<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-853059776634175909</atom:id><lastBuildDate>Sat, 03 Jul 2021 17:50:25 +0000</lastBuildDate><category>be your own detective</category><category>public records</category><category>county</category><category>state</category><category>background check</category><category>background investigation</category><category>Obama</category><category>background history</category><category>identity theft</category><category>instant background check</category><category>e-course</category><category>people search</category><category>investigate anyone</category><category>reverse cell phone lookup</category><category>blog traffic</category><category>online investigations</category><category>catch a cheater</category><category>dumb crooks</category><category>employee background checks</category><category>investigate others</category><category>reverse phone lookup</category><category>Blog Catalog</category><category>Net Detective</category><category>caylee anthony</category><category>cell phone spy</category><category>credit report</category><category>email scams</category><category>free</category><category>free public records links</category><category>free reverse cell phone lookup scams</category><category>lie detector</category><category>private investigator</category><category>reverse phone detective</category><category>spy gear</category><category>surveillance</category><category>ACORN</category><category>Blonde Joke</category><category>Climategate</category><category>Entrecard</category><category>Find anyone</category><category>Social Networking</category><category>camera  photos</category><category>casey anthony</category><category>cell phone number by name</category><category>cell phone tracking</category><category>facebook</category><category>google</category><category>reverse mobile</category><category>scams</category><category>trash run</category><category>Basic Investigation Skills</category><category>Bill O&#39;Reilly</category><category>Bloggers Unite</category><category>Christmas</category><category>Court Records</category><category>Criminal Profiling</category><category>Georgia</category><category>Haiti</category><category>Internet Security</category><category>Jessica Alba</category><category>Sex Offender</category><category>Vermont</category><category>Web Investigator</category><category>bailouts</category><category>be a detective</category><category>cell phone blocking</category><category>cheater</category><category>check your date</category><category>contests</category><category>deleted text messages</category><category>detect yourself</category><category>dumb crimes</category><category>employee screening</category><category>find name by phone number</category><category>find people</category><category>free sex offender locator</category><category>global warming</category><category>gps tracking</category><category>link-love</category><category>missing women</category><category>mobile phone spyware</category><category>old movie tricks</category><category>people finder</category><category>phone bill scams</category><category>phone scams</category><category>private eye</category><category>scam</category><category>search public records</category><category>security</category><category>squidoo</category><category>state records</category><category>terrorism</category><category>*69</category><category>*69 phone</category><category>1934</category><category>20000</category><category>2008</category><category>2009</category><category>2011</category><category>69 phone</category><category>ATT</category><category>Aid</category><category>Alabama Public Records</category><category>Alaska</category><category>Alaska Public Records</category><category>Arizona</category><category>Arkansas</category><category>Arms Smugglers</category><category>Aruba</category><category>Auto Check</category><category>Barney Frank</category><category>Belgium</category><category>Bill Gates</category><category>Bobbi Ann Finley</category><category>California</category><category>Charles Manson</category><category>Chris Rock</category><category>Colorado</category><category>Connecticut</category><category>Copenhagen</category><category>DHS</category><category>DNA</category><category>Debralee Lorenzana</category><category>Delaware</category><category>Democratic Policing</category><category>Dennis Blair</category><category>Digg</category><category>Donald Duck</category><category>Dragon Software</category><category>Dubai</category><category>Eearthquake</category><category>Embarrassment</category><category>FBI</category><category>FTC</category><category>Father&#39;s Day</category><category>Florida</category><category>Government Resources</category><category>Governors</category><category>Guatanamo Bay</category><category>Hamas</category><category>Hawaii</category><category>Health Care Reform</category><category>IED</category><category>IMIE</category><category>Idaho</category><category>Il</category><category>Illinois</category><category>Indiana</category><category>Intelius</category><category>Internal Investigations</category><category>Investigate domain names</category><category>Iowa</category><category>Israel</category><category>John Gibson Sr.</category><category>Joseph Dwyer</category><category>Kansas</category><category>Kentucky</category><category>Lifelock</category><category>LinkedIn</category><category>Louisiana</category><category>Maine</category><category>Maryland.md</category><category>Massachusetts</category><category>Michigan</category><category>Mississippi</category><category>Missouri</category><category>Montana</category><category>Mossad</category><category>Muslims</category><category>National Alert Registry</category><category>Navy Seals</category><category>Nebraska</category><category>Nevada</category><category>New Hampshire</category><category>New Jersey</category><category>New Mexico</category><category>New York</category><category>North Carolina</category><category>North Dakota</category><category>North Korea</category><category>Ohio</category><category>Oklahoma</category><category>Omar Afifi</category><category>Oregon</category><category>Pannetta</category><category>Paul Shultz</category><category>Pennsylvania</category><category>Rhode Island</category><category>Rick Perry</category><category>Robert Gates</category><category>Russia</category><category>SIM card</category><category>Santa in Monrovia</category><category>Sex Offender Notification</category><category>Social Security</category><category>South Carolina</category><category>South Dakota</category><category>Spies</category><category>Steensma</category><category>TSA</category><category>Tennessee</category><category>Utah</category><category>VIN</category><category>Van der Sloot</category><category>Virginia</category><category>War in Iraq</category><category>Washington</category><category>Washington D.C.</category><category>West Virginia</category><category>Wisconsin</category><category>Wyoming</category><category>address change</category><category>ak</category><category>al</category><category>al public records</category><category>al-qaida</category><category>anonymous</category><category>ar</category><category>arm yourself</category><category>arrest warrant</category><category>az</category><category>banks</category><category>be notified when a sex offender moves</category><category>blog reviews</category><category>boars</category><category>boycott</category><category>ca</category><category>cameras</category><category>case files</category><category>cash for clunkers scam</category><category>cell phone tracing</category><category>cheating spouse</category><category>check your car</category><category>churches</category><category>co</category><category>coke</category><category>commonwealth</category><category>communication</category><category>computer security</category><category>consumer reports</category><category>county clerk</category><category>county tx</category><category>credit card scams</category><category>credit check</category><category>criminal records</category><category>ct</category><category>dangerous mail</category><category>de</category><category>developing nations</category><category>disaster scams</category><category>doyoudiggit.com</category><category>driver&#39;s license search</category><category>duck scam</category><category>dumb law makers</category><category>ebay</category><category>economy</category><category>emplyee background checks</category><category>facelift</category><category>fake photos</category><category>favorite blog posts</category><category>find cell phone number by name</category><category>find mobile number by name</category><category>fishing</category><category>fl</category><category>fraud</category><category>free dog scams</category><category>free e-course</category><category>free search links</category><category>fun</category><category>funny stories</category><category>ga</category><category>go phone</category><category>google background</category><category>guns</category><category>hi</category><category>home security</category><category>human trafficking</category><category>iPhone</category><category>ia</category><category>id</category><category>in</category><category>infidelity</category><category>interview</category><category>investigate</category><category>investigation mistakes</category><category>investmenats</category><category>job scams</category><category>joke</category><category>ks</category><category>ky</category><category>la</category><category>landlord</category><category>locate anyone</category><category>loss prevention</category><category>ma</category><category>may 1</category><category>me</category><category>metadata</category><category>mi</category><category>military</category><category>minnesota</category><category>missing children</category><category>mn</category><category>mo</category><category>mob justice</category><category>mobile number by name</category><category>ms</category><category>mt</category><category>murder</category><category>natalee halloway</category><category>nc</category><category>nd</category><category>ne</category><category>nh</category><category>nj</category><category>nm</category><category>nv</category><category>ny</category><category>oh</category><category>ok</category><category>online scams</category><category>or</category><category>pa</category><category>passwords</category><category>pastors</category><category>patience</category><category>pedofiles</category><category>personal safety</category><category>petitions</category><category>phone</category><category>pigs</category><category>piss</category><category>police</category><category>polygraph</category><category>postal service</category><category>promotion scam</category><category>psychopaths</category><category>publice records al</category><category>recordings</category><category>renters</category><category>reverse cell phone lookup scams</category><category>reverse phone detective scams</category><category>ri</category><category>sc</category><category>scavenger hunt</category><category>sd</category><category>servicemen</category><category>spammers</category><category>spybubble</category><category>stolen cars</category><category>stop and frisk</category><category>stupid criminals</category><category>survey</category><category>tails</category><category>tenant</category><category>terry stops</category><category>texas public records</category><category>third party billing scam</category><category>timeline</category><category>tn</category><category>too hot</category><category>too sexy</category><category>trace cell phone</category><category>trojans</category><category>tx county public records</category><category>tx public records</category><category>undercover operations</category><category>ut</category><category>va</category><category>vehicle checks</category><category>veterans</category><category>vt</category><category>wa</category><category>warmest year in US</category><category>why men cheat</category><category>wi</category><category>wiener facts</category><category>wv</category><category>wy</category><title>Be Your Own Detective</title><description>Learn to be your own detective.  Search databases and public records from right here in this blog.</description><link>http://blog.beyourowndetective.net/</link><managingEditor>noreply@blogger.com (Barry)</managingEditor><generator>Blogger</generator><openSearch:totalResults>263</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-4679707385595017879</guid><pubDate>Fri, 24 May 2013 02:30:00 +0000</pubDate><atom:updated>2013-05-23T21:30:39.455-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">phone scams</category><category domain="http://www.blogger.com/atom/ns#">scam</category><title>SCAM ALERT: Falsified Phone Calls About Past Due Utility Bills</title><description>I was sent this scam alert y my electric company. &amp;nbsp;By the way, I love &lt;a href=&quot;http://www.championenergyservices.com/programs/referral-program/CAF.asp?referralID=BDunn67152&quot; target=&quot;_blank&quot;&gt;Champion Energy&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;SCAM ALERT: Falsified Phone Calls About Past Due Utility Bills&lt;br /&gt;&amp;nbsp;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;br /&gt;The Better Business Bureau (BBB) is reporting that scammers are calling people and claiming to work for local electric, water or gas companies. The callers tell people that they are late on a utility bill and that their service will be cut off if they don&#39;t pay immediately. Then they instruct people to purchase a prepaid debit card to pay their bill and call them back with the card number.&lt;br /&gt;&lt;br /&gt;For help in spotting a scam, please be informed of the following tips:&lt;br /&gt;&lt;br /&gt;It is a red flag if you are asked to pay by a prepaid debit card. Champion Energy will not suggest that you purchase a prepaid debit card to make payments.&lt;br /&gt;High pressure tactics, such as threats to cut off your service unless you make an immediate payment are questionable.&lt;br /&gt;&lt;br /&gt;In the event you receive a call like this, DO NOT give out any personal information. Hang up immediately and report that number to the FTC.&lt;br /&gt;</description><link>http://blog.beyourowndetective.net/2013/05/scam-alert-falsified-phone-calls-about.html</link><author>noreply@blogger.com (Barry)</author><thr:total>24</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-7371453163626831022</guid><pubDate>Sun, 02 Dec 2012 04:08:00 +0000</pubDate><atom:updated>2012-12-01T22:08:24.722-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anonymous</category><category domain="http://www.blogger.com/atom/ns#">spammers</category><title>Clueless Anonymous Spammers</title><description>I have had a lot of spamming in the comments of this blog lately. &amp;nbsp;The good news for me is that Blogger automatically treats these as the spam they are.&lt;br /&gt;&lt;br /&gt;So Anonymous guy or gal spamming my comments - you are wasting your time. &amp;nbsp;Did you think to ever check back on the articles you spammed? &amp;nbsp;I get a good laugh out of this!&lt;br /&gt;&lt;br /&gt;Stay safe!</description><link>http://blog.beyourowndetective.net/2012/12/clueless-anonymous-spammers.html</link><author>noreply@blogger.com (Barry)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-2598661874682693095</guid><pubDate>Wed, 28 Nov 2012 19:20:00 +0000</pubDate><atom:updated>2012-11-28T13:20:31.117-06:00</atom:updated><title>Be Your Own Detective - but Never Use a &quot;Bug&quot;</title><description>I have showed several ways that you can use a &quot;bug&quot; on this site. &amp;nbsp;However, without written permission from at least one of the people being &quot;bugged&quot; or from a judge, you just cannot do that. &amp;nbsp;OK&amp;lt; really you SHOULD not do that. &amp;nbsp;You CAN do it - it just may get you thrown in jail in most states and you will lose any law suit against you for doing it.&lt;br /&gt;&lt;br /&gt;The bottom line is don&#39;t use a bug to spy on someone. &amp;nbsp;Don&#39;t &quot;accidentally&quot; leave a recorder behind when you leave a room that is still recording.&lt;br /&gt;&lt;br /&gt;In most states you can bug yourself and others around you. &amp;nbsp;Just avoid doing that in a 2 party state.&lt;br /&gt;&lt;br /&gt;Whatever you do, stay safe!</description><link>http://blog.beyourowndetective.net/2012/11/be-your-own-detective-but-never-use-bug.html</link><author>noreply@blogger.com (Barry)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-8949962190669523454</guid><pubDate>Fri, 17 Feb 2012 05:21:00 +0000</pubDate><atom:updated>2012-02-16T23:21:06.304-06:00</atom:updated><title>When Should You Call a Locksmith?</title><description>If you have locked your keys in your car (and it isn&#39;t one of those On Star - what-have-you cars), (and who hasn&#39;t?) and you have towing on your insurance policy, - everyone should call.&lt;br /&gt;&lt;br /&gt;The &quot;towing&quot; part of insurance also covers locksmiths. &amp;nbsp;My insurance agent did not tell me this - but the locksmith did.&lt;br /&gt;&lt;br /&gt;So don&#39;t damage your car trying to break in (if you have this coverage). Just call the locksmith and it is paid for - or at least mostly paid for.&lt;br /&gt;&lt;br /&gt;</description><link>http://blog.beyourowndetective.net/2012/02/when-should-you-call-locksmith.html</link><author>noreply@blogger.com (Barry)</author><thr:total>157</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-8151814939230765515</guid><pubDate>Mon, 12 Dec 2011 05:05:00 +0000</pubDate><atom:updated>2011-12-11T23:07:24.101-06:00</atom:updated><title>Cell Phone Recon - a Review</title><description>I tried out the cell phone recon. &amp;nbsp;I found it to work as advertised. &amp;nbsp;You can see what text messages, calls, and emails are made to and from a smart phone.&lt;br /&gt;&lt;br /&gt;It works really well and I was satisfied with the service. &amp;nbsp;Another use of cell phone recon is for your own phone&#39;s security. &amp;nbsp;You can track and find your phone at any time if it is lost or stolen.&lt;br /&gt;&lt;br /&gt;Why not try it out. &amp;nbsp;You can get it from &lt;a href=&quot;http://www.anrdoezrs.net/click-3922289-10636218&quot; target=&quot;_blank&quot;&gt;Brickhouse Security&lt;/a&gt;&lt;img border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.awltovhc.com/image-3922289-10636218&quot; width=&quot;1&quot; /&gt;&lt;br /&gt;&lt;br /&gt;Whatever you do - stay safe!</description><link>http://blog.beyourowndetective.net/2011/12/cell-phone-recon-review.html</link><author>noreply@blogger.com (Barry)</author><thr:total>9</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-4183642457528436771</guid><pubDate>Thu, 27 Oct 2011 16:48:00 +0000</pubDate><atom:updated>2011-10-27T11:48:18.112-05:00</atom:updated><title>Easy to Use Computer Monitoring</title><description>If you have a need to monitor activity on a computer - there is a an easy solution. &amp;nbsp;All you need is one of these:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.jdoqocy.com/fg102vpyvpxCGMFFFLMCEDJGJHHD?sid=tali&amp;amp;url=http%3A%2F%2Fwww.brickhousesecurity.com%2Fremote-computer-monitoring-software.html&amp;amp;cjsku=remote-computer-monitoring-software&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Stealth iBot Computer Spy Deluxe&quot; border=&quot;0&quot; src=&quot;http://feeds2.yourstorewizards.com/2583/images/200x200/remote-computer-monitoring-software.jpg&quot; /&gt;&lt;/a&gt;&lt;img border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.lduhtrp.net/7166c37w1-LPVOOOUVLNMSPSQQM&quot; width=&quot;1&quot; /&gt;&lt;br /&gt;&lt;br /&gt;It is the Stealth iBot Deluxe. &amp;nbsp;It can pretty much tell you everything that has gone on the computer. &amp;nbsp;It works like a memory stick. &amp;nbsp;Plug it in to install the software. &amp;nbsp;Unplug it and wait. &amp;nbsp;You get notified of activity on the computer by email. &amp;nbsp;You can also go back and get every bit of information and activity that goes on.&lt;br /&gt;&lt;br /&gt;This is what they say about it:&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #eeeeee; color: #333333; font-family: Verdana; font-size: 11px;&quot;&gt;The Stealth iBot Deluxe logs every keystroke typed from chats, Instant Messages, search engines, emails and control fields exchanged with your child, teen, spouse or employee. The software will also capture screenshots that you can set to meet your own monitoring preferences, like keyword/keyphrase triggers, which will send alerts to your email every time the keylogging software detects a word you&#39;ve selected to monitor.&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #eeeeee; color: #333333; font-family: Verdana; font-size: 11px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Whatever you do - Stay Safe!!</description><link>http://blog.beyourowndetective.net/2011/10/easy-to-use-computer-monitoring.html</link><author>noreply@blogger.com (Barry)</author><thr:total>9</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-2248225727325907163</guid><pubDate>Tue, 18 Oct 2011 16:42:00 +0000</pubDate><atom:updated>2011-10-27T11:48:18.122-05:00</atom:updated><title>Domino&#39;s Tracker and Mobile Numbers</title><description>Somewhere you may have come across the story how Domino&#39;s tracker saved the life of a customer. Basically a crazy ex girlfriend was confronting her ex who had ordered the pizza and he was awaiting the delivery. &amp;nbsp;The delivery guy named Alejandro (who deserves an award and medal) arrived to an open door - saw the crazy knife&amp;nbsp;wielding&amp;nbsp;ex-girlfriend and called the police. &amp;nbsp;on top of that he still delivered the pizza after the police arrived - That is customer service!&amp;nbsp;&amp;nbsp;I won&#39;t recall the whole story - you can got &lt;a href=&quot;http://www.uhpinions.com/dominos-pizza/&quot;&gt;here&lt;/a&gt; to read it.&lt;br /&gt;&lt;br /&gt;On a side note. &amp;nbsp;In an effort to collect even more private data from people Google is now threatening their users that they may lose their&amp;nbsp;privilege&amp;nbsp;to use their services (in the case of hijacking or lost passwords) if they don&#39;t give up their mobile number. &amp;nbsp;I am sure this is a ruse to juts obtain mobile numbers of their customers as there is no reasonable explanation as to how this can be a &quot;security measure.&quot; &amp;nbsp;There are thousands of other ways to take care of customers besides requiring them to give up their mobile number so Google can have even more private date to abuse in their databases.&lt;br /&gt;&lt;br /&gt;Google has a habit of&amp;nbsp;arbitrarily&amp;nbsp;stopping users from using their services. More often than not they do this without explanation or even a way for their users to correct any issues. &amp;nbsp;Said users have have no recourse to Google using their nearly omnipotent power to shut down accounts, etc. &lt;br /&gt;&lt;br /&gt;Whatever you do - stay safe!</description><link>http://blog.beyourowndetective.net/2011/10/dominos-tracker-and-mobile-numbers.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-76031034050317674</guid><pubDate>Thu, 08 Sep 2011 19:33:00 +0000</pubDate><atom:updated>2011-09-08T14:33:41.456-05:00</atom:updated><title>Look Out for the Someone is Killed Scam</title><description>He is a new twist on some scams going around lately. &amp;nbsp;These have slipped into Texas, and may have been going around for a while. &amp;nbsp;A lot of people who have been scammed do not like to tell everyone that they were a willing &quot;mark.&quot;&lt;br /&gt;&lt;br /&gt;The basics of the scam goes like this. &amp;nbsp;Someone will call a good sized Church claiming they are a police officer (or similar official). They tell them that a&amp;nbsp;parishioner&amp;nbsp;has been killed. &amp;nbsp;They claim that there are some emergency expenses that need to be taken care of. &amp;nbsp;The shocked worker at the church tends to not stop and think to check to see if the &quot;police officer&quot; is legitimate. &amp;nbsp; So far, exactly how the scammers get the name of the parishioner is not clear, but many churches have directories of members and such.&lt;br /&gt;&lt;br /&gt;If you get a call like this, verify it with the local police. &amp;nbsp;Take a few moments, that and check with the &quot;victim&quot; or their family members to see if it is real.&lt;br /&gt;&lt;br /&gt;Whatever you do - stay safe!</description><link>http://blog.beyourowndetective.net/2011/09/look-out-for-someone-is-killed-scam.html</link><author>noreply@blogger.com (Barry)</author><thr:total>6</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-3122044527795001472</guid><pubDate>Sat, 20 Aug 2011 17:30:00 +0000</pubDate><atom:updated>2011-08-20T12:30:28.066-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">be your own detective</category><title>When You Should Hire a Real Detective Reason #1</title><description>OK, I have posted a long time about how to be your own detective, and how you can save big bucks doing so. &amp;nbsp;You can be your own detective, but you cannot be someone else&#39;s detective, and you cannot hire a non-licensed detective.&lt;br /&gt;&lt;br /&gt;OK, so you can hire one, but it can cost you $10,000 in fines. &amp;nbsp;Yep I said &lt;b&gt;10 Grand&lt;/b&gt;. &amp;nbsp;So, you can be your own detective - there is no law against that. &amp;nbsp;But do not do it for someone else, and do not hire a non- licensed person to do it for you. &amp;nbsp;That is just stupid. &amp;nbsp;If you need a real detective go to &lt;a href=&quot;http://realtexaspi.com/index.html&quot;&gt;Real Texas PI&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Whatever you do, stay safe!</description><link>http://blog.beyourowndetective.net/2011/08/when-you-should-hire-real-detective.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-8684347838401342519</guid><pubDate>Sun, 17 Jul 2011 19:56:00 +0000</pubDate><atom:updated>2011-09-06T09:37:30.594-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">be your own detective</category><category domain="http://www.blogger.com/atom/ns#">catch a cheater</category><title>When You Have to Be Your Own Detective Reason #1</title><description>This is a first in a series of who knows how many posts with this headline. &amp;nbsp;There are instances that you cannot use a detective to get what you want. &amp;nbsp;Why? &amp;nbsp;Because it would be illegal for a detective to do what you want.&lt;br /&gt;&lt;br /&gt;Let&#39;s say you suspect your spouse is cheating. &amp;nbsp;The problem is that your spouse is not going anywhere to cheat, but they are doing it in your own bedroom. &amp;nbsp;If you were to say, hire a detective to plant hidden cameras to catch the cheater on video - well - most places that would be illegal. &amp;nbsp;So any legitimate private detective would not take the job. &amp;nbsp;This is because a person has certain expectations of privacy in their own bedroom. &amp;nbsp;There could be serious criminal and civil liabilities for a detective to plant cameras in a bedroom.&lt;br /&gt;&lt;br /&gt;However, a spouse does not have an expectation of privacy in their own bedroom from thier own spouse. &amp;nbsp;Therefore, you could plant your own camera in the bedroom to catch a cheater. &amp;nbsp;One of the most simple to set up is the power adapter hidden camera. &amp;nbsp;You can the&amp;nbsp;&lt;a href=&quot;http://www.jdoqocy.com/2h103vpyvpxCGMFFFLMCEDJKIMML?url=http%3A%2F%2Fwww.brickhousesecurity.com%2Fpower-plug-adapter-spy-cam.html&quot; target=&quot;_blank&quot;&gt;Hidden Camera in a Power Adapter !