Last Updated on by SCARS Editorial Team
RSN™ Guide: DoxingDoxing DOXING Doxing is the willful disclosure of personal information with the intent to cause harm to the person DOXED. Doxing is a form of cyber harassment. Personal information online is common, however, with the Internet being so prevalent. Many records are found online, such as, voting, property ownership, even bankruptcies, and new business filings. & ScammerScammer A Scammer or Fraudster is someone that engages in deception to obtain money or achieve another objective. They are criminals that attempt to deceive a victim into sending more or performing some other activity that benefits the scammer. Revenge
Exposing Your Personal Information For Revenge
As we have said before, most scammer threats are just more lies attempting to get victims to pay.
However, there are a couple of cases where they may engage in revenge if the victims confront and angers the scammer needlessly. The best strategy is always to go silent and blockBlock Blocking is a technical action usually on social media or messaging platforms that restricts or bans another profile from seeing or communicating with your profile. To block someone on social media, you can usually go to their profile and select it from a list of options - often labeled or identified with three dots ••• everywhere!
REMEMBER: DO NOT CONFRONT YOUR SCAMMERS
What Is DOXING?
Doxing (from dox, an abbreviation of documents) or doxing is the Internet-based practice of researching and broadcasting private or identifiable information (especially personally identifiable information) about an individual or organization.
The methods employed to acquire this information include searching publicly available databases and social media websites (like Facebook), hacking, and social engineeringSocial Engineering Social engineering is the psychological manipulation of people into performing actions or divulging confidential information. It is used as a type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take any action that may or may not be in their best interests.". It is closely related to Internet vigilantism and hacktivism.
Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, risk analytics, extortion, coercion, inflict harm, harassment, online shaming, and vigilante justice.
Anyone can harvest information from the Internet about individuals. There is no particular structure in place for doxing, meaning someone may seek out any kind of information related to the target.
A basic Web search can yield results. Social media platforms like Facebook, Twitter, MySpace, and Linkedin offer a wealth of private information because many users have high levels of self-disclosure (i.e. sharing their photos, place of employment, phone number, email address), but low levels of security. It is also possible to derive a person’s name and home address from a cell-phone number, through such services as reverse phone lookup. Social engineering has been used to extract information from government sources or phone companies.
In addition to these, a doxxer may use other methods to harvest information. These include information search by domain name and location searching based on an individual’s IP addressGeolocation Geolocation is the utilization of a device IP address, along with other device signals, to determine geographical location. An Internet Protocol address (IP address) is a numerical label such as 192.0.2.1 that is connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing. An IP Address can be used to locate a physical computer's location..
Once people have been exposed through doxing, they may be targeted for harassment through