26
***Confidential Report*** Underground Privacy Secrets

Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

***Confidential Report***

Underground Privacy

Secrets

Page 2: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 2

Underground Privacy Secrets

By Caleb Lee

©UGAR LLC 2013 and Beyond

ALL RIGHTS RESERVED. No part of this report may be reproduced or transmitted

in any form whatsoever, electronic, or mechanical, including photocopying,

recording, or by any informational storage or retrieval system without express

written, dated and signed permission from the author.

DISCLAIMER AND/OR LEGAL NOTICES:

The information presented herein represents the view of the author

as of the date of publication. Because of the rate with which

conditions change, the author reserves the right to alter and update

his opinion based on the new conditions. The report is for

informational purposes only. While every attempt has been made to

verify the information provided in this report, neither the author nor

his affiliates/partners assume any responsibility for errors,

inaccuracies or omissions. Any slights of people or organizations are

unintentional. If advice concerning legal or related matters is

needed, the services of a fully qualified professional should be

sought. This report is not intended for use as a source of legal

advice. You should be aware of any laws which govern the topics

discussed herein in your city, country and state. Any reference to

any person or business whether living or dead is purely coincidental.

Page 3: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 3

Underground Privacy Secrets

Someone is watching you, right now.

Oh, they may not be able to see you; but they’re watching you just the same.

That someone has electronic eyes and ears and probably even an electronic brain.

It is gathering information on you and everyone else on this planet, sniffing the

airwaves and combing the ether world, seeking information on anyone and everyone.

If that electronic brain thinks there’s something fishy about what you are saying, it’ll

pass your conversation, e-mail or online post on to someone with a human brain to

check out.

That person will analyze your message, looking for nuance and trying to read your

mind.

What they infer out of your communications could lead to an investigation or having

your name put on one of many of the Department of Homeland Security’s (DHS) lists

as a potential domestic terrorist or subversive.

Eric Snowden’s whistle blowing revelations about the work of the National Security

Agency’s (NSA) spying on American citizens has caught the country by storm.

While alternative news sources have known about the NSA’s Echelon system for

years, this was the first actual confession by a source that would know that it was

being used illegally against American citizens.

The Echelon system is designed to tap into every bit of electronic communication on

the planet; e-mail, text messages, telephone conversations and even social media

postings. It is constantly looking for a long list of keywords, many innocuous by

themselves, but thought to be dangerous when combined with other keywords; trying

to search out terrorists and others who would do our country harm. There’s only one

problem; they’re spying on honest law-abiding American citizens in the process.

What makes this really scary is how the government is currently defining the term

“terrorists.” It seems that it is now politically incorrect to say that Muslims who strap

explosives to their bodies or place bombs in busses are considered terrorists.

Page 4: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 4

Instead, our government is now calling conservatives, Christians, and pro-life people

terrorists, along with anyone else who doesn’t agree with Obama’s liberal agenda for

America.

Apparently, if you aren’t one of the left-wing sheeple, you’re considered dangerous by

our government.

Our privacy has been lost in the name of national security.

Perhaps a better way of saying that is that national security is being used as an excuse

to steal our privacy. Not only our privacy either, but a whole host of other freedoms

which are guaranteed to us in the Constitution are being taken away from us in the

name of increasing our security.

It’s not just the NSA that is spying on us, many others are as well. Have you noticed

the increased number of security cameras and traffic cameras being installed all over

the place? You can’t drive to the store and back without someone knowing it.

Once again, this is being done to catch the dishonest amongst us. Police use those

recordings to catch all types of thieves and criminals. However, to do so, they have to

spy on all of us in the process. Who doesn’t occasionally make an error while driving?

Well, now they can catch you at it, even when there’s nobody to see you or be

affected by it.

The software behind these video systems are getting so sophisticated that they are

starting to recognize patterns of behavior that are common for criminals. Little

nuances like recognizing the difference in how people walk and stand can suddenly

make them a suspect of a crime that they have not yet committed. Before long, they’ll

probably start arresting people on the suspicion of “future crimes” purely based on

these programs’ interpretation of their actions.

There’s one more category of people that are constantly spying on us; that is online

businesses. Facebook, Google, eBay, Amazon and just about any major online retailer

is keeping close track of your purchases and the items you look at, so that they can

customize advertising to meet your interests.

