The Everyday Investigation Starter Pack
Your full-send playbook for surveillance, evidence, legal battles & catching liars—all free or dirt cheap.
What You’re Walking Away With
400+ free tools. 50+ GitHub repos. Cheap hardware lists. Templates for everything. Step-by-step guides for people who’ve never done this before.
Whether someone’s lying to your face, hiding money, tracking your phone, or making your life hell at work—this is how you fight back without dropping $10K on lawyers.
Why This Actually Matters
You don’t need money to protect yourself. You need information.
This guide turns “I have no idea what to do” into “I have receipts, evidence, and a plan.”
Cheating spouse. Toxic coworker. Sketchy neighbor. Messy divorce. You’re covered.
What’s Inside
Recover deleted texts, photos & app data (free tools + the apps cheaters hide stuff in)
Find anyone’s digital footprint using free OSINT tricks
Prep for court testimony like a pro witness
Detect hidden cameras, GPS trackers & phone spyware
Build an airtight HR case that actually works
Protect your assets legally before/during/after marriage
Win neighbor disputes without expensive lawyers
Catch catfish & verify anyone’s real identity online
PART 1: PHONE & DIGITAL FORENSICS
Your Phone Remembers Everything. Even The Deleted Stuff.
Deleted texts aren’t really deleted. They’re just marked “okay to overwrite.” Until something else takes that space, they’re sitting there waiting to be found. The faster you act, the more you recover.
🕳️ SECRET APPS CHEATERS USE (Know What to Look For)
Calculator & Vault Apps (Look Innocent, Hide Everything)
| App Name | What It Looks Like | What It Actually Does |
|---|---|---|
| Calculator+ | Basic calculator | Hidden photo/video vault behind fake calculator |
| Private Photo Vault | Generic folder icon | Password-protected media storage |
| Keepsafe | Lock icon | Encrypted photo hiding |
| Vaulty | Calculator icon | Hidden gallery with decoy password |
| Hide It Pro | “Audio Manager” | Secret vault disguised as audio app |
| CoverMe | Messaging app | Self-destructing messages + private vault |
Encrypted Messaging (Messages That Disappear)
| App | Why Cheaters Love It |
|---|---|
| Signal | End-to-end encryption, disappearing messages |
| Telegram | Secret chats, self-destruct timer |
| Wickr | No phone number needed, auto-delete |
| Dust | Messages vanish after reading |
| Confide | Screenshot-proof, disappearing text |
Fake/Burner Apps
| App | What It Does |
|---|---|
| TextNow | Free second phone number |
| Google Voice | Hidden second number |
| Burner | Disposable phone numbers |
| TextFree | Anonymous texting |
Red flag behaviors: Phone always face-down. New apps you don’t recognize. “Audio Manager” that isn’t for audio. Calculator app opened suspiciously often.
🆓 FREE & CHEAP RECOVERY TOOLS
Cloud Backdoors (CHECK THESE FIRST - Easiest Wins)
| Platform | Where to Look | What You Might Find |
|---|---|---|
| Google Drive | drive.google.com → Backups | Full device backups with messages |
| iCloud | icloud.com → Messages/Backups | Synced messages, photos, call logs |
| Settings → Chats → Chat backup | Message history in Google Drive/iCloud | |
| Samsung Cloud | samsung.com/account | Samsung device backups |
| Google Photos | photos.google.com | Auto-synced images they forgot about |
Apps That Actually Work
| Tool | Platform | Cost | What It Does | Success Rate |
|---|---|---|---|---|
| DiskDigger | Android | Free | File system recovery | |
| Dr. Fone | Both | $50-70 | Texts, WhatsApp, media | |
| PhoneRescue | Both | $50 | Deep recovery | |
| EaseUS MobiSaver | Both | Free/Paid | Device + cloud recovery | |
| Tenorshare UltData | Both | $50 | iOS specialist | |
| iMobie PhoneRescue | Both | $50 | iTunes/iCloud recovery |
Pro-Level Tools (For Serious Cases)
| Tool | Cost | Court-Ready? | Notes |
|---|---|---|---|
| Cellebrite UFED | $15K-40K | Industry standard, what cops use | |
| Oxygen Forensic | $5K+ | Encrypted app recovery | |
| MOBILedit Forensic | $100-500 | Mid-range, solid reports | |
| Magnet AXIOM | $3K+ | Deep mobile analysis | |
| XRY by MSAB | $5K+ | Used by law enforcement |
⚠️ BEFORE YOU TOUCH ANYTHING - READ THIS
STOP. This determines if you recover anything or lose everything.
The Rules
- STOP using the phone immediately → Every new text/photo/app overwrites deleted data
- Don’t install apps ON the phone → Run recovery tools from a computer
- Check cloud backups FIRST → Often has everything without touching the device
- Turn off the phone if possible → Prevents automatic overwrites
- Put it in airplane mode → Stops incoming data from overwriting
What Affects Your Success
| Factor | Impact |
|---|---|
| Hours = great odds. Days = okay. Weeks = maybe. Months = unlikely | |
| Bigger phone = more space for remnants to survive | |
| Heavy user = data gets overwritten faster | |
| Newer iPhones with full encryption = much harder | |
| Flash memory “forgets” slower than traditional storage |
For Court Cases
If you need this for legal proceedings:
- Document the chain of custody (who touched it, when, where)
- Generate hash values immediately (proves file wasn’t tampered)
- Consider hiring a certified forensic examiner
- Screenshots alone are WEAK—judges want verified forensic extraction
Making Digital Evidence Court-Ready
Screenshots = Weak. Forensic extraction = Strong. Here’s the difference.
A screenshot can be Photoshopped in 30 seconds. Forensic evidence has a digital fingerprint (hash) that proves it wasn’t modified. Courts know the difference.
📋 CHAIN OF CUSTODY CHECKLIST (Print This)
Document EVERYTHING. This is what makes evidence admissible.
Required Documentation
EVIDENCE COLLECTION LOG
=======================
Device: _______________________________________________
Make/Model: ___________________________________________
Serial Number: ________________________________________
IMEI (if phone): ______________________________________
Collection Date: ______________________________________
Collection Time: ______________________________________
Collection Location: __________________________________
Collected By (print name): ____________________________
Collected By (signature): _____________________________
HASH VALUES (run immediately after collection):
MD5: _________________________________________________
SHA256: ______________________________________________
Storage Location: ____________________________________
Access Log:
- Date/Time | Person | Purpose | Signature
- ________|________|_________|__________
- ________|________|_________|__________
Why This Matters
Without documentation, opposing counsel says “this could be fabricated” and your evidence becomes worthless. With it, you have court-admissible proof.
🆓 FREE FORENSIC TOOLS (The Actually Good Stuff)
| Tool | Link | What It Does | Skill Level |
|---|---|---|---|
| Autopsy | sleuthkit.org/autopsy | Full forensic analysis, timeline, keyword search | Intermediate |
| FTK Imager | exterro.com/ftk-product-downloads | Disk/memory imaging, hash reports | Beginner |
| CAINE Linux | caine-live.net | Bootable forensic OS, auto write-block | Intermediate |
| Volatility 3 | github.com/volatilityfoundation/volatility3 | Memory/RAM forensics | Advanced |
| Bulk Extractor | github.com/simsong/bulk_extractor | Scans without parsing filesystem | Intermediate |
| ExifTool | exiftool.org | Metadata extraction (when/where photo taken) | Beginner |
| Wireshark | wireshark.org | Network traffic analysis | Advanced |
| NetworkMiner | netresec.com | Network forensic analyzer | Intermediate |
💻 HASH VERIFICATION (Proves Files Weren't Tampered)
Run these commands IMMEDIATELY after collecting evidence. Save the output.
Windows PowerShell
Get-FileHash C:\path\to\evidence.img -Algorithm SHA256
Get-FileHash C:\path\to\evidence.img -Algorithm MD5
Mac/Linux Terminal
sha256sum /path/to/evidence.img
md5sum /path/to/evidence.img
Windows Command Prompt
certutil -hashfile C:\path\to\evidence.img SHA256
certutil -hashfile C:\path\to\evidence.img MD5
What This Does
Creates a unique “fingerprint” of the file. If even ONE byte changes, the hash completely changes. This proves in court that your evidence is exactly as you collected it.
