How to Disappear – Go Where?

CHAPTER ELEVEN – How to Disappear From Big Brother

Now that we know BIG BROTHER is spying on the whole world, the magic question is how do we plan our disappearance without leaving a trace or not be connected to our footprints. Unfortunately, there is no magical answer. However, the tools I provide will assist you in stretching your connection and making it more difficult for your predator to find and follow you. Remember the belief in the untraceable only slips from the mouth of fools.

You wake up on Monday and it is time to begin your disappear research. Your first step is to go and pick up the disappear laptop and prepaid cell phone you previously stashed in your mail drop. You do not drive there because your car GPS tracks your movement. You leave your known cell phone at home or work, its GPS can track you. It is best to take public transportation and do not use your monthly transportation card to board the bus or train it can track you.

Convenience Captures!

When you leave your home, remember there is an unseen third party watching you. This third party is an enemy walking behind you, looking over your shoulder, tucked away in the technology you carry. This third party is the invisible enemy you cannot foresee and it has one goal, which is to know all about you.

You do not take the train or bus directly to your mail drop, mix it up a bit and shake the tail. Get off a few stops before or after the mail drop and walk.

Continuously ask yourself if you did something wrong or made a mistake and created a connection to the mail drop. If by chance, you run into someone you know do not go to the mailbox, take a few minutes and walk out of the area.

There are few surfing options available. Some buildings have public space and they offer free internet service. I have had success connecting to such services by standing near the door outside the building.

Some parks, malls and city spaces offer free service too. You can utilize these locations as long as your laptop does not have any identifiers. In Dublin and other cities, there are rows of restaurants that provide free internet. I have connected to them standing on the sidewalk and sitting parked in a taxi. Be aware of surveillance cameras, which can identify your face with the connection.

Another other option, which I like, is climbing on unsecured wireless around a cluster of residential buildings. Although, easier said than done. It can take a lot of hoofing through the streets to locate a connection.

If you are fortunate, enough not to live in the cornfields of Indiana there is another option. Prepaid internet wireless is available for purchase. This type of wireless you purchase the same way you purchased your phones. You have a THIRD PARTY enter the store and make the purchase.

Do not use all the wireless time on the prepaid internet service. When you get down to about ten minutes left leave the wireless hub with password for someone to find. Hopefully, the stranger will jump on the wireless, do some surfing, which can assist with digital dirt if your surfing is discovered.

I would suggest staying away from libraries. If I remember correctly, BIG BROTHER does not need a search warrant to obtain library records. Then again, it is not as if the government needs a warrant to do anything lately when it comes to our records.

If you plan to use an internet café, I would avoid certain ethnic locations. I do not want to be racist but I am sure BIG BROTHER monitors specific ethnicity over others.

Keep in mind that the owner keeps records of everything you do in an internet café. If you are searching for your disappear place in Latvia, do a little searching in the Ukraine and Lithuania to mix it up. 

The United States of Fearica is Watching You!

It is quite surreal sitting here writing a book about disappearing from BIG BROTHER. We truly arrived at a bizarre social place in the United States of Fearica. Who would have thought that the subpoena process has become a thing of the past?

BIG BROTHER is doing some evil deeds and it does not look as if they will be retreating anytime soon. What makes Fearica any different from East Germany in the days of the iron curtain? The Stasi spied on it citizens for the same reason the NSA spies on its citizens, to stop terrorism. Communism viewed capitalism as a form of terrorism too.

One of the problems with government is it does not always know what it is best for society or its citizens nor do they seem to listen when society shouts it had enough. McCarthyism and Prohibition were huge mistakes in Fearica history. I wonder if in fifty years if BIG BROTHER spying will be recognized as an evil act and social mistake.

When you are searching for a location to utilize the internet, ask yourself if BIG BROTHER can trace the connection. The answer is most likely yes, because the government spies on all its citizens. BIG BROTHER is probably not spying directly on Buck’s Internet Café but you should always operate with the mindset they are. However, the important question to ask is can you be identified with that particular connection. If the answer is yes, run. If the answer is no, all is good. The trick in the game is to avoid a connection to the trace.

Outsource Your Search

Another way to safely search online is to hire a friendly third party service or outsourcing service to do you internet searching and emailing. There are plenty of third party and outsourcing services online. Before you sign up for any services obtain a prepaid debit card and a disposable email account.

After you sign up for the service, you will have the opportunity to post the work or type of worker you need. In a matter of minutes, you will receive a dozen responses.

Before you hire an assistant, it is important to have a cover story to tell. You cannot tell them the truth that you are disappearing and you want them to create your digital footprints. Explain that you are relocating and you would like them to assist in searching information about the city.

The third party assistant can send the information you requested to an email you provide, or they can post the information on the outsourcing service website for you to review. I personally would go the posting route. Someone searching for you would need to know that you signed up for that third party service and then locate your third party assistant to track you down.

Do Not Be a White Guy!

If you are, a white guy like Frank M. Ahearn, do not sign up using an email address that appears to be from a white guy. Mix it up; sign up as Felix Reyes, Francois Beaumont, Gina Haynes, Edna Benitez, or Eddie Alvarez. If you are Vlad Vodka, be Peter Lima if you are Roveda Jacobs, be Colleen Brennan and have a little fun.

What I like about using third party services is the people you hire are from all different countries and speak multiple languages. If you want to disappear to Columbia, you will be able to locate a worker in Columbia. This is great since they can assist in advising you on the infrastructure. Never become too friendly or reveal your identity or motives to your third party assistant.

Frank M. Ahearn
www.FrankAhearn.com
Author of: The Little Black Book Of Skip Tracing: Creating Pretext, Mastering Social Engineering And Finding Anyone Anywhere

How to Disappear – Go!

CHAPTER TEN – How to Disappear from Big Brother

In the STOP chapter, I explained the importance of STOPPING and walking away from your computer. The GO chapter is about finding and using computers and internet services that have no connection to you.

When I use the word connection, I mean that you have no direct link to the computer or internet connection. This does NOT mean the connection is untraceable. When I say connections, I mean online/digital connections and offline connections.

The reason I use the word connection is that people tend to forget that connections can create traces just as digital can create digital footprints. If you begin to see them as a whole or the same, you will most likely create fewer footprints.

Take Mr. Munich who I located in Nice. He started out in Munich and created a connection to Belfast. The Belfast apartment created a connection to an internet café and the internet café created a connection to Nice and Monaco.

The mistake Mr. Munich created was not thinking about his online and offline connections as a whole. He probably thought he was being smart not having an internet connection in the Belfast apartment. However, all this did was force me to walk the streets of Belfast searching for a connection he may have used.

Mr. Munich should have stood on the street in front of the Belfast internet café and asked himself if a connection with the internet café exists.

Keep in mind things tend to appear private, like an internet café two blocks from your home but in reality, it is not private and to a degree guilty by association. Remember paying cash and not using your name is not anonymous!

a·non·y·mous – əˈnänəməs/ – adjective: anonymous – (of a person) not identified by name; of unknown name. 

con·nec·tion – kəˈnekSHən/

noun: connection; plural noun: connections; noun: connexion; plural noun: connexions

a relationship in which a person, thing, or idea is linked or associated with something else.

Again, if Mr. Munich stood in front of the internet café and thought carefully about what he was about to do it is possible that he may have realized that the location was not safe.  He would have realized that there is a connection between the internet store and his apartment. There is not a digital connection but a walking connection, which is no different from a digital connection.

What Mr. Munich should have done is set up an internet connection in the Belfast apartment and spread the internet with some bogus traces. Instead of searching for hotels and exotic car rentals in Nice and Monaco at the Belfast internet café he should have searched in Belgrade. It is quite possible I would have been on a plane to Belgrade.

To connect to the internet Mr. Munich should have taken a train ride a few hours south to Dublin. From there find free internet service offered in many parts of the city and do his thing.  It is more than likely that I would not have discovered his disappearance to Monaco.

It is important to understand that the goal is to break or seriously distance your identity from the connections you utilize. That does not guarantee the connections will not be discovered but it will make it more difficult for BIG BROTHER or any predator to locate.

Let me shuffle around and talk about the evil twins in society, BIG BUSINESS and BIG BROTHER. Both of them want to know everything about you and neither care about your personal privacy. The snoopy BROTHERS also want to use your information to further their cause. One wants money and the other wants control.

Whether you like it or not we are small pawns in the big game of information- gathering. In my opinion, we have entered a dark era where governments are spying more on their citizens than ever before. East Berlin will go down as the amateurs of citizen spying and the world champions will be The United States of Fearica.

It is up to you to decide what information you keep private and what information you give away. It is also up to you to figure out how to keep your information private. Privacy is only as private as you make it. If you email compromising photos of yourself, it is equal to handing the postal worker the photos with and open envelope. If you email questions to your offshore banker, your government will know about it.

If you write information in your email that, you do not want to share publicly. That is equivalent to shouting it through a megaphone on your street corner. Other people have access to your communications, as simple as that. Privacy discretion begins with you and your actions.

We are being monitored twenty-four seven in various ways. When you turn on your light on in the morning the utility company knows you have most likely woken up. The cable company knows what you watch on TV and when you change the station. The internet company knows when you log on and what you surf. Your building manager knows when you step in the elevator and exit the building. The police know when you walk down the street. The subway police know which train station you enter and which station you exit. The building manager for the building you work at knows when you arrive. Your employer knows your internet habits and possibly the contents of your emails. Daily life has become intrusive and there seems to be no stopping in the future. Always remember there is a third party witnessing and recording your actions.

Where to Surf?

The unfortunate reality of disappearing is there is no 100% private place to surf and plan your disappearance. You must locate a place that has no connection to you. This is the best odds of safe surfing. Always keep in mind that technology changes each second of the day. The location you believe secure today will become the compromised location tomorrow, if not sooner.

GO Location

The GO location is where you will search and acquire your GO tools. From this point on, I want you to forget about the word digital and solely think connections.

The GO Tools – Large Mail Drop – Several Prepaid Debit Cards – Several Prepaid Cell Phones – Several Prepaid Calling Cards – Cheap Laptop or Tablet

Finding a mail drop in most countries is easy. I suggest not using a brand box store but a locally owned drop store. They are the stores that usually have boxes strewn all over the place and most likely will not take notice of you using the mail box as a stash.

The reason for using a mail drop is to stash your disappear gear and to keep it from other people’s hands. If you unknowingly allow others to have access to your phone or laptop, they could put a tracking device or keystroke software on your computer.

The spyware can blow your disappear plans out of the water. I would suggest using several mail drops so not to keep your gear in one location. This is smart in case you need to leave town quickly and one of your boxes are blown.

A note about prepaid credit/debit cards, there are two different types. One card you fill out an application, which has identifiers like, name, address, and social security number. The second card is more of a gift cards supplied by credit card companies. The gift cards you give cash to the cashier to load up the card with credit and the best part is there are no identifiers. However, keep in mind there is the store surveillance capturing the transaction.

Think Connections When Obtaining Tools

Never walk into a store yourself and purchase disappear tools! Remember CONNECTIONS! I would assume that 99.9% of retail locations have surveillance cameras. Do not think you are James Bond or Jason Bourne and try going into the store with a disguise unless you have no other choice.

What you do, is go to a city area that is bustling with people and pay a less fortunate individual a couple of bucks to go into the store and purchase your disappear gear. Do not tempt the minion and hand over a hundred-dollar bill for the purchase. They might disappear, on you.

Give only enough money to buy two phones at a clip and pay them their reward when the merchandise is in your hands. Do not stand in front of the store waiting for your merchandise because a camera could pick you up. Wait across the street out of eyeshot of surveillance cameras.

Be Smart About Your Choice in Minions!

Never, ever give money to a minor to purchase your disappear tools. An individual I spoke with paid a teenager to go into a store and buy a bunch of prepaid phones and several prepaid credit cards.  Standing behind the teen at the register was a plain-clothes detective who found the purchase odd. The detective followed the teen outside and observed him handing over the merchandise to a much older man. Even though there was, no law broken the person found himself in quite the awkward position.

When it comes to a laptop or tablet, buy a cheap small one that will fit in your mail drop. You will NOT register the computer. You will NOT check your real email or any connected email addresses. You will NOT do anything where you have to sign in with identifying information. This laptop is to search for your desired destination. 

NEVER

Bring Tools to Home or Work – Have Automatic Wireless Connections – Use Identifiable Information – Never Create Connections

The predator hunting you down can make one hundred mistakes but you the prey cannot afford one mistake. Before you walk into a store, coffee shop or internet café to surf, stand outside and ask if you are creating a connection.

Frank M. Ahearn
www.FrankAhearn.com
Author of: The Little Black Book Of Skip Tracing: Creating Pretext, Mastering Social Engineering And Finding Anyone Anywhere

How to Disappear – Stop!

CHAPTER NINE – How to Disappear from Big Brother

Do not permit your internet connection to become your accomplice. One of the most serious mistakes disappear hopefuls commit when the idea of disappearing sparks in the mind is not stopping what they are doing and walking away from their computer.

There is no shortage of dumb people in the news. We have read about Mr. Dumbass who emails his son his new contact information after he fakes his death. Then there is Mrs. Idiot who emails her disappear plans to the lover that killed her husband. My favorite is Mr. Chainsaw Shovel Dumbass on the surveillance camera buying the murder tools with cash.

Cash Does Not Make You Anonymous!

Your internet connection is a rat and the worst partner in crime you could ever solicit. In the real world, some partners in crime are stand up guys and can take a pinch.

Once you entrust your internet connection with pieces of your disappear plan there is no turning back. Understand that your internet connection is the biggest rat in the world and will always dime you out! Your internet connection will never invoke the right to remain silent.

What happens is your internet history enters the digital witness protection program and waits to testify against you. There is no hit man capable of killing your internet history

The message of this chapter is to learn from stupid criminals. Stupid criminals leave traces and do not think beyond the crime. Stupid criminals usually believe they are the smartest one in the crime. The mindset and strategy to embrace is that the predator or BIG BROTHER is the smartest one in the room. By thinking this way, you will never under estimate their abilities.

STOP means stop! Stop all of your surfing and searching from your computers. You are probably thinking or hoping that I am going to lead you to an untraceable solution. Well, you are wrong.

Searching for the untraceable is a fool’s journey, it is the Holy Grail and Noah’s Ark and neither exist. For every software that touts untraceable, some geek is breaking the code. All those privacy software services and anonymous connections you signed up for are useless.

This is not to say that some badass hacker from Anonymous cannot create an untraceable connection. What I am saying is the average person reading this book does not have the technical skills to create their own untraceable connection. Nor could most test privacy software and determine if it truly is private. Using software that makes claims is only placing blind faith in a label. Unless you are a techie, geek keep to what you know.

For the moment, forget about where you are going to locate an untraceable computer and connection. It is time to clean up the digital trace you left behind. Meaning the digital dirt you created in the early stages of your disappear searching.

That would the curious photos of Bimini, airfare to Jamaica, year round weather in Buenos Aires, and banks in Finland and relationship sites in Riga. Trust me ninety-nine percent of you reading this book have digital flakes in the wake. I would wager that at least fifty percent of readers have typed how to disappear into a search engine on a traceable computer or connection.

In six months from now when one of you has faked their death law enforcement or an insurance investigator will obtain a history of IP addresses searched. Law Enforcement might be able to obtain the search terms entered into a search engine. When they discover the words how to disappear in your list the jig will be up and you will be in the hunt.

The information you searched about disappearing cannot be erased or undone. If you planned on faking your death, sorry dude but you are cooked.

If you planned on disappearing from a predator there is hope. You will need to get back on each of the traceable and identifiable computers and connections you utilized and create damage control.

Keep in mind there are two type of footprints created. One is the computer you used and the second is the internet connection you used.

Make a list of computers used and the locations where you accessed the internet. For example if you have a personal laptop you use at home and work, that is three connection. 

Personal Laptop – Home Connection – Work Connection 

If you used your personal laptop at the coffee shop on the corner and your sister’s home those places need to be added to your connection.

Personal Laptop – Home Connection – Work Connection – Coffee Shop Connection – Sister’s Connection

The same goes if you went to your Aunt Agnes’s for Thanksgiving and you searched for apartments in Caye Caulker on your smart phone. The important question is did you conduct the search via your cell phone wireless or did you jump on Aunt Agnes’s wireless connection?

It is vital you remember three key pieces. Hardware used, like phone or laptop. Connections used, home, work, cell phone and last but far from the least what destinations you searched. You certainly do not want to end up in any of those places.

Think about the various services like banks, cell carriers, web hosting and anything else that could lead to your downfall. Could you imagine if you disappeared to Fiji and six months later BIG BROTHER or another predator gets hold of your internet search history?

All it takes is one search forgotten to land yourself in the mouth of the lion. Always remember that if it turns on or off, it possibly has history!

The BIG BROTHER traceable list goes on and on and on and never ends. If you are in the hunt, I have no doubt that BIG Brother is peaking into your friends and family. I want you to also think geography and ask yourself if you searched the net at any public locations near your work.

Did you sip a latte in a café searching Chicago or eat burger while searching Bruges. Perhaps you surfed at the library down the block or at your sister’s home and brothers business.

