Privacy by Deception
Monday, March 31, 2014
Privacy by Deception Webinar 5.10.14
Privacy by Deception Webinar 5.10.14
Areas to be covered include:
*How Skip Tracing works to locate you and your assets.
*What steps "they" take to invade your privacy using Basic Research
*How to clean up any Public Records that are out there in Public and Private databases.
*Plus alot more...
Other areas covered:
*How to analyze the person who is looking for you."the
skip tracer".
*Understanding of how to thwart each search effort being used against you. And how each differs and what to look for.
*Discussion of how the tools available to
professional skip tracers are turned against them to your utmost advantage.
*We will discuss the least expected, BEST techniques
used and some forgotten tricks of the trade that skip tracers use against you.
*Learn the difference between "database" and "inside
information" that will be used to invade your privacy.
*How to find resources and contacts--the absolute
essential part of the "Privacy" process.
Please Note: You must be aware and current with all
Laws, Regulations and Rules that may apply to your
"Privacy Project" including local, state and federal
levels.
**Learn which Databases will let you opt out of their service, mandated by Federal Law..........
**The posted duration of the, Privacy by Deception workshops are approxmate. It could be shorter or longer depending on
the content and attendee participation. The providers
reserve the right to cancel any workshop.**
Date: Sat. 5/10/14
Time: 12pm to 2pm pac. time
3pm to 5pm east. time
Location: Online meeting...
Cost: $58.00
.
*** Class size is limited to spaces available. ***
For any questions or more information, please contact Bill Hearn
Confidential Sources
POB 407
South Prairie, Wa. 98385
253-862-3037 Voice
consources@yahoo.com
http://privacybydeception.blogspot.com/
Bill Hearn
Tuesday, February 18, 2014
Interview on "Therothshow.com" with Dr.Laurie Roth
Often victims of crime or violence must find a way to safely escape someone who may be tracking their every move. Finding a place of safety is no easy feat in the age of information and the internet. Searches can be easily conducted online, or even through social media sites such as Facebook, and everything you DON’T want someone to know is there.
Using a mixture of Common knowledge and alot of Creativity anyone can
hide in plain sight and live some kind of private life... If you would like to hear an interview on 2/12/14 on The Roth Show with Dr. Laurie Roth you will learn some pretty cool tricks to add to your Privacy trick bag... And you will get to hear
what Im preaching... http://www.therothshow.com/demos/recent/hour3Feb1214.mp3
Thursday, February 13, 2014
Privacy by Deception Webinar 2.18.14
Privacy by Deception Webinar 3.11.14
What: Learn how to Protect your Privacy from any person or entity thats trying to invade your privacy .... from family members, to nosey neighbors, and beyond...
You will leave this workshop with the skills and knowledge of how to thwart any seasoned "Skip Tracer" or investigator that might be trying to invade your privacy...
Areas to be covered include:
*How Skip Tracing works to locate you and your assets.
*What steps "they" take to invade your privacy using Basic Research
*How to clean up any Public Records that are out there in Public and Private databases.
*Plus alot more...
Other areas covered:
*How to analyze the person who is looking for you."the skip tracer".
Understanding of how to thwart each search effort being used against you. And how each differs and what to look for.
*Discussion of how the tools available to professional skip tracers are turned against them to your utmost advantage.
*We will discuss the least expected, BEST techniques used and some forgotten tricks of the trade that skip tracers use against you.
*Learn the difference between "database" and "inside information" that will be used to invade your privacy.
*We will discuss how to understand and process information from stored data bases and how to cross-reference with live data.
*How to find resources and contacts--the absolute essential part of the "Privacy" process.
Please Note: You must be aware and current with all Laws, Regulations and Rules that may apply to your "Privacy Project" including local, state and federal levels.
**Learn which Databases will let you opt out of their service, mandated by Federal Law..........
**The posted duration of the, Privacy by Deception workshops are approxmate. It could be shorter or longer depending on the content and attendee participation. The providers reserve the right to cancel any workshop.**
Date: Tues. 2/18/14
Time: 3pm to 5pm pac. time
6pm to 8pm east. time
Location: Online meeting...
