When people think about online harm, they imagine hacking, data breaches, or sophisticated cybercrime. But one of the most common and arguably most dangerous forms of digital targeting doesn’t require breaking into anything at all.
It’s essentially the Online Information equivalent of Strip Mining, and you’ll often hear people refer to it as such.
And if you’ve ever felt like someone knew too much about you (your schedule, your relationships, your vulnerabilities) without you ever telling them, this is likely why.
What Is Online Information Strip Mining?
Online Information Strip Mining is the systematic collection, cross-referencing, and analysis of publicly available information about a person to build a detailed personal profile.
No passwords stolen, no systems breached. Just patience, pattern recognition, and persistence. Bad actors don’t take one piece of information; they strip-mine across platforms.
How Bad Actors Do It (Step by Step)
1. Platform Hopping
They don’t stay in one place. They move between:
- social media platforms
- court records
- articles
- property databases
- professional bios
- old blog posts
- comments sections
- tagged photos
- archived pages
- people-search sites
Each platform gives a fragment. Together, they form a map for their attack.
2. Timeline Reconstruction
They aren’t just collecting facts; they’re building patterns.
- When you post
- When you go quiet
- When you’re stressed
- When you travel
- When you’re in court
- When your work changes
Your absence can be just as revealing as your presence.
3. Relationship Mapping
Bad actors track:
- who interacts with you
- who defends you
- who opposes you
- who disappears
- who tags you
- who shares mutual connections
They aren’t just watching you. They’re watching your ecosystem.
4. Vulnerability Identification
This is where it turns dangerous. They look for:
- moments of grief
- financial stress
- legal exposure
- family strain
- mental health disclosures
- fatigue
- fear
- isolation
Never to help, of course. They’re doing it to intentionally exploit.
5. Context Weaponization
Individually, your posts are harmless. But strip-mined together, they can be:
- misrepresented
- taken out of context
- fed to authorities
- used to intimidate
- used to provoke reactions
- used to discredit
This is how “public information” becomes private harm.
Who Uses Online Information Strip Mining?
This isn’t limited to one group. It’s used by:
- stalkers
- abusive ex-partners
- extremist groups
- hostile activists
- unethical litigants
- online harassment mobs
- private investigators
- bad-faith journalists
- disgruntled acquaintances
- ideological opponents
The common denominator is obsession paired with access.
Why It’s So Hard to Explain (and So Easy to Dismiss)
Strip mining doesn’t look dramatic. There’s no single incident. No smoking gun. No obvious crime. Instead, victims are told:
- “It’s public information.”
- “Just don’t post.”
- “You’re being paranoid.”
But impact matters. The totality of it all matters. And when information is used to monitor, intimidate, or control, it stops being neutral.
How to Protect Yourself (Without Disappearing)
Protection is about friction, not invisibility.
1. Audit Your Digital Surface Area
Search yourself like a stranger would.
- Full name
- Nicknames
- Old usernames
- Email addresses
- Phone numbers
- Addresses
- Court case numbers
If it surprised you, it’s worth addressing.
2. Reduce Cross-Platform Linkage
Avoid making it easy to connect accounts.
- Different profile photos
- Different bios
- Different usernames where possible
- Avoid linking platforms publicly
- Make private or delete the ones you can live without entirely
Strip miners thrive on easy bridges.
3. Delay Real-Time Sharing
Time is information. This is OPSEC 101.
Post:
- after events
- after travel
- after milestones
Not during.
4. Be Selective About Vulnerability
You can be honest without being exposed. Ask:
- Does this educate?
- Does this empower?
- Or does this reveal timing, location, or emotional state?
You don’t owe the internet your nervous system.
5. Lock Down Data Brokers
Opt out where possible:
- people-search sites
- data aggregators
- background-check databases
It’s tedious, but yes, it matters.
6. Document Suspicious Patterns
If something feels off, write it down.
- dates
- platforms
- behaviors
- escalations
Patterns protect you when instincts are dismissed.
Pulling It All Together
Online Information Strip Mining is never about curiosity.
It’s about control through accumulation.
You are not overreacting for noticing it and you are not dramatic for protecting yourself. Most importantly, you are not at all obligated to make your life easily searchable.
Digital safety is not secrecy. It’s agency, and agency is a form of justice.


