top of page
Baker Street Station

Have Your Own Irregular Inquiry?

Live Anonymously: How Lawyers, Investigators, and Activists Are Predators


Introduction


In a world that increasingly values transparency and accountability, it is ironic how certain segments of society exploit these very principles for personal gain, political leverage, or social control. Lawyers, private investigators, extremists, activists, big tech corporations, and governments are often hailed as protectors of justice, privacy, and freedom. However, behind this veneer of nobility lies a darker reality.


These entities can be predatory, invasive, and outright abusive. From frivolous lawsuits and intrusive surveillance to extremist actions that tear apart communities, the potential for harm is significant and far-reaching. In this article, we will delve into the often-overlooked abuses committed by these groups, providing a comprehensive analysis of how their actions impact individuals and society at large.


family who relocated with Bond & Leiter
No matter who you are, or where your from, their are likely better options for maintaining a secure and private life elsewhere

Why We Are Writing This Article


It is our hope, that sharing a very brief behind the scenes into world affairs, that one might understand how their livelihoods, reputations, and liberties are at risk. Even if you consider yourself a "normal person". Your identity is the target of bad actors, your daily life is the target of big tech, and your political and religious views may be under attack by governments.


We say everything in this article, to say that whether you are an average person or your an ultra high net-worth family, there are predators circling your camp ready, at the drop of a hat, to take what you have.


Why We Call Lawyers, Investigators, and Extremist Predators


Attorneys & Lawyers


There are bad apples in every bunch. It is no secret that the legal community is predatory. All one has to do is look at how large many law firms are to understand how much money they make. They seek to devour every asset a person has worked for under the guise of protecting their clients interests. Yes, there is a place for lawyers, but far too often they are there to ruin you. Perhaps you have some experience in this regard.


Private Investigators


There is a constant abuse of information private investigators obtain going on daily. In the United States, private investigators are licensed in most states. However, the length and breadth they go far exceeds what most people believe is possible.


Investigators will uncover your social media, track your online activities, find where are your bank accounts are with balances, pull blind credit reports where you won't know who pulled the report, and more.


Big Data & Social Media


With the likes of Google, Facebook, and TikTok (all spying on you), people, in vanity, share their lives. But these apps are also secretly working in the background to know who all your contacts are, where you are going, and where you have been, besides a plethora of other information.


Extremists / Activists


Of course you have people who behave worse than animals who are burning cities, destroying property and acting like demonic hordes you would see on Lord of The Rings. These same activists hire lawyers and private investigators to get details about companies, executives, and employees for the purpose of their harassment.


Summary For Our Target Audience


These people want what you have. Our article will share some more, but we have paraphrased it up to this point.


If you are the CEO of a company, or even an employee in a company with controversy, if you are wealthy, if you are an entrepreneur, if you have certain religious affiliations or you are sick of your governments over reach, perhaps you should read on.



Lawyer looking like a shark  - Bond & Leiter
We all have love hate relationships with lawyers. We love them when they fight for us, and hate them when they're out for all we have worked for

The Predatory Nature of Lawyers


Frivolous Lawsuits and a Litigious Society


Verifiable Example: The Case of SLAPP Lawsuits


Strategic Lawsuits Against Public Participation (SLAPP) are a well-known example of how lawyers use the legal system to silence critics. These lawsuits are designed to intimidate and burden individuals or organizations with the cost of a legal defense until they abandon their criticism or opposition.


A notable case occurred in 2015 when the energy company Resolute Forest Products filed a $300 million defamation lawsuit against Greenpeace and other environmental groups. Resolute accused them of defamation and racketeering after they criticized the company’s logging practices. Although the case was ultimately dismissed, it exemplifies how powerful entities can use the legal system to suppress dissent.


Verifiable Example: The “Debt Collection Lawsuit” Tactics by Predatory Law Firms


A troubling example of predatory practices by law firms involves the aggressive use of debt collection lawsuits to strip individuals of their assets, often for small amounts of debt. Some law firms, working on behalf of creditors or debt buyers, file lawsuits for relatively minor debts, such as unpaid medical bills or credit card balances. These lawsuits are frequently filed in bulk, targeting thousands of individuals, many of whom are unaware they are being sued.


Verifiable Example: The Case of Portfolio Recovery Associates


Portfolio Recovery Associates (PRA), one of the largest debt buyers in the U.S., has been involved in numerous lawsuits where they, along with their legal representatives, sued individuals for small amounts of debt. In many cases, the debts were several years old, and the statute of limitations had expired, but the law firm representing PRA would still pursue these claims. Often, the defendants were unaware of their rights or unable to afford legal representation, leading to default judgments being entered against them.


