Online involves harassing or threatening behavior of an individual or group engages in repeatedly targeting a victim(s) using information and communications technology. C
I. Electronic messaging such as classic emails, text messages and Twitter.
II. Spamming and/or sending threatening emails to the victim or victim’s family, friends or co-workers.
III. Posting the victim’s personal information such as name, address, phone numbers, and e-mail address online.
IV. Posting offensive comments in the victim’s name.
V. Creating and posting sexually explicit images of the victim or victim’s loved ones.
VI. Hacking into the victim’s computer, accounts and mobile devices.
VII. Subscribing the victim to pornography sites and unwanted advertising.
VIII. Attaching spyware to emails or installing it on the computer.
IX. Setting up websites that threaten the victim or encourage others to contact, harass or harm them.
X. Computer Monitoring Software, or “SpyWare,” allows a cyberstalker to monitor computer and Internet activities and discover a victim’s efforts to escape or access help. This software can be installed remotely or by physically accessing the victim’s computer.
The methods the cyber stalker engages in ranges from novice to advanced. The more advanced they are in new electronic technology, the more proficient they become at targeting their victim.
A cyber stalker initially does not present a direct physical threat to the potential victim, gathers information on victim’s online activity and contacts, finally begins to make threats and intimidation. The online anonymity greatly reduces the probability of identification of the cyber stalker.