Prevent Business Identity Theft with Financial Privacy, Website Privacy

Do you do business online? If so, how can you obtain financial privacy to prevent business identity theft or theft of your business by another criminal? Business identity protection is necessary to avoid identity theft of your company as such a thefft will almost always exceed a five figure dollar amount.

Perhaps you sell products or a service through a website and want to comply with all regulations and laws while still maintaining your business privacy. Is it possible to obtain an Employer Identification number privately? How does one register a URL privately in order to enhance business privacy?

This article will cover key points necessary for the privacy conscious manager to know  in order to do business privately on the internet.

Private Website Registration

We prefer using the Trust Manager Principle as defined in Grant Hall’s books. Essentially, the Trust formed to “manage” the company becomes the manager or contact entity while the Limited Liability Company or other entity owns the website and URL.

In order to maintain privacy of the business on a long term basis, we recommend dealing with companies that accept money orders as payment for services associated with URL registration and other associated costs. There are only a few hosting companies which will do business this way. Most will want a credit card on file to charge or a bank debit card to debit. Both of these payment options are bad ideas from a business privacy standpoint. If you are serious about your business privacy and desire to avoid business identity theft or prevent a business theft or seizure of any kind, it will behoove you as the business manager to do your due diligence and take the extra time and spend the extra money to ensure business privacy.

Obtaining a Tax Identification Number Privately

During 2011, regulations passed required all online vendors to suppy a tax identifier in order to sell products. As this law impacted privacy advocates, the business manager desiring privacy wants to be able to comply with the law and still keep their business privacy.

First, the manager may choose to form a trust, an entity that has no registration requirements. The trust will manage the business. Many prefer using a Nevada LLC.

The company selling the products is required to obtain a tax identifer, an Employer Identification number to be furnished to the online retailer that processes payments for products sold. Certain vendors may also require an EIN when you do bussiness with them.

How can the company obtain an EIN and still keep managment anonymous? An EIN for managment-the trust formed to “manage” the company can be obtained. This foundation tax identifier for an entity, the trust manager, a non-person provides the gateway to obtain the EIN for the business entity receiving payment for the products.

Please review the Administrative Trustee as described in Privacy Crisis.

Banking Privacy

Once the EIN is obtained for the company receiving payment for the products or services sold, a bank account number will be required to receive these online payments.

Certain online companies may allow you to receive paper checks as payment though the charges are steep for doing business this way, not to mention the extra travel and expense assoicated with using a check cashing store to clear your checks. However, this is still an option for those of you who do not want an online bank account or for whatever reason cannot get one.

Thus far, you as the manager have managed to obtain an EIN privately for your business. The online vendor has recorded this number and the data base will confirm that your company name matches the name and number on file with the tax collection agency. Once this confirmation is received, you’re set to begin doing business online with a high degree of business privacy, a layer so thick that not even the most sophisticated business identity thief can pierce if he happens to target your company. Remember, only the trust manager is on record with the agency that issued the EIN.

Now, your task is to complete your business identity theft prevention plan by obtaining the highest level of bank secrecy available today.

For banking secrecy, we prefer the Ultimate Bank Secrecy Account as described in Privacy Crisis Banking. An online bank account may be set up using substitute identifiers under certain conditions. Resources are cited in the book. Managers want to make certain their true name is furnished to the institution  that sets up the account as this will allow him/her to claim the money in the event a dispute ever arises. Do not defraud banks or other financial instituions-EVER. It is never necessary to break the law for the sake of banking or business privacy.

Thanks for reading.

Grant Hall, Author

James Clark King, LLC, Publisher




Stop Identity Theft; Articles and Consumer Privacy Resources

How can you and your family accomplish identity protection, prevent identity theft and avoid becoming an identity theft fraud crime statistic? Based on my experience, it is imperative to live privately in order to avoid identity theft. This requires information, study, and planning. Can an idenity theft prevention plan be successfully implemented to stop the efforts of an identity theft plan by a fraud criminal or a gang of such fraudsters? Yes.

Do you need to provide privacy invasive personal and business information to an identity theft insurance company and pay premiums to such an outfit in order to prevent identity theft? No. Here is an article that I wrote on this subject that may be of interest to you:

How can you live while protecting privacy? Can you depend on an insurance company to help you protect identity? In my experienced opinion, you cannot depend on an identity theft insurance company to help you avoid identity theft. This article may be of interest:

We strive to provide identity theft articles and information to the public for the purpose of preventing all types of identity theft: medical identity theft, business identity theft, personal identity theft, and bank identity theft. Our Free, seven part, identity theft prevention course is offered by e-mail. Sign up at:

As medical identity theft is the new identity theft fraud crime of choice for many identity thieves, this article may be of value, and keep you from becoming an identity theft victim:

My first book is offered as an e-book and is available for immediate download. You can be reading Privacy Crisis: Identity Theft Prevention Plan and Guide to Anonymous Living within five minutes from Now. Buy the book at:

Consumer privacy has many facets and there are substantial overlapping effects. One aspect of privacy that is of paramount importance to protecting privacy and preventing identity theft is financial privacy. Keep money and assets invisible and you will not be a worthwhile target for an identity thief. My new book, Privacy Crisis Banking will provide banking privacy principles and resources. Buy the book at:

Thanks for reading.

Subscribe to my blog at:

Grant Hall


Prevent Identity Theft with a Financial Privacy Plan

How can identity protection be accomplished in order to prevent identity theft? How can one stop identity theft? Is it possible to avoid identity theft as this crime continues to pace all fraud crimes? Yes. This article will provide guideance for consumer privacy with an emphasis on financial privacy for the purpose of protecing privacy-specifically with identity theft prevention as the privacy living objective.

Consumer privacy is essential to prevent identity theft and a high-level financial privacy plan is key to protect identity and empower one and his/her family to escape id theft.

Once one’s financial privacy has been established, id theft risk will be reduced substantially. Imagine the confusion an identity theft criminal will experience when he finds no money or assets under his target’s name. In order to make an identity theft fraud crime next to impossible to commit, one needs to have the aforementioned financial privay plan in place before the identity thief attempts to strike and make you and yours an identity theft victim.

In order to avoid identity theft, bank secrecy and personal privacy principles are necessary, and some of the key concepts include:

Credit Card Privacy: Freeze credit bureau files and avoid using credit cards for routine purchases. Use credit lines and cards for major purchases. Request account number changes from the issuing financial institution when you believe it to be necessary for personal privacy protection.

Banking Privacy: Once can obtain banking secrecy when the Ultimate Bank Secrecy Account is used as per the information and resources in my new book Privacy Crisis Banking. Banking privacy can be increased  when checks are cashed without using a Social Security number.

Home Privacy: You can learn to create an Invisible Home Mortgage to make the source of funds used to purchase a home unknown. Fraudsters will be unable to find your home address when they tap into government databanks that contain home owners’ names and home addresses. Likewise, the viewing of credit reports will be of no help as the funds used to buy the house will not lead to the home purchased with the “invisible mortgage.”

Comprehensive personal and business privacy is fully explained in my e-book, Privacy Crisis: Identity Theft Prevention Plan and Guide to Anonymous Living.

My new book, Privacy Crisis Banking: Bank Secrecy Plan & Resource Guide to Protect Identity, Money, and Property provides information and resources for financial privacy and banking secrecy plans. This book is available as a hardcover or as an e-book.

Buy the books at:

Grant Hall, Author

James Clark King, LLC, Publisher



medical identity theft during the privacy crisis

Medical identity theft is the hottest new form of identity theft. This article provides measures on how to avoid the crime of identity theft, and medical identity theft in particular.

Often, the culprit and medical identity theft criminal comes from the most trusted and least suspected sources. Medical identity theft inside jobs occur all too often.

 Medical Identity Theft Inside Jobs

Making an appointment to see a new physician or other medical practitioner can take time and effort, and if you’re ill when you need to see the doctor, you may have a tendency to let your guard down, just a bit, and this could become a costly and hazardous mistake.

Criminals come in all shapes and sizes and usually have an inside track or know someone who does. Crime is an industry and people receive on the job training as they hone their skills and gain a reputation within the industry. For an idea of how crime really works, see the film, Heat written and directed by Michael Mann.

Key to Avoiding medical identity theft is NOT providing your Social Security number

Identity thieves are sophisticated criminals who rely on data banks to supply them with information on their targets. When the patient/identity theft victim’s SSN is known to the thief, he or she can tap into any number of resources that can result in a very expensive identity theft. i These confidential resources are sometimes used by an identity thief when the Social Security number is known : banks, credit card accounts, home and property records, vehicle registration records, business credit lines, credit bureau files, and more.

Clearly, providing your complete personal and business identity information endangers you and your loved ones. Imagine having your group medical insurance policy benefits being stolen by a band of thieves who obtain fraudulent medical treatment while pretending to be you and your family. What would happen if a family member later needed emergency treatment and you were in the middle of trying to resolve the id fraud case as your medical insurance policy was “frozen” pending the outcome of the matter?

For identity theft prevention including the prevention of medical identity theft, keep your most personal and confidential information, mainly your SSN, out of the data bases that criminals-including insiders use to commit the crime of medical identity theft.

Grant Hall

Protection against identity theft; creating a new identity

Identity protection is a careful process whereas one discretely identifies themselves and only shows primary identification when required by law to do so or when they choose to do so. In order to protect identity, it is necessary to create a new identity so that the butcher, the baker, and the candle stick maker does not enter your personal and confidential information into their privacy-invasive data bases, and place your identity at risk of being stolen by identity thieves.

Protection against identity theft is a personal lifestyle process and a business protective measure as well, and contrary to popular belief, identity theft insurance is not the best solution to protect identity. Would you entrust your name, home address, business address, personal and business telephone numbers, e-mail addresses, Social Security number, tax identification number(s), and other personal and confidential information to a large corporation who may have high employee turnover, and give their part-time, and other employees access to all of this information? That’s what you’re asked to do when you sign up for identity theft insurance. From my point of view, identity theft insurance seems like the greatest hoax of all insurance policies.

Back to creating a new identity for privacy purposes. You should not be providing your name and home address to the guy or gal who services your car or provides other routine services. Not even your doctor’s office should have your Social Security number. Many identity theft (medical identity theft) jobs occur by insiders. Tread carefully. It is best to keep your identity information secret whenerver possible.

Read more about privacy living here.

Grant Hall

Divorced Fathers; a white collar crime mystery-thriller short story by Grant Hall

Divorced Fathers is a short story fiction tale by Grant Hall.

Names, places and events are entirely fictional, and the story is intended for entertainment purposes only.


They were divorced, tired and broke. They didn’t care anymore.

Divorced dads, battered and burned, they longed to beat the system; the unfair child support collection agency-filled with agency henchwomen, whose job satisfaction came from cornering divorced dads and raping their finances; emasculating them, and turning them into neutered, whining, stray dogs. Revenge is a strong force.

Cott had not paid the child collection agency in four years. He had learned how to create a new identity, had banking privacy, traveled anonymously, and had work privacy in place-all learned from the big, red, white, and blue book.

His ex-wife had tried to haul him into court, but his identity protection plan, complete with fake i.d., a home rented in a new identity, and his work privacy plan, with a privately registered Limited Liability Company had been the best identity protection plan possible, and this privacy crisis plan had worked-at least for the last four years. He was now fifty-two.

His work was accomplished without public appearances for the most part, and most of his business appointments were phone conferences or handled with e-mail communication. On occasion, his job as a self-employed website developer/Search Engine Optimization expert required a face to face meeting, but these meetings occurred infrequently.

Cott’s buddy, Bartel had come on hard times and opted for privacy living, too. He owed child support and alimony, and had been in arrears for three years. Together, they had talked and talked about how to create a new identity. And learning how to get a new identity had not been easy, not until they came upon the big red, white, and blue, personal privacy book, that is.  They learned how creating a new identity had successfully been accomplished by others who faced their plight; financial imprisonment and “pauper hell,” until their ex’s unleashed the alimony collars and untied the kid ransom knots, and released them from the debtor prison cells in which they would always be confined-at least for the best and most productive years of their lives. Both had loudly proclaimed their freedom, and vowed to each other that they would beat the system-forever, and live as fugitives rather than be enslaved by the whores who donned the black robes, and the guards of whores who sought them now and who would hunt them forever. And they drank whisky and smoked to ease their pain.


Bartel was unemployed and near-broke after twenty-five years as a high-level paper pusher for several fortune 500 companies. At six feet-two, he was the taller of the two, and he liked expensive cigars, rare steak, beautiful women, and rye whisky-all before noon when he could get them. An ex-footballer, he appeared gifted on several fronts; intelligence, a muscular physique, handsome features, and a  photographic memory.

His penchant for perfection was well known among colleagues, and he had graduated number six in his law school class-at Michigan. And though he never practiced law, he was often consulted during management meetings while rising up the corporate ladder, and his advice was well respected-both as a strategic manager and as an in-house lawyer-unofficially. He never stayed longer than three years at a position and claimed “boredom” as the reason for his departure on his resume. And he gambled.

Cott had taken Bartel into his home following a friendship built during divorced fathers’ support group meetings both had attended over a period of a year. And while both fit in with the group, it was a meeting each “outgrew,” while electing to chat over coffee and drinks themselves on meeting nights rather than attend the scheduled gatherings at the Methodist church.

On this day, Cott had little to do; the recession-turned depression was curbing managers’ taste for expensive SEO and many were trying to rank high in the search engines rankings by sprucing up their sites themselves or by hiring website designer flunkies who promised first page rankings at a cheap price in record time, and they never delivered. Garden variety website building work had slowed to a crawl, too. He had time on his hands, only three or four thousand saved, but he had a generous nature. He didn’t mind helping Bartel with room and board. He liked him.

“I wonder what percentage of guys are in arrears with the recession in full swing?” Bartel had asked the question to himself while thinking out loud as much as to Cott.

“Revenues have slowed. No doubt about that,” Cott answered.

“And to think that my ole lady is shacking up with a guy from my own outfit. Sonofabitch. Course there’s nothing I can do about her. My walking out completely burned her ass though. The boy and girl won’t go hungry or anything. Her folks own Crawford and Jiles.” Bartel’s words were clear and without emotion as the two men’s eyes met. He felt no guilt. Cott listened and thought.

Cott checked his e-mail and was unexpectedly surprised. The inquiry had been answered. His proposal, a bid to reconstruct and optimize the website of the state agency was being considered. He had bid competitively, but not too low. The LLC and his pseudo name were well known in certain state government circles as his work had been recommended by the trouble shooter-type manager for the governor-the right hand man to the ex-muscle man himself. He smiled to himself. The proposal being considered was for the reconstruction of the website for the state child support collection agency.

Cott’s banking privacy was taken care of through the diligence of careful planning. He had been a stock broker for twenty years prior to his career change after the dot com bubble had burst, and he, like many others in the business had been forced out the door. He knew his way around the banking and brokerage industry, and his abilities had enabled him to transfer his skills for the purposes of his own financial privacy. And the big red, white, and blue book had taught him how to bank anonymously, and how to be invisible.  A real jewel, he thought.

He had learned how to disappear and never be found by reading. Both he and Bartel had discussed their options and conversed about their lifestyles of living under the radar. Finally, they had adjusted to living the fugitive lifestyle.

Monday brought more pleasant surprises as Cott met with the director in charge of hiring the website developer for the state job. For this personal appearance, he wore a wig, glasses not normally worn, and pulled his native Boston accent out of hibernation to disguise himself further.

The director of agency public operations for the state, Henry Boterzo was also from Boston. A second generation Italian, Berterzo had atttended Yankten College following his transferring from a community college in Oklahoma-the only school that he found that would admit him with his D-ridden high school transcript. But after seven years total of bouncing around the country, he had obtained a bachelor of arts degree in Sociology and went West to seek his fortune, landing with the department of corrections as an entry level manager first and then to a series of mid-level management type positions prior to his current appointment. His promotion was a fluke of sorts, brought about by his publicity campaign and popularity. He was cultured and considered himself an aristocrat of sorts. He knew the right people. Always.

 Round faced, balding, towering, and with a gift for conversation, everybody seemed to like Henry, and his career climbing abilities astonished his more qualified colleagues, but they too liked him. He confessed to being “lazy,” and cared more for pasta dishes, imported ice creams, and fine wines served in the best Italian restaurants and gab than his work, and he often left in the early afternoon to secure a seat at a favorite watering hole while beating the five o’clock rush hour traffic.

