are very quick, inexpensive ways to investigate infidelity.

Copyright (c) 2011 Opperman Investigations Inc
Ed Opperman is the Pres of Opperman Investigations Inc and the chief investigator for http://www.emailrevealer.com If you have noticed signs of cheating please feel free to visit his web site.
Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/6249449

Labels: , , , , , , ,

Thursday, February 7, 2013

How Do Police Investigate Cyber Bully Cases?

Have you ever wondered how police in real life trace emails and locate and identify cyber stalkers? Is it really like they show on those TV CSI cop shows? Unfortunately no, in real life there are many limitations on local police when it comes to locating and identifying cyber stalkers. On tv you'll see a high tech computer crimes lab full of expensive equipment and manned with dozens of officers. In reality a local police dept computer crimes unit may be as small as one officer and one computer.

Wen a victim of a cyber bully becomes concerned about their safety and well being they will usually turn to the local police dept. Once the local police take that compliant several things may happen. hey may choose not to investigate further thinking that it is not a serious enough threat to devote manpower and recourses to investigate further.

If they do deem it a serious threat they may assign your case to an investigator, perhaps in their computer crimes unit or maybe just an investigator that normally investigates harassment and stalking cases.If the crime crosses over state lines they may refer your case to a federal agency such as the FBI to investigate. depending on the nature of the threat and other factors.

But the typical response by any law enforcement is usually the same. They will investigate the incoming email threat by opening up the headers and obtaining the IP address from within the header. Then they will take that information and use a common tool like samspade.org or dnsstuff.com to run the IP address through a"whois" feature and discover what Internet Service Provider (ISP) is associated with IP Address or Internet Protocol Address.

At this stage of the investigation law enforcement has a huge advantage because they can take the documented threat or harassment in the form of an email and present it to a judge as probable cause to issue a search warrant. That warrant will be served upon the Custodian of Records of the ISP, They will be compelled to turn over detailed information about the billing, location and activity of that person or people associated with at IP Address.

The problem for law enforcement at this stage is proving who that actual person was physically at the keyboard at the time the alleged crime took place. The suspect can claim he was not there that day, that many people borrow the computer or that several people live at the address and they call share the computer. This is why it's so difficult for law enforcement to make arrests and prosecute these kids of cases without getting a confession from the suspect. Unfortunately it's not as high tech and quick as you see on TV crime shows where to police are able to use some type of computer program to instantly identify a person from an email or IP address.

Copyright (c) 2011 Opperman Investigations Inc
Ed Opperman is President of Opperman Investigations Inc.If you need help with a cyber stalking investigation visit http://www.emailrevealer.com
Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/6417876

Labels: , , , , , ,