Tuesday, June 18, 2013

iPhone Location Tracking Feature Being Used In Missing Persons Investigations

If you are working a tough missing person case it's important not to overlook cell phone forensics and deleted data recovery. An incredible amount of information can be recovered from a persons cell phone. Deleted texts, pics, contacts and emails, but with the iPhone we have the additional location tracking information. This information can go back as far as two years and can pinpoint actual addresses as well as general areas of travel for an iPhone or iPad.

Of course cell phone forensics is only one part of a missing person investigation. The investigator must still follow all the normal routine steps of investigation like credit card bills, cell phone bills, email tracing, and interviewing friends, family and coworkers. But in this article we want to focus on cell phone forensics and specifically the iPhone.

Another unique feature to the iPhone or iPad is that people that use these devices will commonly back up the files to their computer. It is not widely known butt you don't need to have the physical phone itself. The back up files can be examined and deleted data can be recovered from the files. This fact is especially important considering that many times when a person goes missing, their phone or iPad will go missing with them.

The way that the location tracking works is that the phone maintains a record of every cell tower that the phone ever hits on up a radius of 700 acres. The phone will also store every WIFI location the phone has ever connected to. This information can pin point to an exact address.
This kind of historical location tracking can be used to establish a historical routine pattern of movement for the subject. If this person has visited the same coffee shop every morning at 8 AM for two years it's likely they will return there. Likewise with dry cleaners and barber shops. These are the types of semi anonymous haunts that a person that is "on the run" or gone missing may still frequent even if they are trying to avoid being found.

Cell phone forensics, deleted data recover and iPhone location tracking are an excellent souse of information when investigating a missing person case. Remember even if the phone is missing as well you may find the back up files on their computer. These files can be examined as well.
The back up files can contain, contacts, address book, numbers dialed and SMS or text messages. This is extremely valuable information in a missing persons investigation.
Copyright (c) 2011 Opperman Investigations Inc
 
Ed Opperman is President of Opperman Investigations Inc. He is considered an expert in computer and cellular phone forensics. To learn more about how to recover deleted text messages and images please click here now:===> http://www.emailrevealer.com


Article Source: http://EzineArticles.com/6455193

Monday, February 18, 2013

Beware: The Faceboolk Privacy Settings HOAX!!!

If you see this message below posted on a friends wall you may not want to follow the instructions. Thats a hoax, if your friends change THEIR settings they will no longer know about your likes or comments. If you change YOUR settings you won't see theirs. Effectively UNFRIENDING your closest friends that read this.
See Hoax Post Bellow:
FACEBOOK HAS CHANGED THEIR PRIVACY SETTINGS ONCE MORE!!! DUE TO THE NEW “GRAPH APP” ANYONE ON FACEBOOK (INCLUDING PEOPLE IN OTHER COUNTRIES) CAN SEE YOUR PICTURES, LIKES, AND COMMENTS. The next 2 weeks I will be posting this, and please once you have done it please post DONE! Those of you who do not keep my information from going out to the public, I will have to DELETE YOU! I want to stay PRIVATELY connected with you. I post shots of my family that I don't want strangers to have access to!!! This happens when our friends click "like" or "comment"... automatically, their friends would see our posts too. Unfortunately, we cannot change this setting by ourselves because Facebook has configured it that way. PLEASE place your mouse over my name above (DO NOT CLICK), a window will appear, now move the mouse on “FRIENDS" (also without clicking), then down to "Settings", click here and a list will appear. REMOVE the CHECK on "LIFE EVENTS" and "COMMENTS & LIKES". By doing this, my activity among my friends and family will
no longer become public.

Saturday, February 9, 2013

Stop Internet Defamation With A Reverse Email Search Investigation

By Ed Opperman
Internet defamation has become more than epidemic, its a plague! The Internet has reached the point where any anonymous person can create a fake email account and make any kind of accusation about anyone and say anything. Many times the victims of this kind of harassment is the target of a wide spread pattern of cyber stalking and the Internet defamation is only a portion of the attack. One crazed stalker with a lot of time on their hands can spend hours obsessing on their victim.
Not only is this kind of online defamatory abuse allowed it's actually encouraged by an every expanding group of Internet quick buck artists that have a found a legal loophole to make quick and easy cash. These unscrupulous con men set up web sites with legitimate sound names that mimic consumer reporting web sites. Then they encourage outright libel and slander against innocent people and businesses. Sometimes even having their own employees create fictitious complaints.

They understand that by using the names of popular people and companies they will attract web site visitors. Those visitors will increase the traffic statistics of the web site and thus return high advertising revenue. In fact many of the advertisers specialize in assisting the victims of the defamation in clearing their name and reputation by offering expensive Internet reputation repair and public relations campaigns.

