|
Post by Cassie on Mar 9, 2008 22:31:01 GMT -5
What is cyberstalking and what is cyberharassment?
Cyberstalking and cyberharassment are very similar. Most people use them interchangeably, but there is a subtle distinction, typically relating to the perpetrator’s intent and the original motivation for their behavior.
While the two situations usually involve many of the same online tactics, cyberstalking is almost always characterized by the stalker relentlessly pursuing his\her victim online and is much more likely to include some form of offline attack, as well. This offline aspect makes it a more serious situation as it can easily lead to dangerous physical contact, if the victim’s location is known.
Why do people cyberstalk or cyberharass others?
Cyberstalkers are often driven by revenge, hate, anger, jealousy, obsession and mental illness. While a cyberharasser may be motivated by some of these same feelings, often the harassment is driven by the desire to frighten or embarrass the harassment victim.
Sometimes the harasser intends to teach the victim a lesson in netiquette or political correctness (from the harasser’s point of view). Often the cyberharassment victim is merely in the wrong place at the wrong time, or has made a comment or expressed an opinion that the cyberharasser dislikes. We have even seen cases where the victim is merely being targeted because they are the first ones the cyberharasser encounters when they are in a “bad mood.
|
|
|
Post by Cassie on Mar 9, 2008 22:33:19 GMT -5
What do cyberstalkers/harassers do when the stalk or harass someone?
The harasser may post comments intended to cause distress to the victim, or make them the subject of harassment by others. They may send a constant stream of e-mails and instant messages to their victims or a victim’s co-workers, friends, or family. They may pose as the victim and post offensive comments or send offensive messages in their name. They may send hateful or provocative communications to the victim’s boss, family or significant other (in their own name or posing as the victim). Often the victim’s computer is hacked or their e-mail accounts are broken-into by the cyberstalker/harasser and taken over entirely, or the password is changed and the victim locked out of their own accounts. The victim may be signed-up for spam, porn sites and questionable offers.
Cyberstalkers/harassers frequently follow their victims into chat rooms and onto discussion boards, posting lies and hateful messages, or passing misinformation about the victim. They may create sexually explicit images, using the head of their victims attached to the bodies of porn actors. If they have real sexually explicit or nude images of their victims (usually from a failed romantic relationship between the stalker/harasser and the victim), they may create Web sites posting the images and advertising the site to friends and family of the victim, or supply them to commercial porn sites with amateur image sections for public display. We are even familiar with cases where the cyberstalker has threatened the life of the President of the United States or the Queen of England, while posing as the victim.
In the most dangerous type of cases, the cyberstalker posts the name, address and telephone number of the victim online, often posing as them, and soliciting sexual activities on their behalf. In a California case, a man targeted a woman by posting her name and address online and soliciting group sex. The woman had never even used the computer before, but found herself facing angry, sexually frustrated men at her front door.
Death threats are typical in a cyberstalking situation. In fact, there have been several well-publicized cases in the United States where victims were eventually murdered by their stalkers. Many of these began as cyberstalking situations.
If there is any indication that a cyberstalker/harasser knows where the victim lives, works or how to find them offline, law enforcement must be contacted IMMEDIATELY to begin an active investigation into the circumstances of the situation. WiredSafety's law enforcement division, CyberLawEnforcement.org assists law enforcement in cyberstalking/harassment cases.
|
|
|
Post by Cassie on Mar 9, 2008 22:35:11 GMT -5
Is cyberstalking illegal? What about cyberharassment?
The laws tend to lump the two types of cybercrimes together. For the purposes of this guide, other than when there is a legal distinction, both cyberstalking and harassment are discussed under the heading “cyberstalking.” While most states in the United States have various types of cyberstalking/harassment laws on the books, there is no U.S. federal cyberstalking/harassment law (except when children under 16 are involved and being targeted for sexual harassment). Many Western European countries have cyberstalking/harassment laws, but they are the exception rather than the rule. Few Asian countries have cyberstalking/harassment laws.
If I can’t file criminal charges against the cyberstalker/harasser, what can I do to them?
