[et_pb_section bb_built=”1″ fullwidth=”off” specialty=”on”][et_pb_column type=”3_4″ specialty_columns=”3″][et_pb_row_inner admin_label=”Row”][et_pb_column_inner type=”4_4″ saved_specialty_column_type=”3_4″][et_pb_text _builder_version=”3.12.1″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

There are so many reasons you may find yourself wanting to improve your online reputation. So in order to begin the process of reputation management, we must identify areas to improve upon.

The first step in the Reputation Management process is Information Gathering because we must properly identify the problem!

Chances are because you’re reading this, you may already be aware of potential problems needing reputation management. None the less, we must conduct thorough research because it’s essential to identify ALL problem areas when Information Gathering.

Because this is the digital age, on a daily basis all of our data is being mined! Today, the average person’s picture is taken unknowingly 75 times. The choice, let alone the possibility of living privately, and with anonymity, no longer exists!

Don’t worry! We Still have options!

Just because it’s impossible to keep ourselves entirely out of public view, the game isn’t over, it merely changed! So now our strategy shifts to offensive rather defensive. despite Sun Tzu’s famous quote being of archaic origins, it still holds true.

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. And if you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”

That being said, to effectively conduct our Information Gathering, we need to fully identify our potential enemies!

Information Gathering banner showing the two most powerful record holders and data collectors, Neustar and Lexis Nexis
The two powerhouses with some of our most secure information are LexisNexis and Neustar. Lexis Nexis controls a collection of our most secure billing, renting, and background information. Neustar has been enabling corporations and government bodies to obtain cellular information since 1999.

The Alpha Omegas And The Nine Spies

Some of the most closely guarded secrets about you and your identity are held by the alpha omega two. Accurint’s Lexis Nexis is a secure record database utilized by government, Banks, Private investigators, and insurance companies. Luckily, Because this is secure and confidential information only negligence typically causes a leak. Well, minus incidents like Five People Hacking in and one other Hacker

Doesn’t really matter how secure that is when the era of cellular devices has come to fruition. Since 1999 Neustar has been monitoring every cell phone in the world. Today, every single phone conversation is recorded and used for data mining.

So minus a high-level hacker or big brother, the alpha omega’s won’t be the culprit to leak information. Sure, everyone loves to point the finger at the judicial system. But any solid information gathering makes it easy to conclude the contrary! So without further delay, I introduce the nine spies!

The 9 Spies

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner admin_label=”Row”][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″][et_pb_text _builder_version=”3.0.106″]

  • Acxiom
  • eBureau
  • ID:Analytics
  • Intelius
  • PeekYou
  • RapLeaf
  • Acxion
  • Recorded Future

These companies generally don’t have the ability to do their information gathering by accessing directly from the source.

They all have their own methods to trap your data so they can sell it.  Because Generally, their intentions are to provide data for marketing research purposes.

So, bear in mind while information gathering any data left lying around has the potential to harm you.

Furthermore, don’t ever accept defeat if there is a will, there is a way!

Especially because this is a fight that with my knowledge you’re certain to win every time! 

Let us make our way now to the causes of our data leaking now that we have studied the source!

[/et_pb_text][/et_pb_column_inner][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″][et_pb_image src=”https://ussupportllc.win/wp-content/uploads/2018/04/Information-Gathering-The-Nine-Spies.jpg” show_in_lightbox=”on” _builder_version=”3.0.106″ /][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner admin_label=”Row”][et_pb_column_inner type=”4_4″ saved_specialty_column_type=”3_4″][et_pb_text _builder_version=”3.12.1″]

First Contact

The most likely places we will first identify slander from our information Gathering leaked is naturally a location we frequent. be amongst So the first and obvious place to look would be a search engine.

When conducting search queries during your information gathering, there are a few query strings that can aid you. Because we want to be somewhat thorough, here is a chart to help you in your research process!

[/et_pb_text][et_pb_text _builder_version=”3.0.106″ use_background_color_gradient=”on” background_color_gradient_start=”#0c1959″ background_color_gradient_end=”#2974c4″ border_radii=”on|5px|5px|5px|5px” box_shadow_style=”preset5″ box_shadow_color=”rgba(89,89,89,0.3)” custom_padding=”40px|10px|10px|10px”]

information gathering

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner admin_label=”Row”][et_pb_column_inner type=”4_4″ saved_specialty_column_type=”3_4″][et_pb_text _builder_version=”3.12.1″]

Indirect Reputation Harm

Information gathering by conducting a query search in Google, you’re sure to see the information you don’t want publically available. Chances are this scattered collection of information was left by a member of the category indirect reputation harm.