The sleazy operators of these web sites hide behind the first amendment of the constitution. So the victims have no recourse against the web site owners or web site hosting companies. But with a reverse email search investigation the actual people spreading the lies can be located and identified and held financially responsible for any monetary damages the victim of this Internet defamation is subjected to. In some cases they may also be held criminally responsible.

A private investigator experienced in Internet defamation cases and reverse email search investigations can catch these people in the act and then reduce their finds to a report that can be used as an exhibit in court. They can also testify on your behalf in a lawsuit to recover damages. For now the owners of these sleazy web sites may be able to escape from justice but the actual authors cannot. If they are spread false defamatory lies about a person they can be brought to justice and made to pay for their crimes. They may think they have gotten aawaay with their crime but time is on the side of the victim and every one of these cyber criminals can be caaught eventually.

Copyright (c) 2011 Opperman Investigations Inc
Ed Opperman is president of Opperman investigations. If you need a reverse email search to locate a con man, bail jumper, runaway or parental kidnapper please visit www.emailrevealer.com.
Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/6174757

Friday, February 8, 2013

Is Facebook Helpful In Identifying a Cyber Stalker?

Facebook.com now has over 350 million active members. With that many people interacting over the Internet it's obvious why so many cyber stalking cases take place over the Facebook social network system. But with so many instances of cyber stalking occurring everyday are the owners and managers of the popular social network helpful to their members is locating and identifying the cyber bullies? Unfortunately like all the est of the Internet giants they are not helpful at all. The standard line is that they will cooperate with law enforcement and comply with court orders and subpoenas served on the Custodian of Records.

It sort of becomes a catch 22. The police will sometimes say that they cannot open a case until you can identify the person stalking you and the ISPs or social networks will not release account holder or members information unless it's in compliance with a search warrant. The victim of the cyber stalking crime is once again victimized by this system of "pass the buck". In a civil litigation a lawyer will probably not take on a case unless you can identify the person you want to sue.

There is hope though. A victim of a Facebook stalker can turn to a private investigation that specializes in Internet investigations and locating and identifying people online. In the case of Facebook, most accounts will have an email address that is visible to other members. The email address used to open the Facebook account had to be active and working at the time the account was opened and the page was created. If that is the case the email address can be traced back to the owner using a standard reverse email search investigation.

If the email address is hidden from public view the private detective can still contact the Facebook page owner via the private messages system and can use a pretext to either trick the cyber stalker into revealing their identify or they can lure the stalker over to a pretext web site. These sites are created with features that can trap and trace a visitors identifying information. This information can be traced to the stalker or perhaps compared to identifying information about a person you suspect is the cyber stalker.

Once the investigation has been completed the investigator can reduce his findings to a report that is in acceptable form for the police to continue the investigation and make an arrest. So even if Facebook is not helpful in a cyber stalking investigation there are PIs that will help you. Of course it would be so much simpler if large social networks would just police their forums and keep things nice and safe and friendly however that is just not the case.

Copyright (c) 2011 Opperman Investigations Inc
Ed Opperman is President of Opperman Investigations Inc. If you need help with a Facebook stalker investigation visit http://www.emailrevealer.com
Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/6174710

Thursday, February 7, 2013

Must Your Cell Phone Have a SIM Card To Recover Deleted SMS

If you need to read SMS or text messages that have been deleted from a cell phone you may be under the impression that the only way to recover deleted texts or SMS messages is via a SIM card reader. This is untrue, This is a very common misconception that cell phone forensic consultants hear everyday.if you have a CDMA (Code Division Multiple Access) device that does not have a SIM card, the internal memory of the device itself can be examined to recover data.
Now if the phone is GSM (Global System for Mobile Communications: originally from Group Special Mobile) and the SIM card is absent or missing that's another issue. There is no way to examine that phone unless you can contact your service provider and ask them for the IMSI (International Mobile Subscriber Identification) and the ICCID(International Circuit Card Identifier. If you can get those two numbers the SIM card can be cloned and the phone can be processed.

Now with some Smart Phones like the iPhone back up files can be examined and processed in the same was as a cell phone or SIM can be examined. Deleted SMS and Text messages, address book, and other data can be recovered from those back up files. This is the best solution for people that desperately need to read deleted SMS or texts from an iPhone but simply cannot prt with the device for more than a day.

The first step is to get the computer to allow you to see hidden files and folders. To do this you will need to open "My Computer". Click on the "Tools" drop down menu. You should see "Folder Options". Click on the "View" button. In the Advanced settings box you should see a folder named "Hidden files and folders." Click in the "Show hidden files and folders" circular button and then click "OK" at the bottom of the box. (See the image "Folder Options" attached to this email.

Once you can see the hidden folders you need to follow this path- (Click on each folder) C / Documents and settings/ User (this will be the name of the person)/ application data/ Apple Computer/ MobileSync. The Cell phone forensic consultant needs the folder "Mobile Sync"

As you can see there is a solution to almost any problem if you need to recover deleted SMS or text messages from a cell phone without a SIM card. All you really need to do is consult will a forensic Cell phone consultant.

Ed Opperman is President of Opperman Investigations Inc. He is considered an expert in computer and cellular phone forensics.To learn more about how to recover deleted text messages and images please click here now:===> http://www.emailrevealer.com

Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/6420927

Article Source: http://EzineArticles.com/6420927

Can A Husband Or Wife Spy On Their Spouse's Emails?

If you suspect your husband of infidelity you may be tempted to hack into his email account in order to read his private emails. This could be a huge mistake. Even if you suspect your man is cheating you do not have a right to invade another persons privacy with email hacking. In fact recently a husband who logged onto his wife's email account was arrested and is now facing up to 5 years in prison.
This man is being charged with felony computer misuse, and faces up to five years in prison after logging into the email account of now ex-wife on a shared laptop using her password.

So while it may be tempting to try to do it yourself when investigating infidelity it's really something that's best left up to the professionals. A professional investigator will know what is and isn't legal when investigating infidelity. Had this man consulted with a professional he could have saved himself a great deal of time, money and aggravation.

There are many legal ways through digital forensics to obtain evidence of infidelity. There are also methods to trace emails to online dating sites and social networks that will return the evidence of infidelity you are seeking. if a professional is investigating and obtaining this evidence they will know how to carefully document their efforts and maintain a chain of custody so that the evidence can be used in court.

As an investigator many times a client will contact me and ask me to get their spouses email passwords or commit some other kind of crime. As a professional it's up to me to explain what can and cannot be done legally.

Computer forensics, cell phone forensics, Internet infidelity searches are just a few ways to legally recover evidence of cheating spouse activity. But these are only a few of the things a professional investigator can do for you to expose a cheating spouse. Legally.

It's so important to remember that every step taken in any investigation must be done in complete compliance with all the applicable laws. Before consulting with a private detective be sure to ask if they have experience in this field of investigation. Be wary of online web sites offering do it yourself spy gear and wire tapping equipment. while it may be lawful for them to sell the devices it still may be illegal for you to misuse the equipment to spy or your husband or wife.

Ed Opperman is President of Opperman Investigations Inc. If you need help with a Computer Hard Drive Examination investigation visit http://www.emailrevealer.com
Article Source: http://EzineArticles.com/?expert=Ed_Opperman

Article Source: http://EzineArticles.com/6249521

Thursday, June 28, 2012

Can A Husband Or Wife Spy On Their Spouse's Emails?

Can A Husband Or Wife Spy On Their Spouse's Emails?

By Ed Opperman

Article Word Count:
409





If
you suspect your husband of infidelity you may be tempted to hack into
his email account in order to read his private emails. This could be a
huge mistake. Even if you suspect your man is cheating you do not have
a right to invade another persons privacy with email hacking. In fact
recently a husband who logged onto his wife's email account was
arrested and is now facing up to 5 years in prison.This man is
being charged with felony computer misuse, and faces up to five years
in prison after logging into the email account of now ex-wife on a
shared laptop using her password.So while it may be tempting to
try to do it yourself when investigating infidelity it's really
something that's best left up to the professionals. A professional
investigator will know what is and isn't legal when investigating
infidelity. Had this man consulted with a professional he could have
saved himself a great deal of time, money and aggravation.There
are many legal ways through digital forensics to obtain evidence of
infidelity. There are also methods to trace emails to online dating
sites and social networks that will return the evidence of infidelity
you are seeking. if a professional is investigating and obtaining this
evidence they will know how to carefully document their efforts and
maintain a chain of custody so that the evidence can be used in court.As
an investigator many times a client will contact me and ask me to get
their spouses email passwords or commit some other kind of crime. As a
professional it's up to me to explain what can and cannot be done
legally.Computer forensics, cell phone forensics, Internet
infidelity searches are just a few ways to legally recover evidence of
cheating spouse activity. But these are only a few of the things a
professional investigator can do for you to expose a cheating spouse.
Legally.It's so important to remember that every step taken in
any investigation must be done in complete compliance with all the
applicable laws. Before consulting with a private detective be sure to
ask if they have experience in this field of investigation. Be wary of
online web sites offering do it yourself spy gear and wire tapping
equipment. while it may be lawful for them to sell the devices it still
may be illegal for you to misuse the equipment to spy or your husband
or wife.

Ed Opperman is President of Opperman Investigations Inc. If you need help with a Computer Hard Drive Examination investigation visit http://www.emailrevealer.com


Article Source:
http://EzineArticles.com/?expert=Ed_Opperman