Often the victims of cyberstalking and cyberharassment are limited to civil litigation (suing the stalker or harassment) or reporting the cyberstalker/harasser to their ISP and trying to get their accounts revoked, or Web sites shutdown.
|
|
|
Post by Cassie on Mar 9, 2008 22:35:59 GMT -5
What about cyberstalking/harassment in the workplace?
Cyberstalking and harassment also frequently occur in the workplace, either because the perpetrator is unhappy with management or a fellow worker, or because they have been fired or not hired in the first place. Many cases occur when an employee feels they have been passed over for a promotion or raise, or denied a vacation/personal day/other perk.
We have also often seen situations where a business or employees acting on its behalf (with or without approval) have targeted a competitor or its employees. These are typically treated as commercial crimes and are often the subject of litigation between the competitors. It may also become the basis for regulatory agency actions (such as securities market regulators and trade or consumer commissions, such as the SEC or FTC or state consumer protection agencies in the United States).
|
|
|
Post by Cassie on Mar 9, 2008 22:37:26 GMT -5
How is cyberstalking different from child predators luring kids in cyberspace?
While online contact with children by child predators is often called “cyberstalking,” experts distinguish these crimes as cyberluring, since the intent is to meet the child in real life or get them to cooperate in sexually explicit online behavior. Conversely, the intent in a cyberstalking/harassment situation is to cause fear, punish or hurt the victim.
Cyberharassment can involve child predators. For example, posting a child’s personal contact information online as advertising for adult sex is a form of harassment. However, in the United States, this is now prosecuted as a federal child exploitation crime, if the child being targeted is under 16 years of age.
|
|
|
Post by Cassie on Mar 9, 2008 22:38:50 GMT -5
Are there different types of cyberstalking/harassment situations?
Absolutely! There are three different kinds of cyberstalking situations...
Online cyberstalking and harassment that stays online Online harassment and stalking that ventures offline or encourages offline actions Offline stalking or harassment that moves online It doesn’t make any difference whether or not the victim has even used the Internet. The distinction between online and offline is dependent on the medium used by the perpetrator.
For example, online stalking/harassing is usually defined as “…repeated unsolicited contact by electronic means…” with the intent to “…terrify, intimidate, or harass…” another. The medium in this instance can include computers, Fax machines, telephones, etc.
Offline stalking/harassment involves the same type of behavior, but in real life. This includes everything from repeatedly following a victim to actual physical contact between a stalker and his/her victim.
Although each of the three situations above include some form of online attack, and can be terrifying for a victim, only those that have an offline component are physically dangerous. Note: the laws in your jurisdiction may only cover offline stalking and harassment, or those with an offline component.
|
|
|
Post by Cassie on Mar 9, 2008 22:40:45 GMT -5
What is the profile of a typical cyberstalking/harassment victim?Cyberstalking occurs more often with women as the victim, although that is gradually changing. Our most recent survey discloses that men are being cyberstalked and harassed more frequently by women than ever before. To view our survey results, visit 2003 cyberstalking Survey. Children who are stalked by adult sexual predators are not considered victims of cyberstalking, but rather are considered luring victims or victims of child exploitation. You can read our Margaret’s Story page for more information about how stalkers/harassers target children online for abuse/exploitation by others. (If you want to learn more about how pedophiles hunt children online, read our anatomy of a pedophile page.) www.wiredsafety.org/cyberstalking_harassment/csh7.html
|
|
|
Post by Cassie on Mar 9, 2008 22:42:00 GMT -5
What can you do to avoid becoming a victim of cyberstalking/harassment? Typically, the cyberharassment victim is new online, and inexperienced with the rules of netiquette (online etiquette). So learning the rules of the cyber-road is a good way to avoid being an easy mark for a cyberstalker/harasser. WiredSafety's Wired-Ed classes teach smart and safe surfing, without charge, to volunteers and site visitors alike. The classes are easy and are available online in our safe chat rooms, by our trained Wired-Ed instructors and volunteers. In addition, our Wired-Ed Internet 101 materials can help you learn more about online risks and safe surfing do's and don'ts. They are available online, without charge, by following this link >> Typically, the cyberharasser feels empowered by the perceived anonymity online. They feel they can hide behind their monitor. But most people leave a trail of cyber-breadcrumbs behind them online. Learning how to read an e-mail header is a good place to start stripping your stalker/harasser of their perceived anonymity. WiredSafety's Wired-Ed classes include one on reading a header, and can also be found by following this link >> We also have materials and classes on protecting your privacy online. Ignoring the communications sent to you is the best first step to stopping most cyberstalking/harassment. Unless your situation involves a truly obsessed or depraved harasser, most will lose interest quickly if they don't get the reaction they seek. Our cyber-self-defense tips can help you avoid cyberstalking/harassment entirely and stop it before it gets out-of-hand. Flaming wars (where insults and verbal attacks are traded online) can often lead to cyberstalking and harassment. Flaming can get out of control quickly and often escalates into serious threats, offline and online. Cyberstalking, where the real dangers arise, can have a substantial offline aspect, either by way of the victim and stalker working together, romantically involved or prior or current communications of some kind. Some are intent on targeting victims of sexual abuse, cancer patients and members of certain minority groups. Protecting your privacy is key to protecting yourself form credible offline threats. (You can learn more about protecting your privacy and anonymity online at WiredSafety’s privacy pages or by taking one of their “protecting your privacy online” Wired-Ed classes.) www.wiredsafety.org/cyberstalking_harassment/csh8.html
|
|
|
Post by Cassie on Mar 9, 2008 22:43:08 GMT -5
Who is your typical cyberstalker?
