Sunday, July 31, 2022

What is “Cover and Legend”?

“Cover and Legend”

Using a Cover and making a Legend are the most important parts of staying anonymous for a long time. A “Cover” is a second name, and a “Legend” is the story and evidence that backs up the “Cover.”

Your “Legend” is the background information that will “flesh out” your new Cover/alias and make sure it is believable.

If your Legend is from a different country, you should know about politics and news in your own country.

You don’t want to get caught because someone asks what school you went to in your cover’s hometown. You can’t name it, or its mascot, or because you’re visiting Japan as a South Korean but have nothing interesting to say about the conflict over the Dokdo/Takeshima islands or call them by the wrong name for your nationality.

If your Legend has a different accent than you do, you should be able to imitate it without going too far and looking suspicious. Learn how locals say the names of their cities, especially if you have a regional or local accent. For example, if you’re from the area, you don’t say “Baltimore.” Instead, you say “Ballmer.”

 

Don’t be afraid to use your own experiences as long as they fit with your Legend.

The best stories are the true ones… When you can, tell the truth. This goes a long way toward making your Legend seem more real.

Simple facts about your Legend should come to you quickly and easily. Your birth date, profession, residence and address, details about your home, favorite drink, dish, or place to eat back home, and so on.

For example, a spy whose Cover identity is a Russian accountant would need to speak Russian and know a lot about Russian financial laws. For the Cover to look more accurate, the Legend must be very detailed. The agent will have to remember a fake history of his life.

1. What school did he go to?

2. Does he have a certificate to show that?

3. Where did he come from?

4. Who did he divorce?

5. What does he do for fun?

If the Legend says that the agent likes to fish, he should have fishing gear at home. The success or failure of a Legend can depend on things that seem so small.

Be careful not to be too sure of yourself. After getting a new Cover identity, a person should give up the habits and relationships they had with their old identity. Christopher John Boyce a USSR spy known as “The Falcon” because he liked to compete in falconry.

In the 1980s, there were only about a hundred falconers in the United States, and most knew Boyce. Boyce escaped federal prison on January 21, 1980, and got a new name. He returned to doing what he used to do, which was going to falconry competitions. He used his new name but still hung out with falconers who knew him by his old name. Boyce was arrested again on August 21, 1981.

The post What is “Cover and Legend”? appeared first on Amicus.



source https://www.amicusint.ca/what-is-cover-and-legend/

Friday, July 29, 2022

How Long Could You Stay Out of Sight?

Maybe you’re like us and have often wondered, “How long would I get away from the police before I was caught?”

Christopher Peters, a data scientist, decided to find out by collecting information on the 500 criminals who have been on the FBI’s Most Wanted Fugitives List since 1950. He figured out how long each criminal had been on the list before they were caught (though some have yet to be caught).

Step two was to figure out how long the average fugitive had been on the run. Peters couldn’t just take an average, though. The problem was that there are still criminals running around. If he leaves them out of the data set, the research question would change to “How long did criminals who were dumb enough to get caught stay free?”. Which is not what we want to know.

To get around this problem, Peters tried to figure out how long these criminals who were still wanted could stay free. He used something in statistics called “survival analysis” (often used in medical research). This method would help figure out how much longer fugitives who haven’t been caught yet could expect to stay on the run.

After doing this analysis, Peters came to the conclusion that most people on the Most Wanted List stay free for 1.67 years on average without a new identity.

As you can see, a person on the run doesn’t have a lot of chances. Only 25% of all criminals on the list hadn’t been caught a year after being put on it. Less than 10% of people on the run stayed free for 5 years. Bin Laden was technically free for more than 10 years, but he was also safe in caves and compounds with lots of guards. But once a criminal is on the Most Wanted List, law enforcement usually does a good job of catching them.

But let’s say you were trying to avoid the police. What’s the best long-term plan for getting away from the police? Do you think you could stay free for more than the average amount of time?

      1. Never talk directly to the family. Always use a middle man.

      2. Only use cash that is $20 or less.

      3. Go where nobody else is. Woods, islands, sewer systems, etc.

      4. Don’t be a bother.

      5. Don’t stop looking behind you.

The post How Long Could You Stay Out of Sight? appeared first on Amicus.



source https://www.amicusint.ca/how-long-could-you-stay-out-of-sight/

Tuesday, July 26, 2022

What is Extradition?

Extradition is the formal process involving one state surrendering a person to a different state for prosecution for crimes they committed in the requesting country.

Extradition involves a treaty between two countries and, most importantly, a person who is on the run.

What is an Extradition Treaty?

An Extradition treaty describes the transfer of an accused person from one state or country to another, seeking the person to stand trial. When a treaty comes into effect, an extradition warrant is issued to arrest the fugitive and transport them to the country demanding them.

Treaties signed these recent years have a dual criminality approach, which lists all the crimes that can be extraditable and punishable between the two countries. However, previous extradition treaties would only list the offenses to which they would agree to extradite a person. In addition, most extraditions only allow for crimes that attract a sentence of more than one year.

Treaties also provide occasions when extradition may be denied. Generally, most authorities do not extradite individuals for any military or political offenses, except when there is a case of terrorism or violence. Other states do not deport accused people to places where capital punishment is probable unless the demanding state or country promises not to impose such as punishment.

U.S. Extradition
Extradition from the United States

This extradition process starts with the foreign government asking the United States State Department through treaty paperwork. The information involves:

  • The person they want
  • The offenses charged
  • The documents used to charge them
  • Their arrest warrants
  • The evidence they have against the defendant

When these foreign authorities feel the person is a flight risk, they may ask for a provisional arrest and detention before they get the necessary material. The secretary of state then forwards this request to the Department of Justice, who will review the compliance with treaty regulations, contact an arrest warrant, take the fugitive to custody, and then appear before a judge. First, the court decides whether there is probable cause for the offense stipulated in the treaty. Where there is probable cause, the matter goes back to the secretary of state, who decides whether to extradite or not.

Extradition to the United States

A federal or state prosecutor meets with the relevant agency to decide whether the crime is worth the cost of extradition. The prosecutor will then prepare an application to send to the Department of Justice to determine the sufficiency. Upon approval, the State Department will send a request to the U.S. embassy, which will forward the request to the country’s authorities in question. After that, depending on the country involved, the process may vary. Finally, when the request is approved, the U.S. Marshals Service escorts the fugitive back to the United States.

Rules of Extradition in the United States

The process is outlined in the constitution. According to the Federal Code of Laws at 18 U.S. Code Chapter 209, some rules are necessary for extradition law to apply;

  • The extradition documents need to be in order and contain all essential details
  • The accused person must be charged with a crime in the demanding country or state.
  • The person named in the extradition request has to be the person charged with the crime
  • The petitioner should be from the requesting country or state
Extradition Between Countries

The countries work primarily between themselves, using extradition treaties. If the United States wants to extradite, they file a complaint with a U.S. court and provide charges and treaty requirements. Then, the warrant is issued to the Secretary of State to contact the foreign government where the fugitive is residing for the international extradition process.

