This video, presented by former CIA officer Jason Hanson, details critical techniques for disappearing without a trace. Hanson, an expert in intelligence operative methods, emphasizes the paramount importance of avoiding all technology, especially phones, when evading threats. He warns against contacting family, as their communications are monitored, and advises on the proper use of burner phones if absolutely necessary, stressing that activation should be done by a trusted third party. The core message is that complete technological abstinence is key to successful evasion.
This guide, presented by former intelligence professional Jason Hanson, outlines seven critical steps for disappearing and evading detection. It emphasizes meticulous planning, physical alteration, financial preparation through cash accumulation, ditching traceable assets like vehicles, utilizing untraceable communication methods, scrubbing online presence, and informing a single trusted contact. The advice is framed for individuals seeking to escape dangerous situations, not for fugitives.
This guide, presented by former CIA Officer Jason Hanson, outlines practical methods for earning money while living completely off the grid. It emphasizes the necessity of cash transactions and avoiding traditional employment due to digital footprints. Strategies include seeking manual labor, utilizing local classifieds, and leveraging community networks for anonymous, cash-paying jobs.
This guide, presented by former CIA Officer Jason Hanson, outlines critical steps for disappearing without a trace. It emphasizes the importance of financial preparedness with cash reserves, strategic location selection in smaller, conservative cities, and avoiding electronic footprints. Hanson, a New York Times best-selling author with expertise in executive protection, stresses that discipline and habit changes are paramount for successful evasion.
This video, featuring John Lovell and retired Navy SEAL Clint Emerson, delves into field expedient surveillance and counter-surveillance techniques. It covers the vulnerabilities of modern electronics like cell phones, the use of miniature cameras and GPS trackers, and methods to protect sensitive data. The instruction emphasizes practical, low-profile methods for information gathering and security in various operational environments.
You've reached the end! 5 videos loaded.
Gun Laws by State
Read firearms regulations for all 50 states + D.C.
Find Gun Dealers
Search licensed FFL dealers near you.