gameshotline.org Open in urlscan Pro
199.16.172.83  Public Scan

Submitted URL: http://www.onlinesafety.feministfrequency.com//2023//08//03//the/-games/-hotline/-sunset//
Effective URL: https://gameshotline.org/online-free-safety-guide/
Submission: On October 04 via api from US — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

Digital Safety Guide
 * Prevention Measures
 * Preventing Doxxing
 * Passwords & Login Security
 * Website Security
 * Social Media
 * Monitor Your Information Online
 * Own Your Namespace
 * Online Gaming Security
 * Physical Mail
 * Miscellaneous
 * Document and Report
 * People-focused Strategies
 * More Resources

 * About
 * Guides
 * Resources
 * ReSpec
 * News

Close
Nav Menu

The Games Hotline closed in October 2023. Read more →

 * Introduction
 * Prevention Measures
 * Document and Report
 * People-focused Strategies
 * More Resources.


GAMES HOTLINE DIGITAL SAFETY GUIDE

PROTECTING YOURSELF DURING ONLINE HARASSMENT ATTACKS


FEELING OVERWHELMED?

START WITH THESE THREE STEPS:

 1. Create unique, complex passwords
 2. Set up two-step verification
 3. Remove potential doxxing information

This guide focuses on prevention. If you’re being targeted for harassment now,
the Consumer Reports Security Planner has a list of resources and organizations
to support you.

For emotional support and basic guidance about your situation, reach out to the
Games and Online Harassment Hotline by texting SUPPORT to 23368 from anywhere in
the USA.

--------------------------------------------------------------------------------

NOTE: We’re sharing things we’ve learned about how to keep yourself safe from
individuals, loosely organized groups & cybermobs. If you’re concerned with
attacks from governments, major corporations, or other massively organized
and/or resourced institutions, we recommend the Frontline Defenders Workbook on
Security and the EFF Security Self Defense Guide.

This is for anyone who seeks to enhance their digital hygiene and security in
light of anticipated or existing threats, but it is especially designed for
women, Black, indigenous, and people of color, trans people, and everyone else
whose existing oppressions are made worse by digital violence. It details best
security practices for social media, email, online gaming, website hosting, and
protecting privacy of personal information online, as well as the documentation
and reporting of harassment, and caring for yourself emotionally during an
online attack. You don’t need any specialized knowledge to use this guide – just
basic computer and internet skills.

The authors of the guide have all been targets of cyber attacks ourselves; we’ve
written the guide we needed when the attacks on us began. We’re all based in the
USA, but we’ve done our best to make it useful no matter where you live.

We wish we didn’t have to write this. Going through even some of these steps to
protect your online safety will cost you real time and sometimes money. It’s a
tax on women, people of color, queer and trans people, and other oppressed
groups for just existing online or daring to use our voices in public.

None of this is fair. It should not be our meticulous labor and precious funds
that keep us safe; it should be our basic humanity. But that has proven
heartbreakingly, maddeningly insufficient more times than we can count. So below
are some of the things that we’ve learned that can help, even though we
shouldn’t have to do any of them. While we fight for a just world, this is the
one we’re living in, and we want to share what we know.

We also want to acknowledge that people with more financial and leisure-based
privilege will have better access to implementing comprehensive strategies — a
structural unfairness that highlights how unjust online harassment is. It’s also
true that none of these are foolproof — you could employ all of these strategies
and still be targeted.

And just to be crystal clear: if someone attacks, harasses or threatens you
online, it’s not your fault, even if you haven’t previously taken any safety
precautions.

It’s never your fault. Never. Ever.


ABOUT US

The original version of this document, Speak Up and Stay Safe(r): A Guide to
Protecting Yourself from Online Harassment, was created by Jaclyn Friedman,
Anita Sarkeesian, and Renee Bracey Sherman to share what they’ve learned through
years of being targeted by cyber mobs, in the hopes that it will empower readers
to make informed safety and security decisions that are right for them.It has
been updated and is now maintained by Games and Online Harassment Hotline in
partnership with Tall Poppy.

Last updated September 10, 2023


RECOMMENDED PREVENTION MEASURES

Below is a suggested list of steps you can take to mitigate potential escalation
of attacks through intimidation, harassment, threats, and abuse. It is not a
complete or comprehensive list, just the highlights of our recommendations; we
urge you to also consult other online safety resources.


PREVENTING DOXXING

Doxxing is when harassers publish the personal information of their targets.
Often doxxing comes with spoken or unspoken encouragement for others to use your
personal contact information to escalate the harassment against you or their
target.

In general, harassers rely on finding information that’s already in the public
record, such as corporate records, licensure records, and property records.
Unfortunately, the specific public records available will vary from location to
location — you’ll want to do research about your local laws and regulations,
especially if you’re not in the US.


DATA BROKERS

Data brokers are an issue for people who have lived in the United States long
enough to receive mail. If that doesn’t describe you, skip down to the next
section.

If you live or have previously lived in the United States, your information is
everywhere online. Your name, home and/or work address, phone number, email
address, and other sensitive information are almost surely posted for public
viewing on various websites. This is often how harassers find the info they use
to dox their targets.

