Abusive stalkers often go to great lengths to track and trace their victims and follow their money through the use of private investigators’ data bank searches. Stopping a stalker can be a difficult task to be sure. A stalking victim will be well served to understand the bank secrecy methods used by the most skilled privacy advocates-today, without the use of nominees or other risky, nonsensical, privacy ideas that some claim to be the answer to money privacy and financial privacy. My advice about nominees for banking is clear; do not use them.
Bank secrecy can be accomplished through the use of check cashing stores’ debit cards sold at these retail establishments that cash business and personal checks. Open an account without providing a trail to your door and without providing your most personal of all identifiers-your Social Security number, and you will be on your way to having bank secrecy and his investigators won’t be able to find that account in the data bases they search as they try to catch you and locate your source of funds.
Combine the above bank account with an anonymous safe deposit box, a check cashing store for clearing your work or personal checks, and you will be on your way to breaking the money trail to you.
As you are certain to be under “investigation” by him or his goons for a long, long while, you will want to implement the principles outlined in the big red, white, and blue book to your right. You can learn to travel, bank, work, and live anonymously-in the U.S.A. or anywhere in the world.
Keep visiting this blog and the website and download a copy of the soon to be for sale, Bank Secrecy Book, Bank Secrecy: Financial Privacy Crisis Plan and Resource Guide soon.
Many data bases contain new hires information and government agencies and private sources can track and trace employees, including stalking victims whose goal is workplace privacy. This post will provide information on how to stop stalking through a successful workplace privacy plan.
The new job
Distance will not matter If you are being followed by an abusive stalker who has the means and persistence to track you. In today’s world, people can be followed through information technology with key pieces of information, mainly the name, date of birth and Social Security number.
Social Security number and other identity information for employment monitoring
Successful privacy advocates who are in the know recognize they have a right to privacy. With that right in mind, it is up to you to make the adaptations necessary at work to learn how to be invisible as you make a living. This is crucial for the stalking victim whose abusive stalker may go to the end of the earth to find her. This means paying private investigators, bribing those with access to employment new hires data banks and whatever else he must do to locate you at your new place of employment.
I know many tout the benefits of self employment as a path to independence and workplace privacy. The truth is that only about one in five businesses ever make a profit. And bouncing around selling trinkets for cash-another “solution” offered by authors for workplace privacy, may indeed enable you to work beneath the radar, but probably won’t keep you out of the bread lines.
You can learn how to be invisible as you work
A number of people have been able to structure their employment to accommodate their workplace privacy requirements. Once you learn employment privacy living principles and bring something valuable to the work negotiation, you will be on your way to learning you to escape your stalker.