Читать книгу THE LIFEBOAT STRATEGY - Mark Nestmann - Страница 13
…But There Are Solutions Available
ОглавлениеFortunately, for every one of the issues I’ve highlighted, there are solutions. For 25 years, I’ve been researching and writing about them, and more recently, I’ve helped hundreds of clients and their families protect their privacy and wealth from these very threats. Within the pages of The Lifeboat Strategy, you’ll learn how to:
• Shut the door on frivolous lawsuits. One of the simplest ways to prevent frivolous lawsuits is to make certain that any assets you own are pledged to another person or entity. No attorney is likely to sue you if there aren’t any assets available for recovery. A mortgage on your home is a great example, but there are many others. A more sophisticated strategy involves licensing key aspects of your business to another company, with your business making regular (and tax-deductible) licensing fee payments. Perhaps that second company is owned by an asset protection trust. The result: your business is no longer a “honey pot” for litigation. You’ll learn more about these concepts in Chapters 4 and 5.
• Restrict access to your electronic data. It’s easy to protect your electronic privacy by taking a few basic precautions. The most fundamental precaution is encryption. With an encryption program, no one but you and your intended recipient can read your e-mail messages, text messages, instant messages, etc. You can even encrypt your entire data stream to protect all records of your online life from prying eyes. You’ll learn how to do that in Chapter 3.
• Protect your assets from divorce. The safest way to prevent a nasty divorce is to never get married. But most people do anyway. One of the best ways to protect your finances in a marriage is a trust. Just make certain you set it up before you get married, ideally in an offshore jurisdiction that doesn’t enforce foreign divorce judgments. In the right circumstances, pre-nuptial agreements can be effective as well—although not all states recognize them. You’ll learn more about these arrangements in Chapters 4 and 5.
I’ve designed this newest edition of The Lifeboat Strategy to provide practical strategies against today’s threats to privacy and wealth. When you’ve finished reading it, you’ll know simple techniques to stop identity thieves in their tracks, make your wealth legally disappear from the surveillance “radar screen,” and understand how to protect wealth you simply can’t afford to lose. Along the way, you’ll learn dozens of hands-on methods you can use everyday to avoid unnecessary scrutiny by sue-happy lawyers, the IRS, or someone holding a grudge against you. And you’ll develop that most important defense against invasions of your wealth and privacy: a private attitude.
Here’s a glimpse of what you’ll learn in Volumes 1 and 2 of The Lifeboat Strategy and in the bonus report accompanying it:
• 19 types of public records—available to anyone—that can be used to steal your identity.
• Your "right to silence" is narrower than you think!
• How businesses use "data mining" to deliver personalized, interactive messages of persuasion—and how government agencies can gain access to the results.
• The 10 worst electronic eavesdropping threats.
• The giant hole in "caller ID blocking."
• Do you fit the definition of a "terrorist?" If you are a member of any of these organizations, you may.
• Tax avoidance vs. tax evasion—what's the difference?
• If you fit any of more than 60 "profiles," your assets can be seized, without being convicted of a crime.
• Are you a "racketeer?" If you've ever made this simple mistake, you probably are.
• How withdrawing lawfully earned money from your own bank account can land you in prison.
• The secret global network that monitors all international telecommunications.
• Six legitimate ways individuals use offshore centers.
• 27 strategies to prevent identity theft—and five
"must-do" steps to take if you're a victim.
• What to do if police want to search you, your vehicle, or your home.
• How to avoid looking like a "money launderer."
• 14 ways to preserve postal privacy.
• Six tactics for private phone service.
• How to obtain insurance privately.
• Eleven ways to achieve "residential anonymity."
• 23 tactics to audit-proof your tax return.
• Nine tips for private banking.
• Six gold and silver investments you can buy and sell privately.
• Nine hiding places for your valuables.
• An ideal business for privacy seekers.
• 19 ways trusts protect privacy and wealth.
• Using corporations, limited liability companies, and other business entities.
• Three types of international bank accounts - which one is right for you?
• An anonymous safety deposit box.
• How to move money privately.
• How to invest your IRA or pension internationally.
• U.S. laws for reporting wealth held internationally – and strategies to legally avoid them.
• Using offshore life insurance and annuity policies for privacy, asset protection, and tax avoidance.
• Low cost alternatives to offshore trusts.
• How to structure offshore businesses to legally defer profits from U.S. taxes.
• The nine best jurisdictions for investing and doing business offshore.
No book of this length and level of detail can possibly be 100% error-free. Please contact me with your corrections, suggestions, criticism, or praise. As I investigate, research, and write on these topics, I publish updates to this book and other publications. You can sign up to be notified of any updates at www.nestmann.com.
I am writing these words in March 2011. All the suggested strategies that are contained in this book are, to the best of my knowledge, legal as of March 1, 2011.
One final introductory note: for your convenience, this book contains hundreds of links to Web sites. These links constantly change and you may find the one you need to be out of date. In many cases, all you need to do is to shorten the link to retrieve the data you need. For instance, to opt out of having your personal data sold to direct marketing companies by Acxiom Corporation, you need to complete an online request form at http://www.acxiom.com/ opt-out-request-form. If Acxiom changes this link in the future, you’ll probably be able to retrieve the new link by visiting http://www.acxiom.com and following the prompts.