From: James Hicks <71332.747@CompuServe.COM>
To: Cypherpunks-list <cypherpunks@toad.com>
Message Hash: 7536a327f539b20c8a605938f66024340ca5e76429a329ab00dbc76d048813d3
Message ID: <94030203004071332.747_DHQ92-1@CompuServe.COM>
Reply To: _N/A
UTC Datetime: 1994-03-02 03:32:37 UTC
Raw Date: Tue, 1 Mar 94 19:32:37 PST
From: James Hicks <71332.747@CompuServe.COM>
Date: Tue, 1 Mar 94 19:32:37 PST
To: Cypherpunks-list <cypherpunks@toad.com>
Subject: Who are Worldwide Consultants?
Message-ID: <940302030040_71332.747_DHQ92-1@CompuServe.COM>
MIME-Version: 1.0
Content-Type: text/plain
Hello.
Has anyone heard of this organization? The below popped into
my mail box unsolicited. This is the "E-mail Version" but there
is no e-mail return address (that I could find).
>James<
>*****************************************************************************
>FINANCIAL & PERSONAL PRIVACY NEWSLETTER, Spring 1994 Issue, E-mail Version
>*****************************************************************************
>
>Published by:
>
>Worldwide Consultants
>2421 West Pratt Boulevard, Suite 971
>Chicago, Illinois 60645
>U.S.A.
>
>PURPOSE AND POLICY STATEMENT: In order to keep the Financial and Personal
>Privacy Newsletter (FPPN) unbiased, this publication accepts no paid
>advertising and does not affiliate itself with, or receive support from, any
>particular organization.
>
>FPPN covers topics of interest to privacy-conscious individuals. We cover
the
>legal, technological and personal aspects of confidentiality as well as
>government and private sector-sanctioned invasion.
>
>This publication (in its entirety), MAY BE REPRODUCED OR TRANSMITTED in any
>form or means without consent of the publisher. This newsletter is a public
>service, thus is FREE. Feel free to disseminate by electronic mail or fax,
>post on national & international networks and BBSs (Bulletin Board Services),
>and distribute in hardcopy (printout) format.
>
>FPPN presents information and research believed to be reliable, however, it
>cannot be guaranteed. Although every attempt has been made to ensure the
>accuracy of contained data, Worldwide Consultants, the publisher, cannot
>accept liability for misstatements. A complete investigation should be
>conducted prior to any commitments. THIS CONTENT OF THIS NEWSLETTER IS FOR
>INFORMATIONAL PURPOSES ONLY AND IS NOT INTENDED AS LEGAL OR OTHER
PROFESSIONAL
>ADVICE.
>
>
>
>FROM THE PUBLISHER'S DESK
>
>We would like to take this time to welcome you to the premier edition of our
>publication. The Financial & Personal Privacy Newsletter will bring you
hard-
>to-find, valuable, and even bazaar information not found in the mainstream
>press. We bring you the world in a way that you probably have never seen it
>before.
>
>Please remember that there is an open door for you to air your thoughts,
>suggestions and grievances (if any) in writing. Also, we welcome relevant,
>well-written and researched articles of at least 500 words. Though we can't
>pay for submissions, we will print up to 100 words about the author.
>
>Enjoy!
>
>-FPPN Staff
>
>
>
>BOOK AND VIDEO REVIEWS
>
>Confidential Information: Dangers of Disclosure by Bodo Schonebeck is a text
>that describes the use and detection of bugs and other monitoring devices
used
>to obtain sensitive information. The price of the publication is $15 (plus
$5
>postage). To order, contact: Security-Investigation-Debugging-Agency, P.O.
>Box 4757, D-78512 Tuttlingen, Germany.
>
>
>Asset Protection Strategies: Tax and Legal Aspects by Lewis D. Solomon and
>Lewis J. Saret is a 480-page concise text that details various techniques for
>protecting assets and reducing the risk of lawsuits. The price of the book
is
>$125. To order (or examine for 30 days), contact: Wiley Law Publications,
>7222 Commerce Center Dr., Suite 240, Colorado Springs, CO 80919 USA; 800-879-
>4539; Fax 719-548-4479. Please reference #4-6630.
>
>Phone Pirates by Ian Angus and Gerry Blackwell is a 246-page guide to
>telecommunications fraud. The text describes how hackers penetrate phone
>systems and steal long-distance services. The price of the book is $55. To
>order, contact: Telemanagement Press, 8 Old Kingston Rd., Ajax, Ontario
>L1T 2Z7, Canada 416-686-5050, ext 225.
>
>PT2 The Practice: Freedom and Privacy Tactics by Dr. W.G. Hill is a candid
and
>straight-foward text that takes an inside look at international financial
>privacy planning and free-living. The price of the book is $100. To order,
>contact: Scope International Ltd., 62 Murray Rd., Waterlooville, Hants
>PO8 9JL, Great Britain; 44-0705-592255; Fax 44-0705-591975.
>
>New ID: How to Create a Complete New Identity by L.O.T.I. Group is a
35-minute
>videotape that walks the viewer, step-by-step, through the process of
identity
>change and ID aquisition. The cost of the VHS video is $24.95. To order,
>contact: Paladin Press, P.O. Box 1307, Boulder, CO 80306 USA; 303-443-7250;
>Fax 303-442-8741.
>
>Our Vanishing Privacy by Robert E. Smith provides in-depth details (based on
>the author's experience and an attorney, government employee, and reporter &
>researcher) about information kept on U.S. citizens in government computers.
>The price of the book is $12.95. To order, contact: Loompanics Unlimited,
>P.O. Box 1197, Port Townsend, WA 98368 USA.
>
>People Tracking - You Can Find Anyone by Fay Faron & Lee Lapin is an 80-
>minute videotape that provides the viewer with details on finding missing
>persons of every walk of life. The price of the VHS video is $69.95. To
>order, contact: Intelligence Incorporated, 2228 S. El Camino, #349, San
Mateo,
>California 94403; Fax 415-851-5403.
>
>How to Achieve Personal and Financial Privacy, 5th Edition by Mark Nestmann
is
>a 300+ page manual that details virtually every aspect of domestic privacy
>protection. The book costs $68. To order, contact: LPP, Ltd., P.O. Box
>83538, Phoenix, AZ 85071; 800-528-0559; Fax: 602-943-2363.
>
>
>
>SECURE COMMUNICATIONS STRATEGIES
>
>by Dr. Herrell Roehm, Ph.D.
>
>WARNING: The instructional format is used for clarity only. The author does
>not advocate breaking any law. The reader is solely resposible for any
>actions taken. No warrants, expressed or implied are made for any of the
>material contained herein. Copyright 1991 I.S.D.A. - All Rights Reserved.
>
>RECOMMENDED READING FOR Privacy Seekers, Spies, Private Investigators,
>Attorneys, Skip Tracers, Security Consultants, Law Enforcement Personnel,
>Mercenaries, Collection Agents, Anarchists, Tax Resisters, Secret
>Organizations, and The Persecuted and Oppressed.
>
>INTRODUCTION
>
>HOW TO USE THIS ARTICLE EFFECTIVELY: Place yourself in the position of
>someone requiring maxium privacy AS IF YOUR LIFE DEPENDED ON IT. You'll gain
>concrete insight and intuition that will help you avoid those seeking to
>locate you, whom we will call the "tracer". Seek to develop your own
>individual and unique sense of intuition. Intuition is informed by
knowledge,
>and knowledge should be informed by intuition. This somewhat intangible
>quality can make the crucial difference between safety and exposure of worse.
>
>HOW MOST MISSING PERSONS ARE FOUND: If the truth were known, skip tracing is
>not an extremely difficult profession, and can be very lucrative. The P.I.
>(Private Investigator) is not the only kind of tracer. When we speak of
>tracer, we mean: P.I.s, Feds and Police, government and private spies and
>intelligence agencies, collection agencies, bounty hunters, or anyone who
>might want to locate you. To find almost all of your "regular" skips, just
>learn the readily available methods. There are more books about missing
>persons than any other area of investigation. It represents the "bread and
>butter" of many P.I. agencies. Any good tracer will be signed up with one or
>more computer search services, and may locate many targets in just a few
hours
>or days.