🛠️ CHEAP HARDWARE (What Pros Use, Budget Version)
| Item | Price | Where to Buy | What It Does |
|---|---|---|---|
| Faraday bag (phone) | $10-30 | Amazon: “Mission Darkness Faraday Bag” | Blocks all signals, prevents remote wipe |
| USB data blocker (4-pack) | ~$10 | Amazon: “JSAUX USB data blocker” | Prevents data transfer when charging |
| CoolGear USB write blocker | ~$40 | Amazon: “CoolGear forensic write blocker” | Prevents writing to drives during imaging |
| Raspberry Pi 4 kit | ~$75 | Standard retailers | DIY write blocker, TinyCheck setup |
| USB 3.0 dock | ~$30 | Amazon: “UGREEN hard drive dock” | Connect drives without modifying them |
| SD card reader | ~$15 | Amazon: “Anker SD card reader” | Extract SIM/SD card data |
DIY Write Blocker (Free Option)
Linux software write-blocker: github.com/msuhanov/Linux-write-blocker
Raspberry Pi build guide: Search “Raspberry Pi forensic write blocker sechaq”
📂 GITHUB FORENSICS GOLDMINE (Bookmark These)
| Repo | Link | Purpose |
|---|---|---|
| awesome-forensics | github.com/cugu/awesome-forensics | Master list of all forensics tools |
| ALEAPP | github.com/abrignoni/ALEAPP | Android logs/events/protobuf parser |
| iLEAPP | github.com/abrignoni/iLEAPP | iOS logs/events/plists parser |
| APOLLO | github.com/mac4n6/APOLLO | Apple Pattern of Life Lazy Output |
| QuickHash-GUI | github.com/tedsmith/quickhash | Easy hash verification with GUI |
| MVT | github.com/mvt-project/mvt | Mobile Verification Toolkit (spyware detection) |
| Plaso | github.com/log2timeline/plaso | Super timeline creation |
| digital-forensics-lab | github.com/frankwxu/digital-forensics-lab | Free hands-on training labs |
📄 FREE CHAIN OF CUSTODY TEMPLATES
| Source | Link | Format |
|---|---|---|
| JotForm | jotform.com/pdf-templates/chain-of-custody-evidence-log | PDF fillable |
| CaseIQ | caseiq.com/resources/chain-of-custody-template | Word/PDF |
| NIST Guidelines | Search “NIST SP 800-86” | Official federal guidelines |
| SWGDE | swgde.org | Scientific Working Group standards |
📺 YOUTUBE CHANNELS FOR LEARNING
| Channel | Focus | Skill Level |
|---|---|---|
| 13Cubed | Digital forensics deep dives | Intermediate-Advanced |
| SANS DFIR | Incident response, forensics | All levels |
| DFIRScience | Forensics tutorials | Beginner-Intermediate |
| John Hammond | Security + forensics | Intermediate |
| David Bombal | Networking + security | Beginner |
💬 COMMUNITIES & SUBREDDITS
| Community | Link | Focus |
|---|---|---|
| r/computerforensics | reddit.com/r/computerforensics | Professional forensics discussion |
| r/digitalforensics | reddit.com/r/digitalforensics | Tools, techniques, career |
| r/OSINT | reddit.com/r/OSINT | Open source intelligence |
| Forensic Focus | forensicfocus.com/forums | Professional forum |
| AboutDFIR | aboutdfir.com | Resource hub |
PART 2: COUNTER-SURVEILLANCE
Someone Watching You? Here’s How to Catch Them.
Hidden cameras. GPS trackers. Phone spyware. AirTags in your car. If someone’s monitoring you, these methods expose them.
Bug Sweep DIY (Find Hidden Devices)
🛒 DETECTION GEAR (Budget → Pro)
| Device | Price | What It Finds | Best For |
|---|---|---|---|
| Smartphone flashlight | FREE | IR cameras (see method below) | Quick check |
| Phone camera | FREE | Infrared LEDs from cameras | Night vision cameras |
| Magnetic field detector app | FREE | GPS trackers with magnets | Car sweeps |
| Basic RF detector (K18) | $30-50 | Wireless transmitters | Room sweeps |
| RF + Lens detector combo | $50-80 | RF signals + camera lenses | Complete basic sweep |
| Jepwco G4 Pro | $100-150 | All frequencies, pen-sized | Discrete sweeping |
| SpyHawk Pro-10G | $200-300 | Wide frequency range | Serious sweeps |
| Professional TSCM | $2,975+ | EVERYTHING | When it really matters |
Professional Equipment (What They Have That You Don’t)
| Equipment | Cost | Capability |
|---|---|---|
| Non-Linear Junction Detector (NLJD) | $10,000+ | Finds devices even when OFF |
| REI ORION 2.4 | $15,000+ | Detects any electronic component |
| Thermal imaging camera | $5,000+ | Sees heat signatures through walls |
| Spectrum analyzer | $5,000+ | Complete RF spectrum analysis |
📱 PHONE FLASHLIGHT METHOD (FREE - 60 Seconds)
This actually works. Hidden cameras use infrared LEDs for night vision—invisible to your eyes, but your phone camera sees them.
Steps
- Kill all lights in the room (complete darkness)
- Open your phone camera (use the FRONT camera—it usually lacks IR filter)
- Slowly scan the room (especially smoke detectors, USB chargers, clocks)
- Look for tiny purple/white dots → That’s an IR LED = hidden camera
Pro Tip
Test this first: Point a TV remote at your phone camera and press a button. You’ll see the IR LED light up. That’s what you’re looking for.
📡 RF DETECTOR SWEEP (Step-by-Step)
Before You Start
- Turn OFF all your wireless devices (router, smart speakers, Bluetooth everything)
- Unplug smart home devices (Alexa, Google Home, smart TVs)
- Tell others in household (their phones/devices will trigger false positives)
The Sweep
- Set detector sensitivity to HIGH
- Start at room corner, walk the perimeter
- Move slowly (2-3 seconds per foot)
- Beeping/vibration = signal detected
- Narrow down by lowering sensitivity as you get closer
- Check inside objects that triggered alerts
Common Hiding Spots (Check These First)
🚨 HIGH PRIORITY
├── Smoke detectors (favorite hiding spot)
├── USB wall chargers (cameras built in)
├── Clock radios / alarm clocks
├── Picture frames (can hide pinhole cameras)
├── Air vents / HVAC returns
├── Electrical outlets / light switches
└── Mirrors (check for two-way)
⚠️ ALSO CHECK
├── Stuffed animals / decorations
├── Books (fake books exist)
├── Lamps / lampshades
├── Plant pots
├── Tissue boxes
├── Cable boxes / routers
└── Anything "gifted" to you recently
📶 WIFI AUDIT (Find Unknown Devices On Your Network)
Method 1: Router Admin Panel
- Log into your router (usually 192.168.1.1 or 192.168.0.1)
- Find “Connected Devices” or “DHCP Client List”
- Review every device → Hidden cameras often show as “Unknown Device” or “ESP_XXXXX”
- Note MAC addresses of suspicious devices
Method 2: Free Apps (If No Router Access)
| App | Platform | Link |
|---|---|---|
| Fing | iOS/Android | App stores |
| Network Scanner | Android | Play Store |
| WiFi Analyzer | Android | Play Store |
| LanScan | iOS | App Store |
Red Flags
- Devices named “Camera” or “ESP32” or “ESP8266”
- Unknown manufacturer (look up MAC address prefix at maclookup.app)
- Devices that appear only at certain times
- More devices than you can account for
🪞 OTHER QUICK DETECTION METHODS
Two-Way Mirror Test
Put your fingernail directly on the mirror surface:
- Gap between finger and reflection = Normal mirror

- No gap (finger touches reflection) = Possible two-way mirror

Flashlight Lens Finder
- Turn off lights
- Hold flashlight next to your eye (parallel to your line of sight)
- Shine around the room slowly
- Camera lenses reflect distinctively (bright, colored glint)
FM Radio Bug Detection
- Tune FM radio to empty frequency
- Turn volume up
- Walk around room slowly
- Squealing/feedback = possible transmitter nearby
Phone Call Interference Test
- Make a phone call
- Walk around room on speakerphone
- Clicking, buzzing, interference in specific spots = possible bug
- (Note: Some interference is normal near electronics)
🚗 VEHICLE SWEEP (GPS Trackers & AirTags)
Where They Hide GPS Trackers
EXTERIOR
├── Wheel wells (magnetic attachment)
├── Under bumpers (front and rear)
├── Behind license plates
├── Under the car (magnetic boxes)
└── Inside bumper cavities
INTERIOR
├── Under seats
├── Inside seat cushions
├── Behind dashboard panels
├── In OBD-II port (diagnostic port)
├── Inside door panels
├── Trunk lining
└── Glove compartment (wired to power)
AirTag / SmartTag Detection
iPhone: If unknown AirTag is traveling with you, you’ll get automatic notification after ~8 hours
Android: Download “Tracker Detect” (Apple’s official app) or “AirGuard” (third-party, better)
Physical Search Tips
- Use a flashlight + mirror on extension pole for undercarriage
- Check OBD-II port (below steering wheel) for plug-in trackers
- Feel inside wheel wells with your hand (trackers often magnetic)
- Look for anything that doesn’t belong
Phone Spyware Detection
Someone installed stalkerware on your phone? Here’s how to find and kill it.
🚩 SIGNS YOUR PHONE IS COMPROMISED
High-Confidence Indicators
| Sign | Why It Matters |
|---|---|
| Battery drains fast (even idle) | Spyware runs constantly in background |
| Phone overheats randomly | Constant data transmission |
| Data usage spikes | Uploading your data to attacker |
| Phone is slow/laggy | Spyware consuming resources |
| Apps you didn’t install | Look for generic names like “System Service” |
| Settings changed | “Unknown sources” enabled, security features off |
Behavioral Red Flags
| Sign | What It Means |
|---|---|
| Partner knows things they shouldn’t | They’re reading your messages |
| Someone always knows your location | GPS tracking |
| Private conversations referenced | Microphone access |
| Phone “pocket dials” them often | Remote activation |
Technical Red Flags
| Sign | Platform | Meaning |
|---|---|---|
| Cydia/Sileo apps visible | iPhone | Device is jailbroken (required for most spyware) |
| “Unknown sources” enabled | Android | Sideloading allowed |
| Device admin apps you don’t recognize | Android | Deep system access granted |
| VPN/MDM profile you didn’t install | iPhone | Enterprise-level monitoring |
| Root checker shows rooted | Android | System compromised |
🆓 FREE ANTI-SPYWARE APPS
Android
| App | Detection Rate | Link |
|---|---|---|
| Malwarebytes | Excellent | Play Store |
| Kaspersky Mobile | 100% in tests | Play Store |
| ProtectStar Anti Spy | 99.87% | Play Store |
| Google Play Protect | Good (built-in) | Play Store → Profile → Play Protect |
| Avast Mobile Security | Good | Play Store |
| Bitdefender | Excellent | Play Store |
iOS
iPhone’s closed system makes spyware harder to install, but not impossible.
| Protection | How to Access |
|---|---|
| Check for jailbreak | Look for Cydia, Sileo, or Zebra apps |
| Review MDM profiles | Settings → General → VPN & Device Management |
| Enable Lockdown Mode | Settings → Privacy & Security → Lockdown Mode (extreme protection) |
| Check Screen Time | Settings → Screen Time (unauthorized changes?) |
| Review app permissions | Settings → Privacy → review each category |
🔧 MANUAL DETECTION (No Apps Needed)
Android Manual Check
Step 1: Device Admin Apps
Settings → Security → Device admin apps
→ Remove anything you don’t recognize
Step 2: Accessibility Services
Settings → Accessibility → Installed services
→ Spyware needs this to read your screen
Step 3: Apps with Special Access
Settings → Apps → Special access → check each category:
- Display over other apps
- Modify system settings
- Notification access
- Usage access
Step 4: Unknown Sources
Settings → Security → Unknown sources
→ Should be OFF unless you specifically need it
Step 5: Review All Apps
Settings → Apps → See all apps
→ Look for apps with generic names, no icon, or that you don’t remember installing
iOS Manual Check
Step 1: Check for Jailbreak
Look for: Cydia, Sileo, Zebra, Installer 5, Checkra1n
→ If present, device is compromised
Step 2: MDM Profiles
Settings → General → VPN & Device Management
→ Remove any profiles you didn’t install
Step 3: Privacy Permissions
Settings → Privacy → Review:
- Location Services (check “Always” access apps)
- Microphone
- Camera
- Photos
→ Remove access from suspicious apps
Step 4: Screen Time
Settings → Screen Time
→ Check if someone set restrictions without your knowledge
💻 GITHUB STALKERWARE DETECTION TOOLS
| Tool | Link | What It Does |
|---|---|---|
| stalkerware-indicators | github.com/AssoEchap/stalkerware-indicators | Database of 172+ known stalkerware apps (package names, signatures, IOCs) |
| TinyCheck | github.com/KasperskyLab/TinyCheck | Raspberry Pi tool that analyzes network traffic for spyware signatures |
| MVT (Mobile Verification Toolkit) | github.com/mvt-project/mvt | Professional-grade mobile forensics, detects Pegasus and other APTs |
| androidqf | github.com/botherder/androidqf | Android Quick Forensics - fast evidence gathering |
| spytrap-adb | github.com/spytrap-org/spytrap-adb | ADB-based stalkerware detection |
| android-stalkerware | github.com/diskurse/android-stalkerware | Analysis and research on Android stalkerware |
Using stalkerware-indicators
This repo contains package names of known stalkerware. You can check if any are installed:
# Connect phone via ADB, then:
adb shell pm list packages | grep -f stalkerware_package_names.txt
🛡️ PROTECTION HARDWARE
| Item | Price | Amazon Search | Purpose |
|---|---|---|---|
| USB data blocker (4-pack) | ~$10 | “JSAUX USB data blocker” | Prevents data transfer when charging at public/untrusted outlets |
| Faraday bag (phone) | ~$20 | “Mission Darkness Faraday Bag” | Blocks ALL signals - GPS, cell, WiFi, Bluetooth |
| Webcam cover | ~$5 | “webcam cover slide” | Physical camera block for laptop |
| Microphone blocker | ~$10 | “mic blocker 3.5mm” | Plugs into headphone jack, blocks mic |
| Privacy screen protector | ~$15 | “privacy screen protector [phone model]” | Prevents shoulder surfing |
| Raspberry Pi 4 | ~$75 | “Raspberry Pi 4 kit” | Run TinyCheck for network analysis |
☎️ HELP ORGANIZATIONS
If you’re being stalked or surveilled by a partner/ex:
| Organization | Contact | Services |
|---|---|---|
| Coalition Against Stalkerware | stopstalkerware.org | Resources, detection guides |
| NNEDV Safety Net | techsafety.org | Tech safety for DV survivors |
| National DV Hotline | 1-800-799-7233 | 24/7 support |
| Cyber Civil Rights Initiative | cybercivilrights.org | Tech abuse support |
Important: If you find spyware and are in a dangerous relationship, removing it may alert your abuser. Contact a DV organization first for safety planning.
PART 3: OSINT & IDENTITY VERIFICATION
Find Anyone’s Digital Footprint (100% Legal)
Reverse image search. Username hunting. Email tracing. Catch catfish. Verify strangers. All free.
🖼️ REVERSE IMAGE SEARCH (Catch Fake Photos)
The Big Players
| Tool | Link | Best For | Notes |
|---|---|---|---|
| Yandex Images | yandex.com/images | #1 FOR FACES | Russian search engine, best facial recognition |
| TinEye | tineye.com | Exact matches | 67B+ images indexed |
| Google Images | images.google.com | General search | Largest database |
| Bing Visual Search | bing.com/visualsearch | Alternative | Different results than Google |
| FaceCheck.ID | facecheck.id | Catfish detection | Built specifically for finding fake profiles |
| PimEyes | pimeyes.com | Facial recognition | Limited free searches |
Pro Tips
- Always try multiple engines - They index different images
- Yandex beats Google for faces - Seriously, try it
- Crop to just the face for better facial recognition results
- Try variations - Original, cropped, flipped horizontally
- Check oldest results - Original source often appears with earliest date
🤖 AI-GENERATED FACE DETECTION
More fake profiles use AI-generated faces. Here’s how to spot them:
Detection Tools
| Tool | Link | Free? |
|---|---|---|
| IMGDetector.ai | imgdetector.ai | Yes |
| AI or Not | aiornot.com | Yes (limited) |
| Deepware Scanner | deepware.ai | Yes |
| Sensity AI | sensity.ai | Enterprise |
Manual Detection (Look For These)
| Sign | What to Look For |
|---|---|
| Earrings don’t match | Different style/shape on each ear |
| Background blur/distortion | Unnatural blurring, warped lines |
| Hair anomalies | Strands that disappear, merge, or float |
| Teeth issues | Too perfect, blurry, or misaligned |
| Asymmetrical accessories | Glasses frames different on each side |
| Skin texture | Too smooth, plasticky appearance |
| Eyes | Different sizes, unusual catchlights |
👤 USERNAME SEARCH (Find All Their Accounts)
Command Line Tools (More Powerful)
| Tool | Link | Coverage |
|---|---|---|
| Sherlock | github.com/sherlock-project/sherlock | 400+ sites |
| Maigret | github.com/soxoj/maigret | 3000+ sites (Sherlock fork, more comprehensive) |
| WhatsMyName | github.com/WebBreacher/WhatsMyName | Focus on accuracy |
| Blackbird | github.com/p1ngul1n0/blackbird | 500+ sites, fast |
Quick Install & Run:
# Sherlock
pip3 install sherlock-project
sherlock username
# Maigret (more sites)
pip3 install maigret
maigret username
Web-Based Tools (No Installation)
| Tool | Link | Notes |
|---|---|---|
| Namechk | namechk.com | Quick visual check |
| WhatsMyName Web | whatsmyname.app | Browser version |
| Instant Username | instantusername.com | Real-time availability |
| Knowem | knowem.com | 500+ sites |
📧 EMAIL & PHONE VERIFICATION
Email Investigation
| Tool | Link | What It Does |
|---|---|---|
| Hunter.io | hunter.io | 25 free searches/month, finds associated accounts |
| Holehe | github.com/megadose/holehe | Check what sites email is registered on |
| Epieos | epieos.com | Email OSINT, finds Google ID, calendar info |
| HaveIBeenPwned | haveibeenpwned.com | Check if email was in data breaches (100% free) |
| EmailRep | emailrep.io | Email reputation scoring |
Phone Number Investigation
| Tool | Link | What It Does |
|---|---|---|
| NumLookup | numlookup.com | Free carrier lookup, VOIP detection |
| Truecaller | truecaller.com | 433M+ user database, spam detection |
| CallerID Test | calleridtest.com | Basic lookup |
| Sync.me | sync.me | Caller ID database |
| PhoneInfoga | github.com/sundowndev/phoneinfoga | Advanced phone OSINT |
Red Flags
| Indicator | Risk Level |
|---|---|
| VOIP number (Google Voice, TextNow) | |
| Email created recently | |
| No breach history | |
| Carrier = “VOIP” |
📹 VIDEO CALL LIVENESS TESTS (Catch Deepfakes)
If someone seems too good to be true, test them on video call. Deepfakes struggle with:
Tests to Run
| Test | What to Ask | Why It Works |
|---|---|---|
| Profile turn | “Can you turn your head to the side?” | Deepfakes struggle with 90° profile |
| Hand-face touch | “Touch your nose with your finger” | Hands near faces break deepfakes |
| Multiple fingers | “Hold up 3 fingers… now 5” | Finger counting is hard for AI |
| Object test | “Show me something red in your room” | Proves real environment |
| Wave test | “Wave with both hands” | Two-hand coordination |
| Lighting change | “Can you move to a different light?” | Tests dynamic rendering |
| Spontaneous request | Random specific ask | Can’t be pre-recorded |
Signs of Deepfake
- Unnatural blinking (too little or too regular)
- Face doesn’t match head movement
- Lighting on face doesn’t match background
- Audio slightly out of sync
- Edges of face shimmer or blur
- Hair looks “painted on”
🏛️ FREE BACKGROUND CHECK ALTERNATIVES
Court Records (Free)
| Resource | Link | Coverage |
|---|---|---|
| JudyRecords | judyrecords.com | 760M+ US court cases—FREE |
| CourtListener | courtlistener.com | 4M+ federal/state opinions |
| PACER | pacer.uscourts.gov | Federal court records ($0.10/page) |
| UniCourt | unicourt.com | State + federal (some free) |
Public Records Directories
| Resource | Link | What It Finds |
|---|---|---|
| Black Book Online | blackbookonline.info | Links to free public records by state |
| SearchSystems | searchsystems.net | Public records database directory |
| FamilySearch | familysearch.org | Birth, death, marriage records |
| NSOPW | nsopw.gov | Sex offender registry (official) |
Property & Business Records
| Resource | Link |
|---|---|
| OpenCorporates | opencorporates.com |
| SEC EDGAR | sec.gov/edgar |
| County assessor sites | Google “[county] property records” |
🧩 BROWSER EXTENSIONS (One-Click OSINT)
| Extension | What It Does | Link |
|---|---|---|
| RevEye | Reverse image search (Google, Bing, Yandex, TinEye in one click) | Chrome/Firefox |
| Search by Image | Multi-engine reverse search | Chrome/Firefox |
| InVID/WeVerify | Video verification toolkit | Chrome/Firefox |
| Wayback Machine | Check archived versions of pages | Chrome/Firefox |
| Wappalyzer | Identify website technologies | Chrome/Firefox |
| BuiltWith | Technology profiler | Chrome |
GitHub collection: github.com/The-Osint-Toolbox/OSINT-Browser-Extensions
📚 MASTER OSINT GITHUB REPOS
| Repo | Link | Purpose |
|---|---|---|
| awesome-osint | github.com/jivoi/awesome-osint | THE master list |
| OSINT Framework | osintframework.com | Visual tool directory |
| SpiderFoot | github.com/smicallef/spiderfoot | Automated OSINT, 200+ modules |
| theHarvester | github.com/laramies/theHarvester | Email/domain gathering |
| Recon-ng | github.com/lanmaster53/recon-ng | Web recon framework |
| Maltego | maltego.com | Relationship mapping (free CE version) |
| Photon | github.com/s0md3v/Photon | Fast web crawler for OSINT |
| GHunt | github.com/mxrch/GHunt | Google account investigation |
| Holehe | github.com/megadose/holehe | Email to registered accounts |
PART 4: COURTROOM & LEGAL SELF-DEFENSE
Win Your Case Before You Walk In
Testimony prep. Evidence presentation. What judges actually care about. How to not blow it on the stand.
🎤 TESTIMONY PREP MASTER CHECKLIST
2 Weeks Before
- Create chronological timeline of ALL events
- Review every document you’ll reference
- File witness list (65 days before in many jurisdictions)
- Organize evidence binder (3 copies: you, judge, opposing party)
- Label each exhibit with number/letter
- Schedule practice session with your attorney
1 Week Before
- Review prior statements you’ve made (depositions, declarations)
- Practice Q&A with attorney or trusted friend
- Research the judge’s courtroom rules/preferences
- Plan your outfit (conservative, professional)
- Confirm courtroom location and parking
- Prepare childcare/work coverage
Day Before
- Review timeline and key dates one more time
- Lay out clothes
- Pack evidence binder
- Get good sleep
- NO alcohol or substances
Day Of
- Eat a real breakfast (low blood sugar = bad decisions)
- Arrive 30+ minutes early
- Turn phone COMPLETELY OFF (not just silent)
- Use restroom before proceedings
- Bring water, tissues, notepad, pen
- Deep breaths in the parking lot
🗣️ ON THE STAND: GOLDEN RULES
The DO List
| Rule | Why |
|---|---|
| Answer ONLY the question asked | Extra info gives opposing counsel ammunition |
| Pause before answering | Gives your attorney time to object |
| Look at the judge when answering | Shows respect, builds credibility |
| Say “I don’t recall” if true | Better than guessing wrong |
| Say “I don’t understand” if true | Better than answering wrong question |
| Keep answers SHORT | Yes. No. Specific fact. Stop. |
| Ask for questions to be repeated | Buys time, ensures clarity |
The DON’T List
| Rule | Why |
|---|---|
| Don’t volunteer information | You’re not there to help them |
| Don’t say “never” or “always” | Easy to disprove |
| Don’t argue with opposing counsel | Makes you look defensive |
| Don’t make faces when others testify | Judge sees everything |
| Don’t start with “My lawyer told me…” | Waives attorney-client privilege |
| Don’t exaggerate | Destroys all credibility |
| Don’t guess | “I don’t know” is a valid answer |
Body Language
| Do | Don’t |
|---|---|
| Sit erect, feet flat | Slouch or lean back |
| Hands visible, still | Cross arms |
| Make eye contact with judge | Stare at floor |
| Breathe normally | Sigh heavily |
| Keep neutral expression | Roll eyes, smirk, cry (if avoidable) |
📋 PRESENTING EVIDENCE (Step-by-Step)
Getting Evidence Admitted
Step 1: Mark the exhibit (“Your Honor, I’d like to mark this as Exhibit A”)
Step 2: Show to opposing party first (they get to see it)
Step 3: Authenticate it (witness confirms what it is and that it’s accurate)
Step 4: Offer into evidence (“I offer Exhibit A into evidence”)
Step 5: Handle objections (opposing counsel may object, answer their concerns)
Step 6: Judge rules (admitted or excluded)
Authentication By Type
| Evidence Type | How to Authenticate |
|---|---|
| Photos | Witness says: when taken, where, by whom, accurate depiction |
| Texts/Emails | Show timestamps, phone numbers, BOTH sides of conversation |
| Documents | Identify by title, date, author, how you got it |
| Voice recordings | Witness identifies voices, confirms accuracy |
| Social media | Screenshots with URL visible, timestamps, account identification |
Common Objections & Responses
| Objection | What It Means | Possible Response |
|---|---|---|
| “Hearsay” | Out-of-court statement offered for truth | Identify exception (admission, business record, etc.) |
| “Relevance” | Not related to issues in case | Explain connection to dispute |
| “Foundation” | Not properly authenticated | Lay more foundation with witness |
| “Best evidence” | Should have original | Explain why copy is acceptable |
👥 WITNESS PREPARATION (Legal vs. Illegal)
What Attorneys CAN Do (Legal)
- Review facts and documents with witness
- Explain courtroom procedures and rules
- Practice delivery and clarity
- Teach calm responses to cross-examination
- Explain what types of questions to expect
- Advise on appropriate dress and demeanor
- Conduct mock examinations
What NO ONE Should Do (Witness Tampering - 18 U.S.C. § 1512)
- Script exact testimony word-for-word
- Instruct witness to lie
- Suggest witness omit facts
- Threaten or bribe witness
- Encourage witness to “forget” things
- Coordinate stories between witnesses
Penalty: Up to 20 years federal imprisonment
Witness Credibility Factors (What Judges Evaluate)
| Factor | Why It Matters |
|---|---|
| Consistency | Does testimony match prior statements and evidence? |
| Demeanor | Confident or evasive? Calm or defensive? |
| First-hand knowledge | Did they actually see/hear it? |
| Bias | Do they have reason to favor one side? |
| Detail recall | Appropriate level of detail for timeframe? |
| Corroboration | Does other evidence support their story? |
🎯 WHAT JUDGES ACTUALLY CARE ABOUT
Things That WIN Points
| Behavior | Why Judges Like It |
|---|---|
| Organized, prepared | Shows respect for court’s time |
| Consistent with documents | Demonstrates honesty |
| Admits uncertainty when appropriate | Shows intellectual honesty |
| Respectful to everyone | Even opposing party |
| Direct answers | Doesn’t waste time |
| Appropriate emotion | Human but controlled |
Things That LOSE Points
| Behavior | Why Judges Hate It |
|---|---|
| Contradicting yourself | Destroys credibility |
| Eye rolling, sighing | Disrespectful |
| Arguing with counsel | Makes you look difficult |
| Surprise evidence | Violation of disclosure rules |
| Excessive emotion | Manipulation tactic |
| Interrupting | Disrespectful |
🎙️ SPEECH PRACTICE TOOLS (FREE/CHEAP)
Practice your testimony at home with these tools:
| Tool | Platform | Cost | What It Does |
|---|---|---|---|
| Orai | iOS/Android | Free tier | AI speech coach, filler word detection |
| Speeko | iOS/Android | Free tier | Speech analysis, pacing feedback |
| online-voice-recorder.com | Browser | Free | Simple voice recording |
| OBS Studio | Desktop | Free | Video recording for mock testimony |
| Zoom | Desktop | Free | Record yourself, watch playback |
| Voice Memos | iOS | Free | Quick audio recording |
Practice Method
- Have someone read likely questions
- Record your answers
- Watch/listen for: filler words, eye contact, fidgeting, rambling
- Practice until you’re comfortable with your main points
- DON’T memorize scripts (sounds robotic)
🆓 FREE LEGAL RESOURCES
| Resource | Link | What It Offers |
|---|---|---|
| LawHelp.org | lawhelp.org | Legal aid by state, free forms |
| ABA Free Legal Answers | abafreelegalanswers.org | Attorneys answer questions free (income qualified) |
| California Courts Self-Help | selfhelp.courts.ca.gov | Forms, guides, legal help finder |
| Legal Aid at Work | legalaidatwork.org | Employment law help (CA) |
| Nolo.com | nolo.com | Free legal articles + affordable guides |
| Avvo | avvo.com | Free Q&A, lawyer ratings |
| FindLaw | findlaw.com | Legal information database |
| Cornell LII | law.cornell.edu | Free access to all US law |
PART 5: WORKPLACE PROTECTION
Document Everything. Trust No One. Cover Your Ass.
Toxic coworkers. Backstabbing. Retaliation. HR complaints that actually stick.
📝 THE DOCUMENTATION FORMULA (Copy This)
Every incident gets this format. No exceptions.
INCIDENT DOCUMENTATION
======================
DATE: [Exact date - Month/Day/Year]
TIME: [Exact time - include AM/PM]
LOCATION: [Where it happened - be specific]
PRESENT: [Who was there - names and titles]
WHAT HAPPENED:
[Facts only. What was said/done. Direct quotes when possible.
No interpretation, no emotion, no opinion. Just what occurred.]
WITNESSES:
[Name, title, contact info for everyone who saw/heard it]
EVIDENCE:
[Screenshots, emails, documents - list with dates and locations]
IMPACT:
[How this affected your work, projects, reputation - factual]
FOLLOW-UP:
[Any actions taken, responses received]
Storage Rules
| Do | Don’t |
|---|---|
| BCC personal email on important messages | Store documentation on work computer only |
| Save to personal cloud (Google Drive, Dropbox) | Use company-owned cloud storage |
| Screenshot with timestamps | Rely on memory |
| Keep witness contact info | Assume they’ll remember later |
| Print and store physical copies at home | Keep only digital copies |
🪜 ESCALATION LADDER
The Path (In Order)
| Step | Action | When | Duration |
|---|---|---|---|
| 1 | Document incident | Same day as incident | Ongoing |
| 2 | Direct conversation | Within 48 hours | One conversation |
| 3 | Recap email | Immediately after conversation | Same day |
| 4 | Formal HR complaint | After pattern emerges (2-3 incidents) | Days-weeks |
| 5 | Follow up with HR | If no response in 2 weeks | Every 2 weeks |
| 6 | EEOC complaint | If HR fails or retaliation occurs | Within 180-300 days |
| 7 | Employment lawyer | Ongoing issues, termination threat | ASAP |
The Recap Email Technique (Powerful)
After ANY verbal conversation about an issue:
Subject: Confirming our conversation on [date]
Hi [Name],
I’m writing to confirm our conversation today where you stated [exact words they said, in quotes if possible].
[Include any commitments made, next steps discussed]
Please let me know if I’ve misunderstood anything.
Best,
[Your name]
Why this works: Creates paper trail. If they don’t correct you, they’ve confirmed your version of events.
🚩 RED FLAGS TO DOCUMENT
Backstabbing Patterns
| Sign | How to Document |
|---|---|
| Credit stolen | Save your original work with timestamps; document who claimed it when |
| Left off emails/meetings | Screenshot invites you should have received; note who was included |
| Different rules for you | Compare written policies to how they’re applied to you vs. others |
| Rumors traced to them | Document who told you what, when they heard it, who they heard it from |
| Sudden negative reviews | Save prior positive feedback; note timing relative to any complaints you made |
| Public undermining | Document witnesses, exact words used |
| Agreements broken | Email confirmations of agreements before they’re broken |
Retaliation Indicators (After You Complained)
| Sign | Why It’s Concerning |
|---|---|
| Negative review right after complaint | Temporal proximity = evidence of retaliation |
| Reassignment to worse duties | Adverse employment action |
| Exclusion from projects | Career damage |
| Sudden “performance issues” | Paper trail being created against you |
| Hours/schedule changed | Constructive dismissal attempt |
| Coworkers told to avoid you | Isolation tactic |
⚠️ WRONGFUL TERMINATION: CRITICAL DEADLINES
These are HARD DEADLINES. Miss them and you lose your claim.
| Claim Type | Deadline | Where to File |
|---|---|---|
| EEOC (Title VII, ADA, ADEA) | 180 days (300 in some states) | eeoc.gov |
| OSHA 11(c) - Safety retaliation | 30 DAYS | OSHA |
| Sarbanes-Oxley (corporate fraud) | 180 days | OSHA |
| False Claims Act (qui tam) | 6 years | Federal court |
| California FEHA | 3 years | CRD (formerly DFEH) |
| New York Human Rights Law | 3 years | DHR or court |
What Counts as Retaliation
Three elements required:
- Protected activity - You complained about discrimination, harassment, safety, etc.
- Adverse action - You were fired, demoted, transferred, had hours cut, etc.
- Causal connection - The adverse action happened BECAUSE of your complaint
Temporal proximity matters:
| Timing | Strength of Case |
|---|---|
| Days-weeks after complaint | Strong inference of retaliation |
| 1-3 months | Good circumstantial evidence |
| 4+ months | Need additional evidence |
📞 EEOC FILING PROCESS (FREE)
Step-by-Step
Step 1: Submit Online Inquiry
- Go to publicportal.eeoc.gov
- Create account
- Answer preliminary questions
Step 2: Schedule Interview
- Through portal OR call 1-800-669-4000
- Prepare your documentation
- Bring evidence
Step 3: File Charge of Discrimination
- Form completed with EEOC staff
- You’ll get a charge number
- Copy sent to your employer
Step 4: Investigation
- EEOC investigates (up to 180 days)
- May request mediation
- May request documents from employer
Step 5: Resolution
- EEOC issues determination
- If they find violation, they’ll try to settle
- If not resolved, you get Right to Sue letter
Step 6: Right to Sue
- 90 days to file lawsuit after receiving letter
- Clock starts when you RECEIVE it, not when it’s sent
What to Bring to Your Interview
- Written timeline of events
- Copies of all documentation
- Names and contact info for witnesses
- Copies of relevant policies
- Your employment contract if you have one
- Recent performance reviews
- Any termination letter or writeups
PART 6: NEIGHBOR DISPUTES
Small Claims, Mediation & Boundary Wars
When to sue. When to settle. How much you can win. Where to find free mediators.
💰 SMALL CLAIMS LIMITS BY STATE (2024-2025)
| State | Limit | State | Limit |
|---|---|---|---|
| California | $12,500 | Nevada | $10,000 |
| Texas | $20,000 | Arizona | $3,500 |
| Florida | $8,000 | Colorado | $7,500 |
| New York | $5,000-$10,000 | Washington | $10,000 |
| Tennessee | $25,000 | Oregon | $10,000 |
| Georgia | $15,000 | Michigan | $6,500 |
| North Carolina | $10,000 | Ohio | $6,000 |
| Illinois | $10,000 | Pennsylvania | $12,000 |
| Kentucky | $2,500 | Delaware | $25,000 |
What Small Claims CAN Do
Award money damages up to the limit
Order return of personal property
Award costs and fees (sometimes)
What Small Claims CAN’T Do
Order neighbor to move fence (need civil court for injunctions)
Determine property lines (need quiet title action)
Enforce ongoing compliance
Award punitive damages (usually)
🤝 FREE COMMUNITY MEDIATION
Success rate: 70-80%. Usually takes 2-4 hours. Costs $0.
How to Find Free Mediators
- Search: “[your county] community mediation center”
- NAFCM directory: nafcm.org
- Ask court clerk: Many courts have free or low-cost mediation programs
- Bar association: Often have pro bono mediation programs
Cost Comparison
| Method | Total Cost | Timeline | Success Rate |
|---|---|---|---|
| Free community mediation | $0 | 2-4 hours | 70-80% |
| Court-annexed mediation | $0-200 | 1-3 hours | 60-70% |
| Private mediator | $200-500/hr | 2-8 hours | 70-80% |
| Small claims court | $75-400 | 1-4 months | ~50% (judgments for plaintiffs) |
| Civil court + attorney | $5,000-$100,000+ | 6-24 months | Varies |
When Mediation Works
- Noise disputes
- Parking issues
- Tree/vegetation conflicts
- Property line disagreements (minor)
- Fence appearance disputes
- Pet issues
- Communication breakdowns
When You Need Court
- Significant property damage ($10K+)
- Neighbor refuses all communication
- Injunction needed (stop doing something)
- Physical safety concerns
- Ongoing willful violations
📐 BOUNDARY DISPUTE CHECKLIST
Before Doing Anything Legal
- Talk to neighbor first (document the conversation)
- Get a survey ($300-800, proves exact property lines)
- Research deed (county recorder’s office)
- Check local ordinances (fence height, setbacks, etc.)
- Send written notice (certified mail, keep copy)
- Try mediation (free, often required before court anyway)
Types of Legal Claims
| Claim | What It’s For | Where to File |
|---|---|---|
| Trespass | Encroachment, entering your property | Small claims (money) or civil (injunction) |
| Nuisance | Ongoing interference with your property use | Civil court |
| Quiet title | Determining who owns disputed land | District/Superior court |
| Declaratory judgment | Court declares rights regarding property | District/Superior court |
Evidence to Gather
- Survey showing property lines
- Photos/video of encroachment
- Dated photos showing progression
- Written communications with neighbor
- Local ordinances they’re violating
- Estimates for damage repair
- Witness statements
⚠️ ADVERSE POSSESSION WARNING
If neighbor’s fence/structure has been on your land 10-15+ years, they might legally own that strip now.
Requirements Vary by State (Generally)
- Actual possession - They physically used the land
- Open and notorious - Obvious, not hidden
- Hostile - Without your permission
- Exclusive - They controlled it
- Continuous - For the statutory period (10-21 years depending on state)
How to Prevent Future Claims
Send this letter via certified mail and RECORD IT with county recorder:
“I give you permission to use that strip of my land on your side of our fence until I say otherwise. This permission may be revoked at any time in writing.”
Why this works: Permission destroys the “hostile” element. They can’t claim adverse possession if they had permission.
