HOME

TheInfoList



OR:

Cyberstalking is the use of the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
or other electronic means to stalk or
harass Harassment covers a wide range of behaviors of offensive nature. It is commonly understood as behavior that demeans, humiliates or embarrasses a person, and it is characteristically identified by its unlikelihood in terms of social and moral re ...
an individual, group, or organization. It may include
false accusations A false accusation is a claim or allegation of wrongdoing that is untrue and/or otherwise unsupported by facts. False accusations are also known as groundless accusations or unfounded accusations or false allegations or false claims. They can occur ...
,
defamation Defamation is the act of communicating to a third party false statements about a person, place or thing that results in damage to its reputation. It can be spoken (slander) or written (libel). It constitutes a tort or a crime. The legal defin ...
,
slander Defamation is the act of communicating to a third party false statements about a person, place or thing that results in damage to its reputation. It can be spoken (slander) or written (libel). It constitutes a tort or a crime. The legal defin ...
and
libel Defamation is the act of communicating to a third party false statements about a person, place or thing that results in damage to its reputation. It can be spoken (slander) or written (libel). It constitutes a tort or a crime. The legal defin ...
. It may also include monitoring,
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
, threats,
vandalism Vandalism is the action involving deliberate destruction of or damage to public or private property. The term includes property damage, such as graffiti and defacement directed towards any property without permission of the owner. The term ...
, solicitation for sex,
doxing Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the internet. Historically, the term has been used interchangeably to refer to both the aggregation of this in ...
, or
blackmail Blackmail is an act of coercion using the threat of revealing or publicizing either substantially true or false information about a person or people unless certain demands are met. It is often damaging information, and it may be revealed to fa ...
. Cyberstalking is often accompanied by realtime or offline stalking. In many jurisdictions, such as California, both are criminal offenses. Both are motivated by a desire to control, intimidate or influence a victim. A stalker may be an online stranger or a person whom the target knows. They may be anonymous and solicit involvement of other people online who do not even know the target. Cyberstalking is a criminal offense under various state anti-stalking,
slander Defamation is the act of communicating to a third party false statements about a person, place or thing that results in damage to its reputation. It can be spoken (slander) or written (libel). It constitutes a tort or a crime. The legal defin ...
and
harassment Harassment covers a wide range of behaviors of offensive nature. It is commonly understood as behavior that demeans, humiliates or embarrasses a person, and it is characteristically identified by its unlikelihood in terms of social and moral r ...
laws. A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail.


Definitions and description

There have been a number of attempts by experts and legislators to define cyberstalking. It is generally understood to be the use of the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
or other electronic means to stalk or
harass Harassment covers a wide range of behaviors of offensive nature. It is commonly understood as behavior that demeans, humiliates or embarrasses a person, and it is characteristically identified by its unlikelihood in terms of social and moral re ...
an individual, a group, or an organization. Cyberstalking is a form of
cyberbullying Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital ...
; the terms are often used interchangeably in the media. Both may include
false accusations A false accusation is a claim or allegation of wrongdoing that is untrue and/or otherwise unsupported by facts. False accusations are also known as groundless accusations or unfounded accusations or false allegations or false claims. They can occur ...
,
defamation Defamation is the act of communicating to a third party false statements about a person, place or thing that results in damage to its reputation. It can be spoken (slander) or written (libel). It constitutes a tort or a crime. The legal defin ...
,
slander Defamation is the act of communicating to a third party false statements about a person, place or thing that results in damage to its reputation. It can be spoken (slander) or written (libel). It constitutes a tort or a crime. The legal defin ...
and
libel Defamation is the act of communicating to a third party false statements about a person, place or thing that results in damage to its reputation. It can be spoken (slander) or written (libel). It constitutes a tort or a crime. The legal defin ...
. Cyberstalking may also include monitoring,
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten or harass. Cyberstalking is often accompanied by real-time or offline stalking. Both forms of stalking may be criminal offenses. Stalking is a continuous process, consisting of a series of actions, each of which may be entirely legal in itself. Technology ethics professor Lambèr Royakkers defines cyberstalking as perpetrated by someone without a current relationship with the victim. About the abusive effects of cyberstalking, he writes that:
talkingis a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect).


Distinguishing cyberstalking from other acts

There is a distinction between cyber-trolling and cyber-stalking. Research has shown that actions that can be perceived to be harmless as a one-off can be considered to be trolling, whereas if it is part of a persistent campaign then it can be considered stalking. Cyberstalking author Alexis Moore separates cyberstalking from identity theft, which is financially motivated. Her definition, which was also used by the
Republic of the Philippines The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no), * bik, Republika kan Filipinas * ceb, Republika sa Pilipinas * cbk, República de Filipinas * hil, Republ ...
in their legal description, is as follows:


Identification and detection

CyberAngels has written about how to identify cyberstalking:
When identifying cyberstalking "in the field," and particularly when considering whether to report it to any kind of legal authority, the following features or combination of features can be considered to characterize a true stalking situation: malice, premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop,
harassment Harassment covers a wide range of behaviors of offensive nature. It is commonly understood as behavior that demeans, humiliates or embarrasses a person, and it is characteristically identified by its unlikelihood in terms of social and moral r ...
and
threats A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation for co ...
.
A number of key factors have been identified in cyberstalking: *
False accusations A false accusation is a claim or allegation of wrongdoing that is untrue and/or otherwise unsupported by facts. False accusations are also known as groundless accusations or unfounded accusations or false allegations or false claims. They can occur ...
: Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms, or other sites that allow public contributions such as Wikipedia or
Amazon.com Amazon.com, Inc. ( ) is an American multinational technology company focusing on e-commerce, cloud computing, online advertising, digital streaming, and artificial intelligence. It has been referred to as "one of the most influential economi ...
. * Attempts to gather information about the victim: Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective. * Monitoring their target's online activities and attempting to trace their
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
in an effort to gather more information about their victims. * Encouraging others to harass the victim: Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit. *
False victimization Victim blaming occurs when the victim of a crime or any wrongful act is held entirely or partially at fault for the harm that befell them. There is historical and current prejudice against the victims of domestic violence and sex crimes, such as t ...
: The cyberstalker will claim that the victim is harassing him or her. Bocij writes that this phenomenon has been noted in a number of well-known cases. * Attacks on data and equipment: They may try to damage the victim's computer by sending
viruses A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Since Dmitri Ivanovsky's ...
. * Ordering goods and services: They order items or subscribe to magazines in the victim's name. These often involve subscriptions to
pornography Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults,
or ordering sex toys then having them delivered to the victim's workplace. * Arranging to meet: Young people face a particularly high risk of having cyberstalkers try to set up meetings between them. * The posting of defamatory or derogatory statements: Using web pages and message boards to incite some response or reaction from their victim.


Prevalence and impact

According to ''Law Enforcement Technology'', cyberstalking has increased with the growth of new technology and new ways to stalk victims. "Disgruntled employees pose as their bosses to post explicit messages on social network sites; spouses use GPS to track their mates' every move. Even police and prosecutors find themselves at risk, as gang members and other organized criminals find out where they live — often to intimidate them into dropping a case." In January 2009, the
Bureau of Justice Statistics The Bureau of Justice Statistics (BJS) of the U.S. Department of Justice is the principal federal agency responsible for measuring crime, criminal victimization, criminal offenders, victims of crime, correlates of crime, and the operation of cri ...
in the United States released the study "Stalking Victimization in the United States," which was sponsored by the Office on Violence Against Women. The report, based on supplemental data from the
National Crime Victimization Survey The National Crime Victimization Survey (NCVS), administered by the US Census Bureau under the Department of Commerce, is a national survey of approximately 49,000 to 150,000 households - with approximately 240,000 persons aged 12 or older - twice ...
, showed that one in four stalking victims had been cyberstalked as well, with the perpetrators using internet-based services such as email, instant messaging, GPS, or spyware. The final report stated that approximately 1.2 million victims had stalkers who used technology to find them. The Rape, Abuse and Incest National Network (RAINN), in
Washington D.C. ) , image_skyline = , image_caption = Clockwise from top left: the Washington Monument and Lincoln Memorial on the National Mall, United States Capitol, Logan Circle, Jefferson Memorial, White House, Adams Morgan, N ...
has released statistics that there are 3.4 million stalking victims each year in the United States. Of those, one in four reported experiencing cyberstalking. According to Robin M. Kowalski, a social psychologist at
Clemson University Clemson University () is a public land-grant research university in Clemson, South Carolina. Founded in 1889, Clemson is the second-largest university in the student population in South Carolina. For the fall 2019 semester, the university enro ...
, cyberbullying has been shown to cause higher levels of anxiety and depression for victims than normal bullying. Kowalksi states that much of this stems from the anonymity of the perpetrators, which is a common feature of cyberstalking as well. According to a study by Kowalksi, of 3,700 bullied middle-school students, a quarter had been subjected to a form of online harassment.