These judgments allowed PRA and the law firm to garnish wages, seize bank accounts, or place liens on property, effectively stripping individuals of their assets for relatively minor debts. In some instances, the costs of the lawsuit, including legal fees and court costs, far exceeded the original debt, further burdening the defendants.


This practice is particularly insidious because it often targets vulnerable individuals who lack the resources to defend themselves in court. The result is a devastating financial impact on those least able to afford it, all for the recovery of relatively small amounts of money. The Consumer Financial Protection Bureau (CFPB) has taken action against some of these practices, but the problem persists, highlighting the need for stronger protections against predatory legal tactics.


Private investigator looking at a bank account
Private investigators can, do, and will find your location, bank accounts, and contacts

The Invasive World of Private Investigators


Intrusive Surveillance and Data Exploitation


Verifiable Example: The News of the World Phone Hacking Scandal


In 2011, it was revealed that the British tabloid "News of the World" had been involved in widespread phone hacking. Private investigators hired by the newspaper hacked into the voicemails of celebrities, politicians, and even crime victims, including the murdered teenager Milly Dowler. The scandal led to the closure of the newspaper, multiple arrests, and the Leveson Inquiry, which examined the culture, practices, and ethics of the British press.


This case illustrates how private investigators can overstep ethical boundaries, engaging in illegal surveillance to gather information.


Methods Used by Private Investigators


Location Tracking via GPS Devices

  • Example of Abuse: Some private investigators use GPS tracking devices to monitor an individual's movements. These devices can be discreetly attached to a person’s vehicle, providing real-time updates on their location. While such tracking can be legal with proper consent, it has often been abused. For example, in a case in 2010, a woman in California discovered a GPS tracker hidden in her car. It had been placed there by a PI hired by her estranged husband during a custody battle.

  • There are numerous other cases of executives and average people being GPS tracked.


Accessing Financial Information

  • Example of Abuse: Private investigators can sometimes access an individual’s financial information, including bank account balances, credit reports, and transaction history, through various means, even without pretexting (where the investigator pretends to be someone else to obtain private information). In a notable case from the early 2000s, investigators hired by Hewlett-Packard used pretexting to obtain the phone records of journalists and board members during a leak investigation. The PIs involved pretended to be their targets to access sensitive information, which led to a major scandal and criminal charges for those involved.


Social Media and Digital Footprinting

  • Example of Abuse: Social media has become a treasure trove for private investigators. By scouring public and private profiles, PIs can piece together a detailed digital footprint that reveals an individual’s habits, connections, and locations. In some cases, investigators have used fake profiles or social engineering tactics to befriend targets online, gaining access to private information that would otherwise be inaccessible. For instance, during a divorce case, a PI may use social media to gather evidence of infidelity or other behaviors that could impact the legal outcome, even if that information is obtained through deceptive means.


Surveillance and Photography

  • Example of Abuse: Surveillance remains a core tool for many private investigators. This can involve following a target, taking photographs, or recording video of their activities. Such surveillance is often used in cases of suspected infidelity or insurance fraud. However, there have been numerous cases where PIs have crossed the line, engaging in illegal stalking or harassment. A high-profile example occurred in the 1990s when Princess Diana was relentlessly pursued by private investigators and paparazzi, contributing to the circumstances that led to her tragic death. Although the PIs involved were not acting illegally in all instances, the ethical boundaries were clearly overstepped.


Phone and Email Hacking

  • Example of Abuse: Although illegal, some private investigators have resorted to hacking into phones and email accounts to obtain confidential information. The News of the World phone hacking scandal, where private investigators were hired to illegally access the voicemails of celebrities, politicians, and even crime victims, is a notorious example of such abuse. The scandal, which erupted in 2011, led to the closure of the newspaper, criminal prosecutions, and widespread public outrage over the violation of privacy.


Data Brokers and Public Records

  • Example of Abuse: Private investigators often purchase information from data brokers, who collect and sell personal information from public records, online activities, and other sources. This data can include addresses, phone numbers, property ownership, and even marital status. While much of this data is legally obtained, the lack of regulation around data brokers means that individuals often have no idea how much of their personal information is being sold and to whom. In 2018, a data breach involving the company Exactis exposed personal information on 340 million people, including sensitive details like home addresses and phone numbers, all of which could be easily accessed by PIs or other malicious actors.


The Consequences of These Invasive Practices

The abuse of these methods by private investigators can have severe consequences for the individuals targeted. Victims may experience harassment, loss of privacy, financial loss, and significant emotional distress. The threat of exposure, blackmail, or reputational damage can lead to lasting harm, particularly when the information obtained is used in legal disputes, media scandals, or personal vendettas.


Moreover, the ease with which private investigators can access and exploit sensitive information raises broader concerns about the erosion of privacy in the digital age. With minimal regulation and oversight, the potential for abuse remains high, leaving individuals vulnerable to the invasive tactics of those willing to pay for their services.


The Ethical Quagmire of Computer Hacking and Surveillance


Verifiable Example: The Ashley Madison Hack

In 2015, the infidelity website Ashley Madison was hacked, and the personal details of its users were leaked online. This breach exposed millions of people to potential blackmail, embarrassment, and in some cases, led to suicides. While the hackers were not private investigators, the incident is an example of how sensitive information can be weaponized, often by those seeking to exploit it for personal gain. Private investigators, who sometimes use hacking tools to obtain information, can be similarly invasive and unethical in their methods.


The Dangers of Extremists and Activists


Extremists: Tearing Cities Apart


Verifiable Example: The 2020 Black Lives Matter Protests


The Black Lives Matter (BLM) protests that erupted across the United States in 2020 following the killing of George Floyd by police in Minneapolis are a complex example of how extremist actions within a larger movement can tear apart communities. While the majority of the protests were peaceful and aimed at addressing systemic racism and police brutality, certain elements within these movements engaged in violent and destructive behavior.


In cities like Minneapolis, Portland, Seattle, and Kenosha, protests were marred by rioting, looting, and arson. The Minneapolis protests, for instance, led to the destruction of hundreds of businesses and significant property damage, including the burning of the Minneapolis Police Department's Third Precinct. The total cost of damage from the unrest across the country was estimated to be between $1 billion and $2 billion, making it the most expensive civil unrest in U.S. history.


This destructive behavior, though carried out by a minority of participants, overshadowed the peaceful protests and the legitimate calls for justice, leading to a deeply polarized national response. These events illustrate how extremist actions within a movement can not only harm the cause but also result in widespread societal and economic disruption.


Activists: Harassment and Invasion of Privacy


Verifiable Example: The Extinction Rebellion Protests


In 2019, the environmental activist group Extinction Rebellion (XR) staged a series of protests in London, including blocking major roads, disrupting public transport, and even targeting the London Stock Exchange. While XR’s cause—raising awareness about climate change—is legitimate, their methods have been criticized for causing significant disruption to ordinary people’s lives. Moreover, in 2020, XR activists targeted the homes of several members of parliament, including Boris Johnson, by placing protest signs and graffiti on their properties. Such actions, while intended to draw attention to climate issues, also crossed into personal harassment.


Extreme Activists Target CEOs


I can tell you from infiltrating activists hiding behind non-profit organizations, that they too will hire hackers and private investigators to get information on CEOs and members of companies to which the activists disagree with.


Non profit activists will pay big money for intelligence on the comings and goings of CEOs, where their assets are for sabotage, who their family members and employees are for purposes of harassment.


The Overreach of Big Tech


Surveillance Capitalism: The New Gold Rush


Verifiable Example: The Cambridge Analytica Scandal

The Cambridge Analytica scandal is one of the most prominent examples of big tech’s invasive practices. In 2018, it was revealed that Cambridge Analytica, a data firm, had harvested personal data from millions of Facebook users without their consent and used it to influence political campaigns, including the 2016 U.S. presidential election. Facebook was heavily criticized for its role in the scandal, as the data was obtained through a loophole in Facebook’s privacy policies. The incident exposed the dangers of surveillance capitalism, where personal data is collected and exploited for profit and political manipulation.


Censorship and Manipulation


Verifiable Example: Twitter and the Hunter Biden Laptop Story

In October 2020, Twitter and Facebook faced backlash after they limited the distribution of a New York Post story about Hunter Biden, the son of then-presidential candidate Joe Biden. The story alleged corruption involving Hunter Biden and his business dealings in Ukraine. Twitter blocked users from sharing the link to the story and even temporarily suspended the New York Post's account. Critics accused the platforms of censorship and political bias, arguing that their actions were an attempt to influence the outcome of the 2020 election. This incident highlights the significant power that big tech companies hold in controlling the flow of information.


Government Abuses: The Global Perspective


The Surveillance State: From the USA to the UK


Verifiable Example: The PRISM Program


The PRISM program, revealed by Edward Snowden in 2013, is a clear example of government overreach in surveillance. PRISM allowed the U.S. National Security Agency (NSA) to collect internet communications from major tech companies like Google, Facebook, and Microsoft without a warrant. This mass data collection was conducted under the guise of national security, but it involved the surveillance of millions of innocent people, both in the U.S. and abroad. The revelation of PRISM sparked a global debate about privacy, government overreach, and the balance between security and civil liberties.


Verifiable Example: The UK’s Investigatory Powers Act (Snooper’s Charter)


The Investigatory Powers Act 2016, often referred to as the "Snooper's Charter," gives UK authorities broad powers to monitor internet use, phone calls, and text messages. It requires internet service providers to keep records of users’ online activity for up to a year and allows the government to access this data without a warrant. Critics argue that the law infringes on privacy rights and gives the government excessive surveillance powers. The act has been challenged in court, but it remains a significant example of how governments can abuse their power in the name of security.


Jehovah's Witnesses targeted at home by Russian military police
Countries such as Russia and China oppose the freedom of religion

The Weaponization of Law Enforcement


Verifiable Example: The Treatment of Jehovah's Witnesses and Uyghur Muslims in China


The Chinese government’s treatment of the Uyghur Muslim population along with the Jehovah's Witnesses in Xinjiang is a grave example of the weaponization of law enforcement.


Reports indicate that over a million Uyghurs have been detained in reeducation camps, where they are subjected to forced labor, indoctrination, and even torture. Thousands of Jehovah's Witnesses have faced the same, with reports that they are chained in such a way that they must walk bent over with their legs crouched as the shackles go from their wrists, under their legs and down to their feet.


The Chinese government has used its law enforcement agencies to suppress culture and religion, framing it as a counter-terrorism effort. This systemic abuse of power has been widely condemned by the international community, yet it continues unabated.


Let's Not Forget Russia

Religious groups in Russia have their faces beat in, false information planted and their properties taken away because of the Russian Governments collusion with the Russian Orthodox Church.


Who Is a Target?


High-Net-Worth Individuals (HNWIs) and Ultra-High-Net-Worth Individuals (UHNWIs)


HNWIs and UHNWIs are often prime targets for predatory lawyers, private investigators, and activists. These individuals have significant financial resources, making them attractive targets for frivolous lawsuits aimed at extracting settlements. Private investigators are frequently hired to dig into their personal lives, searching for any information that could be used in legal battles or to damage their reputations.


For example, Jeff Bezos, the founder of Amazon, was targeted in a high-profile case involving the National Enquirer, which published private texts and photos of him in 2019. Bezos alleged that the tabloid was trying to blackmail him, a claim that was supported by evidence suggesting that private investigators were involved in obtaining the information.


CEOs and C-Level Executives


CEOs and other C-level executives are also frequent targets of activists and extremists. Their positions at the helm of large corporations make them symbols of the issues activists oppose, from climate change to labor rights. This has led to incidents where CEOs have been doxxed, harassed, or even had their homes targeted by protesters.


For instance, in 2014, the CEO of Mozilla, Brendan Eich, resigned after activists discovered that he had made a donation to a campaign opposing same-sex marriage. The ensuing backlash, fueled by online activists, pressured him into stepping down, highlighting how public and private lives of executives can be scrutinized and exploited.


Whistleblowers


Whistleblowers, individuals who expose wrongdoing within organizations, are particularly vulnerable to retaliation from both corporations and governments. They often face legal challenges, surveillance, and even imprisonment.


One of the most prominent examples is Edward Snowden, who exposed the NSA’s PRISM program. After leaking classified information, Snowden was charged with espionage and had to flee the United States, seeking asylum in Russia. His case underscores the risks faced by those who dare to speak out against powerful entities.


Average People


While HNWIs, CEOs, and whistleblowers are obvious targets, average people are not immune to these abuses. Frivolous lawsuits can target anyone, as can invasive surveillance or information gathering by private investigators. Activists and extremists may target ordinary citizens if they perceive them as adversaries.


In 2020, during the George Floyd protests, several ordinary citizens were harassed or physically attacked by extremists and activists who accused them of opposing the movement. In one case, a couple in St. Louis, Missouri, was filmed brandishing firearms outside their home after protesters broke through a gate in their neighborhood. The incident sparked a national debate, but it also highlighted how average people can become targets in times of social unrest.


Conclusion


The abuses perpetrated by lawyers, private investigators, extremists, activists, big tech, and governments represent a significant threat to the values of justice, privacy, and freedom.


While these entities can and often do serve important roles in society, their actions must be held to account. The litigious nature of modern society has empowered lawyers to exploit the legal system for personal gain, while private investigators invade privacy with little oversight. Extremists and activists, though often driven by legitimate grievances, have increasingly resorted to violence and harassment, undermining their causes.


Big tech companies have built empires on the exploitation of personal data, while governments around the world have embraced surveillance and repression as tools of control.


As we move forward, it is crucial that we remain vigilant against these abuses.


Bake Street helps our clients by creating a more secure life through privacy practices, threat assessments, and moving our clients to locations where their businesses and livelihoods have less risk.



Comments


bottom of page