In a recent study, Logan (2019) found that stalking-by-proxy occurred in about one third of ex-partner and non-partner victims, regardless of gender. Stalking-by-proxy, is the involvement by the stalker of another person(s), organization(s), agencies, or entities, in their stalking, to contact or track their victim (Mullen, et al. 2009). While not all other parties require encouragement, and may act independently, at times, these parties may inadvertently or unwillingly manipulate, or unwittingly coerce accomplices. The revictimization of stalking victims by-proxy can be viewed as minimalizations (Mullen, et al., 2009). Hypervigilance can cause victims to erroneously believe that this new stalking exists, however there is no data on frequency.
To best protect oneself against stalking-by-proxy, one should include those in your circle in PPOs (i.e. family and friends) and inform others of the PPO to allow them to be vigilant. Share the PPO; do not keep it secret. Be open with others, inform others of the stalking, as well as take pictures, and report all violations!
Hefner, et al., 2021, 1383
A well-known form of stalking-by-proxy is the utilization of a PI. While historically thought of as expensive, Gross (2012) notes that in the Scheffer case a PI cost only $250, internet services have opened the door for more user-friendly services. Still, traditional services are likely to be too expensive for most stalkers, ranging up to thousands of dollars, to monitor the movements or track-down the whereabouts of a victim (Mullen, et al., 2009). However, many services are now available through cyber methods for limited fees.
The more common forms of intrusions/harassment are often simpler than one would expect, with unwitting accomplices' participation. Victims may fall prey to disconnection of their utilities, or late or overdue deliveries, or subscriptions of inappropriate material, all difficult to remedy (Mullen, et al., 2009).
The stalker may enlist their friends or family to participate in their surveillance, monitoring, or phone-call contacts, among other intrusions (Mullen, et al., 2009).
Professionals need to maintain confidentiality, regarding their patients, particularly those in DV/IPV situations. Mental health professionals should not be encouraging or allowing contact. Anyone working with a victim should not contact the stalker, and vice versa. If you are experiencing such a situation, it is important that you inform all staff members that your information is to be kept confidential, such as your phone number, address, work-location.
Religious institutions may be hesitant to feel they are "taking sides." It is important for PPOs to clearly articulate places the victim regularly attends, including religious institutions. Advise leaders in your institution, provide them with a copy of the PPO and a picture, if necessary, report any and all violations.
These are a great resource for stalkers! They can visit the victim's residence or speak with a realtor who may then unwittingly disclose critical personal information, including the victim's new address (Mullen, et al, 2009).
Stalkers can rent or borrow cars to disguise their presence, their occupation may even provide them with access to a vehicle. This can cause high level of anxiety for every strange car for the victim, not knowing who to expect. Stalkers may even obtain specialized license plates to taunt their victim (Mullen, et al., 2009).
Media contributes to the phenomenon of stalking in a number of ways according to Mullen, et al. (2009). Some argue that the stalkerazzi, constitute stalking in their own right. According to Gross, (2012) there had been as many attacks on public figures since 1968 as there had been in the preceding 175yrs. Additionally, the over-exposure of personal lives of celebrities creating pseudo-intimacy can create fantasy relationships.
Not only do we now have cyberstalking to contend with, we have cybersecurity to manage. Unfortunately, living in a social-media age, many people post information about their personal lives, private data is plentiful, sometimes for nominal or no fee, which allows stalkers to access information and utilize it by well-intentioned victims.
Even after a victim has moved or changed jobs, stalkers can utilize the court system by initiating criminal or civil charges or complaints against the victim to facilitate a court order by police officers and obtaining their new contact information (Mullen, et al., 2009).
The most common way a stalker employs the legal system is through a phenomenon known as "role-reversal," this is when the stalker claims to be the victim (this can be accounted for by delusions) (Mullen, et al., 2009). This manipulation is an attempt to create confusion and delays within the legal system, as well as further victimization. These instances can lead to "mutual peace orders."
The court specifically is guilty of this, though it cannot be helped in many circumstances, in the USA, accused (stalker) have a right to confront their accuser (victim). This occurs often during the hearings for PPOs as well as other trials. However, stalkers may also try to utilize their lawyers to contact victims, circumventing PPOs (Mullen, et al., 2009). They may bring civil cases against victims. Additionally, there is anecdotal evidence that stalkers represent themselves during criminal trials with victims, no data has been found on frequency, this may be another intrusion tactic.
Gross, 2012, p. 216
Hefner, et al., 2021, 1385
Copyright © 2024 Just Stalking - All Rights Reserved.
Just Stalking: Resources, Inc. is a nonprofit, tax-exempt 501(c)(3) organization (EIN: 93-4264447).
Disclaimer: We are NOT a legal, mental health, medical, victims' advocate provider(s). We are NOT certified educators, financial experts, security specialists, or self-defense experts. While some of our staff may have training, background, or experience in legal, mental health, medical, victims' advocacy, education, financial, security, or self-defense fields pertaining to Maryland, none of our staff is currently, licensed, or certified specialists in the aforementioned fields. WE ARE NOT PROVIDING ADVICE, IN SUCH FIELDS. OUR GOAL IS TO DIRECT VICTIMS TO APPLICABLE PROVIDERS, PROVIDE FEEDBACK BASED ON PERSONAL EXPERIENCES, USING RELEVANT EVIDENCE-BASED RESEARCH & PRACTICES. WE WILL DO OUR BEST TO PROVIDE RESOURCES FOR ALL AFOREMENTIONED TIPS. IF YOU ARE IN DISTRESS PLEASE CALL 911.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.