The Digit Hit Man is a how to style book that teaches people how to combat online privacy as well as obtain new identities.
The Digital Hit Man is the only book that teaches people how to create and use deception for the purpose of combating sites that violate your on-line privacy, be it scandalous information, negative information or the long-lost skeleton that digitally stepped out of the closet, now making your life miserable.
The Digital Hit Man is written by the author of the bestselling book, How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace. In his new book, Frank M. Ahearn divulges his weapons for combating the digital enemy.
As a skip-tracer, Frank M. Ahearn has located thousands of people from all parts of the world, including celebrities, royalty and the infamous. Frank was the go-to guy for the UK tabloids in his heyday of skip-tracing, and prior to the phone hacking scandal. As a social engineer, he has obtained confidential phone records, bank records, airline records, credit card records and other sensitive information that he will take to the grave. As a disappearing artist, Frank operated his own private witness-protection program, and assisted victims of stalkers and others who needed to disappear from danger. Since there is no delete button you can use to rid negative on-line information, Ahearn now uses his skills of pretext and digital manipulation to combat the invasion of your privacy.
AN EXCERPT: The Five Genes of Digital DNA
SELF is the information that you provided to third-party sites like Facebook, LinkedIn, blogs, Twitter, online comments and any other sites where you physically participated in broadcasting.
PIV stands for Personal Information Violation, which is when someone posts your information or photo online without your permission.
DATABASE is the information that sells for $9.99 and typically consists of public records and other free online information.
COPYRIGHT INFORMATION is information that is protected, such as newspaper articles, photos and other content deemed as protected.
IMAGES are photos of you floating around in digital dystopia.
The next few chapters show you how you will play digital detective and hunt for everything that is known about you. The problem with information online is that it’s like an ocean where the tides and currents choose their time and direction. Therefore, once you locate your information, I suggest that you wait a few days and redo the search for information you possibly missed or that was recently posted.
- Understanding Online Privacy (Or How I’ve Just Been Slapped in the Face by a ‘Dead Fish’) (edelman.com.au)
- Searching for your online privacy? (micheltriana.com)
- Infographic of the Day: online privacy woes (dvice.com)
- The Wild, Wild Web: Wrestling Online Privacy (alchemicgorilla.com)
- Online Privacy Tips [Infographic] (marketingpilgrim.com)
- The Wild, Wild Web: Wrestling Online Privacy (frugaldad.com)
- The Wild, Wild Web: Wrestling Online Privacy (ppjg.me)
- WestHost Awarded Coveted Online Privacy Seal by TRUSTe (prweb.com)
- Claim back your online privacy (sciencetext.com)
- Do You Like Online Privacy? You May Be a Terrorist (yro.slashdot.org)
- Frank M. Ahearn The Digital Hit Man and His Weapons for Combating the Digital World (amazonbestsellingbooks.wordpress.com)
- Frank M. Ahearn The Digital Hit Man and His Weapons for Combating the Digital World (amazonlondon.wordpress.com)
- The Digital Hit Man and His Weapons for Combating the Digital World (booksonprivacy.wordpress.com)
- How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace (creatingonlinedeception.wordpress.com)