Type something to search...

ID Theft and Doxing

Identity Theft/Doxing

Identity Theft: The taking of personal information such as SSNs, bank account information or log in credentials

Doxing: Revealing private and personal information about someone online including their address, workplace details, contact information, or private details.

Tactics

  • Tracking User Names: People online can follow breadcrumbs to uncover a common online alias
  • Phishing Clicking on links in emails and texts under the guise of a fake message.
  • Data Breaches: When a large scale hack is able to get into a website's storage of personal data.
  • Dumpster Diving/Mail Theft: Stealing discarded doccuments or mail that has personal details.
  • Social Manipulation: Using a relationship to get private information out of someone.
  • Accessing Records: Governement websites have information databases with personal info such as DMVs, marriage licenses, voter registration, and county records to name a few.
  • Tracking IPs: Your IP is linked to your physical location of where you accessed the internet. Doxers and hackers and use tricks to get on the target's internet service provider to look up their information.
  • Reverse Lookup: By getting information such as a person's phone number, a hacker can use search engines such as Whitepages or Who Called Me to get information on the phone's owner.
  • Data Brokers: Paid services on both the dark web and publicly available record sites sell data for a small fee.

How to Protect Yourself

  • Use a VPN: A Virtual Private Network allows you to use the internet while making your activity private and anonymous.
  • Keep your Tech Up-to-Date: Make sure you have anti-virus and maleware software AND you're installing updates as they come out. When you get notifications about data breaches, act quickly to change passwords.
  • Use a Strong Password: The less like english it looks like the stronger the password. If you're using a password management software be sure to look into how secure it is (e.g. Google is NOT the most secure).
  • Use Different Usernames: Unless you're running a business, there's no reason for your personal browsing history to have brand affinity. Come up with new names for each platform and don't include personal information such as your name.
  • Multi Factor Authentication: Many sites allow you to use this method to double protect your accounts. It requires all logins to have more than one method to sign in (e.g. confirmation text on phone and password).
  • Have Separate Emails: If you don't already create multiple email accounts that are not associated with each other. Have a public email for work and public correspondence and separate ones for marketing or social messages. If you are organizing events use a group email instead of a personal one. Consider also using encrypted email accounts like Proton Mail or disposable accounts like Guerrilla Mail.
  • Clean Up Your Trail: Delete old accounts you are no longer using. Request that personal information be removed from Google. Scrub your data with services like Reputation Defender or PrivacyDuck.
How easy is it to Dox Your?
  • Google yourself
  • Reverse image search your profile pictures
  • Check your personal websites to make sure you have no information like phone numbers or emails
  • Look through your social media privacy settings and make sure you are protected
                    <h4>Resources</h4>
                    <ul>
                        <li><a href="https://www.securityeducationcompanion.org/">Security Education Companion</a> Various training courses available</li>
                        <li><a href="https://www.whonix.org/wiki/Tips_on_Remaining_Anonymous"> Whonix Tips on Remaining Anonymous</a></li>
                        <li><a href="https://billstclair.com/matrix/index.html">Network Forensics Evasion: How to Exit the Matrix</a></li>
                        <li><a href="https://www.privacytools.io/">Privacy Tools Guide: Website for Encrypted Software & Apps</a></li>
                    <li><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/identity-theft-awareness-week-why-protecting-your-identity-matters-more-than-ever">Why Protecting Your Identity Matters More Than Ever</a></li>
                    <li><a href="/pdfs/protect_yourself_online_-_shield_from_doxing.pdf">Protest Yourself Online - Shielf from Doxing</a></li>
                    <li><a href="https://www.kaspersky.com/resource-center/definitions/what-is-doxing">What is Doxing? Definition and Explanation


  • Safety, Security, and Digital Preparedness for a Second Trump Administration
  • Tor Project
  • Related Posts

    Dangers of AI

    Privacy Risks Generative AI - is showing up more and more in digital services and spaces. Besides [ethical concerns](https://www.techtarget.com/searchenterpriseai/tip/Generative-AI-ethics-8-bigge

    read more

    Internet Access

    Access to Broadband Risks The director of a massive Department of Commerce program to improve rural broadband access has quit the government over concerns that the agency would delay the initiat

    read more

    Secure Communications

    Remember: Nothing communicated in any written form is ever completely private. This includes both electronic and analog.

    read more

    Surveillance State

    h2>Surveillance State Tourists and citizens alike are getting stopped at the US board and asked to look at their devices. One example of a Norwegian tourist <a href="h

    read more

    How to Use the System

    In order to build a future system that will protect our people and democracy we must work within the current system to effect change. This site doesn't advocate for throwing the baby out with the b

    read more

    Government Workers

    Purging employees is the first step towards replacing them and remaking government agencies to comply with Trump’s agenda. When that happens, regulatory retaliation can be expected to accelerate in

    read more

    Strategies used by Trump to Target Immigrants

    His immigration agenda isn’t just cruel; it’s strategic. It’s grounded in a white supremacist vision of America—one where power is easier to hold when society is more homogenous, and those who don’

    read more

    When ICE Comes After You

    Quick ResourcesHow to Find a Loved One After a US Immigration Arrest <a href="https://ww

    read more

    Immigrants: Know Your Rights

    Know your rights!Immigration Arrests and Raids - Protect your Rights Info Sheet Immigrant

    read more

    Information Access

    Remember: Autocrats do not outright ban speech - rather they use the government to punish contrarian speech. Those who follow their preferred messagin

    read more

    Helping our Immigrant Neighbors

    The best way for citizens to help is by helping everyone know their rights, recording incidents you see, and refusing to comply by providing information of any kind. Fighting Misinformation

    read more

    Media Literacy

    Media Literacy This section is created to help people understand the basics of understanding the media we consume. Many media outl

    read more

    Protest Rights

    Protestor Rights Your rights are strongest in what are known as “traditional public forums,” such as streets, sidewalks, and parks. You also likely have the

    read more

    How to get into Protesting

    Power wants your body softening in your chair and your emotions dissipating on the screen. Get outside. Put your body in unfamiliar places with unfamiliar people. Make new friends and march with th

    read more

    Propaganda for Good

    Propaganda: “statements or ideas that are often exaggerated or false, and are spread in order to help a leader, cause, a government, etc.

    read more

    Protest Safety

    Trump could position the Department of Defense and Department of Homeland Security to conduct joint operations for immigration enforcement. The forthcoming April 20, 2025, report from both departme

    read more

    Media Literacy

    What is Responsible Reporting? So many media sources proport to be "unbiased" and "truth-based", but a

    read more

    Violence by the State

    Take Care: While this page does not offer overt descriptions of violence, it will factually state the reality of the brutality of state sponsored violence. If at any point you feel o

    read more

    Vaccines

    Vaccine Access With the increase in anti vaxers the concern overall is that it will be harder to access to vaccines. While RFK and the MAHA/MAGA supporters are advocat

    read more