Nearly 1 in 3 women (31.2%) and about 1 in 6 men (16.1%) in the United States reported stalking, at some point in their lifetime, during which they felt fearful, threatened, or concerned for the safety of themselves or others (Smith, et al., 2022). In Maryland, 13.5% of women reported stalking, 15.8% of Black women and 13.8% of White women reported stalking in their lifetime, 75.9% of these female victims reported only male perpetrators (Smith, et al., 2017).
Gross, 2012, p. 91
Keep a detailed log of all interactions &/or events, this can be done on your phone using Just Stalking: Resources' Victim Log, if records can be kept secure, or another hard copy, such as a paper diary. Just Stalking: MD Resource's Log is available online and works on most cellular devices. Print or email the log to yourself for a record of all events &/or interactions.
For legal purposes, in particular, it is important to be clear, and concise, stating something to the effect of "I want no contact of any kind, in any way, ever." preferably with a witness that can attest to this in court.
Log all events:
*For those receiving 100- 400+ calls a day, or other frequent harassment this may difficult - we suggest, highlighting phone logs, taking screenshots, use the log duration to point to a number of incidents such as calls throughout a time period.
Links for Just Stalking's New Victim Log will be available on this page, throughout the website, & on social media.
If this behavior continues, make sure to inform possible bystanders, neighbors, family members, and any associates who may become involved as inadvertent proxies, or victims. Additionally, they may be witnesses in the future and should be aware of the situation to help provide safety & evidence. If a peace or protective order is in place, provide copies to your workplace, school, as well as your neighbors who may need to intervene on your behalf, along with any pictures.
If the stalking has continued, consider obtaining a personal protective or peace order, is your first step to getting law enforcement involved. However, it should be noted that in DV/IPV cases as well as stalkers with mental illness, this is not likely to deter their actions, and some consider this to increase threat or risk. It is important that each case be evaluated for risk or threat on an individual basis, preferably with the assistance of a trained professional who can consider the context and factors involved.
Once you realize that what you are experiencing is stalking, you must work to protect yourself from further harassment, victimization, and other stalking-related crime. Research suggests after a two week period of stalking victimization, the likelihood stalking will continue dramatically increases, with the average period of stalking being approximately two years. However, it can last much longer.
Stalking is about a 'course of conduct.' As outlined, the law is two parts. The first is about the stalker's conduct; the second is about fear. Stalkers often begin with "harassing" behaviors, or other "nuisance" crimes, that are not considered stalking. Some of the individual actions are legal, up to a certain point. However, these other crimes build to stalking and should be charged. Therefore, it is important to keep accurate records and keep pressure on the SA as well as the police to bring charges in accordance with the law.
Violation of a PPO of any kind in Maryland is a crime. The police have the authority to arrest your stalker for violating your PPO. Additionally, it is important for you to understand what your PPO says, and how it is written. For example, your stalker cannot be on your street and claim they are not on your property.
The agenda is not to charge haphazardly, or to make a rush to judgement. The goal is to ensure the record accurately reflects the crimes committed, and holds individuals accountable. Furthermore, often the periods of a stalker's confinement are the only time victims have free from their stalkers. This conduct needs to be established for the court.
The goal is to assist you in getting essential attention from appropriate professionals for your case, if you choose. By ensuring you are using proper terminology, as well as organizing all of your experiences, we hope to help you standardize your records. It may seem daunting at first, but we will help you every step of the way.
· Stalking is “typically measured in months & years” so, while stalking logs may be viewed by some as a tool to “increase credibility,” we view them as one to aid victims’ memory (McCann, 2001, p. 23; Logan, 2017, n. p.).
· While some stalking victims may find documenting events to take an emotional toll and be time consuming, a log of events can assist a victim determine the severity of events and identify changes in behavior.
· Stalking logs are important tools to assess threats and may uncover patterns in behavior.
· This may help you or professionals identify areas of risk, providing vital information to help you create, improve, or update your safety plan.
