STALKING AND TECHNOLOGY
With the increasing use of and dependence on technology, batterers and stalkers have turned to the internet, computers, cell phones, GPS and other electronic devices and methods in order to track, harass and control their victims.
With no special training or skills, a stalker can:
- monitor your computer activity
- monitor your internet activity
- obtain passwords and other log in information for your accounts, including email and bank accounts
- monitor your phone calls and text messages
- track your whereabouts through your cell phone
- track your whereabouts through your vehicle
- track your whereabouts by placing a device on your person, such as your purse or wallet
Some of the tactics employed by stalkers and batterers include:
- sending unsolicited email that can be hateful, threatening, lewd, obscene and otherwise unwelcome
- sending the victim electronic junk mail, otherwise known as spam
- harassing the victim via live chat
- posting the victim’s personal information on internet discussion boards, social media sites, chat rooms or other publlc forums.
- posting false or damaging information about the victim on internet discussion boards, social media sites, chat rooms or other public forums
- sending a computer virus via email
- sending computer monitoring software via email or installing it directly onto the victim’s computer and accessing the victim’s various account log in information and passwords.
- impersonating the victim by logging in to the victim’s email account and sending offensive or threatening communications to the victim’s family, friends, neighbors, place of employment and others
- impersonating the victim by logging into the victim’s social media and discussion board accounts and posting offensive information and comments
- impersonating the victim by logging into the victim’s email and sending threats to the stalker/batterer’s own email address in order to file false charges against the victim
- creating a website with the victim’s personal information and photos for the purposes of damaging the victim’s reputation or soliciting contact or visits by strangers
- posting private photos to discussion boards or adult/pornographic sites
- placing a tracking device or global positioning system (GPS) in the victim’s car, cell phone, purse/wallet or on their person
- placing recording or monitoring devices in the victim’s home, car, cell phone, home phone, purse/wallet or on their person
- activating the GPS locator service with the victim’s cell phone provider (when the victim shares the account with the stalker/batterer)
It is wise to protect your personal and account information as a general rule. It is especially important if you are the victim of domestic violence or stalking. Learn how you can protect yourself from the use of technology to stalk.