Some countries do not extradite. Some countries that do not have an extradition treaty with the United States include China, Russia, Bahrain, Namibia, and North Korea. Nevertheless, these countries still have the power to negotiate the extradition of a fugitive with other countries. In such cases, however, the country where the accused is residing may choose to reject the request. A famous case is Edward Snowden of the United States, who took refuge in Russia after being charged with theft and espionage. Considering the two countries have no extradition treaty, Snowden escaped prosecution.

Examples of Extradition

Famous Hollywood director Roman Polanski has been on the run from the United States since he was charged with child trafficking in the 1970s. Polanski was arrested in Switzerland in 2009, but the Swiss justice ministry rejected a request by the United States to extradite him. They refused to extradite the fugitive because the legal records supplied did not meet the required standards, and Polanski had traveled to Switzerland in good faith.

As a result, the convicted child predator has avoided sentencing in the United States by avoiding both the U.S. and all countries with extradition treaties with the United States.

Former Liberian President Charles Taylor has been a man on the run most of his adult life. His first stance with extradition was in 1984 when he fled his home country Liberia to the United States after being accused of embezzling more than $900,000 in government funds. The Liberian government placed a request to the United States, and Taylor was consequently detained in a Boston Prison as the United States considered the extradition request. However, he escaped prison a year later.

Summary

Extradition is a formal process describing a request by one government to surrender a particular person who has taken refuge in a different country for them to be prosecuted for crimes they committed in the requesting country. The extradition process has its basis in the constitution of any country that participates in the process. Extradition treaties are rules and regulations governing extradition operations between countries. In the United States, these rules and regulations are stipulated in The Federal Code of Laws at 18 U.S. Code, Chapter 209. Additionally, rather than extradition between the United States and other countries, states within the United States can practice extradition among themselves.

The post What is Extradition? appeared first on Amicus.



source https://www.amicusint.ca/what-is-extradition/

Sunday, July 24, 2022

Creating an alternate identity

Let me begin by stating that I am making this entire story up on how to create a new identity.

Consider that you are in charge of sending sleeper spies into the US. The year is 1983, and it is getting harder and harder to produce alternate identities due to the growth of identity databases.

It was simpler ten years ago to arrive in the country and apply for a driver’s license, Social Security card, and bank account, possibly using the identity of a person who had died as a young child. These days, it’s more complicated. And you are aware that the pattern will only persist.

Identify farming is what it is.

You create a few little children. For them, you apply for Social Security numbers. As time passes, you open bank accounts for them, prepare their tax reports, register them to vote, and apply for credit cards in their name. You have a few identities ready and waiting for some genuine people to assume them 25 years later.

There are, of course, specific difficulties. Perhaps you should ask them to sign their names as mothers or, at the very least, as parents. Doctors are required to complete birth certificates. Perhaps you must complete documents attesting to the fact that you teach these kids at home.

You’ll want to use their financial identity, such as adding money to their bank accounts, taking money out of ATMs, using their credit cards to make purchases, and so on. And you’ll need to provide the addresses of some kind, even if it’s just a mailbox.

Driver’s licenses and photo IDs cannot be obtained in their name. But it doesn’t matter because more than 20 million adult citizens in the US lack photo IDs. But aside from that, I am at a loss as to why identity farming wouldn’t be successful in creating an alternate identity.

The actual question is: Is there any aspect of your life for which you are required to appear?

As I said, I made everything up. I don’t have any proof that anyone is genuinely engaging in this. A criminal organization is unlikely to take this action because the reward horizon of 25 years is too far away. The same reasoning applies to terrorist groups; it is not worthwhile.

Even while it could have been more difficult to justify after the Soviet Union disintegrated in 1991, it might have been helpful for the KGB, and it might have been a tempting option for current intelligence rivals like China.

Immortals might potentially use this method to perpetuate themselves by creating their children, taking on those identities over time, and then eliminating their parents. They might even appear in their driver’s license photos while sporting blue spiked hair for the boy and a beard for the father.

“Highlander effect”

This is supposedly a popular concept in Highlander fan literature. The goal is not to invent a new threat for a movie storyline but rather to highlight the critical place that data now plays in our daily lives. We all have a data shadow that follows us around, and more and more institutions are interacting with our data shadows rather than with us, I’ve said in the past, creating an alternate identity

When we apply for a driver’s license or passport, we occasionally cross paths with our data shadows, and earlier, less secure exchanges verify those contacts. The rest of the world ignores the tenuous bond between us and our plastic cards, assuming that our photo IDs permanently attach us to our data shadows. (And REAL-ID won’t help, either.)

My impression is that our data shadows are becoming different from us and are taking on a life of their own. Our shadows are the current focus; we are incidental. We might even lose our need for these shadows as our society depends more and more on them.

Without us, our data shadows can lead perfectly regular lives.

Contact Amicus International for more advice on Creating an alternate legal identity.

The post Creating an alternate identity appeared first on Amicus.



source https://www.amicusint.ca/creating-an-alternate-identity/

Thursday, July 21, 2022

How to buy new identity

How to buy a new identity, who do you contact? where do you look? Is it safe?

Every day, millions of individuals use the Internet for a variety of purposes. Basic tasks like tweeting to distant employment and how to a new identity.

Although specialists from a hacking course point out that the Internet has become a widely used tool. they also point out that it is one of the primary operating bases for hundreds of criminal organizations for illicit activities.

The “conventional Internet” is what the cybersecurity community refers to as the area where law enforcement agencies from around the world have spent a lot of time and money trying to stop illegal activities on the Internet.

However, since the majority of cybercrime occurs on the “dark web,” which is a network that can only be accessed using specific tools, where criminal organizations still operate with a fair amount of freedom, entering this network is difficult.

Drug traffickers, pedophiles, malevolent hackers, and for-hire killers are the main users of this portion of the Internet, according to organizations like the FBI and Europol.

However, the selling of forged documents, which are in great demand from alleged criminals, immigrants, and even political refugees, has emerged as one of the latest enterprises with the quickest growth rates. Although it could appear like a fiction-only habit, it is becoming commonplace in many nations.

How to buy a new identity

Hacking course specialists believe that a variety of stolen and fabricated documents, such as passports, driver’s licenses, academic credentials, and even bank accounts, may be discovered. Considering the price of these documents, purchasing a new identity might be rather affordable.

We’ve all seen in movies how bogus identities are created, but that’s all. What if I said it was both feasible and inexpensive?

Would you like to buy a new identity?

In recent years, obtaining a new identity on the darknet has gotten simpler. Users have unparalleled access to phony and stolen personal documents on the darknet, which are currently more affordable than one may anticipate. the typical price of the paperwork required to begin a new life with a totally different personality.