Have you ever looked at an item on Amazon and then gone on Facebook? There’s a

good chance that you will find that same item advertised. Why? Because they’ve been

keeping track of what you click on, so that they could provide focused advertising.

Page 5: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 5

If you think about it, that’s scary. It means that not only is the government spying on

you, but everyone else is as well.

In a sense, we have to blame technology for this.

While cell phones and the Internet are great tools, they have made it extremely easy

for these other people to spy on us. Tracking a particular smart phone, so that you

know where the owner is has become a trivial exercise.

Likewise, reading supposedly confidential e-mail and tracking people’s browsing

habits doesn’t take a genius. Most of this technology is readily available on the open

market for companies to use and on the underground market for those that want to use

that information for more nefarious purposes.

We too have played a part in giving others access to our personal information.

Facebook, Twitter and other social media sites have made it extremely easy to let

friend and foe alike know what is going on in your life. You never know who is

reading your posts and tweets or what they are going to do with it.

So, what can you do about it?

While there is no 100% foolproof method of keeping the NSA from spying on you,

other than totally disconnecting and going off the grid, there is a lot you can do.

By taking a few simple precautions, you can do a lot to secure your personal

information from these spies.

Page 6: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 6

Closing the Door on Electronic Spying through Your Cell Phone

Don’t expect the government to close the door on this digital spying anytime soon.

Remember, they are depending upon it as much as criminals are.

If lawmakers pass bills limiting access to your information, it will reduce their ability

to spy on you as well.

The only one who is going to close the door on your electronic life is you.

You and I need to take control of our digital world and keep others from finding out

what we are doing.

The first step in closing the door is to become aware of what is happening. I’ve

already told you about the crowd of people who are following your every move

electronically. Realize that they are doing it and decide that you want to do something

about it.

One of the easiest ways for them to spy on you is through your smart phone.

As cellular phones have increased in capacity, that capacity has reduced the amount of

protection you have. Today, the NSA as well as others can track you through your

phone’s GPS, read your text messages and e-mail, download and upload files and

photos to your smartphone and even listen in on your conversations. This isn’t just the

government I’m talking about, just about anyone can do it.

The way that the NSA or others gain access to your cell phone is by sending a

program to it. This can be done remotely, without you even knowing it. Similar to a

RAT (Remote Access Trojan) on a computer, this piece of malware allows them to

control your phone from a distance.

Cell phones are easier to do this with because their programming is simpler and there

isn’t as much anti-malware security built into them.

Page 7: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 7

Few people bother putting anti-virus programs or anti-malware programs on their cell

phones. Those that do, don’t run the programs often enough to ensure that their

phones are clean.

The easiest solution to that is to get rid of the fancy phone.

Now, I know that might be hard to do, but once you do it, you’ll find that it really isn’t

all that bad. I use a simple cell phone that has minimal functions.

For the other functions that most people do on their smart phones, I have my iPad,

which isn’t set up to connect through any phone system.

That one step has closed the door to many who want to know what I am doing.

If you don’t feel that you can get rid of your smart phone, then there is another option.

Some manufacturers of cell phone accessories are starting to make cases for smart

phones that block radio waves. This prevents people from accessing your cell phone

while the phone is in the totally enclosed case.

Of course, you can’t use the phone while it is in there either; which means that your

friends will have to wait for you to take the phone out of the case for you to receive

their text messages.

Basically, we use cell phones for two types of communications: talking and texting.

For normal use, these are not encrypted and are not secure. Although your neighbor

can’t just listen in on your phone calls, anyone with the right equipment can.

There are some encryption programs for use with smart phones, but these encrypt the

phone call or text message after it gets to the cell phone company. Since all cell phone

companies record the key data about all communications over their networks, who

you call, when you call them and where you both are is recorded in the clear, allowing

the NSA access to that information.

Page 8: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 8

More Secure Talk and Text Communications

If you want to communicate securely, or at least more securely, then do so over the

Internet.

While Internet communications are still monitored and recorded by the NSA, there are

a number of ways of encrypting them.

