Mental health experts and law enforcement agree that to some degree there are six stages of stalking. While some stalkers may employ more than one tactic at once, and while these tactics may not be linear, meaning a tactic may be used and then the stalker may revert back to an earlier stage, the essential process is consistent amongst stalkers. It is also important to note that stalkers who are relational in nature (looking for courtship) are likely to engage in more "pleasant" tactics initially, moving later to the unpleasant, whereas if revenge motivated, it will begin with unpleasant tactics and increase in severity as time progresses.
Stalking and Harassment Assessment and Risk Profile (SHARP) is a free online assessment that can provide the overview of the situation and risk including a variety of harms including assaults or secondary victims, persistence, escalations, and life sabotage. SHARP provides, a narrative of the situation, the risk profile, and information about stalking risks and safety suggestions.
*Best used with a professional.*
Why we believe victims shouldn't be required to report fear.
The stalker shows signs of caring and affection, possibly sending/bringing gifts or other "loving" correspondence. In the context of a working relationship, they may be overly flirtatious, helpful, or kind.
The stalker is tracking the victim around known locations, in the context of work, school, or home, this may look different, or can involve all three. Additionally, it should be noted this can involve cyber surveillance and GPS monitoring.
*If you believe you are being surveilled or monitored, consider a PPO.
Stalkers may begin to communicate with their victim, if they do not already have communication. This may involve telephone contact, cyber communication (email, social media), or physical approaches.
*Record all communication in a log.
Stalkers may send "unsettling gifts," such as dead flowers, animals, garbage, or bodily excrement. They may damage property, threaten or injure pets. Additionally, they may threaten the primary victim, or a secondary victim (family, friends, associates, etc.). This is potentially a credible threat of violence, aka a "Red flag," it should be seen as one, until it is determined not to be.
Stalkers may physically assault, sexually assault, kidnap, torture, rape, and even kill their intended victim, or a secondary victim, intentionally or unintentionally. This should be taken seriously. Warning signs are often apparent to witnesses and bystanders. Tell those in your circle to be vigilant.
If the target cannot access the primary victim, they may, as a last resort, turn to those who have been impeding their access; this may include family members, coworkers, and other associates. If any of these individuals requires a PPO, they should consider obtaining one on similar grounds. Do not hesitate to contact first responders, or remove yourself from known locations.
Gross, 2012, p. 79
Copyright © 2024 Just Stalking - All Rights Reserved.
Just Stalking: Resources, Inc. is a nonprofit, tax-exempt 501(c)(3) organization (EIN: 93-4264447).
Disclaimer: We are NOT a legal, mental health, medical, victims' advocate provider(s). We are NOT certified educators, financial experts, security specialists, or self-defense experts. While some of our staff may have training, background, or experience in legal, mental health, medical, victims' advocacy, education, financial, security, or self-defense fields pertaining to Maryland, none of our staff is currently, licensed, or certified specialists in the aforementioned fields. WE ARE NOT PROVIDING ADVICE, IN SUCH FIELDS. OUR GOAL IS TO DIRECT VICTIMS TO APPLICABLE PROVIDERS, PROVIDE FEEDBACK BASED ON PERSONAL EXPERIENCES, USING RELEVANT EVIDENCE-BASED RESEARCH & PRACTICES. WE WILL DO OUR BEST TO PROVIDE RESOURCES FOR ALL AFOREMENTIONED TIPS. IF YOU ARE IN DISTRESS PLEASE CALL 911.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.