top of page

Nationwide & International Inquiries Welcome
Spade & Archer® is a licensed private investigation firm specializing in blackmail, sextortion, and high-risk privacy matters.

Someone Is Collecting Information About You Online — What To Do

  • Mar 15
  • 8 min read
Secret information collection is not as difficult as one might think.
Open-Source Intelligence (OSINT) is widely available to anyone willing to learn and have the desire to collect information on you.


Secretly Collecting Information About You: What You Can Do


The internet has changed how people investigate one another. What once required hiring a private investigator, filing records requests, or physically following someone can now be done from a laptop.


Most of the time this type of research is harmless. Employers review candidates, journalists examine public records, and individuals search for information about people they interact with online.


But sometimes the situation is different.


Occasionally a person discovers that someone appears to be systematically collecting information about them—their address, family members, work history, photos, financial background, or personal relationships.


In the worst cases, this information gathering is the first stage of harassment, blackmail, stalking, or reputational attacks.


Understanding the difference between ordinary research and targeted information gathering is critical.


The Rise of Information Weaponization


Personal data has become easy to obtain. Public records, social media profiles, data broker websites, and archived internet pages allow a determined person to assemble a surprising amount of information about almost anyone.


When this information is collected with malicious intent, it can be used to:

  • intimidate someone

  • damage a reputation

  • pressure a person into compliance

  • prepare a blackmail attempt

  • support harassment or stalking


This tactic is often associated with doxxing, which involves gathering and publishing private or identifying information about someone online.


However, in many cases the information is never publicly released. Instead, it may be used privately to threaten, pressure, or manipulate the target.


The information itself becomes leverage.


Warning Signs Someone May Be Building a File on You


Most people do not realize they are being researched until small details begin to surface unexpectedly.


Some of the warning signs may include:


Unusual Questions From Strangers

You may hear from acquaintances that someone has been asking questions about you—where you live, what you do for work, who you associate with.


Often the person asking these questions claims to be conducting research, working on a project, or attempting to reconnect with you.


Anonymous Messages Referencing Personal Details

In some cases, anonymous emails or messages contain information that is technically public but not widely known, such as past addresses, family members, or employment history.


The presence of this information suggests someone has been conducting deliberate research.


Fake or Suspicious Online Accounts

Individuals engaged in information gathering sometimes create fake social media profiles to observe or interact with a target.


These accounts may follow you online, attempt to connect with people in your network, or quietly monitor your posts.


Sudden Contact From Unknown Parties

Sometimes the person gathering information does not approach you directly. Instead, they contact:

  • former employers

  • coworkers

  • business partners

  • neighbors

  • friends or family members


These contacts often appear harmless but are part of a larger effort to assemble background information.


How Doxxing and Reputation Attacks Usually Begin


In many harassment and extortion cases, the attack does not begin with a threat.

It begins with research.


Before someone attempts to intimidate or expose another person, they often attempt to collect as much information as possible.


This may include:

  • property records

  • court filings

  • social media posts

  • photographs

  • employment history

  • business interests

  • family relationships

  • archived internet content


The purpose is to identify vulnerabilities.


Once information has been collected, the attacker may attempt to use it to pressure the target or damage their credibility.


Who Conducts These Types of Information Campaigns


There is no single profile of the person behind these investigations.


Cases may involve:

  • former romantic partners

  • disgruntled employees or business partners

  • competitors in business disputes

  • online trolls or activists

  • individuals involved in litigation

  • extortionists or blackmailers


In some situations the person conducting the research is acting alone. In others, they may be working with associates or even hiring third parties to gather information.


Understanding who is behind the activity is often the most important step toward resolving the situation.


What Information Is Usually Being Collected


The information targeted in these situations typically falls into several categories.


Personal Identifying Information

Basic identifying information can include addresses, phone numbers, family relationships, and past residences.


Much of this information can be found in public records or through data broker websites.


Professional Background

Employment history, business interests, professional licenses, and financial disclosures are often examined to identify reputational vulnerabilities.


Personal Associations

Information about friends, family members, and colleagues may be gathered in order to exert pressure through third parties.


Online Content

Old social media posts, photographs, archived websites, and comments can be collected and stored as potential leverage.


In many cases the information itself is not illegal to access. The issue arises when it is collected with the intention of harassment, intimidation, or extortion.


Why These Situations Often Escalate


Information gathering rarely remains the final stage.


Once someone has compiled enough information, they may begin applying pressure.


Common escalation patterns include:

  1. anonymous messages referencing personal information

  2. threats to publish damaging material

  3. harassment directed toward employers or family members

  4. reputational attacks online

  5. attempts at blackmail or extortion


Early documentation of the activity can be extremely important if the situation continues to escalate.


How to Limit the Information Someone Can Collect About You Online


If you believe someone is researching you online, the most important step is to reduce the amount of easily accessible information available about you.


Most individuals are surprised by how much personal information can be found through public records and commercial data brokers. While it is impossible to remove every piece of information, there are practical steps that can significantly reduce exposure.


Remove Your Information From Data Broker Websites

Many websites collect and sell personal information such as addresses, phone numbers, relatives, and property ownership records.


Examples include:

  • Spokeo

  • Whitepages

  • BeenVerified

  • MyLife

  • Intelius


These companies often compile information from public records and marketing databases.


