Spyware AKA stalkerware has made it easier than ever before for perpetrators to stalk, track, monitor, and harass victims. Be aware that anything you do on any device may be seen by anyone who has infected it with stalkerware, including an abuser, such as searching for the stalkerware or how to get help.
Use a device that the stalker isn’t monitoring. Trust your instincts. Look for patterns, changes in behavior, or knowledge they shouldn't have to help figure out what the person might be doing.
Posetti & Shabbir, 2022, n.p.
If you know you don’t want contact initially, you can make your accounts anonymous.
If you did not set up an anonymous account, and you realize that you don’t want contact at a later point, for whatever reason, say so, clearly, and unequally. "I no longer want any contact, thank you for your time."
After that, discontinue all communications with that person who is attempting to continue to contact you, particularly if that contact fits a stalking pattern.
If their contact contain any threats toward you directly or a secondary victim; or if they threaten to reveal information or your identity, that is blackmail. Complying is ill-advised, it is unlikely to protect you or anyone in your circle. Document any and all threats, contact law-enforcement if necessary.
If disengaging does not work, and/or any threats are received, save all messages/contacts and contact law enforcement. Depending on what state they live in and exactly what they have done, there may be a variety of options, but if the problem crosses state lines, there could be jurisdictional issues.
If contact goes off-line, and this person is intruding on you using other methods, such as calling, or showing up at your home or work, be sure to document all contact, and contact law-enforcement.
*Utilize other resources throughout this site, as applicable.*
LastPass allows you to log in quickly and easily. The built-in password generator creates long, randomized passwords that protect against hacking.
Instead of texting, conveniently and safely share passwords and notes with anyone. Stop worrying about data breaches. Get alerts if your personal information is at risk. Insurance cards, memberships, passwords... keep your stalking behavior log safe and easy to find.
SSD is an exhaustive guide designed to teach others about protecting against electronic surveillance for people around the world. Some aspects of this guide will be useful to people with very little technical knowledge, while others are aimed at audiences with more expertise. SSD addresses concerns around stalking, employment, DV, and other relevant topics; a threat assessment module is provided for users. SSD includes step-by-step tutorials for installing and using a variety of privacy and security tools, and aims to teach people how to think about online privacy and security to empower them to choose appropriate tools and practices even as the tools, laws rapidly change and become out of date. Some especially powerful and sophisticated threats may be difficult or impossible to protect against. This guide teaches users to be skeptical of claims that any tool offers complete security or privacy.
Your safety can be affected by stalkerware. Address this in your safety-plan.
For calls or online activity where you want more privacy, use a phone or other device that isn’t being monitored, or use an encrypted app.
Document all incidence(s) of cyber-stalking by using the "Stalking Log" However, police or a forensics expert can look for evidence.
Stalkerware is easy and quick to install. It is not recommended to allow others to update or use your phone. Gifts of a new phone or tablet from your stalker to you, or those in your circle, are not recommended.
Change passwords, and set up two-factor authentication.
Place a passcode lock on your phone (and don’t share it) to minimize the risk of stalkerware being installed. Many devices allow you to choose between a number, pattern, thumbprint, or other security features.
Download security apps to your phone, to help prevent stalkerware from being installed. They can scan your phone for stalkerware apps.
Review the "security" features under your "settings" to learn what is available on your phone. Androids have an option to allow installations from “unknown sources,” make sure this is turned off! Always install the latest updates for your phone and apps; not doing so increases vulnerability to security and privacy issues.
Rooting or jailbreaking a device means to "remove the operating system limitations in order to allow for third-party installations" (ones not in the app stores). This impacts the built-in security features designed to protect the device and increases vulnerability. Many of the more invasive stalkerware features don’t work unless the protections put in by the manufacturer are bypassed. Most stalkerware can't be installed on an iPhone unless the device is "jailbroken."
The Board for Certification of Genealogists clearly states in their ethical guidelines for DNA testing that genealogists should refrain from "bullying," in which they describe a number of behaviors, including "blackmail" and "stalking" (Board for Certification of Genealogists, 2023, np). However, these behaviors have identified within the genealogical community, and elsewhere, Harmon (2007) reported individuals traveling across the country, retrieving coffee cups, cigarette butts, and other discarded 'evidence' or 'trash' to test DNA. Estes (2013) wrote an article for the genealogical community discouraging, "bullying," which outlined stalking behaviors, of repeated harassments occurring both on and offline (np).
Be alert for anyone, a known stalker or an unknown person, technician, coworker (proxy), wants to install hardware such as a new keyboard, or cord; do what you can to stop them. Also be aware of software or updates or “fixes” to the computer — particularly if this coincides with increased monitoring or stalking. Beware of gifts(such as new computers, keyboards, or games) from or changes in a stalker or potential proxy's behavior towards you or someone within your circle.
Create guest accounts that have settings that do not allow software or apps to be installed without the administrator’s login. This can prevent accidentally or intentionally installing stalkerware if you or someone else using your computer clicks a link or opens a file.
Install anti-virus and anti-spyware programs. Make sure they are up-to-date and set them to scan your computer regularly. These programs can help prevent stalkerware from being installed before your computer has been compromised. Before clicking on links, run your anti-virus/anti-spyware. *Note: that these programs will only protect you from software or programs, not hardware devices.
Cyber Civil Rights Initiative (CCRI) provides victims with support regarding image-based sexual abuse. Every situation is unique so their resources are designed to meet a range of needs. They provide a list of attorneys and current scams as well as other relevant links. They provide useful resources such as safety planning tools to inform victims of their rights, legal definitions, as well as information on how to request removal of images.
Image abuse helpline: 844-878-CCRI (2274).
The internet Privacy Handbook: Safe Shepherd created this handbook to simplify privacy and make it accessible to to the public. The goal is to make it a single source of instructions to remove unwanted personal information.
This non-profit organization's mission is to create a more secure, interconnected world. They advocate for the safe use of all technology and educate everyone on how best to protect themselves, their families, and organizations from cybercrime. By creating strong partnerships between governments and corporations to amplify our message and to foster a greater “digital” good.
This web version of the Tech Safety App. will provide you with information about tech abuse and tips for privacy and safety. It is available in English and Spanish. This website offers information about tech abuse and tips for privacy and safety. - The app is available on most mobile phones.
Copyright © 2024 Just Stalking - All Rights Reserved.
Just Stalking: Resources, Inc. is a nonprofit, tax-exempt 501(c)(3) organization (EIN: 93-4264447).
Disclaimer: We are NOT a legal, mental health, medical, victims' advocate provider(s). We are NOT certified educators, financial experts, security specialists, or self-defense experts. While some of our staff may have training, background, or experience in legal, mental health, medical, victims' advocacy, education, financial, security, or self-defense fields pertaining to Maryland, none of our staff is currently, licensed, or certified specialists in the aforementioned fields. WE ARE NOT PROVIDING ADVICE, IN SUCH FIELDS. OUR GOAL IS TO DIRECT VICTIMS TO APPLICABLE PROVIDERS, PROVIDE FEEDBACK BASED ON PERSONAL EXPERIENCES, USING RELEVANT EVIDENCE-BASED RESEARCH & PRACTICES. WE WILL DO OUR BEST TO PROVIDE RESOURCES FOR ALL AFOREMENTIONED TIPS. IF YOU ARE IN DISTRESS PLEASE CALL 911.