If the prior post in this series showed how a defender uses OSINT against their own infrastructure, this one is its mirror: how an individual or executive defends against OSINT being used against them. The audience is broader — not just security professionals, but founders, executives, journalists, public figures, abuse survivors, anyone whose physical or financial safety depends on a smaller digital shadow.
The goal isn't to disappear from the internet. That's impossible if you participate in modern life. The goal is to reduce your exposed attack surface to the minimum required for the life you actually live, harden what remains, and make the remaining data less useful to anyone hunting you.
Threat-model first
Defense is shaped by who you're defending against. Three rough tiers:
- Tier 1 — opportunistic actors. Random doxxers, online stalkers, low-effort identity thieves, scammers. They have hours to spend, not weeks. Most defensive work targets them.
- Tier 2 — motivated actors. A specific person who dislikes you and has time. An ex-partner. A disgruntled former employee. A journalist on a hostile beat. They'll keep digging if the first wall holds.
- Tier 3 — resourced adversaries. Organized crime, foreign intelligence, well-funded litigants. They have professional OSINT teams, access to private databases, and the budget to social-engineer past your controls. Defenses here often involve real OPSEC and legal counsel.
Most readers are defending against Tier 1 and occasional Tier 2. Tier 3 changes the rules; if that's you, hire help.
Self-audit your footprint
You can't defend what you can't see. The first step is to perform OSINT on yourself the way an investigator would.
- Search your name in major engines (Google, Bing, DuckDuckGo) — including with city, employer, year-of-birth qualifiers. Note what's findable on page 1, page 2, page 3.
- Search your email addresses (current and historical). The same exposure surface, plus often older content.
- Search your usernames across platforms with a username-OSINT tool. Identify accounts you forgot existed.
- Search your phone numbers — Truecaller, NumLookup, simple Google searches. Phone numbers are pivot points to addresses on people-search sites.
- Search your physical address in real-estate / property records. Voter records. Court records. Many U.S. counties publish all three online.
- Reverse-image-search profile photos you've used publicly. The same image used across platforms links them.
- Search breach databases. Have I Been Pwned for visibility on what plaintext data of yours has been exposed.
- Look at your LinkedIn — the highest-yield single source on a working professional.
- Look at people-search aggregators — Spokeo, BeenVerified, Whitepages, FastPeopleSearch, etc. Note which ones expose what.
Write it all down. The result is your personal threat model document. You'll work down it methodically.
Data broker removal
U.S. data brokers aggregate public records, voter rolls, property records, marketing data, and breached data into people-search profiles. They publish your name, address, phone, age, relatives, employer, and historical addresses. Removing yourself is tedious but high-yield.
Manual removal
Each broker has an opt-out URL. The community-maintained Privacy Rights Clearinghouse and IntelTechniques Workbook maintain current lists with the opt-out URL for each broker. Submitting takes 5-20 minutes per broker. Plan on 100-200 brokers for a thorough job.
Removal services
Services exist that automate broker opt-outs for an annual fee. Quality varies; the better ones cover 200+ brokers and run recurring re-removals (brokers re-add you periodically). For most people, the time savings is worth the cost.
What removal doesn't do
- Doesn't remove the underlying public record (county assessor, court records, etc.).
- Doesn't prevent re-addition — brokers re-ingest from public sources every few months.
- Doesn't cover all brokers — the long tail is brokers no list tracks.
- Doesn't cover state-specific exposure (e.g., voter files in some states).
Treat removal as ongoing maintenance, not one-time cleanup.
Account hardening
Every old account is a potential exposure. Your goals are: minimize total accounts, harden the ones you keep, eliminate password reuse, kill password-based authentication where possible.
- Inventory your accounts. A password manager (1Password, Bitwarden, Apple Passwords) makes this easy. Export and review the list.
- Delete unused accounts. Sites like JustDelete.me document the deletion process for hundreds of services.
- Unique passwords everywhere — password manager generates and stores them.
- Passkeys or hardware MFA on every account that supports them. YubiKey, Apple/Google passkeys, Titan keys. SMS MFA is a fallback, not a primary, because of SIM-swap risk.
- Email aliases — services like Apple "Hide My Email," Firefox Relay, or SimpleLogin let you give each service its own alias. When one leaks or starts spamming, kill the alias.
- Email hosting hygiene — your primary email is the master key. Use a strong unique password, hardware MFA, no recovery options that downgrade security.
- Phone number hygiene. Use a primary mobile for trusted MFA only. Use a secondary number (Google Voice, voice-app service) for everything else — restaurant signups, retail, deliveries.
- Recovery questions — lie. Treat them as additional passwords stored in your manager. The real answers are findable via OSINT.
Behavioral OPSEC
The biggest exposures aren't technical — they're behavioral. Patterns of what, when, where you post, who you tag, and what's in the background.
