Cyberstalking is typically defined as the repeated use of electronic means and media to harass, intimidate or threaten someone - an extension of physical stalking into an online world.
"Make no mistake: this kind of harassment can be as frightening
and as real as being followed and watched in your neighborhood or
in your home."
Former USA Vice President Al Gore
For bloggers on the UCT blog spot, the risks are heightened by the ease with which a blogger's email address can be found or predicted given the new standard format.
As bloggers, we have editorial control over the comments posted to our blogs. Should you suspect that you are being cyberstalked through the posting of harassing or threatening comments on your blog, make a note of the IP address from which these comments are posted. Stalking is repeated behaviour, and the stalker's footprints may be visible very clearly. Tracking down the IP will assist with identification and building a case against the stalker. Further tips are posted below.
- Victims who are under the age of 18 should tell their parents or another adult they trust about any harassments and/or threats.
- Experts suggest that in cases where the offender is known, victims should send the stalker a clear written warning. Specifically, victims should communicate that the contact is unwanted, and ask the perpetrator to cease sending communications of any kind. Victims should do this only once. Then, no matter the response, victims should under no circumstances ever communicate with the stalker again. Victims should save copies of this communication in both electronic and hard copy form.
- If the harassment continues, the victim may wish to file a complaint with the stalker's Internet service provider, as well as with their own service provider. Many Internet service providers offer tools that filter or block communications from specific individuals.
- As soon as individuals suspect they are victims of online harassment or cyberstalking, they should start collecting all evidence and document all contact made by the stalker. Save all e-mail, postings, or other communications in both electronic and hard-copy form. If possible, save all of the header information from e-mails and newsgroup postings. Record the dates and times of any contact with the stalker.
- Victims may also want to start a log of each communication explaining the situation in more detail. Victims may want to document how the harassment is affecting their lives and what steps they have taken to stop the harassment.
- Victims may want to file a report with local law enforcement or contact their local prosecutor's office to see what charges, if any, can be pursued. Victims should save copies of police reports and record all contact with law enforcement officials and the prosecutor's office.
- Victims who are being continually harassed may want to consider changing their e-mail address, Internet service provider, a home phone number, and should examine the possibility of using encryption software or privacy protection programs. Any local computer store can offer a variety of protective software, options and suggestions. Victims may also want to learn how to use the filtering capabilities of email programs to block e-mails from certain addresses.
- Furthermore, victims should contact online directory listings such as www.four11.com, www.switchboard.com, and www.whowhere.com to request removal from their directory.
- Finally, under no circumstances should victims agree to meet with the perpetrator face to face to "work it out," or "talk." No contact should ever be made with the stalker. Meeting a stalker in person can be very dangerous.