Someone Is Collecting Information About You Online — What To Do
- Mar 15
- 8 min read

Secretly Collecting Information About You: What You Can Do
The internet has changed how people investigate one another. What once required hiring a private investigator, filing records requests, or physically following someone can now be done from a laptop.
Most of the time this type of research is harmless. Employers review candidates, journalists examine public records, and individuals search for information about people they interact with online.
But sometimes the situation is different.
Occasionally a person discovers that someone appears to be systematically collecting information about them—their address, family members, work history, photos, financial background, or personal relationships.
In the worst cases, this information gathering is the first stage of harassment, blackmail, stalking, or reputational attacks.
Understanding the difference between ordinary research and targeted information gathering is critical.
The Rise of Information Weaponization
Personal data has become easy to obtain. Public records, social media profiles, data broker websites, and archived internet pages allow a determined person to assemble a surprising amount of information about almost anyone.
When this information is collected with malicious intent, it can be used to:
intimidate someone
damage a reputation
pressure a person into compliance
prepare a blackmail attempt
support harassment or stalking
This tactic is often associated with doxxing, which involves gathering and publishing private or identifying information about someone online.
However, in many cases the information is never publicly released. Instead, it may be used privately to threaten, pressure, or manipulate the target.
The information itself becomes leverage.
Warning Signs Someone May Be Building a File on You
Most people do not realize they are being researched until small details begin to surface unexpectedly.
Some of the warning signs may include:
Unusual Questions From Strangers
You may hear from acquaintances that someone has been asking questions about you—where you live, what you do for work, who you associate with.
Often the person asking these questions claims to be conducting research, working on a project, or attempting to reconnect with you.
Anonymous Messages Referencing Personal Details
In some cases, anonymous emails or messages contain information that is technically public but not widely known, such as past addresses, family members, or employment history.
The presence of this information suggests someone has been conducting deliberate research.
Fake or Suspicious Online Accounts
Individuals engaged in information gathering sometimes create fake social media profiles to observe or interact with a target.
These accounts may follow you online, attempt to connect with people in your network, or quietly monitor your posts.
Sudden Contact From Unknown Parties
Sometimes the person gathering information does not approach you directly. Instead, they contact:
former employers
coworkers
business partners
neighbors
friends or family members
These contacts often appear harmless but are part of a larger effort to assemble background information.
How Doxxing and Reputation Attacks Usually Begin
In many harassment and extortion cases, the attack does not begin with a threat.
It begins with research.
Before someone attempts to intimidate or expose another person, they often attempt to collect as much information as possible.
This may include:
property records
court filings
social media posts
photographs
employment history
business interests
family relationships
archived internet content
The purpose is to identify vulnerabilities.
Once information has been collected, the attacker may attempt to use it to pressure the target or damage their credibility.
Who Conducts These Types of Information Campaigns
There is no single profile of the person behind these investigations.
Cases may involve:
former romantic partners
disgruntled employees or business partners
competitors in business disputes
online trolls or activists
individuals involved in litigation
extortionists or blackmailers
In some situations the person conducting the research is acting alone. In others, they may be working with associates or even hiring third parties to gather information.
Understanding who is behind the activity is often the most important step toward resolving the situation.
What Information Is Usually Being Collected
The information targeted in these situations typically falls into several categories.
Personal Identifying Information
Basic identifying information can include addresses, phone numbers, family relationships, and past residences.
Much of this information can be found in public records or through data broker websites.
Professional Background
Employment history, business interests, professional licenses, and financial disclosures are often examined to identify reputational vulnerabilities.
Personal Associations
Information about friends, family members, and colleagues may be gathered in order to exert pressure through third parties.
Online Content
Old social media posts, photographs, archived websites, and comments can be collected and stored as potential leverage.
In many cases the information itself is not illegal to access. The issue arises when it is collected with the intention of harassment, intimidation, or extortion.
Why These Situations Often Escalate
Information gathering rarely remains the final stage.
Once someone has compiled enough information, they may begin applying pressure.
Common escalation patterns include:
anonymous messages referencing personal information
threats to publish damaging material
harassment directed toward employers or family members
reputational attacks online
attempts at blackmail or extortion
Early documentation of the activity can be extremely important if the situation continues to escalate.
How to Limit the Information Someone Can Collect About You Online
If you believe someone is researching you online, the most important step is to reduce the amount of easily accessible information available about you.
Most individuals are surprised by how much personal information can be found through public records and commercial data brokers. While it is impossible to remove every piece of information, there are practical steps that can significantly reduce exposure.
Remove Your Information From Data Broker Websites
Many websites collect and sell personal information such as addresses, phone numbers, relatives, and property ownership records.
Examples include:
Spokeo
Whitepages
BeenVerified
MyLife
Intelius
These companies often compile information from public records and marketing databases.
Most of them provide opt-out procedures that allow individuals to request removal of their listings.
Removing information from these databases can significantly reduce the amount of personal data available to someone conducting casual research.
Audit Your Social Media Accounts
Social media platforms often reveal far more information than people realize.
Review your accounts and consider:
removing public access to your profile
hiding your friends or connections list
removing location tags from photos
deleting posts that reveal home addresses or travel patterns
limiting who can view past content
Even small details can help someone build a profile of your personal life.
Reduce Public Exposure of Personal Records
Certain types of public records can expose information that attackers frequently search for, including:
property records
voter registration records
business registrations
professional licenses
While many public records cannot be removed entirely, it may be possible to limit the visibility of personal addresses or substitute business mailing addresses in some filings.
Individuals who operate businesses may also consider using registered agent services or commercial addresses rather than home addresses when possible.
Monitor Your Name and Personal Information Online
Regularly searching for your own name can help you understand what information others may see.
You can also set up Google Alerts for your name or business to be notified when new references appear online.
This allows you to detect potential harassment or exposure attempts early.
Be Careful About Information Shared in Disputes
Information gathering often begins during disputes such as:
divorces
business conflicts
employment disputes
online arguments
People sometimes disclose personal details during these conflicts without realizing how easily that information can later be used against them.
Limiting unnecessary disclosures can reduce the risk of escalation.
Understand That Complete Privacy Is Rare
It is important to understand that complete removal of personal information from the internet is rarely possible.
However, reducing the ease of access to your information can dramatically reduce the likelihood that someone will continue researching you.
Most individuals conducting harassment or reputation attacks rely on easily available data. When that information becomes difficult to locate, many abandon the effort.
When Prevention Isn’t Enough
Sometimes individuals attempt to gather information about someone with a clear purpose—harassment, intimidation, or extortion.
When that occurs, documenting the activity becomes critical.
At that point, an experienced investigator can help determine whether the activity is isolated, identify possible sources of the information gathering, and preserve evidence if the situation escalates.
How a Private Investigator Can Help
Private investigators are often contacted when individuals begin to suspect that someone is targeting them with coordinated information gathering.
An investigator cannot control what information exists online. However, an experienced investigator can help determine:
whether the activity is isolated or part of a pattern
who may be responsible for the information gathering
how the information was obtained
whether additional harassment or threats are likely
More importantly, investigators can help document the situation carefully and preserve evidence before it disappears.
In many cases, the value of an investigation is not speculation but structured documentation of what has actually occurred.
Investigative Consulting for Information Harassment Cases
Through my investigative practice, I provide consulting services for individuals who believe they are being targeted by online harassment, doxxing, or coordinated information gathering.
My work focuses on fact development and investigative analysis, not speculation.
The goal is to help clients understand the situation and document it properly.
Initial Consultation – $249
The process begins with a one-hour investigative consultation.
During this call we review:
the timeline of events
suspicious communications or activity
potential suspects or dispute history
known data exposure
any existing documentation
The purpose of the consultation is to determine whether an investigative review is likely to produce useful information.
Privacy Consulting
For clients who require deeper investigative analysis, I offer a consulting retainer starting at $3,500.
This allows me to assist the client through a structured privacy process designed to identify patterns, document activity, and determine possible sources of the information gathering.
The Privacy Process
Each case is different, but most investigations follow a structured process.
Case Analysis
The first step is reviewing the full background of the situation, including disputes, relationships, and any prior incidents that may explain the activity.
Understanding context is essential before conducting any investigative work.
Timeline Reconstruction
A detailed timeline is created to document when suspicious events occurred, when communications were received, and when personal information began appearing in messages or online discussions.
This helps identify patterns and possible trigger events.
Open-Source Intelligence Review
Investigators examine publicly available records and internet sources to determine what information about the client is easily accessible and how it may have been obtained.
This review often reveals how a third party may have compiled their information.
Identity and Pattern Analysis
When possible, investigators analyze online accounts, messaging patterns, and communication behavior to determine whether activity may be linked to a specific individual.
This process does not rely on assumptions but on identifying consistent behavioral patterns.
Evidence Documentation
All relevant communications, records, and online material are documented and preserved.
If the situation escalates into harassment, extortion, or legal proceedings, properly preserved documentation may become extremely important.
Documentation Is Often the Most Valuable Outcome
Many people initially seek investigations hoping for a quick explanation.
In reality, the most valuable outcome is often a clear, organized record of what occurred.
When harassment, intimidation, or extortion develops, a properly documented record can assist with:
legal counsel
law enforcement reports
civil litigation
security planning
Without documentation, important details are often lost.
Final Thoughts
The internet has made it easier than ever for individuals to collect information about others.
In most situations this activity is harmless.
But when information gathering becomes targeted, persistent, or threatening, it may signal the early stages of harassment or intimidation.
The most responsible approach is not speculation but careful documentation and professional analysis.
Understanding who may be gathering information—and why—can often prevent a difficult situation from escalating further.
Comments