The Facebook Skip Trace

On my blog last week I posted how I located a person’s employment via Facebook. I guess Facebook did not like it; they closed my Facebook account. Not that ever used it for anything but hunting people.

Frank M. Ahearn
Author of: The Little Black Book Of Skip Tracing: Creating Pretext, Mastering Social Engineering And Finding Anyone Anywhere

The Facebook Photo

Here I am doing a little skip tracing and trying to find out where a subject works. What looked to be a dead end turned out to be a score. The usual contact information and online searches were a big zip. I popped the subject’s phone number into Facebook, and their account came up. Unfortunately, the about page was blank. So, I sifted through the photos, and one photo brought the gold. The subject was reclining with a supersized soda and next to the food bag was the subject’s work ID. One call to the company and the employment confirmed. It pays to review the identifiers in your photo.

Frank M. Ahearn
Author of: The Little Black Book Of Skip Tracing: Creating Pretext, Mastering Social Engineering And Finding Anyone Anywhere

How to Buy a New Identity

The strangeness! There I am wandering the streets of New York when the conversation of the people in front of me spills over. The woman talking suggests he purchases a new identity online. The gentleman thought this was a rather brilliant idea. In fact, a friend of hers got a new Florida driver’s license on the internet.

She did add a brilliant piece of advice and told the gentleman that he should get himself a pre-paid debit card to make the purchase. This way no one knows it is him buying the fake identity. He asked what happened to her friend. It turns out he disappeared to Belize with a fake passport, and no one ever saw him again.

Do some people really believe that purchasing a new identity is no different than a purchase from Amazon? If only it were!

Frank M. Ahearn
Author of: How to Disappear & The Little Black Book of Skip Tracing

Manuscript Consulting For Writers

Consulting on Novels & Film Scripts

My expertise helps writers bring accuracy and realism to their novels and scripts.

All Level of Writers

I truly enjoy storytelling and working with writers who are passionate about their projects. My unique background and expertise will provide you with an interesting perspective into a world very few experience. I have worked with all levels of writers, from New York Times Bestselling authors to Golden Globe and Oscar winners. 

How it Works

  • You email me your questions and I review.
  • On Skype, I address all of your questions, which always prompt more questions and stirs great of good conversation.
  • A few days later, we have a ten minute Skype follow up at no extra cost.

Frank M. Ahearn
Author of How to Disappear

Learn More at


Der Mann, der Reiche verschwinden lässt

täuschen. Seine Kunden: Reiche, die untertauchen wollen – darunter auch Schweizer.

Sie wollen nicht gefunden werden? Vergessen Sies. Frank M. Ahearn spürt jeden auf. Der US-Amerikaner war der erste, der Monica Lewinsky ausfindig machte, nachdem ihr Verhältnis mit Bill Clinton bekannt geworden war. Sein Trick: Er gab sich als Lieferant aus, der der Praktikantin aus dem Weissen Haus ein Paket bringen wollte.

Mehrere tausend Personen spürte der 49-Jährige in fast zwanzig Jahren auf – von Michael Jackson und Paris Hilton bis hin zu Betrügern, Verbrechern und Politikern. Er arbeite als sogenannter «Skip Tracer» für das FBI, Banken, Versicherungen oder für die Boulevardpresse. Im Internet wird er wegen seiner Erfolge als Legende gefeiert.

Neue Identität für ein paar Tausend Dollar

Vor wenigen Jahren wechselte Ahearn die Seiten. Seither sucht er nicht mehr Menschen, sondern hilft ihnen zu verschwinden. Zu seinen Klienten gehören auch Schweizer – und zwar viele, wie Ahearn sagt. Der 1. Schritt: Er nimmt ihnen Bank- und Kreditkarten sowie Handy weg. Der 2. Schritt: Er streut Falschinformationen über sie.

How to Disappear – Pretext or Deceive

How you go about combating your online information is extremely important. Pre-text may or may not be an option. It really depends on your confidence skills and your ability to come up with a workable pretext. When I say “pretext,” I do not narrow it to picking up the phone and gagging someone. Pretext can include an email claiming a photo of you is copyright-protected and insisting the website take the photo down.

