Remain Unfound 🔒: Disappear Now-if YOU are in ☢️Danger or Need to Leave Soon (Steps to Hide below)

Counter Tracking, Security Principles, Hiding, Decision Making and OPSEC

The Tactical Victim
21 min readNov 7, 2023
Photo by Steven Kamenar on Unsplash

“Much of the information you provide resonated with me and wish I had that level of information available years ago.

I won the last conviction against the stalker in 2022 and had to navigate the post-stalker life without a “how-to” guide, so I fully support your project.”

-Kathryn Caraway

-The Tactical Victim-

It’s a Mindset, a New Way of Life 🔒

If this is the first article you read, I understand it will be a bit overwhelming.

This is a “Go to” manual for those needing to escape, NOW

🛑 If you are the one in danger: make sure to read this article and My Blog, on a:

🔒🡲Different Phone (buy a pre-paid one with cash on your lunch break and leave it at work/out of hands from your abuser)

🔒🡲Library-Apple Store-Work Computer
(in case your abuser/stalker has tools allowing them to see everything you do on your devices*)

  • How to tell if they are monitoring your devices?

🛑 👇🏾

Who is this Article for?

☢️Those in Danger Now ☢️

It is designed for those who have a current stalker or abuser,
that is putting them or will likely
put them in danger.

The Information and Steps below,

will be a Learning Curve.

This article alone, even followed to the “T”,

🛑 will NOT Guarantee Your Safety.

However, it will Offer You a ✅ SIGNIFICANT ADVANTAGE ✅

in keeping you SAFER and Harder to Find.

(I knew almost None of this information when starting out)

How?

Through New: Behaviors, Steps, Precautions

and

new ways of thinking

that will improve your Decision Making Process (OPSEC).

This (very long and extensive) blog post:
introduces you to the steps you
NEED to Take
to Drastically reduce your chances of being killed and or found

while escaping and after you escape.

(There will still be other gaps you will have to cover that I don’t in this blog)

⬇ The below article covers more resources, websites, manuals, organizations: that may help you in ways I can’t ⬇

Photo by lilartsy on Unsplash

What this Article Covers:

All of the lessons and information below,
will be applied to your
daily life (in person and online) and almost everything you do from now on.

✔️ More Information:

🡇 I also include more articles at the end of this post🡇
that will go over more

→to help get you going and stay safer.

🛑 Warning:

Photo by Goh Rhy Yan on Unsplash

I go over here a number of areas in the article below,

→the areas that I DON’T COVER ☢️

which may affect your safety
-so do read the below article too:

🛑 🡻

Introduction (the Escape)

Once you leave your situation, you both:

A. May Increase the danger you’re in the short term

(their desire to kill you now, they may retaliate and refuse to lose you)

or

you may/have the opportunity to

B. Decrease the Danger you’re in (now, short term and long term)

Photo by Florian Schmetz on Unsplash

for example:

A) Now that they realized you escaped:

They may not have been planning to kill you for another two weeks,
but now that you’ve escaped,
the plans
MAY change to now.

It’s also possible,
you feel like they will eventually kill you,
but it will be some months
(unless you cross a unknown tripwire, their psychological state changes or other factors that can shorten your life span)

Or,

B) Their Plans are to Kill You at ANY Moment
-you may only have a short time left
-and it’s good you left today,

  • As the plan was to kill you tonight.

-Either Way-

I think it’s Better to leave now, in my opinion,
if your not sure on how much time you have left.

If you know for certain they aren’t going to kill you, use this article to start planning your escape.

Photo by Markus Winkler on Unsplash

When and How to Escape?

-If you decided to get out..

When to leave?

🟢Leave while they:

  • sleep,
  • are gone at work
  • or you/they go for an errand…

Ideally, it will be when they are at work/sleeping

This will give you the most time

Photo by Ganapathy Kumar on Unsplash

a few hours to increase your getaway time, distance you can cover and mishaps

Factors that will Increase the Complexity and Risk of Your Escape

→Technology

Photo by Sebastian Scholz (Nuki) on Unsplash

🔍Are you being monitored?

At Your Home with Home Devices:

  • ☢️ Do you have a home security system they use to monitor you?
  • 🔔 That will alert them, that you’re leaving?
  • Do they have a tracker on your car/phone?
    -Be mindful of apple air-tags
  • Do you live in a 📶 Smart Home, where everything
    (such as your phone and tablet on the fridge, home security app they have on their phone),
    📶 →is connected-able to be monitored by them, or notifies them when theirs movement?
  • Those apps sometimes get notified by: 🔔 movement, open doors

💡 Escape Idea: Maybe the windows or one of the doors don’t have a alarm on them???

Are You being Monitored with 3rd Party Devices (like air-tags)?

🟢Potential Solutions/Get Around to the Technology💡:

Photo by Kylo on Unsplash

Transportation-Escape Methods

  • Use a Friends/Neighbors/Co-Workers car to leave
  • Wave down street police car, or taxis drive by regularly
    (to get help or jump in asking them to drive)
  • Buy a Cheap Used Car (start looking up your options)
    (with cash ideally)
  • or maybe you use Lyft to get there,

More Ideas:

  • 🚴 a Bike or you go by foot if you have too
  • Boat, ferry, trolley, subway?*

*🛑 ✋🏾 Again, make sure you’re not notifying the other person of your location, by using shared: email accounts, electronic devices, apps and so on

🟢Potential Psychological Solutions

Photo by Kelly Sikkema on Unsplash

Excuses and Reasons

  • Have some excuses that make sense:
    -
    for why your leaving the house early
    -changing floors

🚫 Sometimes, you may not be able to avoid alerting them,
and you will have to be ready to move quick and fast.

🟢Plan Out the Escape in advance (ideally)

Photo by Liam Simpson on Unsplash

Challenges, Contingencies

  • Take into account different contingencies upon Immediately Escaping

Such as the Logistics:

  • What restaurant-store could you hide in,
    while waiting for that Lyft?

(so they don’t see you waiting outside)

  • What if you’re friend is late when picking you up to escape?
    (acknowledge potential risks and possible solutions to each)

Mentally Rehearse:

How you might be able to react:

-broad based or specific things you can say

-where you will/can go,

-potential escape routes,

-ways to buy time

-and Places that allow you to avoid running into people or vice versa

→All while accepting,

→that plans may change for the Worse,

and you may have to adapt On the Spot

Prepare in Advance (financially)

  • Start saving in the Long Term
    (months or weeks in advance, unless you are or may be in immediate danger)
    Open up a Bank Account the abuser won’t know about:

for an address:
-You will need to use a Private Mail Box
(that has a physical address, that can be used to open a bank account)

Online Bank Account
You can also create an online bank account (again, you need to be careful with the emails, addresses and anything else that coul accidentally notify them

PayPal May be of Help with some of this too

Business Bank Account

→If in immediate danger, leave now with what you can:

-Use Items you have for Pawn Shops
-Barter-Trade on FB Groups (meet people in a safe, well crowded public places)
-Sell your products on FB Marketplace or apps that do this

Prepare in Advance (with the items you pack)

I realize how these situations work in practice vs

how we hope they will,

and they are often not the same.

If you have the time:
start packing away key items you will need on the “road trip”,

“work trip”

or,

maybe the escape is something you never ever discuss
(in case they get suspicious).

Photo by Glenn Carstens-Peters on Unsplash

Where and How to Pre-Pack in Advance for your Escape?:

A. Get a storage unit in cash,

ideally 30 mins* from where you live/work.

*The reasoning is:
if they come to look for your at your job/home,
when you decide to escape,

your a solid 30 minute drive from where they will be looking for you.

OR-

You can pick a place not far from where you live/work
→determine which set up is best for your circumstances.

ALSO,

🔒: Ideally have 2 “bug out bags” with
everything you need,

in 2 separate locations.

🟢Location Set Up:
Maybe one bag stays at your office at work,
the other stays in your car.

-Again, think about where they will and won’t be looking.

☢️Risk: Do you or can you trust the people you work with?
If you’re not sure, just tell them its for health and personal items,
and they probably won’t ask too many questions.

  • Why have “bug out “ bags in 2 Locations?
    in case you can’t safely get to one location,
    the other gym bag has it too.

B. Work:
Depending on your work,
you get a
backpack-gym bag,
and start packing it with the below items,

maybe on your lunch break, with:

Photo by Jan de Keijzer on Unsplash

Bug Out Bag Items

  • Legal Papers and Copies
  • ID’s, State ID’s, Drivers License
  • Passport
  • Insurance Card
  • Food Stamp Card
  • Birth Certificate/copy
  • Social Security card

Get them laminated if you can,

otherwise, just put them in clear plastic bags.

  • 🚑 Medicines:
    Prescriptions, doctors notes, Fever-Stomach-Allergy Medication, anti-bacterial liquid, band aids, soap.
  • 💵 Financial:
    Bank Statements, pass codes, cash (don’t use any current accounts or cards while escaping…they may be connected to the one your escaping).
  • 📋 Phone numbers/Emails:
    For All of the Above doctors, DV shelters, old friends and family, and more.
  • 📲 Cash bought Pre-paid phone:
    Risk ☢️: don’t install any of the same apps, emails, widgets, tools..

Here’s WHY (article)

and pre-load it with a cash paid plan
(ideally a couple days before the escape,

📞 so you can make calls,

📍 use gps right away.

Photo by Mathurin NAPOLY / matnapo on Unsplash

💧 Non perishable Food/Water:
2-gallons of bottled water and 2–3 days of non perishable rations.

🔦 Tools/Weather:
-Flashlights

-Strobe lights

-whistle/Rape Whistle

-swiss army knife

-umbrella-rain jacket-boots

-sleeping bag

  • weather appropriate clothes
    (of where you are and where your going..in case hotels are booked)

If time and money Permits

Can you Afford to get a travel van?

Station Wagon?

Do you have time to put Insulation in it?

— Of course, if you can’t do all this preparation-

yourself is the most important thing to have when you escape,

don’t run back for a bag if it may cost you your life.

Mode of Transportation Options for Escape?

Photo by Fernanda Caetano on Unsplash

Vehicles: Bus, Car, Plane, Train, Boat?

How: Foot, Taxi/Lyft*, Bike?

Helpers: Co-worker, neighbor, social worker, police or just you**?

**if you have any doubts, you are all you really need.

Are you being followed?

Photo by Sinitta Leunen on Unsplash

How to check 🔒?

This article is for you then:

🛑 “Defensive Driving Maneuvers-Worst Case Scenario Training”.

  • Leaving alone is usually the safest, in my opinion, but you need to determine what your circumstances are.
  • Lyft Allows you to create a profile without your picture.
    I don’t know about Uber.
  • ☢️ Make sure it (your method of escape) can’t notify your:
    old email, apps, or anything else..hence using that burner phone.
Photo by Jamie Street on Unsplash

Which is why that new phone, shouldn’t be connected in anyway to your old phone.

Be Careful when talking to Law Enforcement,

they accidentally put me in danger a couple times.

→The Danger of Dealing with Law Enforcement for Domestic Violence and Stalking Victims by The Tactical Victim | Medium🛑

I would not tell them where you are heading next,
just in case they slip,
or if you you know your abuser is friends with any local police and so forth.

Upon Initial Escape

First Place of Hiding

When you escape, your first place of hiding

is ideally, where you will want to Start Creating Distance.

(I say “First Place”, because, you will probably make mistakes initially and be discovered).

-Stay Safer while there and read the article below:

🟢→Prevent them from Breaking into Your Apartment/Hotel — The Tactical Victim — Medium

Photo by Marisa Buhr Mizunaka on Unsplash

— —

Layers and Trails

After this first stop (a short term, temporary and safer place), you will begin the process of having multiple trails.

Trails that end up nowhere.

Photo by Maksym Kaharlytskyi on Unsplash

→Conceptual Learning Process

Below is a good video that goes over the concept in physical form, when on an actual trail in the forest.

It applies quite well in concept, once you start understanding how everything electronic-digital can be connected (notification emails, online profiles and the data brokers-which can collect the above information about you)

🟢 ANTI-TRACKING IN THE BUSH | How to employ anti-tracking methods in escape and evade (youtube.com)

🟢 I STRONGLY recommend watching parts of this video,
it will highlight the concepts you be applying online and in other ways in your daily life.

🛑☢️PS: STOP USING ALL YOUR SOCIAL MEDIA!
— It’s way too easy to make mistakes
Learning how you can be found just on social media — is a Whole Process.

Make escaping easier on yourself and limit what you to keep track of and learn.

Back to the Tracking Video

-Instead of new footprints you create in the woods
(far and hard to find from your last set),

you will Create a New: email, phone number and address,
ideally, each time you leave a place you’ve been at

Photo by N. on Unsplash

Maybe the 3rd place you’re at for a few months and worked in,

and you set up an address separate from where you’re staying.

Why? Most of this information goes to data brokers eventually..

💡When it comes up later, it will look like you are in this city
(due to the area code of the number, the address)

In reality, you’ve moved and changed the information.

Losing the Trail

Instead of crossing a river

(like you would in the woods),

the new contact information,
helps erase your “location and digital scent”.

Photo by Karsten Winegeart on Unsplash

If you made mistakes (which you will likely do at first),
the data broker will show old information.

-By the time you get to your (hopefully) last place,
you will be alot harder to find.

Photo by Markus Spiske on Unsplash

If you do everything else right,
the above steps will help you will travel more anonymously.

🛑 If you make certain mistakes
(signing up for a rewards card with the new phone number, getting magazines sent to your real address, entering a contest),

the above steps MAY buy you some time/initially confuse your stalker…untill you need to move again, and not make those same mistakes!

Per My E-Book (not out yet):

Photo by Spencer on Unsplash
  • I’ll show you how to throw you’re abuser off the trail, even if your main number, gets in the public information sphere (The above steps help with this)
  • Tools to prevent and reduce information Data Brokers ability to collect Your information
    (from Apps, online surveys, grocery store discounts, your browser and more)
  • Otherwise, this will get published and you will likely be found

Make Google Your Friend, Instead of Your Stalker

Here are some free ways to use Google to see what trails you May have or left

Photo by Christian Wiediger on Unsplash

🔒: Free DV and Stalking Victims Google Tool Kit from Heaven

🛑 Warning:

If you have Stalkerware or Keyloggers on your phone/tablet, this will make your escape near obsolete.

If you’re at all unsure,

I recommend Destroying the phone/labtop/tablets.

First: Take notes on key-emergency numbers, emails, copies of documents, before destroying them.

Photo by Laura Rivera on Unsplash

🔒/🛑: How to Identify Stalkerware on Your Phone: Advice from GoAskRose.com | by The Tactical Victim | Medium

Don’t Make My Mistake:

I threw mine out due to the fear..of not having the forethought to take notes first..

it would have been better for me to save it for evidence at a police station,

or put in a cheap storage facility, bank box or P.O. Box.

— —

Photo by Onur Binay on Unsplash

🛑 Other Apps and other devices can stalk you for the stalker intentionally, or on accident:

Some Examples:

  • Ear phones
  • Fitness apps
  • Tablets with GPS services built in
  • Social media/foursquare
  • Family-Safety Apps (sometimes provided by your phone or internet carrier)

How?

Photo by Sebastian Scholz (Nuki) on Unsplash

Apps or Email notifications can notify them (the app-your abuser/stalker), due to services connected to your:

  • Smart Phone
  • Smart Car
  • Smart Home
  • Home Security Systems-Cameras

I know, its alot.

That's why I recommend leaving all of your devices somewhere else, like storage, and get new ones for your escape
(ideally, at least a couple hours out of town).

How are Trails Back to You Created?

-This is how you are found

Photo by iuliu illes on Unsplash

If you make mistakes* with the first couple cities or states you escape to, this layered approach, will likely…buy you time too.

*Some Mistakes:
🛑 Any old social media accounts, addresses, subscriptions online, products sent to your home (or mailing address close to your home), discount cards and so forth..

Hidden Social Media Dangers You Never Thought of |
by The Tactical Victim | Medium

🔒 Rule: Start new and fresh

💡(if it can be used as evidence, again, you can put it in a cheap storage facility, PO Box, or Bank Box).

Start fresh each time you move (new numbers, emails and so forth).

-Yes, it’s a Pain in the Ass.

-Yes, it works well.

The Above Mistakes: (when using the Layered Approach)
…will be connected to old phone numbers and emails you had in the last city or state

STRONG ADVICE: please ditch ALL social media the first 6-12 months..it will be too complicated for to manage, along with everything else).

Photo by Geranimo on Unsplash

When we follow the rules outlined (getting a new email/number upon moving), if and when both populates on a data broker’s account-

they create a dead end trail..

which we want..

We want a few different directions of trails ideally..

leaving your predator, in the dark.

Photo by Azzedine Rouichi on Unsplash

Using different services,
they may be able to find your first couple numbers,
addresses,

— and will think that’s where you are.

As you do more research on my blog and other experts
(read many different books and articles on these topics),
you will get better at hiding,

and reducing information that leaks about where you are.

How do We Put this Into Practice in Each Location?

I will show you how to create an easy to organize process for this.

3 Levels

Photo by Hansjörg Keller on Unsplash

A) 2–3 Phone Numbers

How:
Main Phone Number*, Google Voice**, and maybe another VoIP service you pay for or is free.

*🔒: Ideally, you get your main phone* (and number) from another state.

-Your “last” (as in, hopefully you wont need more),
phone number, should be from another state,

so if it does leak online despite all your efforts,
the stalker may think your in another state.

*Android, Motorola, Samsung are better than Apple phones for dv/stalking victims overall.

Apple products do have an emergency “erase all” feature.

🛑 One sign in to your old apple account (or an old app), and you may be found.

Why have a Different Main Number?:
If you make OPSEC mistakes and your main number comes up with a data broker,

at least your number will not indicate what state your in.

Why 2–3 Numbers?

You can make each number form a different state,

adding to their confusion if they do find your old numbers on a data broker site.

Photo by Volodymyr Hryshchenko on Unsplash

In short, it also makes it harder for someone looking for you with so many numbers, emails, addresses and so forth, out there.

Useful Communication Apps:

*Google Voice allows you to choose an area code from the same or other states.

It’s up to you and your DV/Stalking situation.

💡 Maybe you will want your Google Voice,
to be from the same state/city, your in to:

blend in better, decrease the questions people ask you and so forth.

💡 Or, you may want it to be the same state, but different city/county

— We’ll get into more of this and how you can explain to others, “why you moved” later.

— —

B) 2–3 Emails* and Your Options

Photo by Dennis Kummer on Unsplash
  1. 🔒 A Secure Email Provider
  2. Mail.com (makes this very easy, will allow you to create MANY emails)
  3. Yahoo/AOL

*Risk Note Per Emails 🛑:

Most people put their first and last name in an email.

This gives away far more information than you can imagine.

→Email Security: Risks in Your Email’s Name You Never thought of |
by The Tactical Victim | Medium

Luckily, my last name is very common.

However, think about what you want your email to be.

