Spyware AKA stalkerware has made it easier than ever before for perpetrators to stalk, track, monitor, and harass victims. Be aware that anything you do on any device may be seen by anyone who has infected it with stalkerware, including an abuser, such as searching for the stalkerware or how to get help.
Use a device that the stalker isn’t monitoring. Trust your instincts. Look for patterns, changes in behavior, or knowledge they shouldn't have to help figure out what the person might be doing.
Posetti & Shabbir, 2022, n.p.
LastPass allows you to log in quickly and easily. The built-in password generator creates long, randomized passwords that protect against hacking.
Instead of texting, conveniently and safely share passwords and notes with anyone. Stop worrying about data breaches. Get alerts if your personal information is at risk. Insurance cards, memberships, passwords... keep your stalking behavior log safe and easy to find.
SSD is an exhaustive guide designed to teach others about protecting against electronic surveillance for people around the world. Some aspects of this guide will be useful to people with very little technical knowledge, while others are aimed at audiences with more expertise. SSD addresses concerns around stalking, employment, DV, and other relevant topics; a threat assessment module is provided for users. SSD includes step-by-step tutorials for installing and using a variety of privacy and security tools, and aims to teach people how to think about online privacy and security to empower them to choose appropriate tools and practices even as the tools, laws rapidly change and become out of date. Some especially powerful and sophisticated threats may be difficult or impossible to protect against. This guide teaches users to be skeptical of claims that any tool offers complete security or privacy.
Consider how your safety might be affected if you identify or remove stalkerware. Address this in your safety-plan. DV stalkers in particular, may escalate their abusive behavior when stalkerware is removed.
If you suspect stalkerware, what you do on your phone could be seen by the other person. For calls or online activity where you want more privacy, use a phone or other device that isn’t being monitored, or an encrypted app.
Document all incidence(s) of cyber-stalking in using the "Stalking Log" However, police or a forensics expert can look for evidence.
A full factory reset can usually remove the stalkerware. However, reinstalling apps or files from a backup can re-load it onto the device. You could also create a new iCloud/Google account for your device, in addition, so you’re starting over.
Replace your current phone. If you are able/safe, you could replace your phone, or set up a second phone. Here are a few options:
Important: Don’t connect the new phone to any old accounts, especially cloud accounts like Google or iCloud, and don’t use your old number. Don’t move data from your old phone to the new phone using a memory card, SIM card, your cloud account, or backups. Doing so could reinstall stalkerware.
Stalkerware will not necessarily have noticeable operating changes. You, however, may be able to notice changes in the stalker's behavior, patterns, or knowledge, indicating they have installed stalkerware. Hardware devices may be found in areas such as, between the computer and the keyboard cord, or keyboards or mice can be replaced. Devices are usually installed inside the laptop, through the access panel.
The safest option is to replace the hard drive or get a new computer. Use a cloud services to store files from the infected computer, to ensure infected files aren't copied into the new computer, which could reinstall the stalkerware. You can consider wiping and rebuilding the computer starting with reinstalling the operating system, although this will not guarantee complete removal of the stalkerware.
If your computer has stalkerware all activity including online chat, emails, and web searches, can be revealed to the cyberstalker. If you can, use a safer computer or device – one the person has not had physical or remote access to. It is recommended that DV/IPV victims look for help or information on computers in:
Stalkerware may have given the stalker access to your login information, consider resetting your passwords on a different device. Once the account(s) are reset, do not log-in again using the monitored device(s). Consider changing passwords for sensitive accounts i.e. online banks, social media accounts, etc.
Location tracking devices can be as small as a quarter and hidden in clothes, bags, cars, or gifts. Check for hidden trackers in your belongings & vehicle.
Stalkerware is easy and quick to install. It is not recommended to allow others to update or use your phone. Gifts of a new phone or tablet from your stalker to you, or those in your circle, are not recommended.
Change passwords, and set up two-factor authentication.