Most cyberstalking victims know their stalkers in real life. They may be co-workers, former spouses or frustrated suitors whose advances were ignored or rejected. They could also be fans or groupies, especially when a cyber-celebrity or well-known chat room or discussion board leader is involved.
Cyberdating and online flirtations can be fertile grounds for cyberstalking, and are often a catalyst, especially when the relationship does not progress as anticipated by the stalker.
Sometimes, the current boyfriend, girlfriend, or ex-spouse of a victim’s former partner will resort to cyberstalking if they believe that the victim is interfering with their new relationship.
Radical religious sects and racial supremacy groups often use cyberstalking as a method for persecuting those that do not share their particular beliefs.
Money, politics, religious beliefs, revenge, hate, and romance are the most frequent motives for cyberstalking. In fact, any situation that evolved from an emotionally packed incident are likely to include an offline component that can pose a real physical danger.
Cyberstalkers with a special grudge against the victim may be extremely difficult to stop. Their anger, jealousy and obsession may foil the common cyberstalking self-defense tips, and ignoring their contact may enflame them even more. No one should attempt to tackle a cyberstalker alone. The stakes are too high.
Don't be a victim! And, if you get the sense that the person may try to stalk you offline, call your local police immediately
|
|
|
Post by Cassie on Mar 9, 2008 22:44:44 GMT -5
What is a quick list of safety tips to avoid cyberstalking/harassment? Read our cyberstalking Online Self-Defense Guide and know these online safety rules: Don't respond to flaming (provocation online) Choose a genderless screen name Don't flirt online, unless you're prepared for the consequences. This is just like real life. Yes, you have the right to flirt. And you have the right to a sexy nickname. But the more obvious you are, the more likely you are to arouse unwanted attention from unwanted suitors. Save offending messages and report them to your service provider >> If someone makes threats in a chat room or on a message board, notify the moderator or Web site operator right away Don’t confront the stalker/harasser, this only arouses more anger or emotional attacks Don't give out any personal information about yourself or anyone else link to private surfing info] Get out of a situation online that has become hostile, log off or surf elsewhere Google yourself to make sure no personal information is posted by others about you >> www.wiredsafety.org/cyberstalking_harassment/csh10.html
|
|
|
Post by Cassie on Mar 9, 2008 22:46:11 GMT -5
What is the law? As the law varies from country to country and from state to state, we have compiled a database of country/state-specific laws for reference purposes. Currently, we have information for the [United States, Canada and the United Kingdom.] "Are you a victim of Cyberstalking?" Not all US States currently have legislation outlawing cyberstalking. KUOW Public Radio - Weekday looks at Cyberstalking and Harassment with guest: our own Al Kush, our Cyberstalking and Harassment Division Director. Follow this link to hear the broadcast >> Follow this link to read about cyberstalking in the workplace >> Follow this link to report a case of cyberstalking or harassment >> All of our tiplines and report forms are secure www.wiredsafety.org/cyberstalking_harassment/csh11.html
|
|