📄 FREE MEDIATION & AGREEMENT TEMPLATES
| Template | Link |
|---|---|
| Settlement agreement | pandadoc.com/settlement-agreement-template |
| Boundary line agreement | pandadoc.com/boundary-line-agreement-template |
| Neighbor fence agreement | template.net (search “fence agreement”) |
| Mediation agreement | juro.com/contract-templates/settlement-agreement |
| General release | lawdepot.com |
PART 7: ASSET PROTECTION
Prenups, Postnups & Trusts That Actually Work
Legal ways to protect what’s yours. Before marriage. During marriage. Before everything goes wrong.
📊 THE BIG THREE COMPARED
| Method | When | Protection Level | Cost | DIY Possible? |
|---|---|---|---|---|
| Prenup | Before wedding | $1,000-5,000 | Yes (with caution) | |
| Postnup | After wedding | $2,000-7,500 | Yes (with caution) | |
| DAPT Trust | Anytime | $5,000-30,000 | No (too complex) | |
| Irrevocable Trust | Anytime | $5,000-15,000 | No |
💍 PRENUP/POSTNUP REQUIREMENTS FOR VALIDITY
Must-Have Elements
| Requirement | Why It Matters |
|---|---|
| Oral agreements not enforceable | |
| Obvious but often missed | |
| Each person lists all assets/debts | |
| No coercion, threats, pressure | |
| Not grossly one-sided | |
| Can’t be sprung last-minute | |
| Required in many states | |
| Strongly recommended; required in some states |
What Makes Courts Throw Them Out
| Red Flag | Why It Invalidates |
|---|---|
| Signed under pressure | Duress = not voluntary |
| Hidden assets at signing | Fraud |
| Wildly unfair terms | Unconscionable |
| Signed right before wedding | Duress/no time to consider |
| One party didn’t understand | No informed consent |
| No independent lawyers | Appearance of overreaching |
Timing Requirements
| Timing | Risk Level |
|---|---|
| 6+ months before wedding | |
| 3-6 months before | |
| 1-3 months before | |
| Less than 1 month | |
| Days before wedding | |
| California | 7-day minimum waiting period required |
🗣️ HOW TO BRING UP THE PRENUP
Opening Lines That Work
Vulnerable approach:
“My parents divorced when I was young and it financially devastated my mom. I need us to have the protection she never had.”
Practical approach:
“A prenup isn’t about doubting us—it’s about making sure we’re aligned on money stuff before it becomes emotional.”
Mutual protection:
“I want to make sure we’re BOTH protected no matter what happens. This protects you as much as me.”
Family pressure (honest):
“My family is insisting on this, and I’d rather us create something together that’s fair to both of us than have them dictate terms.”
Responses to Common Objections
| Objection | Response |
|---|---|
| “Don’t you trust me?” | “I absolutely do. Trust is why I can have this conversation with you.” |
| “You’re planning for divorce” | “No—planning for our marriage. All marriages end, either in death or divorce. This protects us in BOTH scenarios.” |
| “It’s not romantic” | “What’s romantic is building a future together where we’re both protected and aligned.” |
| “My parents didn’t need one” | “Different era. We have more complexity—careers, property, maybe previous marriages. This is modern planning.” |
Red Flags During Discussion
If your partner does any of these, consult a lawyer ASAP:
- Refuses any discussion whatsoever
- “Sign this or no wedding” ultimatum
- Presents agreement days before wedding
- Refuses negotiation on ANY terms
- Won’t let you have your own lawyer review
- Gets extremely angry at the suggestion
- Hides financial information during disclosure
💻 DIY PRENUP PLATFORMS
| Platform | Cost | Notes | Best For |
|---|---|---|---|
| HelloPrenup | $599/couple | State-specific, clean interface | First marriages, simple assets |
| Neptune | Varies | Attorney included | Want professional help at lower cost |
| Rocket Lawyer | $39.99/month | Basic template | Very simple situations |
| LegalZoom | $299+ | Template + review option | Name recognition comfort |
| Prenup.com | $599 | Guided process | Tech-savvy couples |
Free Templates (Use With EXTREME Caution)
| Source | Link | Warning |
|---|---|---|
| LegalTemplates.net | legaltemplates.net | State compliance not guaranteed |
| eForms.com | eforms.com | Basic template only |
| LawDistrict.com | lawdistrict.com | May miss state requirements |
Critical Warning: Free templates may not comply with your state’s requirements. If either spouse has significant assets, owns a business, or this involves alimony waivers, PAY FOR ATTORNEY REVIEW. A $1,000 review now beats a $100,000 problem later.
🏦 ASSET PROTECTION TRUST STATES (DAPT)
State Comparison
| State | Wait Period | Exception Creditors | State Income Tax |
|---|---|---|---|
| Nevada | 2 years | NONE | None |
| South Dakota | 2 years | Child support only | None |
| Ohio | 18 months | Alimony, child support | Yes |
| Tennessee | 18 months | Alimony, child support | None |
| Delaware | 4 years | Alimony, child support, divorce | None |
| Alaska | 4 years | Child support, divorce | None |
| Wyoming | 2 years | Limited | None |
| Mississippi | 2 years | Limited | Yes |
Choosing a State
| Priority | Best State |
|---|---|
| Maximum protection | Nevada (no exception creditors) |
| Fastest protection | Ohio or Tennessee (18 months) |
| Privacy + protection | South Dakota (sealed litigation) |
| Lowest cost | Compare attorney fees by state |
What DAPTs Protect Against
Future creditors (lawsuits filed AFTER trust created)
Divorcing spouse (in some states)
Business liability
Professional malpractice claims
What DAPTs DON’T Protect Against
Existing creditors
IRS (federal tax liens)
Child support (in most states)
Fraudulent transfer claims
Claims within waiting period
Cost Reality
| Item | Cost Range |
|---|---|
| Attorney setup | $5,000-15,000 |
| Corporate trustee (annual) | $2,000-5,000/year |
| Ongoing maintenance | $500-2,000/year |
LegalZoom, Rocket Lawyer, etc. do NOT offer DAPTs. These are complex instruments that require specialized legal expertise.
🔐 KEEP SEPARATE = STAY SEPARATE
The Golden Rule
NEVER mix pre-marriage assets with marital funds
| If You… | Your Separate Property… |
|---|---|
| Deposit inheritance into joint account | Becomes marital property |
| Use premarital savings for house down payment | Commingled = marital |
| Add spouse to investment account | Now it’s joint |
| Use separate funds for joint expenses without tracking | Gets murky fast |
How to Keep Assets Separate
| Asset Type | Protection Method |
|---|---|
| Inheritance | Keep in separate account, NEVER deposit to joint |
| Pre-marriage savings | Maintain separate account, document original balance |
| Investment accounts | Don’t add spouse as owner; document pre-marriage value |
| Real estate | Keep deed in your name only if pre-marriage |
| Business | Document pre-marriage value; keep personal and business separate |
Documentation to Keep
- Account statements from before marriage
- Inheritance letters/documentation
- Gift letters for large gifts
- Pre-marriage property appraisals
- Business valuations at time of marriage
PART 8: HIRING PROFESSIONALS
When DIY Isn’t Enough
Private investigators. Forensic accountants. When to hire. How much they cost. How to vet them.
🔍 PRIVATE INVESTIGATOR PRICING
Service Rates
| Service | Cost Range |
|---|---|
| Hourly rate | $50-150/hour |
| Background check | $100-500 |
| Surveillance (per day) | $500-1,500 |
| Asset search | $500-2,000 |
| Social media investigation | $200-1,000 |
| Infidelity investigation (full) | $2,000-10,000+ |
| Phone forensics | $500-5,000 |
| Skip tracing (finding someone) | $100-500 |
What PIs CAN Do
Surveillance in public places
Background checks
Asset searches
Social media investigation
Interview witnesses
Document findings for court
Testify as expert witness
What PIs CAN’T Do (Legally)
Hack phones/computers
Access private accounts without authorization
Trespass on private property
Record without consent (varies by state)
Impersonate law enforcement
Access sealed records
How to Vet a PI
| Check | Why |
|---|---|
| State license | Verify at state licensing board website |
| Insurance | Should have E&O and liability |
| Specialization | Matches your case type |
| References | Ask for and call them |
| Written contract | Clear scope, fees, deliverables |
| No guaranteed results | Legit PIs don’t promise outcomes |
💵 FORENSIC ACCOUNTANT PRICING
Service Rates
| Service | Cost Range |
|---|---|
| Hourly rate | $150-450/hour |
| Basic asset search | $2,500-5,000 |
| Income analysis | $3,000-10,000 |
| Business valuation | $5,000-25,000 |
| Full divorce forensics | $10,000-50,000+ |
| Expert witness testimony | $300-600/hour |
When You Need One
| Situation | Why |
|---|---|
| Spouse owns business | Can hide income, undervalue business |
| Complex investments | Hedge funds, private equity, options |
| Suspected hidden accounts | Offshore, crypto, unreported |
| Lifestyle vs. income mismatch | Spending more than they claim to earn |
| Self-employed spouse | Cash income easy to hide |
| Multiple income streams | Complexity = hiding opportunities |
What They Find
- Hidden bank accounts
- Underreported income
- Overstated business expenses
- Unreported cash transactions
- Cryptocurrency holdings
- Offshore accounts
- Fake debt to friends/family
- Assets in others’ names
Methods They Use
- Bank statement analysis
- Lifestyle analysis (spending vs. reported income)
- Business financial review
- Tax return analysis
- Crypto transaction tracing
- Public records search
- Deposition support
📱 PROFESSIONAL PHONE FORENSICS PRICING
Service Rates
| Service | Cost Range |
|---|---|
| Basic extraction | $500-1,500 |
| Full forensic analysis | $1,500-5,000 |
| Court-ready report | $1,000-3,000 |
| Expert witness testimony | $300-500/hour |
| Encrypted app recovery | $2,000-5,000+ |
| Damaged device recovery | $1,000-10,000+ |
When to Hire Pro vs. DIY
| Hire Pro | Try DIY First |
|---|---|
| Need court-admissible evidence | Just want to see what’s there |
| Device is encrypted | Basic Android with no lock |
| Device is damaged | Phone is working fine |
| Legal proceedings involved | Personal peace of mind |
| Time since deletion is long | Deleted recently |
| Encrypted apps (Signal, etc.) | Standard SMS messages |
Finding a Reputable Examiner
- Look for certifications: CCE, CFCE, EnCE, ACE
- Check if they’re authorized Cellebrite/MSAB partner
- Ask about chain of custody procedures
- Verify they can testify in court if needed
- Get written estimate before starting
🏠 PROFESSIONAL BUG SWEEP (TSCM)
Pricing
| Service | Cost Range |
|---|---|
| Home sweep (apartment) | $500-1,500 |
| Home sweep (house) | $1,500-3,000 |
| Per square foot | ~$1.50/sq ft |
| Minimum charge | $2,975 (typical) |
| Vehicle sweep | $200-500 |
| Office sweep | $2,000-10,000+ |
What Pros Have That You Don’t
| Equipment | Cost | What It Does |
|---|---|---|
| Non-Linear Junction Detector | $10,000+ | Finds electronics even when OFF |
| Thermal imaging camera | $5,000+ | Detects heat signatures |
| Spectrum analyzer | $5,000+ | Full RF spectrum analysis |
| TALAN phone analyzer | $10,000+ | Detects wiretaps |
| Video borescope | $500+ | Sees inside walls/vents |
When to Hire Pro
- High-stakes divorce/custody
- Business/trade secrets at risk
- Stalking/harassment situation
- DIY sweep found nothing but gut says otherwise
- Need expert testimony for court
- Dealing with sophisticated adversary
MASTER RESOURCE COMPILATION
One Place for Everything
📱 SUBREDDITS BY TOPIC
| Topic | Communities |
|---|---|
| Legal general | r/legaladvice, r/Ask_Lawyers |
| Divorce/custody | r/Divorce, r/Custody, r/FamilyLaw |
| Digital forensics | r/computerforensics, r/digitalforensics |
| Privacy/security | r/privacy, r/cybersecurity, r/netsec |
| OSINT | r/OSINT, r/RBI, r/TracerPak |
| Employment | r/antiwork, r/humanresources, r/AskHR |
| Neighbor issues | r/neighbors, r/treelaw, r/legaladvice |
| Relationships | r/relationship_advice, r/survivinginfidelity |
| Scams | r/Scams, r/catfish |
🏛️ GOVERNMENT FREE RESOURCES
| Resource | Link | What It Offers |
|---|---|---|
| EEOC | eeoc.gov / 1-800-669-4000 | Employment discrimination complaints |
| OSHA Whistleblower | whistleblowers.gov | Workplace safety retaliation |
| LawHelp.org | lawhelp.org | Legal aid by state |
| JudyRecords | judyrecords.com | 760M+ court records FREE |
| USA.gov Legal Aid | usa.gov/legal-aid | Federal legal aid directory |
| ABA Free Legal | abafreelegalanswers.org | Attorney Q&A (income qualified) |
| FTC Consumer | consumer.ftc.gov | Fraud reporting, consumer rights |
| CFPB | consumerfinance.gov | Financial complaints |
💻 TOP GITHUB REPOS (Bookmark These)
Digital Forensics
| Repo | Link |
|---|---|
| awesome-forensics | github.com/cugu/awesome-forensics |
| Autopsy | github.com/sleuthkit/autopsy |
| Volatility | github.com/volatilityfoundation/volatility3 |
| ALEAPP | github.com/abrignoni/ALEAPP |
| iLEAPP | github.com/abrignoni/iLEAPP |
Spyware Detection
| Repo | Link |
|---|---|
| stalkerware-indicators | github.com/AssoEchap/stalkerware-indicators |
| TinyCheck | github.com/KasperskyLab/TinyCheck |
| MVT | github.com/mvt-project/mvt |
OSINT
| Repo | Link |
|---|---|
| awesome-osint | github.com/jivoi/awesome-osint |
| Sherlock | github.com/sherlock-project/sherlock |
| Maigret | github.com/soxoj/maigret |
| SpiderFoot | github.com/smicallef/spiderfoot |
| theHarvester | github.com/laramies/theHarvester |
| Holehe | github.com/megadose/holehe |
🛒 BUDGET HARDWARE SHOPPING LIST
| Item | Price | Amazon Search |
|---|---|---|
| USB data blocker (4-pack) | ~$10 | “JSAUX USB data blocker” |
| Faraday bag (phone) | ~$20 | “Mission Darkness Faraday Bag” |
| RF bug detector | ~$30-50 | “K18 RF detector” |
| Lens finder | ~$30 | “hidden camera lens finder” |
| USB write blocker | ~$40 | “CoolGear forensic write blocker” |
| Raspberry Pi 4 kit | ~$75 | “Raspberry Pi 4 starter kit” |
| USB 3.0 drive dock | ~$30 | “UGREEN hard drive dock” |
| Webcam cover (3-pack) | ~$5 | “webcam cover slide” |
| Privacy screen | ~$15 | “privacy screen [phone model]” |
📺 YOUTUBE CHANNELS FOR LEARNING
| Channel | Focus | Best For |
|---|---|---|
| 13Cubed | Digital forensics deep dives | Intermediate-Advanced |
| SANS DFIR | Incident response, forensics | All levels |
| DFIRScience | Forensics tutorials | Beginner-Intermediate |
| John Hammond | Security + CTF | Intermediate |
| NetworkChuck | Networking basics | Beginner |
| David Bombal | Networking + security | Beginner |
| The Cyber Mentor | Ethical hacking | Intermediate |
THE BOTTOM LINE
You just got handed a toolkit that would cost $10,000+ if you hired professionals for everything.
Save this. Bookmark it. Come back when you need it.
The next time life throws chaos at you—cheating partner, toxic workplace, messy divorce, sketchy neighbor, creepy surveillance—you’ll know exactly what to do.
Knowledge is leverage. Now you have both. ![]()
!