When Stalking Goes High-Tech

We live in a world that has given the term “human touch” a whole new meaning. Most people speak through their keyboards nowadays rather than actually speaking to one another. Smart phones, blogging, social networking, texting, these have all found a way into our lives and reshape our relationships with family, friends, coworkers, and the world. While these changes may be seen as a great evolution of our world into a more high-tech society, with all things good, there is also a bad side to it.

When we think of stalking, we think of someone who hides outside a person’s house and follows them. Nevada Revised Statue 200.575 states “A person who, without lawful authority, willfully or maliciously engages in a course of conduct that would cause a reasonable person to feel terrorized, frightened, intimidated or harassed, and that actually causes the victim to feel terrorized, frightened, intimidated or harassed, commits the crime of stalking.” The NRS under Section 3 has been amended to include technology to say “A person who commits the crime of stalking with the use of an Internet or network site or electronic mail or any other similar means of communication to publish, display or distribute information in a manner that substantially increases the risk of harm or violence to the victim shall be punished for a category C felony as provided in NRS 193.130.” Simply put, stalking and cyberstalking are crimes.

What exactly is cyberstalking? Cyberstalking is almost always characterized by the stalker relentlessly pursuing his\her victim online and is much more likely to include some form of offline attack, as well (OVW 2010). This offline aspect makes it a more serious situation as it can easily lead to dangerous physical contact, if the victim’s location is known.

In January 2010, the Bureau of Justice Statistics released the largest study to date of its kind on stalking, "Stalking Victimization in the United States," an Office on Violence Against Women (OVW) sponsored report based on supplemental data gathered from the National Crime Victimization Survey.

The report showed that technology, including Internet services such as email and instant messaging along with other technology, like GPS and computer spyware like IP sniffers, have been used to harass one in four stalking victims. That converts into about 1.2 million victims whose stalkers have used some form of technology to find them no matter where they are.
Cyberstalkers often begin their stalking behavior in ways planned to cause distress to the victim, or make them the subject of harassment by others. They may pretend to be the victim and post offensive comments or send offensive messages in their name. They may send hateful communications to family, friends and coworkers, either posing as the victim or “anonymous”. The victim’s computer may be hacked or their email accounts broken into, or the password is changed and the victim locked out of their own accounts. The victim may be signed-up for spam, porn sites and questionable offers.

In the most dangerous kind of cases, the cyberstalker posts the name, address and phone number of the victim online, may pose as them, and solicit sexual activities. In a California case, a stalker posted his victims’ name and address online and solicited group sex. The woman had never used the computer before, but found herself facing angry men at her door, expecting sexual services.

Most often, a cyberstalker is found to be someone the victim knows. It might be someone they have been in a relationship with, been to school or worked with. If a person believes they may be a victim of stalking or cyberstalking, contact your local law enforcement. Save any information such as emails, texts, virus scans that show positive for a tracer, etc. Emails and logs can be traced by ISP. Remember: No one has the right to harass or threaten anyone or make them fear their safety.

Comments