Stalking is repeated, unwanted or obsessive behaviour by an individual towards another person. Such behaviour may be considered harassing, intimidating, or threatening. Stalking behaviour may include following a person or monitoring them. Stalking is most common in intimate partner relationships and often there is an increase in stalking behaviour after leaving a controlling relationship. Show What is cyberstalking?Cyberstalking is essentially stalking by way of using the internet and/or other electronic mediums. Some examples of cyberstalking might be receiving constant emails are threatening, harassing or intimidating, or cyberstalking might be unwanted contact directed at an individual through a social media website such as Facebook. What to do if you are being cyberstalked
Mobile phone technologyThere are many mobile phone device applications that can be used by a person to stalk, monitor or imitate another person. Caller ID spoofing is a service which allows a caller to change the caller ID display on a recipient’s phone to any desired number, fooling the recipient of a call or text to believe they are receiving a call or text from another person other than the stalker. Some mobile phone applications are actually designed for stalking, while others are for photo sharing, location sharing and communication. Be sure to learn about all the applications and features of your mobile phone that might disclose where you are. Strategies to keep your mobile phone communications safe
Steps for preserving evidence of unwanted communications
Cyberstalking refers to the use of the Internet, e-mail, or other telecommunication technologies to harass or stalk another person. It is not the mere annoyance of unsolicited e-mail. It is methodical, deliberate, and persistent. The communications, whether from someone known or unknown, do not stop even after the recipient has asked the sender to cease all contacts, and are often filled with inappropriate, and sometimes disturbing, content. Cyberstalking is an extension of the physical form of stalking. It is estimated that there may potentially be tens or even hundreds of thousands of cyberstalking victims in the United States. A cyberstalker only needs access to a computer and a modem. Due to the enormous amount of personal information available through the Internet, a cyberstalker can easily locate private information about a potential victim with a few mouse clicks or key strokes. Information is power, and stalking of any kind is about power and control. There is little security on-line. Turning on a computer can expose anyone to harassment. Everyone who receives e-mail or uses the Internet is susceptible to cyberstalking. Cyberstalkers use a variety of techniques. They may initially use the Internet to identify and track their victims. They may then send unsolicited e-mails, including hate, obscene or threatening mail. Live chat harassment abuses the victim directly or through electronic sabotage (for example, flooding the Internet chat channel to disrupt the victim’s conversation). With newsgroups, the cyberstalker can create postings about the victim or start rumors that spread through the bulletin board system. A cyberstalker may also set up a web page on the victim with personal or fictitious information or solicitations to readers. Another technique is to assume the victim’s persona on-line, such as in chat rooms, for the purpose of discrediting the victim’s reputation, posting details about the victim, or soliciting unwanted contacts from others. Cyberstalking is a course of conduct that takes place over a period of time and involves repeated, deliberate attempts to cause distress to the victim. The rapidly advancing technology also makes it possible for abusers to use Spyware which is computer software or possibly a hardware device that allows someone to monitor and get information about someone else’s computer use. The presence of the Spyware is usually totally unknown to the victim. Once installed, the Spyware can allow the abuser to monitor what is done on the computer, cell phone or other handheld devices. This is usually done remotely, so that the victim remains unaware that he/she is being monitored. Additionally, technology continues to produce cameras that can be hidden in smaller and less obvious places, such as a child’s toy, the bedroom lamp or smoke detector. This makes it possible for abusers to obtain photographs which can then be enhanced and/or modified using various programs. A victim might find these pictures on offensive websites, posted on the victim’s own webpage or distributed throughout the Internet. Some of the cameras also have built-in microphones so the abuser can hear what is being said as well as take pictures. The fact that cyberstalking does not involve physical contact may create the misperception that it is less threatening or less dangerous than physical stalking. Cyberstalking is just as frightening and potentially as dangerous as a stalker at the victim’s front door. The psychological torment is very real, even in the absence of a distinct physical threat. It totally disrupts a victim’s life and peace of mind. Cyberstalking presents a range of physical, emotional, and psychological trauma for the victim, who may begin to develop or experience:
What Should You Do If You Are A Victim of On-line Stalking?If you are being harassed on-line, there are several things you should do. 1. Trust your instincts. 2. Plan for Safety. 3. Be extra cautious if your abuser is very technologically savvy. 4. Use a safer computer. 5. Create a new email account(s). 6. Check your cell phone settings. 7. Change passwords and pin numbers. 8. Minimize the use of cordless phones and baby monitors. 9. Use a donated or new cell phone. 10. Ask about your records and date. 11. Get a private mailbox and don’t give out your real address. This will give you a safer address to give out to doctors, businesses, etc. Try to keep your actual address out of national databases. 12. Search for your name on the Internet. This can help you determine what information is online and whether search engines have access to your contact information. In order to better protect yourself online
(Information in this section taken from West Virginia Foundation for Rape Information and Services,www.fris.org) |