Stalking & Digital Abuse
Stalking is a pattern (two or more instances) of repeated, unwanted, and intrusive behavior directed at an individual, which causes them to feel fear, distress, or anxiety. It involves behaviors that intimidate, harass, or threaten someone, often without their consent. Stalking can occur in various forms, including physical following, online harassment, and unwanted communication.
Stalkers use a variety of tactics, including (but not limited to):
- Frequent following or spying on the person in public or private spaces.
- Unsolicited communication, such as repeated phone calls, texts, emails, or social media messages.
- Sending unwanted gifts or showing up at the person’s home, work, or other places they frequent.
- Monitoring the person’s activities through digital means, like tracking their online behavior or using technology to monitor their location.
- Threatening messages or actions designed to create fear.
- Damaging personal property
- Obtaining personal information about the victim by accessing public records and searching online, hiring private investigators, going through the victim’s garbage, or contacting the victim’s family and peers
The use of technology for stalking
Technology has significantly changed the dynamics of stalking, making it easier for perpetrators to engage in harmful behaviors and for victims to feel constantly monitored. Here are some key ways technology affects stalking:
Social media, emails, and text messages are commonly used for stalking. Perpetrators can send repeated, unwanted messages, comments, or posts, often creating fear or emotional distress for the victim. It’s also easier for stalkers to monitor a person’s activities or social circles through their online presence.
Advances in GPS technology and smartphones allow stalkers to track a victim’s location in real time. This could involve using apps to track movements or installing spyware on a victim’s device to monitor their whereabouts without consent.
This form of stalking takes place entirely online and includes behaviors like impersonation, spreading false information, and using technology to harass or intimidate the victim. It can also involve hacking into social media accounts or emails, gaining unauthorized access to personal information, and using it to cause harm.
This involves the malicious act of publicly sharing private information such as home addresses, phone numbers, and personal details without consent, often to intimidate or harm the person being targeted.
Stalkers can use hidden cameras, microphones, or other devices to monitor their victim’s home or workplace. These technologies allow for continuous, covert surveillance that can be difficult to detect.
Some perpetrators may use legitimate apps or software tools designed for monitoring family members (such as “find my phone” apps) for malicious purposes. These apps can be used to track phone activity, social media accounts, or even read messages and emails.
The internet allows stalkers to remain anonymous or use fake identities, which makes it harder for victims to identify or confront them. This anonymity often emboldens perpetrators to escalate their behavior.
Additional Resources:
- Learn more about technology safety – and find resources on stalking – from TechSafety.org
- Learn more about stalking from the Stalking Resource Center – including a guide on How to Start & Facilitate a Support Group for Victims of Stalking
- Download the Tech Safety App to your mobile device to access tech safety tips, resources, and information on the go
- https://www.stalkingawareness.org/