— —

Putting it all into Action in Your Day to Day Life

(Without going crazy)

Level 1: The Most Secure

The way I do this, is like this.

Photo by Jason Dent on Unsplash

A) Main Number:
Bank and other private and secure information, goes with my Main Number.

No one has this number.

B) Main Email:
I chose a secure email provider (encrypted), that gets attached to this.
No one has this either, except those institutions.

This is your “Vault”.

Photo by Brock Wegner on Unsplash

🔒 C. These should also have a different and unique password.
-if you’re just escaping, please don’t make this too complicated.

If you lose a phone, forget a fancy new password
— due to the exceptional stress you’ll be under,

you can lock yourself out and cause yourself more problems.🛑

💡 So, balance security with convince in a manner you can handle,
if life gets more challenging too.




Layer 2: The Social Layer

Photo by Clark Van Der Beken on Unsplash

A) Google Voice Number or Other VoIp Service:

This number, you give out to others
(actually, I may have this switched around, but I follow the same principles)

This may be for your friends, co-workers, things like that.

OPSEC and Safety Note: Social Media

Photo by Adem AY on Unsplash

*Do not open up any social media accounts, online profiles, with this number.

If you do:
your friends and co-workers will be able to see that when you give them this number, and it will connect and populate with their social media apps that search for their contacts accounts,

which, I don’t recommend, at least for now. 🛑

B) Work-Social Email
This can be a non secure/less secure email.

Yahoo, Aol is something people are more used to seeing,
so you don’t stand out as “weird”.

To make it more secure, use a VPN when you use it,
and or 2 Factor Authentication (if thats not too complicated).

Security Note: A Secure Password is a must for all of your accounts.
-A Free Password manager can help with this.

⚠️Warning— MFA/2FA can become cumbersome, especially if you lose your phone.

I’d wait until you’re more settled.



Layer 3: Everything Else

Photo by Tobias Fischer on Unsplash

Your last email and number, can be used when you don’t know the person all that well,

when you need to provide an email to a store
(make sure the email doesn’t have your name or location).

It’s your “trash email and number”.

So, make sure this is free too.

Good options for this:

  • Simplelogin (creates a secondary email il that forwards to your main account)
  • Mail.com

4th layer?

You can, but, its gets real complicated and it is probably unnecessary.

Sometimes I’ll use “burner emails”, or one time email services.

These are good for signing into wifi, or doing stuff online.

Other Notes:

VoIP Challenges

💡 Not all services accept VoIP numbers.

Once in a while, you may have to use your main number for important things.

If you have a main number from a different state (that you’re not living in),
this will make you less nervous, in some situations when putting your number down.

What About Addresses?

Photo by Katie Moum on Unsplash

Your Address:

🛑Never Give Out Your Home Address🛑

Use a mailing address (be careful of PO Boxes and UPS, which I think are “Public Information”.

Always use a Mailing Address.

My favorite is the Virtual Mail Box.

The article below will explain your other free options.

Living

🛑 No more official apartment rental agreements..far too much information gets sent out physically and online

Photo by Malik Earnest on Unsplash

Instead:

  • Craigslist
  • Room Rentals (look at laundry mats, community newspapers and magazines)
  • Co-workers/Religious institution members, may be renting out a room
  • Use Google/Perplexity ai/Chatgpt, to see other options out there too

🛑 AGAIN..Never have anything sent to the address your living at!

Main Article on Dissappearing

https://medium.com/@TheTacticalVictim/what-is-a-tactical-victim-f96259d7e05b

Follow me and or Subscribe to My Email List, if you want to stay up to date for my latest Security, Psychological and Tactical tips..

Thank you all for your support.

-The Tactical Victim-

It’s a Mindset, a New Way of Life 🔒

The Tactical Victim

Male DV, SA and Stalking Survivor 🔒 Acting as Your "Blue Team" AI Expert to help you: Assess the Risk, Escape-Survive and Remain Unfound. Cleared Professional