How to Disappear – Stop!

CHAPTER NINE – How to Disappear from Big Brother

Do not permit your internet connection to become your accomplice. One of the most serious mistakes disappear hopefuls commit when the idea of disappearing sparks in the mind is not stopping what they are doing and walking away from their computer.

There is no shortage of dumb people in the news. We have read about Mr. Dumbass who emails his son his new contact information after he fakes his death. Then there is Mrs. Idiot who emails her disappear plans to the lover that killed her husband. My favorite is Mr. Chainsaw Shovel Dumbass on the surveillance camera buying the murder tools with cash.

Cash Does Not Make You Anonymous!

Your internet connection is a rat and the worst partner in crime you could ever solicit. In the real world, some partners in crime are stand up guys and can take a pinch.

Once you entrust your internet connection with pieces of your disappear plan there is no turning back. Understand that your internet connection is the biggest rat in the world and will always dime you out! Your internet connection will never invoke the right to remain silent.

What happens is your internet history enters the digital witness protection program and waits to testify against you. There is no hit man capable of killing your internet history

The message of this chapter is to learn from stupid criminals. Stupid criminals leave traces and do not think beyond the crime. Stupid criminals usually believe they are the smartest one in the crime. The mindset and strategy to embrace is that the predator or BIG BROTHER is the smartest one in the room. By thinking this way, you will never under estimate their abilities.

STOP means stop! Stop all of your surfing and searching from your computers. You are probably thinking or hoping that I am going to lead you to an untraceable solution. Well, you are wrong.

Searching for the untraceable is a fool’s journey, it is the Holy Grail and Noah’s Ark and neither exist. For every software that touts untraceable, some geek is breaking the code. All those privacy software services and anonymous connections you signed up for are useless.

This is not to say that some badass hacker from Anonymous cannot create an untraceable connection. What I am saying is the average person reading this book does not have the technical skills to create their own untraceable connection. Nor could most test privacy software and determine if it truly is private. Using software that makes claims is only placing blind faith in a label. Unless you are a techie, geek keep to what you know.

For the moment, forget about where you are going to locate an untraceable computer and connection. It is time to clean up the digital trace you left behind. Meaning the digital dirt you created in the early stages of your disappear searching.

That would the curious photos of Bimini, airfare to Jamaica, year round weather in Buenos Aires, and banks in Finland and relationship sites in Riga. Trust me ninety-nine percent of you reading this book have digital flakes in the wake. I would wager that at least fifty percent of readers have typed how to disappear into a search engine on a traceable computer or connection.

In six months from now when one of you has faked their death law enforcement or an insurance investigator will obtain a history of IP addresses searched. Law Enforcement might be able to obtain the search terms entered into a search engine. When they discover the words how to disappear in your list the jig will be up and you will be in the hunt.

The information you searched about disappearing cannot be erased or undone. If you planned on faking your death, sorry dude but you are cooked.

If you planned on disappearing from a predator there is hope. You will need to get back on each of the traceable and identifiable computers and connections you utilized and create damage control.

Keep in mind there are two type of footprints created. One is the computer you used and the second is the internet connection you used.

Make a list of computers used and the locations where you accessed the internet. For example if you have a personal laptop you use at home and work, that is three connection. 

Personal Laptop – Home Connection – Work Connection 

If you used your personal laptop at the coffee shop on the corner and your sister’s home those places need to be added to your connection.

Personal Laptop – Home Connection – Work Connection – Coffee Shop Connection – Sister’s Connection

The same goes if you went to your Aunt Agnes’s for Thanksgiving and you searched for apartments in Caye Caulker on your smart phone. The important question is did you conduct the search via your cell phone wireless or did you jump on Aunt Agnes’s wireless connection?

It is vital you remember three key pieces. Hardware used, like phone or laptop. Connections used, home, work, cell phone and last but far from the least what destinations you searched. You certainly do not want to end up in any of those places.

Think about the various services like banks, cell carriers, web hosting and anything else that could lead to your downfall. Could you imagine if you disappeared to Fiji and six months later BIG BROTHER or another predator gets hold of your internet search history?

All it takes is one search forgotten to land yourself in the mouth of the lion. Always remember that if it turns on or off, it possibly has history!

The BIG BROTHER traceable list goes on and on and on and never ends. If you are in the hunt, I have no doubt that BIG Brother is peaking into your friends and family. I want you to also think geography and ask yourself if you searched the net at any public locations near your work.

Did you sip a latte in a café searching Chicago or eat burger while searching Bruges. Perhaps you surfed at the library down the block or at your sister’s home and brothers business.

Did you drive to an internet café? The GPS in your car will rat you out. Did you bring your cell phone with you when you searched from an internet café across town? If so your cell phone GPS could reveal the location. I am sure you left a dirty digital trail behind but wait there is more.

Have you flown on a plane lately? If so, did you use the onboard wireless? Surely, BIG BROTHER would not find out about that. Wrong! I have no doubt BIG BROTHER is gobbling up all internet use on planes. All those offshore banks you read about online are dead in the water. Think, think and think some more. Where did you surf from and how will BIG BROTHER find your digital trail or connection?

As you probably know at this point prior to my illustrious career in the disappearing and privacy world, I was a skip tracer and located people in all parts of the world for many a reasons.

