Whois Data Base Closures Hurt Consumers Say FTC

The Federal Trade Commission realizes that the Whois Data Base information can be hidden from view for only $9.00 per year for domain name owners. Many scam website frauds can therefore hide for weeks until a court order is issued to turn over that information. This helps Spammers, Phishers and Identity Thieves pull scams.

But critics say that if people allow their listing then they get bombarded with Spam too. Spammers scour the Whois databases and collect email addresses to Spam us all with. So it is a Catch 22 in that the FTC needs to get to these Spammers websites and find out who-is-who, but privacy people say they are not happy with the Federal Trade Commissions request and cite that the FTC has been unable to stop Spam anyway.

Therefore why is the FTC violating privacy rights, when they are suppose to stop Spam, which has gone up some 3000% since the Federal Trade Commission started to attempt to go after all the Spammers?

Meanwhile, now there is a legal battle brewing and the FTC is looking rather incompetent these days as they had two-lap tops stolen in Scottsdale AZ with 110 personal identification information on of employees? Ouch? So is the FTC on its last leg these days or what? Dah? Talk about incompetence? Consider all this in 2006.

Cell Phone Reverse Lookup and Private Company Data Base

What is the role of lease in the private company data base in the –“Cell phone reverse lookup”…

If a person is trying to stalk on the land line or frequently annoying or trying to prank on land line it is very easy to trace. Since the information is publicly available.When someone wants to go for “Cell phone reverse lookup “for landline there are plenty of troubles to undergo. As this is easy the case of cell phone users. Cell phone number database are privately owned by different mobile phone service providers where the details are not provided free on demand…

In such situation Cell phone reverse lookup“… will help the person by providing to take lease from private companies database so that the person is provided with accurate and clear information about the owner of the cell phone user. In spite of the leasing procedure there are free services offered. As this information are vague & not updated. It is always a better option to go for paid services.

What are the features of the paid “Cell phone reverse look up”:-

The paid “cell phone reverse look up “requires credit card or other account just to identify & get the assurance that the person who is using the data will not use it for illegal purpose.

“Cell phone reverse look up” are legal because they are under the mutual agreement between the providers and private cell phone companies. This transaction ascertains that the information is not used for illegal taping of any cell company. This becomes unlawful when a person tries to use the information to commit a crime or harm to the people.

Is It Legal To Identify A Cyber Stalker With a Reverse Email Search Investigation?

As a private investigator that specializes in cyber stalking investigations and reverse email search investigations many times I’m asked if it is legal to trace an email back to the sender. I suppose this is because many people think the only way to identify the sender of an email is to hack or crack into their account or use some kind of password phishing technique. Honestly it’s questions like those that make me wish clients would not assume so much and jump to wild conclusions.

A reverse email search investigation is perfectly legal. No laws are broken or even bent. Many time this kind of email trace can be accomplished with a simple data base search. The subject of the investigation has used the email before in an online transaction or profile and the email address has become available in a data base. There are many data bases of this type that are only available to licensed professionals, law enforcement and collection agencies.

Other times you can do an examination of the email headers and compare that information to known suspects in the case. Either obtaining an exact match or completely excluding that person as a suspect. You can continue this process until you narrow it down to the person you want.

Many times to can email the person and trick them into revealing who they are. You can do this is many ways that will nor arouse suspicion or adversely go out of your way to arouse their suspicion. This way they will turn around and try to investigate one of my pretext email accounts and fall into a clever trap that will ultimately reveal their identity. This type of pretext is very effective with the “computer savvy” type of cyber stalker that really believes they are untraceable on the Internet.

Another method would be to examine the headers and then trace the IP address back to the ISP, you can with subpoena the custodian of records of the ISP or if you have other resources or data bases you can often match that IP number to a name and address. Follow up investigation can attach that computer to an actual person.

The techniques mentioned above are all perfectly legal and only a fraction of the many tricks we investigators use to legally trace emails using reverse email search investigations to track down and identify cyber stalkers. In fact all of our information can be reduced to a report that can be used in court or for a police report.

Copyright (c) 2011 Opperman Investigations Inc