jezebel

How to Disappear – Pretext or Deceive

How you go about combating your online information is extremely important. Pre-text may or may not be an option. It really depends on your confidence skills and your ability to come up with a workable pretext. When I say “pretext,” I do not narrow it to picking up the phone and gagging someone. Pretext can include an email claiming a photo of you is copyright-protected and insisting the website take the photo down.

In the skip tracing world we have what is called a one-shot deal, where you have only one opportunity to pretext. If you fail, you are shit out of luck and the pretext may just backfire. Remember Barbara Streisand? The one-shot deal business partner is Mr. Kick-back, one of those things you never want to happen. It’s when everything blows up in your face because the person or entity you did the pretext on just doesn’t believe you.

ONE SHOT DEAL

ONLY ONE CHANCE TO OBTAIN THE INFORMATION 

KICK-BACK

WHEN THE PRETEXT BLOWS UP IN YOUR FACE

It is very important that you carefully consider the down-side to pretexting a website or simply requesting they take down your information. You do not want it to backfire, with the person behind the curtain deciding to call your bluff and the next thing you know, your pretext is the next big story on Jezebel. If the pretext route does not work for you, then you move forward and work the tools of deception.

When one utilizes deception as a weapon to battle online information, one needs to do so with the mindset of total war. Think of the websites as belligerents who post your information or your child’s information for the sheer purpose of making advertising money. What site doesn’t have Google ads or click-thru links? Your information is their inventory. The idea of total war is to

use all available resources to win the battle. My purpose is to teach you the Weapons for Waging War and Winning against the Digital Enemy.

The first step in combating your online information is locating all of your Digital DNA. The best way to categorize your Digital DNA is into five digital genes of information.

The Five Genes of Digital DNA

SELF is the information that you provided to third-party sites like Facebook, LinkedIn, blogs, Twitter, online comments and any other sites where you physically participated in broadcasting.

PIV stands for Personal Information Violation, which is when someone posts your information or photo online without your permission.

DATABASE is the information that sells for $9.99 and typically consists of public records and other free online information.

COPYRIGHT INFORMATION is information that is protected, such as newspaper articles, photos and other content deemed as protected.

IMAGES are photos of you floating around in digital dystopia.

The next few chapters show you how you will play digital detective and hunt for everything that is known about you. The problem with information online is that it’s like an ocean where the tides and currents choose their time and direction. Therefore, once you locate your information, I suggest that you wait a few days and redo the search for information you possibly missed or that was recently posted.

Frank M. Ahearn
www.FrankAhearn.com
Author of: The Little Black Book Of Skip Tracing: Creating Pretext, Mastering Social Engineering And Finding Anyone Anywhere