At some point, you probably searched for yourself and friends on the internet to see what would come up. If you haven’t googled yourself, or haven’t done so recently, I suggest you do and find out what information about you is out there; you’ll be amazed at what you uncover.
A good friend of mine was surprise when I found his current and previous addresses, email, birthday, and phone number in less than 10 minutes. We often leave a substantial footprint online without realizing it, creating a trail of data that is accessible to others.
From social media profiles to public records, you’d be surprised by the sheer amount of information that is publicly available about us on the internet, which can range from personal achievements and interests to much more sensitive details.
Open-Source Intelligence
You might be doing open-source intelligence (OSINT) without realizing it. For example, you may have looked up where a picture was taken to visit that location, or you might have researched someone you like to find shared interests. If you’ve ever used the internet for research, you’ve likely been conducting OSINT.
Today’s blog is not going to be a deep dive into OSINT but rather focus on where to start to get your data removed from some of the most common tools used when conducting an investigation, or at the very least, make it harder to find.
According to IBM, “Open-source intelligence (OSINT) is the process of gathering and analyzing publicly available information to assess threats, make decisions or answer specific questions.” There are quite a few places where someone can find information, ranging from social media platforms and online forums to governmental databases and academic publications.
These sources provide a wealth of data that, when systematically analyzed, can offer valuable insights into various subjects. Furthermore, as technology evolves, the methods for gathering and evaluating OSINT continue to become more sophisticated, enabling researchers and analysts to track trends, identify potential risks, and make informed decisions based on the collective knowledge available in the digital landscape.
The most common place to start an investigation is by using search engines. Google is the most popular, but others include Bing, Yandex, Yahoo!, Baidu, and DuckDuckGo. There are also people search engines like True People Search.
Another way to find personal information is by using social media sites like Facebook, X, and Instagram. If these accounts aren’t set up properly, they can reveal the target’s birthdate, friends, family members, hobbies, favorite places, and more.
We will focus on removing our data from the most popular search engine, Google. Next, we will remove our records from True People Search. Lastly, I will show you where to find your social media privacy settings.
Removing Your Data From Google
If you search for your name on Google and find information that you would like to remove, you can request removal of your data by following these steps:
- Start by searching for your name.
- Click on the three dots next to the result you want to delete.
- Select “Remove Result”.
- Select “It shows my personal contact info,” or read through the options and select the appropriate one.
- Choose the account you want to use to request the removal.
- Fill out the rest of the form and submit.
Removing Your Data From True People Search
True People Search is pretty straightforward. Input a person’s name, email, address, phone number, or a combination of these, and it will find anything available on the internet about the target. These can be current or past physical addresses, phone numbers, and emails, as well as people you may be related to. You can opt-out using these steps:
- Add your email and check the appropriate boxes.
- Click on “Begin Removal”.
- Search for your name.
- Find the correct result and click on “View Details”.
- Scroll down and click on “Remove This Record”.
After following these steps, you should receive an email with a link to confirm the record removal request. Make sure to also check your spam folder.
Configuring Social Media Privacy Settings
I will focus on the three major social media platforms I use to conduct OSINT: Facebook, Instagram, and LinkedIn. Follow these steps to configure your privacy settings on these platforms. Make sure to configure your privacy settings on all of the accounts you have that are not covered here, like X, formerly known as Twitter.
Note: steps may differ a little from the mobile version.
- Click on your profile picture.
- Click on “Settings & Privacy”.
- Select “Privacy Center”.
- Review your privacy settings on each of the sections.
I always trust but verify. From the “Settings & Privacy” page, select “Settings” option. On the left side scroll down to “Default audience settings” and verify it is not set to public.
- Go to your profile.
- Navigate to the settings.
- Click on “Privacy Center”.
- Click on “Review settings”.
- Verify each of the privacy sections are configured properly.
- Click the down arrow underneath your profile picture.
- Click on “Settings & Privacy”.
- Go through each of the privacy sections.
This social media platform is targeted due to the extensive personal information available, including employment history, education, location, and even full resumes with contact details.
Conclusion
These are just the first steps on keeping your data secure. I want you to keep in mind that your information may be available in more places, which can include a variety of platforms that aggregate personal data from public records, social media profiles, and other online sources.
Understand that, if you wish to protect your privacy, you would need to find out the steps to get that data removed. This often involves contacting these companies directly, navigating their removal processes, and ensuring that your information is no longer accessible to the public.
Taking a moment to review this information can not only provide insight into how you are perceived online but also empower you to take control of your digital presence and protect your privacy further.
Discover more from Cyber-Jot | Learn Cybersecurity & OSINT
Subscribe to get the latest posts sent to your email.


Leave a Reply