People finder websites are publicly available databases where an attacker can
use the information they already have, like your name and other identifying
information, to look up your email address, phone number, physical address,
relatives, and more. You should check these sites to see if they’re sharing or
selling your information. If they are, you should have the information taken
down. Yael Grauer maintains a huge list of these sites with detailed
instructions on how to opt out of each one. There are many “people finder” sites
and this process can be overwhelming, so we recommend that you start with the
ones marked as High Priority on Yael’s list.

It’s good practice to check these sites every three to six months because your
info can be re-listed even after you’ve had it removed. Another option is using
paid, automated opt-out services like Optery, Kanary, and DeleteMe. Even if you
don’t end up paying for the automated opt-out service, they can scan data
brokers for your information and provide a report of what they find. Then, you
can use what you learn to do the opt-outs manually by following the instructions
on Yael’s list.

TIP: Harassers sometimes attack their target’s loved ones as well. We suggest
encouraging your close family, friends, and colleagues to take steps to remove
personal information from “people finder” websites as well.

TIP: Reverse look up your personal information by google searching your address,
email address, or phone number and see where/if it is listed online. You can
also try sites like White Pages Reverse Phone Lookup or Spokeo.


RESTRICT WHAT YOU SHARE

One free and low-tech way of reducing your risk of doxxing is to restrict what
you share online. Especially consider not mentioning details about where you
live, your current location if you’re traveling, the names of anyone you live
with (those names can be used to find your address), and any information that
can be used in accessing your accounts (so, your maiden name, or anything that
you might use to answer a “security question,” like the name of your childhood
pet, or the street you grew up on.) The less information available about you
online, the less there is available for doxxing. Of course, restricting some of
this information can feel onerous for a variety of reasons, so the balance is up
to you.

--------------------------------------------------------------------------------


PASSWORDS & LOGIN SECURITY

Passwords are necessary for almost everything we use these days, and they are
crucial in protecting our information online. Here are a few important things to
remember when creating passwords.


USE A PASSWORD MANAGER

You might already be familiar with password managers like Apple Keychain or the
password manager built into your browser. Password managers can create and keep
track of highly random, high-security passwords for all your online accounts in
securely encrypted “vaults”. Some password managers will even autofill your
passwords so you don’t have to type them out.

If you’re already using Apple Keychain or the password manager built into your
browser, you should make sure the passwords saved in them are strong. If you’re
starting from scratch or don’t mind switching to another system, we prefer using
dedicated password manager apps like 1Password and Bitwarden. These apps have
additional features such as secure cross platform syncing, safe ways to share
passwords, and even alerts if your password is in a data breach. Both 1Password
and Bitwarden have browser extensions and iPhone or Android apps, so your
passwords will be available wherever you go.

Not only are password managers super secure and convenient, they make the rest
of the tips in the Password and Login Security section easier. For more
information on password managers, check out the Password Manager section of the
Consumer Reports Security Planner. 

TIP: Don’t save your passwords in an insecure document or spreadsheet. If a
hacker gained access to that file, they’d have all your passwords.


HAVE A LOT OF DIFFERENT PASSWORDS

We recommend using a unique password for every account you own. It might be
tempting to just use the same password for everything, but if you do, someone
who figured out what your password was for one account and knew your email would
be able to log in to other accounts. By using a different password for every
account, you’ll limit the damage to just the single account that was
compromised.

You probably have more accounts than you think! Here are some types of accounts
you may have: email, bank, credit card, social media, services, apps, petition
sites, health insurance and hospital record websites, municipal and other
government sites, and accounts for utilities like water, power, and internet,
website, hosting and domain related sites, budgeting sites. Once you realize how
many accounts you have, using different passwords for everything might feel
intimidating. This is why it’s critical to use a password manager to create and
store those passwords.

Security people used to recommend changing passwords on a recurring basis, but
best practices have evolved in recent years to focus on having unique passwords
everywhere – if your passwords are unique, changing them matters a lot less. We
recommend checking the service Have I Been Pwned regularly to see if your
passwords have been compromised in data breaches, and only changing the ones
that have.

TIP: For additional security, consider using a unique username for each account
as well.


MAKE YOUR PASSWORDS DIFFICULT

Passwords should be long and hard to hack. In practice, that means passwords
should be a mix of upper case letters, lower case letters, numbers, and symbols.
Ideally, you’d use 8-20 characters (or more). Do not use personally significant
keywords that attackers can look up (like phone numbers, birthdays, pet names,
or family member names) in your passwords. 

Most password managers will create and save strong passwords for you, so you
won’t have to copy and paste or type them into the password manager manually.
You can also use a site like Password Generator to create passwords, but you’ll
have to save your passwords to your password manager manually. 


SHARING YOUR PASSWORDS

Passwords are only as secure as they are secret. Never share your passwords with
anyone – not even your best friend or your partner — unless it is absolutely
necessary. The fewer people who know a password, the less vulnerable it is. If
you do need to share your passwords, the best way to do it is to use the
built-in sharing function of a password manager. Make sure to establish rules so
that everyone who has the shared passwords maintains them in a secure way.

TIP: If sharing passwords through your password manager isn’t possible, share
your password over a secure messaging service or a reputable dedicated service
like QuickForget.com. Never share your passwords over insecure connections like
text messages, instant messages, or DM.


TURN ON 2-FACTOR AUTHENTICATION

2-Factor Authentication (also known as 2-Step Verification, 2FA, or Multi-Factor
Authentication) protects your accounts from attackers even if they’ve figured
out your password. After you’ve set up 2FA on an account, when you or anyone
else tries to log in to that account, you’ll need to enter a code from an app or
a text message to finish logging in. For more information on setting up 2FA,
check out this guide on Consumer Report’s Security Planner. To see what 2FA
options are available for any specific site or service, look it up on the 2FA
Directory.


USE SECURITY QUESTIONS

Many sites ask you to create one or more security questions that they can use to
verify your identity if you forget your password. You should make the answers
something only you know — something that cannot be found online or figured out
from your social media.

We recommend creating complex passphrase style sequences of random words for
your security question answers. Then, save the security questions and their
answers in your password manager to ensure that you don’t forget them and can
access them easily when you need them.


EMAIL ADDRESSES

You may want to have several different email addresses for different purposes,
whether it’s separating out personal and professional communications or siloing
off individual projects. If you own your own domain, you can also set a unique
email address for each account that you can track with a password manager, along
the lines of websitename@yourdomain.com.

The important thing to consider when it comes to email addresses is that if an
adversary has access to the email address associated with a particular online
account, they can typically request a “password reset” and take over the online
account. So it’s essential to use strong passwords and two-factor authentication
on one’s email accounts, to keep any accounts attached to them safe.

--------------------------------------------------------------------------------


WEBSITE SECURITY

If you have your own site, there are proactive measures you should take to
protect yourself from harassment and make sure your site isn’t taken down by
attackers.


DOMAIN REGISTRATION

If you own one or more web domains, your contact information may be publicly
available via the “whois” protocol or various public Whois search sites, like
domaintools.com. Many domain name registrars offer the option to keep this
information private either for free or for a small fee. The availability of
private registration services depends on the top level domain — for example, .ca
has free private registration, but .us domains cannot be registered privately.
Contact the helpdesk of the company you registered your domain names for
assistance.

If you’re not able to register your domain privately, an alternative is to
register your domain to a virtual mailbox or PO box.


WEBSITE HOSTING

These days, many personal websites run on hosting services like Squarespace,
Wix, WordPress.com, or Weebly. These services all operate their own security
teams and are relatively resilient to things like DDoS attacks. It’s still
important that you have good general account security practices (like using
unique passwords and two-factor authentication), but it’s much less risky to
have a website using one of these services than it is to run a site on your own
hosting.

If you’re using custom WordPress plugins, have a custom site using a self-hosted
content management system like Drupal or Joomla, or if you’re using something
even more customized, there are additional things to consider:

 * Make sure that your CMS (content management system) and any installed plugins
   are kept up to date
 * Be thoughtful about what data you store in private areas of the site
 * Consider hardening your site against DDoS (Distributed Denial of Service)
   attacks by using a CDN (content delivery network)
 * Back up your site on a regular basis so that even if something catastrophic
   happens, you can always set it back up on a new hosting provider.

The EFF has extensive documentation on keeping your self-hosted site online. If
this all seems overwhelming, we recommend using one of the simple hosting
options we mentioned at the start of this section.


COMMENTS ON YOUR SITE

If your site is a home for your community (for example, a blog) it might be
important to you to have comments enabled. It’s a good idea to moderate comments
before they appear on your site. Not only does this cut down on the amount of
spam that appears, but it also ensures that nasty comments and defamatory
statements do not appear on your site. Having people register for a commenting
account using a service like Disqus can keep attackers from spamming your
website with hateful comments.

You don’t have to have comments enabled for your site. If your site provides
static information, it might be better to turn comments off altogether and focus
on fostering your community on venues with strong built-in moderation tools,
like Discord.

ASK A FRIEND: If your comments are being flooded with slurs and hate, ask a
friend to monitor your site, document any threats, and delete offending
comments.

--------------------------------------------------------------------------------


SOCIAL MEDIA

Many of us use social media to connect with friends and family, and as a
professional tool as well. Unfortunately, social media is also one of the most
common channels for harassment, abuse and doxxing.


GENERAL SOCIAL MEDIA ACCOUNT SECURITY

Every social media platform has its own set of security options and concerns. To
make matters more complicated, those options can change with little notice. For
a guide to what your options are and how to think about them on some of the
major platforms, we recommend this guide from the Consumer Reports Security
Planner. In addition, this NNEDV guide designed to help survivors of intimate
partner violence navigate Facebook is really great. 

The right balance of security settings is up to you. The important thing is to
make informed decisions about what works for you. We also recommend you re-check
your settings against these guides every 6 months or so, in order to keep up
with changes the companies may make.


TURN OFF LOCATION DATA

Harassers and attackers can use location data from social media apps to locate
your frequent hangouts and figure out your home address. To prevent this, turn
off location sharing on your social media using the privacy settings on your
iPhone or Android so that the only apps that have your location are the ones
that need it, like Google Maps or Apple Maps. We recommend making sure your
camera app doesn’t have access to your location as well so that it isn’t leaked
in the EXIF data of pictures you share.

Be cautious about where you check in on Facebook or what locations you tag on
Instagram. If it’s a place you go to often, it might be best to keep that place
private.

