8 Ways You Can Defend Against Cyber Stalking

 

What Can I Do If Someone Is Cyberstalking Me?

Cyberstalking is when stalking occurs in the virtual world. Stalking is defined by PC 646.9(a) as “any person who willfully, maliciously, and repeatedly follows or willfully and maliciously harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her safety, or the safety of his or her immediate family is guilty of the crime of stalking.” When patterns of stalking behavior are documented and logged consistently, what may first appear as an isolated incident can be recognized by law enforcement as a pattern of stalking. Stalking can be documented in the NCTCC Stalking Behavior Log. While making a log is useful, it’s important to consider what can be done to protect against or even prevent encounters with cyberstalkers.

Clean Your Friends List

Most online users have acquaintances or unknown individuals that can access their social media platforms. Social media culture often encourages the idea of adding more “friends” to flaunt popularity and status. You don’t need a large friend base to network or broadcast. Focus on quality not quantity. Only accept friend requests from people you know. Go through your friend list on a regular basis to remove people who you don’t know or who don’t feel safe to know. 

Change Your Online Security Settings 

The social media platforms you access will determine the process of online security. Consider only joining online platforms that have established, clear, and navigable security settings. Facebook has various levels of privacy settings which can add to the feeling of security, but remember: ultimately, there is no such thing as total privacy online. 

  • Select “Privacy Check Up” on Facebook.

  • Enable your privacy settings to share with your “friends” only. Public settings can be seen by anyone who uses the internet.  

  • Use privacy settings to share content with “custom audiences.”  Consider forming a close friends and family audience on Facebook to share personal information with a select audience. 

  • Limit who can tag you by accessing Facebook settings —> Profile and Tagging to review tags before they are posted on your profile. 

Disable Geotagging

Look up your specific model of camera online to see if it includes geotagging. It is likely to have this feature. Most smartphones will have a “location tag” or a “location app permission” section. To disable your geotagging feature and location tracking follow the steps below. 

  • In iOS 7: Navigate to Settings -> Privacy -> Location Services and tap the toggle to off. This will disable geotag settings.

  • For Android: Access your phone’s camera.. Select Settings/Menu -> Location tags tap the toggle to off. This will disable geotag settings.

  • To disable mobile apps from knowing your location select Settings/Menu -> Location tags and tap toggle to off or select the Apps in which you want to share your location. This will disable sharing your location with specific apps. 

Reduce Your Online Footprint

  • Privacy does not exist on social media.

  • Social media stores your information under the control of the platform owner.

  • Ask friends and family to be discreet about sharing your personal information.

  • Set boundaries with friends and family. Ask them not to tag you in their online posts.

  • Disable old social media accounts you no longer use.

  • Be selective with the online groups in which you participate.

Remove Yourself From Data Broker Sites

Data Brokers collect your personal information and sell it to other companies. They access this information through court records, motor vehicle records, census data, birth certificates, marriage licenses, voter registration information, bankruptcy records, and divorce records. Data brokers will post your personal information on search engines across the internet. 

Disengage From The Individual Completely

Many victims of stalking know the individuals who stalk them. Many of these relationships may have been presented as friendship, support, or even love at one point. However, if the relationship has turned dangerous and gives the victim reason to fear for their safety, trust your instinct; it is usually right! If possible, disengage from the individual stalking you immediately and completely. 

  • Block the individual from all your online platforms.

  • Do not accept calls and do not respond to emails or texts from the individual stalking you. Do not even respond to ask them to stop contacting you on social media. Just walk away from the individual.

  • Consider talking to third party acquaintances or friends and ask them to keep your information private. If they are neutral or siding with the stalker, they are a pathway for your stalker to potentially enter into your life. If your safety is at risk, consider ending the acquaintanceship or friendship.

  • Consider changing your phone number and email if your safety is being threatened.

Document Every Instance In The Stalking Behavior Log

  • Take screenshots of online harassment.

  • Do not delete text messages.

  • Create an email folder dedicated to saving online messages from the stalker.

  • Save voicemail messages.

  • If you contact the police to file a report, or if you consider pursuing a restraining order, be sure to collect the officer’s badge number and reporting information. Save all documentation with your Stalker Behavior Log. 

Create A Safety Plan

Safety plans can be researched and developed on mobile devices like the NCTCC Mobile App. Access https://nctcc.org/nctcc-app/ to download the app, available on iOS and Android devices. While the NCTCC Safety Plan is designed for intimate partner violence, the tool can apply to many other situations where victims may need an exit plan from a violent situation. Enter the app → Safety→ Domestic Abuse Safety. This Safety Plan will walk a survivor of crime through the following steps:

  • Step 1: Safety During A Violent Incident.

  • Step 2: Safety When Preparing To Leave.

  • Step 3: Safety In My Own Residence.

  • Step 4: Safety With A Protection Order.

  • Step 5: Safety On the Job And In Public.

  • Step 6: Safety And Drug Or Alcohol Consumption.

  • Step 7: Safety And My Emotional Health.

  • Step 8: Items To Take When Leaving.

To visit the Safety Section of the NCTCC App and get more information on Stalking/Harassment Safety, download the NCTCC Victim Service Mobile Application at nctcc.org/nctcc-app or search for “nctcc” in the Google Play or Apple Store.



Digital Defense


 
Previous
Previous

12 Useful Apps & Tools to Defend Against Online Harassment

Next
Next

Indigenous Peoples Day On The Rise