&lt;/a&gt;&lt;img border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.ftjcfx.com/2a110snrflj48E777DE465BCAEED&quot; width=&quot;1&quot; /&gt;&lt;br /&gt;&lt;br /&gt;Just set up the camera - check it after you suspect the &quot;activity&quot; has gone on, and you can see video evidence. &amp;nbsp;Unless nothing has happened of course.&lt;br /&gt;&lt;br /&gt;Whatever you do - Stay Safe!</description><link>http://blog.beyourowndetective.net/2011/07/when-you-have-to-be-your-own-detective.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-630095178744460779</guid><pubDate>Sat, 09 Jul 2011 16:41:00 +0000</pubDate><atom:updated>2011-07-09T11:41:52.384-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">camera  photos</category><category domain="http://www.blogger.com/atom/ns#">spy gear</category><title>Why You Need an Undercover Camera</title><description>It appears the line &quot;Everything is illegal in&amp;nbsp;Massachusetts&quot;&amp;nbsp;is true. &amp;nbsp;This line from the &lt;i&gt;Edge of Darkness&lt;/i&gt; is such a true statement that there is a Facebook Fan Page about it.&lt;br /&gt;&lt;br /&gt;It seems that police in&amp;nbsp;Massachusetts arrest people for taking pictures in their own front yard. &amp;nbsp;&amp;nbsp;Not just anyone mind you, but a 65 year old lady who was taking photos of a car that crashed into her yard and caught fire. &amp;nbsp;The car had crashed into her Ford Escape. &amp;nbsp;Any homeowner would have done the same to document the damages.&lt;br /&gt;&lt;br /&gt;However, police thought that her taking photos of the burned car with two people who had been shot (both men died) was somehow a bad thing - well illegal, since they arrested her and confiscated her camera. &amp;nbsp;You can read more here, though it doesn&#39;t paint a real clear picture of what took place.&lt;br /&gt;&lt;br /&gt;Maybe if she did it in a stealth was and used &lt;a href=&quot;http://www.jdoqocy.com/sn80qgpmgo37D666CD354D54574&quot; target=&quot;_blank&quot;&gt;HD Spy Hidden Pen Camera:&lt;/a&gt;&lt;img border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.awltovhc.com/n765ltxlrpAEKDDDJKACBKCBCEB&quot; width=&quot;1&quot; /&gt; she could have done what was needed without getting arrested on her own property for taking pictures.&lt;br /&gt;&lt;br /&gt;Whatever you do - stay safe!</description><link>http://blog.beyourowndetective.net/2011/07/why-you-need-undercover-camera.html</link><author>noreply@blogger.com (Barry)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-6750270499164385269</guid><pubDate>Fri, 01 Jul 2011 23:19:00 +0000</pubDate><atom:updated>2011-07-01T18:19:05.989-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">private eye</category><category domain="http://www.blogger.com/atom/ns#">private investigator</category><title>So You Want to Do a Background Check</title><description>I have written several articles on how to conduct a background check. &amp;nbsp;I have given you hundreds of free links to public records in all 50 states. &amp;nbsp;So do you do it? &amp;nbsp;A background check is very important in many situations. &amp;nbsp;There is only one issue with doing it yourself. &amp;nbsp;That issue is liability. &amp;nbsp;For not much more than you would have to pay for a complete online search, you can hire a &lt;a href=&quot;http://realtexaspi.com/&quot;&gt;real licensed private investigator&lt;/a&gt;. &amp;nbsp;This may not be a bad idea if you are&amp;nbsp;concerned&amp;nbsp;or do not feel comfortable doing it yourself.&lt;br /&gt;&lt;br /&gt;Whatever you choose to do - be safe!</description><link>http://blog.beyourowndetective.net/2011/07/so-you-want-to-do-background-check.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-907796771685484933</guid><pubDate>Sun, 12 Jun 2011 20:40:00 +0000</pubDate><atom:updated>2011-06-12T15:40:04.755-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">fraud</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>So Your Identity is Stolen - What is the 4th Thing You Do?</title><description>On the fourth of this series, I will wrap up this talk about Identity Theft.  This does not mean I will not visit it from time to time, as we all can use reminders of how to minimize the effects of Identity Theft.&lt;br /&gt;&lt;br /&gt;The Fourth Step to take in dealing with Identity Theft if to file a complaint with the Federal Trade Commission.  The FTC does not conduct criminal cases themselves. So why should you file? The FTC can act as a clearinhouse of identity theft cases for police agencies all across the nation, federal, state and local.  The information can be accessed by police department to assist them with filing cases against perpetrators. You can file a complaint online at &lt;a href=&quot;http://www.ftc.gov/idtheft&quot;&gt;www.ftc.gov/idtheft&lt;/a&gt; .  &lt;br /&gt;&lt;br /&gt;Remember the four steps.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Make a fraud alert&lt;/li&gt;&lt;li&gt;Close fraudulent accounts&lt;/li&gt;&lt;li&gt;Make a Police Report&lt;/li&gt;&lt;li&gt;File a complaint with the FTC.&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;&lt;br /&gt;There are many, many things you may need to do.  Each Identity Theft case is unique.  There are difference creditors you may need to contact and send them dispute letters.  There is a lot of work.  Take your time, do not get overwhelmed.  Sometimes you may need some help, but only use a trusted source, as there are a lot of scammers that prey on your misfortunes. &lt;br /&gt;&lt;br /&gt;Whatever you do be safe.</description><link>http://blog.beyourowndetective.net/2011/06/so-your-identity-is-stolen-what-is-4th.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-5953197703943347718</guid><pubDate>Tue, 07 Jun 2011 21:56:00 +0000</pubDate><atom:updated>2011-06-07T16:57:22.764-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">credit report</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>So Your Identity is Stolen - What is the 3rd Thing You Do?</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;For review - I will go over the four things you need to do if you are a victim of identity theft:&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;1. Place a fraud alert on your credit reports.&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222; line-height: 18px;&quot;&gt;2. Close the accounts that have been tampered with or have been fraudulently opened&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222; line-height: 18px;&quot;&gt;3. Make a police report&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222; line-height: 18px;&quot;&gt;4. File a complaint with the FTC&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222; font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222; font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;So here we are at number 3. &amp;nbsp;Making a police report. &amp;nbsp;You may wonder why I am even explaining the police report, but how you make the police report is very important. &amp;nbsp;It is not like making a burglary report, yet there are some things in common.&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222; font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;This particular police report has to include enough detail about the ID theft for the credit reporting agencies and other businesses involved to be able to verify that you are a victim. &amp;nbsp;They also need to be able to tell what accounts and fraudulent information came from identity theft. A normal police report often doesn&#39;t have enough details to&amp;nbsp;accomplish&amp;nbsp;your goals of correcting your credit.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;I recommend that you use the &lt;a href=&quot;http://www.ftc.gov/bcp/edu/resources/forms/affidavit.pdf&quot;&gt;identity theft affidavit&lt;/a&gt; form and incorporate this with your police report. This is for two reasons. &amp;nbsp;First, the information in the affidavit must be accepted by the credit reporting agencies when checking for fraudulent information. &amp;nbsp;Second, it helps you think about what all you need to include to the police, the credit reporting agencies and the FTC.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;Once this report is done a copy should be forwarded to the credit reporting agencies and the FTC to assist with you resolving your credit issues. &amp;nbsp;Whatever you do, stay safe!&lt;/span&gt;&lt;/span&gt;</description><link>http://blog.beyourowndetective.net/2011/06/so-your-identity-is-stolen-what-is-3rd.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-317909148286291049</guid><pubDate>Mon, 06 Jun 2011 00:44:00 +0000</pubDate><atom:updated>2011-06-05T19:44:06.160-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Find anyone</category><category domain="http://www.blogger.com/atom/ns#">missing women</category><title>Please Help Find This Missing Girl</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://idsnews.com/news/mfiles/photos/0000-_M-955982869.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;http://idsnews.com/news/mfiles/photos/0000-_M-955982869.jpg&quot; width=&quot;426&quot; /&gt;&lt;/a&gt;&lt;/div&gt;You can find more information at the &lt;a href=&quot;http://idsnews.com/news/story.aspx?id=81821&quot;&gt;Indiana Daily Student&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;Lauren Spierer, age 20.