>
>HOW MISSING PERSONS STAY "MISSING": Our privacy seeker is serious, and has
>made privacy a way of life. He is hard to find, and makes up perhaps ten
>percent or less of all missing persons cases. Some investigators label these
>cases "difficult" or "impossible" to locate, often charging large fees
anyway.
>Some skips are fleeing criminal prosecution, prison, or engage in illegal
>enterprises which demand absolute secrecy and security. A high-level of
>sercecy and security is required for other legitimate enterprises too:
>private investigation, personal bodyguard, critical and/or controversial
>research, labs, and inventors to mention a few. Unpopular or "deviant"
>lifestyles, beliefs, and practices lead some individuals to distance
>themselves from "society" as much as they can. Certain totalitarian trends
in
>modern society cause some to want to avoid contact with government "Big
>Brother" as much as possible. Persons in failed witness "protection"
programs
>where security has been breached may trun to the private sector after being
>compromised by feds or other cops. Additional non-criminal reasons may
>include: oppression from political, terrorist and dangerous groups, flight
>from abusive families or cults, or fleeing threats of violence perpetrated by
>individuals. It is not our purpose to judge or evaluate, and other reasons
>exist. All have in common as distinct need for privacy. The techniques
>discussed are used to achieve a successful level of privacy and secrecy, but
>require DEDICATION AND THOROUGHNESS to be effective.
>
>SECURE COMMUNICATIONS
>
>MAIL: Get all your mail at a P.O. Box in a ficticious name. You will have
to
>fill out U.S.P.S. Form 1093 with a physical address (required), but you can
>later "move". Sometimes the post office will ask for an update of your 1093.
>This can be routine, but could indicate that someone is mail-tracing you.
>They may have already received your "dud" address, and have continued their
>inquiry by passing this information on the the P.O., who then ask you for the
>updated 1093. The tracer can get a lot of free work done this way, but he
>also runs the risk of alerting the skip. The final word here is WATCH YOUR
>MAIL.
>
>MAIL DROPS: A "mail drop" or private postal box is sometimes recommended,
but
>"caveat emptor" is the watchword. These services are available in most
areas,
>and are used by numerous individuals and businesses for legitimate reasons.
>You can provide additional cover by having your mail go through a series of
>drops, but don't forget there are directories of these addresses. Because of
>Reverse Skip Tracing (discussed later), we don't recommend mail drops when
>seeking maximum security. Safest of all is to establish an address where you
>(or a trusted friend or associate) can receive your mail. For the price of
>some mail drops, you might rent a small cheap room or apartment in the
"seedy"
>area of town (if a particular type of address is not needed) where you can
get
>your mail in a group of mailboxes for that building. You can pick up your
>mail at varying times, or have someone else do it for you. Make friends with
>the superintendent of a building so that your mail is delivered with that of
>the residents (you don't live there, of course). A cover story can easily
>account for your need of this service. A "homeless" person might persuade a
>mission, church or other agency to receive his mail, but the amount of mail
>should be small as not to attract attention. These suggestions work best if
>you don't get a lot of mail, and are not involved in illegal or other
>compromising situations, which might lead to blackmail, exposure, or worse!
>
>GENERAL DELIVERY: Sounds hokey, but it's a very good cover. The Main Post
>Office in a town or city is probably the best location as they are the
busiest
>and least likely to remember or notice you. Try to appear properly
>nondescript when going for your mail, and don't establish a pattern.