“Miss Ramone over at Child Support Collection got your name from Davis, the supervisor at Employment Development. He liked your work. So did Dal Kass over at Motor Vehicles. Are state government contracts your preference, Mr. Baily?”

“I have leaned toward state contracts as each assignment has led to the next due to referrals. And I like providing a service that benefits the people of the state in one way or another. I’m certain we caan make the agency site fully functional in view of your new requirments, ” Cott answered.

Henry glanced at his watch and thought about the files on his desk. And about his growling stomach.

“I’m prepared to hire you today. Contracts are the same in all departments. What say? Shall we wrap this up?”

They both signed the contract and Cott was given the authorization password to the central office computer network, and he promised to begin the reconstruction job of the agency website the following week.

Henry Berterzo slipped out the back door and drove his Lexus toward Zizcotto’s and day dreamed of their veal and lamb meatballs.

Thoughts of Plans

They laughed until tears came to their eyes over Cott’s new contract with the Child Support Collection agency-the very department that had them both listed on their “most delinquent” list-the list fathers feared most, the one with warrants and rewards beneath their names on posters in government offices, and the very same website Cott would be reconstructing within a few days.

When the beer ran out, they went to whisky shots. After a while, both began to speak of grandiose-like ideas, the kind that are not  fantasy entirley, but the talk that comes from real desires, and surfaces from thoughts to words only when liquor lossens inhibitions and begs a supportive ear-if for no other reason that to escape the temporary boredom of ordinary existence. Dreaming can be fun with a willing conversation partner.

“Say Cott, if I was in your shoes, I’d repair that state website alright. Ever think of monkeying with the data? How about diverting some of those monthly child support garnishments into your company account? Or better yet, mine. I think I have about three hundred bucks to my name. How’s that for an editor of the Michigan Law Review?”

He had thought about it. As a matter of fact, compulsively over the last number of hours.

“It’s temporary. You’ll come back. Any responses to the feelers.” Cott knew the answer to his own question as soon as he had blurted out the words.


Both men were silent for a time. Bartel took a drag on the half smoked cigarette, inhaled deeply, slouched in the easy chair, then sat straight up. Their eyes met. Both were serious now.

“My undergrad work was computer science. PC’s were nothing compared to today. I’ve kept up though. Plus I go to the hacker forums all the time. With that central computer and network passcodes, the whole system could be changed to pay whatever bank accounts you choose-with a few days of hacking work, that is.” Bartel appeared to mean every word though he was clearly feeling the booze.

“What does your law degree tell you about the crime when you get caught, Cott replied?”

“Penalties would be stiff. We’d both die in prison.”

“We? The hell you say. Not me. I’d never go to their cages and become “Bubba’s” punk.”

After each had another drink, Cott strolled toward the stairway. He was tired. Lying in bed minutes later, he day dreamed when he could not get interested in the paper back novel at his bed side. He stayed up thinking about their conversation until the wee morning hours.

In the bedroom next door, Bartel slept like a baby.

The “Job” Description

Though he was unemployed, broke, and homeless, Bartel was the leader of the two. Over a period of a few days, he convinced Cott to think seriously about using his front contract job to pave the way for a real score, the state “job.”

As Cott’s conscience bothered him initially, Bartel appeared to have no reservations about stealing from the state. Perhaps he sought revenge. He had no criminal record-except his current child suppport arrearage, and the crime itself may have appealed to him because of the source of the funds to be robbed. Or maybe, criminal tendencies within him had remained latent, awaiting the proper spark to fuel his fire, whether for revenge or to feed an ego-self absorbed, starved, and awaiting the stimulation the heist could provide. The state “job” offered Bartel the opportunity to prove himself again-to himself.

He read compulsively, bought e-books on all aspects of code, programming, and hacking- everything he imagined would be necessary to know, in order to tap into the giant bank account he intended to highjack-with or without the man who provided him with a roof over his head. His compulsion continued as Cott readied himself to begin the state website project any day now-as soon as the loose ends were tied on two jobs near completion.

