When people think about online harm, they imagine hacking, data breaches, or sophisticated cybercrime. But one of the most common and arguably most dangerous forms of digital targeting doesn’t require breaking into anything at all.

It’s essentially the Online Information equivalent of Strip Mining, and you’ll often hear people refer to it as such.

And if you’ve ever felt like someone knew too much about you (your schedule, your relationships, your vulnerabilities) without you ever telling them, this is likely why.


What Is Online Information Strip Mining?

Online Information Strip Mining is the systematic collection, cross-referencing, and analysis of publicly available information about a person to build a detailed personal profile.

No passwords stolen, no systems breached. Just patience, pattern recognition, and persistence. Bad actors don’t take one piece of information; they strip-mine across platforms.


How Bad Actors Do It (Step by Step)

1. Platform Hopping

They don’t stay in one place. They move between:

  • social media platforms
  • court records
  • articles
  • property databases
  • professional bios
  • old blog posts
  • comments sections
  • tagged photos
  • archived pages
  • people-search sites

Each platform gives a fragment. Together, they form a map for their attack.


2. Timeline Reconstruction

They aren’t just collecting facts; they’re building patterns.

  • When you post
  • When you go quiet
  • When you’re stressed
  • When you travel
  • When you’re in court
  • When your work changes

Your absence can be just as revealing as your presence.


3. Relationship Mapping

Bad actors track:

  • who interacts with you
  • who defends you
  • who opposes you
  • who disappears
  • who tags you
  • who shares mutual connections

They aren’t just watching you. They’re watching your ecosystem.


4. Vulnerability Identification

This is where it turns dangerous. They look for:

  • moments of grief
  • financial stress
  • legal exposure
  • family strain
  • mental health disclosures
  • fatigue
  • fear
  • isolation

Never to help, of course. They’re doing it to intentionally exploit.


5. Context Weaponization

Individually, your posts are harmless. But strip-mined together, they can be:

  • misrepresented
  • taken out of context
  • fed to authorities
  • used to intimidate
  • used to provoke reactions
  • used to discredit

This is how “public information” becomes private harm.


Who Uses Online Information Strip Mining?

This isn’t limited to one group. It’s used by:

  • stalkers
  • abusive ex-partners
  • extremist groups
  • hostile activists
  • unethical litigants
  • online harassment mobs
  • private investigators
  • bad-faith journalists
  • disgruntled acquaintances
  • ideological opponents

The common denominator is obsession paired with access.


Why It’s So Hard to Explain (and So Easy to Dismiss)

Strip mining doesn’t look dramatic. There’s no single incident. No smoking gun. No obvious crime. Instead, victims are told:

  • “It’s public information.”
  • “Just don’t post.”
  • “You’re being paranoid.”

But impact matters. The totality of it all matters. And when information is used to monitor, intimidate, or control, it stops being neutral.


How to Protect Yourself (Without Disappearing)

Protection is about friction, not invisibility.

1. Audit Your Digital Surface Area

Search yourself like a stranger would.

  • Full name
  • Nicknames
  • Old usernames
  • Email addresses
  • Phone numbers
  • Addresses
  • Court case numbers

If it surprised you, it’s worth addressing.


2. Reduce Cross-Platform Linkage

Avoid making it easy to connect accounts.

  • Different profile photos
  • Different bios
  • Different usernames where possible
  • Avoid linking platforms publicly
  • Make private or delete the ones you can live without entirely

Strip miners thrive on easy bridges.


3. Delay Real-Time Sharing

Time is information. This is OPSEC 101.

Post:

  • after events
  • after travel
  • after milestones

Not during.


4. Be Selective About Vulnerability

You can be honest without being exposed. Ask:

  • Does this educate?
  • Does this empower?
  • Or does this reveal timing, location, or emotional state?

You don’t owe the internet your nervous system.


5. Lock Down Data Brokers

Opt out where possible:

  • people-search sites
  • data aggregators
  • background-check databases

It’s tedious, but yes, it matters.


6. Document Suspicious Patterns

If something feels off, write it down.

  • dates
  • platforms
  • behaviors
  • escalations

Patterns protect you when instincts are dismissed.


Pulling It All Together

Online Information Strip Mining is never about curiosity.
It’s about control through accumulation.

You are not overreacting for noticing it and you are not dramatic for protecting yourself. Most importantly, you are not at all obligated to make your life easily searchable.

Digital safety is not secrecy. It’s agency, and agency is a form of justice.