Browsed by
Category: Identity Management

Alias Amazon Account

Alias Amazon Account

Early on when I committed to making all of my purchases anonymously, one of the big hurdles I had to figure out was how to order from Amazon.  Privacy seekers routinely face this same challenge because so much of the shopping people do nowadays is through Amazon. One day I hope to move away from using Amazon entirely, but until that day comes I will need to utilize an account, make payments, and receive shipments as anonymously as possible and…

Read More Read More

Disinformation (Updated)

Disinformation (Updated)

Based on my experience, many of you will be successful at removing most, if not all of your personal information from the Internet.  You will need patience, due diligence, and a willingness to learn how “the system” works and the many methods that are available to keep your information hidden from public sources.  By changing your habits you can keep your personal details hidden and enjoy being invisible with a much higher level of security and protection from data breaches…

Read More Read More

The Law Enforcement Officers’ Bill of Rights

The Law Enforcement Officers’ Bill of Rights

Recently I was contacted a by law enforcement officer seeking help.  His concern was that his administration insists on taking and posting photos of him and fellow officers to use on their department’s social media sites without first asking permission from the employees.  Unfortunately, this is becoming more and more common as police agencies across the country attempt to connect with the community via social media.  Many officers embrace this change in culture and willingly offer their photos for this…

Read More Read More

COMSEC – Released!

COMSEC – Released!

I have a brand new book that was just released.  It is co-written with Justin Carroll and is a comprehensive look at communications security measures (COMSEC).  Here is a explanation from the back cover… The most prolific, comprehensive, and intrusive mass surveillance device ever designed by man is the cellular phone you carry with you everywhere you go. This device tracks and collects a staggering amount of personal information. That valuable data is sold and stored indefinitely by an equally…

Read More Read More

Information Removal: A Strategic Approach

Information Removal: A Strategic Approach

INTRODUCTION: When a person starts out on the quest to remove as much personal information about themselves that they find online, the effort usually begins with a “shotgun approach”. You begin searching Google to identify links to websites that display your information. Hopefully you’ll also search Bing and other search engines in the same manner, and use targeted search techniques and operators to pinpoint your information quickly. I have previously discussed many useful techniques for pinpointing your searches and saving…

Read More Read More

Database Breach

Database Breach

The Impact of a Database Breach – L.E. Edition Part 1 As a law enforcement officer, any piece of your personal information, when in malicious hands, can be considered a serious threat. Once a hacker obtains a single piece of personally identifiable information (PII), they will apply various techniques that will allow them to obtain more. For example, lets say that your email has been hacked. This is completely harmless because it is “just your email address” right? Wrong. In…

Read More Read More

MySudo – Update!

MySudo – Update!

The blog has been neglected recently, I know. Thanks for all your emails and enthusiasm about staying informed on all things privacy! The past few months have kept me busy, teaching for private organizations, working with clients, and even writing a book. Every day is a new opportunity to learn more and to share more about these important topics and from morning to night I am staying on top of it all in addition to my day job. In this…

Read More Read More

Self-Stalking

Self-Stalking

Those of us who are dedicated to removing our personal information from the Internet know that this effort is a constant battle. Experts in this field estimate that there are hundreds of relevant people search engines alone, and when you include the smaller sites that seem to pop up each week, the numbers could be in the thousands. Public records like property tax information, marriage licenses, and vehicle information are collected by the largest data brokers on each of us….

Read More Read More

Privacy Milestones 2017

Privacy Milestones 2017

Last year at this time (2016), I wrote about my Privacy Resolutions for the upcoming year and some goals that I hoped to accomplish in the pursuit of better personal OPSEC.  I encouraged others to reflect and identify new areas to focus on that could improve their stance on privacy over the next 12 months. Some of the areas I chose to focus on this past year included re-reading and studying “the basics”, many of which are outlined in The…

Read More Read More

PODCAST 058 – New To Privacy? Start Here

PODCAST 058 – New To Privacy? Start Here

Privacy is a huge topic and knowing where to start can be overwhelming. This week Justin Carroll and I sit down to discuss how to overcome analysis paralysis and develop a plan to reclaim your right to privacy. Subscribe at: RSS iTunes Google Stitcher SHOW NOTES   INTRO Follow-up on our Wi-Fi episode Article about Wi-Fi probing System76 Linux Laptops MAIN TOPIC Understanding the threats to your privacy The concept of compartmentalization Defining your privacy priorities and privacy non-negotiables Managing…

Read More Read More