>
>CREATE A STREET ADDRESS FROM A P.O. BOX: A box is not suitable for all
>situations. You will need a street address. Every post office has a
physical
>street address, so send your mail there. Example: You are Mr. A. Skipper,
Box
>911, Metropolis, TX 78444-0911. Find out the street address of the P.O., and
>write your address like this: Mr. A. Skipper, 1411 Main Street, Number 911,
>Metropolis, TX 78444-0911. All boxholders now have an individual 9-digit
>zipcode; its use should insure you get mail so addressed. Some
correspondents
>tell us that an occassional nosey postal employee will say this is not
>permissable, but generally you shouldn't have any trouble. If you insist the
>employee show you chapter and verse in the administrative codes, you will
>probably prevail, but you may draw unwanted attention. In another instance
of
>a branch post office in a shopping center, there was difficulty obtaining the
>actual physical address as the employee claimed it was never used. Even
after
>the address was obtained, some mail continued to be improperly returned to
>sender. You will have to weigh each case, but we recommend that you try
>another post office or branch if you run into snags at a particular location.
>
>REVERSE SKIP TRACING: Some ads for mail drops are just a ploy to get your
>name and address, which is crossed referenced with lists of known missing
>persons. Even "legitimate" drops may sell their client lists, or allow
>tracers to go through the names. You can rest assured that every mail drop
>will cooperate with the police or feds if they come around asking about you
>(or your assumed name). Many books recommend use of mail drops, but we see
>too may possible hangups. Is it possible that some of these "expert" missing
>persons authors are just making sure that maildrops have a steady clientel
for
>reverse tracing?
>
>ANSWERING ADVERTISEMENTS: Keep your eyes open, and examine closely what is
>recommended in some "inside information" or "underground" publications. Be
>careful in answering any potentially risky advertisement. An example is
found
>in magazines catering to drug users and advocates, such as "High Times
>Magazine". Many ads are probable D.E.A. fronts, especially the ones for
>information or paraphernalia for growing pot (marajuana), mushrooms, ect..
>An ad for information on privacy, false I.D., or illegal scams (by little or
>unknown companies), may be a front for reverse skip tracers - or someone else
>tracing people like you! Don't avoid seeking new information, but be sure
>your postal privacy is well protected. If your return address is traced, be
>sure they come up empty-handed.
>
>REGISTERED AND CERTIFIED MAIL and C.O.D.s: Once you have established your
>P.O. Box, the only mail coming to your real address should be "occupant"
mail.
>If Registered or Certified mail does come (could be C.O.D. or Insured Parcel
>Post or ANY mail requiring a signature), say you are someone else, say the
>person moved and left no address, moved months or years ago, say anything,
but
>NEVER sign for mail - no exceptions! The carrier is out of line to ask who
>YOU are, so this should work. Tracers use this as a cheap and effective way
>to locate skips.
>
>PACKAGES AND DELIVERIES: Always pay with money orders. Your receipt is
proof
>enough if required, and virtually impossible to trace. Keep the receipt
>blank; don't fill it in unless needed. Although Federal Express, UPS, and
>other couriers say they can't deliver to a P.O. Box, you can still use it.
>Say on the order, "notify by mail at my P.O. Box for delivery instructions".
>This causes a little delay, but the parcel agent will simply send you a post
>card with an 800 phone number so you can call with delivery instructions.
>Have it sent to a safe address, or don't give them an address at all. Pick
up
>the package at their office. NEVER have ANYTHING delivered to your real
>address! That way, if anything does come, you will be alerted, and refuse
>delivery as described.
>
>TELEGRAMS: We think of them as old-fashioned, but telegrams are still
around.
>It's not a bad ruse either, and should be treated same as above.
>
>MAIL TRACING: This is a cheap and useful tool, and is often the opening
>gambit in efforts to locate you. Look out for any suspicious mail! All P.O.
>Box information on U.S.P.S. Form 1093 can be accessed by others. Numerous
>cover letters are avaiable, but the best way is to state that the individual
>used the P.O. Box for business purposes, or that a court action is intended
or
>in the process. The P.O. will release the records, including the physical
>street address you gave them. See any good book on researching public
records
>for more details. If a tracer sends you a letter, and it doesn't come back,
>he may be enticed to advance another level, such as a personal visit and/or
>surveillance. To deflect First Class and all other mail, consider buying
>(through the mail of course) a small rubber stamp saying "Unknown - Return To
>Sender", "Deceased", "Moved", "No Fowarding Order On File" or similar P.O.