Please note that there is no such thing as a totally secure encryption system. The NSA

employs the world’s foremost code breakers and has the largest collection of

supercomputers in the world for them to use. They are in the business of reading

things that others don’t want them to read, especially our enemies around the world.

If they can break into the Kremlin’s secure communications, why would any of us

think that they can’t break our commercially available encryption programs?

I will have to say that the more robust the encryption system, the harder it is for the

NSA to break it. You can get a general idea of how robust it is by the number of “bits”

in the encryption key.

In other words, a 256 bit encryption is harder to break than a 128 bit one is. The type

of encryption makes a difference as well, but the number of bits is a quick reference.

The larger and more complicated the key, the more complicated the encryption

process and the more work it is to break it.

Since the NSA has so much encrypted communications to break, they will probably

not bother with yours, unless they have some reason to think that you are a subversive

or terrorist who is bent on destroying the United States.

While they are spying on U.S. citizens, their main focus is still in trying to spy on our

enemies worldwide.

Voice over Internet protocol (VoIP) is a means of using the Internet as a telephone.

You are probably familiar with Skype or Google Voice. These free services offer

minimal encryption to their communications, mostly for the purpose of protecting you

Page 9: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 9

from hackers and criminals. At the same time, they make no claims about protecting

you from the prying ears of the NSA or other government agencies.

There are other options for VoIP communications, all of which are much more secure

than Skype and Google Voice.

While more secure, these services have the disadvantage that they require that people

at both ends of the conversation have compatible software. While that really is no

different than what Skype requires, these other packages aren’t anywhere near as

common as Skype is. Some of the services require buying the software package while

others are available for free.

Most of these software packages work over the Open Secure Telephony Network

(OSTN). To use them, you must sign up not only with the software provider for your

VoIP software, but also with ostel.co so that you can use the OSTN. Once you’ve

done that, you can download and sign up for the specific software service you will be

using.

Just like there are encrypted VoIP services available, there are also secure chat and

text message services. Several of these exist for use with all of the common operating

systems, both on mobile devices and computers.

Like VoIP, you will need to install the application on your device and communicate

with others that are using the same application.

Page 10: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 10

Get Less Social

Social media is the worst enemy of your personal privacy.

By its very nature, social media invites you to share information about yourself and

your life.

The idea is that you can let your “friends” know what’s going on in your life, sharing

everything from where you are having a cup of coffee to your interests.

There are two big problems with social media.

The first of these is that you and I don’t know who is reading over our shoulder or

over the shoulder of our friends. You like an article you see and all your friends

immediately know it. If one of them likes it, then all their friends know that you and

they like it. That lets people snooping in on your life, like the NSA, know where your

interests are, what your political outlook is and even what your religious views are.

Let’s take that a step further. You’re excited about your upcoming vacation and let

your friends know where you are going. One of your friends is happy for you, so

“likes” your post. Once again, all their friends now have access to information about

your trip, including where you are going, when you are leaving and how long you are

going to be gone. If one of them supplements their income as a break-in artist, you’ve

just unwittingly given them their next target.

You aren’t the only one who is putting out information about yourself either.

Tagging people in photos has gone crazy. Originally, it was just a way of letting

people know that the picture is of you. Now, it’s a way of everyone else making sure

you see their picture. So, you might end up tagged in just about anything.

I have found myself tagged in advertisements, things I’m not at all interested in and

even soft porn pictures on Facebook. You don’t know who might tag you or what

reason they might have for doing so. No matter, as far as the NSA is concerned, it’s

more information for the file.

Facebook isn’t the only social media sight that opens your life up to the whole world,

although they are by far the most popular.

Page 11: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 11

Anytime you create a profile about yourself, you are giving away sensitive

information for free. That information can often be read by just about anyone who

wants to. LinkedIn intentionally leaves your profile open and available for anyone to

read, as it is intended to be a means of facilitating business networking.

Probably one of the worst things that social media does is tell everyone where you are,

all day long. Facebook, IOS and Google offer this “wonderful” service where it logs

your current location into social media, letting your friends know where you are

eating, what stores you are shopping in and everywhere else you go.

Of course, that is useful to any NSA spies that are trying to keep track of you as well.

The best way to avoid social media broadcasting your life to the world is to get rid of

it. While that might crimp your style a bit, it will protect your privacy.

You can always go back to the old ways of being social, like talking to people face to

face.

Getting out of social media is difficult.

These companies don’t make it easy for you to unsubscribe once they’ve got your

name, as they consider any information that you post to be their property.

However, it is possible to remove yourself from their database, if you have the

patience to do so.

Page 12: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 12

What’s on Your Computer?

Your personal computer, tablet or other Internet device offers a wealth of information

to the snoops from the NSA.

They can tap into it, finding out a wealth of information about you.

By and large, Internet browsers are not secure from anything the NSA wants to know.

Both Google and Microsoft have been accused of being openly in bed with the

government, allowing the NSA full access to their data. This makes it very easy for

them to track who is visiting what website, finding out your interests.

Part of the problem is that both Google and Microsoft are tracking the history of

searches that you make and sites that you visit. This allows them to customize your

search experience. It is also the very same data that the NSA is tapping into, so that

they can tell what you are doing and what your interests are.

They can accomplish the same thing by tapping into your computer’s browser history.

This is easy to solve by deleting the history. However, you need to make a habit of

this, as once you delete it; it immediately starts collecting once again.

In addition to deleting your browser history, you add immensely to your privacy by

using a browser and search engine that doesn’t track your history. That eliminates the

database that the NSA is using to find this information. While that doesn’t fully stop

them, it does make it so that they have to go directly to your computer’s browser

history to find out anything about what you are doing online. If you’ve deleted that,

they’re at a dead end.

With the great concern about hacking, identity theft and the NSA, more and more

secure search engines and browsers are coming available. These are not the giants

offered by Google, Microsoft and Yahoo, but smaller applications offered by

companies that are more concerned with their customers than they are with profits.

You would be well advised to use them.

The other big source of information associated with your computer is your e-mail.

Today most e-mail is server based, rather than downloaded to your computer. That

makes those files very accessible to the NSA. How many e-mails do you have in your

Page 13: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 13

inbox? If you are like most people, you have thousands. We all tend to ignore e-mails

that don’t interest us, allowing them to collect in the inbox and save e-mails that are

important to us, so that we can find them later.

If you need to save e-mails, then download them to your computer and save them

there. While that isn’t totally secure from the prying eyes of the NSA, it’s much more

secure than leaving them in the cloud. Get rid of all that junk e-mail too. They can use

it to determine what your interests are. If you aren’t reading it, unsubscribe from the

service. If you are, then delete it after you read it.

Remember, it isn’t just what you say that shows your interests, but what you do and

what is said to you. These people are in the business of developing a profile of you

based upon whatever information they can find. That often means that they are

working based upon inference, rather than fact. That can be just as deadly for you.

Page 14: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 14

Is Offshoring Worth It?

Some people suggest getting an offshore e-mail account or hosting your blog offshore.

The idea behind that is that the NSA will have a harder time tracking you from

information that is hosted in another country, instead of what is here in the United

States.

Let’s look at that ...

First of all, the NSA has been in the business of spying on people in other countries

much longer than they have been in the business of spying on U.S. citizens.

Originally, they were forbid by law to spy on Americans. While that prohibition has

been lost along the way, spying on you and I is a much more recent development than

spying on other countries.

The NSA captures every bit of electronic communications on a worldwide basis. That

totally negates any advantage of offshoring your communications. Besides, you still

have to use American communications to connect with your offshore e-mail account

or browser, which gives the NSA direct access into what you are doing.

The one thing that offshore e-mail services does do for you is to offer more barriers

for the NSA to get into your e-mail. Being a foreign government, they are not required

to cooperate with the NSA.

If you take advantage of the various offshore e-mail services which are offering fully

encrypted e-mail services, you will end up with much more secure communications.

Once again, the NSA is great a decrypting whatever is encrypted, but they don’t have

time to spend on every encrypted communication in the world.

By using an offshore secure encrypted e-mail account, you make yourself a less

inviting target, unless they have a specific reason to be looking at you.

Page 15: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 15

Passwords – Your First Line of Defense

Many people ignore the importance of passwords, seeing them as a nuisance, more

than as a help. Yet the humble password is your first line of defense for protecting

your information from electronic eavesdroppers.

While I’m fairly sure that the NSA can break into your accounts without it, it requires

much more work on their part.

When I say much more work, I really mean it.

Essentially, hacking a password is a multi-step process. The first step is to go through

the list of common passwords to see if the person who owns the account is using one

of those. That opens the vast majority of accounts, without any work whatsoever.

If that doesn’t work, the next step is to try passwords that are associated with the

person’s life; family members’ names, their pet, the city they were born in and other

such personal information. Many people use these types of passwords, so that they

don’t easily forget them. Unfortunately, it’s a trick known by hackers inside the

government and out. All they usually have to do is look at the social media sites to

find clues for that password.

For the few people who use totally random things for their password, the NSA is stuck

with using brute-force methods.

This consists of having their computers try all possible combinations of letters,

numbers and symbols, until they strike on the right one. While time consuming, it’s

much faster for a computer to do that, than it is for a person.

Of course, that computer time is highly valuable, so they don’t bother with the brute

force method unless they have good reason to do so. So, by using a “strong”

password, you greatly reduce the likelihood that they will even try.

The most common passwords for 2013 were:

1. password

2. 123456

Page 16: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 16

3. 12345678

4. abc123

5. qwerty

6. monkey

7. letmein

8. dragon

9. 111111

10. baseball

11. iloveyou

12. trustno1

13. 1234567

14. Sunshine

15. Master

16. 123123

17. welcome

18. shadow

19. ashley

20. football

21. jesus

22. michael

23. ninja

24. mustang

25. password1

As you can see, some of those are so obvious as to be meaningless as passwords.

Even so, these are the most common passwords in use, ranked in order of popularity.

Many of them have been on that list for several years, keeping more or less the same

popularity over time.

In order to keep the NSA and others out of your stuff, you need to develop what are

known as strong passwords.

To qualify as a strong password, a number of different elements are required within

the same password.

A few basic rules will help you make a strong password:

Page 17: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 17

Make sure that your passwords are at least eight characters long

Use a combination of upper and lower case letters; most programs now recognize

the difference

Use a combination of letters and numbers, but don’t use an obvious number like

your age or the year you were born

Add in a couple of symbols, such as – or * making sure that the symbols are

compatible with the website you are accessing.

Don’t use the same password for multiple websites, as once they break it, they can

try it out for your other accounts.

Change your password frequently. That way, if someone gains access, they won’t

have it for long.

The old school philosophy was to not write down your passwords. However, if you

follow those rules, you’re going to need to write them down. The problem with

writing them down comes if others find your written list.

So, just make sure that your list is somewhere that they can’t find them. The risk of

having that happen is much less than someone hacking your password.

There are several apps which store your password securely, making it so that you

don’t have to memorize all those passwords. Using one of them can make your life

much easier, while still making it hard for those that want to steal your information.

Page 18: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 18

Random Tips To Help You Disappear Or Protect Your Privacy ...

How Skip Tracers -- professional people hunters -- routinely break the law

to find almost anyone they want found (most times in just hours) because

they leave so many trails.

Skip Tracer: tracks people down and uncovers private info for a living. Most of the

time they do this by lying and finding out the information through the most unsecure

part of any organization -- the people.

They lie about being you -- What's my address again? Can you verify my recent

transactions? etc

It's not just customer service reps either. You friends and family are sources too.

Basically anyone that has any REAL info about you and where you are.

How an ex-skip tracer found Monica Lewinsky with just one phone call

(what went wrong--and how you can protect yourself from the same

mistake!)

A skip tracer was hired to find a woman (at that time he didn’t know who she was)

He hit the quick research online – and found a place he thought she might be staying.

When he did, he called and the house keeper answered the phone. He pretended to be a UPS worker and package needed delivery ...

At first the housekeeper wouldn’t reveal that the woman was at that address, but after

he threatened that the package would be returned if she wasn’t there to sign it -- the housekeeper who answered the phone said to deliver it for signature.

He asked what time she would be there – the house keeper told him after six.

After the skip tracer delivered that info to the person who had hired him, he saw that

night on the news that it was Monica Lewinsky – and why they were looking for her.

Page 19: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 19

The 3 places any person hired to hunt you down is guaranteed to look

FIRST

1. motor vehicle search

2. credit report

3. criminal background check

The #1 rule you MUST follow before you ever post anything else online (if

you care about your privacy at all!)

