{"id":29624,"date":"2019-10-10T20:34:35","date_gmt":"2019-10-10T20:34:35","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/"},"modified":"2019-10-10T20:34:35","modified_gmt":"2019-10-10T20:34:35","slug":"stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/","title":{"rendered":"Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes"},"content":{"rendered":"<p>A Japanese man indicted on Tuesday for allegedly attacking a 21-year-old woman last month appears to have found where his victim lived by analyzing geographic details in an eye reflection captured in one of her social media photos.<\/p>\n<p>According to Japanese broadcaster <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www3.nhk.or.jp\/nhkworld\/en\/news\/20191008_36\/\">NHK<\/a>, Hibiki Sato, 26, located the woman&#8217;s residence by matching the reflected image of a train station she frequented to a Google Street View image and waiting for her so he could follow her and find where she lived.<\/p>\n<p>Later, when the woman, identified as <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.tenshitsukinukeniyomi.com\/matsuoka-ena\">Ena Mastuoka<\/a>, a member of a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/en.wikipedia.org\/w\/index.php?title=Japanese_idol&amp;oldid=920296739\">Japanese idol<\/a> group, returned home after a concert on September 1, she was reportedly ambushed, assaulted, and injured by Sato, said to be a fan of her group.<\/p>\n<p>According to <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.tokyoreporter.com\/crime\/saitama-man-used-eye-reflection-in-online-image-to-stalk-idol\/\">Tokyo Reporter<\/a>, Sato waited for her inside her building. He&#8217;s alleged to have located her specific apartment by analyzing videos she&#8217;d posted for the positioning of her curtains and light patterns.<\/p>\n<blockquote class=\"twitter-tweet\" readability=\"4.4117647058824\">\n<p lang=\"ja\" dir=\"ltr\">\u30e9\u30a4\u30d62\u672c\u3042\u308a\u304c\u3068\u3046\u3054\u3056\u3044\u307e\u3057\u305f\uff01\u3042\u3057\u305f\u3082\u3088\u308d\u3057\u304f\u306d\ud83d\udc76\ud83c\udffb\ud83c\udf65\ud83c\udf65<a href=\"https:\/\/twitter.com\/hashtag\/%E3%83%84%E3%82%AD%E3%83%A8%E3%83%9F?src=hash&amp;ref_src=twsrc%5Etfw\">#\u30c4\u30ad\u30e8\u30df<\/a> <a href=\"https:\/\/t.co\/KdBFBj0XE9\">pic.twitter.com\/KdBFBj0XE9<\/a><\/p>\n<p>\u2014 \u677e\u5ca1\u7b11\u5357\uff20\u5929\u4f7f\u7a81\u629c\u30cb\u8aad\u30df (@matsuokaena) <a href=\"https:\/\/twitter.com\/matsuokaena\/status\/1161644031723491329?ref_src=twsrc%5Etfw\">August 14, 2019<\/a><\/p><\/blockquote>\n<p>Finding telling details in photos used to be the stuff of science fiction, as depicted in the famous <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.youtube.com\/watch?v=hHwjceFcF2Q\">zoom and enhance clip<\/a> from Blade Runner where detective Rick Deckard scans and enhances a photograph to help his investigation. Now it&#8217;s part of the playbook for sleuths and stalkers alike.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/29a.ch\/photo-forensics\/#forensic-magnifier\">Basic<\/a> digital image forensics <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.getghiro.org\/\">tools<\/a> are available online at no cost. And companies like Amped Software and FDI market digital forensic tools for professional investigators, to say nothing of photo applications offered by Adobe and the like.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/12\/20\/shutterstock_35461405.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Rutger Hauer (1990), the Dutch actor who played replicant Roy Batty in Blade Runner\"><\/p>\n<h2 title=\"Yesterday's sci-fi has become today's crappy kit, apart from space colonies and AI\">It&#8217;s 2019, the year Blade Runner takes place: I can has flying cars?<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/01\/01\/blade_runner_today\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Speaking with the BBC, Elliot Higgins, founder of investigative website <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.bellingcat.com\/\">Bellingcat<\/a>, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.bbc.com\/news\/world-asia-50000234\">said<\/a> even the smallest details can reveal where photos were taken and other information.<\/p>\n<p>Bellingcat made a name for itself by using open source intelligence \u2013 online photos, public data sources, crowdsourcing, and so on \u2013 to investigate events like the downing of Malaysia Airlines Flight 17 in 2014 and the poisoning of Sergei Skripal in 2018.<\/p>\n<p>Many online services like Facebook, Instagram, and Twitter remove Exif metadata \u2013 a potential privacy risk \u2013 added to photo files by digital cameras, though some, like Google Photos or iCloud Photos preserve it.<\/p>\n<p>The metadata that can be derived from reflections in photos won&#8217;t be so easily suppressed. But there&#8217;s an opportunity for some large cloud photo service to come up with a machine learning algorithm capable of blurring all the telling details that show up the reflections captured in digital images. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1858\/-7798\/how-to-process-wrangle-analyze-and-visualize-your-data-with-three-complementary-tools?td=wptl1858\">How to Process, Wrangle, Analyze and Visualize your Data with Three Complementary Tools<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/10\/10\/stalker_japan_eyes\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8216;If only you could see what I&#8217;ve seen through your eyes&#8217;&#8230; A Japanese man indicted on Tuesday for allegedly attacking a 21-year-old woman last month appears to have found where his victim lived by analyzing geographic details in an eye reflection captured in one of her social media photos.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29625,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-29624","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-10T20:34:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes\",\"datePublished\":\"2019-10-10T20:34:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/\"},\"wordCount\":441,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/\",\"name\":\"Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes.jpg\",\"datePublished\":\"2019-10-10T20:34:35+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/","og_locale":"en_US","og_type":"article","og_title":"Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-10T20:34:35+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes","datePublished":"2019-10-10T20:34:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/"},"wordCount":441,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/","url":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/","name":"Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes.jpg","datePublished":"2019-10-10T20:34:35+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/stalker-attacks-japanese-pop-singer-after-tracking-her-down-using-reflection-in-her-eyes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Stalker attacks Japanese pop singer \u2013 after tracking her down using reflection in her eyes"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29624"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29624\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29625"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}