Just Stalking
  • Home
  • About
    • About Just Stalking
    • History/Development
  • "I have a stalker!" Steps
    • Just Quick Steps & Logs
    • Just Six Stages
    • Red Flags & Violence
    • Victim & Stalker Profiles
    • Two-Weeks - Recurrence
    • Stalking-by-Proxy
  • Special Victims Unit
    • Same-Gender
    • Men-Victims/Women Stalker
    • False Victimization (FVS)
    • Military & Vets
    • College
    • Juvenile Stalking
  • Security Tips
    • Personal Security
    • Cyber/Online Tips
    • Residence Security Tips
    • Car/Travel Security Tips
    • Office/Work Security Tips
    • Self-Defense Classes
    • First Aid/CPR
  • MD Victims' Rights & Laws
    • MD & Relevant Laws
    • Victims' Rights/Process
    • Restitution/Compensation
    • Address Confidentiality
    • Criminal Justice Barriers
  • Professional & Workplace
    • Non-Family Violence (NFV)
    • Workplace: Police
    • Professional Victims
    • NFV Recommendations
  • DV/IPV & Intrafamilial
    • Partner Stalking
    • Just Provider Tips
  • Cyberstalking
    • Stalkerware
    • CousinStalkingDNABullying
  • Maryland County Resources
    • Western, Maryland
    • Greater Baltimore, MD
    • Capital Metro, Maryland
    • Eastern Shore, Maryland
    • Southern, Maryland
  • Just Global
    • National
    • International
  • Formal& Informal Resource
    • Mental Health & Stalking
    • Physical Health &Stalking
    • Resilience
    • Bystander Resources
  • Advocacy
    • Advocating for Policies
    • Legislative Goals
  • Contact Us
Just Stalking
  • Home
  • About
    • About Just Stalking
    • History/Development
  • "I have a stalker!" Steps
    • Just Quick Steps & Logs
    • Just Six Stages
    • Red Flags & Violence
    • Victim & Stalker Profiles
    • Two-Weeks - Recurrence
    • Stalking-by-Proxy
  • Special Victims Unit
    • Same-Gender
    • Men-Victims/Women Stalker
    • False Victimization (FVS)
    • Military & Vets
    • College
    • Juvenile Stalking
  • Security Tips
    • Personal Security
    • Cyber/Online Tips
    • Residence Security Tips
    • Car/Travel Security Tips
    • Office/Work Security Tips
    • Self-Defense Classes
    • First Aid/CPR
  • MD Victims' Rights & Laws
    • MD & Relevant Laws
    • Victims' Rights/Process
    • Restitution/Compensation
    • Address Confidentiality
    • Criminal Justice Barriers
  • Professional & Workplace
    • Non-Family Violence (NFV)
    • Workplace: Police
    • Professional Victims
    • NFV Recommendations
  • DV/IPV & Intrafamilial
    • Partner Stalking
    • Just Provider Tips
  • Cyberstalking
    • Stalkerware
    • CousinStalkingDNABullying
  • Maryland County Resources
    • Western, Maryland
    • Greater Baltimore, MD
    • Capital Metro, Maryland
    • Eastern Shore, Maryland
    • Southern, Maryland
  • Just Global
    • National
    • International
  • Formal& Informal Resource
    • Mental Health & Stalking
    • Physical Health &Stalking
    • Resilience
    • Bystander Resources
  • Advocacy
    • Advocating for Policies
    • Legislative Goals
  • Contact Us

More than Just Online

Cyber and Digital

Spyware AKA stalkerware has made it easier than ever before for perpetrators to stalk, track, monitor, and harass victims. Be aware that anything you do on any device may be seen by anyone who has infected it with stalkerware, including an abuser, such as searching for the stalkerware or how to get help. 

Caution

Use a device that the stalker isn’t monitoring. Trust your instincts. Look for patterns, changes in behavior, or knowledge they shouldn't have to help figure out what the person might be doing.

Link: Survivors’ Guide to Phones: Increasing privacy & responding to abuse

It is a strange feeling when a fear becomes flesh. For a long time, I have had a nagging worry about a man who harasses me on Twitter. I fretted that he would one day move from being a virtual nuisance to a real world threat.


Posetti & Shabbir, 2022, n.p.

Online Tips

1. Password Manager

LastPass allows you to log in quickly and easily. The built-in password generator creates long, randomized passwords that protect against hacking.

Instead of texting, conveniently and safely share passwords and notes with anyone. Stop worrying about data breaches. Get alerts if your personal information is at risk. Insurance cards, memberships, passwords... keep your stalking behavior log safe and easy to find.

Link: lastpass

2. SURVEILLANCE SELF-DEFENSE (SSD)

SSD is an exhaustive guide designed to teach others about protecting against  electronic surveillance for people around the world. Some aspects of this guide will be useful to people with very little technical knowledge, while others are aimed at audiences with more expertise. SSD addresses concerns around stalking, employment, DV, and other relevant topics; a threat assessment module is provided for users. SSD includes step-by-step tutorials for installing and using a variety of privacy and security tools, and aims to teach people how to think about online privacy and security to empower them to choose appropriate tools and practices even as the tools, laws rapidly change and become out of date. Some especially powerful and sophisticated threats may be difficult or impossible to protect against. This guide teaches users to be skeptical of  claims that any tool offers complete security or privacy. 