Place a passcode lock on your phone (and don’t share it) to minimize the risk of stalkerware being installed. Many devices allow you to choose between a number, pattern, thumbprint, or other security features.
Download security apps to your phone, to help prevent stalkerware from being installed. They can scan your phone for stalkerware apps.
Review the "security" features under your "settings" to learn what is available on your phone. Androids have an option to allow installations from “unknown sources,” make sure this is turned off! Always install the latest updates for your phone and apps; not doing so increases vulnerability to security and privacy issues.
Rooting or jailbreaking a device means to "remove the operating system limitations in order to allow for third-party installations" (ones not in the app stores). This impacts the built-in security features designed to protect the device and increases vulnerability. Many of the more invasive stalkerware features don’t work unless the protections put in by the manufacturer are bypassed. Most stalkerware can't be installed on an iPhone unless the device is "jailbroken."
Be alert for anyone, a known stalker or an unknown person, technician, coworker (proxy), wants to install hardware such as a new keyboard, or cord; do what you can to stop them. Also be aware of software or updates or “fixes” to the computer — particularly if this coincides with increased monitoring or stalking. Beware of gifts(such as new computers, keyboards, or games) from or changes in a stalker or potential proxy's behavior towards you or someone within your circle.
Create guest accounts that have settings that do not allow software or apps to be installed without the administrator’s login. This can prevent accidentally or intentionally installing stalkerware if you or someone else using your computer clicks a link or opens a file.
Install anti-virus and anti-spyware programs. Make sure they are up-to-date and set them to scan your computer regularly. These programs can help prevent stalkerware from being installed before your computer has been compromised. Before clicking on links, run your anti-virus/anti-spyware. *Note: that these programs will only protect you from software or programs, not hardware devices.
Cyber Civil Rights Initiative (CCRI) provides victims with support regarding image-based sexual abuse. Every situation is unique so their resources are designed to meet a range of needs. They provide a list of attorneys and current scams as well as other relevant links. They provide useful resources such as safety planning tools to inform victims of their rights, legal definitions, as well as information on how to request removal of images.
Image abuse helpline: 844-878-CCRI (2274).
The internet Privacy Handbook: Safe Shepherd created this handbook to simplify privacy and make it accessible to to the public. The goal is to make it a single source of instructions to remove unwanted personal information.
This non-profit organization's mission is to create a more secure, interconnected world. They advocate for the safe use of all technology and educate everyone on how best to protect themselves, their families, and organizations from cybercrime. By creating strong partnerships between governments and corporations to amplify our message and to foster a greater “digital” good.
This web version of the Tech Safety App. will provide you with information about tech abuse and tips for privacy and safety. It is available in English and Spanish. This website offers information about tech abuse and tips for privacy and safety. - The app is available on most mobile phones.
Copyright © 2024 Just Stalking - All Rights Reserved.
Just Stalking: Resources, Inc. is a nonprofit, tax-exempt 501(c)(3) organization (EIN: 93-4264447).
Disclaimer: We are NOT a legal, mental health, medical, victims' advocate provider(s). We are NOT certified educators, financial experts, security specialists, or self-defense experts. While some of our staff may have training, background, or experience in legal, mental health, medical, victims' advocacy, education, financial, security, or self-defense fields pertaining to Maryland, none of our staff is currently, licensed, or certified specialists in the aforementioned fields. WE ARE NOT PROVIDING ADVICE, IN SUCH FIELDS. OUR GOAL IS TO DIRECT VICTIMS TO APPLICABLE PROVIDERS, PROVIDE FEEDBACK BASED ON PERSONAL EXPERIENCES, USING RELEVANT EVIDENCE-BASED RESEARCH & PRACTICES. WE WILL DO OUR BEST TO PROVIDE RESOURCES FOR ALL AFOREMENTIONED TIPS. IF YOU ARE IN DISTRESS PLEASE CALL 911.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.