On This Page

Advanced Privacy & Security Crash Course

Michael Bazzell | July 22-23



Overview

This course will teach you how to clean up your digital footprint and take privacy to the extreme. The instructor has spent that past six years investigating methods for disappearing from all known databases while maintaining a "normal" existence. He has also researched the best ways to protect your data, communications, and overall online presence. This presentation of successes (and failures) will help you establish your own strategy for disappearing from public view. Overall, this course will explain how to become digitally invisible. You will make your communications private, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, and home address hidden. You will legally create and strengthen aliases that will be used more often than your true identity. You will remove all personal details from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will remove yourself from the system. When taken to the extreme, you will be impossible to compromise.

Among many other techniques, the attendees will learn how to LEGALLY:

  • Apply basic security protocols to your current operating system
  • Configure web browsers for optimal security
  • Prepare anonymous communications for data removal techniques
  • Assess your current level of exposure through public resources
  • Conduct a complete self-background check to identify vulnerabilities
  • Properly secure all important online accounts
  • Completely remove historic social network activity
  • Remove personal information from online data brokers
  • Properly secure your credit, SSN, and IRS information
  • Obtain credit cards in an alias name
  • Obtain truly covert prepaid physical credit cards
  • Obtain truly covert prepaid virtual credit cards
  • Establish an alias for daily use
  • Obtain acceptable identification in an alias name
  • Obtain a completely anonymous cell phone and service plan
  • Use encrypted VOIP connections for calls and messages
  • Create a free Wi-Fi phone for alias use only
  • Execute data encryption across all devices
  • Properly use VPN's at all times
  • Provide disinformation in order to protect true details
  • Monitor for future compromises to real data
  • Replace non-secure communications with secure options
  • Use alternative operating systems for sensitive actions
  • Establish an anonymous physical address for ID and mail
  • Purchase/rent a home anonymously using an alias
  • Tackle data leakage before irreversible damage
  • Execute every step toward complete anonymity


Please note that this course is lecture-style with live demonstrations. While there is no practical (lab) component, attendees will have access to wireless internet if they would like to follow along with the instructor. Computers are optional, but not mandatory.

Who Should Take this Course

  • Every U.S. Citizen
  • Domestic Violence Victims
  • Law Enforcement/Feds
  • Military Personnel
  • Online Investigators
  • Spooks

Student Requirements

Only open minds and a concern for privacy

What Students Should Bring

Nothing required

What Students Will Be Provided With

Detailed lecture and written instruction

Trainers

Michael Bazzell spent 18 years as a government computer crime investigator. During the majority of that time, he was assigned to the FBI's Cyber Crimes Task Force where he focused on open source intelligence and computer crime investigations. As an active investigator for multiple organizations, he has been involved in numerous high-tech criminal investigations including online child solicitation, child abduction, kidnapping, cold-case homicide, terrorist threats, and high level computer intrusions. He has trained thousands of individuals in the use of his investigative techniques. Michael currently works and resides in Washington, D.C. He also serves as the technical advisor for the television hacker drama "Mr. Robot" on the USA network. His books "Open Source Intelligence Techniques" and "Hiding from the Internet" have been best sellers in both the United States and Europe. They are used by several government agencies as training manuals for intelligence gathering and securing personal information.