Link: SURVEILLANCE SELF-DEFENSE

Safety first

Consider how your safety might be affected if you identify or remove stalkerware. Address this in your safety-plan. DV stalkers in particular, may escalate their abusive behavior when stalkerware is removed.

If you suspect stalkerware, what you do on your phone could be seen by the other person. For calls or online activity where you want more privacy, use a phone or other device that isn’t being monitored, or an encrypted app. 

Documenting the Stalkerware

Document all incidence(s) of cyber-stalking in using the "Stalking Log" However, police or a forensics expert can look for evidence.

Link: Evidence Collection Series: Mobile Spyware

Removing Stalkerware

A full factory reset can usually remove the stalkerware. However, reinstalling apps or files from a backup can re-load it onto the device. You could also create a new iCloud/Google account for your device, in addition, so you’re starting over.

Replace your current phone. If you are able/safe, you could replace your phone, or set up a second phone. Here are a few options:

  • Purchase a new phone, and consider switching carriers and getting a new phone number. If possible note in your account that you are the only authorized account holder or set up notifications if changes are made to your account. 
  • Purchase a pay-as-you-go phone (called a "burner" phone) with cash.
  • Depending on your income or circumstances, you may qualify for discounts on phones or service. LifeLine offers a discount for individuals who qualify as low-income.
  • A trusted person might be able to give you a phone. Wipe the phone’s memory and do a “factory reset” to remove all of their information.

Important: Don’t connect the new phone to any old accounts, especially cloud accounts like Google or iCloud, and don’t use your old number. Don’t move data from your old phone to the new phone using a memory card, SIM card, your cloud account, or backups. Doing so could reinstall stalkerware. 

Link: Lifeline Support for Affordable Communications

How Do I Find Out if Stalkerware Is on My Computer?

Stalkerware will not necessarily have noticeable operating changes. You, however, may be able to notice changes in the stalker's behavior, patterns, or knowledge, indicating they have installed stalkerware. Hardware devices may be found in areas such as, between the computer and the keyboard cord, or  keyboards or mice can be replaced. Devices are usually installed inside the laptop, through the access panel.

Link:Spyware and Stalkerware: Computer Surveillance & Safety for Survivor

Remove stalkerware

The safest option is to replace the hard drive or get a new computer. Use a cloud services to store files from the infected computer, to ensure infected files aren't copied into the new computer, which could reinstall the stalkerware. You can consider wiping and rebuilding the computer starting with reinstalling the operating system, although this will not guarantee complete removal of the stalkerware. 

Use devices that aren’t being monitored

If your computer has stalkerware all activity including online chat, emails, and web searches, can be revealed to the cyberstalker. If you can, use a safer computer or device – one the person has not had physical or remote access to. It is recommended that DV/IPV victims look for help or information on computers in:

  • a public library
  • community center
  • a friend’s device. 

Update accounts

Stalkerware may have given the stalker access to your login information, consider resetting your passwords on a different device. Once the account(s) are reset, do not log-in again using the monitored device(s). Consider changing passwords for sensitive accounts i.e. online banks, social media accounts, etc. 

Link: Are You Guarding Your Galaxy from Cyberthreats?

Location Trackers & GPS

Location tracking devices can be as small as a quarter and hidden in clothes, bags, cars, or gifts. Check for hidden trackers in your belongings & vehicle. 

  • Car: check in the trunk, under the hood, inside the bumper, and under and between the seats. Ask a trusted mechanic or law enforcement for assistance.
  • Belongings: Check out of place items. For gifts that are non-electronic (such as a toy), look for any electronic parts that shouldn’t be part of the toy.

Link: Survivor’s Guide to Location Tracking

Preventing Phone Stalkerware

Consider access

Consider access

Consider access

Stalkerware is easy and quick to install.  It is not recommended to allow others to update or use your phone. Gifts of a new phone or tablet from your stalker to you, or those in your circle, are not recommended.

Update accounts

Consider access

Consider access

Change passwords, and set up two-factor authentication.

Link: How to set up two-factor authentication on your online services

Lock your phone

Consider access

Use anti-virus and anti-stalkerware protection

Place a passcode lock on your phone (and don’t share it) to minimize the risk of stalkerware being installed. Many devices allow you to choose between a number, pattern, thumbprint, or other security features.

Use anti-virus and anti-stalkerware protection

Do not root (Android) or jailbreak (iPhones) your phone.

Use anti-virus and anti-stalkerware protection

Download security apps to your phone, to help prevent stalkerware from being installed. They can scan your phone for stalkerware apps. 

Use security features

Do not root (Android) or jailbreak (iPhones) your phone.

Do not root (Android) or jailbreak (iPhones) your phone.