Culprits cause Indirect Reputation management harm as a result of negligence or lack of regard for private citizens and our right to privacy.

Many likely candidates populate search results during our Information Gathering. The good news is the majority have a process in which your data can be removed. (9 Spies In Gold).


Removal Options?

Cancellation URL

Instant Checkmate
Yes Removal Link
White Pages
Yes Removal & Walkthrough
Yes Removal Link & Walkthrough
Yes Removal Link & Walkthrough
Family Tree
Yes Removal Link
Yes Call 800-262-3787
Instant Checkmate
Yes Removal Link
Yes Removal Link
Yes Removal Link
NO (Can Be Requested With ID No Guarantee)
Removal Link
NO Requires Membership of $10 PER MONTH
Yes Removal Link
Yes Removal Link
People Lookup
NO Requires Mail/Fax Request with image of Photo I.D.
FAX: (425-974-6194)
MAIL (P.O. Box 4145, Bellevue, WA 98009-4145)
Public Records Now
YES Removal Link
YES Removal Link
US People Search
YES Removal Link
US Search
YES Removal Link
NO Requires ID Click For Details And MAIL INFO
Fax (425-974-6194)
YES Removal Link
id:analytics N/A Secure Credit Records not Public
(New Site Name!) [email protected]
YES Removal Link

Direct Reputation Harm

So much more difficult and challenging is dealing with Direct Reputation Harm when Information Gathering. Because removing accidental or unintentional content that damages our reputation is substantially easier to remove.

The Disgruntled Employee Endeavor

Sometimes it’s so subtle and overlooked as false information on social media, or perhaps negative reviews entered into directories. Because entities like Google advise us to be prompt and respond to the complaints, that is the action we must take.

Furthermore, defending you/your businesses reputation in a professional manner, it shows integrity. It shows other potential customers you make efforts to correct situations so they’ll have faith in you.

If the offending parties actions are irrational or outright ridiculous, that’s fine. Most review entities even the brutal Better Business Bureau will quickly wipe the slate clean. Hopefully, a resolution can be met quickly so you can minimize the damage. Once you let it die down most impacts can be completely reversed in short order. (DO NOT INSTIGATE, BECAUSE YOU WILL SLOW THE PROCESS OF RESOLUTION!)

The Former Friend, The Vengeful Ex Relationship

Take great caution in this trouble area because it’s where we’re treading upon the dangerous ground! You know the friend, or former lover better than me obviously so use your best judgment. Furthermore, I will say that situations involving someone once close to us, can have dangerous to fatal consequences.

A common example of reputation slander can be minor libelous statements or shaming. Shaming involves the former partner taking intimate photos or video footage and putting it up online.

Fortunately, because the source of this type of humiliation is a spouse or former lover it is uncommon. One can assume because it is a substantial criminal offense, most tend to avoid slandering people as such. Because certainly, nobody wants to go to jail with any form of sexually related crime!

The third and highest level of intentional damage to our reputation management process, you should never approach.  Because all the knowledge and information gathering in the world won’t prepare you for your first encounter!

Criminals ever so ruthless and without morals such as Jason Joseph Watson, or Edmund Tauk.

I speak of someone who is a calculated surgically precise individual who uses social media and search engines to cause lasting damage. Prepare yourself!

Information Gathering - Quote from 48 Laws of Power - Guard your Reputation with your Life

A quote from the book The 48 Laws of Power, “So much depends on reputation. Guard it with your LIFE!” In the illustration, two Samurais can be seen in a duel to the death. To a samurai, your name and your honor were worth more than money and even life itself!

Professional Extortionist, Ruthless, Moralless Social Parasites!

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner admin_label=”Row”][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″][et_pb_text _builder_version=”3.12.1″]

Law 15

Robert Greene drives it home with this law, but not because you want this fight.

Because assure you, no matter how many fights you’ve been in, no matter how much of a killer you think you are, walk away!

I made this mistake, and because I had no idea how selfish of a decision it was, I’d advise against it.

Because these people will hurt you, your friends, and your family!

So understand they live with absolutely live with no morals or ethics of any sort!

So exercise restraint! Because If you have kids, they won’t hesitate to spin up a story to get CPS involvement.

Furthermore, they’ll threaten your friends and family, and they’re pros at destroying lives!

Because having been to prison living amongst killers, I can tell you these people are bad news!

[/et_pb_text][/et_pb_column_inner][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″][et_pb_text _builder_version=”3.11.1″]

“Know the enemy, and know yourself!”

