CHAPTER TEN – How to Disappear from Big Brother
In the STOP chapter, I explained the importance of STOPPING and walking away from your computer. The GO chapter is about finding and using computers and internet services that have no connection to you.
When I use the word connection, I mean that you have no direct link to the computer or internet connection. This does NOT mean the connection is untraceable. When I say connections, I mean online/digital connections and offline connections.
The reason I use the word connection is that people tend to forget that connections can create traces just as digital can create digital footprints. If you begin to see them as a whole or the same, you will most likely create fewer footprints.
Take Mr. Munich who I located in Nice. He started out in Munich and created a connection to Belfast. The Belfast apartment created a connection to an internet café and the internet café created a connection to Nice and Monaco.
The mistake Mr. Munich created was not thinking about his online and offline connections as a whole. He probably thought he was being smart not having an internet connection in the Belfast apartment. However, all this did was force me to walk the streets of Belfast searching for a connection he may have used.
Mr. Munich should have stood on the street in front of the Belfast internet café and asked himself if a connection with the internet café exists.
Keep in mind things tend to appear private, like an internet café two blocks from your home but in reality, it is not private and to a degree guilty by association. Remember paying cash and not using your name is not anonymous!
a·non·y·mous – əˈnänəməs/ – adjective: anonymous – (of a person) not identified by name; of unknown name.
con·nec·tion – kəˈnekSHən/
noun: connection; plural noun: connections; noun: connexion; plural noun: connexions
a relationship in which a person, thing, or idea is linked or associated with something else.
Again, if Mr. Munich stood in front of the internet café and thought carefully about what he was about to do it is possible that he may have realized that the location was not safe. He would have realized that there is a connection between the internet store and his apartment. There is not a digital connection but a walking connection, which is no different from a digital connection.
What Mr. Munich should have done is set up an internet connection in the Belfast apartment and spread the internet with some bogus traces. Instead of searching for hotels and exotic car rentals in Nice and Monaco at the Belfast internet café he should have searched in Belgrade. It is quite possible I would have been on a plane to Belgrade.
To connect to the internet Mr. Munich should have taken a train ride a few hours south to Dublin. From there find free internet service offered in many parts of the city and do his thing. It is more than likely that I would not have discovered his disappearance to Monaco.
It is important to understand that the goal is to break or seriously distance your identity from the connections you utilize. That does not guarantee the connections will not be discovered but it will make it more difficult for BIG BROTHER or any predator to locate.
Let me shuffle around and talk about the evil twins in society, BIG BUSINESS and BIG BROTHER. Both of them want to know everything about you and neither care about your personal privacy. The snoopy BROTHERS also want to use your information to further their cause. One wants money and the other wants control.
Whether you like it or not we are small pawns in the big game of information- gathering. In my opinion, we have entered a dark era where governments are spying more on their citizens than ever before. East Berlin will go down as the amateurs of citizen spying and the world champions will be The United States of Fearica.
It is up to you to decide what information you keep private and what information you give away. It is also up to you to figure out how to keep your information private. Privacy is only as private as you make it. If you email compromising photos of yourself, it is equal to handing the postal worker the photos with and open envelope. If you email questions to your offshore banker, your government will know about it.
If you write information in your email that, you do not want to share publicly. That is equivalent to shouting it through a megaphone on your street corner. Other people have access to your communications, as simple as that. Privacy discretion begins with you and your actions.
We are being monitored twenty-four seven in various ways. When you turn on your light on in the morning the utility company knows you have most likely woken up. The cable company knows what you watch on TV and when you change the station. The internet company knows when you log on and what you surf. Your building manager knows when you step in the elevator and exit the building. The police know when you walk down the street. The subway police know which train station you enter and which station you exit. The building manager for the building you work at knows when you arrive. Your employer knows your internet habits and possibly the contents of your emails. Daily life has become intrusive and there seems to be no stopping in the future. Always remember there is a third party witnessing and recording your actions.
Where to Surf?
The unfortunate reality of disappearing is there is no 100% private place to surf and plan your disappearance. You must locate a place that has no connection to you. This is the best odds of safe surfing. Always keep in mind that technology changes each second of the day. The location you believe secure today will become the compromised location tomorrow, if not sooner.
The GO location is where you will search and acquire your GO tools. From this point on, I want you to forget about the word digital and solely think connections.
The GO Tools – Large Mail Drop – Several Prepaid Debit Cards – Several Prepaid Cell Phones – Several Prepaid Calling Cards – Cheap Laptop or Tablet
Finding a mail drop in most countries is easy. I suggest not using a brand box store but a locally owned drop store. They are the stores that usually have boxes strewn all over the place and most likely will not take notice of you using the mail box as a stash.
The reason for using a mail drop is to stash your disappear gear and to keep it from other people’s hands. If you unknowingly allow others to have access to your phone or laptop, they could put a tracking device or keystroke software on your computer.
The spyware can blow your disappear plans out of the water. I would suggest using several mail drops so not to keep your gear in one location. This is smart in case you need to leave town quickly and one of your boxes are blown.
A note about prepaid credit/debit cards, there are two different types. One card you fill out an application, which has identifiers like, name, address, and social security number. The second card is more of a gift cards supplied by credit card companies. The gift cards you give cash to the cashier to load up the card with credit and the best part is there are no identifiers. However, keep in mind there is the store surveillance capturing the transaction.
Think Connections When Obtaining Tools
Never walk into a store yourself and purchase disappear tools! Remember CONNECTIONS! I would assume that 99.9% of retail locations have surveillance cameras. Do not think you are James Bond or Jason Bourne and try going into the store with a disguise unless you have no other choice.
What you do, is go to a city area that is bustling with people and pay a less fortunate individual a couple of bucks to go into the store and purchase your disappear gear. Do not tempt the minion and hand over a hundred-dollar bill for the purchase. They might disappear, on you.
Give only enough money to buy two phones at a clip and pay them their reward when the merchandise is in your hands. Do not stand in front of the store waiting for your merchandise because a camera could pick you up. Wait across the street out of eyeshot of surveillance cameras.
Be Smart About Your Choice in Minions!
Never, ever give money to a minor to purchase your disappear tools. An individual I spoke with paid a teenager to go into a store and buy a bunch of prepaid phones and several prepaid credit cards. Standing behind the teen at the register was a plain-clothes detective who found the purchase odd. The detective followed the teen outside and observed him handing over the merchandise to a much older man. Even though there was, no law broken the person found himself in quite the awkward position.
When it comes to a laptop or tablet, buy a cheap small one that will fit in your mail drop. You will NOT register the computer. You will NOT check your real email or any connected email addresses. You will NOT do anything where you have to sign in with identifying information. This laptop is to search for your desired destination.
Bring Tools to Home or Work – Have Automatic Wireless Connections – Use Identifiable Information – Never Create Connections
The predator hunting you down can make one hundred mistakes but you the prey cannot afford one mistake. Before you walk into a store, coffee shop or internet café to surf, stand outside and ask if you are creating a connection.
Frank M. Ahearn
Author of: The Little Black Book Of Skip Tracing: Creating Pretext, Mastering Social Engineering And Finding Anyone Anywhere