Cost: $125.00
Please call for payment directions.
*** Class size is limited to spaces available. ***
For any questions or more information, please contact Bill Hearn
Confidential Sources
POB 407
South Prairie, Wa. 98385
253-862-3037 Voice
consources@yahoo.com
Covert Disinformation Specialists
http://privacybydeception.blogspot.com/
Bill Hearn
Wednesday, October 2, 2013
Covert Disinformation Services
Confidential Sources, is a Covert Disinformation Service...
Here to assist you in obtaining the level of privacy you need to live a safe and prosperous life. We can help you learn to use the Disinformation tools that you need in your pursuit of privacy....
Your personal information is only as compromised as you allow it to be, and throwing disinformation at the Pursuers that are tracking you, can be outrageously effective in confusing the "file" they've built up on you....
When people pick up and disappear, one common and crucial mistake they make is that they do not try to keep their pursuers busy. If you just leave one trail, however hard you've tried to cover it, you allow your pursuer the opportunity to search it thoroughly. Don't give them that opportunity. Skip tracers are some of the quickest and most imaginative people you'll meet, and if they're on the right trail, they'll probably find you....
Now imagine if you could join in this effort of social engineering your privacy, you could live a life on your own terms. Sure, Google and Facebook have turned you into their product, but you can fight back. Disinformation is a very powerful tool. Now, you can learn how to go out into the world and create confusion and doubt, take back your privacy....
We are Professional Covert Disinformation Specialists. We can get you prepared to live a completly private life that you need and deserve today....
Confidential Sources
POB 407
South Prairie, WA. 98385
253-862-3037 Voice
hirealiar@gmail.com
Covert Disinformation Specialists
privacybydeception.blogspot.com
Bill Hearn
Sunday, June 30, 2013
New Social Security Card!! Legally...
New Social Security Card - Legally!
Here's some very good news for those who seek a new identity! Now you can get a new social security card in a new name. Most people still believe that it's impossible - but a brand new social security program makes it much easier.
I had a very interesting chat with a social security worker the other day. He revealed that last year the social security administration had authorized the issuing of new social security numbers to over fourteen thousand people! He expects that number will climb even higher over the next few years.
For far too many years the bureaucrats at the social security administration have steadfastly refused to allow individuals to change their social security number - no matter how dire the individual's personal circumstances.
Then when several women and their children were murdered in cold blood because they couldn't change their social security numbers in order to escape a stalker, the publicity created so much heat the government was forced to change it's policy. The social security administration has now created a new program designed to help individuals change their numbers.
Now for the very first time the bureaucrats will actually let you change your social security number. But first you'll have to do some paper work. (Keep in mind that a person who can qualify for a new social security number could at any point in the future change their name legally.)
At first the requirements may seem a bit tricky, but they're really not all that strict when you examine them in detail. We know more than a dozen people who have successfully changed their numbers and it wasn't at all difficult. You just need to know the regulations and how they are applied. In short, to qualify under this new policy, you'll need to document that you've had your identity stolen or have been abused by another.
If you feel that you can qualify for a social security number change under this new program - apply immediately. If you can't get a SSA clerk to cooperate, politely ask for their supervisor and see if they will be more sympathetic. If they refuse, take the whole matter to your senator or congressman. It's your representative’s job to help you iron out any problems you may be having with various government agencies including the social security administration.
Though they will never admit it, government bureaucrats deeply fear citizens who are active letter writers and complainers. As long as no one complains to a higher authority, these clerks can get away with murder (which is what they've been doing for some years now by ignoring abused spouses) but when you get someone with some real power behind them, the whole situation can rapidly change. They know that a single letter from a Senator can land an entire agency in some very hot water.
Our report contains full details on the factors that will get your application rejected and those that will assure it’s smooth approval. You’ll also learn all the traps built into the new law and how best to easily navigate your way around them.
Confidential SourcesPOB 407
South Prairie, WA. 98385
253-862-3037 Voice
consources@yahoo.com
South Prairie, WA. 98385
253-862-3037 Voice
consources@yahoo.com
privacybydeception.blogspot.comBill Hearn
Thursday, May 9, 2013
Privay by Deception
Privacy by Deception...
