Most Shared

How to Disappear: Secrets of the World’s Greatest Privacy Experts

You could easily mistake Alec Harris for a spy or an escaped prisoner, given all of the tradecraft he devotes to being unfindable. Mail addressed to him goes to a UPS Store. To buy things online, he uses a YubiKey, a small piece of hardware resembling a thumb drive, to open Bitwarden, a password manager that stores his hundreds of unique, long, random passwords. Then he logs in to Privacy.com, a subscription service that lets him open virtual debit cards under as many different names as he wishes; Harris has 191 cards at this point, each specific to a single vendor but all linked to the same bank account. This isolates risk: If any vendor is breached, whatever information it has about him won’t be exploitable anywhere else.

Harris has likewise strictly limited access to his work and personal phone numbers by associating his main phone with up to 10 different numbers. He has burner numbers and project-specific numbers, a local-area-code number to give out to workers coming to his house, a dedicated number for two-factor authentication, and a number from a city where he previously lived that he doesn’t use much anymore but is helpful for ambiguating his identity in databases. He has additional numbers that, through a fancy hardware modification, even his mobile carriers can’t associate with the device. He can also open multiple browser sessions on the phone, each showing a different IP address, which limits tracking and prevents websites from aggregating information about him.

In a safe at home, Harris keeps prepaid anonymous debit and gift cards (Google Play, Apple Gift), prepaid SIM cards, phones for use in Europe, a Faraday bag (to shield wireless devices from hacks and location tracking), a burner laptop, and family passports. He also carries a passport card, a wallet-size government-issued ID that, unlike a driver’s license, doesn’t show his address. When using Uber, he provides an intersection near his house as his pickup or drop-off point. For food deliveries, he might give a random neighbor’s address and, after the order is accepted, message the driver, “Oops, I typed out the address wrong. Let me know when you’re here, and I’ll run out.”

Harris is the CEO of HavenX, a firm that provides its clients with extreme privacy and security services. It was spun off from Halo, which focuses on government clients, in 2023. HavenX customers, some of whom pay tens of thousands of dollars a month, typically face serious threats. Some are celebrities or ultra-wealthy families. Others are business executives—interest from this group has risen since the killing of UnitedHealthcare CEO Brian Thompson last year. The recent Signal leak, too, in which the editor in chief of this magazine was erroneously added to a high-level Trump administration group chat, triggered more than a few corner-office freak-outs. Many HavenX clients come from the cryptocurrency world: Some made a fast fortune and, because they can’t park their crypto in a bank, are unusually vulnerable; some run crypto companies and are seen, accurately or not, as controlling access to other people’s digital wealth. The recent crypto-market boom has brought a wave of kidnappings, in which some crypto owners have even been held for ransom or tortured into surrendering the keys to their coins. Harris said the first quarter of this year was HavenX’s busiest since the spin-off.

Lots of companies, including giants like Kroll, are in the security business, but HavenX has positioned itself as a boutique solver of exotic problems. During one of our conversations, Harris mentioned a recent case where the chief information-security officer at a large company with its own intelligence team called him. An executive at the company was being extorted, and the company’s investigators had managed to link the extortionist to an X account, a Telegram number, and an African phone number, but they hadn’t been able to learn their real-world identity. “That’s where their capability stops,” Harris said. “It’s where we say, ‘That’s interesting,’ and we start.”

Harris’s own privacy concerns are less acute, but he takes both a professional’s and a hobbyist’s interest in cloaked living and finds it useful to have direct experience with methods he recommends to clients. He lives with his wife, Ellyn, a psychotherapist, and their two sons on an affluent edge of Washington, D.C., in a greige clapboard house tucked away on a street that doesn’t get much traffic. A basketball hoop stands at the end of the driveway. When I visited earlier this year, snow covered the front yard, and a braided-rope bone and a red Kong chew toy were half visible.

A tall, fit 43-year-old, Harris answered the door with a welcoming smile. I had been able to find the house only because he told me the address in advance. When I’d looked up his name in a paid database where you can reliably find such information, I’d seen other addresses for him but not this one. After Harris gave me the address, I searched for it and found only the name of a trust. Also: Harris doesn’t have a dog. The toys out front were for show, a subtler version of a fake home-security-system sign.

