Just Stalking
  • Home
  • About
    • About Just Stalking
    • Volunteer
    • History/Development
  • "I have a stalker!" Steps
    • Just Quick Steps & Logs
    • Just Six Stages
    • Red Flags & Violence
    • Victim & Stalker Profiles
    • Two-Weeks - Recurrence
    • Stalking-by-Proxy
  • Special Victims Unit
    • Same-Gender
    • Men-Victims/Women Stalker
    • False Victimization (FVS)
    • Military & Vets
    • College
    • Juvenile Stalking
  • Security Tips
    • Personal Security
    • Cyber/Online Tips
    • Residence Security Tips
    • Car/Travel Security Tips
    • Office/Work Security Tips
    • Self-Defense Classes
    • First Aid/CPR
  • MD Victims' Rights & Laws
    • MD & Relevant Laws
    • Victims' Rights/Process
    • Restitution/Compensation
    • Address Confidentiality
    • Criminal Justice Barriers
  • Professional & Workplace
    • Non-Family Violence (NFV)
    • Workplace: Police
    • Professional Victims
    • NFV Recommendations
  • DV/IPV & Intrafamilial
    • Partner Stalking
    • Just Provider Tips
  • Cyberstalking
    • Stalkerware
  • Maryland County Resources
    • Western, Maryland
    • Greater Baltimore, MD
    • Capital Metro, Maryland
    • Eastern Shore, Maryland
    • Southern, Maryland
  • Just Global
    • National
    • International
  • Formal& Informal Resource
    • Mental Health & Stalking
    • Physical Health &Stalking
    • Resilience
    • Bystander Resources
  • Advocacy
    • Advocating for Policies
    • Legislative Goals
  • Contact Us
Just Stalking
  • Home
  • About
    • About Just Stalking
    • Volunteer
    • History/Development
  • "I have a stalker!" Steps
    • Just Quick Steps & Logs
    • Just Six Stages
    • Red Flags & Violence
    • Victim & Stalker Profiles
    • Two-Weeks - Recurrence
    • Stalking-by-Proxy
  • Special Victims Unit
    • Same-Gender
    • Men-Victims/Women Stalker
    • False Victimization (FVS)
    • Military & Vets
    • College
    • Juvenile Stalking
  • Security Tips
    • Personal Security
    • Cyber/Online Tips
    • Residence Security Tips
    • Car/Travel Security Tips
    • Office/Work Security Tips
    • Self-Defense Classes
    • First Aid/CPR
  • MD Victims' Rights & Laws
    • MD & Relevant Laws
    • Victims' Rights/Process
    • Restitution/Compensation
    • Address Confidentiality
    • Criminal Justice Barriers
  • Professional & Workplace
    • Non-Family Violence (NFV)
    • Workplace: Police
    • Professional Victims
    • NFV Recommendations
  • DV/IPV & Intrafamilial
    • Partner Stalking
    • Just Provider Tips
  • Cyberstalking
    • Stalkerware
  • Maryland County Resources
    • Western, Maryland
    • Greater Baltimore, MD
    • Capital Metro, Maryland
    • Eastern Shore, Maryland
    • Southern, Maryland
  • Just Global
    • National
    • International
  • Formal& Informal Resource
    • Mental Health & Stalking
    • Physical Health &Stalking
    • Resilience
    • Bystander Resources
  • Advocacy
    • Advocating for Policies
    • Legislative Goals
  • Contact Us

More than Just Online

Cyber and Digital

Spyware AKA stalkerware has made it easier than ever before for perpetrators to stalk, track, monitor, and harass victims. Be aware that anything you do on any device may be seen by anyone who has infected it with stalkerware, including an abuser, such as searching for the stalkerware or how to get help. 

Caution

Use a device that the stalker isn’t monitoring. Trust your instincts. Look for patterns, changes in behavior, or knowledge they shouldn't have to help figure out what the person might be doing.

Link: Survivors’ Guide to Phones: Increasing privacy & responding to abuse

It is a strange feeling when a fear becomes flesh. For a long time, I have had a nagging worry about a man who harasses me on Twitter. I fretted that he would one day move from being a virtual nuisance to a real world threat.


Posetti & Shabbir, 2022, n.p.

Recommendations for Cyberstalking

Privacy settings

If you know you don’t want contact initially, you can make your accounts anonymous.

Changed your mind

If you did not set up an anonymous account, and you realize that you don’t want contact at a later point, for whatever reason, say so, clearly, and unequally. "I no longer want any contact, thank you for your time."

Do not engage

After that, discontinue all communications with that person who is attempting to continue to contact you, particularly if that contact fits a stalking pattern.

See: Just six stages

Threats

If their contact contain any threats toward you directly or a secondary victim; or if they threaten to reveal information or your identity, that is blackmail.  Complying is ill-advised, it is unlikely to protect you or anyone in your circle. Document any and all threats, contact law-enforcement if necessary.

Contact Law Enforcement

If disengaging does not work, and/or any threats are received, save all messages/contacts and contact law enforcement.  Depending on what state they live in and exactly what they have done, there may be a variety of options, but if the problem crosses state lines, there could be jurisdictional issues.

Contact off-line

If contact goes off-line, and this person is intruding on you using other methods, such as calling, or showing up at your home or work, be sure to document all contact, and contact law-enforcement.

*Utilize other resources throughout this site, as applicable.*

See: Stalking Logbook

Online Tips

1. Password Manager

LastPass allows you to log in quickly and easily. The built-in password generator creates long, randomized passwords that protect against hacking.

Instead of texting, conveniently and safely share passwords and notes with anyone. Stop worrying about data breaches. Get alerts if your personal information is at risk. Insurance cards, memberships, passwords... keep your stalking behavior log safe and easy to find.

Link: lastpass

2. SURVEILLANCE SELF-DEFENSE (SSD)

SSD is an exhaustive guide designed to teach others about protecting against  electronic surveillance for people around the world. Some aspects of this guide will be useful to people with very little technical knowledge, while others are aimed at audiences with more expertise. SSD addresses concerns around stalking, employment, DV, and other relevant topics; a threat assessment module is provided for users. SSD includes step-by-step tutorials for installing and using a variety of privacy and security tools, and aims to teach people how to think about online privacy and security to empower them to choose appropriate tools and practices even as the tools, laws rapidly change and become out of date. Some especially powerful and sophisticated threats may be difficult or impossible to protect against. This guide teaches users to be skeptical of  claims that any tool offers complete security or privacy. 

Link: SURVEILLANCE SELF-DEFENSE

Safety first

Your safety can be affected by stalkerware. Address this in your safety-plan. 

For calls or online activity where you want more privacy, use a phone or other device that isn’t being monitored, or use an encrypted app. 

See stalkerware

Documenting Cyberstalking

Document all incidence(s) of cyber-stalking by using the "Stalking Log" However, police or a forensics expert can look for evidence.

Link: Evidence Collection Series: Mobile Spyware

Preventing Phone Stalkerware

Consider access

Consider access

Consider access

Stalkerware is easy and quick to install.  It is not recommended to allow others to update or use your phone. Gifts of a new phone or tablet from your stalker to you, or those in your circle, are not recommended.

Update accounts

Consider access

Consider access

Change passwords, and set up two-factor authentication.

Link: How to set up two-factor authentication on your online services

Lock your phone

Consider access

Use anti-virus and anti-stalkerware protection

Place a passcode lock on your phone (and don’t share it) to minimize the risk of stalkerware being installed. Many devices allow you to choose between a number, pattern, thumbprint, or other security features.

Use anti-virus and anti-stalkerware protection

Do not root (Android) or jailbreak (iPhones) your phone.

Use anti-virus and anti-stalkerware protection

Download security apps to your phone, to help prevent stalkerware from being installed. They can scan your phone for stalkerware apps. 

Use security features

Do not root (Android) or jailbreak (iPhones) your phone.

Do not root (Android) or jailbreak (iPhones) your phone.

Review the "security" features under your "settings" to learn what is available on your phone. Androids have an option to allow installations from “unknown sources,” make sure this is turned off! Always install the latest updates for your phone and apps; not doing so increases vulnerability to security and privacy issues. 

Do not root (Android) or jailbreak (iPhones) your phone.

Do not root (Android) or jailbreak (iPhones) your phone.

Do not root (Android) or jailbreak (iPhones) your phone.

Rooting or jailbreaking a device means to "remove the operating system limitations in order to allow for third-party installations" (ones not in the app stores). This impacts the built-in security features designed to protect the device and increases vulnerability. Many of the more invasive stalkerware features don’t work unless the protections put in by the manufacturer are bypassed. Most stalkerware can't be installed on an iPhone unless the device is "jailbroken."