One such client I remained in touch with is Mr. Roulette. He reached out to me and asked if I could locate some scoundrel that ran off with a few million euros. I am still waiting for my opportunity to run off with a few million euros myself. If you have, any ideas run them by me.

The subject, Mr. Munich had an office in downtown Munich and when I did some searching, I discovered he never had any internet services connected in his office. However, he did leave behind a few pieces of information that led me to Belfast.

Keep something in mind not having internet connected in your home or office only pushes a predator to search for your internet connection elsewhere. Do not leave that to fate, set up a bogus connection that the predator will discover.

After pounding the streets of Belfast for a few days, I was able to locate an apartment Mr. Munich rented. That apartment never had internet, phone or cable TV service connected. Mr. Munich was somewhat slick. So he thought.

Since the Munich office and Belfast apartment had no internet service one of two things were happening. He used an internet air card, hopped on someone else’s service or went to an internet café

Mr. Munich seemed like a smart criminal so I assumed he did not use a wireless connection he physically carried. If he were apprehended law, enforcement they would know his search history and this would bring him down.

While wandering the streets of Belfast I noticed a few internet places he could have utilized to do his surfing. I took a shot and went into an internet café that I assumed the Mr. Munich may have used. It was a small place and in close proximity, a total gamble on my part. I laid down three hundred euros in front of the woman working the cash register and I asked for a list of IP addresses accessed in past sixty days. The pink haired woman asked if I was serious, and I slid the cash her way. She was kind enough to print the IP’s numerical and then by date. From there I walked to a shipping store and faxed the list of IP’s to my third party service in Denmark.

My Denmark contact enlisted her friends to assist with the job of identifying the various information I was able to extract. One piece of information led to a bank in Monaco; I knew this had to be Mr. Munich. I doubt that any of the customers who used the Belfast internet cafes were checking their balances in Julius Baer.

The information I located was like a road map to Nice and Monaco. One particular group of searches was of interest to me. It was to an exotic car rental company and a particular hotel.

I hopped on a plane to Nice and visited the hotel but I was unable to locate Mr. Munich and could not get any information from the staff.

Next, I hit up the exotic car rental company. I knew they would not provide me with any information about who rented what car. Therefore, I inquired about the types of cars that were not currently available. I assumed that one of those cars would be the one Mr. Munich would be driving.

My next stop was to all the expensive restaurants and I spread a bunch of euros around to the valets. I asked them to keep an eye for a short man with a German accent driving a particular type of luxury car. The following day I received a call and sure enough, a valet identified Mr. Munich. I contacted my client who handled the matter from there on.

Perhaps Mr. Munich should have traveled further away from the Belfast apartment to do his online business. The searches to Nice and Monaco were so uncharacteristic of the Belfast neighborhood. It shot up red flags immediately. It would not have been a red flag if the information were from an internet café in a nice neighborhood in Paris.

I will assume you have created a list of all the compromised computers and locations. Therefore, after you have the list, go to each computer and create digital dirt. Which is digital deception you create and leave behind for others to find.

If you searched realtors, banks and other types of services in Jamaica or Dominica search deeper into both countries. Search singles websites, hospitals, airlines, expat communities and other information relevant to you.

If you searched, drivable locations do a few different searches on MapQuest. For example, if you live in Chicago and you searched Chicago to Phoenix. Look up airlines in Phoenix for flights to Mexico. Then search MapQuest for driving directions from Durango to Monterey, Mexico. Search hotels and banks in Monterey.

Do not forget to search restaurants, supermarkets and email the Chamber of Commerce with a few questions. The searching cannot be cursory, such as one search to the chamber of commerce. Also, search on different days and jump around from page to page.

Do more than surf. Open a few email accounts and do some emailing. Email the local Electric Company, Phone Company, hotels and car rental companies. Create dialogue and ask questions in the emails. Contact a local doctor and ask how you can transfer your medical records. Search YouTube for foreign language videos. The goal is to have the digital predator believe you have split to one of the compromised cities.

You should realize that since you searched your destination from compromised computers and connections there will be no disappearing to those places.

Some people talk too much. If you are the chatty type of fellow or dame, ask yourself if your lips have betrayed you and if you shared your disappearance or destination with another.

Think beyond random chatter. Do you have that dream place in mind that everyone knows about? You know what I mean, the poster of St. Kitts on your wall or travel books about Barcelona.

Are you the person who always talked about moving to Paris or Madrid? Are your computer screen photos of Lisbon? Perhaps you have that travel book of Geneva on your bookshelf. Look around your home and search for possible clues that could lead to your disappear city. You may not think it but something as silly as a refrigerator magnet of a city could be your downfall.

When Frank M. Ahearn disappears, his circle of people will know it will be on some street off Boulevard Raspail. They all know this because I share my dream. If you shared your dream destination with others, it is time to change up the dream.

Imagine BIG BROTHER banging on your friends door wanting to know where you went. Your friend is shaking at the idea that BIG BROTHER rang his bell. He has no clue where you went but they push harder. Your friend says all he knows is you had a photo of Bagua Grande, Peru on your refrigerator, busted!

Frank M. Ahearn
Author of: The Little Black Book of Skip Tracing


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s