From a cabinet in his office, Harris pulled a sheaf of legal documents and began to show me how he managed his double life. Achieving residential anonymity had been a process. When he bought the house, he’d set up the trust using a close friend as the trustee; once the home purchase was complete, the friend resigned and named Harris as his successor. Mail sent here, including near-daily Amazon deliveries, is addressed to either the trust or some other name, whether a random pseudonym Harris used when filling out a form or something generic like “postal customer.”

He showed me a holiday card he’d received at the house the day before, and a text exchange from that morning with the friend who’d sent it. “Thanks so much, love the pic on the back,” he had written. “Small favor. Our address is unlisted. So would you mind using this for mail.” Harris had then typed the address of the UPS Store. “Anything with our names on it goes there.” At least one such holiday-card misdirection occurs every year. “This is a super-nice family, and I want them in our lives, and so I want to be nice about it,” Harris told me. As we sat there, a text came in from the friend, affirming that from now on, he’d use the other address.

As Harris walked me through the esoteric gear and practices that let him live as if he’s in Witness Protection, there was a tinge of excitement in his manner, like he was a guitar enthusiast giving a tour of his home studio. Harris is instinctually private. He recalled his mother asking him how school was one afternoon when he was 5. “Fine,” he said. That evening, when she was giving him a bath, she found stitches in the back of his head. He’d fallen at school. “This is 1987,” Harris said, “and the school just didn’t call.”

Today he has professional reasons for not being easily accessible, and his precautions have been effective. After a breach last summer, several HavenX clients who hadn’t done full privacy resets received an email with a picture of their house and an accompanying message: You’ve been watching porn. Pay us one bitcoin and we won’t tell your employer.

“And so my wife got one of those,” Harris recalled, “and I was so pleased ’cause it had a picture of the front of the UPS Store.”

It’s extraordinarily hard, when every one of us is ceaselessly flaking off informational DNA, to live privately. And if you’re targeted by a nation-state with a signals-intelligence dragnet, forget it: Your face, or voice, or gait, or how you move your mouse will betray you. A properly equipped snoop using a method called Van Eck phreaking can replicate the contents of your laptop screen from an adjacent hotel room, even if your computer isn’t equipped for Wi-Fi or Bluetooth, by detecting variations in electromagnetic radiation. The Pentagon has tested an infrared laser, Jetson, that can nail your identity from 200 yards away based on your signature heart rhythms, a Department of Defense official involved with the project told MIT Technology Review. Jeff Bezos claimed he was phished by Mohammed bin Salman, crown prince of Saudi Arabia, who allegedly infected the world’s third-richest person’s phone with spyware via a video attachment in a WhatsApp message. If Bezos was right—the Saudi embassy denied it and an FBI investigation was inconclusive, but UN experts believe the crown prince was likely the culprit—then what hope do the rest of us have?

But for most people, Big Brother is a multinational corporation, thanks to our blithe surrender of privacy over the past two decades in return for conveniences such as free email, supercomputers in our pockets, same-day package delivery, and the names of third and fourth cousins we’d never heard of before. We now inhabit a panopticon of doorbell cameras and traffic cameras and Google Street View cameras and police body cameras and phone cameras and retail security cameras and the cameras of Mark Zuckerberg’s Ray-Ban Meta “smart glasses”; of geolocating phones and AirTags; of eavesdropping Siris and Alexas. Apps and mobile carriers can pinpoint not just what building you’re in, but which floor you’re on, by using your phone’s barometer and GPS, and the strength of your signal.

Much of that information is sold almost instantaneously through an automated shadow economy of location-data brokers. So is your precise behavior in stores such as Walmart, where unseen Bluetooth beacons record which products you linger in front of. So are countless other details about you that you may or may not want people to know. And in the past few years, as corporations have become more and more dependent on cloud storage, the number of data breaches in the United States has exploded, nearly doubling from 1,801 to 3,205 annual incidents from 2022 to 2023, according to the nonprofit Identity Theft Resource Center.