- Strip EXIF from photos you publish. Most platforms now do this server-side, but the raw uploads to messaging apps, cloud drives, and personal blogs may not.
- Don't tag your location in real time. Post after you leave, not while you're there. Especially home and frequently-visited locations.
- Audit photo backgrounds. A photo of you at home reveals interior architecture, neighborhood landmarks, addresses on mail, license plates of nearby cars.
- Audit who tags you. Friends' public posts that mention you are part of your footprint. Most platforms let you require approval before tags become visible.
- Audit linked accounts. "Sign in with Facebook" on a fitness tracker links the two. Audit what's linked.
- Audit your professional bio for over-sharing. Your kids' school, the hospital where your spouse works, the neighborhood — all common bio inclusions, all unnecessary.
- Audit your "vacation" posts. Real-time vacation posts announce that your home is unoccupied. Post photos after returning.
- Audit voice patterns and writing style. Heavy posters are identifiable across pseudonymous accounts by stylometry. If you're keeping accounts separate, keep the writing styles separate too.
Executive protection
For founders, CEOs, board members, or public figures, the threat model expands. Common additional defenses:
- Home address obscuring — LLC ownership of residential property, mail forwarding services with a registered agent address, USPS Address Confidentiality programs where available.
- Travel pattern obscuring — private flight tracking via tail-number watchers; for executives flying private, file under a leased aircraft identifier or use an FAA blocking program.
- Family-name separation — spouses and kids use a different last name in public-facing contexts.
- Public records suppression — some states allow judges, law enforcement, abuse survivors, and victims of stalking to request suppression of public records. Eligibility varies.
- Doxxing response plan — pre-arranged with security team and counsel. When a doxx drops, you have hours, not days, to act.
- SWAT-ing prevention — pre-register your address with local PD as a known target for swat-prevention; the alert tells dispatch to require verification before sending tactical response.
- Phone hardening — PIN at the carrier, port-out protection, designated security contact.
Deliberately misleading data
An advanced technique: don't just remove data — pollute it. When a data broker page can't be removed entirely, some practitioners deliberately request corrections with subtly wrong information (wrong middle name, wrong birth year, wrong relatives). The broker republishes the "corrected" data. Aggregator sites that pull from that broker then propagate the misinformation.
Considerations:
- Legally gray in some contexts (don't do this for any identity that matters to government or financial records).
- Reduces the value of your data to attackers without making you any less findable.
- Doesn't replace removal — it's a layer on top.
- Practitioners reserve this for the worst-offender brokers that refuse legitimate opt-outs.
Kids and family
Children's footprints often expose parents. Common patterns:
- School announcements publish kids' full names, grades, and award photos. Schools rarely strip metadata.
- Sports leagues publish rosters with kids' last names plus parents as coaches.
- Family birthday posts on social media expose kids' birthdates, used as security-question answers and to register fraudulent accounts in their names.
- Babysitter / nanny posts announce when home is unattended.
Defensive measures:
- Ask schools to redact last names from public announcements.
- Don't post real birthdates publicly — celebrate on the right day, post a "happy belated" or no date at all.
- Don't post identifiable kid photos to public accounts, period — use a private "family-only" account.
- Freeze your kids' credit at all three bureaus. Free, takes 30 minutes per kid, prevents synthetic-identity fraud against them years before they'd notice.
90-day defensive playbook
- Day 1-7: Self-audit. Generate your own personal threat model document. Note exposed addresses, phones, emails, family connections.
- Day 7-30: Account inventory + password manager rollout. Unique passwords everywhere. Hardware MFA or passkeys on email, banking, social, cloud storage, password manager itself.
- Day 14-21: Email alias system rollout. Migrate at least your top 20 accounts to per-service aliases.
- Day 21-60: Data broker removal. Either manual through a community workbook or via a removal service. Plan 100-200 brokers.
- Day 30-45: Behavioral OPSEC review of your top three platforms (LinkedIn, X / Bluesky, Instagram). Strip excessive bio detail. Adjust tag/mention controls.
- Day 45-60: Family OPSEC. Kid credit freezes. Family social privacy review. School/sports redaction requests.
- Day 60-90: Re-run self-audit. Compare exposure to baseline. Identify what's still findable and why. Address each.
- Ongoing: quarterly re-removal pass against data brokers. Annual deep audit.
This is real work — 20-40 hours over 90 days for a thorough job. The payoff is that the next time someone tries to dox you, they find a fraction of what they would have. That's the goal: not invisibility, just not the easy target.
For the OSINT techniques people use against you, see What Is OSINT?, Username & Email OSINT, and Geolocation OSINT. For organizational defense, see OSINT for Cybersecurity Recon. For the legal framework, see OSINT Legal & Ethics.
- Privacy Rights Clearinghouse — Privacy resources and broker lists
- Have I Been Pwned — Breach exposure check
- EFF — Surveillance Self-Defense
- FTC — Identity theft response guide