PEARL (THE GOSSIP BROKER)
THREAT TYPE
THREAT LEVEL
Pearl don’t need malware or weapons.
She gathers what folks give away freely – names, habits, photos, routines – then pieces it together like a map.
Every post, every check-in, every birthday wish adds another coin to her purse.
Online profiling happens when attackers collect publicly shared personal information from social media, forums, and online profiles.
Outlaws like Pearl use this data to impersonate victims, bypass security questions, craft convincing scams, or sell personal profiles to other criminals. Individually harmless details become dangerous when combined.
REWARD
35,000
Ranger’s Rules for Riding Safe Online
-Limit personal details on public profiles
-Review privacy settings regularly
-Never share live locations or travel plans publicly
-Treat security questions like passwords