Most of us—ignorant, indifferent, overwhelmed—shrug. At best, maybe we half-heartedly comply with a “Five Things You Need to Do Right Now to Protect Yourself Online” LinkedIn thread, such as using a password manager and two-factor authentication. Others, including Harris and his clients, have taken more radical steps, and they have done so by drawing, knowingly or not, from the tradecraft of a former cop named Michael Bazzell. It was from Bazzell that Harris learned how to set up his trust and got the ideas for the passport card and the dog toys. On a bookshelf in his home office, alongside Jaron Lanier’s You Are Not a Gadget, is Bazzell’s exhaustive guide to this dark 21st-century art: Extreme Privacy: What It Takes to Disappear.

Bazzell is something of a real-life Ed Galbraith, the Breaking Bad character known as the Disappearer, who sells and repairs vacuums by day, and by night sets people up with new lives and identities. Unlike Galbraith, who offered his services to fugitives, Bazzell consulted for law-abiding people who wanted to be unfindable by strangers. Some were government officials who’d put violent people behind bars or been swarmed by online mobs. Some were entertainers who wanted to be famous but also have peace of mind. Some were targets of deranged obsessives, such as homicidal exes. Some were dangerously rich. And some simply objected to the nosy predations of surveillance capitalism.

Bazzell also published several thick editions of his privacy bible and recorded hundreds of podcast episodes on topics such as “Lessons Learned From My Latest Doxxing Attack” and “Consequences of Product Refunds.” Over time, he developed an audience that was similarly enthralled by privacy and excited by the rigor and creativity he brought to the subject. Issues of his Unredacted extreme-privacy e-zine would typically get more than 60,000 downloads.

Then, in September 2023, all 300-plus episodes of his podcast vanished from the internet, and Michael Bazzell disappeared. Devoted fans speculated that he had died, had been abducted, was in a foreign prison, or had had a nervous breakdown. Two months later, he published a blog post, “My Irish Exit,” explaining that an opportunity had come up for him to spend three months as an “imposter” in the world of the rich and famous, which he normally served but otherwise kept at a distance. “What’s next? I am not ready to share that, and may never go public with it. I have my aliases established. The shell company is in place. The anonymous payment account is ready.” He continued, “The better question is, what is YOUR next chapter?” His website kept operating, but it said Bazzell’s firm was no longer taking on new clients.

Bazzell had had his own awakening in 2001, as an Illinois beat cop turned cybercrime detective. His work had led to the arrest of a local elections official for soliciting sex from a 14-year-old girl. Amid the ensuing media coverage of that and similar arrests, internet anons made death threats against Bazzell, and he was shocked to learn how easy it was to find his home address online. Soon after, browsing at the library, he discovered How to Be Invisible, a book by a missionary named J. J. Luna. Assigned to the Canary Islands in the 1960s, when Spain’s Franco government was persecuting Protestants, Luna was forced to live undercover. When he returned to the U.S. in 1988, he decided to maintain his private lifestyle and publish a book showing others how they might do the same, using LLCs, “ghost addresses,” and other tricks.

Bazzell resolved to execute all of the practices Luna recommended, effectively going off the grid. Over time, student surpassed teacher. Bazzell pioneered or updated many of the privacy hacks now taken as standard. To obtain an ID without betraying one’s location, Bazzell recommended establishing residency in South Dakota, which is distinctly friendly to year-round RVers and other nomads. For sending mail without divulging your address, Bazzell preferred a private remailer service also based in South Dakota. He was a proponent of “data poisoning”—the deliberate spreading of disinformation about oneself by, for instance, subscribing to magazines or signing up for internet service using false personal details—to make it harder for anyone to locate your real information. He helped clients with the financial means obtain second citizenships. His podcast often focused on products he’d been testing that were privacy-enhanced alternatives to mainstream devices and apps, such as Tuta (an email and calendar service), Linux Pop!_OS (an operating system), and MySudo (an app for managing online identities).

