If you Like HowToVanish on Facebook then we will give you one of the $2-3 30 page Mini-Guides for free. Just send us a message on Facebook and let us know which one you want: (1) Financial, (2) Political or (3) Personal.

Who Have You Been Talking To?

by Bill Rounds Esq. on August 14, 2009

Reading time: 3 – 5 minutes

phone call register

Just as the outside of all mail is photographed, the phone numbers that any one phone calls or receives and the websites visited by a computer are all subject to review by government officials. There are ways to avoid this intrusion.

How Your Calls/Website Visits Are Monitored

Without dazzling you with a history of this subject under constitutional law, there is no expectation of privacy in the phone numbers you dial, or web sites, that you visit.  The police may obtain a court order based on a very low standard falling far below probable cause, to subpoena those records from your phone company or internet service provider.  The police do not even need to tell the judge what they think they will find or why they have chosen to investigate such material.  Thus, upon application and satisfaction of a very low burden of proof, the judge “shall” issue the subpoena. What is worse is that even if a violation of your constitutional rights is found in getting the phone or internet records, the information gathered in violation of your rights may still be used against you.  If the protection of some privacy laws is inapplicable to the communication in question, the barriers to the government do not even include having to get a subpoena and they can compel the phone and internet providers to turn over that information immediately.

Although most of what is discoverable is the number at the other end of the line, or the website viewed, the information gleaned could lead to a more thorough surveillance of your private affairs if the information paints a profile of you which is considered suspicious. One of the major flaws with this is that there are few profiles which do not fit somebody’s definition of a suspicious profile. If you are tallish, shortish, with thinning to thick hair and are wide but thin, you fit the profile of a terrorist. The closer scrutiny of your personal affairs after fitting the profile could lead to unnecessary and intrusive violations of your personal privacy.

How To Avoid Suspicion

The easiest way to avoid suspicion is to avoid having those calls or web site visits that would arouse the most suspicion from registering under your account. For the phone company, this could be as simple as making a call from a public phone, which are increasingly scarce. Although public phones are often constantly monitored, unless you or the person you call are already under close surveillance, there is little chance that the call will be linked to you.  You may also consider using another person’s phone, as long as they know who you are calling and don’t mind. I do not suggest calling a psychic hotline at $1.99 a minute on your friend’s dime or you may run out of friends willing to let you make a call.  You may also consider using a phone at work if you are able to make personal calls or simply using the phone at the grocery store or other business in order to place the calls that you are concerned about. The easiest way to avoid a suspicious search or web page visit to show up on the records of your service provider is to use a proxy server to take advantage of anonymous web surfing.

Conclusion

There may always be someone watching your phone and internet activity, especially when you must use the service of a telecommunications company or internet service provider. Avoid openly engaging in activities that you think are the most suspicious.  Although these measures are not a guarantee against unnecessary intrusion, they are the simplest steps to begin protecting your privacy in this area.  A complete strategy for keeping your communications private can be created using this and other strategies found in the book How To Vanish.

No tips yet.
Be the first to tip!

Support How To Vanish - Tip With Bitcoin

1HfMACmdSZtjEFsJ3BGxf3bN8hCzAL172j

Find this post helpful? Please consider tipping with Bitcoin. Each article gets a unique Bitcoin address so by tipping you help make How To Vanish sustainable and give valuable feedback on which content is most appreciated!

9,128 random numbersEmail Email Print Print

2 comments

ABOUT THE AUTHOR: Bill Rounds, Esq. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from California Western School of Law. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties. This is merely one article of 123 by .
Free HowToVanish Privacy Guide

{ 2 comments… read them below or add one }

1 Jack March 27, 2011 at 5:24 am

Get a TRAC phone, pay cash for the minutes, activate from a pay phone.

2 Robert Brewster February 28, 2014 at 9:29 am

I purchased a copy of your book, but when I received it, I wasn’t able to save it. My computer let me print it, but not save it. I left my print copy on a work trip. Can you please send me another copy of how to vanish? Your records should confirm my payment. Thank you.
RPB

Leave a Comment

Previous post:

Next post: