The internet can be a powerful tool for advocacy, connection, and truth-telling, but it can also be a weapon in the hands of people who have no moral compass. Malicious actors can comb through your online presence, public records, and even hacked or leaked data to find anything they can twist into ammunition against you.
This tactic is sometimes called doxxing, strip-mining, or OSINT harassment and is designed to humiliate, intimidate, and silence.
You can’t always stop someone from trying, but you can definitely make it harder for them to succeed…and relish in it when they fail miserably.
1. Limit What’s Public Before There’s a Problem
- Audit your social media: Review your public profiles and posts.
- Remove personal details: Like addresses, phone numbers, kids’ names, and daily routines.
- Lock down privacy settings: Make sure your accounts are private or friends-only wherever possible.
- Think like the adversary: Search for yourself on Google, Bing, and DuckDuckGo to see what’s visible.
- Assume anything public can and will be used against you: this is officially information warfare.
2. Separate Your Personal and Professional Digital Footprints
- Use different usernames and emails for work, advocacy, and personal life.
- Avoid using the same profile picture across all accounts; it makes cross-platform tracking easier.
- Consider a “public persona” account for advocacy and keep your private accounts truly private.
3. Guard Your Contact Information
- Use a virtual phone number (e.g., Google Voice or a privacy-friendly VoIP service).
- Use a PO box or virtual mailbox for mailing addresses tied to public work.
- Be careful about signing petitions, attending events, or joining organizations that require your full personal information.
4. Secure Your Accounts
- Enable two-factor authentication (2FA) everywhere, preferably using an authenticator app instead of text messages.
- Use unique, strong passwords for every account. A password manager can help.
- Watch for suspicious login alerts and revoke old device permissions regularly.
5. Reduce Your Public Records Exposure
- Opt out of “people finder” websites that aggregate personal data (Whitepages, Spokeo, MyLife, etc.). Many states allow you to request removal.
- Check your local court and property records for unnecessary personal information; some can be redacted.
6. Document Harassment Immediately
- Save everything; screenshots, URLs, timestamps.
- Keep a separate, secure file of all incidents for law enforcement or legal action.
- If threats escalate, contact your local police department’s cybercrime unit and file a report.
7. Control the Narrative
Malicious actors thrive when you panic. They want you silenced and isolated.
- Stay calm, stay consistent: Avoid knee-jerk reactions that give them more material.
- If safe, call them out strategically: Sometimes, controlled exposure of the harassment itself can shift the power dynamic.
- Lean on allies: Activist networks, legal aid groups, and even journalists can be valuable in documenting and countering harassment campaigns.
8. Consider Professional Help
If you’re targeted heavily:
- Digital security consultants can assess your risk and help lock things down.
- Reputation management services can push down damaging search results.
- Legal counsel can explore harassment, stalking, or defamation claims.
Bringing It All Together
You can’t control what bad actors do, but you can make yourself a harder target, limit the damage they can inflict, and ensure you have the tools and documentation to fight back.
In an age where personal information is currency, the best defense is a deliberate, layered approach to your online security.
Love what we do? Support Clutch.