They spoke of the mass potential the theft offered each evening after dinner as they drank beer, whisky or brandy. And sometimes all three. Cott was coming around-at least when he had the liquor to help influence his thoughts and judgment.


They were a compatible team. Cott had the inside track with a bonifide contract that could pave the way for the biggest bank heist in the history of the country-maybe the world. Bartel had the background in both education and business savvy to provide resources to keep the cash safe once the robbery was completed; Nevada Limited Partnerships owned by offshore trusts and privately registered without a trace to either of them. He had connections for administrative trustees, and nominees. He could form a company-anonymously that would serve as the general partner, and this entity would take the hit, not them when stolen money was traced to the partnership. The problem would be retrieving the funds, because the general partner, Limited Liability Company would have no assets, and would be a mere shell designed to deceive and deliver the privacy necessary to pull off such a caper. He planned everything and recruited front men as needed to sign on the dotted line on his business entities’ forms, and these businesses would soon hold bank accounts that would receive the wire transfers of the diverted funds, decoy accounts that would be used as temporary homes for the child support collection’s bank account that wiould be filled to the brim on the first of the month as divorced dads-willing and unwilling, would be forced to supply their funds to the state bank account, through garnishments and voluntary checks. But this time, a sneak attack would take these monies and divert the funds, not to mom’s everywhere, but into the accounts of two ruthless men who sought wealth and revenge against big bureaucrat, their enemy now and forever.

They thought and decided.

Though Cott had been a hold out and wanted more time to decide, the event that sealed the deal was a letter forwarded to him by his offshore mail nominee. The letter was a court order and within the document, a private investigative firm’s employee had sworn to have served “one Cott Baily” in person making the court order adjudicating more than three hundred dollars more each month his new obligation.

He swore for days, made threatening promises to kill the sonofabitch who had purgered himself in an attempt to bury him deeper in his hole of arrearage-debt he promised himself, and his friend that he would never pay-even if he had to dig himself a hole in the desert and live like a ground hog, by God, those devils would never see a nickel of his money. And he drank every night and became increasingly more angry.

“The thing that gets me is the way these arrogant private investigators prance around trying to push us around. That’s twice in two years they’ve claimed to have handed me a summons. Service has to be done in person. I could prove them wrong. With receipts documenting my location when they claimed to have served me. Bastards!”

Bartel empathized with his friend. Was this the ace in the hole needed to provide Cott with the motivation, the desire that had been lacking until this point? He believed so.

“Of course your testimony and documents, receipts, whatever , could be used to prove the whore for the fag in the black robe wrong,” Bartel said. Then he leaned back, crossed his feet at the ankles and studied Cott.

He’d never seen Cott so disturbed. He drank nightly, often becoming drunk-unusual behavior for his friend who was usually cool, matter of fact, business like, and emotionally stable. His normal “even keel” temperament now resembled the attitude and expressions of what had become familar to him. Cott’s behavior reminded him of his own.

To be continued.

Most important travel tip for preventing identity theft

What is the single most important travel tip for preventing identity theft? Using a car for travel that has no link to your personal identity will help avoid identity theft.

Sound too paranoid for your taste? Perhaps not when you consider that identity theft prevention is far cheaper than trying to fix a stolen identity disaster if it happens. In order to make certain that you protect identity when your car plates are “run” by a professional identity thief or an identity theft gang, register the automobile in the name of a trust, and learn to register the car properly for maximum identity protection.

How can you protect identity as you drive? I have found a trust-owned car to be the most practical for preventing identity theft when certain precautions are taken and proper due diligence is done during the automobile registration process.

Make certain the trust’s name has no relationship to your true name. Insist that the Department of Motor Vehicles, Department of Transportaiton or whatever agency registers cars in your state handles the process as per your personal privacy requirements.

Include the trust’s name only on the registration. Provide your name as trustee and use a U.S. passport as an identification, not a state issued driver license. Generally, the agency will try to associate your name as trustee on the car registration records. Avoid this by speaking with the highest level supervisor in the agency and make certain that only the trust’s name is on their records.

Once this is completed, your plates-if they are run will provide the trust’s name and address as the legal owner only, and your name as the driver will be hidden deep beneath the car agency registration files, and this information will not surface in the event an identity thief attempts to track and trace you as you drive.