Did you drive to an internet café? The GPS in your car will rat you out. Did you bring your cell phone with you when you searched from an internet café across town? If so your cell phone GPS could reveal the location. I am sure you left a dirty digital trail behind but wait there is more.

Have you flown on a plane lately? If so, did you use the onboard wireless? Surely, BIG BROTHER would not find out about that. Wrong! I have no doubt BIG BROTHER is gobbling up all internet use on planes. All those offshore banks you read about online are dead in the water. Think, think and think some more. Where did you surf from and how will BIG BROTHER find your digital trail or connection?

As you probably know at this point prior to my illustrious career in the disappearing and privacy world, I was a skip tracer and located people in all parts of the world for many a reasons.

One such client I remained in touch with is Mr. Roulette. He reached out to me and asked if I could locate some scoundrel that ran off with a few million euros. I am still waiting for my opportunity to run off with a few million euros myself. If you have, any ideas run them by me.

The subject, Mr. Munich had an office in downtown Munich and when I did some searching, I discovered he never had any internet services connected in his office. However, he did leave behind a few pieces of information that led me to Belfast.

Keep something in mind not having internet connected in your home or office only pushes a predator to search for your internet connection elsewhere. Do not leave that to fate, set up a bogus connection that the predator will discover.

After pounding the streets of Belfast for a few days, I was able to locate an apartment Mr. Munich rented. That apartment never had internet, phone or cable TV service connected. Mr. Munich was somewhat slick. So he thought.

Since the Munich office and Belfast apartment had no internet service one of two things were happening. He used an internet air card, hopped on someone else’s service or went to an internet café

Mr. Munich seemed like a smart criminal so I assumed he did not use a wireless connection he physically carried. If he were apprehended law, enforcement they would know his search history and this would bring him down.

While wandering the streets of Belfast I noticed a few internet places he could have utilized to do his surfing. I took a shot and went into an internet café that I assumed the Mr. Munich may have used. It was a small place and in close proximity, a total gamble on my part. I laid down three hundred euros in front of the woman working the cash register and I asked for a list of IP addresses accessed in past sixty days. The pink haired woman asked if I was serious, and I slid the cash her way. She was kind enough to print the IP’s numerical and then by date. From there I walked to a shipping store and faxed the list of IP’s to my third party service in Denmark.

My Denmark contact enlisted her friends to assist with the job of identifying the various information I was able to extract. One piece of information led to a bank in Monaco; I knew this had to be Mr. Munich. I doubt that any of the customers who used the Belfast internet cafes were checking their balances in Julius Baer.

The information I located was like a road map to Nice and Monaco. One particular group of searches was of interest to me. It was to an exotic car rental company and a particular hotel.

I hopped on a plane to Nice and visited the hotel but I was unable to locate Mr. Munich and could not get any information from the staff.

Next, I hit up the exotic car rental company. I knew they would not provide me with any information about who rented what car. Therefore, I inquired about the types of cars that were not currently available. I assumed that one of those cars would be the one Mr. Munich would be driving.

My next stop was to all the expensive restaurants and I spread a bunch of euros around to the valets. I asked them to keep an eye for a short man with a German accent driving a particular type of luxury car. The following day I received a call and sure enough, a valet identified Mr. Munich. I contacted my client who handled the matter from there on.

Perhaps Mr. Munich should have traveled further away from the Belfast apartment to do his online business. The searches to Nice and Monaco were so uncharacteristic of the Belfast neighborhood. It shot up red flags immediately. It would not have been a red flag if the information were from an internet café in a nice neighborhood in Paris.

I will assume you have created a list of all the compromised computers and locations. Therefore, after you have the list, go to each computer and create digital dirt. Which is digital deception you create and leave behind for others to find.

If you searched realtors, banks and other types of services in Jamaica or Dominica search deeper into both countries. Search singles websites, hospitals, airlines, expat communities and other information relevant to you.

If you searched, drivable locations do a few different searches on MapQuest. For example, if you live in Chicago and you searched Chicago to Phoenix. Look up airlines in Phoenix for flights to Mexico. Then search MapQuest for driving directions from Durango to Monterey, Mexico. Search hotels and banks in Monterey.

Do not forget to search restaurants, supermarkets and email the Chamber of Commerce with a few questions. The searching cannot be cursory, such as one search to the chamber of commerce. Also, search on different days and jump around from page to page.

