PEARL (THE GOSSIP BROKER)

THREAT LEVEL

Pearl don’t need malware or weapons. She gathers what folks give away freely – names, habits, photos, routines – then pieces it together like a map. Every post, every check-in, every birthday wish adds another coin to her purse.

Online profiling happens when attackers collect publicly shared personal information from social media, forums, and online profiles.

Outlaws like Pearl use this data to impersonate victims, bypass security questions, craft convincing scams, or sell personal profiles to other criminals. Individually harmless details become dangerous when combined.

REWARD

35,000

Ranger’s Rules for Riding Safe Online

-Limit personal details on public profiles
-Review privacy settings regularly
-Never share live locations or travel plans publicly
-Treat security questions like passwords

Scroll to Top