You are conscientious, a good person, observe safety laws and precautions, want the best for your family, and bought a personal computer to broaden the educational horizons of your family.
Suddenly, your child is missing, you are receiving harassing or threatening emails, or one of your loyal employees suddenly seemed to turn on you with damaging email to your competitors or other employees. What happened? How did this stranger enter your household, violate your
business or home without you knowing they were allowed in?

These unwelcome intruders are cyberstalkers, no different than stalkers in the physical world.
They are pedophiles, persons with grudges, criminals, young, old, white, black, tall, or short. Unfortunately, most internet users, criminals and decent citizens alike, believe they are anonymous – that they can not be identified or found.

Cyberstalking can be in any number of disguises. For example:
threatening or harassing email, flaming (online verbal abuse), mass unsolicited email, identity theft, leaving improper messages at guestbooks or newsgroups from you, initiating directed computer viruses, pedophile activity, or email forgery (sending false or damaging email from you,
usually to people you know like coworkers, employers, neighbors, etc.). Unfortunately, cyberstalkers sometimes step out of cyberspace and into the physical world by stealing your identity, luring unsuspecting victims for a first meeting, vandalizing your home, office, or vehicle, sending
threatening or obscene mail, making abusive and excessive phone calls, or whatever else the criminal mind can imagine.

Cyberangels, National Center for Missing and Exploited Children and Blue Ridge Thunder along with the local computer crime units are now the major organizations in the United States available to every internet user to gather evidence about and locate cyberstalkers. Because the internet is a recent development and stalking was only first labeled a crime in the United States by California in 1990, state cyberstalking laws and their implementation are still in their infancy. Unfortunately, the majority of community and state police departments are not yet trained or equipped to handle cyberstalkers. Usually, the stalker has to physically harm or be in the act of trying to harm you before the local police can take action.

The Center for Democracy and Technology focuses on the balance between internet legislation
(pending and passed) and your rights as a netizen (a citizen of the internet community).
Actual cyberstalking laws, federal child exploitation statutes, and cyberstalking courtcases do exist. But, how do we fairly balance the rights and privileges of every netizen (which is every internet user across the globe) with their internet safety? The National Critical Infrastructure Protection Center of the FBI and the Critical Infrastructure Assurance Office of the Department of Commerce were first organized in October, 1997 as a response to this question.
So, even with these authorities trying to make the internet a fair and safe place for everyone, there are general safety guidelines you can follow to reduce your chances of being the victim of a stalker.

Preventative Guidelines

Do not give your real name, address, phone number, school information, marital status, occupation, income, or passwords to ANYONE through email, chat rooms, or newsgroups. This includes requests from internet service providers because a legitimate ISP request will not come from an email,
chat room, or Usenet newsgroup. This also includes the ‘best friend’ you met over the internet. A criminal can represent themself as a teenager, young person, professional, or anyone that suites their purpose. Adults are just as susceptible to predators as kids or young adults.

Chat rooms are an effective tool for any criminal, especially the pedophile. Most pedophiles keep their victim(s) in a secret friendship. Travelers (pedophiles that travel to meet their victims) can lure unsuspecting kids and teens to meet after gaining their trust. Then, unfortunately, we heard horror stories of these young victims and their families. Criminals (burglars or identity thieves, for example) gather information about their unsuspecting victims by gaining their trust after posing as “a friend” and piecing together the bits of personal information the intended victim unknowingly supplies over the course of the “relationship” and time.

Do not create an online biography. Family homepages are fun and useful, but, do not include your last name, state, address, phone number, occupation, or other identifying information for a stranger (unknown internet user) to compile.

Some filtering software programs can prevent your child from posting or emailing your address, telephone number, or credit card number.
Be careful what you post to Usenet newsgroups. Do not include any personal identifying information.
Be careful with any online offers (via email, newsgroups, or in conversations) that result in someone visiting your home, ask you to attend a meeting, or require an immediate response requiring financial information or your credit card number.

If you THINK you are being stalked: Basic Guidelines

Use a P.O. Box as your address (on printed checks, internet directories, etc.)
Use an unlisted and unpublished telephone number.
Use encrypted email.
Change your password frequently. Use a nonsensical “word” that has both numbers and letters.
Use an ambiguous username – a word that does not give reference to your gender, interests, location, or name.

If you KNOW you are being stalked: Basic Guidelines

Well, you followed all the guidelines and are a victim anyway. Now, what do you do?
Save all messages from your stalker, preferably in a safe deposit box, in both paper and disk form.
Record the dates and times the stalker contacts you. Do not panic! Review the websites of authoritative agencies and “get the feel” for them.

Decide who you probably would feel most comfortable working with. Contact them. If you feel you do not have the time to look around the websites, go to Reporting Crimes and find your appropriate link for ‘Internet Stalking’.
If you use email that is not encrypted, do not include ANY personal information (including phone number and state) but emphasize that you immediately need their assistance. The reason is that any unencrypted email is potentially able to be read by an unknown third party. Wait for their response and do EXACTLY what they say. Then, do not abandon or shy away from the internet after this bad experience.

The original reason you found your first Internet Service Provider is probably still valid for you. Support for victims of stalking is available through the National Victim’s Center.

Support for survivors of stalkers is also available. You can still have a rewarding and enjoyable internet experience if you allow yourself.

Articles

Cinderella Didn’t Cyber Stalk Prince Charming

Facebook Account Hacker Arrested for Cyberstalking

No Bullying Publishes a Guide to Understanding Cyberstalking

Maryland Man Convicted of Cyberstalking His Ex-Wife

Local couple wins cyberstalking case

Cyberstalking on the Rise

NYPD detective busted for allegedly cyberstalking ex

Adult bullies take their stalking online

Cyberstalking is now socially acceptable?

Cyberstalking issue on the rise

Ex-Paul Ryan intern accused of cyberstalking

Man charged with cyberstalking his ex

Students confront teacher accused of death threats

How to break your cyber stalking habits

Mother of cyberstalking victim tells parents to get internet

A memoir of being hounded

Woman charged for cyberstalking

Cyberstalking with LinkedIn

Are you being tracked online?

The dangers of cyberstalking and what can be done to stop it

Man sentenced for stalking ex-girlfriend, installing spyware

Cyberstalking, bullying exposed

Man convicted of horrific cyberstalking of classmate

Police warn of cyber stalking risk at social networking websites

Related Sites
Anti-Child Porn
Bullying
Blue Ridge Thunder
Child Cyber Search
Cyberbullying
Ecpat International
Get Net Wise
Internet Watch Foundation
Love Me Not
National Center for Victims of Crime
National Center for Missing and Exploited Children
Net Bullies
Safe Kids
Stalking Victims Sanctuary
Sexual Offender Registries by State
Wired Patrol
Workplace Bullying Institute


Linksys SE3008 8 Ports Rack Mountable Gigabit Ethernet Switch picture

Linksys SE3008 8 Ports Rack Mountable Gigabit Ethernet Switch

$18.99



8 Port PoE+ Switch w/ additional 2 Uplink, Max Output 96W, 803.af/at, Fanless picture

8 Port PoE+ Switch w/ additional 2 Uplink, Max Output 96W, 803.af/at, Fanless

$28.99



New Linksys SE3005 5-port Gigabit Ethernet Switch picture

New Linksys SE3005 5-port Gigabit Ethernet Switch

$15.99



NETGEAR  ProSafe GS116v2 — 16 Port Gigabit Ethernet Unmanaged Switch picture

NETGEAR ProSafe GS116v2 — 16 Port Gigabit Ethernet Unmanaged Switch

$20.00



8 Port PoE Switch With 2 Uplink 120W Extend to 250Meter Unmanaged 803.af/at picture

8 Port PoE Switch With 2 Uplink 120W Extend to 250Meter Unmanaged 803.af/at

$34.99



Nintendo Switch OnIine Membership | 1 user per order picture

Nintendo Switch OnIine Membership | 1 user per order

$9.99



Acer Aspire Switch 10 E SW3-013 2-in-1 Convertible Intel Atom x5-z8300 2 GB RAM picture

Acer Aspire Switch 10 E SW3-013 2-in-1 Convertible Intel Atom x5-z8300 2 GB RAM

$69.99



Zyxel GS1900-24E Managed Networking Gigabit Switch standalone / with Rack Ears picture

Zyxel GS1900-24E Managed Networking Gigabit Switch standalone / with Rack Ears

$45.00



Acer Aspire Switch 10 E SW3-013-12PS/ Atom Z3735F/ 2 GB RAM/ 64 GB eMMC (New) picture

Acer Aspire Switch 10 E SW3-013-12PS/ Atom Z3735F/ 2 GB RAM/ 64 GB eMMC (New)

$69.99



Fortinet FortiSwitch FS-124D-POE 24 Port Gigabit Ethernet Switch UNREGISTERED picture

Fortinet FortiSwitch FS-124D-POE 24 Port Gigabit Ethernet Switch UNREGISTERED

$89.97