So know the enemy, and concede to the fact, that for them to have thrived in this industry they are intelligent.

Because they have to be in fear for their lives of people like me! 😈

Just because I’m a nondangerous non violent drug offender, there are millions amongst their slander victims.

Furthermore, even some of the drug dealers I knew would have killed anyone in a blink! So we must concede that our attacker has to be smart!

Because if he makes so much as one mistake with 15 million potential felons possibly showing up to kill him, he’s f**ked!

So in conclusion, we’re dealing with a trained, expert criminal.

Because they’re hackers, fraudsters, and social engineering masterminds embedded into multiple layers of society protecting their locations and true identities!

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner admin_label=”Row”][et_pb_column_inner type=”4_4″ saved_specialty_column_type=”3_4″][et_pb_video src=”https://youtu.be/_gu9p6lgQzI” _builder_version=”3.11.1″ /][et_pb_text _builder_version=”3.12.1″]

For me it’s too late, but not for you!

That Bridge has been crossed unfortunately for me lol! Because I drew my sword, I will see this out to the end! If I could go back to the day I shook the hornet’s nest and stop myself I would. So learn from my experience by not engaging these individuals, but rather pick up the pieces and move on!

This isn’t about money, financial gain, sure I have to eat who doesn’t! What this is about entirely is stopping a person from ruining millions of lives and harassing and torturing people!

So if I persuaded you to not contact these criminals, then I couldn’t feel more accomplished! Because I assure you, if you think paying extortion money is the solution, you’re just the meal ticket they’ve waited for!

Because these criminals I’ve conducted information gathering on for years have 100s of domains. Jason Watson’s a man that criminally steals VIN numbers to conceal his location and identity. 

[/et_pb_text][et_pb_image src=”https://ussupportllc.win/wp-content/uploads/2018/04/Information-Gathering-Reputation-Management-and-harm-prevention-using-Google-Alerts.jpg” align=”center” _builder_version=”3.12.1″ /][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner admin_label=”Row”][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″][et_pb_text _builder_version=”3.12.1″]

Information Gathering and Reputation Management are an ongoing process.

So keep that in mind that your reputation is a daily proactive process. So an excellent way to protect yourself from incoming hazards is to handle them right away.

But because we can’t see everything all the time, what should we do? A great question that deserves a great answer so two words, Google Alerts!

Because having an alert trigger as soon as something is found in your name, is an invaluable tool to have!

That’s enough for today, Part II begins our offensive strategy to defend or take back our name!

[/et_pb_text][/et_pb_column_inner][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″][et_pb_image src=”https://ussupportllc.win/wp-content/uploads/2018/04/fortification-using-web-property-hoarding.jpg” url=”/reputation-management/fortification-using-web-property-hoarding/” use_overlay=”on” overlay_icon_color=”#000000″ hover_overlay_color=”rgba(224,153,0,0.5)” hover_icon=”{cc50721a7618f4e674dec2b49e3026a3970c787f07ca0046a6fa91bbc4626467}{cc50721a7618f4e674dec2b49e3026a3970c787f07ca0046a6fa91bbc4626467}137{cc50721a7618f4e674dec2b49e3026a3970c787f07ca0046a6fa91bbc4626467}{cc50721a7618f4e674dec2b49e3026a3970c787f07ca0046a6fa91bbc4626467}” align=”center” _builder_version=”3.11.1″ /][et_pb_image src=”https://ussupportllc.win/wp-content/uploads/2018/03/Prison-Arts-Touching-Hearts-1.jpg” url=”/prison-art/path-collection/” use_overlay=”on” overlay_icon_color=”#000000″ hover_overlay_color=”rgba(224,153,0,0.5)” hover_icon=”{cc50721a7618f4e674dec2b49e3026a3970c787f07ca0046a6fa91bbc4626467}{cc50721a7618f4e674dec2b49e3026a3970c787f07ca0046a6fa91bbc4626467}137{cc50721a7618f4e674dec2b49e3026a3970c787f07ca0046a6fa91bbc4626467}{cc50721a7618f4e674dec2b49e3026a3970c787f07ca0046a6fa91bbc4626467}” align=”center” _builder_version=”3.11.1″ /][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type=”1_4″][et_pb_sidebar _builder_version=”3.12.2″ area=”sidebar-1″ /][et_pb_blog _builder_version=”3.12.2″ posts_number=”7″ include_categories=”6,1,5″ show_author=”off” show_categories=”off” show_pagination=”off” fullwidth=”off” /][/et_pb_column][/et_pb_section]