• Skip to main content
  • Skip to footer

Commonwealth Sentinel

Cyber Security for local government, non-profits and small business

MENUMENU
  • Home
  • About Us
    • Sheri Donahue
    • Leo Haggerty
    • Careers
  • Services
    • Vulnerability and Threat Evaluation
    • Transformation Management
    • CISO Management Services
    • Incident Response Management
  • News
  • Blog
  • FAQs
  • Contact Us

commonsent / May 20, 2021

Doxing to Swatting, Cyber Crime Techniques to Understand

Doxing is one of those new terms that have evolved with the information age. It comes from a combination of the words “dropping” and “documents” (or “docs” for short) meaning to release information about someone. Basically, it’s just another form of cyber crime.

The most recent example was May 11, 2021, when the personal information on 22 Washington, DC Metro Police officers was publicly released by cyber criminals who had hacked the police department and accessed the information. They demanded $4M in ransom in order not to release the data of the officers. The department counter-offered $100K which was not sufficient to the attackers resulting in their releasing the information on the 22 officers.

The information included names, phone numbers, Social Security numbers, dates of birth, marriage records, personal financial and residential data, fingerprints, lie detector test results and even psychological assessments. For anyone, the release of such personally identifiable information (PII) is dangerous, but imagine how much more so it could be for a police officer.

Threat actors use a variety of methods to gather this information. They can collect it legally via open sources like public records websites (such as Beenverified, Intelius, Peoplefinders, Spokeo, Truthfinder, Whitepages and more), social media profiles, real estate records, obituaries, and more. They also use nefarious methods such as data breaches.

The many reasons that a cyber criminal would execute a doxing attack include revenge, stalking, identity theft, encouraging physical harm, bullying or harassing (e.g., ordering 100 pizzas delivered to the person’s home).

One of the most dangerous uses is “swatting” in which the information is used to report an emergency situation under false pretenses in order to get tactical law enforcement to respond to the target’s location.  By reporting hostage situations, active shooter or other violent events, the police respond in emergency mode. The results of these “pranks” have included officers who were shot and even a victim who was shot and killed.

So if you ever wondered how serious cyber crime could be, the extent is limitless.

Filed Under: Blog

Footer

CONTACT US

COMMONWEALTH SENTINEL

1230 US Highway 127 S
Suite #5
Frankfort KY 40601
(502) 320-9885

EMAIL US

ABOUT US

Cyber security consulting for local governments, non-profit organizations, and small businesses facing the threats of the cyber world.  At Commonwealth Sentinel, we are passionate about helping people be cyber-safe!

FOLLOW US

  • Email
  • Facebook
  • LinkedIn
  • Phone
  • Twitter
  • YouTube

Copyright © 2023 Commonwealth Sentinel

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT