In real world, stalking (the act of following a particular person for a long time with an intention of harming) is a common phenomenon. But in cyber world, it is more dangerous as the stalker is invisible. Read this article to understand the modus operandi of the stalker and the protection mantra.
Priya (name changed) was continuously receiving disturbingly messages on her phone. After some time, request for meeting was received on her mobile phone. This was going on for quite some time even though she had replied that she was not interested in meeting the stalker. Over past few days, this stalker started sending her morphed photographs with threat of posting them in social media if she refused to meet her. These messages had stunned her. Frightened, she discussed it with her parents. Soon her family members complained to the police.
After investigation police found that the man had located Priya on public Facebook profiles. As her privacy settings was not enough to protect the account, her personal details like the phone number and email addresses was stolen and used by the culprit. The man used her photos and morphed them to threaten her and blackmail her.
The cyber world is a unique place. The moment we connect to cyber world, especially social media our identity and personal information becomes public. It is important for all the online users to be aware about this since such information can be used for cyber stalking. In recent time the cases of cyber stalking have increased tremendously and anyone from celebrity to common peoples can become victim of it. As stalkers always chose their targets due to some specific reason which may range from a broken relationship or be driven by the obsession of the stalker or even to conduct some fraud. Cyber stalking can happen in many ways and can last for weeks, months and even years.
What is Cyber Stalking?
Cyber stalking is a repeated unwanted communications and contacts with a victim that can cause apprehension or fear to victim. In most cases stalkers make unwanted and deliberate communications using telephone calls, emails, text messages, posts on social networking sites, and letters. In some cases, stalkers also send unsolicited materials, such as gifts or items that cause fear and threat to victim.
Intention of Stalker:
How Cyber Stalking is done?
Cyber stalking done through online medium. Stalker does a profiling about the victim and gain almost all the information which is used for stalking. This information includes name, address, daily routine, victim’s images and some cases victim’s social media account password. After having all the information about the victim, stalkers may do all or few of the actions mentioned below:
Consequences of cyber stalking on victim:
How do you know that you are being stalked?
The most obvious sign of cyber stalking is repeated contact by a person with the victim through any medium of communication even after victim’s refusal to have any further communication. If you find any one of the situations below you can understand that you are being stalked:
There are a number of simple ways to guard against cyber stalking:
Weseso is a non-profit organization which works for cyber safety of the society with students as agents of change.
To learn more about cyber security read weseso blogs, written by students from different schools. You can also write blogs and take part in various knowledge sharing discussion. To get involved, you first need to become a cyber warrior and become a part of larger community who are committed to secure family, friends and society from cyber crime.
To know how to become a cyber warrior, click the link: https://weseso.org/how-to-become-a-cyber-warrior/