In the skip tracing world we have what is called a one-shot deal, where you have only one opportunity to pretext. If you fail, you are shit out of luck and the pretext may just backfire. Remember Barbara Streisand? The one-shot deal business partner is Mr. Kick-back, one of those things you never want to happen. It’s when everything blows up in your face because the person or entity you did the pretext on just doesn’t believe you.





It is very important that you carefully consider the down-side to pretexting a website or simply requesting they take down your information. You do not want it to backfire, with the person behind the curtain deciding to call your bluff and the next thing you know, your pretext is the next big story on Jezebel. If the pretext route does not work for you, then you move forward and work the tools of deception.

When one utilizes deception as a weapon to battle online information, one needs to do so with the mindset of total war. Think of the websites as belligerents who post your information or your child’s information for the sheer purpose of making advertising money. What site doesn’t have Google ads or click-thru links? Your information is their inventory. The idea of total war is to

use all available resources to win the battle. My purpose is to teach you the Weapons for Waging War and Winning against the Digital Enemy.

The first step in combating your online information is locating all of your Digital DNA. The best way to categorize your Digital DNA is into five digital genes of information.

The Five Genes of Digital DNA

SELF is the information that you provided to third-party sites like Facebook, LinkedIn, blogs, Twitter, online comments and any other sites where you physically participated in broadcasting.

PIV stands for Personal Information Violation, which is when someone posts your information or photo online without your permission.

DATABASE is the information that sells for $9.99 and typically consists of public records and other free online information.

COPYRIGHT INFORMATION is information that is protected, such as newspaper articles, photos and other content deemed as protected.

IMAGES are photos of you floating around in digital dystopia.

The next few chapters show you how you will play digital detective and hunt for everything that is known about you. The problem with information online is that it’s like an ocean where the tides and currents choose their time and direction. Therefore, once you locate your information, I suggest that you wait a few days and redo the search for information you possibly missed or that was recently posted.

Frank M. Ahearn
Author of: The Little Black Book Of Skip Tracing: Creating Pretext, Mastering Social Engineering And Finding Anyone Anywhere

How to Disappear & Remove Online Information

I am posting the Digital Hit Man online.

The Run Down:

There are a few ways to remove your information from a website, such as politely asking them to remove the information, hacking the site and creating massive destruction, or creating a pretext that prompts them to remove the information. Unfortunately, asking does not always work and sometimes the request you make could backfire in your face and create the Streisand Effect.

The Streisand effect is primarily an online phenomenon in which an attempt to hide or remove a piece of information has the unintended consequence of publicizing the information more widely. It is named after American entertainer Barbra Streisand, whose attempt in 2003 to suppress photographs of her residence inadvertently generated further publicity.

As far as hacking goes, most of us do not know how to hack, so that’s probably a dead end street. It is also illegal, and what’s the point of that? Why get your-self jammed up?

Pretext: Creating a lie to cloak your true intentions in order to obtain or manipulate information

If hacking or asking to remove your information is not a viable option, you can always attempt a pretext. Pretext is all about lying and convincing the bastard who is posting your information to remove the information. There is good pretext and then there is bad pretext. Good pretext is “Hi. I’m being stalked. Can you please take information down off your site?” And bad pretext is “Hi. This is the FBI. We need you to remove information from your site.”  That is a no-no!

Part of my writing dilemma was trying to figure out how to take this deception in my head and put it on paper and have it make sense because some things in my head just do not make sense when I put them on paper. Then again, at times it seems a lot of things in my head make no sense. After the disappearing washed from my veins and the new blood of deception arrived, I had to figure out and somehow categorize the deception, and this is what I came up with.

The Tools of Online Deception

Digital DNA: Locating all of your online information and preparing for combat.

Corp-Distort-Delete: Distorting your online accounts.

The Pretext Solution: Pretexting website to remove your online information.

Digital Distortion: Creating same name websites with different extensions and then stripping negative information and replacing it with positive or neutral information on your sites.

Fake Digital Identities: Creating websites, blogs and social sites that all share your name.

Photo Distortion and Photo Doubles: The utilization of fake photos 

Propagation: Marketing the shit out of your online information.

Total War: When all else fails, Total War means going head to head with the websites.

These are the tools I came up with and that I believe will assist you in combating your online information. So sit back, strap in and let’s go for a ride.

Frank M Ahearn
Author of: The Little Black Book Of Skip Tracing: Creating Pretext, Mastering Social Engineering And Finding Anyone Anywhere