JLNich Author Blog Beats Internet Search Counter Surveillance Techniques for Authors Cover Image
JLNich Author Blog Beats Internet Search Counter Surveillance Techniques for Authors Cover Image

Internet Search Counter Surveillance Techniques for Authors.

I am a writer that does my research. While I’m Googling and searching for patterns, trends, information, or examples of things like guns, battles, clothing, DIY options, Psychopaths, and surgical methods to remove bullets out in the field, I have often worried about being listed as a possible terrorist. Back in the days when we heard clicking on the rotary phones (yes, I’m older than you thought) I would say to my girlfriend “grassy knoll”. She would always laugh. But I’d read of a CIA list that the federal department came out with that when spoken on the phone would trigger a recording. Paranoia withstanding, I said “grassy knoll” a lot. The phones were awful back in Mississippi, no offense MS. So how do they do it now? I assume there is a Google bot. And with as much crap in the world nowadays, I don’t really mind. But as a creator… and with all hilarity about this… I would recommend these techniques/solutions to avoid the Google-bot terrorist IP list. Oh, and by the by yes, I will use Google as an action verb. Shaddupaboutit.

Google
Oh, and by the by yes, I will use Google as an action verb.

Image of tablet with Google Search Enginge

1. Google “How to Write a Book” once a week. This should clarify to anyone looking directly at your horrific or odd or weird browser history that you are researching things.

 

2. Alternately, clear your browsing history. At the local level, you are wiping the bad mojo away and if ever there was a raid for any reason, your computer is squeaky clean with soap bubbles, to a degree (see #6 and 7)

 

3. Technique advice no1. add in a Date Range. When searching for criminal activity such as shootings, battery, rape, or awful-awfulness, add in specific dates (i.e., if you are looking at sniper strategy include 1942-1999). This will clearly emphasize your need for historical information and a.k.a.research.

Above view image of woman on a computer with books

Alternately, clear your browsing history.

4. Technique advice no2. broaden the inquiry, initially. You don’t have to double-down to research chemicals that are toxic and were used to kill a VIP at an inauguration. Just back up a step and Google a broader topic such as “attempts to kill public officials dated 1950-1999”. Again, this is a research technique.

 

5. Technique advice no3. follow the blending-in option. Use Google scholar, instead of Google to see what others have researched before you. Then you are not exactly Googling topics but other Googles. Do ya get me? “Or am I being too obtuse?” Shawshank Redemption Quote to remind you of prison.

 

6. Avoid Eye Contact. Learn the passive computer surveillance concepts and how to block them. Remote Monitoring (RMON), Simple Network Monitoring Protocol (SNMP), and NetFlow capable devices all capture data from your system. The amount of data and when is up to the setup. However, buying a VPN will get you a long way to blocking what other peeps see. Virtual Private Network install can hide your search history and other browsing activity, like search terms, links clicked, and websites visited, as well as mask your IP address. And they are relatively inexpensive as a subscription now. Read about them and do some research. Examples might be Cisco Anyconnect, Surfshark, CyberGhost, or NordVPN. Some of these also offer Malware or virus protection included. Do comparisons. Get a nerdy cousin to figure it out. Just do it. Set up reports that are emailed to you about the software. Although, I think of it as an install and forget, don’t. This software needs to have regular updates to keep up with all the crap out there trying to get at you.

Use Google scholar, instead of Google to see what others have researched before you.

Image of Google Scholar

7. Don’t be late for the party. Run Malware and virus software weekly, or even daily, if you want to go that far. Most of us invest in ourselves by taking vitamins, getting regular shots, taking aspirin, drinking O.J., and so on. Think of your computer as a person. Inoculate with a steady diet of Virus protection and Malware removed. Keep that baby in tiptop shape. The software choices are many, but if you buy the license, you can’t go wrong with starting with McAffe or Norton Protect 365.

 

8. Be prepared to explain your actions with your own counterintelligence. Take the above steps to avoid or record stuff. Run reports regularly. I recommend keeping one computer/table/iPad as my writing tool of choice only. Personal stuff like gaming and social activities and checking the ADT cameras for the kids in the pool would be done on other devices. You can also assign a static IP (Internet Protocol) (a digital address number) to this device through your router so that it is isolated and keeps the same name. Then you could run searches on that name to see what or who is capturing it. It might be overkill, but this would keep the IP that anyone sees specific, and you can search on that for feedback instead of some random IP.

 

9. Learn the basics. Maybe I should have put this first, but it’s extra credit beyond the colossal bit of homework I’ve already assigned. Spend a day on YouTube 🡨greatest invention ever, after Google, and research “data mining”. Watch some vids. Do the deep dive to see what companies are doing to capture your info and spit it back out. Just realize they don’t just spit it back out to other companies. There are horrific folks out there waiting to get your stuff and misuse it.

image for cyber security

Run Malware and virus software weekly, or even daily, if you want to go that far.

After all these heavy-duty counter surveillance steps if you don’t feel safe doing an ugly search of ugly stuff, go to the library instead. Encyclopedias are sold still. I can’t picture an author who is not using the internet in some crazy fashion. We definitely need the information and investigation capabilities. Set yourself p for success. Ask questions. Pull that nerdy kid of yours off the beanbag and discuss the basics if you haven’t already. They are virtually the best at successfully hiding themselves online (little buggers). My 8-year-old niece hacked her school tablet to reach YouTube to watch Dhar Mann’s shows. Her words “Dhar Mann changes lives.”

Please subscribe to my website if you want to be notified when I’ll be publishing or to get free samples of my work. Also, see my Patreon sign-up for exclusive access to additional articles and sneak peeks of my WIP chapter by chapter.

JL Nich, SFF Author

Scroll to Top