Grant Hall

6 ways to protect identity and stop identity theft

How does one stop identity theft and protect identity as the crime of identity fraud continues to lead all fraud crimes? This article provides high-level privacy living principles that have can be practiced to assure you of avoiding identity theft.

1. Live under the Radar while protecting privacy 

Avoid identity theft and protect identity by having a trust own the home. Renters can stop identity theft by keeping property managers out of their credit bureau files. Certain privacy seekers live anonymously by creating a new identity. This tactic breaks the trail from the old you and assures identity theft protection.

2. Anonymous Travel

Cars held in your name provide a clear path to your door in most cases as identity thieves run plates of their targets who become identity theft victims in an attempt to find their name and place of residence. Use a trust-owned car, register it properly, and prevent identity theft as you drive.

3. Bank Secrecy

I know you’ve been told you have to provide your complete personal and confidential information to the part-time clerks who open bank accounts. Join the modern privacy crisis revolution and learn to create a financial privacy plan that will assure identity protection. Your banking privacy is an important foundational block for preventing bank identity theft.

4. Telphone Security

Do you want to protect identity and stop identity theft? If you are serious, do not provide your name, date of birth, and Social Security number to part-time cell telephone sales people. Social Security number fraud is practiced by identity theft criminals who steal these crucial identifiers from any number of data bases. Avoid identity theft by buying cell telephones for cash and loading them with minutes on telephone cards purchased for cash.

5. Online Privacy

The best ways to protect identity as you use a computer include buying the computer for cash, creating a new identity for registration and e-mail communication, obtaining an ISP account anonymously and using a proxy server as you surf the internet. Sound incredibly paranoid and inconvenient? An idenity theft occurs every few seconds. Your diligence will be rewarded as you prevent identity theft through these privacy living principles.

6. Work under the radar

Avoiding identity theft and establishing an identity protection plan takes time, effort, and costs more than living as the masses. Over time, you can decide how serious you are about your privacy and elect to practice work privacy principles that will fit your employment situation.

At the highest level of work privacy, privacy seekers use a front entity, a Limited Liability Company for instance to receive their payments for their work services. This type of arrangement has been formed when employees seek privacy and bargain with employers to provide work privacy services as a part of the employment agreement.

It is possible to travel, bank, work, and live anonymously in the U.S.A. or in any country in the world when one has the information and resources to change their lifestyle. Through privacy living principles, an individual or a family can prevent identity theft while protecting their identities.

Grant Hall


home privacy protection will stop identity theft

Home privacy protection is great to stop identity theft and in order to avoid identity theft and be certain of avoiding a home privacy invasion by an identity thief, you will want to take some extradorinary measures for identity theft security. And today, identity theft solutions are more than shredding trash, locking mail boxes, monitoring credit card and bank accounts, and other garden variety identity protection methods that everyone is doing.

Identity theft fraud leads all fraud with medical identity fraud costs averaging $20,000.00 per case. So, you will want to take identity theft prevention seriously, and start with establishing a bulletproof home privacy program.

offshore mailing address

Follow the lead of the privacy experts and break the mail paper trail. Establish a relationship with a mail receiving outfit or two. Offshore is best though you may do well with a mail nominee in the states. Never receive mail at home.

Online privacy

Proxy servers, anonymous ISP’s, and creating a new identity for online communication will protect identity and prevent identity theft. You want these measures in place so that your ISP cannot be traced back to you personally or your physical address. E-mail should not include your true name.

Telephones should be wireless and have no link to your true name.

Many id thefts occur as land line telephone calls are traced back to the physical location of the caller. Use wireless phones that have no link to you or a family member.  Never give cell phone companies and their part-employees your personal and confidential information.

A trust-owned home

Want identity theft help? Keep your family names out of data bases and not associated with your home. Trusts are the preferred front entity for holding homes for privacy.

Register the family car in the name of a trust and travel anonymously.

Identity thieves won’t have a clue how to trace you when they run your plates and the owner of the car is a trust without any name related to you or your family.

Privacy protection is expensive, time consuming, inconvenient, and necessary to protect identity today. This article provides some foundational material for avoiding identity theft. Start today.

Grant Hall