iPod Story From The Trenches

iPod Story From The Trenches

The pursuit of hardening your operational security, removing and obfuscating your personal information, and employing tactics to enhance your privacy is a marathon, not a sprint. It takes time, careful planning, patience, an adventurous spirit, and a willingness to learn new skills. Some dabble a bit with their new found enthusiasm for these topics, and others commit to considerable lifestyle changes for the long haul.  I am always impressed and humbled when people I have met decide to make changes…

Read More Read More

Expanding The Circle Of Trust

Expanding The Circle Of Trust

“Accept the things to which fate binds you, and love the people with whom fate brings you together, but do so with all your heart” -Marcus Aurelius This past week I finished up my final training trip for 2018. It was a busy year to say the least and I am so thankful for all of the opportunities I had to circumnavigate the country and share information that I am passionate about with so many of you. In addition to…

Read More Read More

Alias Amazon Account

Alias Amazon Account

Early on when I committed to making all of my purchases anonymously, one of the big hurdles I had to figure out was how to order from Amazon.  Privacy seekers routinely face this same challenge because so much of the shopping people do nowadays is through Amazon. One day I hope to move away from using Amazon entirely, but until that day comes I will need to utilize an account, make payments, and receive shipments as anonymously as possible and…

Read More Read More

Countdown To Capture

Countdown To Capture

This post may seem like a brief departure from my usual thoughts and discussions on digital operational security and identity management. I know that many followers of this blog are members of law enforcement, criminal and private investigators, and online researchers who also have a genuine interest in topics related to privacy. Recently, I began following a high profile investigation from the west coast which is fascinating to me for several reasons. Peter Chadwick is wanted for murdering his wife,…

Read More Read More

CREDIT FREEZE UPDATE

CREDIT FREEZE UPDATE

One of the single most important steps a person can take to protect their identity, credit, and personal information from being stolen is to place a credit freeze on their profile with the four major credit bureaus.  It has been said that every U.S. citizen should have a credit freeze in place, including minor children.  A credit freeze is easy to put in place, and easy to manage.  It prevents anyone (including yourself) from opening up new lines of credit…

Read More Read More

Disinformation (Updated)

Disinformation (Updated)

Based on my experience, many of you will be successful at removing most, if not all of your personal information from the Internet.  You will need patience, due diligence, and a willingness to learn how “the system” works and the many methods that are available to keep your information hidden from public sources.  By changing your habits you can keep your personal details hidden and enjoy being invisible with a much higher level of security and protection from data breaches…

Read More Read More

The Law Enforcement Officers’ Bill of Rights

The Law Enforcement Officers’ Bill of Rights

Recently I was contacted a by law enforcement officer seeking help.  His concern was that his administration insists on taking and posting photos of him and fellow officers to use on their department’s social media sites without first asking permission from the employees.  Unfortunately, this is becoming more and more common as police agencies across the country attempt to connect with the community via social media.  Many officers embrace this change in culture and willingly offer their photos for this…

Read More Read More

COMSEC – Released!

COMSEC – Released!

I have a brand new book that was just released.  It is co-written with Justin Carroll and is a comprehensive look at communications security measures (COMSEC).  Here is a explanation from the back cover… The most prolific, comprehensive, and intrusive mass surveillance device ever designed by man is the cellular phone you carry with you everywhere you go. This device tracks and collects a staggering amount of personal information. That valuable data is sold and stored indefinitely by an equally…

Read More Read More

Information Removal: A Strategic Approach

Information Removal: A Strategic Approach

INTRODUCTION: When a person starts out on the quest to remove as much personal information about themselves that they find online, the effort usually begins with a “shotgun approach”. You begin searching Google to identify links to websites that display your information. Hopefully you’ll also search Bing and other search engines in the same manner, and use targeted search techniques and operators to pinpoint your information quickly. I have previously discussed many useful techniques for pinpointing your searches and saving…

Read More Read More

Review: The Stranger In The Woods

Review: The Stranger In The Woods

“How many things there are that I do not want”. – Socrates, Circa 425 B.C. “When you enjoy solitude, you are never alone”. – Christopher Knight   I recently returned from one of several road trips I take each year. Vacations are important to me to maintain sanity and return refreshed and refocused on life’s priorities. Each trip is always an “off the grid vacation”, where I do my best to not leave a digital trail of where I have…

Read More Read More