Cyber Stalking

Go back to Tutorial

Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. A Cyber stalker relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. Cyber stalking messages differ from ordinary spam in that a Cyber stalker targets a specific victim with often threatening messages, while the spammer targets a multitude of recipients with simply annoying messages.

Cyber stalking can be terribly frightening. It can destroy friendships, credit, careers, self-image, and confidence. Ultimately it can lead the victim into far greater physical danger when combined with real-world stalking. Yes, we’re talking serious stuff here. Victims of domestic violence are often cyber stalking victims. They, like everybody else, need to be aware that technology can make cyber stalking easy. Spyware software can be used to monitor everything happening on your computer or cell phone, giving tremendous power and information to Cyber stalkers.

Factors

A number of key factors have been identified in cyber stalking:

  • False accusations. Many Cyber stalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms, or other sites that allow public contributions such as Wikipedia or Amazon.com.
  • Attempts to gather information about the victim. Cyber stalkers may approach their victim’s friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective.
  • Monitoring their target’s online activities and attempting to trace their IP address in an effort to gather more information about their victims.
  • Encouraging others to harass the victim. Many Cyber stalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim’s name and telephone number in order to encourage others to join the pursuit.
  • False victimization. The Cyber stalker will claim that the victim is harassing him/her. Bocij writes that this phenomenon has been noted in a number of well-known cases.
  • Attacks on data and equipment. They may try to damage the victim’s computer by sending viruses.
  • Ordering goods and services. They order items or subscribe to magazines in the victim’s name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim’s workplace.
  • Arranging to meet. Young people face a particularly high risk of having Cyber stalkers try to set up meetings between them.

Types

  • Stalking by strangers – There isn’t a single definition of a Cyber stalker, and they can be either strangers to the victim or have a former/present relationship. They come in all shapes, sizes, ages and backgrounds. They patrol Web sites looking for an opportunity to take advantage of people.
  • Gender-based stalking – Harassment and stalking because of gender online is common, and can include rape threats and other threats of violence, as well as the posting of the victim’s personal information. It is blamed for limiting victims’ activities online or driving them offline entirely, thereby impeding their participation in online life and undermining their autonomy, dignity, identity, and opportunities.
  • Of intimate partners – Cyber stalking of intimate partners is the online harassment of a current or former romantic partner. It is a form of domestic violence, and experts say its purpose is to control the victim in order to encourage social isolation and create dependency. Harassers may send repeated insulting or threatening e-mails to their victims, monitor or disrupt their victims’ e-mail use, and use the victim’s account to send e-mails to others posing as the victim or to purchase goods or services the victim does not want. They may also use the Internet to research and compile personal information about the victim, to use in order to harass him or her.
  • Of celebrities and public persons – Profiling of stalkers shows that almost always they stalk someone they know or, via delusion, think they know, as is the case with stalkers of celebrities or public persons in which the stalkers feel they know the celebrity even though the celebrity does not know them. As part of the risk they take for being in the public eye, celebrities and public figures are often targets of lies or made-up stories in tabloids as well as by stalkers, some even seeming to be fans. Web 2.0 technologies have enabled online groups of anonymous people to self-organize to target individuals with online defamation, threats of violence and technology-based attacks. These include publishing lies and doctored photographs, threats of rape and other violence, posting sensitive personal information about victims, e-mailing damaging statements about victims to their employers, and manipulating search engines to make damaging material about the victim more prominent. Victims frequently respond by adopting pseudonyms or going offline entirely.
  • Corporate cyber stalking – Corporate cyber stalking is when a company harasses an individual online, or an individual or group of individuals harasses an organization. Motives for corporate cyber stalking are ideological, or include a desire for financial gain or revenge.

There are a number of simple ways to guard against cyber stalking. One of the most useful precautions is to stay anonymous yourself, rather than having an identifiable online presence: Use your primary e-mail account only for communicating with people you trust and set up an anonymous e-mail account, such as Yahoo or Hotmail, to use for all your other communications. Set your e-mail program’s filtering options to prevent delivery of unwanted messages. When choosing an online name, make it different from your name and gender-neutral. Don’t put any identifying details in online profiles.

Anti-Stalking Tips

Here are a few important pointers to help you thwart cyber stalking, whether it’s directed at you, your PC, or your family:

  • Maintain vigilance over physical access to your computer and other Web-enabled devices like cell phones. Cyber stalkers use software and hardware devices (sometimes attached to the back of your PC without you even knowing) to monitor their victims.
  • Be sure you always log out of your computer programs when you step away from the computer and use a screensaver with a password. The same goes for passwords on cell phones. Your kids and your spouse should develop the same good habits.
  • Make sure to practice good password management and security. Never share your passwords with others. And be sure to change your passwords frequently! This is very important.
  • Do an online search for your name or your family members’ now and then to see what’s available about you and your kids online. Don’t be shy about searching social networks (including your friends’ and colleagues’), and be sure to remove anything private or inappropriate.
  • Delete or make private any online calendars or itineraries–even on your social network–where you list events you plan to attend. They could let a stalker know where you’re planning to be and when.
  • Use the privacy settings in all your online accounts to limit your online sharing with those outside your trusted circle. You can use these settings to opt out of having your profile appear when someone searches for your name. You can block people from seeing your posts and photos, too.
  • If you suspect that someone is using spyware software to track your everyday activities, and you feel as if you’re in danger, only use public computers or telephones to seek help. Otherwise, your efforts to get help will be known to your Cyber stalker and this may leave you in even greater danger.
  • As always, use good, updated security software to prevent someone from getting spyware onto your computer via a phishing attack or an infected Web page. Check the app store for your mobile devices to see what security software is available. Or visit the Norton Mobile page to see what programs are available for your device’s platform. Security software could allow you to detect spyware on your device and decrease your chances of being stalked.

Go back to Tutorial

Share this post
[social_warfare]
Social Engineering
Botnets

Get industry recognized certification – Contact us

keyboard_arrow_up