Though he catered to people in dire situations, Bazzell also experimented on himself. To ensure that his cellphone was never associated with his address, he kept it off and in a Faraday bag until he arrived at a four-way intersection some distance from his home. He submitted a fake obituary for one of his aliases to Legacy.com. Mindful of the increasing prevalence of automated license-plate readers on tow trucks, taxis, police cars, and other vehicles, he used magnetic license-plate holders and removed his plates whenever he was parked somewhere overnight. Forgoing cloud storage, he backed up his data on a flash-memory card the size of a fingernail, concealed the card in a hollow nickel, and then, while in the bathroom at a friend’s house, unscrewed an electrical plate and hid the coin behind it. (When he later needed to access the backup, he had to call the friend and reveal what he’d done.) He set up a bait website with his real name and connected it to some analytics software in order to glean information about who was doing searches on him. He’d routinely investigate himself, scouring databases to make sure he couldn’t find actionable information on his own whereabouts. To throw off gait-recognition systems, which have popped up in Beijing and Shanghai, among other places, he tried wearing two sizes of the same shoe.

All the while, Bazzell remained a cipher. He never revealed where he lived or spoke of his personal life, and you couldn’t easily find a photo of him. But several years ago, he befriended a writer and podcaster named Javier Leiva, and three episodes of Leiva’s own podcast, Pretend, focused on Bazzell and his work. It proved a tricky project. “We all use Google apps,” Leiva told me. “That did not fly with Michael Bazzell. We had to use encrypted note-taking apps. It was a process. Nothing was easy.” Leiva recalled Bazzell saying that when he attended his sister’s wedding, he prearranged for the photographer to keep him out of shots.

On a recent Sunday, after several weeks of back-and-forth mediated by one-named associates of Bazzell’s (“Laura,” “Samantha”), and after I gave an assurance that I wouldn’t record our conversation, Bazzell called me on Signal from a number he told me he’d created just for our interaction and would become useless 10 minutes after it ended. We spoke for more than an hour, and he cleared up a few things. Leiva had speculated to me that Bazzell kept his podcasts off the internet because of a concern about voice cloning, but Bazzell gave a simpler explanation: Much of the information was now out-of-date. “I enjoyed it,” he said. “But the market is saturated now. There are so many YouTubes and podcasts.”

On the subject of tradecraft, Bazzell also told me that he follows what privacy people call a “gray man” strategy—doing whatever he can to not draw attention. “I don’t wear logos on my clothing,” he said. “If I’m in New York, I’m probably wearing a lot of dark-gray clothing to blend in. On a Caribbean island I don’t, because it would stick out.” Nor will you find him driving a Cybertruck; he opts for popular cars in popular colors. An irony of the life he’s chosen is that out-of-date tech can make for the most up-to-date privacy strategy. He tells clients not to back up their home security cameras to the cloud. Instead of using Spotify, he listens to music on a portable player with a 1.5-terabyte card holding “every album I can imagine wanting.”

Neighbors who know Bazzell’s real first name don’t know his last. Some of the people who work for him have met him, but none of them are employees. Each of his “colleagues,” as he calls them, has an individual LLC. He doesn’t know their Social Security numbers or dates of birth. He wants them to understand privacy by practicing it.

Bazzell has long spoken about “privacy fatigue,” an avocational hazard given the constant vigilance that extreme privacy measures entail and the technological complexity they can involve, but after 20 years, he told me, it doesn’t affect him anymore. Recently, he’s been working on ways to inject false information into the troves of breached data that surface on the internet.

Although it has become harder than ever to be private, “the good news is, more people are grasping the concepts,” Bazzell observed. “People now understand why us privacy weirdos have been making noise about this for so long.”

Illustration by Mike McQuade. Source: JHU Sheridan Libraries / Gado / Getty

There’s a cost to living this way. To do it right, severing your present self from the history you’ve accrued in corporate databases, requires a complete reboot. This means either becoming fully nomadic or moving homes and implementing privacy from day zero of your new life. You must consider everything from your car’s registration to your house’s utility hookups, and the measures required to prevent a misstep can be comically elaborate. A reboot is common in Bazzell world. Alec Harris did one too. Because utilities want to know who’s going to be paying the bills at a particular residence, Harris, when setting up water and gas, offered a $500 deposit and, to persuade the customer-service reps to forgo a personal name on the accounts, claimed he was a property manager named Tom. “The owner’s a nutjob, so help me out here,” he told the technicians. “And they were like, ‘Okay.’”

Buying a car presents special difficulties. Harris likens them to cellphones for how they collect and upload information—about your location and driving behaviors, among other things. A work-around Bazzell likes is to buy fleet insurance (designed for companies that operate a fleet of vehicles), which you can do through a business entity, but that approach is expensive. Instead, Harris followed a detailed script laid out by Bazzell, calling a dealer to say he wanted to come in for a test drive, then canceling at the last minute, then calling again when he was outside the dealership and trying to fast-talk a salesman into forgoing the usual ID check. They looked at him. “They were like, ‘Yeah, you’re not getting in the car without scanning your driver’s license,’” Harris recalled. “My attempt at social engineering was not going anywhere.” He handed over his ID. To buy the car, Harris ended up registering it at an alternative residence, but when he asked whether the dealership could disconnect the built-in GPS, he was told the car wouldn’t run without it.

The rudiments of daily life can also be cumbersome. Harris recalled setting up a new TV with Disney+ and having to undo some autofilled information and replace it with his abstruse AnonAddy email address, then typing out one of his extra-long passwords only to get a character wrong and have to start over—all while his young children became antsy. “And so then you’ve got two kids sitting there, and they’re like, ‘I want Domino’s,’ and ‘I want to watch Mulan.’” He laughed. “That’s the price you pay.”

Sometimes the price is literal. None of the purchases Harris makes through Privacy.com earns credit-card points. “Maybe over the course of some period of time, that means we’re paying for an extra flight somewhere,” he said. He has Amazon Prime, but he can’t use its discount at Whole Foods, because he doesn’t want to use their verification methods. There can be more significant financial consequences as well. “My credit score has decreased,” Bazzell said. “Getting a loan would be difficult. Some consumer databases show me as deceased.”

Harris has also sacrificed convenience. Some of the alt-tech he uses, such as the search engine DuckDuckGo, isn’t always as effective as the mainstream tools. “Sometimes you just need to Google something,” he said. Then there are logistical frictions. Once, at Dulles Airport en route to a wedding in Toronto, he wasn’t allowed through security, because his passport card, although valid for overland entry to Canada, wasn’t acceptable for international air travel. He had to change his family’s flights and run home for his passport.

I confessed that I was already confused. How, for instance, did he remember which of his 10 phone numbers to use for what? “Yeah, I don’t know,” he replied. “It is confusing. And if you were a new client, I would not be dumping this much. We would be starting a little slower.” Living this way, he acknowledged, incurred a “20 percent cognitive” overhead.

As Harris drove us to lunch, we stopped at the UPS Store, where his mailbox was empty. Harris gestured toward the guys behind the counter, whom he and Ellyn had befriended, often ordering food for them during the pandemic. That generosity could make a difference when, say, a letter addressed to the trust came to the mailbox held under his and Ellyn’s names. Though UPS wouldn’t normally deliver that letter, “they let it slide,” he said. Harris has a client in Florida who is diligent about following privacy protocols but is also quiet and a little gruff. “I was like, ‘You’ve got to be nice to these people,’” Harris recalled. “‘You come off as kind of not warm, and so you need to turn on the charm a little bit.’”

This is the behavioral side of privacy. If you’re committed to being private, you can’t indulge your everyday asocial tendencies. Imagine, Harris will say to a client, doing all of this work, then getting into a fender bender: If you start yelling at the other driver, and the accident gets reported to an insurance company, and a plaintiff’s lawyer gets involved, you could find yourself being subpoenaed for documents and more generally having your life probed. Instead, Harris told me, you just need to be like, “Hey, so sorry, let’s take care of this.”

Harris told me it’s important to have “repeatable privacy excuses”—lines to disarm people who might deem a request suspicious. The fictional property manager is one of his. Another is that he works in the privacy business. But he’s uneasy with the constant fibs recommended by Bazzell, who has sometimes told whoppers, such as describing his adult client as a child under the age of 13 in order to get her name and address removed from a website.

During his time in D.C., Harris said he’s known people who previously worked undercover for the government, and has observed the mental and spiritual costs of living inauthentically. “I don’t need to subject myself to that, and I definitely wouldn’t want the kids or my wife to have to live like that,” he said. People who’d lived double lives told him they’d kept their personas “90 percent real, 10 percent fake,” he said. “It’s just easier.”

He told me he hadn’t used the property-manager excuse in years. It turns out that the guy coming over to help you with a water leak generally doesn’t even ask your name. “I don’t have to do a whole story,” he said. “I’ll just say, ‘Hey, do you want a cup of coffee?’ And we’re good.”

Privacy remains a game of haves and have-nots. Harris explained that the majority of HavenX’s clients are in the U.S., partly because many of its techniques are specific to the country’s unique patchwork of federal and state privacy laws. A person who goes by the name “M4iler,” a privacy hobbyist based in the Czech Republic whose phone numbers include one that leads to a recording of Rick Astley’s “Never Gonna Give You Up,” told me, “What Michael Bazzell says is great, and I assume works perfectly in the U.S. if you follow the steps, but laws are different in other countries.” A company doing business under an alias, for instance, isn’t an option there. “So that’s kind of a problem,” he told me.

Celebrities have both advantages and disadvantages when it comes to privacy. Harris noted that if you’re as famous as, say, the Rock or Christina Aguilera, “as soon as you move in, everyone on this block is going to know who you are, as soon as the paparazzi follow you home one night.” But also, he added, they “get to do things that I don’t need to or couldn’t do.” Matt Bills, who is based in Los Angeles and handles the physical side of privacy for HavenX clients, has relationships with concierges at top hotels. “He’ll be like, ‘The Rock’s coming,’” Harris said. “They open up the back door.” Bills told me about a client for whom he’d arranged to have two identical Gulfstreams on an airport’s tarmac, with a fuel truck next to each and a staircase in the middle. They decided which plane the client would board only at the very last minute.

Strong privacy is a luxury good. A rich person can rent an extra apartment just to use as a mailing address; most of us cannot. HavenX’s entry-level service might cost a couple thousand dollars a month, “but it can get up into the tens of thousands a month very quickly,” Harris told me. When I asked which services might cost that much, he mentioned people who need 24/7 monitoring of the dark web for particular information, like a CEO who wants to know immediately if a specific combination of terms shows up in a data breach—such as his name along with his child’s name and the name of the child’s school.

Others, with fewer resources, might sacrifice the normalcy of their lives. Jameson Lopp is a software engineer and bitcoin booster who was living in Durham, North Carolina, when, in 2017, local police received a call from someone who said he had just killed someone at Lopp’s address, was holding hostages, and had rigged the front door with explosives. Lopp’s house was soon surrounded by dozens of rifle-brandishing police. He’d been a victim of “swatting”: a dangerous hoax in which a false report is made to trigger a law-enforcement response to a specific address. Afterward, Lopp resolved not to let something like that happen again. Over the next several years, he spent by his estimation more than $100,000 to effectively disappear, going so far as to rent a decoy apartment and hire private investigators to test his defenses by trying to find him.

Now he runs security for Casa, a company he co-founded that offers safe storage for digital assets. Even his family members don’t know his address, he told me; if they’re visiting, he’ll pick them up at another location and then bring them to his house. His neighbors know him by a different name, and he segregates his relationships, never socializing at the same time with people who know his real name and people who know him by an alias. “A big part of what I do is lying,” he told me, “and I think that that’s one thing that a lot of privacy advocates don’t really talk about: If you really want to be private, you have to get comfortable with lying. You have to think of it as a tool that you’re using to defend yourself.”

Lopp wouldn’t tell me whether he has a spouse or children, but he observed that privacy “becomes an order of magnitude more complex as you add more people into the machinations,” adding that “it very much lends itself to a lone-wolf type of lifestyle.”

“What do you think of our life?” Ellyn Harris asked me. She smiled warmly. “Do you think we’re so weird?”

