How to Disappear by Frank M. Ahearn
Author:Frank M. Ahearn
Language: eng
Format: epub
Publisher: Lyons Press
Published: 2010-08-31T16:00:00+00:00
ABANDONMENT
If you’re leaving a husband, wife, or kids, I hope you’re doing it the right way (if there is a right way) by finding a lawyer and giving them a chance to do the same. Do not go out for a newspaper and never return. That’s just plain wrong.
If you can’t afford a private investigator, use a good old-fashioned diversion. One of my clients was disappearing from an old business partner. On the day of his disappearance, a moving truck showed up, packed all of his belongings, and drove about an hour and a half . . . to a Goodwill store. The movers unloaded and then donated everything. My client knew his partner would be watching the house, so the surveillance team followed the truck to a dead-end while he hopped a train to better places.
No matter where you’re headed, be it across town or out of the country, don’t go straight there. Get on a plane to Toronto and fly to Puerto Rico and then hop on a puddle jumper if your final destination is St. Maarten. Get on a Greyhound to Raleigh and fly to Dallas to catch a plane to Salt Lake City. Do not underestimate the individual who is chasing you, and remember the Fluke Factor. Even something as minor as a magazine purchase in the airport could be your downfall.
In the airport, stay out of the newsstands and the bars and restaurants. Nobody needs to know you’re making a trip except the people who wave you through the metal detector. Get through security, go straight to your gate, and wait.
I hope you have a pleasant trip. It will be even more pleasant if you’ve done the complicated yet crucial chores that are necessary for moving offshore: You have to set up your new home, figure out what you’re going to do for money, think about how to communicate with your loved ones, and iron out the other details of day-to-day-living, such as where your kids are going to school, if they’re coming along for the ride. As you do all this, you’ll have one overarching goal:
Become an entity with no traceable connections to people, places, or things.
You can easily accomplish this if you tackle your new life methodically and with care. Let’s go over each item on your to-do list in order. Please note one thing before we start: This chapter deals with very general principles for relocating and rebuilding a new life, and succeeding chapters will address the specific details you’re going to need to know if you’re leaving the country, fleeing a stalker, or evading identity thieves. Turn to those chapters for more detail, and assume all of my advice about relocating in this chapter deals with domestic relocations.
With that said—let’s look at the building blocks of your new life!
LIVING
The first thing you’re going to want to take care of is your living situation. As you search for a new place to live, it is important to make sure that no real estate agent or leasing company runs your credit report.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6590)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6314)
Machine Learning Security Principles by John Paul Mueller(6284)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5960)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5920)
Solidity Programming Essentials by Ritesh Modi(4048)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3687)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3418)
Mastering Python for Networking and Security by José Manuel Ortega(3357)
Future Crimes by Marc Goodman(3351)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3306)
Learn Computer Forensics - Second Edition by William Oettinger(3177)
Incident Response with Threat Intelligence by Roberto Martínez(2903)
Mobile App Reverse Engineering by Abhinav Mishra(2888)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2776)
