Search This Blog

Monday, March 02, 2009

This is Part II of Grant Hall’s article, “Stalking Solutions.” Part I was posted last Friday. Grant’s e-book, Privacy Crisis, is one of the leading advocates in the field for individual privacy.


Part II

By Grant Hall


This writer has written extensively on the techniques necessary to conceal personal and investment funds for privacy purposes. While the needs of each individual will vary greatly, generally speaking, the use of entities including trusts, Limited Partnerships and LLC’s are valuable for privacy and asset protection. Additionally, check cashing stores and an anonymous safe deposit box prevent the freezing of accounts and any link to the funds once checks are cashed.
Useful websites for money and “banking” privacy are and


While work privacy can be accomplished most easily by certain practitioners and the self employed, shielding one’s work place will be a challenge-especially for the majority of people who derive their income from wages, salaries and commissions paid by a traditional employer.
When one desires vocational or professional privacy, a sound plan is necessary in order to eliminate one’s name and Social Security number from any number of data bases that store this information. Trusts and LLC’s have been used with success as the employer and this re-structuring of the employer/employee relationship has been accomplished through negotiating with flexible, open-minded employers. A win-win situation for both parties will facilitate the negotiating process.


Through the use of the aforementioned mail drop nominees and re-mailing of sensitive letters, one can keep their postal mail their own business.
The traditional one and two year cell telephone contracts-complete with a credit check that the public usually opts for is a definite no-no for the serious privacy seeker. You will want your entire communication system to reveal no link to your name. Therefore the purchasing of a cell phone off the shelf with no contract or registration requirements assures private telephone calls. Land lines at home are not a good telephone option. Land line telephones can be traced and the physical location of the telephone can be obtained.
Proxy servers enable the computer user to surf the net without being recognized by their IP address. The best companies provide a different IP address once or twice daily. When an anonymous proxy server is used in conjunction with email addresses that have no resemblance to your identity, computer security is greatly enhanced.
Computers should be purchased with cash. Software and all computer-related materials and online purchases are necessarily purchased with anonymous debit cards, money orders or cash.
Internet Service can be privately obtained through the use of company held accounts or an account can be secured by a nominee as explained in Privacy Crisis.


Ohlson, Kristin, Stalking the Divine: Contemplating Faith With the Poor Clares, 2003, Hyperion
Hall, Grant, Privacy Crisis: Identity Theft Prevention Plan and Guide to Anonymous Living, 2006, James Clark King, LLC (eBook available at:
Copyright: James Clark King, LLC, August 28, 2008


bartho said...

The effective asset protection plan strategy involves timely protection of your assets. You must have your assets protected before you are ever in a position to need the protection. In other words, before you ever get sued.

cristian said...

I guess bartho is right in what he said, but I think you also can have some protection just in case for your peace, I mean I would do something for me without needing protection , if I think that i might need I just do it for my peace.

Answering Services