The cost

Many of the underground sites exclusively take payment in cryptocurrency, such as Bitcoin (BTC), despite the fact that there is virtually always a payment option using currencies like US dollars.

The price of a completely new identity, which includes a new passport, license, diploma, birth certificate, financial information, and phony money, varies from nation to nation.

Depending on the nation, the average price of a new person is $12,048. The cost of buying forged documents relies on a number of variables, including the difficulty of getting the documents, the source of the data, their authenticity, and the anticipated worth of the standard of living in the country that is supposed to have issued the documents.

In most nations, the price of getting a new identity is: $14,294 in Australia,United Kingdom – $13,253,$13,051 in Europe,USA – $13,051,$13,038 in Canada

The dark web offers two different kinds of passports.

According to experts, passports with claims like “registered,” “authentic,” and “able to pass verification” cost more money. Typically, the cheapest fake passports cost the customer about $100. An “authentic passport” on the dark web typically costs: $12,745 Australia,$15,745 Canada,$29700 for Europe

Even if the average cost of a fake European passport on the dark web is $17,750, the price of forged documents varies by nation due to a variety of reasons. A false Norwegian passport will cost the most, at $66,800, followed by those from Switzerland ($59,764), the Netherlands ($57,745), Germany ($55,745), France ($53,745), and Spain ($52,690).

Contact Amicus International, we can help you today.

The post How to buy new identity appeared first on Amicus.



source https://www.amicusint.ca/how-to-buy-new-identity/

Sunday, July 17, 2022

What is Synthetic Identity?

A thief who doesn’t exist.

Using a synthetic identity makes anyone practically invisible, unable to identify who is really behind the synthetic ID.

That’s not a trick question; it’s the problem investigators of synthetic identity fraud (SIF) have to deal with. SIF is a relatively new type of identity theft in which criminals combine pieces of accurate personal data with fake information to create a whole new identity that’s almost impossible to track down.

SIF is different from traditional identity fraud, which is when someone steals and uses someone else’s real identity. Instead, SIF criminals start with one piece of accurate personal information, usually a Social Security number.

“Everythings fake”

Then they build a fake identity around it by making up a fake address, phone number, and other essential information. Fraudsters then use fake identities to open credit lines, get auto loans, or trick government agencies into getting their hands on tax returns and benefits.

There is so much money being lost to SIF that no one knows, but a 2018 study by the advisory firm Sanford research found that U.S. credit card accounts lost $820 million to SIF in 2018, and losses are expected to rise to $1.25 billion by 2020.

Other estimates say that credit losses could be as high as $6 billion to $8 billion, and that’s not even counting the untold millions of dollars that victims of this new breed of cybercriminals lose in time and stress. At the federal level, the Department of Justice got $3.7 billion in settlements and judgments under the False Claims Act in 2017. However, the AARP says that Medicare alone lost $60 billion to different types of fraud in 2017.

What’s going on?

Modern government and financial systems are more likely to be affected by SIF because of a number of factors that have come together.

First of all, SIF is being driven partly by improvements in the security of physical credit cards. This is an irony that people who work to stop fraud are used to. Since debit and credit cards now have EMV chips, it is harder for thieves to commit fraud in person. Instead, they are coming up with more and more clever ways to steal money online.

Next, the move to digitize almost all financial transactions, including government benefits, has given cyber thieves both a chance and a temptation.

It is much easier to pretend to be someone else online than in person, especially if the “person” is just a set of data points. Banking, credit, and government agencies only look at a few critical pieces of information to figure out who someone is, and thieves are good at making them look natural.

Lastly, a record number of data leaks in all parts of the economy have given criminals access to more personal information than ever before. According to the Identity Theft Resource Center, there were 1,579 data breaches in 2017.

These breaches exposed almost 179 million personal records, including 14.2 million credit card numbers and 158 million Social Security numbers. Many of these records are now on the Dark Web, where they are sold to anyone who is willing to pay, just like any other good.

How does SIF work?

Fraudsters start SIF by stealing real Social Security numbers from people who aren’t using their credit, like children, homeless people, or people who have recently died. Fraudsters use fake addresses, phone numbers, and even social media accounts to create a synthetic” identity or thousands of them. Then comes the real trick.

Thieves start applying for credit online with these fake names, even though they know they will be turned down because there is no credit history attached to the terms.

The trick is that you can start a credit history just by applying for credit. At some point, a lender will give in and give the con artist a small line of credit, like $500 to $1,000.

“This is how we do it”

Fraudsters then make small purchases over a few months and pay off the balance to improve their credit score and get lines of credit that are ever more generous. When their credit limit gets big enough, between $10,000 and $15,000, the scammers “bust out” by suddenly using up all their credit and leaving.

“These criminals are smart and willing to play the long game and set up a Synthetic identity,” says Robert Davis, a digital identity expert who works in Strategic Intelligence for Salusgard, an industry leader in mobile security solutions for financial institutions. “They are patient and know how to use holes in the system to their advantage.”

In a SIF scam, criminal gangs might take up to a year or two to put together a list of fake identities before they pull the trigger. And while they’re pretending to be real credit customers, fraudsters have plenty of chances to take advantage of how real they seem in other areas, like auto loans, health care, and government benefit programs.

Synthetic fraudsters use the Social Security numbers of children because it could be 10 or 15 years before the child finds out that their credit was hacked.

“Try to get us if you can.”

Why is it so hard to catch people who use SIF?

There are many reasons for this, but one of the biggest is that fraud detection is hard to do. Dennis Lormel, who used to be the head of the FBI’s Financial Crimes Program and is now a financial crimes consultant, says that compliance and fraud investigators tend to be reactive. “We don’t look into fraud until it happens, we’re really behind the curve when it comes to SIF because we need to be proactive to stop it.”

Lormel thinks that this will change as the banking and credit industries change their practices to make SIF harder.

Right now, government programs are only responsible for a small amount of fraud related to fake identities. Lormel says, “Criminals are always changing, and the government is a fraudster’s dream.” ”

All entitlement programs are in danger, but healthcare is especially so. So are tax returns and programs to help people. If you can make a fake ID and set it up to get refunds or benefits early – which is precisely what the system is designed to do – you have the makings of a fraud that can last. Lormel says that the only reason SIF hasn’t been used more often to cheat the government is that credit fraud is much more profitable, at least for now.

How to deal with Synthetic identity.

Changes must be made to how financial and government institutions verify people’s identities and how technology is used to store and share personal information to keep SIF from becoming an even bigger problem.

In January 2018, Lormel spoke in front of the U.S. Senate Banking Subcommittee on National Security, International Trade, and Finance. He urged government officials to make it easier for government agencies and departments, financial institutions, and the private sector to share information with each other.