Types


Stalking by strangers

According to Joey Rushing, a District Attorney of
Franklin County, Alabama Franklin County is a county located in the U.S. state of Alabama. As of the 2020 census, the population was 32,113. Its county seat is Russellville. Its name is in honor of Benjamin Franklin, famous statesman, scientist, and printer. It is ...
, there is no single definition of a cyberstalker - they can be either strangers to the victim or have a former/present relationship. " yberstalkerscome in all shapes, sizes, ages and backgrounds. They patrol Web sites looking for an opportunity to take advantage of people."


Gender-based stalking

Harassment and stalking because of gender online, also known as online gender-based violence, is common, and can include rape threats and other threats of violence, as well as the posting of the victim's personal information. It is blamed for limiting victims' activities online or driving them offline entirely, thereby impeding their participation in online life and undermining their autonomy, dignity, identity, and opportunities.


Of intimate partners

Cyberstalking of intimate partners is the online harassment of a current or former romantic partner. It is a form of
domestic violence Domestic violence (also known as domestic abuse or family violence) is violence or other abuse that occurs in a domestic setting, such as in a marriage or cohabitation. ''Domestic violence'' is often used as a synonym for ''intimate partner v ...
, and experts say its purpose is to control the victim in order to encourage social isolation and create dependency. Harassers may send repeated insulting or threatening e-mails to their victims, monitor or disrupt their victims' e-mail use, and use the victim's account to send e-mails to others posing as the victim or to purchase goods or services the victim does not want. They may also use the Internet to research and compile personal information about the victim, to use in order to harass him or her.


Of celebrities and public persons

Profiling of stalkers shows that almost always they stalk someone they know or, via
delusion A delusion is a false fixed belief that is not amenable to change in light of conflicting evidence. As a pathology, it is distinct from a belief based on false or incomplete information, confabulation, dogma, illusion, hallucination, or some ...
, think they know, as is the case with stalkers of
celebrities Celebrity is a condition of fame and broad public recognition of a person or group as a result of the attention given to them by mass media. An individual may attain a celebrity status from having great wealth, their participation in sports ...
or public persons in which the stalkers feel they know the celebrity even though the celebrity does not know them. As part of the risk they take for being in the public eye, celebrities and public figures are often targets of lies or made-up stories in tabloids as well as by stalkers, some even seeming to be fans. In one noted case in 2011, actress
Patricia Arquette Patricia Tiffany Arquette (born April 8, 1968) is an American actress. She made her feature film debut as Kristen Parker in '' A Nightmare on Elm Street 3: Dream Warriors'' (1987). Her other notable films include ''True Romance'' (1993), ''Ed W ...
quit
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin Mosk ...
after alleged cyberstalking. In her last post, Arquette explained that her security warned her Facebook friends to never accept friend requests from people they do not actually know. Arquette stressed that just because people seemed to be fans did not mean they were safe. The media issued a statement that Arquette planned to communicate with fans exclusively through her
Twitter Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, an ...
account in the future.