Do more than surf. Open a few email accounts and do some emailing. Email the local Electric Company, Phone Company, hotels and car rental companies. Create dialogue and ask questions in the emails. Contact a local doctor and ask how you can transfer your medical records. Search YouTube for foreign language videos. The goal is to have the digital predator believe you have split to one of the compromised cities.

You should realize that since you searched your destination from compromised computers and connections there will be no disappearing to those places.

Some people talk too much. If you are the chatty type of fellow or dame, ask yourself if your lips have betrayed you and if you shared your disappearance or destination with another.

Think beyond random chatter. Do you have that dream place in mind that everyone knows about? You know what I mean, the poster of St. Kitts on your wall or travel books about Barcelona.

Are you the person who always talked about moving to Paris or Madrid? Are your computer screen photos of Lisbon? Perhaps you have that travel book of Geneva on your bookshelf. Look around your home and search for possible clues that could lead to your disappear city. You may not think it but something as silly as a refrigerator magnet of a city could be your downfall.

When Frank M. Ahearn disappears, his circle of people will know it will be on some street off Boulevard Raspail. They all know this because I share my dream. If you shared your dream destination with others, it is time to change up the dream.

Imagine BIG BROTHER banging on your friends door wanting to know where you went. Your friend is shaking at the idea that BIG BROTHER rang his bell. He has no clue where you went but they push harder. Your friend says all he knows is you had a photo of Bagua Grande, Peru on your refrigerator, busted!

Frank M. Ahearn
www.FrankAhearn.com
Author of: The Little Black Book of Skip Tracing

How to Disappear – Fear the Buttons

CHAPTER EIGHT – How to Disappear from Big Brother

The idea behind being a Virtual Entity is being able to exist “in” society not outside of society. Outside of society be it a commune or deep in a cave with the enlightened ones. However, a commune is not a bad place to disappear.

I assume most people reading this needs or at very least wants access to the digital world, perhaps business, friends, family and even some tasteful porn. The trick is to figure how you can do these things without creating connections.

Disappearing and privacy has changed since the publishing of my first disappear book. In the past, I relied mostly on disinformation, misinformation and reformation. The strategy was to try to delete, manipulate or deviate personal information.

If the client’s home services were in the name of Frank M. Ahearn, I would deviate Frank to Hank and eventually Ahearn to Hearn. In addition, I would deviate the SS#, date of birth, contact numbers and employment. By the time I finished the current information was as abstract as a Picasso painting was. This was the tactic of Misinformation.

From there I would create massive amounts of Disinformation by making it appear the client disappeared to Toronto but actually, the client disappeared to Berlin.

This I accomplished via social media, making bogus phone calls to Toronto and emailing potential employers in Toronto. I purposely leaked information for the predator to find.

The last step of disappearing was Reformation, getting the client from point A to point B in a seamless fashion.

Disappearing people in the past was much easier. I only had to deal with mostly offline information like phone, electric and other database type records. There were minimal amounts of online information and social networking. Today it is much more difficult because information is at a maximum and easily located. In addition, every street you walk down and building you pass has a camera waiting to rat you out.

Fear the Buttons

I say fear the buttons. We click sign on in the morning, we press a button to read our email, we press, reply forward, send and delete.

When a call comes to our cell phone, we press the screen to communicate and then press the screen to end the call. To a large degree, our existence depends on the ability to press buttons. However, technology is perfecting voice activation.

Each touch of the button records our action. Before your finger makes a move ask if the action can trace to you, will the connection, get you captured or killed.

People often asked if it is possible to disappear in the digital age. The answer is yes if you know what you are doing. However, from experience, I have discovered most people do not know what they are doing when it comes to disappearing.

I receive emails from people claiming they need to disappear. They usually address the issue of how to delete their online information. They tend to think that ridding the internet of their information is the end all to their disappear problem. Nothing could be further from the truth. Information assists with locating a person’s where about but it is the physical information that proves their whereabouts.

Online information is only as accurate as its source. Online information can be untrue. The snoop searching for you needs to figure out how to decipher the truth before they move forward and act with the information.

Another question often asked, is it easier to disappear or more difficult to disappear in the digital age? I believe that it comes down to who is using the technology and who is disappearing. It is a chess game, no more, no less. Although those that have the larger budget do own the better odds in the game of hide and seek.

