Saturday 18 August 2012

Cyberstalking


Cyberstalking is where individuals/groups use the Internet or other forms of communication, to harass a group of people, a single person, a company, or other sorts of unsuspecting victims. Cyberstalking takes form as a threat, false claims, damaging information/equipment, stealing one’s identity (identity theft), focusing on minors for sexual motives, or using certain information to target the victim. According to Raj B Lonsane, This form of cyber crime has been known to cause an uproar among the media, when it comes to celebrities, well-known organizations, or the government. It takes form in varied ways, either by an amateur or a professional person with a command over the Internet.

Cyberstalking can be carried out any individual or group of persons, that have a kind of vendetta towards the target person/s or organization says Raj B Lonsane. Many of us have come across some form of this at some point in our lives, where we’ve succumbed to either reporting the incident, confiding in an adult, ignoring the threats, or giving in to fear as part of the threats/blackmail. Today the police and its many branches in association with the government, have ways of tracking down questionable acts performed by individuals who wish to harm another through his/her acts of cyberstalking.

Raj B Lonsane states that cyber stalking can leave people in a state of panic, cause an uproar, start up riots, fuel misunderstandings, and lead to possible killings/harm. The victim in question can range from ordinary people to celebrities, to deceitful government officials or businessmen with a tainted reputation. Some o f us may think of these acts as justifiable, but the outcome can cause havoc within a nation, town, or even on a worldwide scale.

Types of Electronic Stalking

There are many ways that one can be subjected to hostility when it comes to stalkers. These are the two ways that they can cause considerate harm if done lightly or on a serious scale.

a)     States Raj B Lonsane, Cell phones were made for every day functions – emailing, chatting, keeping in touch with family/friends/colleagues and the likes, making calls, sending SMSs, exchanging data, and so on. This piece of electronic has changed and been reproduced into a finer gadget, with many companies battling it out in the market. Whether it is a sophisticated model or not, a cell phone can do more harm than good. Many may call it a lifesaver, but others will disapprove. The reasons are because it has been the subject of many incidents, both big and small. When it comes to stalking, the concerned person/party involved in the act can use this piece of gadgetry to constantly harass those that they have the contact details of. Random calls that threaten the receiver, fearful SMSs and even lewd/photographic evidence that could bring down the victim. From those who want to bring justice within a system, to an obsessive fan or a jealous ex-lover, a cell phone has been known to be a common choice for stalkers who do not wish to conceal their identity.

b)    According to Raj B Lonsane, the Internet surpasses the cell phone when it comes to getting away with threatening material, unless of course you bring in a team of professionals to trace the person/s behind it. From emails, to personal messages sent through social networking websites, cyberstalkers have their own set of ways to reach their victim. Unless you have a fair deal of proof of whose behind it, most victims are left clueless or remain the target of cyberstalkers until the issue is resolved mutually or through other means.

Workings of a Cyberstalker

A cyberstalker can attack victims in any way possible, even when you least expect. According to Raj B Lonsane, These are the most common acts that have been identified as the workings of a cyberstalker.

a)        Cyberstalkers can enter another’s details on a website that contains perverse items like porn DVDs, sex toys, scandalous magazines, and the likes in order to have them delivered to the unsuspecting receiver. This can be done in a public place like an office, or even in one’s own home where family resides.

b)       Cyberstalkers keep track of what their victims are up to, often knowing where they are and what they’re schedules most likely contain. They could certain information to use against the victim, or they could set up fake accounts and lure them when the time is right to either exchange numbers, or worse – meet in person.

c)        Some cyberstalkers go as far as tracing one’s IP address in order to seize information of a private nature, of their victims.

d)       Cyberstalkers can sometimes post illegitimate information about victims publicly, like on social networking sites or by sending these through group emails. This can harm one’s reputation and lead to major misunderstandings if not taken into action immediately.

Cyberstalkers know how to get what they want on the Internet, and what to do with it especially if the motive is as clear as day. They do not understand the gravity of their acts, and often do it to see their victim’s downfall as opposed to doing the right thing.

Raj B. Lonsane is someone who’s seen all this happen before and is well aware of at least some signs that need looking out for, like symptoms of a disease.