Most social media sites let you delete your location history so that attackers
can’t find it in the future. Here’s how to do it on Facebook and Twitter. On
Instagram, you’ll have to delete location data post-by-post.

TIP: Having fun with friends and everyone wants to share pictures and updates on
social media? Just ask them to make sure their location data is turned off.


DECIDE WHAT YOU WANT TO SHARE

You probably have a great community and want to share with them. But before you
post, ask yourself questions like:

 * What information and photos are available publicly? Will sharing this
   information make it easy for an attacker to find you? What about if you
   combined it with your name and your city, if you’ve shared those?
 * How would you feel if a harasser turned this photo into a harassing meme?
 * Will sharing your birthday make it easy for someone to find you and
   compromise your accounts?
 * Does this picture contain any distinctive landmarks, like trees, signs, or
   landmarks, that someone can use to find my location?

Minimizing the amount of information that is freely available about you,
especially on your basic and public social media profiles, is going to make you
more secure, though it’s also a sacrifice in that it limits what you can share
with your community. There’s no right or wrong answer about how much to share,
but do make the risk/reward assessment deliberately.

TIP: Be mindful of EXIF data — data embedded in images, which often contain
location data. Although most social media scrubs EXIF data, if you’re sharing
files directly, uploading images to your personal site, or using less well known
social media, you can use a tool like MediaInfo to check what EXIF data is
embedded in your photos.


BE CAUTIOUS IN THE DMS

Direct messages on social media are only as safe as your account’s security.


MODERATING YOUR COMMUNITY

DISCORD

You might already have a discord set up for your community. We recommend
restricting access to new users who just joined your server until they are
vetted or assigned a role. The Games Hotline guide for protecting your Discord
from hate raids has further detailed settings and permissions overviews to
improve the security of your Discord as a whole. It also includes a handy server
template that you can freely copy, explore, and tweak on your own.

If you haven’t already had a look at Discord’s Moderator Academy, it’s full of
helpful documents on choosing and training new moderators for your team,
reporting abusive users to Discord, and moderating voice channels. 

TWITCH

If you use Twitch to live stream games, you’re probably already familiar with
moderation on Twitch. The following chat configurations can be powerful tools to
prevent harassers from flooding your chat:

 * Turn on Twitch’s Automod and configure it using this guide. If you’ve already
   got Automod on, you can temporarily turn it up a level or two if you’re
   experiencing an uptick in abuse.
 * Prevent harassers from using bots and throwaway accounts by requiring chat
   verification.
 * Turn on the Delete Links setting in your Channel Settings to automatically
   delete links posted in chat unless they’re from you or your team.
 * Put Twitch chat in slow mode or have a cooldown on chat.
 * Buy your moderators time to act when they see inappropriate messages by
   setting a non-moderator chat delay.
 * Restrict chat to followers only or even to followers who have followed you
   for at least some length of time.
 * Restrict chat to subscribers only.
 * Turn on Uniquechat to prevent harassers or bots from spamming messages.

If you’re the target of a harassment campaign, it might be helpful to check out
Twitch’s guides for using moderation features to manage harassment and combating
targeted attacks.

You can also use a third party moderation bot to moderate your chat. Nightbot,
Moobot, and PhantomBot are all popular options.

FACEBOOK PAGES

You probably already have a personal Facebook account. If you have a public
persona, you may want to create a public Facebook page. A public page allows you
to connect with your community on your terms. Facebook users who follow your
public page can see the articles and updates you post on it without being
“friends” on your private Facebook account, allowing you to maintain some
separation between your private and public lives.

We recommend going through your Facebook friends list and unfriending anyone you
don’t know personally, and directing those people to follow your public page.
You might decide to be really selective and cull your friends list down to
people you have a strong connection with, like your close family and long
standing friendships. It’s up to you to decide where to draw the line between
your private and public lives.

TWITTER BLOCKING & MUTING

Blocking and muting on Twitter can be done on a case-by-case basis. We
understand all too well that when you are being attacked by a mob, it is nearly
impossible to manually block or mute everyone sending you nasty and/or
threatening messages. However, there are now sophisticated blocking tools
available to you, like Twitter’s Tweetdeck.

Blocking a harassing account will remove any tweets from that account from your
timeline and stop that account from seeing your Twitter profile and tweets,
although the person behind the account can see your profile if they’re logged
off or logged into a different account. Muting a harassing account will only
remove any tweets from that account from appearing in your timeline. When you
mute an account, you can still go to their profile to view their tweets.

Blocking or muting an account won’t notify that account. They might figure out
you’ve blocked them by attempting to visit your profile, but if you chose to
mute them your profile will look the same to them.

Twitter offers shareable block lists that can help preemptively block
potentially harassing accounts so you don’t see those messages in your mentions.
You can share and use friend’s block lists directly on Twitter.

ASK A FRIEND: Twitter’s Tweetdeck also lets you have a friend block or mute
abusive accounts on your behalf.

--------------------------------------------------------------------------------


MONITOR YOUR INFORMATION ONLINE

Sometimes bloggers and journalists write posts about us without our knowledge.
It can be important to keep an eye on the information that is on the internet
about you.


INFORMATION MONITORING

Although there are paid information monitoring services, you can set monitoring
up yourself through free services like Google Alerts and Visualping.io.

You can use Google Alerts to send you email alerts when your name appears
online. When you’re setting up your alerts, include not just your name, but
common nicknames you have, common misspellings of your name, as well as your
phone number and your street address, to monitor if anyone is sharing these
publicly. Because you’re using sensitive information, when you set up your
alerts, make sure the Google account you’re using is secured.

Visualping.io allows you to monitor specific sites and threads for activity.
They have a free tier, but you can pay for the service to have more pages
monitored and more frequent checks.

On Twitter, you can monitor when someone tweets your name without tagging you
through a search column in Tweetdeck or even by using Twitter’s search function
and saving the URL to look at every once in a while.

Because these programs are free, they’re a little limited, but they’re still
accurate and useful.

ASK A FRIEND: You can set up alerts to be sent to a trusted friend who can
monitor them for you.


IMAGES AND PHOTOS

Every once in a while, you may want to do an Internet search of yourself to see
what images appear on various search engines. If there is a particular photo you
are concerned about you can do a reverse image search with sites like Google
Images or Tineye where you upload an image and they run a search for it across
indexed sites on the web. This can be helpful in monitoring your unwanted online
presence.

--------------------------------------------------------------------------------


OWN YOUR NAMESPACE

If you can, try to secure accounts in your name and in variations on your name
on every major platform, even ones you don’t intend to use, to make it harder
for anyone to pretend to be you. You may also want to register as many of the
email domains with your name as possible to ensure that you own them and no one
else can use them to pretend to be you; for example yourname@gmail.com,
yourname@yahoo.com, yourname@protonmail.com, yourname@aol.com, yourname@mac.com.

Should you need to take a break from a social media account you already own, do
not delete your account. If you delete your account, other users might be able
to claim your handle and use it against you. Instead, make the account private
or deactivate it. If those aren’t options, simply delete the app from your
device and turn off the email notifications. 


ONLINE GAMING SECURITY

There are a number of security steps that can be taken to protect your privacy
and security when gaming online, some of which overlap with suggestions
throughout the rest of this document. You can, of course, implement some or all
of the following recommendations to best suit your specific needs.


PASSWORDS & TWO-FACTOR AUTH

Secure your accounts using the Passwords & Login Security section.


GAMERTAG/HANDLE/ONLINE ID

Many people want their friends to be able to find them easily. But if you’re
being targeted, being easy to find might not sound so attractive. Using
different and dissimilar gamertags for each gaming platform and for usernames
for other accounts makes it difficult for attackers to find your other gaming
accounts even if they manage to compromise one. For example, AppleSauce54 on
XBOX and AppleySaucey54 on Battle.net are easy to link together.

It’s up to you to decide if it’s worth it to sacrifice the uniformity of your
gamertags for the additional security of having dissimilar gamertags.


PROFILE

Avoid using information or photos that reveal personal details about yourself.
Do not answer security questions with real answers. Responses should be
impossible to guess and impossible to look up online — avoid animal names,
partner’s names, school names, street addresses, etc. You could use passphrases
to answer security questions and store those in a password manager for easy
access. Avoid using your real birthday.


EMAIL ADDRESS

Use a couple of different email addresses for different gaming accounts. For the
highest security, you can even use a unique email for each account. This can
help make it more difficult to access all your gaming profiles if one account is
compromised.


PRIVACY SETTINGS

Most online gaming systems offer a selection of privacy settings, some more than
others. Look through each system’s preferences/settings regarding:

 * Automatic vs sign in each time login
 * Who can see when you are online
 * Who can see what you are playing
 * Who can send you voice and text communications
 * Who can send you friend requests
 * Who can see your profile
 * Who can see your gaming history
 * Who can see your friend’s list
 * Who can see your game clips
 * Settings regarding uploading game clips to online servers
 * Sharing gaming content to social networks
 * Requests to join multiplayer games
 * Adding and blocking friends
 * Who can see your real name

As you look through the options for each setting, think about what might happen
if an attacker had this information or that level of access. The specific
settings you’ll choose depend on what’s right for you.


LIVE STREAMING GAMES

If you live stream games on Twitch, check out the settings we recommended for
chat in the moderation section. If you use other live streaming services, like
Youtube or Facebook Gaming, look for similar moderation tools. 


HATE RAIDS

Hate raids are yet another symptom of the systemically racist, sexist,
queerphobic, oppressive culture we live in. They are a tool used primarily to
silence and intimidate streamers, and we have seen how they are unfairly and
disproportionately targeted at Black women, queer, and BIPOC streamers. Our
guide How do I stay safe from a hate raid? has specific suggestions on what to
do before, during, and after a Hate Raid.


SWATING

SWATing, also known as swatting, is a dangerous and traumatizing escalation of
doxxing attacks. SWATing attacks are when a harasser calls emergency law
enforcement claiming something violent and dangerous, such as a shooting or a
kidnapping, is happening at a target’s house. The harasser’s goal is to activate
local SWAT teams. It’s most common in the gaming and streaming community:
harassers attempt these attacks during their target’s live stream events so that
the SWAT team attack will be live streamed. 

WHAT TO DO IF YOU’RE AT RISK

While we generally do not recommend interacting with law enforcement, if you
fear you may be targeted with a SWATing attack, reaching out to your local law
enforcement through their non-emergency line is typically the best preventative
approach. 

Here are some best practices:

 * Research your local police force’s practices. Some police forces have a
   SWATing protocol in place. Check your local law enforcement’s website to see
   if there’s any information.
 * Call the police in advance. Share your concern and try to get a record filed
   ahead of an attack. Communicating with the police yourself, in advance of an
   attack, about the possibility of fake reports for your address can prevent
   them from deploying agents if they receive those calls. You’ll need to verify
   your identity, which may include providing documents or answering many
   personal questions. 
 * Use a script. Here’s one we like:
   * Ask if they are familiar with SWATing.
   * If yes, explain: Someone on the internet is harassing/stalking me. There’s
     a chance they’ll try a SWATing attack, so I wanted to reach out and let you
     know. If you receive a report of a threat to my address, I need you to call
     my cell number before sending out emergency responders.
   * If no, explain: My personal information, including address/phone
     number/social security number was recently posted on the internet by
     someone who is harassing/stalking me. There is a chance that someone may
     call in a fake bomb or hostage threat at my address as part of the
     harassment, so I wanted to reach out and let you know that this could
     happen. If you receive a threat like this for my address, I need you to
     call my cell number before sending emergency responders.

WHAT TO DO IF AN ATTACK IS IMMINENT 

Here’s what you should do if you believe the threat is imminent. We recommend
taking these steps even if you’ve already reached out to your local law
enforcement.

 * Put any pets into crates or kennels to protect them.
 * Open doors throughout your living space.
 * Consider putting a sign on your front door with a note that you’re
   experiencing ongoing online threats. You might want to include your cell
   phone number.

WHAT TO DO IF AN ATTACK HAPPENS

When the police arrive, do not try to explain the situation right away. Instead,
answer their questions in short sentences first. After the situation has been
deescalated, you can elaborate on your situation. Having a script, like the ones
we provided above, memorized or handy can help you explain.


DOWNLOADS AND VIRUSES

Only download games, game saves, cheats, mods, or other content from reputable
and secure sources. Game “cracks” are a common way people get infected with
malware. If you do need to use untrusted applications and content on a regular
basis, consider having a dedicated computer for experimentation, or reinstall
your operating system on a regular basis to clear out malware. Unfortunately,
preventing these issues isn’t as simple as running an antivirus program —
security experts no longer recommend that the average user run antivirus.
Fortunately, this is because the built-in security of modern Windows and Mac
computers makes them much more resistant to malware — unless you’re deliberately
going out of your way to run sketchy software.

--------------------------------------------------------------------------------


PHYSICAL MAIL

Although physical mail is much less prominent now, you probably still get quite
a bit of physical mail and packages sent to your home. Consider alternative
options like a P.O. Box or Virtual Mailbox and/or consider using an alias or
pseudonym when receiving mail to your home.

TIP: Consider purchasing a paper shredder for any documents or packing labels
with your name, address, and other sensitive information listed.


US POST OFFICE BOX

If you live in the US, you can get a PO Box and have all of your non-personal
mail, including bills, catalogs, magazines, etc., sent to your PO Box instead of
to your home address. That way, if your address is bought or sold, or if someone
manages to access one of your accounts, they won’t have your home address. We
suggest having your P.O. Box a reasonable distance away from your home or work.
Ideally, it’d be in a different zip code or even a different town so it’s not
easy to guess where you live based on your PO Box address.


VIRTUAL MAILBOX

Another option is getting a virtual mailbox, also referred to as a private
mailbox. These are provided by companies that assign customers an address and
unique mailbox number. The address they assign you might be located in a
different city (or even a different state). When they receive your mail, they
can even scan your mail before forwarding it to you, although they may charge
extra for it. Virtual Mailboxes tend to cost more than P.O. Boxes even without
paying for additional services.

--------------------------------------------------------------------------------


MISCELLANEOUS


USE A SECONDARY NUMBER

In the United States, you can get a free secondary number via VOIP services such
as Google Voice and have it ring to whatever phone you want. This allows you to
avoid giving out your actual number. Look for a service that transcribes your
voicemails and allows you to block callers.

If your number is doxxed or if you’re concerned about harassing calls, don’t
pick up the phone unless you’re expecting the call — it’s easy to spoof phone
numbers so it looks like your bank or your relative is the one calling.
Attackers will get bored if they don’t get you, and you can just block their
number after the first call and never hear from them again. Poof!


PEN NAMES

A pen name is a pseudonym that a writer publishes under to protect their true
identity. This can be a completely different name or a name based on your given
name. If you are worried about being doxxed or losing your privacy, especially
if you have an uncommon first and last name combination, you may want to weigh
your options when it comes to a pen name.

This is probably only a realistic option if you’re just beginning your
professional career or starting a new project unrelated to your current
professional life. If you decide to use a pen name, make up a name, perhaps your
first name and an old family last name, a pseudonym based on your work, or a
made up name altogether. For more information on using your real name versus a
pseudonym, check out this guide from Gender and Tech Resources.