Way back when in my days of skip tracing (finding people) and pretext (lying to obtain information) I worked many crazy cases. Some were seriously dangerous and other outright illegal. Which ultimately brought an unwanted visit to my home; I did everything possible to hide my work and home locations.

This is when the idea of becoming a Virtual Entity popped in my head. My goal was to be able to live, work and not fear a bang on the door.

At first, I thought idea of being a Virtual Entity was being on the move and working out of coffee shops and internet cafes. I would spend an hour in one place and move on to another. The funny part is I never considered the possibility that my car GPS could identify my daily track.

I would spend one hour working on a computer in Hermosa Beach and then ride up to Santa Monica, locate another internet café and set up shop. I never allowed myself more than sixty minutes in one location. I never became friendly with the staff and always parked my car off street.

Then I Realized!

One afternoon I am in an internet café and I sign on to a subjects cell phone account and I hit the print button to print out several months of their phone bill.

After I hit print, I walk over to the printer and wait for the printing to begin. The sweet sound of paper shooting out is like the sound of the morning bell at the New York Stock Exchange.

As I am standing and watching the papers flood from the printer, I see the little screen on the printer display how many pages are to be printed and the current time. Then I look up at a very large round clock and next to the clock is a surveillance camera. Smile Frank.

That is when I realized that connections go beyond the computer screen. I created a physical connection from the downloading of the cell phone bills, to the printing and with the time. All caught on camera.

If the cell company sent an investigator to find out who printed the cell phone bill on Wednesday at 2:30 pm. They would have my shocked face staring at the eye in the sky. This was unsettling and unacceptable in my business. This event made me understand that being a Virtual Entity is someone who has no connections to anything physical.

It became standard operating procedure that everything I did I asked myself if I could be connected to whatever it is, I am doing. If the answer were yes, I asked myself how I could accomplish the same task without creating a link. This is how you must think.

If you are driving from point A to point B and you encounter a toll. Driving through the toll creates a physical connection. If you drive five miles around the toll, there is no connection.

You are probably thinking what if there is no other route around the toll. My answer to that is, you should have thought about that before arriving at the toll. The objective is to be Virtual Entity with peace of mind. No one wants to hear the word gotcha!

Frank M. Ahearn
www.FrankAhearn.com
Author of: The Little Black Book of Skip Tracing

How to Disappear – Go Bags

CHAPTER SEVEN – How to Disappear from Big Brother

I travel a lot and every new city I visit I try to set up a Go Bag. In some cities I have been able to accomplish all go bag contents and in other cities bits and pieces. Better to have bits and pieces then zero! Anytime you enter a foreign city you should set up a Go Bag.

What I do not understand about criminals or those who fake their death is most of them do not have a Go Bag filled with disappear gear or a real walk away plan. It is as if they committed the crime and never anticipated BIG BROTHER knocking on the door.

This is especially true for all the Wall Street swindlers who ripped off their clients. It is as if they thought the good times would never end. At the very least, you would think they would have a million bucks stashed in some small country with no extradition. Although, keep in mind no extradition does not mean you cannot not be extradited. You could become a chess piece traded back to your country for another person of interest.

Throughout the book, I will be writing about the disappearing failures who we have come to know and love because of the massive mistakes they have committed. Learn from their mistakes.

Frank M. Ahearn
www.FrankAhearn.com
Author of: The Little Black Book of Skip Tracing

How to Disappear 123

CHAPTER SIX — How to Disappear from Big Brother

Three questions you need to ask. Where will you go? How will you earn a living? Will it be safe?

Some say money is the root of all-evil but that is untrue in the disappearing world. The lack of money is the evil in the disappearing world. Again, where will you go? How will you earn a living? Will it be safe?

People ask me where is the ideal land of disappear; unfortunately there is no one place that is best or right. We all have different needs. Some people can work from their kitchen table and others need bricks and mortar ruled by geography. Some people are as healthy as can be and other people need to be near specific medical facilities. Some can acclimate in foreign lands and others cannot. True paradise is acquiring what we need. Only you can create your paradise. No book, video or expert can make the decision for you.

Go Short Term But Think Long Term!

When you find that patch of land you want to disappear to, I suggest not renting an apartment for a year but take a two or three month rental. The best rentals are vacation rentals and are typically less expensive than subletting a house or an apartment. Moreover, all utilities are included in the fees and there is nothing in your name but the agreement between you and the person renting you the property. No deposit is necessary.

It is risky to disappear and be one hundred percent sold that the place you are disappearing to, is the place you are going to end up. You could be there two months and hate the city.

If you have a three-month rental, you can split in thirty days and take a small pinch on the money. If you are in a rental for a year, you could lose a lot of green.

In some countries, you may need to pay twelve months of rent in advance for an apartment. Never put yourself in that situation. If BIG BROTHER or your stalker arrives at the door, you could be out mucho dollars.

The internet has created a world of snoops and amateur detectives. It is likely that the person you are renting from will search your name and email address online. Therefore, you will want to create a cover story or backstory the property owner or real estate agent will find about you.

Therefore, before you walk off into the disappearing sunset you must prepare for the internet detectives, “blaggers” and “social twits” you encounter in disappear-land. Internet detectives are those who snoop online, blaggers have blogs and social twits have Twitter.

What social twits and blaggers have yet to realize is online followers, follow other followers to be followed. This is not to say that some do not provide informative and interesting content, just the majority do not. My biggest issue with blaggers and twits is they do not consider the privacy of those they blag and twit about, nor do most of them check sources for the accuracy of information.

For example, I rented an apartment in Munich and later that night I discovered a blog posting about me. The realtor/blagger posted on his blog that he met me and I rented one of his apartments.

The idiot had no clue what I was doing in the city and could have compromised my client. When requested he immediately removed the blog.

 Twit Responsibly! & Blag Responsibly!

When you are renting your apartment, you cannot tell the realtor not to search about you online. You cannot ask them not to twit or blag about you. This will only create more curiosity. Later that night the realtor will evolve into super sleuth and search you out online.

For this reason, you will need to create a cover story. Essentially, you want to lead the snoop to water and make them drink it. With some luck, they will choke on it. The game plan is to create content that is realtor and property owner friendly.

If there is anything you should know about me is, I am against the use of fake or stolen identities. The use of fake credentials only makes you ripe for law enforcement and is just plain stupid. Claiming to be a doctor, lawyer or any type of licensed professional is illegal. Be smart!

Frank M. Ahearn
www.FrankAhearn.com
Author of: The Little Black Book of Skip Tracing

How to Disappear – Raymond Roth

CHAPTER FIVE: How to Disappear from Big Brother

Meet Raymond Roth, who attempted to fake his death at Jones Beach New York in the summer of 2012.  One afternoon, Ray and his 22-year-old son went to the beach to catch some rays. Not long after arriving, Raymond placed his clothes, wallet (minus his driver’s license), IPhone (wiped clean of all data), glasses, etc., on his towel, went for a dip in the cool waters of the Atlantic, and did not return.

The younger Roth dialed his stepmother and alerted her of his father’s disappearance. He then dialed 911 and set a rescue mission into full force. While that authorities, friends and neighbors searched desperately for Raymond, fearing he had drowned, he was enjoying a drive to his timeshare in sunny Florida.

Do Not Do a Ray Roth!

Prior to disappearing, Raymond emailed his son information on how to contact him after the pseudocide, and, just for the heck of it, threw in some unflattering comments about his wife. If you plan to fake your death, do not send contact information after you are allegedly dead. Dumb!

Unbeknownst to Mrs. Roth, Raymond put their house up for sale, wiped out their bank accounts, and upped his life insurance policy to a half-million bananas. A load of bricks must have hit Raymond when he was a child to commit such stupid acts.

Managing to outdo his own stupidity, Raymond left a note for his son explaining how to handle his will and the sale of the house he owned with his wife.  (Just another brilliant move Ray made, involving his son, who quickly folded like a bad hand of cards.)

Let me point out the obvious — you should never walk away from an extremely pissed soon-to-be ex-spouse, nor try to disappear at a timeshare everyone knows about. As soon as his wife, whom he was so clearly devoted to, learned what was going on, she issued a press release and blew Raymond out of the water.   Raymond was kind enough to provide us with a lesson in many of the do not’s of disappearing.

Do Not: Involve Your Children – Do Not Raise Your Insurance Policy – Do Not Email – Information About Your Plan – Do Not Leave Notes Behind – Do Not Piss Off A Spouse – Do Not Put Your House Up For Sale – Do Not Disappear To Known Locations

If you plan to fake your death, ask your self are you committing a Ray Roth.

Frank M. Ahearn
www.FrankAhearn.com
Author of: The Little Black Book of Skip Tracing