ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Escape From a Spy Without Detection

Updated on May 16, 2015

Spies are Smart; You Need to 'Get Smart'

Source

MAD TV Spies

Source

This is a Sequel to a Very Popular Article

Please note that this is a sequel to my first article: 5 Signs You are Being Spied On.

For maximum benefit of this article, I suggest you first read my previous article first to learn the early warning signs that you have a spy hot on your trail.

When a Spy Invades Your Home or Apartment

After reading my first Hub, you should now know a few signs that you are being surveilled by a spy. When walking to your car, you may notice that the spy has vacated his vehicle. That is to avoid being detected.

Walk up to the unmarked car inconspicuously and take down the license plate number. This is so you can later look it up. It is a dead giveaway if the tag says "government" and in this case, you have a government spy following you.

There is a good chance that he is attempting to slip into your home or apartment to place bugs in your home. A bug is the correct term for a listening device.

Once inside your home, the spy will place listening devices in inconspicuous places, such as planters, behind wall switch plates, and within the inner housing of home phone handsets (if there is room).

A good bug will not weigh enough to be detected simply by picking up an object. Probably a couple of ounces.

However, take precautions. Weigh your laptop, power supply, and battery individually, noting the weight of each.

After a period of time away from your laptop, re-weigh your equipment to detect extra weight, indicating that you have been bugged.

After bugging your place, he will then attempt to steal information from your computer(s). Any hard drives will be copied. Laptops can also be bugged, and the spy might place a keystroke logger on your computer so he will capture your passwords on the websites you visit.

How to Safeguard Your Laptop from a Spy

You can place a motion activated video camera in the power supply of your laptop computer. One very smart individual put a fine powder in the screw-hole of his laptop before traveling to a foreign country. He then sawed off the tip of the screw, allowing room for the powder. He left his laptop in his room and left for an hour. Sure enough, after an hour's time, he checked the hole for the powder. It was gone, proving that a spy had tampered with his laptop's hard drive.

If you are an American traveling to China, you can be certain that your hard drive will be copied from your laptop. You should: 1) not take a laptop with you, or 2) take a cheap laptop that you don't mind if it is tampered with.

But you can be certain that it has been cloned and a virus may be on your laptop that will send data back to the spies that bugged your computer.

Pinhole of a Spy Video Camera

Source

Plan for the Home Invasion

After reading this Hub, you will be prepared for a spy to invade your private quarters.

5 Quick Tips to Prepare for a Home Invasion:

  1. First, visit a local spy shop, if you have one nearby. Purchase a small surveillance camera that could easily be disguised in your bookcase. Rookie spies will not do a preliminary sweep for video cameras or bugs before bugging your home, but "big dogs" will have mobile equipment that can jam video camera feeds. This kind of spy is funded by the government, yet the government will not publicly acknowledge his espionage unit if caught.This is for the fallout after the spy operation goes sour. If you survive the incursion, and can retrieve the footage of the spy in your home, you can expose the spy.
  2. Second, don't store your confidential information on your hard drive. If you use flash drives, carry them on you or hide them away from your residence.
  3. Don't leave firearms in your home. These can be removed and later planted by the spy at a crime scene, making you look guilty.
  4. Have a safe house that no one knows about. If you pay for said safe house with your bank accounts, then they are easily discovered. You need to pay for the safe house with cash, so it is not detected by spies that can easily track payments.
  5. Have a stash of cash to grab on the go. If you have to leave your home all of a sudden, you need a bag with overnight clothes and cash so you can move fast.

Unless you are ex-military or have some sort of fighting training, you do not want a face-to-face encounter with a spy. They will hurt you bad. Plus they are loaded with weapons in secret compartments in their trench coat.

Plan to make a quick getaway and elude them.

Now get your tail on the road, fast! The sooner you get out of town, the better off you are.

It is not safe to stay with relatives or public friends. Any acquaintance you have not contacted electronically are okay to stay with. Use snail mail to tell them you are coming. Put it in the mail as you leave town. It is best if they live in another state.

Staying with friends that live in log cabins in the wilderness could be a double-edged sword.
It could be good since they may not have a big footprint online (assuming they are independent wilderness buffs), but if the spy finds you there, you are as good as dead.

They will burn the log cabin to the ground and you are in the middle of the woods. No one will hear you scream. The advantage of being in a city is that the spy will probably not harm you in public, and there are more people that could be witnesses.

The only problem is that government spy units operates autonomously, and spies working for such an agency usually think they answer to no one.

Cabin in the Woods

Source

Cabin in the Woods

If you find yourself at a cabin in the woods you could be safe for a while. Just don't use your cell phone and call any relatives or friends, because they are all being monitored.

This could ultimately be the endgame for you if the spy has a GPS bug on your vehicle.

If you are reading this Hub from the cabin in the woods, I wish you luck.

Try to hold out as long as you can. Hopefully, you have a friend that can teach you how to hunt and fish and live off the land.

Spy Escape & Evasion: Escaping Duct Tape

Comments

    0 of 8192 characters used
    Post Comment

    • Ericdierker profile image

      Eric Dierker 

      5 years ago from Spring Valley, CA. U.S.A.

      Very interesting, I like the common sense.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)