Alec’s wife, between Zoom appointments, had joined us, and we were talking about raising a family inside a privacy cone. Alec had eased Ellyn into privacy practices, starting with the Bitwarden password manager. “I remember sitting with him on our couch in D.C., in our old condo,” she said, “being like, ‘This seems really hard. I don’t know if I want to do this. I just want everything to be the same word with the same numbers, and I use an exclamation point at the end, so that makes me unique; no one will ever find out. And I capitalized the first letter, so we’re fine.’” She laughed the wry laugh of a privacy vet making fun of her younger self.

But then Alec got her some hidden phone numbers. “I didn’t even think about that,” she recalled. “That was just a way to sneak privacy into my life.” Now living privately no longer feels like such a big deal, and she’s come to appreciate the emotional security that goes with it.

“She was wildly supportive,” Alec interjected.

“You do just get used to it,” Ellyn said. Using tools that at first seem unwieldy, like a password locker, comes to feel easier than not using them. I wondered, given her work in mental health, whether she thought Alec ever edged into paranoia. “There’s this idea in psychology called a learned phobia,” she said, “where, for example, if you observe someone who has a fear of flying often enough, you could actually absorb that fear and that can become yours. So Alec’s paranoia has become mine. So that means we’d both be worthy of diagnosis.”

“We could be in the same mental institution,” Alec said.

“I mean, that’s the dream, right?” Ellyn said.

With workers who came to the house, she started using just her middle name, Leslie, but one time James, the older of their elementary-school-age sons, said, “That’s not your name.” “Oh my God, James, don’t blow my cover,” she said, before explaining to the workman that it was her middle name. But she was clearly not quite as committed as Alec. Whenever a visitor nervously asked where the dog was, Alec would say it wasn’t home at the moment. “Oh,” Ellyn said, laughing. “I’m just like, ‘We don’t really have a dog.’”

Children presented several more layers of complexity. To register with the local public school, which required proof of residence, Alec had met with the admissions director, trust documents in hand. “She had been in this job for a long time,” Alec recalled. “She was like, ‘This is a first.’ She was super nice.” Ultimately, he showed the school where the family lived, and the school agreed not to put the home address in the school directory, and to use the UPS Store address for any mailings.

Ellyn still frets when arranging playdates—she’s trying to make mom friends—but if a mother asks for her address, she’s gotten used to sending a pin drop. When one mom put the Harrises’ address in her contacts, Ellyn found herself saying, “’I’m so sorry, but could you not do that?’ And that’s weird. But the thing is, I just tell them that Alec works in privacy.” And because they live in the D.C. metro area, she went on, “people kind of get it.”

Both Alec and Ellyn are personable, and Alec felt this was also important to the success of their privacy. “I would say other than in this area, we’re not very weird,” he said. “If we were eccentric in all areas of our lives, it would be harder to pull off.”

They know bigger questions loom as their kids get older. One of the more challenging cases Alec has worked on is that of a “very, very wealthy guy” who was involved in the prosecution of a cartel leader, and whose daughter is a young artist who’s starting to achieve some success. “Some days she’s like, ‘Fuck you guys, I’m going to be famous,’” Alec said. “He also wants to enable his daughter to have a regular life.” It’s proved to be a difficult project, he added. “They’ve moved twice.”

For now, the Harrises’ sons are young enough that they’re more interested in whether a package contains Legos than whether it’s addressed to a peculiarly named trust. “Our older one has a little bit of a concept of it”—privacy—“but it’s not their thing to carry,” Alec said. “We’ll have to have some decisions, Ellyn and I will, when they get phones and stuff.”

“I think our older son still is kind of thinking that Alec is a security guard,” Ellyn said.

But to her question: It’s not that I thought their life was weird. I could relate, in a world of nearly inescapable surveillance, to the urge to disappear. But the ongoing, escalating effort required felt Sisyphean to me. And Alec would say that even his approach, which he’d described to me as “extreme,” is a mere half measure. The writer Gabriel García Márquez said we all have three lives: a public one, a private one, and a secret one. “I live in the division between public and private,” Alec told me. He and Ellyn are open with each other. They use a regular bank. They have friends. They send holiday cards. “If you want to live a secret life,” Alec said, “that’s a decision that’s going to have real consequences.”


Source link

Related Articles

Back to top button