The Mental Militia Forums

Please login or register.

Login with username, password and session length
Pages: [1]   Go Down

Author Topic: Book to help with privacy  (Read 1397 times)

byron mc

  • Sr. Member
  • ****
  • Offline Offline
  • Posts: 2924
Book to help with privacy
« on: July 17, 2008, 08:13:16 am »

I was re-reading this book this week and it really reiterates many of the things that HTBI by JJLuna mentions but from a Private Investigator's perspective.
PI's will try many tactics to locate people and assets. This book shows many and WHY you should consider many of the things suggested in HTBI months or years before you may ever need them.
Reading both books gives you a broader picture of protecting your privacy from many potential enemies.

The Private Investigator Handbook: The Do-It-Yourself Guide to Protect Yourself, Get Justice, or Get Even (Paperback)
by Chuck Chambers (Author)
288 pages
Publisher: Perigee Trade (September 6, 2005)
Price:     $10.85
http://www.amazon.com/Private-Investigator-Handbook-Do-Yourself/dp/0399531696/ref=sr_1_1/002-5017477-6355236?ie=UTF8&s=books&qid=1216300083&sr=1-1




just looking at the amazon.com list this also looks interesting and is from 2006:
   
How to Do Financial Asset Investigations: A Practical Guide for Private Investigators, Collections Personnel, and Asset Recovery Specialists by Ronald L. Mendell
http://www.amazon.com/How-Financial-Asset-Investigations-Investigators/dp/0398076723/ref=sr_1_6/002-5017477-6355236?ie=UTF8&s=books&qid=1216300083&sr=1-6


Logged
l

byron mc

  • Sr. Member
  • ****
  • Offline Offline
  • Posts: 2924
The Internet--a private eye's best friend & how to keep privacy 101
« Reply #1 on: July 21, 2008, 07:36:33 am »

along similar lines is this article from CNET titled:
The Internet--a private eye's best friend

Quote
In a test of his skills, Rambam tracked down someone who had agreed to go in hiding for one year. He was able to locate the person nine times, using methods including social engineering and a dummy e-mail account, tracking the IP address of an Internet cafe computer, cell phone triangulation, a credit card trace on an airline ticket using a frequent flier number, a fake Match.com ad, and an online "wanted" poster.

He recently spoke at keynote session late on Saturday at the Last HOPE (Hackers on Planet Earth) conference.


July 20, 2008
http://news.cnet.com/8301-1009_3-9995207-83.html?hhTest=1&tag=nefd.top


a quick 101 to be a ghost and keep your privacy was in a comment posted to the article:
Quote
Want to get lost and dissappear permanently? That's easy, lose the cell phone, lose the credit/debit cards and use U.S. Postal money orders to pay your bills. E-mail providers are available to create and use e-mail addresses for only 10-15 minutes, then they dissappear. Never put any land-line or cell phone in your name. Never put any utilities in your name. Do not ever join any discount cards or programs at any store. Do not sign up for any kinds of promotions. Create and use an L.L.C. or an L.L.P. for any ownership of anything including the creation of an Employer I.D. number for use with the government agencies. Transfer your properties to another name (straw man) and use a lease-back contract to control your rental units etc. Stay the Hell off of ALL of the social networks and databases. De-personalize your computer, as well as all of your user names...NEVER put any personal info into or on your computer. Use an anonymous V.O.I.P. phone such as Vonage or Magic Jack using a number that is in another state etc. etc. etc.
by N2JDJ  July 20, 2008
Logged
l
Pages: [1]   Go Up