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;She just finished her sophomore year at IU. &amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;She is a white female, 4 feet 11 inches tall, slender build, has blue eyes and long blonde hair.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;Spierer was last seen walking south on College Avenue from 11th Street on her way back to her apartment in Smallwood Plaza, located on College Avenue.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;Anyone with information about Lauren Spierer should call BPD at 812-339-4477&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: georgia; font-size: 15px; line-height: 21px;&quot;&gt;Whatever you do - stay safe!&lt;/span&gt;</description><link>http://blog.beyourowndetective.net/2011/06/please-help-find-this-missing-girl.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-1923329729748649791</guid><pubDate>Sat, 28 May 2011 17:57:00 +0000</pubDate><atom:updated>2011-05-28T12:57:41.090-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">credit report</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>So Your Identity is Stolen - What is the Second Thing to Do?</title><description>&lt;b&gt;Close the accounts that have been tampered with or have been fraudulently opened&lt;/b&gt;: &amp;nbsp;I will not got into what to do first – you can just read about that &lt;a href=&quot;http://blog.beyourowndetective.net/2011/05/your-identity-is-stolen-what-do-you-do.html&quot;&gt;here&lt;/a&gt;. &amp;nbsp; What you need to do second is close tampered with or fraudulent accounts. &amp;nbsp;This involves careful study of your credit reports. &amp;nbsp;When you place a fraud alert on your credit reports, you get a free copy of your credit report from each of the three credit reporting companies.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Check your Credit Report Closely:&amp;nbsp;&lt;/b&gt;This brings up the whole notion of checking your own credit from time to time. &amp;nbsp;I suggest doing it three times a year. &amp;nbsp;Why three times a year? &amp;nbsp;You can do that for free. &amp;nbsp;You get a free credit report from each of the three credit reporting companies &lt;a href=&quot;http://www.annualcreditreport.com/&quot;&gt;once per year just for the asking&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;So how do you go about closing these accounts?&lt;/b&gt; &amp;nbsp;You need to contact the security department of the company and explain why you are closing the account(s). &amp;nbsp;Some companies require a police report to be able to close the account. &amp;nbsp;The police report is a later step, but if you need it to close the accounts, just send that in after the police report is made available. &lt;br /&gt;&lt;br /&gt;You should have pretty much all the information used to open the fake accounts from your credit report. &amp;nbsp;However, be sure to request all information used to open these accounts. &amp;nbsp;Companies must &lt;b&gt;by law&lt;/b&gt; give you a copy of the application or other business transaction records relating to your identity theft if you made a request in writing. Make sure you know where to mail the request. If you do not know, ask them. Companies are required to provide such records &lt;b&gt;at no cost&lt;/b&gt; to you. &amp;nbsp;They also must do it within 30 days of receipt of your request and any supporting documents. You also can ask that a copy of these records be sent to a particular law enforcement officer or agency. You may not be able to get all of that information without the previously mentioned police report.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;The Procedure: &lt;/b&gt;The company that opened the fraudulent account(s) should have a standard procedure for handling these cases. &amp;nbsp;It should be fairly straightforward and understandable steps you can take to close these accounts. &amp;nbsp; Be sure to notify credit card companies and banks in writing. &amp;nbsp;You need to include copies of any documentation you have - never send any originals. &amp;nbsp;Send the mail using priority mail or certified mail so you can track and document when it is delivered. &amp;nbsp;Most companies have special forms to dispute fraudulent transactions – be sure to get those and fill them out. &amp;nbsp;If the company already has reported these accounts or debts on your credit report, dispute this fraudulent information. &amp;nbsp;I will cover correcting your credit report later on in another post.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Do not panic:&lt;/b&gt; You are not liable and cannot be held liable for fraudulent purchases or fraudulently opened accounts. &amp;nbsp;The Fair Credit Billing Act limits your liability for unauthorized credit card charges to $50 per card. &amp;nbsp;So if you paid for special insurance for this, you may as well have been burning the money. &amp;nbsp;If it makes you feel better to spend money for this kind of “protection” you can send me the money. &amp;nbsp;I will give you a receipt and everything.&lt;br /&gt;&lt;br /&gt;Remember, this is only step 2 – you have a ways to go. &amp;nbsp;Identity theft takes a lot of time and effort to correct, but it is not an impossible task. &amp;nbsp;Whatever you do – Stay Safe!&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://blog.beyourowndetective.net/2011/05/so-your-identity-is-stolen-what-is.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-3161519892155714214</guid><pubDate>Wed, 25 May 2011 15:46:00 +0000</pubDate><atom:updated>2011-05-25T10:47:26.137-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">credit report</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>So Your Identity is Stolen - What Do You Do First?</title><description>&lt;b&gt;The first thing to do when you suspect your identity has been stolen:&lt;/b&gt;&lt;br /&gt;I have talked about identity theft before. Below I have talked about various ways to help protect yourself from identity theft, there is no way to totally protect yourself. Since there is no way to totally protect yourself, what I thought I would do is explain what to do if you become a big can of identity theft.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;First, how do you find out if you have been a victim of identity theft?&lt;/b&gt; That is a the very important question. The best way to &amp;nbsp;know that you have been a victim of identity theft is to be vigilant. You need to check your bank account statements very closely &lt;b&gt;on a regular basis&lt;/b&gt;. You need to run your own credit report. You can do this three times a year for free or in reality you can get one report once a year for free from each of the three credit reporting agencies. You can get these free reports for free only &amp;nbsp;through &lt;a href=&quot;http://www.annualcreditreport.com/&quot;&gt;www.annualcreditreport.com&lt;/a&gt;. If you find something on those reports that you should not have credit for or you have not borrowed money for, chances are you are a victim of identity theft. The same goes for expenditures from your bank account you did not make.&amp;nbsp;Here are some other common indicators that you may have been a victim of identity theft:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;You get a credit card that you never applied for&lt;/li&gt;&lt;li&gt;You get denied credit when you thought you had a good credit score&lt;/li&gt;&lt;li&gt;You get calls from debt collectors for debts you should not have&lt;/li&gt;&lt;li&gt;You have accounts you did not open and you have some accounts you cannot explain&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Okay, so now you know you&#39;re a victim of identity theft what do you do? The first thing you need to do is place a &lt;b&gt;fraud alert&lt;/b&gt; on your credit reports, and review your credit reports. &amp;nbsp;You are entitled to one free credit report from each of the three credit reporting companies. &lt;br /&gt;&lt;br /&gt;Here is how you contact them:&lt;br /&gt;&lt;b&gt;TransUnion:&lt;/b&gt; &lt;a href=&quot;http://www.transunion.com/&quot;&gt;www.transunion.com&lt;/a&gt;&lt;br /&gt;1-800-680-7289 &lt;br /&gt;Fraud Victim Assistance Division&lt;br /&gt;&amp;nbsp;P.O. Box 6790&lt;br /&gt;&amp;nbsp;Fullerton, CA 92834-6790&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Equifax: &lt;/b&gt;&lt;a href=&quot;http://www.equifax.com/&quot;&gt;www.equifax.com&lt;/a&gt;&lt;br /&gt;1-800-525-6285&lt;br /&gt;P.O. Box 740241&lt;br /&gt;&amp;nbsp;Atlanta, GA 30374-0241&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Experian:&lt;/b&gt; &amp;nbsp;&lt;a href=&quot;http://www.experian.com/&quot;&gt;www.experian.com&lt;/a&gt;&lt;br /&gt;1-888-397-3742&lt;br /&gt;&amp;nbsp;P.O. Box 9554&lt;br /&gt;&amp;nbsp;Allen, TX 75013&lt;br /&gt;&lt;br /&gt;After you have received the reports, you can check them to see what accounts and companies you have not done business with and get their information. &amp;nbsp;Make sure all the details are correct on the Credit Report like employer, your SSN, your name and initials. &amp;nbsp;If anything is fraudulent or inaccurate you can have it removed.&lt;br /&gt;Remember that this is only the first step in what to do when you are a victim of identity theft.&lt;br /&gt;I will further explain the next steps in a following post:&lt;br /&gt;&lt;br /&gt;2. Close the accounts that have been tampered with or have been fraudulently opened&lt;br /&gt;3. Make a police report&lt;br /&gt;4. File a complaint with the FTC&lt;br /&gt;&lt;br /&gt;Whatever you do - stay safe!</description><link>http://blog.beyourowndetective.net/2011/05/your-identity-is-stolen-what-do-you-do.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-4823381575647967683</guid><pubDate>Fri, 13 May 2011 19:39:00 +0000</pubDate><atom:updated>2011-05-13T14:47:43.347-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">find people</category><category domain="http://www.blogger.com/atom/ns#">people search</category><title>People Search - The Biggest Pain on the Internet</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;Sometimes you just need to dig deep to find people on the internet. &amp;nbsp;I will show you many a free tricks and one that will cost you money.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Now why do you suppose I would say that people searches the biggest pain on the Internet?&lt;/b&gt; This is why: If you&#39;ve ever tried to find someone on the Internet you more often than not find the wrong things.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;If you use Google this is what will happen:&amp;nbsp;&lt;/b&gt;Google seems to like to send you to secondary search engines or pay for search sites as some of the first responses whenever you put in someone&#39;s name. When you click on the responses, what you usually get is a pay site with little or no information. The pay that shows up does not even contain the name for which you searched. This is from the company that wants to give you &lt;i&gt;quality content&lt;/i&gt;&amp;nbsp;and send you to quality sites whenever you&#39;re looking for something. &amp;nbsp;The problem is, the site doesn&#39;t even contain the name.&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Why do I even mention the search on Google?&lt;/b&gt; &amp;nbsp;Because more than two thirds of us use Google as our primary search engine. &amp;nbsp;So why do I more often not get what I am looking for? &amp;nbsp;It is because of all the super duper tricks Google uses to try to find information. &amp;nbsp;Google attempts to anticipate what you want to find. &amp;nbsp;Unfortunately, it does not recognize people&#39;s names very well.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Ok - so you told me the problem - how do I fix it? &lt;/b&gt;The following hints should help you in your search-&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Put quote marks around the name you want. &amp;nbsp;If you know a middle initial use that too. A search for &quot;James R. Brown&quot; is much more likely to get some usable results than entering the name without quotes. &amp;nbsp;You can check the images page if you know what the person looks like.&lt;/li&gt;&lt;li&gt;Try using Yahoo&#39;s people search. &amp;nbsp;This is a specialized search engine designed to find people.&lt;/li&gt;&lt;li&gt;Search Facebook and other social networking sites. &amp;nbsp;You can do this using Google by typing facebook.com: before entering the name.&lt;/li&gt;&lt;li&gt;Two free places I use all the time are &lt;a href=&quot;http://www.whowhere.com/&quot; target=&quot;_blank&quot;&gt;whowhere.com&lt;/a&gt; and&lt;a href=&quot;http://www.peekyou.com/&quot; target=&quot;_blank&quot;&gt;Peekyou.com&lt;/a&gt;.Be sure to &lt;a href=&quot;http://ssdi.rootsweb.ancestry.com/&quot; target=&quot;_blank&quot;&gt;check if they are dead&lt;/a&gt; unless you know for sure otherwise.&lt;/li&gt;&lt;li&gt;One more really good deep digging site is &lt;a href=&quot;http://www.pipl.com/username/&quot; target=&quot;_blank&quot;&gt;Pipl&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;This is been a headache of mine for a long time. This is why you should just go to my site by clicking home above and searching there. Or, look to the right and you can search there. Those search places are more likely to give you a reasonable response than any others.</description><link>http://blog.beyourowndetective.net/2011/05/people-search-biggest-pain-on-internet.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-7258311119303102801</guid><pubDate>Wed, 11 May 2011 00:18:00 +0000</pubDate><atom:updated>2011-05-10T19:18:24.133-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cell phone blocking</category><category domain="http://www.blogger.com/atom/ns#">cell phone spy</category><title>New Cell Phone Notification System - US behind 3rd World Countries</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-VLv_POsbLos/TcnVRdEkjmI/AAAAAAAAA1M/leAC6gRBtEQ/s1600/sophie_monk_on_cell_phone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://4.bp.blogspot.com/-VLv_POsbLos/TcnVRdEkjmI/AAAAAAAAA1M/leAC6gRBtEQ/s320/sophie_monk_on_cell_phone.jpg&quot; title=&quot;Sexy Sophie Monk receives emergency message on her cell phone&quot; width=&quot;213&quot; /&gt;&lt;/a&gt;&lt;/div&gt;I&amp;nbsp;started&amp;nbsp;this article with the headline, because it is so true. &amp;nbsp;There are articles out there about a &quot;new&quot; notification system that will notify &quot;high end phones&quot; with emergency notifications. &amp;nbsp;They make it like a special app or chip would be required to do this - that is bunk!&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What has been happening in 3rd world countries&lt;/b&gt;: &amp;nbsp;In many if not all 3rd world countries the notification of emergency information has been distributed through cell phone texts for quite some time. &amp;nbsp;No special phones, system or app was ever needed. &amp;nbsp;The phone company simply sent the message(s) to all cell phone numbers. &amp;nbsp;Cell phone companies have the same capabilities now.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;How we could do it right now to all cell phones today:&lt;/b&gt; The FCC could mandate certain emergency messages be sent - much like the Emergency Broadcast System (EBS) since cell phones are indeed radios. &amp;nbsp;Cell phone service providers send out free messages all the time - these emergency messages could be done the same way.&lt;br /&gt;&lt;br /&gt;Why anyone would install, build, or develop a system to do this is crazy - the system already exists. &amp;nbsp;I smell a boondoggle and a waste of taxpayer money (again). &amp;nbsp;This isn&#39;t a big brother thing - it is a community service.&lt;br /&gt;&lt;br /&gt;Whatever you do - stay safe!</description><link>http://blog.beyourowndetective.net/2011/05/new-cell-phone-notification-system-us.html</link><author>noreply@blogger.com (Barry)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-VLv_POsbLos/TcnVRdEkjmI/AAAAAAAAA1M/leAC6gRBtEQ/s72-c/sophie_monk_on_cell_phone.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-602290978463363156</guid><pubDate>Sun, 01 May 2011 16:31:00 +0000</pubDate><atom:updated>2011-05-01T11:31:54.249-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">be your own detective</category><title>The Best Detective Tool You can Ever Use</title><description>Someone asked &amp;nbsp;me a question about the best detective gizmos and tools out there. &amp;nbsp;I thought for a second and told him he was. &amp;nbsp;He looked at me with a puzzled look. &amp;nbsp;The explanation is simple. &amp;nbsp;There are tons of &lt;a href=&quot;http://www.dpbolvw.net/e1100iqzwqyDHNGGGMNDFEKHMHGG&quot; target=&quot;_blank&quot;&gt; great detective tools out there&lt;/a&gt;&lt;img border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.ftjcfx.com/q198g04tzxIMSLLLRSIKJPMRMLL&quot; width=&quot;1&quot; /&gt;, but in reality, the detective is the most important tool. &amp;nbsp;You are only limited by your own imagination as to how to use what you already have. &lt;br /&gt;&lt;br /&gt;If you have a cell phone, a voice recorder, and a camera you have all the basic investigative tools you need. &amp;nbsp;Sure it is nice to have that super-stealth hidden camera - but if you do not know when and where to put it - then it doesn&#39;t matter. &amp;nbsp;I remember working undercover or directing undercover operations and we had a very limited amount of tools. &amp;nbsp;We would have to borrow a &quot;wire&quot; from other agencies to use. &amp;nbsp;Now - for about a 10th of the price anyone can buy a good wireless mic and even camera system. &lt;br /&gt;&lt;br /&gt;My point is that you can use almost any technology - even an old cassette recorder to conduct investigations. &amp;nbsp;Just think of what you need to find out and from whom and you are most of the way there. &amp;nbsp;I cannot emphasiz this enough with spy equipment - try it, test it and practice with it before you put it where you need it. &amp;nbsp;You will learn a lot about where it can and cannot work.&lt;br /&gt;&lt;br /&gt;Remember - whatever you do - be safe</description><link>http://blog.beyourowndetective.net/2011/05/best-detective-tool-you-can-ever-use.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-8551387005387699084</guid><pubDate>Thu, 21 Apr 2011 20:03:00 +0000</pubDate><atom:updated>2011-04-21T15:03:30.259-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cell phone spy</category><title>iPhone Logging of Locations a Bug? -Not!