Lormel says, “We need to get better at using artificial intelligence and data mining everywhere to find patterns of behavior that don’t make sense or are suspicious.” “Government agencies need shared databases so that they can check information like Social Security numbers against other data sets. Everything is closed off right now, and criminals take advantage of that.

In 2011, for example, the Social Security Administration started randomizing Social Security numbers.

This meant that the first three digits of a Social Security number no longer had any meaning in terms of location. This was done so that the nine-digit SS system could be used for longer.

But without the geographic identifier, it is much easier for a criminal to make a fake ID with contact information that looks like it came from a real ID. To find possible SIF, you need to be able to look past these essential pieces of information and find patterns of behavior that “real” people have but that are usually missing from a synthetic ID profile.

Put to use.

For example, “real” people have rental histories, legal issues, family ties, passports, DMV records, extended social media profiles, etc., but a synthetic ID profile doesn’t have these things.

Salusgards Davis says that “behavioral biometrics” would help agencies get a more complete and accurate picture of a person’s identity. “The big problem is that all the pieces that make up “you” as an individual are held in different places,” he says, adding that a better system would be able to “analyze and compare contexts and behaviors” to figure out if a person is who they say they are.

Davis says, “You need as much information as possible at your fingertips to look for gaps in the data and get a complete picture of a person’s identity.” he says that combining this ability with other unique identifiers, like biometrics (eye scans, fingerprints), dedicated personal devices (like a cell phone), or unique biographical details, would add an extra layer of identity assurance because these identifiers are hard to copy.

Technology and being on guard

New technologies like blockchain show the promise of being able to build a foolproof, unhackable system of personal identification in the future.

However, it will be a long time before all levels of government use these technologies.

Lormel says, “We are way behind on Synthetic identity.” “All government agencies need to update and improve their technology,” he says, adding that people need to be taught to be more careful at the state and local levels

There are other holes in the system that need to be fixed and agencies need to work together to make a much more robust environment for running the government’s business.

In Davis’s opinion governments and institutions need to think about the problem throughout the whole user journey. “Even if you solve the SIF problem, you might be pushing other types of fraud into other channels,” in the same way that chip-enabled credit cards led to SIF.

Between now and then, neither Lormel nor Davis thinks that a “top-down” approach is enough to fight  Synthetic identity. People need to be more aware of how dangerous SIF is and learn how to protect themselves, such as by freezing their child’s credit and checking their own credit reports regularly for any strange activity.

SIF may be the type of fraud that is growing the fastest in the country, but it is far from the only one.

“People need to assume that all of their information has already been stolen,” says Davis, because data breaches happen every day, and it’s likely that it has.

Contact Amicus Intranational for information on how to obtain a legal new identity.

The post What is Synthetic Identity? appeared first on Amicus.



source https://www.amicusint.ca/what-is-synthetic-identity/

Friday, July 15, 2022

Creating a new identity

Let’s dig a bit into what we mean by identity.

At the fundamental level, it’s your name/face, i.e., people know you by your name and face. It’s possible to change both the name via an affidavit before a court, and the look via plastic surgery, but this is all you have to do when creating a new identity.

In case of a name change, there’s a link between your old and new name.

Getting a new passport to reflect your new name and appearance may be possible, provided you have another government identity. This is to support the information you want when creating a new identity.

But, in this modern age, our identity has several other components a Social Security number or SSN, for example.  That is something you cannot change legally. Your SSN /Social insurance number will link you to everything else from your past to you directly.

Now, if you move to a new country using the new identity you created and then renounce US citizenship. There will be a record that would still reference your US citizenship and, thereby, your old identity.

 However, for all outward purposes, you have created a new identity.

 The “easiest” way to Creating a new identity is to adopt the identity of a person who is of the same race/ethnicity as you.

Someone who was born within 3-5 years on either side of your birthdate, with no criminal record, travels only domestically (if at all)

A person who isn’t well-known, who doesn’t live in your area, and who doesn’t have an existing security clearance. If that person also happens to look similar to you would be even better. I’m not going to do the” heavy lifting “of telling someone how to do this, a quick search of Google will suffice, I am sure.

You will need to acquire “breeder documentation” (library cards, car registration, medical insurance cards, etc.), and you need to take these documents to the various locations necessary for a person to obtain the foundational identity items required to perform the task of creating a new identity.

An example of how creating a new identity works.

James’s ‘Whitey” Bulger, the Boston gangster who fled justice for more than 16 years, created several new identities to cloak his real identity as a fugitive on the run. After meeting several homeless men, he paid them for their identification documents and created multiple blended identities.

Using these “borrowed” identities and creating a new identity, he could seek medical care, obtain prescriptions and, ironically, purchase firearms at gun shows.

If it weren’t for Bulger’s racism, his companion’s inflexible personal habits, and the memory of a former Miss Iceland hadn’t come together in the perfect storm, the US Marshal and the FBI would have never found him. Bulger would die and be buried without any law enforcement agency ever finding him.

 Creating a new identity using the Dark web.

There are many such offers, on the dark web to create a new identity. In some countries, they have open-air shops with stalls showing examples of what identity documents they can produce on demand. Such as driver’s licenses, national identity cards, or passports for almost any country or state in the world.

One of the best-known examples and some impressively realistic ones come from illegal operations in Bangkok, Thailand.

It’s all useless.

No one can create a “new identity”; what you see on TV or in movies is pure fiction. It’s worse than useless because you will be caught almost instantly if you attempt to use fake, forged, synthetic, or cloned identity documents.

No matter how good a forged driver’s license, government ID, or passport might be, even if it’s identical to the real thing in every way.

The license or passport number will either not be present in the database, or if it is, the picture on the document (of you) will not match the image stored in the database, likewise with any biometric data. Law enforcement officers and Government border control officials have instantaneous access to the databases via wired or wireless devices.

The first procedure they do when checking an ID is to enter the ID type, place of issuance, and ID number into the computer. Mismatches and other anomalies will be easily detected as forgeries regardless of how good they are.

So, you can purchase a new clean identity in many places online, on the Dark web, or from a stranger on a street corner while creating a new identity.

It will be utterly useless because while the forgers may be able to make flawless documents, there is a problem.  They cannot create all the necessary matching records in the government databases to create a new identity.

Contact Amicus Intranational Consulting for further information and guidance on how to create a new legal identity.

The post Creating a new identity appeared first on Amicus.



source https://www.amicusint.ca/creating-a-new-identity/

The Streisand effect in 10 perfect examples

The Streisand effect is explained in ten significant events and their unfortunate aftermaths.

The Streisand Effect is a phenomenon in which concealing knowledge causes it to spread further. When sensitive information is made public on the Internet, celebrities and organizations frequently find themselves in awkward circumstances. Inadvertently triggering the Streisand effect.

We may believe that taking action quickly is the best option, yet on the Internet, information travels at a rate that no one can keep up with, and censorship can light up a problem like a Christmas tree. Because the narrative is too astonishing to pass up, we’ll start with the effect’s namesake, the Streisand effect.

Barbra Streisand is number ten on the list.

A photographer shot aerial images of the Californian Coastline in 2003 for the Californian Coastline Records Project as part of a 12,000-photo collection. The goal of the project was to persuade government officials to take action against coastal erosion. One of the thousands of photographs included a clear shot of Barbra Streisand’s mansion. She was furious and instructed her lawyers to take legal action, which they did by filing a $50 million lawsuit. The photo had only been downloaded six times before the case, two of which were by Streisand’s lawyers.

The site’s traffic soared to 420,000 visits in the following month after the story was picked up by the media. The photo was widely circulated on the Internet, and the lawsuit was dismissed by the Los Angeles Superior Court, adding to Streisand’s displeasure. If that wasn’t enough, the Court ordered her to pay more than $150,000 in legal fees and court costs to the website’s owner.

The phrase “Streisand Effect” wasn’t coined until two years later. It was coined by Mike Masnick of Techdirt to explain the incident between the Toronto Airport and the website urinal.net. The Greater Toronto Airports Authority ordered that the name of the airport be removed from the website, along with photos of the airport’s urinals. When word of the incident got out, people started flocking to the location merely to view two ordinary urinals.

Uber is number nine.

Taxi drivers protested on the streets of Central London in June 2014, voicing their objection to Uber, an app that uses a Smartphone’s GPS capability to identify you and connect you with a driver. The app was just recently gaining traction in major European cities. The demonstration was not just a flop but also drew attention to the issue thanks to the Streisand Effect. Compared to the previous week, Uber recorded an 859 percent increase in downloads. Since its launch in 2012, the app has also attracted the most sign-ups.

Ralph Lauren (number 8)

Two blogs, Photoshop Disasters, and BoingBoing published a photo of a model from Ralph Lauren.

The girl’s pelvis has been altered based on its size. “Dude, her head’s bigger than her pelvis,” reads the caption on the original BoingBoing post.

When Ralph Lauren heard the news, he decided to take action. He issued cease-and-desist letters to the two blogs, alleging that they were infringing on copyright laws and ordering the photo to be removed. BoingBoing refused to take down the image and pointed out Ralph Lauren’s copyright blunder.

The image fell under the category of fair use, which permits it to be used for news and commentary. Ralph Lauren apologized for the skewed ad, not for the cease-and-desist letters. Lauren got angry after the photo went viral on the internet. When it was revealed that the model had been sacked because she was “too heavy,” even more people were upset. She weighed 120 pounds at the time.

Beyoncé is number seven.

Beyoncé gave an energetic performance during the 2013 Super Bowl, and Buzzfeed shared 33 photographs of her “Fiercest Moments” from the game. Beyoncé’s spokesperson politely requested that some of the pictures that appeared unpleasant be removed from Buzzfeed.

Rather than complying with the publicist’s modest request, Buzzfeed published a new article titled “The Unflattering Photos Beyoncé’s Publicist Doesn’t Want You To See.” The first post was a flop, but the second one was a hit. “I am confident you will be able to find some better photographs…,” the publicist wrote in an email to Buzzfeed. #5, 6, 10, 11, 12, 19, and 22 are the worst.

Thank you kindly.” Beyoncé was quickly transformed into the Hulk, a weightlifter, and the face of the Ermahgerd meme, thanks to the Internet. Buzzfeed went on to say that they emailed a response asking why the photographs were deemed unflattering but that they never received a response.

The Interview No. 6

North Korea couldn’t stand still when they learned that Sony was releasing a film about Kim Jung Un. The country erupted in rage when a GIF of the scene depicting the dictator’s execution was posted online. Sony’s corporate emails were stolen out of nowhere, sparking a dispute involving President Barack Obama. The hackers attempted to prevent The Interview from being released in theatres by threatening to bomb big cinemas if it was shown. Most cinemas decided not to show The Interview due to concerns about the safety of attendees. Sony pulled the film, but it was later revealed that it would be made available online. Several independent theatres decided to screen it, including one owned by George R. R. Martin.

On Christmas Day, The Interview was released on computers and in independent cinemas.

The New York Times, for example, gave the film a bad review but explained why they went to see it: to support freedom of speech and to find out what all the commotion was about.

Roko’s Basilisk is number five.

We’d warn you that many people who discover Roko’s Basilisk wish they hadn’t, but that will probably make them want to read it even more. Although there is a definite Streisand Effect, Roko’s Basilisk was not aware of it due to a warning.

Roko’s Basilisk is a proposal discussed by a member of LessWrong, a site dedicated to increasing human rationality.

It describes a hypothetical artificial intelligence that would penalize people who did not assist in its creation. This includes persons who were aware of AI in the past but did nothing to aid its development.

When the initial post about Roko’s Basilisk was deleted, and any debate on the topic was forbidden from the original site, the number of people who discussed it grew. Because it has the power to excite a person’s psyche based on data obtained through their interaction with any type of technology, Roko’s Basilisk may punish people from the past.

The notion is extremely abstract, but just thinking about it caused such a stir that the debate had to be halted. Some LessWrong members even found out how to erase all traces of their online presence in order to avoid the Basilisk from imitating them again.

The Pirate Bay is number four.

The British Phonographic Industry asked The Pirate Bay to delete torrent connections to copyrighted music of the company’s members in July 2011. The torrent site declined, forcing the corporation to take legal action.

The UK’s High Court ordered five major Internet service providers to prohibit access to the torrent’s website in April 2012. This turned out to be a disastrous strategy that simply served to boost The Pirate Bay’s popularity.

The embargo was put in place on May 1, 2012, but that day, The Pirate Bay had about 12 million more visitors than it has ever had. The torrent site allowed users easy means to get past the block as soon as it was put in place, allowing them to continue accessing The Pirate Bay’s torrent links.

Jennifer Lawrence is number three.

An extensive photo leak of nude celebrities went viral in August 2014. Jennifer Lawrence’s legal team requested that Google erase the photos’ connections.

The photographs had already been widely publicized, but additional developments were reported in the media.

The hacker changed the domain name of the host site, which trumped the legal action and Google’s attempt to prohibit access. Meanwhile, when Lawrence spoke to Vanity Fair about the photographs in an interview, the public became even more aware.

Google has been under legal pressure to take decisive action, with a lawsuit for $100 million threatening the search engine. After the photographs had traveled far and wide. Google announced that it had taken down tens of thousands of photos and terminated many accounts.

2. Samsung and ghostlyrich

Ghostlyrich, a YouTube user, posted a video of his Samsung Galaxy S4 catching fire for no apparent cause. He filed a formal complaint with Samsung, who generously offered him a new phone in exchange for his removing the video.