Most of them provide opt-out procedures that allow individuals to request removal of their listings.


Removing information from these databases can significantly reduce the amount of personal data available to someone conducting casual research.


Audit Your Social Media Accounts

Social media platforms often reveal far more information than people realize.


Review your accounts and consider:

  • removing public access to your profile

  • hiding your friends or connections list

  • removing location tags from photos

  • deleting posts that reveal home addresses or travel patterns

  • limiting who can view past content

Even small details can help someone build a profile of your personal life.


Reduce Public Exposure of Personal Records

Certain types of public records can expose information that attackers frequently search for, including:

  • property records

  • voter registration records

  • business registrations

  • professional licenses


While many public records cannot be removed entirely, it may be possible to limit the visibility of personal addresses or substitute business mailing addresses in some filings.


Individuals who operate businesses may also consider using registered agent services or commercial addresses rather than home addresses when possible.


Monitor Your Name and Personal Information Online

Regularly searching for your own name can help you understand what information others may see.


You can also set up Google Alerts for your name or business to be notified when new references appear online.


This allows you to detect potential harassment or exposure attempts early.


Be Careful About Information Shared in Disputes

Information gathering often begins during disputes such as:

  • divorces

  • business conflicts

  • employment disputes

  • online arguments


People sometimes disclose personal details during these conflicts without realizing how easily that information can later be used against them.


Limiting unnecessary disclosures can reduce the risk of escalation.


Understand That Complete Privacy Is Rare

It is important to understand that complete removal of personal information from the internet is rarely possible.


However, reducing the ease of access to your information can dramatically reduce the likelihood that someone will continue researching you.


Most individuals conducting harassment or reputation attacks rely on easily available data. When that information becomes difficult to locate, many abandon the effort.


When Prevention Isn’t Enough


Sometimes individuals attempt to gather information about someone with a clear purpose—harassment, intimidation, or extortion.


When that occurs, documenting the activity becomes critical.


At that point, an experienced investigator can help determine whether the activity is isolated, identify possible sources of the information gathering, and preserve evidence if the situation escalates.


How a Private Investigator Can Help


Private investigators are often contacted when individuals begin to suspect that someone is targeting them with coordinated information gathering.


An investigator cannot control what information exists online. However, an experienced investigator can help determine:

  • whether the activity is isolated or part of a pattern

  • who may be responsible for the information gathering

  • how the information was obtained

  • whether additional harassment or threats are likely


More importantly, investigators can help document the situation carefully and preserve evidence before it disappears.


In many cases, the value of an investigation is not speculation but structured documentation of what has actually occurred.


Investigative Consulting for Information Harassment Cases


Through my investigative practice, I provide consulting services for individuals who believe they are being targeted by online harassment, doxxing, or coordinated information gathering.


My work focuses on fact development and investigative analysis, not speculation.

The goal is to help clients understand the situation and document it properly.


Initial Consultation – $249


The process begins with a one-hour investigative consultation.


During this call we review:

  • the timeline of events

  • suspicious communications or activity

  • potential suspects or dispute history

  • known data exposure

  • any existing documentation


The purpose of the consultation is to determine whether an investigative review is likely to produce useful information.


Privacy Consulting


For clients who require deeper investigative analysis, I offer a consulting retainer starting at $3,500.


This allows me to assist the client through a structured privacy process designed to identify patterns, document activity, and determine possible sources of the information gathering.


The Privacy Process


Each case is different, but most investigations follow a structured process.


Case Analysis

The first step is reviewing the full background of the situation, including disputes, relationships, and any prior incidents that may explain the activity.


Understanding context is essential before conducting any investigative work.


Timeline Reconstruction

A detailed timeline is created to document when suspicious events occurred, when communications were received, and when personal information began appearing in messages or online discussions.


This helps identify patterns and possible trigger events.


Open-Source Intelligence Review

Investigators examine publicly available records and internet sources to determine what information about the client is easily accessible and how it may have been obtained.


This review often reveals how a third party may have compiled their information.


Identity and Pattern Analysis

When possible, investigators analyze online accounts, messaging patterns, and communication behavior to determine whether activity may be linked to a specific individual.


This process does not rely on assumptions but on identifying consistent behavioral patterns.


Evidence Documentation

All relevant communications, records, and online material are documented and preserved.


If the situation escalates into harassment, extortion, or legal proceedings, properly preserved documentation may become extremely important.


Documentation Is Often the Most Valuable Outcome


Many people initially seek investigations hoping for a quick explanation.

In reality, the most valuable outcome is often a clear, organized record of what occurred.


When harassment, intimidation, or extortion develops, a properly documented record can assist with:

  • legal counsel

  • law enforcement reports

  • civil litigation

  • security planning


Without documentation, important details are often lost.


Final Thoughts


The internet has made it easier than ever for individuals to collect information about others.


In most situations this activity is harmless.


But when information gathering becomes targeted, persistent, or threatening, it may signal the early stages of harassment or intimidation.


The most responsible approach is not speculation but careful documentation and professional analysis.


Understanding who may be gathering information—and why—can often prevent a difficult situation from escalating further.

 
 
 

Recent Posts

See All

Comments


Commenting on this post isn't available anymore. Contact the site owner for more info.
bottom of page