By anonymous online mobs

Web 2.0 Web 2.0 (also known as participative (or participatory) web and social web) refers to websites that emphasize user-generated content, ease of use, participatory culture and interoperability (i.e., compatibility with other products, systems, and ...
technologies have enabled online groups of anonymous people to self-organize to target individuals with online defamation, threats of violence and technology-based attacks. These include publishing lies and doctored photographs, threats of rape and other violence, posting sensitive personal information about victims, e-mailing damaging statements about victims to their employers, and manipulating search engines to make damaging material about the victim more prominent. Victims frequently respond by adopting pseudonyms or going offline entirely. Experts attribute the destructive nature of anonymous online mobs to
group dynamics Group dynamics is a system of behaviors and psychological processes occurring within a social group (''intra''group dynamics), or between social groups ( ''inter''group dynamics). The study of group dynamics can be useful in understanding decision- ...
, saying that groups with homogeneous views tend to become more extreme. As members reinforce each others' beliefs, they fail to see themselves as individuals and lose a sense of personal responsibility for their destructive acts. In doing so they dehumanize their victims, becoming more aggressive when they believe they are supported by authority figures. Internet service providers and website owners are sometimes blamed for not speaking out against this type of harassment. A notable example of online mob harassment was the experience of American
software developer Software development is the process of conceiving, specifying, designing, programming, documenting, testing, and bug fixing involved in creating and maintaining applications, frameworks, or other software components. Software development invo ...
and blogger Kathy Sierra. In 2007 a group of anonymous individuals attacked Sierra, threatening her with rape and strangulation, publishing her home address and
Social Security Welfare, or commonly social welfare, is a type of government support intended to ensure that members of a society can meet basic human needs such as food and shelter. Social security may either be synonymous with welfare, or refer specifical ...
number, and posting doctored photographs of her. Frightened, Sierra cancelled her speaking engagements and shut down her blog, writing "I will never feel the same. I will never be the same."


Corporate cyberstalking

Corporate cyberstalking is when a company harasses an individual online, or an individual or group of individuals harasses an organization. Motives for corporate cyberstalking are ideological, or include a desire for financial gain or revenge.


Perpetrators


Motives and profile

Mental profiling of digital criminals has identified psychological and social factors that motivate stalkers as:
envy Envy is an emotion which occurs when a person lacks another's quality, skill, achievement, or possession and either desires it or wishes that the other lacked it. Aristotle defined envy as pain at the sight of another's good fortune, stirred ...
; pathological obsession (professional or sexual); unemployment or failure with own job or life; intention to intimidate and cause others to feel inferior; the stalker is delusional and believes he/she "knows" the target; the stalker wants to instill fear in a person to justify his/her status; belief they can get away with it (anonymity); intimidation for financial advantage or business competition; revenge over perceived or imagined rejection. ;Four types of cyberstalkers Preliminary work by Leroy McFarlane and Paul Bocij has identified four types of cyberstalkers: the vindictive cyberstalkers noted for the ferocity of their attacks; the composed cyberstalker whose motive is to annoy; the intimate cyberstalker who attempts to form a relationship with the victim but turns on them if rebuffed; and collective cyberstalkers, groups with a motive. According to Antonio Chacón Medina, author of ''Una nueva cara de Internet, El acoso'' ("A new face of the Internet: stalking"), the general profile of the harasser is cold, with little or no respect for others. The stalker is a predator who can wait patiently until vulnerable victims appear, such as women or children, or may enjoy pursuing a particular person, whether personally familiar to them or unknown. The harasser enjoys and demonstrates their power to pursue and psychologically damage the victim.


