Google+ Followers

Saturday, December 8, 2012

Ed Opperman guest on Critical Ommissions

Here's a link to my interview last Tuesday night on Critical Omissions with Douglas Duane Dietrich. I'm scheduled to go an again this upcoming Tuesday.

Tuesday, December 4, 2012

Prove Victim Protection Order Violations Using a Reverse Email Search Investigation

There are quite a few reasons why a person might need to have a reverse email search investigation performed. Just one of these reasons is to prove that a violation has been made against a victim’s protection order or VPO that has been put in place by a judge. The purpose of a victim’s protection order is to protect innocent victims from a specific person from such things as harassment and physical harm.

In many situations like this men and women have been known to violate these orders by getting in contact with the victim through an email account. A lot of these people believe they will never get caught if they create an anonymous email to send harassing messages and threats of physical violence to the person they have been ordered to stay away from. What they are not aware of is an anonymous email address can be easily traced when a reverse email search investigation is performed. The results of these investigations can help significantly in giving victims the proof they need to submit evidence to a judge when the rules set forth in a VPO have been violated.

While there are many people that believe there is absolutely no way you can trace an anonymous email back to them, the effectiveness of a reverse email search investigation has proven otherwise over and over again. Just imagine the huge impact this type of evidence will have on a judge in a court of law.

There have also been situations where a person has been falsely accused of sending harassing or threatening emails to a person after a VPO has been put in place. Not only can a reverse email search investigation provide evidence of harassment after an order like this is in place, but it can also provide evidence when a person has been falsely accused.

When you consult with an expert private investigator that has thorough knowledge in performing a reverse email lookup investigation, in a very short amount of time they can provide you with detailed information that will hold up in a court of law. They have the skill and knowledge that is required to identify people on very small amounts of information. What many people that try to go against the orders of a VPO aren’t aware of is every single move they make on a computer system can easily be traced by a professional.

Several years ago it took a lot of footwork for an experienced private investigator to prove threats and harassment. However, today’s high tech world of technology has paved a road that is a whole lot easier to acquire the evidence you need to prove a case.

Do not overlook anonymous emails of harassing threats when there is such a beneficial service available to reveal the person behind the threats of physical harm that are being sent to you. A reverse email search is one of the best and most effective types of investigations used today to trace anonymous emails sent by a person threatening to cause you bodily harm.
Ed Opperman is president of Opperman investigations. If you need a reverse email search to locate a con man, Craig's List Scammer, runaway or parental kidnapper please visit

Thursday, November 29, 2012

Can You Recover Texts from an iPhone if You Don't have a SIM Card?

While many people believe it isn’t possible to recover text messages from an iPhone if you don’t have a SIM card inserted into the phone, this is not true. Another myth about cell phone forensics that continues to be passed around from person to person is it’s impossible to recover text if the cell phone is not in service. The fact is, functions like this can be performed quickly and easily. An experienced private investigator that has specialized knowledge in how to recover lost or deleted text messages can perform a task such as this in no time at all.

There have been tremendous strides made in the specialty field of cell phone forensics. The many changes that have been made enable expert investigators to perform practically any requirement you may have when it comes to mobile phones. Being able to retrieve text from cell phones that do not have a SIM card or service is just to name a few of the operations a private investigator regularly performs. Cell phone forensics is a specialty area that covers a wide range of unique services. Below is a list of some of the most common tasks that are often requested by lots of cell phone users today.

  • Recover texts that have been lost or deleted
  • Retrieve names, addresses, and telephone numbers from a contact list that was accidentally erased
  • Recover erased pictures, graphics, and videos
  • Retrieve deleted text and sext messages from a cheating partner’s phone
  • Recover email addresses, address books and caller ID lists that have been deleted
  • Retrieve call records that have been deleted from a cell phone. This includes times calls were made, calls received and dialed, and duration of each call

While there are quite a few different reasons why a person may want any number of these tasks performed on a cell phone, the biggest reason continues to be a cheating partner.
Regardless of the type of data that you would like to recover from a cell phone, it is vital to only consult with a leading private investigator that has specialized experience. They have the knowledge required and the tools needed to recover texts from a cell phone that does not have service or a SIM card. Trusting anyone else to provide a superior service like this will only result in data that is lost forever, and can even result in damage to your phone.

Copyright (c) 2011 Opperman Investigations Inc
Ed Opperman is President of Opperman Investigations Inc. He is considered an expert in computer and cellular phone forensics.To learn more about how to recover deleted text messages and images please click here now:===>

Monday, November 26, 2012

Accurate Information Recovery Inc

Please visit and like my new page for Accurate Information Recovery Inc, my cellular digital forensic company based in NV.

I'm going to highlight my involvement in the Congressional Investigation and Hearing into Secret Service Misbehavior in Colombia, the Howard Stern 100 Email Trace Investigation, The Tiger Woods Case, Charlie Sheen case, Aston Kutcher case as well as my investigation into Todd and Sarah Palin sex scandal.

Thursday, June 28, 2012

Can A Husband Or Wife Spy On Their Spouse's Emails?

By Ed Opperman

Article Word Count:

you suspect your husband of infidelity you may be tempted to hack into
his email account in order to read his private emails. This could be a
huge mistake. Even if you suspect your man is cheating you do not have
a right to invade another persons privacy with email hacking. In fact
recently a husband who logged onto his wife's email account was
arrested and is now facing up to 5 years in prison.This man is
being charged with felony computer misuse, and faces up to five years
in prison after logging into the email account of now ex-wife on a
shared laptop using her password.So while it may be tempting to
try to do it yourself when investigating infidelity it's really
something that's best left up to the professionals. A professional
investigator will know what is and isn't legal when investigating
infidelity. Had this man consulted with a professional he could have
saved himself a great deal of time, money and aggravation.There
are many legal ways through digital forensics to obtain evidence of
infidelity. There are also methods to trace emails to online dating
sites and social networks that will return the evidence of infidelity
you are seeking. if a professional is investigating and obtaining this
evidence they will know how to carefully document their efforts and
maintain a chain of custody so that the evidence can be used in court.As
an investigator many times a client will contact me and ask me to get
their spouses email passwords or commit some other kind of crime. As a
professional it's up to me to explain what can and cannot be done
legally.Computer forensics, cell phone forensics, Internet
infidelity searches are just a few ways to legally recover evidence of
cheating spouse activity. But these are only a few of the things a
professional investigator can do for you to expose a cheating spouse.
Legally.It's so important to remember that every step taken in
any investigation must be done in complete compliance with all the
applicable laws. Before consulting with a private detective be sure to
ask if they have experience in this field of investigation. Be wary of
online web sites offering do it yourself spy gear and wire tapping
equipment. while it may be lawful for them to sell the devices it still
may be illegal for you to misuse the equipment to spy or your husband
or wife.

Ed Opperman is President of Opperman Investigations Inc. If you need help with a Computer Hard Drive Examination investigation visit

Article Source:

Wednesday, April 18, 2012

Stay Protected on the Internet with New York Cyber Harassment Laws

If you are a person that frequents the Internet quite often, you may be opening yourself up to the chance of experiencing the problems that are most commonly associated with cyber harassment. With the growing number of men, women, teens, and children that browse the online world, it is no wonder that crimes like this occur more and more each year. Because cyber harassment has become a tremendous issue for numerous people in the Big Apple, there are New York cyber harassment laws that have been created for the continued protection of every person’s online experience.

As you will find stated in Penal Law Section 240.30 of the New York cyber harassment laws, there are several factors that are taken into account to determine if the crime of aggravated harassment in the second degree has in fact taken place. It is generally determined to be a crime when there has been intent to alarm, threaten, annoy, or harass another person in one of the following situations:

  • When communication with a person has occurred anonymously or other manner, with the use of the mail system, telegraph, telephone, or other form of communication and is written, to cause alarm or annoyance.
  • When anonymous harassment is communicated to another person on an electronic or mechanical device. This could be with the use of a video device, text messages or calls made from a mobile telephone, or emails and instant messages that are sent from a home computer system.

There is also a great deal of other valuable information contained in the New York cyber harassment laws that would be very beneficial for you to become familiar with. This is especially true in the event that you, a close friend, or one of your family members have become victim to the harassment of a cyber-bully.

One of the best and most effective ways to uncover the identity of a cyber-bully, and various other pieces of identifying information that you can supply the proper authorities would be through a reverse email look-up investigation. This is an extremely helpful investigative tool that experienced private investigators perform which helps victims of cyber harassment put an end to the harassing messages they are dealing with. This specific search and the New York cyber harassment laws which have been enacted are meant to help ensure that men, women, and children surfing on the Internet stay safe and have an enjoyable time.

California Cyber Stalking Laws Enacted to Stop Cyber Stalkers

Cyber stalking is a serious crime that has invaded the lives of a countless number of California residents. The fact of the matter is there are more adults, teenagers, and even children that are becoming victims of this frightening crime, almost on a daily basis. This is precisely why there have been a unique set of California cyber stalking laws put into place. These laws are for the protection of innocent men, women, and children that frequent the Internet.

Listed in the California cyber stalking laws of the Civil Code Section 1708.7 you will find the specifics that are listed in regards to the protection these laws provide to all residents of the ‘Golden State’. As stated under this particular section, it is unlawful for any person to show a pattern of conduct which imposes a threat to another person, to the point that they fear for their own safety, as well as the safety of the members of their family. This involve those that are written, have been made verbally, and those that have made by using any type of electronic communication device. These devices can include mobile phones, landline telephone units, fax machines, video recorders, pagers, and computer systems.

The Civil Code 1708.7 of the California cyber stalking laws also addresses the issue of cyber stalking harassment that is carried out for no legitimate or apparent purpose. This involves the unjustified conduct of a person that knowingly annoys, terrorizes, or seriously alarms another person on the Internet. The main reason for the California cyber stalking laws is to protect innocent victims from those that engage in cyber stalking behavior and tend to target others just for the purpose of causing them a tremendous amount of emotional distress.

The emotional trauma, the fright, and the many frustrations that are often caused when an individual is subjected to cyber stalking, is a serious situation that people of today do not have to just deal with. As a matter of fact, as per the laws that are stated in the California cyber stalking laws, the victims that have suffered from this particular type of crime have the possibility of being able to recover punitive, general, and special damages from the person that has committed this crime.

As it can often be hard for the average person to acquire proof of such crimes, it can be helpful to consult with an experienced private investigator. They can perform a reverse email look-up search investigation, which will ultimately identify the cyber stalker and provide several other valuable pieces of information that can be supplied to the proper law enforcement officials.

Friday, March 2, 2012

Reverse Email Search Investigations Put an End to Internet Defamation

While there are certainly numerous
positive aspects that can be obtained when using the web, there are
sadly quite a few negative aspects with its use as well. There is one
common problem that a large number of business owners and individuals
alike are discovering about the World Wide Web. Now more than ever,
it seems that the Internet has become a place where just about any
cyber stalker or cyber bully can target any person they choose and
say any type of defamatory remarks they want.
only can the persistent remarks made by a cyber-stalker or cyber
bully be very detrimental to the operations of a business, but they
can also be downright frightening as well. There are many situations
that may just involve what might be referred to as annoying
harassment. However, there are more and more situations arising that
are more comparable to an outright malicious attack against the
person or business that has been targeted. What many people aren’t
aware of is when a person or business is targeted for an attack, many
of these cowards literally spend hour upon hour sending the victim
harassing threats.
you imagine a person actually getting paid to harass another person
or the owner of a well-recognized business? Believe it or not, this
is precisely what is happening on a daily basis. There are actually
quite a few online stalkers and bullies that get paid to take part in
this serious crime. All they have to do is create a website and give
it a name that is very similar to a legitimate consumer report
website. The whole idea behind what they are doing is to drive
visitors to go to their site. The result of this extra amount of
traffic is a high payout from revenue made from the advertisements
they choose to post on their site.
add an even higher level of insult to injury, several of the
companies that advertising on websites like these specialize in
services like campaigns for public relations and the repair of damage
that is frequently caused to victims from comments of defamation.
vast majority of people that take part in this cowardly type of
activity believe that they have nothing to worry about simply because
of the first amendment that was put in place for our protection.
Little do they know that a reverse email search investigation is all
that is needed for a person, professional, or business owner to be
able to successfully get the lies of these cowards stopped for good.
this is the type of situation that you face, the good news is a
reverse email search investigation is one of the most effective ways
to identify people partaking in Internet defamation. In many cases
the reports compiled by this investigation will uncover who they are
and where they are located. This helps give victims the assurance
they need in knowing the cyber stalker or cyber bully that is
spreading harmful lies about them will be held liable for their

Ed Opperman