Instead of taking the offer, ghostlyrich made a follow-up video, which has over a million views. In it, ghostlyrich voiced his dissatisfaction with Samsung’s handling of major product safety concerns, claiming that the company does not follow standard warranty procedures.

Since then, there have been several reports of Samsung devices catching fire. An 18-year-old Swiss woman sustained third-degree burns on her legs after her Samsung Galaxy S4 allegedly exploded in her pocket. A man from Hong Kong lost his house in a fire that his Samsung Galaxy S4 reportedly started.

1. Never Seconds and Martha Payne

Martha Payne, nine years old, decided to photograph her lunch and post it on her blog, Never Seconds. Students are not allowed to ask for second helpings of food at her school, hence the moniker.

She described and scored her lunches based on taste, nutritional content, and even the amount of mouthfuls in her posts. Martha was also assisting Mary’s Meals, a local organization that raises funds to feed young African students.

Students and instructors from all over the world contributed images of their own school meals to her blog. Many parents noticed how modest her lunch servings were, and the media eventually took notice.

Following the publication of a report in the press, the school council decided to take action. In an entry titled “Goodbye,”.  Martha explains how she was called out of class and told she couldn’t photograph her meal any longer. She also expressed her concern that she would be unable to acquire sufficient funds to construct a Mary’s Meals kitchen in Africa.

The Streisand Effect ensued: the tale went viral on social media. The school reversed its decision and allowed Martha to continue blogging just one day after being informed she couldn’t snap pictures of her lunch. Martha not only became a celebrity, but she also raised more than enough money for the organization.

When it comes to understanding the “Streisand Effect”, nobody does it better than Amicus International Consulting, contact us today for more information on how we can help you.

The post The Streisand effect in 10 perfect examples appeared first on Amicus.



source https://www.amicusint.ca/the-streisand-effect-in-10-perfect-examples/

Saturday, July 9, 2022

How a fugitive escapes

With their rictus faces and ashen complexions and the prospect of long jail sentences, the Bernie Madoffs of the world

Rogue accountants, lawyers, and hedge fund managers go meekly into federal courts. Bystander can’t help but wonder, why don’t you take the ill-gotten gains, flee and become a fugitive?

A little plastic surgery and a little sum of money may buy you a sun-kissed life on an Indian Ocean archipelago as a fugitive. Some of which have no extradition treaties with the US. Even a low-paying job operating an outboard motor for a Somali pirate skiff seems preferable to a life sentence in federal maximum-security prison. Even though more plutocrats are facing criminal probes, few consider fleeing a viable alternative. Perhaps it’s a case of nerves failing. Perhaps, in the age of Facebook and “America’s Most Wanted,” there aren’t enough places on the planet for a renegade to hide.

(A caveat: the crucial word here is “comfortably hide.”)

North Korea, the lesser stands, and the tribal territories of western Pakistan are out of reach of the law, but the lifestyle isn’t quite four-star. Vic O’Boyski, a retired supervisory United States marshal, refers to himself as a “flight philosopher.” He’s seen the world becoming smaller. The FBI places attachés at embassies, forensic accountants track off-shore accounts, and law enforcement gurus create computer mock-ups of aged faces. Professional respect is reserved for individuals who take escape seriously.

“Look, it’s tough,” he continues, “no phone calls, no mail, no Facebook, no money.” “You have a problem if you don’t have an escape strategy.” The life of a fugitive used to be simpler. Robert Vesco, the stock scammer and illegal campaign contributor to President Richard Nixon, arrived in Costa Rica in 1972, donated $2.1 million to a firm formed by the president, and waited until (miracle!) Costa Rica approved a law prohibiting his extradition. Costa Rica is already a popular vacation destination for inexpensive vacationers, but scavengers seeking to avoid extradition are not welcome.

In a city.

When New York Mayor Jimmy Walker was accused of bribe-taking in 1932, he packed up his unusually enormous mayoral income. He relocated to the French Riviera, where he remained as a fugitive until the allegations were dropped. The world has become more constrained. According to a 2007 assessment, the United States has extradition treaties with every country in the Western Hemisphere and much of Europe.

The most successful fugitives are high-end career criminals rather than bankers; James “Whitey” Bulger Jr., the leader of Boston’s Winter Hill Gang, vanished in 1995 and has not been seen since, despite sightings reported from Taormina, Sicily, to Dublin, Ireland (unlikely) (much more likely). Mr. O’Boyski explains, “He puts on a pea cap and picks up his shillelagh, and he’s just one of a thousand old Irish fellas.”

Political assailants are slick.

They usually conduct crimes like bombing bank heists, fading away. Sara Jane Olson, a former Symbionese Liberation Army bank robber was released last week after serving seven years in prison. Hse had lived as a middle-class mother in Minnesota for 26 years. White-collar fugitives are less remarkable; in a boardroom, they’re sharks, but on the run, they’re pedestrians. Joe Judge, a retired FBI agent, couldn’t hide his displeasure when he learned that three fugitives were holed up in the Breakers, a posh hotel, and spa in Palm Beach, Florida. Mr. Judge stated, “They’re powerless.” “They’re just bad assassins.”

Many white-collar criminals believe they are too intelligent to be convicted: if they are allowed to testify, they believe they would persuade jurors.” It’s amazing how many people don’t comprehend their dilemma,” says Daniel C. Richman, a former federal prosecutor, and current Columbia University law professor. “I was never able to figure out why suspects lingered.”Some people do run. Rudolph W. Giuliani was a prosecutor when he indicted commodities trader Marc Rich, who sought sanctuary in Switzerland in 1983. Mr. Rich would have his own miracle in 2001, when President Bill Clinton pardoned him hours before leaving office, probably with the help of his wife’s political donations.

Two other people stand out as exemplars of the fugitive plutocrat.

Jacob (Kobi) Alexander, an Israeli-American business wunderkind, was charged with wire and securities fraud by a federal jury in 2006. Mr. Alexander and his family fled to Namibia, a country with which the US has no extradition treaty. The fugitive essentially attempted to purchase Namibia. He supported scholarships and erected low-income solar-powered structures in Windhoek, and he lived in a magnificent mansion. According to The Wall Street Journal, he felt confident enough to throw his son a four-day bar mitzvah in New York City.

Then there’s Sholam Weiss, whose run is hallucinogenic poetry in motion. He was a plumber from Brooklyn who excelled at financial deception. While on trial in Florida on allegations of defrauding a vast insurance firm in 1999, he fled to Brazil. There he met a lover and was once seen cavorting with ten prostitutes. Five of them were dressed as parochial-school students. Mr. Judge, the F.B.I. agent, became concerned that Mr. Weiss was attempting to impregnate a Brazilian, as extradition is prohibited if a fugitive has a child in the nation. “We were fighting not just extradition but ovulation,” he recalls. Unfortunately, this fugitive story comes with a warning label. Mr. Weiss was apprehended, but only after fleeing Brazil for Austria. In his absence, an enraged federal judge gave down a harsh sentence, as Mr. Weiss’s release date indicates: Nov. 23, 2754.

Starting over with a new identity is extremely difficult, make one small mistake in the process and you will fail. When your life and liberty are on the line, trust Amicus International Consulting to deliver a safe, legal, and secure new identity.

The post How a fugitive escapes appeared first on Amicus.



source https://www.amicusint.ca/how-a-fugitive-escapes/

Thursday, July 7, 2022

How to survive when you’re a fugitive always on the move

Let’s face it; there are many compelling reasons why any of us could want to drop out and vanish entirely. Someone may be trying to kill you or you may be a fugitive on the run.

There are many reasons an individual who becomes a fugitive would consider simply disappearing out of society. With CCTV everywhere governments increasingly becoming surveillance states. It’s more complicated than ever to remain anonymous without someone watching our every move.

But what if you were a fugitive and wanted to hide away, vanish, and live indefinitely in the underground economy? This is a fundamental subject that is more pertinent now than ever in our nation’s history, as the National Security Agency (NSA) currently copies 100% of electronic communications in the United States daily.

The preparation and execution of your entire disappearance and eventual rebirth into anonymity must go through several steps, including declaring your mission, deleting your history, scrambling your trail with deception, and eventually resurfacing somewhere in the underground economy.

Identifying Your Goal

So, after much deliberation, things have gotten to the point of being confident desperate, and sure that disappearing from the face of the world is your only alternative. You’re possibly being pursued by an abusive ex-husband, gang members, or a fugitive on the run. When you get a strong feeling that you are in danger. You must comprehend who and what you are fleeing from and why; above all else, you must avoid exposing yourself.

Are confident that your running will not endanger your loved ones or cause harm to others. Understanding that whoever is pursuing you may not give up for a long time, resulting in some “lost time” in your life.

You’re willing to pay the price and risk your life as a fugitive. You’re persuaded that this is your only chance to start over. Your destiny requires you to vanish and go on the run as a fugitive.

Taking Away Your Past

Those pesky snoops. Bill collectors, repossession agents, private investigators, and others use various methods to locate persons. Talking to ex-lovers/partners, ex-employers, and going to the gym, library, and other places you frequent. Your “history” is made up of a human-to-human trail of knowledge.

It would help if you cut relationships with people and activities that can be traced back to you. There’s the paper trail. They know what kind of movies you watch, what kind/size of clothing you wear, the food you consume, the clubs you frequent, the music you listen to, the medical prescriptions you buy, and so on, all thanks to your credit cards.

Phone, cable, and other bills contain your personal information, such as phone numbers, residences, and birthdates.

Paper trail.

Physically removing any invoices, phone numbers, PC hard drives, writings, photographs, yearbooks, and similar items from your apartment or home is an essential aspect of eliminating a paper trail. It’s especially vital to destroy pictures of yourself because the most recent ones found in the houses of recently disappeared people are often the ones that have been published in the media. Put all of your old clothes in the Goodwill donation box nearest you. Social media is a phenomenon.

Facebook, Myspace, Twitter, and other social media sites already have much information about our personal lives. Getting rid of your digital internet trail is much more challenging than your paper trail. People have claimed that Facebook keeps your data on its servers permanently, even after committing “Facebook suicide.”It’s no surprise that conspiracy theories abound about social media being a gold mine for authorities.

Finding you in person is much more complex and time-consuming than prying on your digital trail. If you know you will disappear, you can utilize social media to spread fake information ahead of time.

Scrambling Your Trail: Creating Disinformation

Pants on fire, liar, liar. False information is created. Eliminating as much of your physical past as possible is the next logical step. This is the point at which you appear to authorities to have vanished in a variety of directions at the same time. You want them to waste their resources by searching in circles for false information. Make a fictitious trail. The best bet is to make it appear as if you went to the destination you had most talked about while traveling to the spot you had never told anyone about.

Tell everyone you’re relocating, traveling overseas to teach English as a second language, joining the Peace Corps, or volunteering to plant trees with a non-profit. If you don’t already have one, make one and fill it with all kinds of false information, then set the privacy settings to zero so that you are completely visible. (If you already have one with legitimate details, do the opposite.

Alter your appearance.

Purchase a new wardrobe in style you would not ordinarily wear: if you are a blue-collar worker, invest in business attire; if you are a jeans wearer, invest in formal pants. Breaking all of your bad habits, such as smoking, is advisable. If you smoke, try to quit or switch brands. Changing your hair color and facial hair is a no-brainer, as is switching your glasses for contacts or wearing sunglasses if you don’t need glasses. Another effective strategy is changing your gait or body shape by losing weight.

Learn a new accent, and be mindful of your small habits that could alert your pursuers, who will most likely assume you’re desperate. Perhaps acquire a new language and blend in with an ethnic community under a phony name.

Make a fictitious banking trail. 

Take your ATM cards and ship them to very trusted people in places around the country to make withdrawals on your behalf, just to run them around in circles. Make it appear as if you’re producing activity in the Pacific Northwest – Seattle, Portland. All the while you’re relaxing in the Florida Keys, and they’ll think you’re on the other side of the continent.

Use the blabbermouths in your life to your advantage. Please list the most potent gossip and vindictive ex-girlfriends you know, and fill it with false information. The Underground Economy Is Resurfacing which is very beneficial to a fugitive on the run.

Reborn.

After the trail has gone cold and you’re ready to take on a new identity, including a new name, new appearance, new habits, and a new way of life, the hiding in plain sight process begins at a point where you’ll be a new person – “reborn.” The most challenging component of this is obtaining the necessary documents, which is beyond the scope of this post. But maybe done in phases as you feel more secure and have a clearer head.

The whole point of disappearing and dropping out of sight is to keep you safe from evident and imminent danger while also giving you some breathing room to gather some options and perspective, not to mention buy some time.

There are numerous ways to obtain or create a job that pays under the table to make enough money to survive. Your current base of operations is the underground economy. Avoid using cash and check locations because many of them are authority honeypots.

It is common knowledge that Western Union exchanges information with the DEA, DHS, and other government agencies.

Accommodation.

It would help if you stayed away from anything that requires you to rent or lease something under your name. Renting an inexpensive loft or basement apartment from a mom-and-pop homeowner is safe. Renting from a property management company will require you to sign a lease and do credit checks. Furthermore, living out of a suitcase makes it simple to travel around and depart at a moment’s notice if necessary.

Transportation.

The alternatives to a car such as bicycling, public transportation, or taxis. It will be tough for anyone to track you down if you ride a bike, rent a small apartment, and work entirely in cash with no bills in your name.

Communication.

Cell phones that are pre-paid and anonymous, perfect for the fugitive on the run. There is no more to say. Alternatively, you can purchase pre-paid phone cards. In most countries, you can buy prepaid phones that don’t need to register your name or address.  You should buy a prepaid sim card, and use only cash to top it up. Never give out the information to anyone!

Mail.

Setting up “mail drops” or mail forwarding services is also beneficial, as long as these and other services are paid for in cash.

Use a service like Earth Class Mail’s “mail drop” or “mail forwarding service. “They provide many street locations to which mail and packages can be forwarded.  Bill collectors will be notified of your Earth Class Mail address, which will confuse them.

When it comes to protecting your new identity, nobody does it better than Amicus International Consulting, contact us today for more information on how we can help you.

The post How to survive when you’re a fugitive always on the move appeared first on Amicus.



source https://www.amicusint.ca/how-to-survive-when-youre-a-fugitive-always-on-the-move/

Monday, July 4, 2022

Faking your death can have serious consequences

Faking your death can have serious and unintended consequences in the long run.

It’s possible that lying about your death will make you wish you were dead. It’s also possible that faking your death will come back to haunt you

Have you ever imagined that if you could start over with a new name and life, you’d be able to control everything? You would assume that faking your death is the ultimate way to start over in today’s world, where it appears very easy to build a whole new persona, and you can quickly go where no one knows you. After all, no one will be looking for you if everyone thinks you’re dead, right?

Is it Illegal to Pretend to Die?

It may surprise you to learn that there are no state or federal laws that make it illegal to stage your death. Perhaps it will be less complicated than you anticipated! Not so quickly…

The Consequences of Reporting or Claiming Your Death Falsely

Even if you don’t break any laws by inventing your death, you’ll find it impossible to live a lawful day-to-day existence afterward, assuming you engage with society.

Unless you live entirely off the grid, with no access to electricity, running water, a phone, or other contemporary conveniences, it will be exceedingly difficult to avoid widespread fraud:

If you try to create a credit under your new name, you’ll be committing fraud by providing false information, so don’t buy a house or car unless you have cash on hand.

When applying for a job, you’ll almost certainly have to lie about your work history and other things.

That, too, is deception. Are you looking to rent an apartment or a house? You’ll have to use the identification of someone who doesn’t exist if you have to fill out a lease application–more fraud. You’ll need utilities if you live in an apartment or a house.

Providing false information is required in almost every application for power, gas, water, and other services. Instead of burying your money in the backyard or stuffing it in your mattress, why not put it in a bank? The bank will require a social security number, which you will not be able to use.

But hold on there’s more!

Before you “died,” did you have a life insurance policy? You’ll be breaking the law if you take any of the money. If your loved ones receive the money and it is proven that they were aware that you faked your death, they may also be charged.

Did you owe state or federal taxes back when you “died”? Tax fraud is when you pretend to die to avoid paying your taxes. Were you obligated to pay child support or alimony before your untimely “death?” It’s fraud to stage your death to evade those payments.

What Are the Consequences If faking your death Is Found Out?

Fraud can take two forms: civil and criminal (or both). Depending on the seriousness of your case, you may face felony penalties if you are charged with fraud. Fines, prison terms, and restitution may be imposed as a result. A civil fraud complaint can result in a verdict that holds you responsible for significant damages to another person or company.

Do you wish to begin a new life by faking your death?

Find someone somewhere with a lot of money but where you are scarcely or not known. Take the money since you’ll need it to vanish. Alternatively, you may borrow money (a lot of money) from a loan shark. Make a few payments and leave town with the rest after notifying the police that this man is threatening you.

The authorities will focus their inquiry on the loan shark, and your disappearance could be treated as a deliberate act for weeks, months, or even years.

Please choose a destination and learn everything there is to know about it. Use the library to do so, or buy books in cash from a used bookstore and never show them to anyone.

Choose a day (typically a workday) and then make your move. Leave your automobile in a nearby city or exurb, “drop” a wallet containing all of your identification in a third, and abandon your cell phone (functioning, of course) in a fourth.

By dividing law enforcement’s attention, you’ll make it challenging for any single agency to put all of the pieces together.

If you’re feeling very daring, take a bus (which you won’t find at the central station), hitch a ride, or take the train. Carry a large flashlight instead of a knife or pistol if you need a weapon. Knives and firearms will only get you in trouble.

Travel to your first destination 

If you’ve left a trail, make sure it finishes there. While you’re there, don’t work unless necessary (thus the money); instead, begin investigating your eventual location. Make sure it’s either a city you’ve never visited or one you’ve never lived in.
Alternatively, if you’ve been there before, make sure it was more than 15-20 years ago or when you were a child. You can, of course, bring relatives with you.

Leave your home looking ransacked, but not in the way that it would appear in a movie or TV show. – Extra points if you get a little blood on your hands. You’ll get bonus points if you can escape without being seen by any of your neighbors.

(ILLEGAL)

Either do it yourself or have someone you trust phone the local police station and inform them that you have been murdered. Make sure they present enough information that it can’t be readily dismissed.

To achieve this, call from outside the state or nation using a burner phone (a disposable cell phone). Bonus points for digging a hole in a secluded location and then filling it half-heartedly while leaving bloody garments in and around it. If you’re a method actor, cut off a finger and let it be discovered, you’ll get bonus points.

After three to six months in your initial city, go abruptly to your final destination – once again, in a manner that leaves no trace of your travels. If you can get an ID from a homeless person who resembles you, do so. That is what you should use till you get to your final destination.

More Illegal…

When you reach your final destination, look for another homeless person who looks like you and purchase their identification. Obtain breeder documents (library card, Social Security card, birth certificate, etc.) to “backstop” your assumed identity.

Find a low-paying job that you can do while staying out of trouble. Make sure you stay away from the cops and any potential difficulties. The hole and the phone call will aid in persuading the cops that something strange has happened to you.

They look into it for a while, but if there are no leads and the trail appears to have ended, they consider it a cold case and file it away until (or if) new information becomes available.

They might look at the loan shark, who might also be looking for you.

You cannot obtain insurance, receive your last paycheck, sell all of your belongings (or even take much with you), and never come home. Keep an eye out because the world is small, and you will bump into someone you knew.

Summary

Though faking your death to avoid legal or financial obligations is not a direct violation of state or federal law. Making it nearly hard to live a fulfilling life without engaging in fraud daily.

Because you’ll be obliged to give false information when applying for employment, apartments, and credit, you’ll be vulnerable to fraud accusations at every turn.

Furthermore, the fraud claims may be criminal or civil, resulting in incarceration, penalties, restitution, or monetary damages.

Instead of trying to fake your own death, let Amicus International Consulting offer you some alternatives, contact us today and let us help.

The post Faking your death can have serious consequences appeared first on Amicus.



source https://www.amicusint.ca/faking-your-death-can-have-serious-consequences/

How To Fake Your Death In 2023

Faking your own death can be a highly complex process, but it is achievable with the right resources and know-how.  The first step to fakin...