Behaviors

Cyberstalkers find their victims by using
search engine A search engine is a software system designed to carry out web searches. They search the World Wide Web in a systematic way for particular information specified in a textual web search query. The search results are generally presented in a ...
s, online forums, bulletin and discussion boards,
chat room The term chat room, or chatroom (and sometimes group chat; abbreviated as GC), is primarily used to describe any form of synchronous conferencing, occasionally even asynchronous conferencing. The term can thus mean any technology, ranging from r ...
s, and more recently, through
social networking A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. The social network perspective provides a set of methods for an ...
sites, such as MySpace,
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin Mosk ...
,
Bebo Bebo ( ) was an American social networking website that originally operated from 2005 until its bankruptcy in 2013 and relaunched in February 2021. The site relaunched several times after its bankruptcy with a number of short-lived offerings, ...
,
Friendster Friendster was a social network game based in Mountain View, California, founded by Jonathan Abrams and launched in March 2003.Eric Eldon, August 4, 2008.Friendster raises $20 million, nabs a Googler to be CEO VentureBeat. Retrieved December 4, ...
,
Twitter Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, an ...
, and
Indymedia The Independent Media Center, better known as Indymedia, is an open publishing network of activist journalist collectives that report on political and social issues. Following beginnings during the 1999 Carnival Against Capital and 1999 Seatt ...
, a media outlet known for self-publishing. They may engage in live chat harassment or flaming or they may send electronic viruses and unsolicited e-mails. Cyberstalkers may research individuals to feed their obsessions and curiosity. Conversely, the acts of cyberstalkers may become more intense, such as repeatedly instant messaging their targets. More commonly they will post defamatory or derogatory statements about their stalking target on web pages, message boards, and in guest books designed to get a reaction or response from their victim, thereby initiating contact. In some cases, they have been known to create
fake blog A fake blog (sometimes shortened to flog or referred to as a flack blog) is an electronic communication in the blog format that appears to originate from a credible, non-biased and independent source, but which in fact is created by a company or ...
s in the name of the victim containing defamatory or pornographic content. When prosecuted, many stalkers have unsuccessfully attempted to justify their behavior based on their use of public forums, as opposed to direct contact. Once they get a reaction from the victim, they will typically attempt to track or follow the victim's internet activity. Classic cyberstalking behavior includes the tracing of the victim's
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
in an attempt to verify their home or place of employment. Some cyberstalking situations do evolve into physical stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault. Moreover, many physical stalkers will use cyberstalking as another method of harassing their victims. A 2007 study led by Paige Padgett from the
University of Texas The University of Texas at Austin (UT Austin, UT, or Texas) is a public research university in Austin, Texas. It was founded in 1883 and is the oldest institution in the University of Texas System. With 40,916 undergraduate students, 11,075 ...
Health Science Center found that there was a false degree of safety assumed by women looking for love online.


Cyberstalking legislation

Legislation on cyberstalking varies from country to country. Cyberstalking and cyberbullying are relatively new phenomena, but that does not mean that crimes committed through the network are not punishable under legislation drafted for that purpose. Although there are often existing laws that prohibit stalking or harassment in a general sense, legislators sometimes believe that such laws are inadequate or do not go far enough, and thus bring forward new legislation to address this perceived shortcoming. The point overlooked is that enforcing these laws can be a challenge in these virtual communities. The reason being, these issues are very unique to law enforcement agencies who have never faced cases related to cyberstalking. In the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territo ...
, for example, nearly every state has laws that address cyberstalking, cyberbullying, or both. In countries such as the US, in practice, there is little legislative difference between the concepts of "cyberbullying" and "cyberstalking." The primary distinction is one of age; if adults are involved, the act is usually termed '' cyberstalking,'' while among children it is usually referred to as ''
cyberbullying Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital ...
.'' However, as there have not been any formal definitions of the terms, this distinction is one of semantics and many laws treat ''bullying'' and ''stalking'' as much the same issue.


Australia

In Australia, the Stalking Amendment Act (1999) includes the use of any form of technology to harass a target as forms of "criminal stalking."


Canada

In 2012, there was a high-profile investigation into the death of Amanda Todd, a young Canadian student who had been blackmailed and stalked online before committing suicide. The
Royal Canadian Mounted Police The Royal Canadian Mounted Police (RCMP; french: Gendarmerie royale du Canada; french: GRC, label=none), commonly known in English as the Mounties (and colloquially in French as ) is the federal and national police service of Canada. As poli ...
were criticized in the media for not naming one of her alleged stalkers as a person of interest.


Philippines

In the Fifteenth Congress of the
Republic of the Philippines The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no), * bik, Republika kan Filipinas * ceb, Republika sa Pilipinas * cbk, República de Filipinas * hil, Republ ...
, a cyberstalking bill was introduced by Senator
Manny Villar Manuel "Manny" Bamba Villar Jr. (; born December 13, 1949) is a Filipino billionaire businessman and former politician. He previously served as senator from 2001 to 2013 and as the President of the Senate of the Philippines from 2006 to 2008. ...
. The result was to "urge the Senate Committees on Science and Technology, and Public Information and Mass Media to conduct an inquiry, in aid of legislation, on the increasing occurrence of cyber stalking cases and the modus operandi adopted in the internet to perpetuate crimes with the end in view of formulating legislation and policy measures geared towards curbing cyber stalking and other cyber crimes and protect online users in the country."


United States


History, current legislation

Cyberstalking is a
criminal offense In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in Ca ...
under American anti-stalking,
slander Defamation is the act of communicating to a third party false statements about a person, place or thing that results in damage to its reputation. It can be spoken (slander) or written (libel). It constitutes a tort or a crime. The legal defin ...
, and
harassment Harassment covers a wide range of behaviors of offensive nature. It is commonly understood as behavior that demeans, humiliates or embarrasses a person, and it is characteristically identified by its unlikelihood in terms of social and moral r ...
laws. A conviction can result in a
restraining order A restraining order or protective order, is an order used by a court to protect a person in a situation involving alleged domestic violence, child abuse, assault, harassment, stalking, or sexual assault. Restraining and personal protection o ...
,
probation Probation in criminal law is a period of supervision over an offender, ordered by the court often in lieu of incarceration. In some jurisdictions, the term ''probation'' applies only to community sentences (alternatives to incarceration), such ...
, or criminal penalties against the assailant, including jail. Cyberstalking specifically has been addressed in recent U.S. federal law. For example, the
Violence Against Women Act The Violence Against Women Act of 1994 (VAWA) is a United States federal law (Title IV of the Violent Crime Control and Law Enforcement Act, ) signed by President Bill Clinton on September 13, 1994. The Act provided $1.6 billion toward investig ...
, passed in 2000, made cyberstalking a part of the federal interstate stalking statute. The current US Federal Anti-Cyber-Stalking law is found at . Still, there remains a lack of federal legislation to specifically address cyberstalking, leaving the majority of legislative at the state level. A few states have both stalking and harassment statutes that criminalize threatening and unwanted electronic communications. The first anti-stalking law was enacted in California in 1990, and while all fifty states soon passed anti-stalking laws, by 2009 only 14 of them had laws specifically addressing "high-tech stalking." The first U.S. cyberstalking law went into effect in 1999 in California. Other states have laws other than harassment or anti-stalking statutes that prohibit misuse of computer communications and e-mail, while others have passed laws containing broad language that can be interpreted to include cyberstalking behaviors, such as in their harassment or stalking legislation. Sentences can range from 18 months in prison and a $10,000 fine for a fourth-degree charge to ten years in prison and a $150,000 fine for a second-degree charge. ; States with cyberstalking legislation *
Alabama (We dare defend our rights) , anthem = " Alabama" , image_map = Alabama in United States.svg , seat = Montgomery , LargestCity = Huntsville , LargestCounty = Baldwin County , LargestMetro = Greater Birmingham , area_total_km2 = 135,7 ...
, Arizona, Connecticut,
Hawaii Hawaii ( ; haw, Hawaii or ) is a U.S. state, state in the Western United States, Western United States, located in the Pacific Ocean about from the U.S. mainland. It is the only U.S. state outside North America, the only state that is ...
,
Illinois Illinois ( ) is a state in the Midwestern United States. Its largest metropolitan areas include the Chicago metropolitan area, and the Metro East section, of Greater St. Louis. Other smaller metropolitan areas include, Peoria and Rockfo ...
,
New Hampshire New Hampshire is a state in the New England region of the northeastern United States. It is bordered by Massachusetts to the south, Vermont to the west, Maine and the Gulf of Maine to the east, and the Canadian province of Quebec to the north. ...
, and
New York New York most commonly refers to: * New York City, the most populous city in the United States, located in the state of New York * New York (state), a state in the northeastern United States New York may also refer to: Film and television * ...
have included prohibitions against harassing electronic, computer or e-mail communications in their harassment legislation. *
Alaska Alaska ( ; russian: Аляска, Alyaska; ale, Alax̂sxax̂; ; ems, Alas'kaaq; Yup'ik: ''Alaskaq''; tli, Anáaski) is a state located in the Western United States on the northwest extremity of North America. A semi-exclave of the U.S., ...
,
Florida Florida is a state located in the Southeastern region of the United States. Florida is bordered to the west by the Gulf of Mexico, to the northwest by Alabama, to the north by Georgia, to the east by the Bahamas and Atlantic Ocean, and to th ...
,
Oklahoma Oklahoma (; Choctaw: ; chr, ᎣᎧᎳᎰᎹ, ''Okalahoma'' ) is a state in the South Central region of the United States, bordered by Texas on the south and west, Kansas on the north, Missouri on the northeast, Arkansas on the east, New M ...
, Wyoming, and California, have incorporated electronically communicated statements as conduct constituting stalking in their anti-stalking laws. *
Texas Texas (, ; Spanish: ''Texas'', ''Tejas'') is a state in the South Central region of the United States. At 268,596 square miles (695,662 km2), and with more than 29.1 million residents in 2020, it is the second-largest U.S. state by b ...
enacted the ''Stalking by Electronic Communications Act'', 2001. *
Missouri Missouri is a U.S. state, state in the Midwestern United States, Midwestern region of the United States. Ranking List of U.S. states and territories by area, 21st in land area, it is bordered by eight states (tied for the most with Tennessee ...
revised its state harassment statutes to include stalking and harassment by telephone and electronic communications (as well as
cyber-bullying Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital ...
) after the Megan Meier suicide case of 2006. In one of the few cases where a cyberstalking conviction was obtained the cyberstalker was a woman, which is also much rarer that male cyberstalkers. The conviction was overturned in on appeal in 2009 however. * In
Florida Florida is a state located in the Southeastern region of the United States. Florida is bordered to the west by the Gulf of Mexico, to the northwest by Alabama, to the north by Georgia, to the east by the Bahamas and Atlantic Ocean, and to th ...
, HB 479 was introduced in 2003 to ban cyberstalking. This was signed into law on October 2003.


Age, legal limitations

While some laws only address online harassment of children, there are laws that protect adult cyberstalking victims. While some sites specialize in laws that protect victims age 18 and under, current and pending cyberstalking-related United States federal and state laws offer help to victims of all ages. Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim's immediate family; and still others require the alleged stalker's course of conduct constitute an implied threat. While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously. Online identity stealth blurs the line on infringement of the rights of would-be victims to identify their perpetrators. There is a debate on how internet use can be traced without infringing on protected civil liberties.


Specific cases

There have been a number of high-profile legal cases in the United States related to cyberstalking, many of which have involved the suicides of young students. In thousands of other cases, charges either were not brought for the cyber harassment or were unsuccessful in obtaining convictions. As in all legal instances, much depends on public sympathy towards the victim, the quality of legal representation and other factors that can greatly influence the outcome of the crime – even if it will be considered a crime. In the case of a fourteen-year-old student in Michigan, for instance, she pressed charges against her alleged rapist, which resulted in her being cyberstalked and cyberbullied by fellow students. After her suicide in 2010 all charges were dropped against the man who allegedly raped her, on the basis that the only witness was dead. This is the despite the fact that statutory rape charges could have been pressed. In another case of cyberstalking, college student Dharun Ravi secretly filmed his roommate's sexual liaison with another man, then posted it online. After the victim committed suicide, Ravi was convicted in of bias intimidation and invasion of privacy in '' New Jersey v. Dharun Ravi''. In 2012 he was sentenced to 30 days in jail, more than $11,000 in restitution and three years of probation. The judge ruled that he believes Ravi acted out of "colossal insensitivity, not hatred."


Europe

* Poland – Stalking, including cyberstalking, was made a criminal offence under the Polish Criminal Code on 6 June 2011. * Spain – In Spain, it is possible to provide information about cyber-crime in an anonymous way to four safety bodies: Grupo de Delitos Telemáticos of the
Civil Guard (Spain) The Civil Guard ( es, Guardia Civil, link=no; ) is the oldest law enforcement agency in Spain and is one of two national police forces. As a national gendarmerie force, it is military in nature and is responsible for civil policing under the au ...
, Brigada de Investigación Tecnológica of the
National Police Corps of Spain The National Police Corps ( es, Cuerpo Nacional de Policía, link=no, CNP; ; also known simply as National Police, ) is the national civilian police force of Spain. The CNP is mainly responsible for policing urban areas, whilst rural policing ...
,
Mossos d'Esquadra The ''Mossos d'Esquadra'' (; en, Squad), also known as the ''Policia de la Generalitat de Catalunya'' and informally as ''Mossos'', is the autonomous police force responsible for law enforcement in Spanish autonomous community of Catalonia ...
in Catalonia, and Ertzaintza in
Euskadi The Basque Country (; eu, Euskadi ; es, País Vasco ), also called Basque Autonomous Community ( eu, Euskal Autonomia Erkidegoa, links=no, EAE; es, Comunidad Autónoma del País Vasco, links=no, CAPV), is an autonomous community of Spain. It ...
. It is also possible to provide information to a
non-governmental organization A non-governmental organization (NGO) or non-governmental organisation (see spelling differences) is an organization that generally is formed independent from government. They are typically nonprofit entities, and many of them are active in h ...
. * United Kingdom – In the
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Europe, off the north-western coast of the continental mainland. It comprises England, Scotland, Wales and Nor ...
, the
Protection from Harassment Act 1997 The Protection from Harassment Act 1997 (c 40) is an Act of the Parliament of the United Kingdom. On introducing the Bill's second reading in the House of Lords, the Lord Chancellor, Lord Mackay of Clashfern, said, "The aim of this Bill is to ...
contains an offence of stalking covering cyber-stalking, which was introduced into the act through the
Protection of Freedoms Act 2012 The Protection of Freedoms Act 2012 is an Act of the Parliament of the United Kingdom. As the Protection of Freedoms Bill, it was introduced in February 2011, by the Home Secretary, Theresa May. The bill was sponsored by the Home Office. On Tuesd ...
.


See also

*
Computer crime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing the ...
* Convention on cybercrime *
Cyberbullying Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital ...
*
Cyberspace Cyberspace is a concept describing a widespread interconnected digital technology. "The expression dates back from the first decade of the diffusion of the internet. It refers to the online world as a world 'apart', as distinct from everyday rea ...
*
Cyberterrorism Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, la ...
*
DecorMyEyes Vitaly Borker (born 1975 or 1976 in the former Soviet Union), known by pseudonyms "Tony Russo", "Stanley Bolds" and "Becky S", is an American convicted felon who has twice served federal prison sentences for charges arising from how he ran his on ...
* Harassment by computer *
Hate group A hate group is a social group that advocates and practices hatred, hostility, or violence towards members of a race, ethnicity, nation, religion, gender, gender identity, sexual orientation, or any other designated sector of society. Accordin ...
*
Internet fraud Internet fraud is a type of cybercrime fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. Inte ...
*
Online dating Online dating, also known as Internet dating, Virtual dating, or Mobile app dating, is a relatively recent method used by people with a goal of searching for and interacting with potential romantic or sexual partners, via the internet. An onlin ...
*
Online predator Online predators are individuals who commit child sexual abuse that begins or takes place on the Internet. Conceptions Internet-facilitated crimes against minors involve deceit and begin with adults communicating with children over the Internet ...
*
Stalking Stalking is unwanted and/or repeated surveillance by an individual or group toward another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them. The term ...
* The Psycho Ex-Wife * ToS violation


References


Further reading

* Bocij, Paul (2004). ''Cyberstalking: Harassment in the Internet Age and how to Protect Your Family''. Greenwood Publishing Group. * Ellison, Louise; Akdeniz, Yaman
"Cyber-stalking: the Regulation of Harassment on the Internet"
''Criminal Law Review''. December 1998 Special Edition: Crime, Criminal Justice and the Internet. pp. 29–48. * Meloy, J. (2000). ''The Psychology of Stalking.'' Reid. