STRETCH CONNECTIONS

In the Virtual Entity Chapter I explained about the pizza delivery scenario where the teen goes to the schoolyard and has another teen deliver the pizza. This saves the delivery teen from getting his teeth knocked out.

 

When you are utilizing anything digital or an item with a connection, ask yourself if pressing enter, send or download can get your teeth knocked out? If it can, walk away and figure out another way to push the buttons.

 

One of the keys of being a Virtual Entity and disappearing from BIG BROTHER is to control the traces you create. One of the reasons prison are filled to the brim with criminals is because they leave evidence behind. Sometimes this is a good thing depending on the crime. Anything violent is a drag!

 

When you plan your disappearance, you should see yourself as a criminal committing a crime therefore you must detect all possible traces you are leaving behind.

 

A friend I grew up with spent most of his life in and out of prison for armed robbery. The last time he was walking the streets a free man he stuck up a supermarket. He walked in the supermarket, grabbed a cart and shuffled through the store as if he were a customer shopping. At the main counter, he pulled a gun and split with the cash. Several hours later, he is back in the poky.

 

While he was wheeling the cart and playing the part of the customer loading the wagon with milk, sugar and other items he was not wearing any gloves. It was fingerprint city and this made him a three-time loser. He left footprints behind.

 

Footprint and fingerprints are one in the same and both can lead to your downfall. Ask yourself if you are leaving fingerprints behind in the supermarket.

 

If you utilize a third party properly, you can protect your identity and location. The object is to make the third party your button pusher, who leaves the fingerprint behind.

 

What is very cool about third party services is you can hire an assistant in Norway who creates your digital footprints in Norway today and tomorrow you hire one in Manila who creates footprints in Manila tomorrow.

 

Setting Up Third Party Service

 

I have already explained how to set up third party assistants but I like to explain steps more than once.

 

Use Once & Dump

Prepaid Debit Card.

Email Addresses

Prepaid Cell Phones

Virtual Numbers

How to Email

 

You are Frank M. Ahearn and you need to email a chapter of your new book to your publisher. Frank M. Ahearn is far off the grid and does not want to be located. The question is how does he get the book chapter to his publisher? Frank leaves his home and searches for a non-traceable internet connection. The connection between Frank and his publisher is non-traceable not the technology itself.

 

Option A: Copy and paste the chapter into an email address and save email as a draft.

 

Option B: Post the chapter on a private website you built.

 

Third Party Assistant

 

Option A: Frank setups a prearranged situation with his Third Party Assistant. Each morning they check email address A and copy the draft email with forwarding instructions. They close out email account A and open up email account B. The third party assistant pastes the information into the email and they press send.

 

AGAIN

 

Step 1: You login to email account A, and paste information into email and save as draft.

 

Step 2: Third party assistant logs in to email address A, copies the content.

 

Step 3: Third party assistant logs out of email account A.

 

Step 4: Third party assistant logs into email address B, sends content to email address C.

 

A different third party in a different country checks email address C. That assistant copies and paste information into email address D and sends to intended recipient.

 

Be Aware!

 

Do note the email provider does have a record of the draft content. This by no means that the emails cannot be traced, however, there are drop points in the connection that make it more difficult to track. It would be wise to change up your third party assistant every few days and do not become too dependent of any one of them.

 

Complacency Kills!

 

As long as you are not playing in the realm of Snowden or Dread Pirate Roberts you should be safe. Make sure your third party assistant deletes all the content in the folders when the task is complete. You could also switch up Step 1 and paste the information onto a password protected website you built. You would provide the third party assistant with a password to access the site and they will copy the information you want emailed.

 

 

Obtaining Email Addresses

 

It is best to have a minimum of three third party assistant in three different countries like Bangladesh, Mongolia and Korea. You will be able to find multi-language assistants in most countries. Have each of the assistants obtain several email addresses for you to utilize. Instruct them to create emails from local email providers.

 

When closing out an email address in Thailand have a third party assistant in Norway close out the email address. If the email address is in Thailand is compromised by your predator it will show final access came from Norway.

 

The difference between disappearing from BIG BROTHER and disappearing from a stalker or any other lunatic is BIG BROTHER has international access and deep pockets. If your ex or another is hunting you and they have deep pockets, it would be wise to view them as BIG BROTHER. This means that if they discover the email address account in Thailand they will have no issues paying for someone to access information in Norway.

 

Communicating this way is traceable with means and access. You should look at it like a hangman’s rope. It is your job to make the rope as long as possible, like Thailand to Norway. It is your predator’s job to tighten the rope. As long as you do not get too close to that noose, you should be ok. When closing out the different email accounts have the third party assistant change the profile information in a different language prior to deletion.

 

Receiving Emails

 

Receiving emails can be tricky and you must always be aware of your actions. Let us assume you need to have an email so certain people can contact you. This select circle of people will contact you on lyingforaliving@gmail.com or something. Do not use any identifiers in the email like FMA, or FrankA.

 

When sending emails you want to stretch the rope between you and the connecting parties as far as possible. Some of the suggestions offered may be an inconvenience but better to go the distance then hearing gotcha!

 

Schedule

 

TPA= Third Party Assistant

 

Monday – TPA Denmark

Denmark checks email A for emails received and copies content. Denmark signs on to Email B and sends to Email C.

 

TPA China

Answers Email C and posts it onto to a secure website you built.

 

Again, you can have your TPA send the emails to another email address you set up or you could have them post to a secure website. A different TPA can gather the information from the secure website and will either email you or paste the email into another website.

 

Wednesday – TPA Senegal

Senegal copies email information from secure website and post it on another website.

 

Continue the rotation with Thursday, TPA in Romania and Friday a TPA in Italy.

 

With the pizza delivery scenario, it is possible that the bully knew the teen worked at the pizza shop and ordered the food as a ruse to catch him. It is also possible the bully put the schoolyard kid in a headlock and squeezed out of him where the pizza teen is waiting.

 

However, the pizza teen has read all of Frank M. Ahearn’s books and is not waiting in the schoolyard but across the street observing incase the bully shows up. The pizza teen stretched his connection by not waiting in the schoolyard.