>wording. Be sure to drop it in a mail box NOT served by your regular post
>office or branch. Beware of responding to offers asking you to call for
>confirmation because you have "won" a free cruise or whatever. A postcard,
>flyer or letter may offer a lucrative employment in your profession (or
>something else you need or want) with a number to call collect. It may be a
>ruse by a tracer. If family or friends' names are known, you may receive an
>"emergency call" notifying you of the "death" of a loved one. Don't respond-
>no exceptions! Have a backup plan for emergency communications with friends
>or family if you absolutely must have it. So if a call comes, you KNOW it's
a
>ruse, and do not respond. Advance planning is crucial.
>
>MAIL COVERS: If feds or other cops are tracing you, they may establish a Mail
>Cover for a 30 day period, with extensions. A mail cover does NOT require a
>warrant, so it's easy to use. It is initiated by the agency working directly
>with the local post office. They record ALL the information on the OUTSIDE
of
>the envelope, based on the premise that this is "public" information. They
>identify regular correspondents, contacts, abnks, credit cards, other mail
>transactions, suppliers, business associates, and more. Supposedly this does
>not delay your mail, but who knows? It seems that it would delay it (given
>the efficiency of most P.O. workers) or that you might receive mail in large
>amounts when you usually do not. Monitor postmarks, and if you receive a lot
>of mail, you should have a good idea how long it takes mail to reach you from
>various parts of the country. ALWAYS WATCH MAIL AND DELIVERY PATTERNS.
>
>SENDING "SENSITIVE" MAIL: If you use a mail drop, change it from time to
>time, and always run your mail through more than one drop. When quicker
>delivery is needed, consider private delivery services. Drop the package off
>at a pick-up point - do NOT have them come to you. Vary your service between
>different carriers, and do NOT use post office Express Mail, particularly if
>moving detectable contraband. It is routinely X-rayed and "sniffed". The
>bus can be sued as numerous parcels are shipped everyday. Common items
>shipped are tools, auto parts and equipment of all sorts, but many suitcases
>and cardboard boxes as well. Even if you just have an envelope, wrap it in a
>large box and weigh it down so that it is similar to other boxes being
>handled. Use a typewriter for anything written, preferably a newer electric
>model that doesn't leave a distinctive mark or indicate anything about your
>key pressure. For short notes, ect., consider taking your paper to a large
>discount store where typewriters are set out for your demostration. If
you're
>typing something that takes a minute of so, this is a good source. Libraries
>often have typewriters available for use, so use a cover identity to get a
>library card. Better yet copy centers and business centers where
typewriters,
>computers, printers, and copy machines are located together. No one will
>require I.D. to rent you a typewriter for a half hour, and no one will
>remember you among hunderds of users. For very sensitive correspondence,
>photocopy the letter after you type it, and send this copy as the "original".
>Develop an unreadable scrawl as your signature. It's not always necessary to
>put your return address, and it is not required. You must be sure that the
>mail is correctly addressed, and that nothing inside would compromise your
>location or identity if it were opened by the authorities (or a tracer - yes,
>they may violate the law!).
>
>AVOIDING MAIL TRACERS AT YOUR REAL ADDRESS: Remove the mail box. Remove any
>signs from doors, windows, outside or walls, which may draw unwanted
>attention. Never put YOUR name(s) on anything, and remove any old
nameplates.
>You can remove address numbers. If the postman has no mailbox or no proper
>address, he cannot deliver, and mail is returned "Undeliverable As
Addressed".
>
>MAILING LISTS, PERIODICALS, AND SUBSCRIPTIONS: Use the Direct Marketing
>Association, P.O. Box 9008, Farmingdale, NY 11735 to get off most lists. The
>IRS uses sophisticated mailing lists to apprehend tax evaders, categorized by
>high-salary professions, spending patterns, lifestyles, and purchases like
>vacations and luxury cars. Get off as many lists as you can. If you receive
>"junk" mail (or other unwanted mail), mark it "addressee unknown - unable to
>foward", and drop it in a street mail box, preferably one not served by your
>local post office or substation. List users will delete your name to save
>future costs. Do this consistently; you'll be off more lists. When you
move,
>do NOT send "Change of Address" notices to anyone. Start new subscriptions
>under your new name at your new P.O. Box. If you subscribe to "exotic" or
>unusual publications, you may be traced by this connection to your old life.
>Large publications are probably OK, but if your interest is "The Vegetarian
>Party Times", or Gum Label Collectors Quarterly", which has only a few
>subscribers, you're taking a chance of exposure. NEVER SUBSCRIBE TO A
>NEWSPAPER OR ANY OTHER SERVICE USING A DELIVERY PERSON. Tracers know these
>individuals are aften talkative, nosey, and area a wealth of information
about
>you and your habits. Buy it at a news rack, read it at the library, or have
>it sent to your P.O. Box. WRITE THE TRACER A LETTER, AND TELL HIM YOUR
>"LOCATION": An Air Mail letter from Guatemala City, Paga Pago, Cairo or
>Australia saying you're there, and never plan to return to the USA can end a
>lot of tracing activities, particularly those of collection agencies. You
>need a cooperative person in the other country to remail the letter.
Business
>agents for banking and forming corporations, and offices for rent in places
>like Panama, the Isle of Man or other locations could be used. Check the
>classified section of The International Herald Tribune Newspaper,
212-755-8785
>for leads. Some banks in Europe and other countries have good
confidentiality
>laws, and, if you have an account, some may receive and foward your mail for
>you. Letters from diverse locations over a period of time might convince a
>tracer that you are roaming about the world, another expatriate American
>(there are lots of them) running from responsibilities back home. A word to
>the wise: watch out for mail drops abroad - tracers have lists and
directories
>of these addresses.
>
>TELEPHONE SECURITY: Depending on who's after you, there may be no security at
>all! The feds (and others) can turn a phone into an area "bug" with proper
>equipment. If you must have a phone, be aware of the latest technology (an
>excellent soure is "Full Disclosure Magazine, which is published monthly by
>First Ammendment Press, P.O. Box 67, Lowell, Michigan 49331 USA). Be sure to
>list it in a fictitious name or business name. I'm told that Ma Bell now
>wants you to be a corporation to do this. That's OK - be a corporation! If
>they ask for a corporation registration number, find out what one looks like
>in your state, and provide it. If you receive a message or letter asking you
>to call someone collect, don't do it! This is an old tracing technique. If
>you don't give yourself away in the conversation, the tracer will simply call
>the operator, ask for the time, charges and origin of the call and phone
>number. Since the tracer is paying for the charges, the operator will be
>happy to cooperate. Avoid cordless & cellular phones and radio
communication.
>Police (and anyone else) can listen and legally record these conversations,
>which are exempt from wiretap laws. You're using the open airwaves, so your
>communications are literally open to anyone who wants to listen. Numerous
>scrambling devices are available. Some cordless phones have variable
security
>codes, and you could combine this with a voice scrambler (one type of which
is
>available from Shomer-Tec, P.O. Box 2039, Bellingham, WA 98227). This may be
>enough, depending on who's tracing you, but what one computer scrambles,
>another computer can eventually unscramble. This also goes for any "codes"
>you might device or use. In the ever-changing world of communications
>technology and spy devices, "never say never" about anything, and always
>assume that someone is at least one step ahead of you in sophistication.
STAY
>AWAY FROM ALL ELECTRONIC COMMUNICATIONS IF YOU CAN. If you must communicate
>over these media, take every possible precaution. Best of all - don't have a
>phone. It's easier than you think. A lot of phone use is habit anyway. If
>you must make calls, use safe locations like a friend's home or a secure pay
>phone, but don't establish a regular pattern anywhere.