Always think before you click "publish" or "submit" because even if you delete your

account or later try to change it -- what's been posted online is almost always there.

The "magic button" someone hunting you can press on their phone when

calling any of the services you do business with, that puts them just steps

away from discovering ALL your personal information!

This is the 0 button because it often gives you a liver operator. Who they then use social engineering to get the information they want.

The ONLY 2 things a professional person finder needs to find you (if he

has these -- it's almost certain you can't hide!)

This is Time and Money.

Basically if any "Real" info about you is still around .. he just needs enough time and money to chase you down.

That's why it's important to put out a lot of misinformation.

3 steps to guarantee you can disappear without a trace (miss just one and

you'll likely fail!)

Misinformation (confusing your real info and getting rid of it as much as possible)

Disinformation (putting NOT true info into the world)

Reformation (reforming your personal identity)

Page 20: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 20

The one website some skip tracers call “The promised land” because it

most likely has all your old information online – sometimes even

unpublished phone numbers (cell and landlines). It’s so comprehensive

some organizations already want it shut down!

Zabasearch.com

Plus, the second website – that compiles all your public records and sells

that info for about $50 – the only 3 ways to get them to stop selling your

info.

www.Intelius.com

Only 3 ways to get them to stop selling your info:

#1: If you’re under court protection.

#2: If you can get a court order (if you’re being threatened, life is in danger, etc)

#3: You can opt out of its “people search” service. Go to www.intelius.com/privacy-faq.php#5 for more info

The ONLY way to protect your privacy on social media sites like Facebook

Take down all your photos and personal info FIRST, then also, don’t forget to get your friends to stop “tagging” you and sharing your name on their pages – on

whatever social media sites you’re on first.

Then, after all that, delete those accounts

How to almost create a “new identity” for yourself ... without ... breaking

any laws (this is the only way to lead anyone tracking you to a dead end

that’s 100% legal!)

It’s a process ...

First, you need to purposely create “mistakes” with all your information that is stored anywhere. Everyone you do business with:

Page 21: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 21

phone companies

cable companies

gyms

internet and satellite companies

stores you have accounts with

subscriptions

banks

utilities

associations

librarys

Basically anywhere that you’ve ever given your information to.

Then you call all of them up and tell them there is a mistake in your name for instance

first. Example if your name is John. M. Smith. then you’d call each company and give each one a different “correct name” such as:

Company 1 -- Jim M. smith

Company 2 – James M smith

Company 2 – John N. Smith

Company 3 – John M. Smitt

Company 4 – James M. Smitt

Etc

So that each company has a slight variation. You’re creating false trails.

Then a few days later, call each of the companies back and give them all a different

random PO Box number address (in different towns) in the same fashion ...

Lastly, places that collect your social security number (banks and utilities) you might

consider changing. It’s illegal to give the wrong social security number but this expert

says to consider it if your life is truly in danger and you need to disappear. You could call and change one digit somewhere in the last 4 digits of your social number.

Finally, when you’re done with changing your information – call up those accounts a few days later and cancel as many as can be canceled. Example:

Cancel credit cards – use prepaid cards or money orders

Cancel Netflix – go use cash or prepaid cards at those $1 rental DVD machines

etc

Page 22: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 22

For services you can’t cancel (like your electric) just keep track and call them every

month to get your bill and pay over the phone with prepaid credit card or money order.

BIG TIP: write down all your “new identities” and which company they fit with

because you will need that information when contacting them later.

The point here is that you’re creating so many “false leads” for whoever is trying to

track you that they will run out of time or money before they find the “real you”.

How to use your ATM card on the run – to actually throw someone off

your trail (Takes about $100 and is a simple, almost foolproof way, to confuse your pursuers and lead them down dozens of dead end trails!)

While it’s dumb to take your ATM or credit card with you and use it while you’re on

the run, you can use these same drawbacks to help you create disinformation to

confuse and lead pursuers down dead-end trails.

An ex skip-tracer once needed to help an abused woman disappear. One of the things

they did (after getting rid of her personal info as you’ve been shown) is send her to a small town somewhere.