Review the "security" features under your "settings" to learn what is available on your phone. Androids have an option to allow installations from “unknown sources,” make sure this is turned off! Always install the latest updates for your phone and apps; not doing so increases vulnerability to security and privacy issues. 

Do not root (Android) or jailbreak (iPhones) your phone.

Do not root (Android) or jailbreak (iPhones) your phone.

Do not root (Android) or jailbreak (iPhones) your phone.

Rooting or jailbreaking a device means to "remove the operating system limitations in order to allow for third-party installations" (ones not in the app stores). This impacts the built-in security features designed to protect the device and increases vulnerability. Many of the more invasive stalkerware features don’t work unless the protections put in by the manufacturer are bypassed. Most stalkerware can't be installed on an iPhone unless the device is "jailbroken."

Preventing Computer Stalkerware

Consider access

Use anti-virus and anti-spyware protection

Create separate user or guest accounts

Be alert for anyone, a known stalker or an unknown person, technician, coworker (proxy), wants to install hardware such as a new keyboard, or cord; do what you can to stop them. Also be aware of software or updates or “fixes” to the computer — particularly if this coincides with increased monitoring or stalking. Beware of gifts(such as new computers, keyboards, or games) from or changes in a stalker or potential proxy's behavior towards you or someone within your circle. 

Create separate user or guest accounts

Use anti-virus and anti-spyware protection

Create separate user or guest accounts

Create guest accounts that have settings that do not allow software or apps to be installed without the administrator’s login. This can prevent accidentally or intentionally installing stalkerware if you or someone else using your computer clicks a link or opens a file.

Use anti-virus and anti-spyware protection

Use anti-virus and anti-spyware protection

Use anti-virus and anti-spyware protection

Install anti-virus and anti-spyware programs. Make sure they are up-to-date and set them to scan your computer regularly. These programs can help prevent stalkerware from being installed before your computer has been compromised. Before clicking on links, run your anti-virus/anti-spyware. *Note: that these programs will only protect you from  software or programs, not hardware devices. 

Cyber-Resources for Victims

CCRI Safety Center

Cyber Civil Rights Initiative (CCRI) provides victims with support regarding image-based sexual abuse. Every situation is unique so their resources are designed to meet a range of needs. They provide a list of attorneys and current scams as well as other relevant links. They provide useful resources such as safety planning tools to inform victims of their rights, legal definitions, as well as information on how to request removal of images.

Image abuse helpline: 844-878-CCRI (2274). 

Link: CCRI Get Help Now

Safe Shepherd

The internet Privacy Handbook: Safe Shepherd created this handbook to simplify privacy and make it accessible to to the public. The goal is to make it a single source of instructions to remove unwanted personal information.

Link: Privacy Handbook

The National Cybersecurity Alliance

This non-profit organization's mission is to create a more secure, interconnected world. They advocate for the safe use of all technology and educate everyone on how best to protect themselves, their families, and organizations from cybercrime. By creating strong partnerships between governments and corporations to amplify our message and to foster a greater “digital” good.

Link: National Cybersecurity Alliance

Tech Safety App

This web version of the Tech Safety App. will provide you with information about tech abuse and tips for privacy and safety.  It is available in English and Spanish. This website offers information about tech abuse and tips for privacy and safety. - The app is available on most mobile phones.

Link: Tech Safety App

Just More PROTECTION LINKS

GAMES AND ONLINE HARASSMENT HOTLINEREAL ONLINE PRIVACY. ANYWHERELink: Apple Personal Safety User Guide 2022Link: The Latest Cyberstalking Statistics for 2024
quick exit

Copyright © 2024 Just Stalking - All Rights Reserved.

Just Stalking: Resources, Inc. is a nonprofit, tax-exempt 501(c)(3) organization (EIN: 93-4264447).

Disclaimer: We are NOT a legal, mental health, medical, victims' advocate provider(s). We are NOT certified educators, financial experts, security specialists, or self-defense experts. While some of our staff may have training, background, or experience in legal, mental health, medical, victims' advocacy, education, financial, security, or self-defense fields pertaining to Maryland, none of our staff is currently, licensed, or certified specialists in the aforementioned fields. WE ARE NOT PROVIDING ADVICE, IN SUCH FIELDS. OUR GOAL IS TO DIRECT VICTIMS TO APPLICABLE PROVIDERS, PROVIDE FEEDBACK BASED ON PERSONAL EXPERIENCES, USING RELEVANT EVIDENCE-BASED RESEARCH & PRACTICES. WE WILL DO OUR BEST TO PROVIDE RESOURCES FOR ALL AFOREMENTIONED TIPS. IF YOU ARE IN DISTRESS PLEASE CALL 911.

Powered by

Safety Tips

  • Your cyber-use can be monitored.
  • If you feel unsafe, contact 9-1-1.
  • "Quick Exits" appear at the bottom of each page.
  • We use cookies to analyze website traffic.
  • Email with any questions! 

Accept

Safety Check

Quick Exit