</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;Error!, Error! Error!&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;&lt;iframe allowfullscreen=&quot;&quot; caption=&quot;Error, Error, Error&quot; frameborder=&quot;0&quot; height=&quot;390&quot; src=&quot;http://www.youtube.com/embed/SVPWpE_SlUc&quot; title=&quot;YouTube video player&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;On Wednesday a couple of clever guys released that iPhones were logging the locations of the phones of everywhere someone takes the phone.&amp;nbsp; In an article by Neil Huges at &lt;a href=&quot;http://www.appleinsider.com/articles/11/04/21/ios_location_tracking_file_likely_a_bug_apple_could_address_issue_with_next_udpate.html&quot;&gt;Appleinsider.com&lt;/a&gt; he tells us that John Gruber of Daring Fireball says he has been told it is in fact an error. &quot;My little-birdie-informed understanding is that consolidated.db acts as a cache for location data, and that historical data should be getting culled but isn&#39;t, either due to a bug or, more likely, an oversight,&quot; Gruber wrote.&amp;nbsp; Riiiight. An error?&lt;br /&gt;&lt;br /&gt;What happens with this&lt;i&gt; error&lt;/i&gt; is: &lt;i&gt;&quot;Ever since iOS 4 arrived, your device has been storing a long list of locations and time stamps. We&#39;re not sure why Apple is gathering this data, but it&#39;s clearly intentional, as the database is being restored across backups, and even device migrations. &quot;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;The only &lt;i&gt;error&lt;/i&gt; is that the information leaked out. &lt;i&gt;&quot;What makes this issue worse is that the file is unencrypted and unprotected, and it&#39;s on any machine you&#39;ve synched with your iOS device. It can also be easily accessed on the device itself if it falls into the wrong hands. Anybody with access to this file knows where you&#39;ve been over the last year, since iOS 4 was released.&quot;&lt;/i&gt;&amp;nbsp; Read more where I got both quote from at &lt;a href=&quot;http://radar.oreilly.com/2011/04/apple-location-tracking.html&quot;&gt;O&#39;Reilly Radar&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;This is already trying to be played off as an error.&amp;nbsp; It is obvious that this information is used for advertisers or certain apps that try to get information on people&#39;s habits to try to sell them more stuff.&amp;nbsp; The downside is the huge security issue. &lt;br /&gt;&lt;br /&gt;Cell phone companies have always had access to this information since the emergence of the e911 system.&amp;nbsp; However, it is only available to those with a court order to get it.&lt;br /&gt;&lt;br /&gt;Remeber - whatever you do - Stay Safe!</description><link>http://blog.beyourowndetective.net/2011/04/iphone-logging-of-locations-bug-not.html</link><author>noreply@blogger.com (Barry)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/SVPWpE_SlUc/default.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-9047266587634696842</guid><pubDate>Thu, 21 Apr 2011 18:08:00 +0000</pubDate><atom:updated>2011-04-21T13:08:46.302-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>What&#39;s In Your Wallet?</title><description>NO, this isn&#39;t a Capital One Commercial.&amp;nbsp; What is in your wallet is a two pronged question for today&#39;s post.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;First prong:&lt;/b&gt;&amp;nbsp; There is often a lot of information in a wallet that will identify a person.&amp;nbsp; If you need to know who someone is, and you get a chance to rifle through their wallet - you can confirm a lot of stuff.&amp;nbsp; Most people carry too much information in their wallet.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Second prong:&lt;/b&gt;&amp;nbsp; Do you know what all you carry in your wallet?&amp;nbsp; Does it include stuff you should not carry around like a Social Security card?&amp;nbsp; Do you have other information that not only identifies you, but other people as well?&amp;nbsp; Check your wallet.&amp;nbsp; I know there are things you need like some credit cards and driver&#39;s license.&amp;nbsp; Depending on your profession, you may need other ID&#39;s also.&amp;nbsp; Just do not give away any more than you absolutely have to if you lose your wallet - for your own sake.&lt;br /&gt;&lt;br /&gt;Whatever you do - Stay Safe!</description><link>http://blog.beyourowndetective.net/2011/04/whats-in-your-wallet.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-3614205915747428427</guid><pubDate>Mon, 18 Apr 2011 18:26:00 +0000</pubDate><atom:updated>2011-04-18T13:26:40.956-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">mobile phone spyware</category><title>Snooping - While Not Illegal, Can Still Be Bad</title><description>&lt;a href=&quot;http://2.bp.blogspot.com/-U-eV-XynJlk/TayB9GWcAPI/AAAAAAAAA0A/bH-eRPEIbrI/s1600/snoopy-woman-phone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;189&quot; src=&quot;http://2.bp.blogspot.com/-U-eV-XynJlk/TayB9GWcAPI/AAAAAAAAA0A/bH-eRPEIbrI/s320/snoopy-woman-phone.jpg&quot; title=&quot;Women want to snoop on your phone&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Snooping is not necessarily illegal, but it is something that is considered bad.&amp;nbsp; If you invite me over to your place for coffee and I am rifling through you mail and checking out all of your magazines - what would you think?&lt;br /&gt;&lt;br /&gt;There are apps on smartphones that snoop on people and they may or may not tell you they are snooping on you.&amp;nbsp; They use your own phone to listen to what you are listening to or watching.&amp;nbsp; Three of these apps are &lt;b&gt;Color&lt;/b&gt;, &lt;b&gt;IntoNow&lt;/b&gt;&lt;b&gt;&lt;/b&gt; and &lt;b&gt;Shopkick&lt;/b&gt;, all of which activate the microphones in users&#39; iPhone&amp;nbsp; or Android in order to gather information that provides &quot;some benefit to the user.&quot; &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Color&lt;/b&gt; is a free app that can detect your location and will share your photos with other &lt;b&gt;Color&lt;/b&gt; users within 100 feet of you. It will also show you all of their photos. Not only that, but with &lt;b&gt;Color&lt;/b&gt;, every photo and video is public. There is no way to determine who to follow or only your family and friends. The app shares your images with any nearby stranger who is also using &lt;b&gt;Color&lt;/b&gt;.&amp;nbsp; If you value privacy - I&amp;nbsp; recommend you do &lt;b&gt;not&lt;/b&gt; use Color.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;IntoNow&lt;/b&gt; listens with your iPhone or iPad&amp;nbsp; to identify what shows you are watching. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Shopkick&lt;/b&gt; is supposed to reward users for simply walking into participating stores like Target, Best Buy, and many others. Users don&#39;t have to do anything because their phone is already listening for particular sounds generated in the stores by a special device. - Very Snoopy!&lt;br /&gt;&lt;br /&gt;So many apps do so many things.&amp;nbsp; Do you know what apps are spying on  you.&amp;nbsp; Of course if you want real spy stuff that tracks everything look  to the ad on the right - it works great. &lt;br /&gt;&lt;br /&gt;The question is - what all do they listen to? I bet they don&#39;t tell you.&amp;nbsp; Be careful what you install.&amp;nbsp; Value your privacy - whatever you do - Be Safe!</description><link>http://blog.beyourowndetective.net/2011/04/snooping-while-not-illegal-can-still-be.html</link><author>noreply@blogger.com (Barry)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-U-eV-XynJlk/TayB9GWcAPI/AAAAAAAAA0A/bH-eRPEIbrI/s72-c/snoopy-woman-phone.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-961553532110580277</guid><pubDate>Thu, 14 Apr 2011 16:58:00 +0000</pubDate><atom:updated>2011-04-14T12:00:00.090-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">spy gear</category><title>Cool New Stealth Voice Recorder</title><description>I was browsing through &lt;a href=&quot;http://www.jdoqocy.com/click-3922289-10636218?sid=blog&quot;&gt;Brickhouse Security&#39;s Catalog&lt;/a&gt; today.&amp;nbsp; I saw a really cool voice recorder.&amp;nbsp; It really is not a surprise, but a great stealth tool for recording conversations without notice.&amp;nbsp; This recorder looks exactly like a memory stick.&amp;nbsp; &lt;a href=&quot;http://www.anrdoezrs.net/click-3922289-10636440?sid=blog&amp;amp;url=http%3A%2F%2Fwww.brickhousesecurity.com%2Fusb-voice-recorder.html&amp;amp;cjsku=usb-voice-recorder&quot; onmouseout=&quot;window.status=&#39; &#39;;return true;&quot; onmouseover=&quot;window.status=&#39;http://www.BrickHouseSecurity.com&#39;;return true;&quot; target=&quot;_blank&quot;&gt;&lt;img align=&quot;left&quot; alt=&quot;Covert USB Flash Drive Audio Recorder&quot; border=&quot;0&quot; src=&quot;http://feeds2.yourstorewizards.com/2583/images/200x200/usb-voice-recorder.jpg&quot; /&gt;&lt;/a&gt;&lt;img border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.ftjcfx.com/image-3922289-10636440&quot; width=&quot;1&quot; /&gt; Oh, and it is a memory stick.&amp;nbsp; Better yet - you do not need any software to use this thing.