Technology opens our lives up in ways that weren't possible less than a decade ago. Today you can chat with someone whether they're in the next room or in another country with great ease.
However, the same technology that has provided amazing opportunities also provides an opportunity for abuse.
That abuse is called cyberstalking.
Cyberstalking is a serious crime. Simply put, cyberstalking is online stalking and it is defined as the use of technology, particularly the Internet, to harass someone.
Some examples: Threats, identity theft, data destruction, slander, false accusations, and monitoring.
Cyberstalkers use email, instant messages, social media platforms, and other communication devices to stalk, harass, or slander.
Some examples of cyberstalking/harassment:
Sending manipulative, threatening, lewd or harassing emails from an assortment of email accounts.
Hacking into a victim’s online accounts (such as banking or email) and changing the victim’s settings and passwords.
Creating false online accounts on social networking and dating sites, impersonating the victim or attempting to establish contact with the victim by using a false persona.
Posting messages to online bulletin boards and discussion groups with the victim’s personal information, such as home address, phone number or Social Security number. Posts may also be lewd or controversial – and result in the victim receiving numerous emails, calls or visits from people who read the post online.
Signing up for numerous online mailing lists and services using a victim’s name and email address.
Hacking and saving emails, text or social media messages and social media posts and using them to harass or blackmail a victim.
Hacking into the victim’s social media account to post offensive material and comments.
Releasing personal or fake information to discredit a victim in the community.
Creating malicious websites, fake social media profiles and blogs about a victim.
Sharing screen shots of private messages.
Taking photos of someone’s home or business and sharing it online.
Here are a few important tips on how to protect yourself from cyberstalkers:
Maintain vigilance over physical access to your computer and other Web-enabled devices like cell phones. Cyberstalkers use software and hardware devices (sometimes attached to the back of your PC without you even knowing) to monitor their victims.
Always log out of your computer programs when you step away from the computer or cell phone and use a screensaver with a password.
Never share your passwords with others and be sure to change your passwords frequently! This is very important.
Always use the privacy settings in all your online accounts to limit your online sharing with those outside your trusted circle.
If you post photos online via social networks or other methods, turn off the metadata in the photo. The metadata reveals a lot of information about the photo, where and when it was taken, what device it was taken on and other private information. Mostly, metadata comes from photos taken on a mobile phone, You can turn this off, usually a feature called geotagging, in your phone’s settings.
Always use a security software program such as Norton Security to prevent spyware from being installed onto your computer via a phishing attack or an infected Web page. Security software could allow you to detect spyware on your device and decrease your chances of being stalked.
If you encounter someone that exhibits stalker behaviors, report it to the police. Do not delay. If you're being cyberstalked, remember to keep a copy of any message, comment, or online image that could serve as proof. Use the "print screen" or other keyboard functions to save screenshots.
Many police departments have cybercrime units, and cyberstalking/harassment IS a crime -- so do not hesitate to contact law enforcement!