>
>FACE-TO-FACE COMMUNICATIONS: In past times, when your telephone wasn't
secure
>you could usually set up a face-to-face meeting. The ready availability of
>numerous "bugs" has changed all of that, especially the ultra-small micro
>varieties. Depending on the level of security required, it can be very
>expensive to deploy counter devices and detectors. They may be useless, and
>give you a false sense of security. Let's consider a few of the
>possibilities. If your meeting place is known, bugs can be planted in
>advance. Your contact will probably be bugless, but the whole area would
>already be compromised. Simple parabolic ears and smaller listening devices
>can easily be employed if cover can be established. These are generally
>defeated by meeting in large open spaces, yet this presents its own
additional
>risks. Technology advances rapidly in theis field. What was science fiction
>yesterday is common equipment tomorrow. Never underestimate the
technological
>capacity of the tracer. Who can you trust when it comes to bugs? Trust no
>one! Even a friend or "safe" contact (or their car or home) can be bugged
>without their knowledge. After the tracer has identified your contact, he
>will observe HIS patterns, just waiting for YOU to show up. This is
>particularly successful if you have a girlfriend, pusher, money source, or
>anyone/anywhere you just HAVE to visit. The tracer knows you're eventually
>coming, so it's just a matter of time. Your contact could be compromised by
>threats to his (or his family's) safety, or by blackmail. Very few people
>will remain totally loyal under such circumstances. You can hope your
contact
>will at least warn you if this is happening, but don't count on it. Watch
>friends and contacts for any signs which might alert you. When someone who
>was helpful, jovial and friendly begins to act reserved, afraid, and uneasy,
>they may be under just this kind of pressure.
>
>A FINAL WORD ON COMMUNICATIONS: Our purpose is to get you in the habit of
>thinking, observing, and COMMUNICATING from the position of someone who
>requires absolute maximum privacy and security. Its purpose is not to create
>paranoia, but don't forget the old saying: "Just because you're paranoid
>doesn't mean they're not really out to get you".
>
>ABOUT THE AUTHOR: Herrell Roehm is the founder and executive director of the
>International Security and Detective Alliance (I.S.D.A.), a worldwide society
>and professional registry for private investigation and security services.
He
>is also the editor of I.S.D.A.'s newsletter, The Eagle (subscriptions are
>$7.95 for 4 issues). For a sample copy, including information about the
>organization, send $2 to: I.S.D.A., P.O. Box 6303, Corpus Christi, TX 78466
>U.S.A.. Dr. Roehm also conducts nationwide missing persons searches and
other
>examinations in the southern U.S. and Mexico. He may be reached by telephone
>at 512-888-6164.
>
>
>
>NEWS IN THE WORLD OF PRIVACY PROTECTION AND INVASION
>
>THE PRIVACY JOURNAL is a monthly newsletter that reports on legislation,
legal
>trends, new technology, and public attitudes affecting the confidentiality of
>information and the individual's right to privacy. The subscription cost is
>$109 annually ($135 overseas). For a sample copy, contact the Privacy
Journal
>at P.O. Box, 28577, Providence, RI 02908 USA; 401-274-7861.
>
>TRACELESS PHONE CALLS are possible through the use of a service provided by
>the International Telephone Company. Private Lines, a service founded by
>Beverly Hills Lawyer Will Dwyer II, allows users to make calls via their 900-
>number with absolutely no record. The service works for domestic and
>international calls. Simply dial 1-900-CALL-888, and select "1" for calls
>within the U.S., Canada or the Caribbean at $1.95/minute. Select "2" for all
>other direct-dial worldwide locations at $3.95/minute. The calls will appear
>on your long-distance bill as calls to 1-900-225-5888 "Secure-Tel". For more
>information about the service, contact IPC at 800-823-0080; 408-738-3700; Fax
>408-748-4343.
>
>CAMOUFLAGE PASSPORTS are documents that look exactly like a legally issued
>passport, containing the bearers photo and vital stats, and is full of entry
>and exit stamps. These documents are bogus passports from countries that
>don't exist anymore (i.e. Ceylon, British Guyana, New Hebrides, Upper Volta
or
>Pantagonia). The purpose of these documents are not travel, but to provide
>hijackers, terrorists, and other hostile elements with an alternative
identity
>in order to save those with high-profile nationalities such as American,
>Canadian, British, ect. from harm. The cost of a "Camouflage Passport" is
>$550. For more information or to order, contact: Expat World, P.O. Box 1341,
>Raffles City, Singapore.
