Free intelligence document
200+ named UK data sources with every removal process and escalation path documented. Compiled from years of professional investigative work, not generic desk research.
Who this is for
You have a public profile: a following, a business with press coverage, a directorship. You've occasionally wondered what someone determined could find about you.
You've heard of Incogni or DeleteMe and assumed they had it covered. They don't. Not for UK data sources. Not if you actually want to be unfindable.
The data sources that matter for a UK individual (LexisNexis, GBG, 192.com, the open electoral register, the credit reference agency marketing pipeline) are not touched by US-focused removal services. They cover the visible tip. The invisible sources underneath are where the damage is done.
The priority matrices inside the dossier give each profile a ranked removal sequence. You start with the sources that matter most for your specific situation, not the ones that make for clean advice.
Why existing solutions fail
They find Incogni or DeleteMe, sign up, feel like something is happening, and then discover six months later that none of the sources they actually worried about have been touched. Because those services were built for the US market.
The people who go further find the ICO's guidance and template letters. Generic GDPR advice. But nowhere does it tell you which platforms actually hold your data, how hard removal is, what happens when they refuse, or which sources matter most for you.
The people who go further start digging themselves. They find 192.com. They opt out of the open electoral register. They feel like they've won. They've only removed the visible tip. The entire infrastructure underneath stays untouched.
The problem is not motivation. The problem is that the information required to do this properly has never been published in one place for the UK market. The people who have it are either using it professionally to find people, or selling incomplete versions to businesses as compliance advice.
The mechanism
Start from the attacker's toolkit. Remove yourself from every source they check. Work from the roots up, not the leaves down.
I spent years as an OSINT investigator building intelligence reports on individuals for law firms, corporate clients, and investigation firms. The methodology is legal. The tools are freely available. The results consistently astound: the amount of information that surfaces about an ordinary person from entirely open sources is roughly ten times what they expect.
When I shifted into privacy protection, I didn't start with a generic checklist. I mapped every source I'd actually used to find people professionally, then worked backwards through each one to find the removal path.
That's the Investigator-Reversal Method. Attack the root sources first: LexisNexis, GBG, the credit reference agencies, the open electoral register. Removal cascades across dozens of downstream aggregators automatically. Opt out of the open register and 192.com loses its primary feed. Get a suppression from LexisNexis and you cut off the commercial data brokers at the source.
This document gives you that map: every source an investigator checks, every removal process based on direct submission experience, and every escalation path for when they refuse.
Differentiation
What you're getting
No card required. Delivered instantly to your inbox.
Used by online influencers, C-suite executives, and high net worth individuals.
No card. No subscription. One email with your download.
About the author
I'm Aaron. I spent years building intelligence reports on individuals for law firms, investigation firms, and corporate clients. Nothing but open source data. What shocked me wasn't how easy it was to find people. It was how invisible the subjects were to their own digital footprint.
I've written hundreds of these reports. Electoral register data. Family connections via social media. Geolocation patterns. Home addresses. All legal. All discoverable by anyone with methodology. Most people have no idea.
The removal processes in this dossier aren't theoretical. I've submitted them. Hundreds of them. What's here is what actually works, not what the privacy policies claim works.
Having mapped hundreds of digital footprints, the pattern is always the same: people underestimate how many places hold their data by a factor of ten. And they almost always focus on the visible sources while the invisible ones do the real damage.
Read it. If you don't find at least five specific sources where your personal data is currently exposed that you weren't previously aware of, email me directly and tell me what I missed. I've never had that email. Everything documented here is based on direct submission experience. If a process doesn't work as described, I want to know.
Common questions
Free intelligence document
200+ named UK sources with every removal process and escalation path. No card required.
No card. No subscription. One email with your download.