Get CactusVPN for $3.5/mo!
Despite cyberstalking being a pretty serious problem on the Internet nowadays, it doesn’t get the attention it actually “deserves.” Unfortunately, many people are unaware how dangerous it can be, and how badly it can impact their lives.
But what is cyberstalking, exactly? And how can you make sure you don’t have to deal with a cyberstalker?
Here’s everything you need to know:
Cyberstalking is the online equivalent of stalking. It’s the act of harassing someone on the Internet to the point where they can’t live their life normally out of fear of being harmed, blackmailed, or having their career ruined – to give a few examples.
Due to the level of anonymity somebody can enjoy on the web, it’s hard to tell if a cyberstalker is someone from another country you’ve never met or interacted with, or if it’s someone you know.
Cyberstalking victims are usually women, children, and teens, but cyberstalkers can also target young adult, adult, and older males.
Cyberstalking is often compared to cyberbullying, but it’s not exactly the same thing. It can sometimes start out as cyberbullying, but it often goes way beyond that considering how obsessive the cyberstalker is. Basically, if you were to consider the main differences between real-life stalking and bullying, they would apply to cyberstalking and cyberbullying too.
To really understand how serious of a problem cyberstalking is, here are some statistics that highlight that:
Cyberstalking obviously takes place over the web, but what kind of platforms and communication channels do cyberstalkers use to harass people? Well, it can be any of the following:
Basically, any place on the Internet where you might be active, and which might contain any information associated with you. Cyberstalkers can also use any of those platforms to gather information about their victims.
Cyberstalkers will normally gather tons of data about their targets – like their email addresses, social media profiles and activity, current whereabouts, relationship status, social life, where they work at, mobile phone numbers, where they live, and their preferences/dislikes. Really “dedicated” cyberstalkers will even go as far as trying to find out intimate details about their victims, usually with the help of malware infections.
With enough info gathered, cyberstalkers will generally do any of the following:
Since cyberstalking can be really harmful for anyone who’s subjected to it, just how is it regulated by the law?
Well, the bad news is that there isn’t a great number of countries that take legal action against cyberstalking. Luckily, there are a few that see it for the threat that it is.
Things get a bit complicated since states have different ways of dealing with cyberstalking. Plus, it’s also worth noting that cyberbullying and cyberstalking are basically considered the same thing, with the difference being that cyberbullying is considered to be committed by minors, while cyberstalking is considered to be committed by adults. Also, the way freedom of speech is protected in the country can interfere with taking legal action against cyberstalking. Though, real threats are not considered protected speech.
Now, let’s see how different states handle cyberstalking:
Surprisingly enough, the EU doesn’t have a clear anti-cyberstalking law in place. The EU enacted numerous Directives to combat cybercrime, but none of them talk about cyberstalking directly. Depending on what the cyberstalker does, though, their actions might be prosecuted if they go against anti-harassment, anti-stalking, anti-hate speech, and anti-libel laws. Also, cyberstalking that involves minors might also be classified under the Directive concerning anti-child pornography laws.
European countries that have taken specific legal action against cyberstalking include Poland, Spain, and the UK.
India started considering cyberstalking a criminal offence back in 2013. In Japan, cyberstalking on social media is considered an offense, and so is sending threats through emails. South Korea has a stranger take on cyberstalking, as police officers can actually crack down on hateful comments without them having to be reported by the victims.
Lastly, in the Philippines, it’s likely that cyberstalking is covered by the Cybercrime Prevention Act of 2012.
In Australia, cyberstalking can be considered a crime seeing as how using any form of technology to harass someone has been illegal since 1999.
New Zealand legislation allows cyberstalking victim to report the act to the police, and immediate action can be taken if it’s considered that the victim or anyone/anything they know/own is in danger.
In Canada, cyberstalking is considered criminal harassment since all forms of stalking are illegal. However, it’s worth noting that only some sections of the Canadian Criminal Code will apply to cyberstalking incidents depending on how they took place.
One can argue that cyberstalking is covered by the Universal Declaration of Human Rights because this is what Article 5 of the declaration says:
“No one shall be subjected to torture or to cruel, inhuman or degrading treatment.”
So, in theory, cyberstalking should be illegal pretty much anywhere in the world just because of that, though not all law enforcement officers are likely to see it that way.
The best way to combat cyberstalking is to prevent it, so here are nine tips to help you do just that.
By the way, if you happen to be worried about your kids becoming the victims of cyberstalking, you should follow all the advice below and help them apply it in real life, and check out this article on cyberbullying too – some of the tips there can prove useful in such a situation.
Cyberstalkers’ success heavily relies on them being able to collect plenty of information about you. So, it’s obvious that the best way to make that much more difficult to them is to reduce the amount of data they can link to you. Ideally, you should be as anonymous as possible.
The best way to do that is to not share too much personally identifiable information on public forums and profiles. For example, you should never make you real social media account, email address, mobile phone number, or physical address visible to everyone.
Besides that, you should make sure all your social media profiles are set to be private. That way, potential cyberstalkers won’t be able to keep tabs on what you’re doing, or learn more about you. Sure, it can be a bit inconvenient that some of your posts might not go as viral as you’d wish, but it’s better than becoming a cyberstalking victim. If you’re not sure where to start, here are some guides for the most popular platforms:
A lot of cybercriminals rely on malware to get access to information they can use to blackmail or impersonate you. Making sure all your devices are secured with strong antimalware/antivirus programs is the best way to stop that from happening. Not to mention such programs will also make sure you don’t land on malicious phishing links and pages too.
Just make sure the programs are enabled at all times, and that they’re always up-to-date. We know that regular updates can be annoying if they get in the way of what you’re doing, but skipping out on just one simple update can make your whole system vulnerable to some new type of malware.
“Googling” yourself might sound narcissistic, but it’s a useful way to see what kind of data is available for anyone to see on the web. And we don’t just mean typing in your full name into the search bar. You should also try looking up other information like:
If you find any revealing information that shouldn’t be on the web, try to see if you can have it removed. Either access the account you have on the platform and do it manually, or try to contact the website owners, and ask them to delete it for you. The latter idea might not work all the time, but – depending on your country’s privacy laws – you can mention that you’re willing to pursue legal action if the data isn’t removed.
You should also try to remember if you had an account on any social media platforms that aren’t as popular nowadays like myspace or hi5. They might contain revealing info that you added to your profile years ago. Also, if you have an old tumblr account, you should check if any sensitive info is posted on it too.
Of course, old Facebook profiles where you posted too much data about you over the past years can be a problem too. Unfortunately, deleting all your info alongside removing the posts one by one can take up way too much time. Luckily, there’s this helpful extension that lets you mass delete posts and info in bulk.
TweetDeleter can also be pretty useful if you want to remove old Tweets that cybersalkers might use against you.
How does that help with cyberstalking? Well, for one, no cyberstalker would be able to track your online movements and communications when you use unsecured WiFi – like public networks, for example.
You could use your home network to avoid unencrypted traffic, sure, but if it’s not properly secured (it’s using outdated encryption), a cyberstalker could still find a way to monitor it. Even worse, the highest level of WiFi encryption (WPA2 – for the moment, at least) can be broken with the right cyber attack.
So, it’s best to make sure you have an extra layer of security whenever you browse the web, and a VPN can offer you just that.
We’ve got just what you need – a high-end VPN solution that comes equipped with military-grade encryption to ensure nobody can keep tabs on what you’re doing on the Internet. What’s more, we also offer access to highly-secure VPN protocols like SoftEther, IKEv2, and OpenVPN, so you’ll have an extra layer of security guarding your privacy.
Plus, we also offer DNS leak protection, so you don’t need to worry about a cyberstalker getting your IP address that way. Also, our service has a built-in Kill Switch that ensures you’re never exposed – not even if your VPN connection happens to go down.
What’s more, CactusVPN works across multiple platforms, has a no-log policy.
And once you do become a CactusVPN customer, we’ll still have your back with a 30-day money-back guarantee.
One smart way to make sure a cyberstalker can’t take over your accounts easily is to set up powerful passwords. None of that “hou$e” or “123456568” kind of stuff. We’re talking about really secure passwords that take decades or centuries to break even with a cracking tool.
We’ve got a guide that can help you come up with a decent password right here, but if you want some quick tips right now, here’s what you need to do:
Also, make sure you create a different password for each account you own. It’s a bit of a hassle, yes, but it’s much safer. This way, even if a cyberstalker somehow gets access to a password to one of your accounts, they won’t be able to use it (or variations of it) to break into your other accounts.
If you want to make sure you don’t easily become a cyberstalking victim, you need to change your email addresses and passwords quite often. This way, it’s not only harder for cyberstalkers to take over your accounts, but it’s also more difficult for them to track and find you on the Internet.
How often should you change them? Well, it’s difficult to say. Many security experts say you need to change them monthly, while others say it’s okay to change them every three months or so. In our opinion, both options work well. If you want to be very sure a cyberstalker can’t harass you, you should try to change them weekly – at least until you get rid of him/her.
If you happen to be the victim of an abusive relationship, and you just left it, change all your email addresses and passwords immediately. There’s no telling when the abuser might try to take control over them, and subject you to intense cyberstalking.
By that, we’re mostly referring to sending people intimate photos and videos of yourself over social media, Skype, email, or any other instant messaging platform. You might think you’re sending them to trustworthy people, but just how well do you know them? Even if it’s someone you’re in a relationship with, that’s not the kind of content you want them to have access to if you ever break up.
Of course, we’re also talking about sharing things like passwords, credit card numbers, or bank account details. That’s not the kind of info that should be freely shared over public networks.
Plus, if there’s no way to be sure the communication channel you are using is 100% encrypted and hacker-proof, sending such content and information over it is very risky. What if a data breach occurs, or what if a skilled cybercriminal manages to listen in on your traffic? All that sensitive data will fall in the wrong hands of a cyberstalker who wants to ruin your life – and now they’ll have the means to do it.
And while you could use a VPN to secure most of the traffic, we’d still advise against sharing this kind of content or info with other people. There’s just no telling what kind of arguments might cost you your friendship or relationships, and how they’d use all the data you’ve shared with them.
After all, statistics do show that around 70% of cyberstalking victims personally knew the cyberstalker in some way.
Phishing is when someone tries to trick you into revealing sensitive information by impersonating someone (your bank, a distant relative, your friends and family, lawyers, law enforcement, etc.). They will either try to get you to reveal the information they want (credit card numbers, login credentials, personally identifiable details) through phishing messages, or they’ll try to trick you into accessing malicious links and attachments that will infect your device with spyware, adware, ransomware, or keyloggers.
It’s best to check out our guide on phishing (alongside pharming and spam) to learn how it usually works, and what tell-tale signs you need to look out for.
Since cyberstalkers like to mess around with their victims’ finances, it’s a good idea to always keep tabs on them. Make sure payment notifications (for any amount of money) are enabled on all your accounts. Also, take the time each week or every couple of days to check your credit card and online payment account balances to see if there are any differences (no matter how small).
If you do notice any unexpected changes in your balances, that’s a sign some cybercriminals has manage to get their hands on your login credentials.
One good way to protect yourself from losing access to your payment accounts and credit cards is to enable multi-factor authentication on all accounts. Most banking accounts and payment processor accounts (like PayPal) should have that feature.
If you’re dealing with a cyberstalker, the first thing you need to do is collect as much evidence as you can – screenshots of the messages and emails you were sent, any videos you received, the names and email addresses the cyberstalker uses, etc. Make sure you have enough proof gathered, and then contact your local authorities.
Now, depending on how cyberstalking is treated by the law in your country, it can sometimes be difficult to be taken seriously. However, if you’ve got enough proof showing someone is harassing and threatening you, that should be enough for action to be taken. Also, you should consider the option of sending DMCA Takedown notices ASAP. You can try working with a lawyer to see how you can do that, or use online services like DMCA.com.
If you’re dealing with websites and blogs that are posting photos and videos of you, or saying harmful things about you, you should also try using WhoIsHostingThis to see if you can find out who owns them. While you might not always be able to contact the owner to have the content taken down, you can provide the details to the police.
In case you’re dealing with any harassment on social media, try to report it. Most platforms will take it seriously, and shut down the cyberstalker’s account. If you’re getting threats or anything like that, the platform will likely involve the police too.
Obviously, changing your social media accounts, email addresses, mobile numbers, credit cards, and passwords is a must right now. It’s quite the hassle, we know, but it’s important you do that to throw the cyberstalker off your online trail.
So, what is cyberstalking?
Like real-life stalking, cyberstalking is when you are harassed, threatened, and continuously stalked by someone you either know or don’t know. The only difference is that this happens on the Internet, though it can escalate to real-life encounters if the cyberstalker is very “determined.”
Cyberstalking can happen on social media, public forums, instant messaging apps, and through email. The cyberstalker might have a personal grudge against the victim (like being an ex), they might target them in the hopes of stealing money from the victim, or just try to ruin the victim’s life “for fun.”
While some countries have taken steps to make cyberstalking illegal, it still happens around the world, and isn’t always punished by the authorities. So, the best way to protect yourself from it is to learn how to prevent it. Ideally, you should: