Author Box
Articles Categories
All Categories
Articles Resources

10 Tips for Conducting a Preliminary Online Private Investigation

June 14, 2012 | Comments: 0 | Views: 252

In the past, private investigators and attorneys spent a great deal of their investigative time in the field.Traditional methods of gathering evidence involve interviewing witnesses, friends, family members and acquaintances, examining crime scenes, taking photographs, conducting undercover surveillance and visiting libraries and dingy storage rooms to hunt down dusty records.

While there is certainly no substitute for hiring a professional to spend time gathering physical evidence in the field, today an important part of an investigation can be preliminarily accomplished with nothing more than a telephone, reliable laptop and an Internet connection.Conducting thorough and successful preliminary online investigations can generate substantial value before ever setting foot in the field.

Here are some tips for conducting an effective preliminary online private investigation to gather background information about a subject:

  1. Take detailed notes.Don't rely on your memory to keep track of the thousands of pieces of data that you will encounter.Write down all the searches you have run and catalogue all the relevant results.
  2. Start with the major search engines. Google, Yahoo, Bing and other free Internet search engines are always the best place to begin gathering leads for your preliminary investigation.However, remember to try using a variety of search strings to broaden or narrow your search.For example, searching for "John Smith" is going to be too broad, but searching for "John Albert Smith, owner of a Brooklyn construction company" may be too narrow.By constantly applying a variety of flexible search terms, you will ensure that you don't accidentally exclude potentially valuable results.Also, if you locate a target's e-mail address, make sure to search for it in quotes.Such a search may reveal blog comments or other relevant information.
  3. Maps:GoogleMaps and Mapquest offer satellite and street views of relevant address locations.Getting directions to and from relevant locations may also suggest frequent routes of travel worth exploring.
  4. Social Media sites:Today, many people will openly reveal a treasure trove of information about themselves on social networking sites without even realizing it.Even a basic profile on Facebook or LinkedIn can contain valuable information about where the person you are searching for is currently working and where they went to high school or college.Once you have identified a target's profile on a social media site, expand your search efforts to catalogue their family, friends, contacts and those who they are associated with in photographs.
  5. Property records:Once you have located a physical street address of interest, you will want to find out who owns it.Many local governments offer free building and property search records online, and third-party sites and freely offer a tremendous amount of data including photographs, estimated property values, square footage, property taxes paid, as well as neighbor's names.
  6. Websites/Domain Names:If you are investigating a target that may own a domain name or website, there is a rich amount of data that can be gathered from analyzing the history of those sites.For example, "Whois" information, IP addresses and source code can reveal a great deal about who is actually operating a website or domain name.Additional information about a company can be attained by conducting a domain search on a website like DomainTools provides detailed registration information for a website, a related mailing address, information about past versions of a website, and other related contact information.
  7. Online telephone directories: A reverse phone lookup can be used to find name and address information about a phone number. Intelius-powered public records searches can return useful information about a person. For example, a search of a name will give you information about the person's age as well as names of potential relatives.For more detailed information, one can buy a specialized report from Intelius for a fee.
  8. Pick up the telephone:Various telephonic methods exist for finding the owner of a business or other related information.Such methods could be as simple as placing a telephone call to the business itself, contacting its licensing or regulatory agency, or searching various other online sources.
  9. Obituaries:Often a target's name will appear in obituaries about a deceased relative.Obituaries usually list a variety of information about the decedent including dates of birth and death, last known address, identities of their next of kin, as well as educational and employment history.
  10. Criminal Records and Lawsuits:There are several paid services online where you can find out details of a target's criminal records and civil lawsuits.Keep in mind that in most cases, so-called "free" sites are simply marketing tricks to get you to pay for the information you need.However, sites such as offer some limited information for offers a service to look for records of recent civil litigations.

By investing time and effort conducting a thorough preliminary online investigation, you can focus your efforts on the right target.

Joseph C. Gioconda, Esq. is an experienced Intellectual Property attorney and consultant, and the founder of the GIOCONDA LAW GROUP PLLC (, a New York City-based brand protection and anti-counterfeiting law firm. He is also the CEO of RogueFinder LLC ( which finds and targets "rogue websites."

Source: EzineArticles
Was this Helpful ?

Rate this Article

Article Tags:

Online Private Investigation


Private Investigation


Search Records Online

Windows 8 will change the way you work and play, says Microsoft and we agree. Nearly all of the previous iterations of the Windows OS have been evolutionary but Windows 8 is set to change all that.

By: Sakshi Sharma l Computers & Technology > Mobile Computing l April 03, 2013 lViews: 662

Many antivirus programs available today have various features but it entirely depends on the user to make the best choice from among these different computer virus protection programs online. Before

By: Alex l Computers & Technology > Software l December 28, 2012 lViews: 370

You can add a new color to your entertainment life with iskysoft video converter for mac & iskysoft dvd creator for mac and make your Christmas holidays all the more special. iskysoft video

By: Zaithyn Galter l Computers & Technology > Software l December 23, 2012 lViews: 1070

The choices you make regarding the type of recruiting software you choose to use are important. Being an informed consumer is essential to getting a system or components that complement systems of

By: Maria Warne l Computers & Technology > Software l December 14, 2012 lViews: 305

The Cisco certification has become the most popular IT training in recent days and it offers three different levels of these certifications include as: associate, professional and expert-level.

By: sandidas chakma l Computers & Technology > Certification Tests l December 11, 2012 lViews: 236

Millions of prospective 12th standard students are gearing up their preparations for the Joint Entrance Exam for engineering seats. From 2013, it has been decided by the IITs, CBSE, JEE organizing

By: Sarkariexam l Computers & Technology > Certification Tests l December 07, 2012 lViews: 633

Users of the game Diablo III have had many of their online valuables wrongfully stolen from them. Some of the valuables consist of online currency and precious hard to obtain gear.

By: David Kyl Computers & Technology > Computer Forensicsl June 21, 2012 lViews: 156

SCADA typically refers to computer based industrial control system which basically aids to monitor and control facility based industrial processes and infrastructure. Here industrial processes

By: Ananta Modakl Computers & Technology > Computer Forensicsl June 20, 2012 lViews: 182

The reason why the PCI DSS is often seen as overly prescriptive and over-bearing in its demands for so much security process is that card data theft still happens on a daily basis. What's more

By: Mark Kedgleyl Computers & Technology > Computer Forensicsl June 20, 2012 lViews: 149

Since the birth of computers and computer crimes, a relatively new field called computer forensics has served to expertly retrieve data or evidence from these devices. There are various computer

By: Samora Jinqual Computers & Technology > Computer Forensicsl June 13, 2012 lViews: 156

The best SEO companies provide e-marketing services. These firms train online businesses specifically small-scale proprietors to sell their merchandise in a highly cost effective way to intended

By: Roy Allensl Computers & Technology > Computer Forensicsl June 12, 2012 lViews: 152

When an individual (known as a Registrant) creates and registers a new Internet domain name, he leaves clues, pieces of a large complex data puzzle, behind. Understanding and interpreting these clues

By: Joseph C Gioconda, Esql Computers & Technology > Computer Forensicsl June 11, 2012 lViews: 147

When an individual (known as a Registrant) creates and registers a new Internet domain name, he leaves clues, pieces of a large complex data puzzle, behind. Understanding and interpreting these clues

By: Joseph C Gioconda, Esql Computers & Technology > Computer Forensicsl June 11, 2012 lViews: 147

Those involved in the struggle against online piracy have raised a host of questions about the phenomenon of websites selling counterfeit products. Who is really behind it? Why are "rogue websites"

By: Joseph C Gioconda, Esql Computers & Technology > Computer Forensicsl May 31, 2012 lViews: 197

  Many companies require their employees to agree to written policies that clarify Intellectual Property ownership of employment-related work product. The typical form of such a written policy

By: Joseph C Gioconda, Esql Legal > Employment Lawl May 31, 2012 lViews: 268

Anonymity on the Internet is a major impetus behind online chaos and counterfeiting. Requiring registrants of domain names to disclose verifiable identifying information would go a long way toward

By: Joseph C Gioconda, Esql Legal > Cyber Lawl May 31, 2012 lViews: 222

Discuss this Article

comments powered by Disqus