&amp;nbsp;&amp;nbsp;&amp;nbsp; It lasts about 4 hours on a battery charge and you have a choice of 2 GB or 8GB for $50 bucks more.&lt;br /&gt;&lt;br /&gt;I am getting one for sure.&amp;nbsp; I will likely get several before the years end.&amp;nbsp; I can see a real need for these things in my line of work for sure.&lt;br /&gt;&lt;br /&gt;Remember all of the laws in your own state about recordings.&amp;nbsp; In Texas, if I use the recorder, I can use the recording - as long as I was there when the conversation took place (1 party state).&lt;br /&gt;&lt;br /&gt;Whatever you do - Be safe!</description><link>http://blog.beyourowndetective.net/2011/04/cool-new-stealth-voice-recorder.html</link><author>noreply@blogger.com (Barry)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-853059776634175909.post-229975126283058164</guid><pubDate>Wed, 06 Apr 2011 15:29:00 +0000</pubDate><atom:updated>2011-04-06T10:40:39.112-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">background check</category><category domain="http://www.blogger.com/atom/ns#">background history</category><title>15 Ways to Verify Who Someone Is</title><description>&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-36GDJCFDXBM/TZyGSqNVg_I/AAAAAAAAAz0/-fYw5XnRoNw/s1600/check+-him-out.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;http://3.bp.blogspot.com/-36GDJCFDXBM/TZyGSqNVg_I/AAAAAAAAAz0/-fYw5XnRoNw/s320/check+-him-out.jpg&quot; title=&quot;Two hot women check out a guy&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;I often get asked &quot;Where do I start?&quot; if you want to learn about a first date or someone you have just met.&amp;nbsp; What I am going to tell you is: &lt;b&gt;be nosy.&lt;/b&gt;&amp;nbsp; Here is a list of 15 ways you can begin to verify someone is who they say they are:&lt;/div&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;COMMUNICATION: &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;1. Cell Phone&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – You can get a name and address from a cellular number. Right now you can get information for only &lt;a href=&quot;http://beyourowndetective.net/adv-phonesearch.html&quot;&gt;$1 from Beyourowndetective.net&lt;/a&gt;.&amp;nbsp; Remember that Pre-Paid cell phones are almost impossible to trace. In the old days (a couple of years ago) Pre-Paid phones would be a warning sign – not so much now.&amp;nbsp; Lots of smart folks use them.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;2. Email Address&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – Even if all you have is an email address, you can check online sources such as Google to see if the person has posted their name on a Blog, Forum, Newsgroup, or Facebook. This is not the most reliable source – but it can help.&amp;nbsp; You can also &lt;a href=&quot;http://beyourowndetective.net/index.html&quot;&gt;trace an email at our home page&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;3. Voicemail&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – Call them when you do not expect an answer.&amp;nbsp; You never know what you can find out from a simple answering message.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;4. Land Line&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – If you get to their house/apt or whatever, call a phone you know has caller ID.&amp;nbsp; This can verify who they are.&amp;nbsp; Better yet – get them to call you from the line.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;THEIR PLACE:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;5. Address&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – Once again, if you go to their house, you can check the name with a criss-cross at the library or a white pages site on the internet. &amp;nbsp;You could even contact the neighbors under &amp;nbsp;pretext to verify any names given.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;6. Mail&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – No, don’t open the mail.&amp;nbsp; Just read to whom it is addressed.&amp;nbsp; Do not get mail out of the mailbox&amp;nbsp;&amp;nbsp; - that is a Federal Offense.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;7. Bills&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – Same story as the mail.&amp;nbsp; Bills are a great source of information.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;b&gt;Checks or Credit Cards&lt;/b&gt; – Remember, I started this off with a “be nosey” thing.&amp;nbsp; So read the name on the card, name and address on the check if you can see one.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;8. Medicine&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – The Medicine cabinet can be a gold mine.&amp;nbsp; Not only does it say who the person is, but you can have an idea of health issues.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;9. Magazines&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – This can tell you their work or hobbies and the mailing label can help.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;10. Trash&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – I have a whole post or 2 on going through the trash.&amp;nbsp; If you really want to know someone, know their trash.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;THEIR VEHICLE:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;11. License Plate&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – Yes, I am talking about being that paranoid.&amp;nbsp; Write down the plate number.&amp;nbsp; Most states will give you a registration return for a small fee. Let’s hope that the name matches the return.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;12. Glove Box&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – This can be helpful, especially with insurance cards and the like.&amp;nbsp; No telling what else you will find in there.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;13. Ashtray/Coin Bin: &lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;All sorts of stuff gets left here that can tell you about the person you met.&amp;nbsp; Do they smoke?&amp;nbsp; Do they smoke dope? Often stuff from places/restaurants they visit are left there. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;OTHER STUFF:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;14. Co-Workers&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – If you know where they work, as fellow co-workers about them.&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;15. Wallet&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt; – Now to me, this is a sign of total distrust.&amp;nbsp; If you are caught going through a wallet, you probably no longer will have a relationship.&amp;nbsp; Yes, there is a lot of information there.&amp;nbsp; Yes, it has the good stuff.&amp;nbsp; Maybe you can make a game out of sharing wallets.&amp;nbsp; Like I said before, it is a sign of total distrust.&lt;br /&gt;&lt;br /&gt;Think of all the things around your own place with your name on it.&amp;nbsp; Check the same stuff out.&amp;nbsp; All of this nosiness can pay off, especially if the person is not who they say they are.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;WARNING SIGNS&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt; - If this person will only give you their cell number, this could be because they are married or living with someone and don&#39;t want you calling the house. Or it could be they only have a cell phone.&amp;nbsp; If it seems like they never want you to go to their place and only want to meet at restaurants, clubs, and the like and they only want to go to YOUR place, they may have a &quot;roommate&quot; or spouse they don&#39;t want you to know about.&amp;nbsp; That is not necessarily the case with women.&amp;nbsp; In reality, a woman should NEVER let a man she doesn’t know come to her house on the first few dates (call me sexist). If you met online, never meet at homes, but instead public places until you feel comfortable with the other person.&amp;nbsp; If they say they are divorced, be sure to VERIFY the county records. More often than not, I have run across people who say they are divorced when they are only &quot;separated&quot; for a short time. Often times the &quot;separation&quot; only lasts until the spouse gets back home. &lt;br /&gt;&lt;br /&gt;These are a few of the ideas you can use. Run a background check.&amp;nbsp; Not just to see if they are a criminal or sex offender.&amp;nbsp; Also see if this person is married. How many times have they been married and are they still married?&amp;nbsp; Are they being sued? Are they in Bankruptcy? Do they really own the business they claim to? Do they really own the nice car the are in or are they just leasing?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Century Gothic&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;Remember, whatever you do - stay safe!&lt;br /&gt;&lt;/span&gt;</description><link>http://blog.beyourowndetective.net/2011/04/15-ways-to-verify-who-someone-is.html</link><author>noreply@blogger.com (Barry)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-36GDJCFDXBM/TZyGSqNVg_I/AAAAAAAAAz0/-fYw5XnRoNw/s72-c/check+-him-out.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>