How The Alt-Right Activist Can Avoid Being Doxxed

The Foundation for the Marketplace of Ideas, Inc., published on its website a well-read article on October 2, 2016, entitled “What Alt-Right Activists Can Do When Doxed By The Politically Correct Left.”  That article dealt with what an Alt-Right activist can do upon being doxed so as to mitigate the severity of the outcome, while this article deals with what an Alt-Right activist can do to prevent the likelihood of being doxed in the first place.

Doxing is the Internet-based practice of researching and broadcasting private or identifiable information—especially personally identifiable information—about an individual or organization.  When a person “doxes” their victim, it is often done with malicious scienter for the purpose of intimidation and to foment societal ostracism against their target.  The leftist Southern Poverty Law Center, for example, doxes political dissidents on its Hate Watch blog; the SPLC’s Mark Potok has noted that “The cost of being outed as a member of these groups, which happens increasingly often these days, is very high.  People lose their jobs, their spouses, their families, and so on.”

To avoid suffering the fate described by Potok, here are some suggestions to keep in mind:

  1. The access to one’s social media profiles should be heavily restricted—even to one’s friends.  Access to one’s social media profiles should be kept strictly secure so that only approved individuals can view them.  When Attorney Kyle Bristow posted security video camera footage of Antifa attacking the Ashford House, Alt-Right activists found the Facebook profiles of the individuals who were charged with crimes and cross-referenced the profile photographs of their Facebook friends with then-unidentified criminal suspects depicted in the video—this permitted additional suspects to be identified.  One’s social media accounts friends lists should never be accessible by anyone—even to one’s friends.

  2. A person’s identity can be ascertained by performing a reverse image search.  If one posts a photograph of oneself on a social media account with their real name and uses the same photograph for an ulterior purpose for an anonymous account, a reverse image search can easily be performed to link the two photographs—and webpages—together.  After Nathan Damigo of Identity Evropa employed the use of self-defense against Emily Rose Nauert during the Battle of Berkley, Alt-Right activists used reverse image searches to track down Nauert’s online presence based upon her known Facebook photographs—and what was thereby discovered was that Nauert is a “hairy bush fetish porn star.” 

  3. Do not assume that the use of an anonymous name will shield one’s true identity.  When social media accounts are created, one often verifies it by providing an email address or cell phone number which is used to authenticate the account.  If a cell phone number or email address is known and is used to perform a search, the social media profile may appear in search results.  This is how Mike Enoch was doxed—his old PayPal account was previously published on The Right Stuff website—, and how John Rivello was doxed after sending an apparently life-threatening tweet to Kurt Eichenwald 

  4. Although websites can be shut down and content removed, the Internet is forever.  A search via can be used to view how a webpage appeared yesteryear.

  5. If one has a website, make sure that the registration information associated with the website is set to private.  A WHOIS search can otherwise easily be performed to ascertain the individual who purchased the website domain name.  The metadata of websites can also be examined, which can reveal information concerning them—which was recently done by leftists against the websites of the National Policy Institute, Identity Evropa, and FMI. 

  6. Run TorTor was developed by the U.S. government to shield U.S. intelligence communications online via “onion routing.”  It is now available for the public to use at no cost.  However, it is possible that the federal government has figured out a way to nevertheless ascertain the identity of computer users who utilize Tor:  in 2017, the federal government’s prosecutors dismissed a child pornography criminal case instead of agreeing to disclose their Tor exploit, and the FBI shut down in 2014 during Operation Onymous a number of dark web websites which had previously been shielded through the use of Tor.

  7. Do not underestimate the power of crowdsourcing.  When Shia Labeouf hung up a leftist flag that only showed the background sky, the flagpole, and the flag, 4Chan users quickly tracked its location down by studying plane contrails while it was daytime, the sunrise and sunset times, and star patterns while it was nighttime.  There are extremely sophisticated, intelligent, and dedicated individuals who will eagerly work to dox a target, so if one is in the public spotlight, one should immediately go dark by shutting down one’s online presence until the controversy passes.  When Amanda Carpenter was named as a possible mistress of Ted Cruz, Carpenter did not immediately restrict access to her Instagram page and doxers found a photograph of Carpenter sitting on a hotel bed with condoms apparently next to her – which only fueled the controversy. 

  8. Note that one’s communications with government agencies can be disclosed to third-parties via open record act requests.  When Heidi Beirich of the SPLC excitedly yelped on Hate Watch that she had obtained documents from a government agency concerning an event for nationalists via a Freedom of Information Act request, Attorney Kyle Bristow sent his own record request to the government agency to request a copy of any and all documents provided to Beirich—in addition to any and all written or electronic communications exchanged between Beirich and the government agency.  Bristow got what he requested—which includes Beirich’s personal cell phone number.  Similar record requests have been used by FMI to obtain interesting materials from government agencies concerning matters of concern.

  9. Maintain solid OPSEC.  OPSEC is necessary to ensure that Alt-Right activists are not doxed.  Independent Alt-Right groups have formed throughout the entire United States—a person in each group should be entrusted with vetting prospective members and a cheap monthly account with should be considered to verify their true identities.  One should also use the tools of doxers to ascertain the risk of oneself being doxed so that preventative measures can be taken:  review security settings on one’s social media accounts, perform reverse image searches of one’s more widely used photographs to ascertain whether one’s identity can be ascertained if such searches are performed, search for one’s email address and phone number on social media search engines to see if one’s anonymous social media profile appears in search engine results, run WHOIS searches of one’s own websites to confirm that one’s identity is not disclosed, and use to see what information already exists for oneself when a search is performed.

For more information about doxing, consider reading Untangling the Web: A Guide to Internet Research, which was commissioned by the National Security Agency for its agents to use and declassified years ago.

FMI is a non-partisan educational organization approved by the Internal Revenue Service as a public foundation operating under Section 501(c)(3) of the Internal Revenue Code.  FMI does not endorse, support, or oppose candidates or proposed legislation.  Contributions to FMI by individuals, corporations, and foundations are tax-deductible.

To donate, please mail a check or money order made out to “Foundation for the Marketplace of Ideas, Inc.” to:

Foundation for the Marketplace of Ideas, Inc.
P.O. Box 381164
Clinton Twp., MI 48038

Please be sure to include your name and mailing address with your donation so that a tax-deductible donation receipt can be mailed back to you.

Alternatively, payment by credit card can be made via the website of GuideStar—which rates FMI as a platinum participant.  (The only donation feature is immediately below the header and above the taskbar.)