We put so much of our lives online that it has become extremely easy for someone to stalk you online. Your interests, events you’re attending, places you visit, your workplace, email, and even your phone number can be found with just a little bit of digging.
Cyberstalking is common — at least 40% of adults report experiencing some sort of harassment online, including stalking, with the majority of targets being women. Let’s take a closer look at how to recognize it, prevent it, and what to do if you find yourself on a creeper’s radar.
In the real world, stalking is unwanted obsessive attention to a specific person. Physical stalking can involve following, secret surveillance, persistent and manipulative calling and texting, and other means of approaching the victim unexpectedly.
In the digital world, cyberstalkers are driven by the same intention – to embarrass, threaten, or harass their victims. However, they primarily rely on online technology to do it. Email, social networks, instant messaging, personal data available online – everything on the Internet can be used by cyberstalkers to make inappropriate contact with their victims.
That is not to say that checking out someone’s social media is online stalking. ‘Doing research’ on your newly hired coworker’s Facebook or Instagram is not stalking.
Cyberstalking is way more serious as it involves nefarious intentions, ranging from false accusations and defamation to sexual harassment and even encouraging others to harass the victim. In many cases, physical and digital stalking interconnect, making it even more threatening.
NOTE: Cyberstalking and cyberbullying overlap in many places. If you’re looking for tips on how to identify and prevent cyberbullying, click here.
Catfishing occurs on social media sites when online stalkers create fake user profiles and approach their victims as a friend of a friend or expressing romantic interest. To look more like a real person, cyberstalkers sometimes copy the profiles of existing users, impersonating their identities.
If you suspect you’re being catfished, these tips can help you identify a fake user:
If you’re adding location check-ins to your Facebook and Instagram posts, you’re making it super easy for a cyber stalker to track you by simply scrolling through your social media profiles. When combined together, location-tagged posts can indicate your behavior patterns quite accurately.
If a cyberstalker discovers their victim’s home address, all they have to do is open Google Maps and type it in. By using Street View, they can see exactly how your home looks without even stepping into your neighborhood and drawing attention. Cyberstalkers can also virtually research your environment, surrounding houses, cameras, and alleys, to get a sense about the neighbors.
For more tech-savvy stalkers, knowing the address of the victim is not even necessary. They can figure it out from analyzing photos you post and then using Street View to locate where they’re taken. Back in October 2019, a suspected stalker named Hibiki Sato allegedly found and assaulted a Japanese singer by examining a reflection in her eyes in a photo she posted on social media.
Hijacking a computer’s webcam is one of the creepiest methods cyberstalkers use to invade their victims’ privacy. Creepers would try to trick you into downloading and installing a malware-infected file that would grant them access to your webcam.
The process is so sneaky that it’s likely you wouldn’t suspect anything strange. If just the thought about someone secretly watching you through your webcam gives you shivers, read how you can tell if your camera has been hacked.
Another increasingly popular and menacing way perpetrators keep tabs on their victims is by using stalkerware. This is any type of legitimate software or spyware that can be used to monitor someone’s activities through their device. It can track your location, make audio recordings, and enable access to your texts and browsing history.
What’s frightening about stalkerware is that it is designed to run in the background without your knowledge. If you suspect stalkerware on your device check out this guide on how to deal with it.
Internet stalkers love geotags – and for a good reason. Every digital picture you take may contain geotags, which are pieces of metadata revealing where and when the photo was taken.
Geotags come in the EXIF format, which is embedded into an image file and can be extracted and viewed with the help of special apps. This way, a cyberstalker can learn about your whereabouts.
As frightening as cyberstalking is, there are quite a few ways you can protect your privacy online.
Do cyber stalkers violate any laws? As cyberstalking is a form of emotional assault, laws governing harassment and slander can be applied to electronic communications. However, this practice is often problematic because confrontations in cyberspace are different from real-life situations.
While some countries apply older laws, others have enacted specific cyberstalking laws. These laws are relatively new and usually still have room for improvement.
Even though cyberstalking laws aren’t perfect, you should still consider reporting it to the authorities. The first thing to know is that you will likely have to provide documentation. If you’re being attacked by a cyberstalker through email, messaging apps, or any other electronic means, keep the records. Save copies and take screenshots as evidence.
Report them to the platform on which the harassment is taking place. It might take some time, but most websites and apps have strict policies against such abuse. Then, block the attacker and do not engage with them any further, no matter how tempting it might be.
Cyberstalking is a dangerous violation of privacy. Step-up your personal security online with NordVPN.