1. Monitoring
1.1. Monitor your financial statements
1.2. Monitor social security statement
1.3. How to detect Identity theft
1.4. Search your name, address, phone number on google
2. Travelling
2.1. What to keep
2.1.1. Only relevant stuff
2.2. What not to keep
2.2.1. IDs Irrelevant to the trip
2.3. Secure your home and office before leaving
2.4. Securing luggage and backpack
2.4.1. What kind of luggage/backpack to never use
2.4.2. TSA friendly locks
2.5. Secure your wallet
2.5.1. Do not keep social security card, excess credit/debit cards
2.5.2. ATM receipts/ credit card statements
2.6. Evaluate after returning
3. Marketers
3.1. www.OptOutPreScreen.com or calling 1–888–5–OPT–OUT
3.2. National Do-Not Call Registry www.DoNotCall.gov
3.3. Direct Marketing Association Do-not mail list www.DMAChoice.org.
4. Special Module: Anti Deception Training (Social and Online)
4.1. Observe what's going around
4.2. React to identity requests with healthy skepticism
4.3. Interrogate, evaluate the situation and prevent manipulation
4.4. Signs of manipulation/fraud
4.5. Dont be afraid to say no
5. Identity Recovery and what to do after identity theft
5.1. Deactivate affected account/cards
5.2. Alert about fraud to relevant creditors/institutions
5.3. Submit Identity theft affidavit to FTC
5.4. File police report
5.5. Hire an attorney if damages and big and you are not able to undo it.
6. Online
6.1. Getting the right mindset and Not Leaving digital footprints
6.1.1. Web Surfing
6.1.1.1. DuckDuckGo
6.1.1.2. VPN
6.1.1.3. Email Encryption
6.1.1.4. Secure Connection
6.1.1.5. Double authentication
6.1.1.6. Wifi security
6.1.1.7. spyware security
6.1.1.8. Securing IP, cookies and stuff
6.1.2. Social Media
6.1.2.1. Chat encryption
6.1.2.2. Basic anti-pervert stuff for facebook
6.1.3. P2P
6.1.3.1. How not getting tracked
6.1.3.2. Encrypted connection
6.1.4. Widgets and Extensions
6.1.4.1. How to stop widgets and extensions reaching you and your data
6.1.5. Online Gaming
6.1.5.1. Basic cautions
6.1.6. Secure sensitive documents
6.1.6.1. Password encryption
6.1.7. Secure Credit/debit cards
6.1.7.1. Basic precautions
7. Offline
7.1. How not to get raped by TSA
7.2. Source elimination
7.2.1. File shredding
7.2.2. Destroying the source
7.3. Secure data on steal-able devices (laptop, cell phone, tablets)
7.3.1. Tracking and remote access
7.3.2. Securing the data
7.4. Secure sensitive documents
7.5. Secure your wallet
7.5.1. Do not keep social security card, excess credit/debit cards
7.5.2. ATM receipts/ credit card statements
7.6. {This needs more work}
8. Cell Phones and Other digital devices
8.1. Encryption and secure connection
8.2. Wifi security
9. Why need privacy?
9.1. Government
9.1.1. Right to privacy and dignity
9.1.2. Visited a website you are not proud of?
9.1.3. Could be used out of context against you and could land you behind the bar for something you are not even remotely involved with
9.1.4. Not wanting to live in a police state
9.2. Identity predators
9.2.1. Con artists taking a loan on your name
9.2.2. Framed in a crime
9.2.3. Sexual harassment of you or someone from you house
9.3. Marketers
9.3.1. Annoying ads following you
9.3.2. Marketers manipulating your preferences and behavior
10. Tools
10.1. Web anonymity
10.1.1. DoNotTrackMe
10.1.2. MaskMe
10.1.3. Cocoon
10.1.4. DuckDuckGo
10.1.5. Tor
10.2. Email encryption
10.3. VPN and wifi protection
10.3.1. AnchorFree Hotspot Shield
10.4. Privacy restoration
10.4.1. SafeShephard
10.5. Voice/Chat privacy
10.5.1. CryptoCat
10.5.2. TorChat
10.6. File Privacy
10.7. Firewalls
10.7.1. ZoneAlarm