How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace
Rate it:
14%
Flag icon
Skip tracers can make as many mistakes as they want when they’re trying to find you. All you need to make is one.
15%
Flag icon
so remember the six principles I just taught you: • Your personal information is a valuable commodity, no matter who you are. At some point, someone will come looking for it. • Skip tracing is a business just like any other, and the constant competition among the people who work in the field causes them to outdo themselves and become better and
15%
Flag icon
better every year. • If there is any accurate information out there for skip tracers to find, they will probably find it . . . if they’ve been paid enough. • All skip tracers need to succeed are charm and a telephone. • A good skip tracer will be able to get information out of anyone who has it, no matter how much those people love you and have your best interest at heart. • Skip tracers can make dozens of mistakes. You
15%
Flag icon
don’t have the luxury of maki...
This highlight has been truncated due to consecutive passage length restrictions.
16%
Flag icon
water and power
16%
Flag icon
afford a computer,
16%
Flag icon
Facebook and Twitter,
16%
Flag icon
easy online b...
This highlight has been truncated due to consecutive passage length restrictions.
16%
Flag icon
online customer service from...
This highlight has been truncated due to consecutive passage length restrictions.
16%
Flag icon
electric ...
This highlight has been truncated due to consecutive passage length restrictions.
16%
Flag icon
This chapter is all about why customer-friendly companies are not your friends. Also, you need to know that social media sites are the worst thing to happen to privacy since J. Edgar Hoover.
16%
Flag icon
Fear any company that tries to make life easier for you.
16%
Flag icon
Social networks and viral media are privacy’s worst enemies.
16%
Flag icon
Social engineering, n.: 1. the act of acquiring sensitive information through cunning and conversation rather than brute force, trespass, or digital intrusion. 2. the study of cajoling information out of people. Social engineer, n.: one who
17%
Flag icon
practices social engineering.
17%
Flag icon
A-Z OF STUPID PLACES TO SPEND YOUR TIME AIM
17%
Flag icon
Mixx Tumblr Bebo MySpace Twitter Blogger Netvibes TypePad Classmates Orkut Vimeo Delicious Picasa WordPress
17%
Flag icon
Digg Propeller Xanga Flickr Reddit YouTube Google Talk RSS Ziki LinkedIn StumbleUpon
18%
Flag icon
You never know if the people on your “friends” list are real.
19%
Flag icon
A lot of people like Gary go on social sites to pursue a specific interest—in his case, romance.
19%
Flag icon
Practice your hobbies in the real world, not online.
19%
Flag icon
The Web site was registered offshore with a private registration paid via a prepaid credit card, and the phone number was
19%
Flag icon
for a prepaid cell phone, so there was no way she could have traced them back to our little operation—not even if she’d thought about doing it and knew how.
20%
Flag icon
Every single time we skip tracers find out anything about a target’s interests, we grin like idiots.
20%
Flag icon
A bookworm will transfer his Amazon Prime account to his new address in Costa Rica.
20%
Flag icon
Think before you hit “publish.” Even if you cancel your account later, what’s done on the Internet can never be undone.
20%
Flag icon
Sometimes people have more than one LinkedIn profile and forget. Make sure you haven’t made duplicates.
20%
Flag icon
even scarier is the fundamental lack of control an individual has over his or her own page on a social networking site.
20%
Flag icon
Family and friends, corporations and nonprofits just throw your personal information up on the Web without a second thought to protecting your privacy. If you don’t believe me, just go to a Web site like Switchboard.com or Yahoo! People Search or BirthDatabase.com and see how much of your personal information is available there free of charge. Your address, your phone number, and probably your age are all there, if you haven’t specifically asked those companies to take down your information. Facebook and Twitter and Yahoo! are all well-meaning businesses. So are the utility and phone companies ...more
21%
Flag icon
The kinder and nicer a company’s customer service representative is, the easier it is to pretext.
21%
Flag icon
I’d just press 0—the skip tracer’s magic button—and talk to a friendly customer service representative.
21%
Flag icon
Most of them are eager to help without much prompting. “I have not received my bill and need to know if I owe you anything,” I’d say. The rep would do her thing and tell me I owed fifty bucks. I’d ask for the mailing address she had on file: “Are you showing the
21%
Flag icon
bill going to my home address or P.O. box?” The rep would answer, “We show the home address.” I’d cut in before she had a moment to think. “Do they have the address down correctly? I didn’t get the bill.” She’d almost always follow with the wonderful words of “We’ve got 1005 Fairview Lane . . .” or something like that. This worked most of the time. If it didn’t, I’d take it a step further and say, “Do you have my correct home or...
This highlight has been truncated due to consecutive passage length restrictions.
21%
Flag icon
Sometimes I can only establish a connection with older female reps by saying that they sound like my dear mother, who’s just passed. Nothing like death to make someone uneasy and put them in a compassionate and helpful mode.
21%
Flag icon
It’s been my experience that most cable companies keep account information by phone number, and most phone numbers are valid and up-to-date: If you want to watch a pay-per-view event, after all, your phone number has to be current.
22%
Flag icon
Some phone and Internet companies are so nice that they’ll e-mail your account password to a random address if you “forget” it.
22%
Flag icon
We realized that we could
22%
Flag icon
easily access his accounts over e-mail, but he would receive a text message notification every time we did.
22%
Flag icon
Think your man is cheating on you? Try to get access to his cell phone records. If he has a mistress, chances are she’s the first number he calls after he leaves the house in the morning and the last one he calls before he comes home at night.
23%
Flag icon
I for one would never trade my peace of mind for a second career in illegal skip tracing.
24%
Flag icon
All right, I think I’ve made it clear: If someone’s determined to find you and has the time and money to do so, that person is going to lie, cheat, and steal in relentless pursuit.
24%
Flag icon
TIME FRAMES If you’re in a hurry to disappear, you might be wondering how long it will take to accomplish your goals according to my instructions. My answer is that it depends on your money and assets. The more you want to take with you when you disappear, the longer it’s going to take (assuming you want to keep
24%
Flag icon
things legal, and I hope you do). If you’re trying to disappear with a lot of cash, you should allow yourself at least two to three months to prepare. If you’re footloose and fancy-free—that is, poor—you can be out the door in a month.
25%
Flag icon
Think of yourself as
25%
Flag icon
prey in the jungle: What are the three things you’ll need to do to escape your predator? You’ll need to camouflage yourself. You’ll need to send your predator running off in another direction. And you’ll need to find and build a safe new place to hide.
25%
Flag icon
That’s more or less what disappearing is all about. It’s a three-step process that involves what we in the field call misinformat...
This highlight has been truncated due to consecutive passage length restrictions.
26%
Flag icon
Identify and destroy everything that’s out there on you.
27%
Flag icon
Start looking for yourself where I would start: a laptop connected to unsecured, public wireless Internet. Do not use your home Internet
27%
Flag icon
connection.
27%
Flag icon
Go to Zabasearch (www.zabasearch.com), a site also known as the skip tracer’s Promised Land.