>
>OFFSHORE COMPANY FORMATION for the purpose of setting up legitimate
businesses
>or empty shells is simple with the use of the the services of Overseas
Comapny
>Registration Agents, Ltd.. They are part of an worlwide network of lawyers,
>accountants, secretaries and bankers who perform all work with extreme
>discretion. For a free 60-page brochure, contact: O.C.R.A., Companies House,
>Ramsey, Isle of Man; 800-283-4444 (toll-free from the U.S.); 44-624-815544;
>Fax 44-624-815548.
>
>THE 16TH ANNUAL CONFERENCE OF DATA PROTECTION will be held in The Hague,
>Netherlands in September. Government Commssioners will meet with the private
>sector to discuss computers and privacy issues. For more information,
>contact: Peter Hustinx, Postbus 3011, 2280 GA Rijswijk, The Netherlands.
>
>BUSINESS ESPIONAGE CONTROLS & COUNTERMEASURES ASSOCIATION (BECCA) is a non-
>profit organization dedicated to the protection of proprietary information
and
>other business secrets. For more information about the group, contact:
BECCA,
>P.O. Box 55582, Seattle, Washington 98155 USA; 206-364-4672.
>
>EVERY ASPECT OF COMPUTER, PBX & VOICE MAIL, AND TECHNOLOGICAL PRIVACY is
>covered by the Infosecurity News, The magazine for the protection of
>information. For details and subscription rates, contact the publication at
>498 Concord Street, Framingham, MA 01701 USA; Fax 508-872-1153.
>
>HAVE YOUR NAME AND PHONE NUMBER REMOVED FROM TELEMARKETING LISTS by writing
to
>Telephone Preference Service, DMA, P.O. Box 9014, Farmingdale, NY 11735 USA.
>
>GET COPIES OF YOUR CREDIT REPORT by contacting TRW at 800-392-1122, Equifax
at
>800-685-1111, or Trans Union at 800-851-2674.
>
>JIM ROSS' COMMUNICATOR NEWSLETTER covers various topics relating to
electronic
>surveillance and privacy issues. For a free copy, call 800-US-DEBUG.
>
>COMPUTING & COMMUNICATIONS LAW & PROTECTION REPORT is a brief guide to
>developing corporate policy on monitoring and disclosure of electronic mail
>(e-mail). For a free copy, contact: Assets Protection Publishing, P.O. Box
>5323, Madison, WI 53705 USA; Fax 608-271-4520.
>
>ALTERNATIVE INPHORMATION markets numerous publications on high-tech (and not
>so technical) methods of privacy invasion. Write for a copy of their
catalog:
>Alternative Inphormation, P.O. Box 4, Carthage, Texas 75633 USA.
>
>CORPORATE SECURITY DIGEST is a weekly publication reporting on governmental,
>commercial, and industrial security (and privacy) topics. Subscriptions are
>$295/year. To request a free copy, contact: Washington Crime News Service,
>3918 Prosperity Avenue, Suite 318, Fairfax, Virginia 22031 USA; 703-573-1600.
>
>CENTRAL INTELLIGENCE AGENCY (CIA) PUBLICATIONS are available by annual
>subscription. For information, contact: Document Expediting Project (DOCEX),
>Exchange and Gifts Division, Library of Congress, Washington, DC 20540 USA;
>202-707-9527.
>
>
>
>*****************************************************************************
*
>OFFSHORE FINANCIAL AND PERSONAL PRIVACY PROGRAMS ALLOW YOU TO PROTECT YOUR
>CONFIDENTIALITY IN PERSONAL AND BUSINESS AFFAIRS. A FEW EXAMPLES OF THE
Return to March 1994
Return to “James Hicks <71332.747@CompuServe.COM>”
1994-03-02 (Tue, 1 Mar 94 19:32:37 PST) - Who are Worldwide Consultants? - James Hicks <71332.747@CompuServe.COM>