Stalkers often use technology to assist them in stalking their victims. This section provides information about how different technologies can be used to stalk, measures victims can take to keep safe, and additional information and resources.
Computers and the Internet
If stalkers have access to a victim’s computer, they can track them by looking at the history or websites visited on the computer. Spyware software on computers (sometimes sent through e-mail) can send stalkers a copy of every keystroke made, including passwords, web sites visited, and e-mails sent by victims.
Stalkers can also use the Internet to contact or post things about the victim on message board or discussion forums. They may also verbally attack or threaten victims in chat rooms. Some stalkers will post threatening or personal information about the victim including the victim’s full name and address. Often stalkers will e-mail the victim, or fill their in-box with spam and have been known to send viruses or other harmful programs to victims’ computers.
Telephones and cell phones can be used to threaten or harass. Cell phones also have features that can be used against victims.
Caller ID Spoofing – Changing Caller ID to show any desired number on a recipient’s Caller ID display.
Global Positioning Systems (GPS)
Global Positioning System technology can be used to track or follow victims.
For more information, please visit: The National Center for Victims of Crime