Cyberstalking-what is it, where can I get help
What is cyberstalking and what is cyberharassment?
Cyberstalking and cyberharassment are very similar. Most people use them interchangeably, but there is a subtle distinction, typically relating to the perpetratorfs intent and the original motivation for their behavior.
While the two situations usually involve many of the same online tactics, cyberstalking is almost always characterized by the stalker relentlessly pursuing his\her victim online and is much more likely to include some form of offline attack, as well. This offline aspect makes it a more serious situation as it can easily lead to dangerous physical contact, if the victimfs location is known.
Why do people cyber stalk or cyber harass others?
Cyberstalkers are often driven by revenge, hate, anger, jealousy, obsession and mental illness. While a cyber harasser may be motivated by some of these same feelings, often the harassment is driven by the desire to frighten or embarrass the harassment victim.
Sometimes the harasser intends to teach the victim a lesson in netiquette or political correctness (from the harasserfs point of view). Often the cyber harassment victim is merely in the wrong place at the wrong time, or has made a comment or expressed an opinion that the cyber harasser dislikes. We have even seen cases where the victim is merely being targeted because they are the first ones the cyber harasser encounters when they are in a bad mood.
What do cyberstalkers/harassers do when the stalk or harass someone?
The harasser may post comments intended to cause distress to the victim, or make them the subject of harassment by others. They may send a constant stream of e-mails and instant messages to their victims or a victimfs co-workers, friends, or family. They may pose as the victim and post offensive comments or send offensive messages in their name. They may send hateful or provocative communications to the victimfs boss, family or significant other (in their own name or posing as the victim). Often the victimfs computer is hacked or their e-mail accounts are broken-into by the cyberstalker/harasser and taken over entirely, or the password is changed and the victim locked out of their own accounts. The victim may be signed-up for spam, porn sites and questionable offers.
Cyberstalkers/harassers frequently follow their victims into chat rooms and onto discussion boards, posting lies and hateful messages, or passing misinformation about the victim. They may create sexually explicit images, using the head of their victims attached to the bodies of porn actors. If they have real sexually explicit or nude images of their victims (usually from a failed romantic relationship between the stalker/harasser and the victim), they may create Web sites posting the images and advertising the site to friends and family of the victim, or supply them to commercial porn sites with amateur image sections for public display. We are even familiar with cases where the cyberstalker has threatened the life of the President of the United States or the Queen of England, while posing as the victim.
In the most dangerous type of cases, the cyberstalker posts the name, address and telephone number of the victim online, often posing as them, and soliciting sexual activities on their behalf. In a California case, a man targeted a woman by posting her name and address online and soliciting group sex. The woman had never even used the computer before, but found herself facing angry, sexually frustrated men at her front door.
Death threats are typical in a cyberstalking situation. In fact, there have been several well-publicized cases in the United States where victims were eventually murdered by their stalkers. Many of these began as cyberstalking situations.
If there is any indication that a cyberstalker/harasser knows where the victim lives, works or how to find them offline, law enforcement must be contacted IMMEDIATELY to begin an active investigation into the circumstances of the situation. WiredSafety’s law enforcement division, CyberLawEnforcement.org assists law enforcement in cyberstalking/harassment cases.
Is cyberstalking illegal? What about cyberharassment?
The laws tend to lump the two types of cybercrimes together. For the purposes of this guide, other than when there is a legal distinction, both cyberstalking and harassment are discussed under the heading gcyberstalking.h While most states in the United States have various types of cyberstalking/harassment laws on the books, there is no U.S. federal cyberstalking/harassment law (except when children under 16 are involved and being targeted for sexual harassment). Many Western European countries have cyberstalking/harassment laws, but they are the exception rather than the rule. Few Asian countries have cyberstalking/harassment laws.
If I canft file criminal charges against the cyberstalker/harasser, what can I do to them?
Often the victims of cyberstalking and cyberharassment are limited to civil litigation (suing the stalker or harassment) or reporting the cyberstalker/harasser to their ISP and trying to get their accounts revoked, or Web sites shutdown.
Are there different types of cyberstalking/harassment situations?
