Frank M. Ahearn Interview: How To Disappear Without Trace


If we wanted to is it possible to disappear without a trace? We interviewed Frank M. Ahearn, master in the art of extreme privacy.

If you’re still reading this you are either curious about how to disappear or searching for a remedy to a difficult situation. So how do we realistically achieve anonymity and remove all ties?

According to Frank M. Ahearn, the safest way to disappear and not be discovered is to become a “virtual entity”, someone who exists with no direct connections to anything physical; for example having an online business hosted far from you, a bank strictly offshore, and using an anonymous corporation to rent an apartment.

Ahearn has a unique and abstract solution for when issues arise in life or in business. “What I do is so unique that by its very definition it cannot be defined. This is not because it falls within the realm of extreme privacy but because every one of my clients presents a different issue that needs a singular and creative solution. My value lies in my ability to fabricate one of a kind solutions to one of a kind problems. So far there has been no problem for which I have been unable to devise a solution.”

We put some questions to the man himself.

Q. Who utilises your services and what prompts clients to come to you in the first place?

A. My clients are typically HNWI involved in global industry and they usually come for privacy, disappearing or stratagem.

Privacy: there are news sources that publish net worth and large ticket items bought by the wealthy. This easily accessible information concerns my clients because it could make them and their family targets of abduction for profit.

A client of mine purchased a museum quality painting that was stolen from his home sixty days later. I was hired to figure out how the thieves knew about the painting. I located his daughter’s blogs, she wrote about the painting and posted photos in her posting. Her older blogs identified what school she went to which narrowed down the area where the family lived. On her Facebook page she had photos of her and her friends in front of the family home.

I digitally bend information known about my client and their family. If a news source claims the client purchased a new mansion in Monte Carlo. I create disinformation stating the client sold the home in Monte Carlo and now resides in Belgrade with his wife and daughter Sophie. However, Sophie is NOT the daughter’s correct name.

Disappear: some clients find themselves in dangerous situations and need to disappear off the grid. I have worked with women who have been in abusive relationships and felt their lives were in danger. Some clients have brokered deals that bottomed out and faced retribution from angry investors. The common factor with disappear clients are money or violence.

Stratagem: when all conventional methods fail I am called in to devise a plan. A private equity person committed a serious faux pas which was written about on a local website. The fear was the article would go viral and destroy the clients business. The article reported that “John Locke” committed the faux pas, I added a middle initial to the article John A. Locke and disseminated the article. Once that got around, I added a home town and business name to the article, all fake of course.

Q. Everyone has concerns about compromising information reaching the wrong person or from social media fallout. For people who haven’t spent decades hiding from the Web, how tough is it for your clients to effectively ‘disappear’?

A. There are three types of online information. Information you put online yourself, information others (news/media) put online about you and database information that appears on sites like 192. You can’t actually disappear from the information since you cannot delete information from the latter two. What you can do is create online deception that blurs and contradicts the false or truth.

Q. Do you come up against a lot of legal barriers to removing content because of the overprotection of free speech?

A. Unfortunately there is no delete button online and our information is the gold that fuels the internet. In situations when a child’s name is in the content of an article, I contacted the webmaster and politely asked if the article could be removed. At times it worked and other times it hasn’t. Also one must be careful when contacting website requesting an article be removed, instead of removing the article, the request could be turned into a new article and double the exposure.

Q. What is the biggest cyber threat to consumers and businesses?

A. I really do not have that answer, I am not a technical guy. However, I personally believe the long term threats consist of what information is fact and fiction and how will we know which is which.

Q. Were you surprised by any of the revelations that emerged from the leaked NSA documents describing the US and British surveillance programs?

A. Not surprised but seriously disgusted.

Q. Mr. Snowden’s revelations about Prism called into question the relationship between technology companies and governments. Bruce Schneider even said: “The NSA is willing to compromise the security of everything to get what they want.” Do you think that situation will ever change?

A. No! Since when does the US government listen to its citizens or other governments?  Unfortunately, I believe what has happened will cause a ripple effect and other governments will follow the path of citizen spying.

Q. Since the revelations have you seen an uplift in the amount of people requesting your services?

A. More so from European corporations who once feared corporate espionage, they now fear foreign government intrusion. In the sense that they want to know if any of their key executives who have access to proprietary information are being digitally irresponsible.

Q. In order to truly erase a digital footprint what sacrifices do your clients need to make, if any?

A. Originally I wrote about and suggested erasing digital footprints but those days are forever gone. If you push enter, send, download, open or forward you create a digital footprint. I now recommend controlling footprints and breaking digital connections.

For example, many people believe that using cash and pay as you go mobile phones are anonymous and do not leave a digital footprint. Using cash to pay for a pay as you go is anonymous in the sense that the person taking the money does not know your identity. However, the surveillance camera records the transaction and connects you to the purchase. I teach people how not to make those types of mistakes by using third party services.

Q. Does our obsession with creating the ‘Internet of Things’ concern you? Should we be questioning the necessity of having our home appliances and our cars constantly connected to the Internet?

A. It drives me nuts they idea of connecting everything. I do not understand why total access is necessary. Human function is a good thing, we are moving in a direction where thought process will not be necessary. Maybe I am a dinosaur and enjoy the small things like turning my light on and off.

The dangerous part with connecting everything is the user gives up their privacy and allows digital foreigners into their home to record movement and use. Next will be the insertion of apps in our bodies, a final frontier.

Q. What do you think about all the online reputation management companies and the services they offer?

A. The same thing I think about leprechauns – nice idea, but the pot of gold is not going to happen. What “reputation sites” are selling you is digital real-estate and nothing more. They say it themselves but in different words– they promise you positive information on the first few pages of search engines. The problem with that is they are trying to sell you on the idea that no one looks past page five on search engines. But by now, everyone knows that the dirt lies in the hinterland. This concept they are selling is equivalent to wearing a five-thousand dollar suit with twenty-dollar shoes – hoping no one is going to notice. Also some reputation companies have been hacked, so much for privacy.

Q. What are the actual services you offer?

A. I offer a professional stratagem service that resolves out of the ordinary issues, disappears people in danger and combats online information through the use of digital deception.

Q. How does one go about doing business with Frank M. Ahearn and how much does it cost?

A. It begins with a prepaid phone conversation at the rate of €250 per half hour in Euros. Rates begin at €33,000 Euros: half is paid in advance and the balance thirty days after the initial payment.

Q. How long does the process take?

A. It depends on the information I am combating, however, usually a few months.

For more information and to contact Frank M. Ahearn visit his website at or you can email him at