Special Topic: Cousin Stalking

DNA Bullying

The Board for Certification of Genealogists clearly states in their ethical guidelines for DNA testing that genealogists should refrain from "bullying," in which they describe a number of behaviors, including "blackmail" and "stalking" (Board for Certification of Genealogists, 2023, np). However, these behaviors have identified within the genealogical community, and elsewhere, Harmon (2007) reported individuals traveling across the country, retrieving coffee cups, cigarette butts, and other discarded 'evidence' or 'trash' to test DNA. Estes (2013) wrote an article for the genealogical community discouraging, "bullying," which outlined stalking behaviors, of repeated harassments occurring both on and offline (np).

Preventing Computer Stalkerware

Consider access

Use anti-virus and anti-spyware protection

Create separate user or guest accounts

Be alert for anyone, a known stalker or an unknown person, technician, coworker (proxy), wants to install hardware such as a new keyboard, or cord; do what you can to stop them. Also be aware of software or updates or “fixes” to the computer — particularly if this coincides with increased monitoring or stalking. Beware of gifts(such as new computers, keyboards, or games) from or changes in a stalker or potential proxy's behavior towards you or someone within your circle. 

Create separate user or guest accounts

Use anti-virus and anti-spyware protection

Create separate user or guest accounts

Create guest accounts that have settings that do not allow software or apps to be installed without the administrator’s login. This can prevent accidentally or intentionally installing stalkerware if you or someone else using your computer clicks a link or opens a file.

Use anti-virus and anti-spyware protection

Use anti-virus and anti-spyware protection

Use anti-virus and anti-spyware protection

Install anti-virus and anti-spyware programs. Make sure they are up-to-date and set them to scan your computer regularly. These programs can help prevent stalkerware from being installed before your computer has been compromised. Before clicking on links, run your anti-virus/anti-spyware. *Note: that these programs will only protect you from  software or programs, not hardware devices. 

Cyber-Resources for Victims

CCRI Safety Center

Cyber Civil Rights Initiative (CCRI) provides victims with support regarding image-based sexual abuse. Every situation is unique so their resources are designed to meet a range of needs. They provide a list of attorneys and current scams as well as other relevant links. They provide useful resources such as safety planning tools to inform victims of their rights, legal definitions, as well as information on how to request removal of images.

Image abuse helpline: 844-878-CCRI (2274). 

Link: CCRI Get Help Now

Safe Shepherd

The internet Privacy Handbook: Safe Shepherd created this handbook to simplify privacy and make it accessible to to the public. The goal is to make it a single source of instructions to remove unwanted personal information.

Link: Privacy Handbook

The National Cybersecurity Alliance

This non-profit organization's mission is to create a more secure, interconnected world. They advocate for the safe use of all technology and educate everyone on how best to protect themselves, their families, and organizations from cybercrime. By creating strong partnerships between governments and corporations to amplify our message and to foster a greater “digital” good.

Link: National Cybersecurity Alliance

Tech Safety App

This web version of the Tech Safety App. will provide you with information about tech abuse and tips for privacy and safety.  It is available in English and Spanish. This website offers information about tech abuse and tips for privacy and safety. - The app is available on most mobile phones.

Link: Tech Safety App

Just More PROTECTION LINKS

GAMES AND ONLINE HARASSMENT HOTLINEREAL ONLINE PRIVACY. ANYWHERELink: Apple Personal Safety User Guide 2022Link: The Latest Cyberstalking Statistics for 2024
quick exit

Copyright © 2024 Just Stalking - All Rights Reserved.

Just Stalking: Resources, Inc. is a nonprofit, tax-exempt 501(c)(3) organization (EIN: 93-4264447).

Disclaimer: We are NOT a legal, mental health, medical, victims' advocate provider(s). We are NOT certified educators, financial experts, security specialists, or self-defense experts. While some of our staff may have training, background, or experience in legal, mental health, medical, victims' advocacy, education, financial, security, or self-defense fields pertaining to Maryland, none of our staff is currently, licensed, or certified specialists in the aforementioned fields. WE ARE NOT PROVIDING ADVICE, IN SUCH FIELDS. OUR GOAL IS TO DIRECT VICTIMS TO APPLICABLE PROVIDERS, PROVIDE FEEDBACK BASED ON PERSONAL EXPERIENCES, USING RELEVANT EVIDENCE-BASED RESEARCH & PRACTICES. WE WILL DO OUR BEST TO PROVIDE RESOURCES FOR ALL AFOREMENTIONED TIPS. IF YOU ARE IN DISTRESS PLEASE CALL 911.

Powered by

Safety Tips

  • Your cyber-use can be monitored.
  • If you feel unsafe, contact 9-1-1.
  • "Quick Exits" appear at the bottom of each page.
  • We use cookies to analyze website traffic.
  • Email with any questions! 

Accept

Safety Check

Quick Exit