Absolutely! There are three different kinds of cyberstalking situations…
¡Online cyberstalking and harassment that stays online
¡Online harassment and stalking that ventures offline or encourages offline actions
¡Offline stalking or harassment that moves online
It doesnft make any difference whether or not the victim has even used the Internet. The distinction between online and offline is dependent on the medium used by the perpetrator.
For example, online stalking/harassing is usually defined as gcrepeated unsolicited contact by electronic meansch with the intent to gcterrify, intimidate, or harassch another. The medium in this instance can include computers, Fax machines, telephones, etc.
Offline stalking/harassment involves the same type of behavior, but in real life. This includes everything from repeatedly following a victim to actual physical contact between a stalker and his/her victim.
Although each of the three situations above include some form of online attack, and can be terrifying for a victim, only those that have an offline component are physically dangerous. Note: the laws in your jurisdiction may only cover offline stalking and harassment, or those with an offline component
What is the profile of a typical cyberstalking/harassment victim?
Cyberstalking occurs more often with women as the victim, although that is gradually changing. Our most recent survey discloses that men are being cyberstalked and harassed more frequently by women than ever before. To view our survey results, visit 2003 cyberstalking Survey.
Children who are stalked by adult sexual predators are not considered victims of cyberstalking, but rather are considered luring victims or victims of child exploitation. You can read our Margaretfs Story page for more information about how stalkers/harassers target children online for abuse/exploitation by others
What can you do to avoid becoming a victim of cyberstalking/harassment?
Typically, the cyberharassment victim is new online, and inexperienced with the rules of netiquette (online etiquette). So learning the rules of the cyber-road is a good way to avoid being an easy mark for a cyberstalker/harasser.
Typically, the cyberharasser feels empowered by the perceived anonymity online. They feel they can hide behind their monitor. But most people leave a trail of cyber-breadcrumbs behind them online. Learning how to read an e-mail header is a good place to start stripping your stalker/harasser of their perceived anonymity.
Ignoring the communications sent to you is the best first step to stopping most cyberstalking/harassment. Unless your situation involves a truly obsessed or depraved harasser, most will lose interest quickly if they don’t get the reaction they seek. Our cyber-self-defense tips can help you avoid cyberstalking/harassment entirely and stop it before it gets out-of-hand.
Flaming wars (where insults and verbal attacks are traded online) can often lead to cyberstalking and harassment. Flaming can get out of control quickly and often escalates into serious threats, offline and online.
Cyberstalking, where the real dangers arise, can have a substantial offline aspect, either by way of the victim and stalker working together, romantically involved or prior or current communications of some kind. Some are intent on targeting victims of sexual abuse, cancer patients and members of certain minority groups. Protecting your privacy is key to protecting yourself form credible offline threats.
What is a quick list of safety tips to avoid cyberstalking/harassment?
Read our cyberstalking Online Self-Defense Guide and know these online safety rules:
¡Don’t respond to flaming (provocation online)
¡Choose a genderless screen name
¡Don’t flirt online, unless you’re prepared for the consequences. This is just like real life. Yes, you have the right to flirt. And you have the right to a sexy nickname. But the more obvious you are, the more likely you are to arouse unwanted attention from unwanted suitors.
¡Save offending messages and report them to your service provider >>
¡If someone makes threats in a chat room or on a message board, notify the moderator or Web site operator right away
¡Donft confront the stalker/harasser, this only arouses more anger or emotional attacks
¡Don’t give out any personal information about yourself or anyone else link to private surfing info]
¡Get out of a situation online that has become hostile, log off or surf elsewhere
¡Google yourself to make sure no personal information is posted by others about you >>
It seems that Cyber-stalking is on the increase, the following web-sites may assist
Federal law provides a number of important tools that are available to combat cyberstalking. Under 18 U.S.C. 875(c), it is a federal crime, punishable by up to five years in prison and a fine of up to $250,000, to transmit any communication in interstate or foreign commerce containing a threat to injure the person of another. Section 875(c) applies to any communication actually transmitted in interstate or foreign commerce – thus it includes threats transmitted in interstate or foreign commerce via the telephone, e-mail, beepers, or the Internet.