· If at a later date you determine that professionals or formal resources should be involved, the historical records will help to substantiate your accounts.
· A course of conduct is ongoing, ‘pervasive,’ behavior (McGinley, 2012).
· While it is often assumed to increase, it does not have to. It may fluctuate, or involve periods of no intrusions at all, called remittance; however, the behavior may ‘recur,’ (McEwan, et al. 2016).
· While other states require a minimum number of incidents to be called a course of conduct, such as “no less than #” or “#, or more,” Maryland chose not to define a number of events for a course of conduct.
Prosecutors will also need to show the conduct surpassed societal norms.
· Mens rea is interpreted by some as intention of wrongdoing, or moral culpability, it involves the actual state of mind of the accused.
· From the law of provocation, reasonableness has four elements, which have been interpreted as objective:
(1) “reasonable provocation,”
(2) “actual provocation,” the heat of passion,
(3) a reasonable [person] would not have cooled off,
(4) the accused/defendant does not cool off (Donovan & Wildman, 1981, p. 448).
· To borrow from harassment law, “unwelcomeness” as a subjective standard, can be applied, in situations where it may be “ambiguous” as to whether the victim “welcomed” the behavior of their stalker (McGinley, 2012, p. 14).
· While criminal courts in Maryland do not require stalking victims to ask the stalker to desist to obtain a PPO, it is advisable, and should be included in your log.
o However, ‘notice’ could include ignoring the stalker (moving inward tactics).
· Unfortunately, stalking victims must substantiate their claims by meeting a “standard of fear and a level of fear” (Tjaden, 2009, p. 266).
o This log is designed to assist you articulate both.
· Maryland’s stalking law has been interpreted to have a standard of fear requiring that the stalker’s behavior cause the victim actual fear or emotional distress.
o Thus, you will have to prove causation, essentially, that the stalker’s course of conduct caused your fear or emotional distress.
· Stalking laws vary widely on the level of fear or emotional distress a stalking-victim (and/or a reasonable person) must experience.
o In Maryland, the focus is primarily on injury, assault, sexual offenses, false imprisonment, or death (physical aggression and/or violence) toward the primary or secondary victim.
· Our goal is to guide you to document how much fear (or emotional distress) individual incidents caused, as well as the cumulative impact over time.
You will need to learn some of the legal and psychosocial language to use this log, that is intentional, the goal is to help you get attention for your case, & aid with safety planning. Some of these boxes only allow one choice, that is intentional, many professionals want focused "facts" & stalking can be dynamic & complex. Please pick the most appropriate items for each section, & add additional information in the comments area. They are intended to aid memory use a legal & psychosocial framework based on Maryland's law.
Some refer to this as ‘typical dating behaviors,’ but are taken to the extreme.
can include face-to-face or indirect contact through third parties.
include stealing information, breaking & entering, and trespassing.
such as aggressive verbal or nonverbal behaviors are designed to bother, annoy, or cause [emotional] distress for a victim.
involve electronic communication
is the systematic attempt to gain knowledge about the victim
can include implicit or explicit suggestions of harm.
This can also be against secondary victims, pets, property, or even the stalker (such as a threat of suicide).
include Aggressive and violent acts towards a person or property, such as vandalism, use of a weapon, assault, injury, attempted suicide & suicide, attempted rape & rape, and attempted homicide & homicide. (Spitzberg, & Cupach, 2007).
Politely requesting, or even pleading with your stalker to stop.
o More combative & direct, and include threatening to (or causing), injury, to deter the stalker. This may or may not work, experts do not advise this!
o BECAUSE.
§ It Increases the potential future interactions,
§ Conveys to the stalker they are important,
§ Can escalate the overall situation, and
§ threats, as opposed to actions, diminish credibility.
o Removing information from public databases, or social media.
o Buying a new car, changing personal information, moving.
o Ignoring the stalker or treating them as a ‘non-person,’ not responding to contact.
o Diminishing opportunities for positive reinforcement, which may be any form of contact, regardless of emotional content (even yelling, cursing at them, etc.).
o These activities include attempts to act as if the problem is nothing, meditating, seeking religious insight, becoming a shut- in, using in substances, or otherwise attempting to deny or mask the threat or stress.
o Engage in denial, distraction, or redefinition.
o Some of these activities may help manage “fear(s) or emotional distress,” however, they are unlikely to deflect the “course of conduct.”
o Activities involve looking for and using assistance.
o This can include informal supports such as anyone in your personal or workplace circle(s), who are bystanders.
o It also includes formal resources such as a professional victims’ advocate, mental health provider, or the criminal justice system or law enforcement (Spitzberg, & Cupach, 2007).
· Date, time, duration, location & specific account of each incident
· Provide a narrative of the incident.
*Be advised, proxy stalker events should be included in the log.
· If a witness is present during the event, document their full name
· Obtain their contact information, email & phone.
*Ask if they are willing to be listed formally in any future reports made to authorities.
You will need to learn some of the legal and psychosocial language to use this log, that is intentional, the goal is to help you get attention for your case, if you chose from appropriate parties.
Types of stalking behaviors, intrusions, or tactics can be found on this page. They are clustered into eight (8) categories (Spitzberg, & Cupach, 2007). Select the one that best describes the event, if there is more than one, add additional behaviors in the comments section.
Your tactical response is how you respond to the stalking behavior, intrusion, or tactic, there is no "correct response". These behaviors have been clustered into five (5) categories, available on this page (Spitzberg, & Cupach, 2007). Select the one that best fits your response to the event, if there was more than one, add it in the comments section.
· When possible, without putting yourself in danger, take pictures or videos, if you have a home or business security system recording, save pictures or videos of any incidents.
· Include date and time to the evidence when possible.
o Include any receipts for repairs from damages or mental health/medical bills, along with pictures.
· Additional types of evidence would include cyber & electronic, such as phone bills, instant messages (IMs), texts, or other screenshots.
o Also include computer repairs bills, or other pictures of, or from, stalkerware or cyberstalking incidents (i.e. air tags, viruses).
· All evidence should be preserved, including times, date, and location, include bills, name of companies involved to repair and pictures (or screenshots) as applicable.
· All interactions and supports should be documented including communication with family, friend(s), coworkers, etc.
· Whether or not you choose to involve professional assistance, all interactions with agency personnel should be documented.
· Logging all interactions, including those with law enforcement, security officers, advocates, mental health staff, medical staff, and others who may have to assist you (such as HR or educational counselors) as your case becomes more complex will help you, particularly if you seek legal action later.
o Logs should include date & time of your interaction, badge # or employee ID, and the outcome or instructions.
· Try to obtain a copy of any report or statements.
· If professionals, formal resources, or agencies are involved such as law enforcement, educational environments, mental health agencies, medical systems, or other organizations, obtain copies of any/all applicable reports.
· Write a narrative to help you remember the incident.
· Logs should include any and all biopsychosocial and socioeconomic impacts on your life, including, but not limited to,
o short- and long-term effects on your life,
§ Such as: Fears, emotional distress, i.e. anxiety (general, or specific), anger, personality changes, mental or physical health diagnoses or treatment &/or costs, sleep disturbance, weight gain or loss, change in eating habits or substance use, change in lifestyle habits, employment or school changes, time off from work, costs such as staying in a hotel, rental car, moving expenses, child care, changing hair style, buying new clothes, computer, or cell phone, repairs, or purchases.
o Other expenses may include court fees, parking fees, damaged property.
· All receipts should be kept, along with any applicable narratives, dates, times, locations, etc.
Some of these boxes only allow one choice, that is also intentional, many professionals want focused "facts" and stalking can be dynamic and complex. Please pick the most appropriate behaviors or items for each section, and add additional information in the comments area. These logs are intended to aid memory and help get attention from authorities or other interested parties, and aid safety planning only using a legal and psychosocial framework based on Maryland's law.
In addition to the other changes we have made, this log includes a section focused on safety planning tips. This can include tips from others, including professionals, social networks, or tips you devise based on changes you notice in behavior.
· Record events as accurately and consistently as possible, keep a notebook handy, or use your cell for when you are out of your home.
The log is available online and works with most mobile devices.
· Make sure to add more narrative when you can, over the years the memories may fade, or may get confabulated.
· Always keep copies available.
· Keep electronic logs in password protected files.
· Keep older records, from previous years or months in lockboxes or if need be in a safety deposit box.
· If you are concerned about electronic records, due to cyberstalking, consider keeping only physical copies of your log.
· Please be advised, if you choose to pursue charges, this document may be entered as evidence, in which case any and all of its contents may be made public.
· Only include facts and relevant ‘feelings’ in the log,
o do not include extraneous information you do not want your stalker, family, friends, law enforcement, the court (i.e. lawyers and judges), or others who may have access to see.
o This may be entered as evidence and become part of the official record.
Make sure you have copies of the evidence printed for others.
· Copies should be organized and easy to access.
· You may need to provide them for a multitude of agencies for their records at a moment’s notice.
· Always bring copies of the log and corroborating evidence to court, have separate copies to give to other agencies.
· Provide copies to trusted members of your circles, i.e. a family member or friend.o Ensure you have conveyed the privacy and security needs with anyone you have shared the records.
· Please be advised, if you choose to pursue charges, this (these) document(s) may be entered as evidence, in which case any and all of its contents may be made public.
· Only include facts and relevant ‘feelings’ in the log,
o do not include extraneous information you do not want your stalker, family, friends, law enforcement, the court (i.e. lawyers and judges), or others who may have access to see.
o This may be entered as evidence and become part of the official record.
Victims often choose not to disclose their stalking, our position is stalking is too often "enabled" by society. To effectively combat this conduct we need community support. However, this requires we speak out. This Neighborhood Stalking Watch works as an alert mechanism, you may need more than one, such as for your workplace, neighborhood, & school. Fill as much or as little as you want, get the support you deserve & protection you need!
"Name" can be left blank, or you may use your full name for the purpose of reporting, you may also choose a pseudonym. Include the name of the street, neighborhood, or building the stalker has been seen &/or should not be. If you have been assigned a detective or other point of contact include their name. Add the number of an active peace/protective order if you have one for any reports.
Include only what you have, that you are sure about, do not guess. Include helpful information for neighbors, friends, family, &/or coworkers to identify this person & report sightings to you &/or authorities. If your stalker is known proxies, please include this. You may include an updated picture if you have one.
Include any known information about the stalker's primary vehicle. If you are able to obtain their license plate number include it in the "features" section. This category can also be used for other distinct identifiers such as decals or sounds. You may include an updated picture if you have one.
Gross, 2012, p. 89
Copyright © 2024 Just Stalking - All Rights Reserved.
Just Stalking: Resources, Inc. is a nonprofit, tax-exempt 501(c)(3) organization (EIN: 93-4264447).
Disclaimer: We are NOT a legal, mental health, medical, victims' advocate provider(s). We are NOT certified educators, financial experts, security specialists, or self-defense experts. While some of our staff may have training, background, or experience in legal, mental health, medical, victims' advocacy, education, financial, security, or self-defense fields pertaining to Maryland, none of our staff is currently, licensed, or certified specialists in the aforementioned fields. WE ARE NOT PROVIDING ADVICE, IN SUCH FIELDS. OUR GOAL IS TO DIRECT VICTIMS TO APPLICABLE PROVIDERS, PROVIDE FEEDBACK BASED ON PERSONAL EXPERIENCES, USING RELEVANT EVIDENCE-BASED RESEARCH & PRACTICES. WE WILL DO OUR BEST TO PROVIDE RESOURCES FOR ALL AFOREMENTIONED TIPS. IF YOU ARE IN DISTRESS PLEASE CALL 911.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.