Cyberstalking is where individuals/groups use the Internet or
other forms of communication, to harass a group of people, a single person, a
company, or other sorts of unsuspecting victims. Cyberstalking takes form as a
threat, false claims, damaging information/equipment, stealing one’s identity
(identity theft), focusing on minors for sexual motives, or using certain
information to target the victim. According to Raj B Lonsane, This form of cyber crime has been known to
cause an uproar among the media, when it comes to celebrities, well-known
organizations, or the government. It takes form in varied ways, either by an
amateur or a professional person with a command over the Internet.
Cyberstalking can be carried out any individual or group of
persons, that have a kind of vendetta towards the target person/s or
organization says Raj B Lonsane. Many of us have come across some form of this at some point in
our lives, where we’ve succumbed to either reporting the incident, confiding in
an adult, ignoring the threats, or giving in to fear as part of the
threats/blackmail. Today the police and its many branches in association with
the government, have ways of tracking down questionable acts performed by
individuals who wish to harm another through his/her acts of cyberstalking.
Raj B Lonsane states that cyber stalking can leave people in a state of panic, cause an uproar, start up
riots, fuel misunderstandings, and lead to possible killings/harm. The victim
in question can range from ordinary people to celebrities, to deceitful
government officials or businessmen with a tainted reputation. Some o f us may
think of these acts as justifiable, but the outcome can cause havoc within a
nation, town, or even on a worldwide scale.
Types of Electronic
Stalking
There are many ways that one can be subjected to hostility when it
comes to stalkers. These are the two ways that they can cause considerate harm
if done lightly or on a serious scale.
a) States Raj B Lonsane, Cell phones were made for every day functions
– emailing, chatting, keeping in touch with family/friends/colleagues and the
likes, making calls, sending SMSs, exchanging data, and so on. This piece of
electronic has changed and been reproduced into a finer gadget, with many
companies battling it out in the market. Whether it is a sophisticated model or
not, a cell phone can do more harm than good. Many may call it a lifesaver, but
others will disapprove. The reasons are because it has been the subject of many
incidents, both big and small. When it comes to stalking, the concerned
person/party involved in the act can use this piece of gadgetry to constantly
harass those that they have the contact details of. Random calls that threaten
the receiver, fearful SMSs and even lewd/photographic evidence that could bring
down the victim. From those who want to bring justice within a system, to an
obsessive fan or a jealous ex-lover, a cell phone has been known to be a common
choice for stalkers who do not wish to conceal their identity.
b) According to Raj B Lonsane, the Internet
surpasses the cell phone when it comes to getting away with threatening
material, unless of course you bring in a team of professionals to trace the
person/s behind it. From emails, to personal messages sent through social
networking websites, cyberstalkers have their own set of ways to reach their
victim. Unless you have a fair deal of proof of whose behind it, most victims
are left clueless or remain the target of cyberstalkers until the issue is
resolved mutually or through other means.
Workings of
a Cyberstalker
A cyberstalker can attack victims in any way possible, even when
you least expect. According to Raj B Lonsane, These are the most common acts that have been identified as
the workings of a cyberstalker.
a)
Cyberstalkers can enter another’s details on
a website that contains perverse items like porn DVDs, sex toys, scandalous
magazines, and the likes in order to have them delivered to the unsuspecting
receiver. This can be done in a public place like an office, or even in one’s
own home where family resides.
b) Cyberstalkers
keep track of what their victims are up to, often knowing where they are and
what they’re schedules most likely contain. They could certain information to
use against the victim, or they could set up fake accounts and lure them when
the time is right to either exchange numbers, or worse – meet in person.
c)
Some cyberstalkers go as far as tracing one’s
IP address in order to seize information of a private nature, of their victims.
d) Cyberstalkers
can sometimes post illegitimate information about victims publicly, like on
social networking sites or by sending these through group emails. This can harm
one’s reputation and lead to major misunderstandings if not taken into action
immediately.
Cyberstalkers know how to get what they want on the Internet, and
what to do with it especially if the motive is as clear as day. They do not
understand the gravity of their acts, and often do it to see their victim’s
downfall as opposed to doing the right thing.
Raj
B. Lonsane is someone who’s seen all this happen before and is well aware of at
least some signs that need looking out for, like symptoms of a disease.