Then, they opened a bank account in another small town – nowhere near her. The skip

tracer then gave the ATM card for that account to one of his friends who travels all over the country for business with instructions to use the card for small amounts in

different cities.

Then if the records were ever pulled it would look like a confusing trail where the victim was traveling all over the country:

ATM $60 Houston, TX

ATM $10 Miami, FL

ATM $20 Cincinnati, OH

ATM $10 San Diego, CA

Etc

The victim was able to hide. And the point of something like this is that you’re giving

the person chasing you so many dead ends to follow that they either become frustrated and give up or spend so much time on each of them that they run out of Time and

Money to continue pursuing you.

Page 23: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 23

How to make completely ANONYMOUS purchases and transactions

starting today.

Go to Wal-Mart or wherever and buy prepaid credit cards today. Or gift cards. Pay in cash, load them up. Great to use for anonymous transactions (especially if you’re

buying anything to help you disappear because you don’t want to leave a trail).

Why you do NOT want to use a P.O. Box as an anonymous mailing

address.

Use a private mailbox store instead like UPS. An ex skip tracer reported that he could

never call and con a private mailbox store into giving up customer info, but could easily get that info out of any deadbeat that tried to hide behind a PO Box.

How to use an unsecured, completely public WI-FI connection to actually

make your online surfing more anonymous!

Basically, the advice given is to buy a new computer that you’re going to use to

disappeer with and ONLY use that computer to connect to the internet at some public, unsecured WI-FI location.

Why? Because you don’t ever want that IP address associated with your name. Using

public WIFI will make you harder to track. Take precautions not to use your Credit Card or Social Security number on these unsecured connections of course.

How to easily setup a secret email account in less than 5-minutes that

completely VANISHES after just one hour

This is https://www.guerrillamail.com/.

Page 24: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 24

The Bottom Line ...

There are a lot of things you can do to at least make yourself “hard to hack or track”.

Many are common sense (like not posting your location everywhere you go using

something like Facebook) ...

... Others you’ll have to decide if it’s worth the effort and expense (like taking your

digital life “offshore”) ...

However, like always, the American Government has pretty much limitless amounts

of time, energy and money to go after someone if they want to ...

It’s a better chance they have the time to patiently hack your security measures if they

want you ...

They probably have the computer geniuses on staff to do it ... and ... they have plenty

of your tax dollars to do it.

So – like always – do your best to stay off the radar – and at the same time do your

best to not make yourself EASY to hack by the government or any other cyber thugs.

To help you in your journey, you’ll find a resources page next. Thank you for reading

this report.

Page 25: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 25

Resources

Please note: new products are being developed all the time. We have included these

here for your convenience; however they might not be the best ones available, as other

products may be released after our date of publication. Before selecting a product,

search for yourself to see what is available and check the reviews on any product you

are looking at buying.

Cell Phone Security Case

http://silent-pocket.com/why-silentpocket/

http://www.kickstarter.com/projects/offpocket/off-pocket

Secure VoIP Phone Calls

Open Secure Telephony Network (OSTN) – https://ostel.co/

Encrypted voice calls for Os X, Windows & Linux – Jitsi + Ostel - https://jitsi.org/

Encrypted voice calls for Android:

CsipSimple + Ostel -

https://play.google.com/store/apps/details?id=com.csipsimple

RedPhone – Ostel -

https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone

Encrypted voice calls for iOS – Groundwire + Ostel -

https://itunes.apple.com/en/app/groundwire-business-caliber/id378503081

Data Encryption

On your computer – TrueCrypt - http://www.truecrypt.org/downloads

Page 26: Underground Privacy Secretsd3l1h3n4or6wo9.cloudfront.net/.../UndergroundPrivacySecrets.pdf · Facebook, Google, eBay, Amazon and just about any major online retailer is keeping close

Underground Privacy Secrets

*** SPECIAL CONFIDENTIAL REPORT *** Page 26

Offshore e-Mail

NeoMailBox - https://www.neomailbox.com/

Silent Circle - https://silentcircle.com/

Want More In-Depth Info?

If you would like more information on how to disappear (or just live a more private

life where you are) I highly recommend these two books for further study:

How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish

without a Trace and JJ Luna’s How to Be Invisible: Protect Your Home, Your

Children, Your Assets and Your Life.