I can show you how to hide in plain sight without changing your identity, legally... Using proven Social Engineering tricks that thwart most investigative efforts...
I have 35 years experience as a Confidential Information Specialist, where I have conducted thousands of searches for People and highly confidential information that is hard to, or impossible to access without the use of deception...
I have trained hundreds of people in the investigative industry to use my proven techniques...
I have also taught many private citizens, how to hide from the tactics that I teach the investigative industry...
For more info and or any questions about this post, please call me ASAP...
Confidential Sources
POB 407
SOUTH PRAIRIE, WA. 98385
253-862-3037 Voice
consources@yahoo.com
Monday, April 22, 2013
Free Privacy by Deception Intro Webinar 4.24.13
Privacy by Deception... Free Introduction Webinar 4.24.13
Areas to be covered include:
*How Skip Tracing works to locate you and your assets.
*What steps "they" take to invade your privacy using Basic Research
*How to clean up any Public Records that are out there in Public and Private databases.
*Plus alot more...
*What steps "they" take to invade your privacy using Basic Research
*How to clean up any Public Records that are out there in Public and Private databases.
*Plus alot more...
Other areas covered:
*How to analyze the person who is looking for you."the
skip tracer".
*Understanding of how to thwart each search effort being used against you. And how each differs and what to look for.
*Discussion of how the tools available to
professional skip tracers are turned against them to your utmost advantage.
*We will discuss the least expected, BEST techniques
used and some forgotten tricks of the trade that skip tracers use against you.
*Learn the difference between "database" and "inside
information" that will be used to invade your privacy.
*How to find resources and contacts--the absolute
essential part of the "Privacy" process.
skip tracer".
*Understanding of how to thwart each search effort being used against you. And how each differs and what to look for.
*Discussion of how the tools available to
professional skip tracers are turned against them to your utmost advantage.
*We will discuss the least expected, BEST techniques
used and some forgotten tricks of the trade that skip tracers use against you.
*Learn the difference between "database" and "inside
information" that will be used to invade your privacy.
*How to find resources and contacts--the absolute
essential part of the "Privacy" process.
Please Note: You must be aware and current with all
Laws, Regulations and Rules that may apply to your
"Privacy Project" including local, state and federal
levels.
Laws, Regulations and Rules that may apply to your
"Privacy Project" including local, state and federal
levels.
**Learn which Databases will let you opt out of their service, mandated by Federal Law..........
**The posted duration of the, Privacy by Deception workshops are
approxmate. It could be shorter or longer depending on
the content and attendee participation. The providers
reserve the right to cancel any workshop.**
approxmate. It could be shorter or longer depending on
the content and attendee participation. The providers
reserve the right to cancel any workshop.**
Date: Weds. 4/24/13
Time: 4pm to 5pm pac. time
*** Class size is limited to spaces available. ***Time: 4pm to 5pm pac. time
7pm to 8pm east. time
Location: Online meeting...
Cost: FREE
Location: Online meeting...
Cost: FREE
.
For any questions or more information, please contact Bill Hearn
Confidential SourcesPOB 407
South Prairie, Wa. 98385
253-862-3037 Voice
consources@yahoo.com
http://privacybydeception.blogspot.com/
Bill Hearn
Bill Hearn
CONFIDENTIALITY NOTICE: This communication constitutes an electronic
communication within the meaning of the Electronic Communications Privacy
Act, 18 USC 2510, and its disclosure is strictly limited to the recipient
intended by the sender of this message. This communication may contain
confidential and privileged material for the sole use of the intended
recipient and receipt by anyone other than the intended recipient does not
constitute a loss of the confidential or privileged nature of the
communications. Any review or distribution by others is strictly
prohibited. If you are not the intended recipient please contact the
sender by return electronic mail and delete all copies of this
communication. To reply to our email directly, send an email to:
consources@yahoo.com ... Thank you
Subscribe to:
Posts (Atom)