Cyber-Stalking Or Cyber-Bullying
Cyber-stalking
cyber bully |
Social Media Stalking Is Not The Same as Cyberstalking
Some
people use the term "stalking" to describe following someone's
activities via their social network. It's important that we not devalue the
serious nature of the crime of cyberstalking by using the term incorrectly.
Introduction
Cyberstalking, simply put, is online stalking. It has been
defined as the use of technology, particularly the Internet, to harass someone.
Common characteristics include false accusations, monitoring, threats, identity theft,
and data destruction or manipulation.
Cyberstalkers
use email, instant messages, phone calls, and other communication devices to
stalk, whether it takes the form of sexual harassment, inappropriate contact,
or just plain annoying attention to your life and to your family's activities.
Forms of Cyberstalking
Cyberstalking cases differ from regular
stalking in that it is technologically based, though some cyberstalkers
escalate their harassment to include physical stalking as well. A cyberstalker
acts of out of anger, or a need to control, or gain revenge over another person
through threats, fear, and intimidation. There are several forms of
cyberstalking, including:
- Harassing the victim
- Embarrassing and humiliating the victim
- Exerting financial control by emptying the victim’s bank accounts, or by ruining his credit
- Isolating the victim by harassing his family, friends, and employer
- Frightening the victim by using scare tactics and threats
Educate Yourself
keep selfies safe |
Never
provide any personal information about yourself online, no matter how safe you
think it might be. Never indicate your real name, address, phone number or even
the city where you live to someone you don’t know personally.
Catfishing
Catfishing is a
relatively new method of online stalking. It’s where the user poses as someone
else, using social media sites. They tend to use fake names, photos, and
locations. They will often approach the victim as a love interest or a mutual
friend. Oftentimes, they will copy the profiles of an existing user as a way to
verify their identity of a real person.
be alert for a scam |
Luckily, there are
ways to spot a fake profile:
- Do a reverse Google image
search of the user’s profile picture. If they’re a fake, it will lead to
you to multiple profiles or to a website that the catfisher pulled the
image from.
- Check how many friends the
user’s profile has. An average Facebook profile has about 130 friends.
Catfishing profiles will have significantly less.
- Examine the user’s photos
carefully. A real person will have photos of themselves with friends and
family or at public events. Catfishers generally have selfies or modeling
shots. Also, check to see if the other people in their photos are tagged,
verifying that they are friends with the people in the photos.
- If you suspect you’re being
catfished, ask the user to Skype via webcam to verify their identity. If
they make up excuses, that is an indication of a red flag.
Anti-Stalking Tips
Here are a few
important pointers to help you thwart cyberstalking, whether it's directed at
you, your PC, or your family:
- Maintain vigilance over
physical access to your computer and other Web-enabled devices like cell
phones. Cyberstalkers use software and hardware devices (sometimes
attached to the back of your PC without you even knowing) to monitor their
victims.
- Be sure you always log out of
your computer programs when you step away from the computer and use a
screensaver with a password. The same goes for passwords on cell phones.
Your kids and your spouse should develop the same good habits.
- Make sure to practice good
password management (link to password article) and security. Never share
your passwords with others. And be sure to change your passwords
frequently! This is very important.
- Delete or make private any
online calendars or itineraries--even on your social network--where you
list events you plan to attend. They could let a stalker know where you're
planning to be and when.
- A lot of personal information
is displayed on social networks, such as your name, date of birth, where
you work and where you live. Use the privacy settings in all your online
accounts to limit your online sharing with those outside your trusted
circle. You can use these settings to opt out of having your profile
appear when someone searches for your name. You can block people from
seeing your posts and photos, too.
- If you post photos online via
social networks or other methods, be sure to turn off the metadata in the
photo. The metadata reveals a lot of information about the photo, where
and when it was taken, what device it was taken on and other private
information. Mostly, metadata comes from photos taken on a mobile phone,
You can turn this off, usually a feature called geotagging, in your
phone’s settings.
- As always, use a security
software program such as Norton Security to prevent spyware from being
installed onto your computer via a phishing attack or an infected Web
page. Security software could allow you to detect spyware on your device
and decrease your chances of being stalked. If you break up with someone
that you were in a relationship with, be sure to change all of your online
passwords. Even if you think that your ex-partner may not know them, you
never really can be sure.
Be aware of your own online presence.
have presence of mind wile online
Check
your “ Googleability .” How much information can be found out about you online?
Have you ever Googled yourself? If not, you should, just so you can be aware of
what personal information is out there about you. Try different combinations- start
with just your full name. Then try your name plus your phone number, your name
plus your home address and your name and your birthdate. You can also use a
Google image search with the above information to see what sites may be hosting
information about you. Don't be shy about searching for yourself on social
networks as well. Additionally, you can also search for your family members to
see what is available about you through their profiles.
If
you happen to find that that there is sensitive personal information easily
available, there are a few ways you can get it removed from the Internet:
In
most cases, if it is a photo, or a website has information such as your
address, telephone number or date of birth, you will have to contact the
website and ask them to remove the data. If it is sensitive personal
information such as your Social Security number, bank account or credit card
number, you can contact Google and
they will remove it.
Report It
If you encounter someone that
exhibits stalker behaviors and it seems serious, or you begin to receive
threats, you should report it to the police. If you're being cyberstalked,
remember to keep a copy of any message or online image that could serve as
proof. Use the "print screen" or other keyboard functions to save
screenshots. Many police departments have cybercrime units, and cyberstalking
is a crime. If you suspect that someone is using spyware software to track your
everyday activities, and you feel as if you're in danger, only use public
computers or telephones to seek help. Otherwise, your efforts to get help will
be known to your cyberstalker and this may leave you in even greater danger.
Comments
Post a Comment