CAMERA SECURITY

Covering webcams when they are not in use is a good idea in case someone gains
access to the camera on your computer or mobile device. Some webcams even have
built in covers. For those that don’t, you can easily cover the camera on your
computer with a sticker or a post-it note. Choose something easy to remove so
you’ll still be able to use your camera. If you want something nicer, there are
more sophisticated covers, such as C-Slide. 


VIDEO AND TEXT CHAT

Using secure chat and video call apps is a good idea in general. It may be
surprising, but SMS is notoriously insecure. Facebook Messenger, Instagram DMs,
Snapchat, and Twitter DMs are all also routinely used for sensitive
conversations but are insecure as well. Specifically, when you send messages
over these services, it’s possible for employees of the companies who operate
the services to read your messages by intercepting them or even for an attacker
to read them by gaining access to your account.

There are great options for secure messaging and video calls now, though. Signal
and iMessage/ Facetime are the best options. WhatsApp and Facebook Secret
Conversations are okay too. Whatever messaging or video calling platform you
choose to use, make sure your conversations are end-to-end encrypted, meaning
that the company operating the platform (or other adversaries) can’t listen in
on or see the contents of your messages and calls. Signal and Facetime calls are
both end-to-end encrypted by default, which is why we like them so much.

You should also be sure that any accounts used to access your calling service,
such as your email, are secured with a strong password and 2FA if possible.
Signal users should set a PIN and enable Registration Lock. For more
information, check out the Consumer Reports Security Planner guide to secure
communication.


PHYSICAL DEVICE SECURITY

There are steps you can take to make sure your physical devices can’t be used
against you if they fall into the wrong hands. Follow these guides from the
Consumer Reports Security Planner for each of the devices you own:

 * Encrypt and backup your Android phone
 * Encrypt and backup your iPhone
 * Encrypt and backup your Mac computer
 * Encrypt and backup your Windows PC computer

You can also enable Find My Device on both Android phones and iPhones so that if
your devices are lost or stolen, you can remotely lock, erase, and find them.

TIP: Always activate and use a password on your phones, tablets, laptops, and
other devices.


SMART DEVICE SECURITY

You might also have smart or wifi connected devices. Whether it’s your gaming
consoles, your smart TV and smart speakers, fitness devices, or a security
camera, use the information in the Consumer Reports Security Planner articles we
linked to make sure your smart devices won’t be used to invade your privacy or
attack you.


KEEP YOUR PHONES AND COMPUTERS UPDATED

It’s great security advice in general to keep your devices updated so you’re
protected from known vulnerabilities with the latest security patches and
updates. The Consumer Reports Security Planner has great instructions for making
sure your iPad, iPhone, Android phone, Windows PC, and Mac are all kept
up-to-date.


DOCUMENT & REPORT


DOCUMENTING

Documenting and saving the harassment sent to you via Twitter, Facebook, email
and other social media can prove useful especially if you decide to pursue legal
action and/or report to law enforcement. Most computer and phone operating
systems have a default screen capture system. Here are instructions on how to
use the ones for Android, iOS, Windows, and Mac. Alternatively, you can use an
app like Evernote’s Skitch or Microsoft OneNote.

It might be helpful to set up an email account or folder so that you can send
yourself the screenshots of the harassing messages. Not only is it a convenient
way for you or your helpers to create a dated record of the harassment, but it
also backs up the screenshots. Just make sure to lock down the email account
with a strong password and 2FA so that it’s safer from hackers.

For more guidance, check out the PEN Online Harassment Field Manual’s guide on
Documenting Online Harassment.


REPORTING TO SOCIAL MEDIA

Most online social media sites have their own abuse reporting tool. Follow the
guides they provide to report abuse on their platforms. Here are links for more
information provided by a few of the biggest sites:

 * Twitter
 * Facebook
 * Instagram
 * YouTube
 * TikTok
 * Twitch
 * Discord


REPORTING TO LAW ENFORCEMENT

Choosing to seek support from law enforcement can be a fraught decision. For
many, especially people of color and trans folks, law enforcement may bring more
harm rather than more safety. US law enforcement is still woefully behind in
their understanding and sympathy when it comes to online harassment. There are
still very few jurisdictions that have laws supporting victims of online
harassment, and police often won’t engage with prevention of harm. They
typically will only act after a crime (in the legal sense) has been committed.
For all of these reasons, we do not tend to recommend law enforcement or legal
action in most instances of online harassment. 

If you would like to reach out to law enforcement, officials recommend that
targets report online harassment that directly threatens you to law enforcement
immediately and with as much documentation as you can. This ensures that there
is a timely, documented record of the abuse on file. To learn more about online
harassment laws in the United States check out PEN America’s Online Harassment
Field Manual.


PEOPLE-FOCUSED STRATEGIES


PLAN FOR SUPPORT & BACK-UP

If you think you might be attacked or harassed online, you don’t have to wait
until it happens to ask for help. Sometimes, the people in our lives mean well
but don’t understand how to support us. Maybe they don’t “get” online harassment
and minimize the effect it has on you or they want to help but have no idea how.

For example, people might hop onto your Twitter timeline and “take on” your
harassers, thinking they’re doing you a favor. Their intent was good, but the
impact? Not so much. In fact, research shows that engaging with harassment
prolongs the harassment. And by engaging with the harassers, they might give
them an algorithmic boost and help get the harassment in front of more eyes,
attracting more harassers to your feed. 


FRIENDS & FAMILY

If you feel up to it, it’s worth trying to have an “Online Harassment 101”
conversation with the people in your life if you are being harassed or are
worried you become the target of harassment. We’ve included some great resources
that can help them understand online harassment.

When talking with loved ones, think about what you might want help with, and ask
your friends and family in advance if they would perform certain tasks for you
if/when the abuse starts. If you’re not sure what to ask for, look for the ASK A
FRIEND sections throughout this document.

TIP: Talk with your friends and family about not accidentally giving out
information about you via comments, social media posts with geolocations, photos
that you don’t want online, etc.

You might ask one person to provide emotional support, check in on you, and be
someone you can vent to. Another person might monitor your Instagram and Twitter
feeds, while another could monitor your email inbox, and a third could monitor
the comments on gross websites that might be writing about you, so you don’t
have to. Be sure to give your team whatever passwords and access they’ll need to
do their assigned jobs in advance.

The advantage to setting this up in advance is twofold: first, you can respond
faster if/when the attacks come, because your network has already agreed to step
up. Second, you can decide in advance how you want people to handle things: Do
you want your Twitter monitor to block and report anyone who harasses you, or do
you just want them to monitor your feed to see if there are any threats you need
to know about? Should the person reading your emails put them all in a folder in
case you want to refer to them later when the crisis has passed, or should they
just delete them? 


EMPLOYERS

Depending on your employment situation, you may also want to alert bosses,
colleagues, or co-workers that they may be hearing some troubling things about
you and why. Harassers sometimes try to target the employment status of their
victims, so the more you can get your workplace on your side before they start
hearing confusing messages about you, the lower the harasser’s credibility will
be, and the better your situation will be. But use your judgment: not every
workplace will be equally understanding.

TIP: Check out the Best Practices for Employers section of PEN’s Online
Harassment Field Manual and Online SOS’s guide for communicating with your
employer and colleagues.


SELF-CARE

Being targeted online can make things feel completely out of control. But anyone
who has experienced it will tell you that there are two critical things you can
control: how you treat yourself and how you respond to the harassment.

You will hear a lot of advice about whether or not to engage with your
harassers. There’s no right answer – it depends entirely on what’s most
important to you. If your No. 1 priority is to stay as safe as possible, both
physically and emotionally, it’s often best not to engage. But if you find that
you’re willing to risk more harassment in order to directly address your
harassers and call them out, that’s also a valid choice. You may also find that
the most important thing to you is to expose the harassment and/or the people
who are perpetrating it, in which case retweeting it, emailing it to reporters,
bloggers or activists, or otherwise signal-boosting the attacks against you can
be the way to go.

Regardless of what you choose to do about your harassers, also consider what
comforts you most when you’re upset, angry, or triggered, and do the best you
can to plan for it. Will you want to be alone or see friends? Will you want your
favorite bubble bath on hand or your favorite flavor of ice cream? Will it feel
good to exercise, or build something with your hands, or punch or kick things?
Can you save a rainy-day fund so you can get some bodywork? Can a friend be
on-call to come do childcare for an hour or two so you can just take a deep
breath?

It’s so important to take care of yourself, even if that just means going to bed
and pulling the covers over your head and crying. You’re going to have feelings.
It’s ok to honor them. Whatever you can do to give yourself space to have them
and take care of them will make you more resilient in the long run.


YOUR MENTAL HEALTH

Online harassment, harassment, and abuse of any kind, is a traumatic experience.
Seeking mental health services like trauma-aware therapy or counseling can help
offer extra emotional support and resources during and after traumatic
experiences. If cost is a barrier, this list of free and low cost mental health
resources is old but still a great starting place.


MORE ONLINE SAFETY GUIDES AND RESOURCES

The resources in this section are other online safety guides. Although they’re
not focused on the gaming community like this guide, we recommend looking
through them for advice that’s relevant to you that we didn’t cover in this
guide.

Consumer Reports Security Planner is a comprehensive personal security guide
with broad coverage including information on recovering hacked accounts,
smartphone security, and identity theft. We’ve referenced Security Planner a lot
throughout this guide, but it contains a lot of helpful information that we
didn’t highlight.

PEN’s Field Manual is a guide that is also designed to support those
disproportionately impacted by online harassment: writers, journalists, artists,
and activists who identify as women, BIPOC, and/or LGBTQIA+.

TrollBusters supports women and journalists targeted by online harassment.

Extreme Privacy by Michael Bazzell is a guide to navigating the most extreme
privacy concerns. The advice in this book isn’t right for everyone, but it’s
worth looking through and looking for advice that is right for you.

Online SOS’s Action Center has really helpful checklists focused on specific
types of online harassment. We also love their guide for threat modeling.

The EFF’s Security Self Defense is another comprehensive guide to digital
security. It has a solid section with basic guidance, but also covers advanced
topics and guides for specific security scenarios.

Right to Be not only has a digital safety kit, but guides for responding to
harassment, staying safe on social media, self care, and more. These guides were
originally developed by HeartMob and are now maintained by Right to Be.

The Games Hotline resources page has many more links to groups, information, and
guides about digital security, harassment, mental health, and healthy video
games communities.

Previous Next

©2024 Games Hotline

Proudly powered by WordPress.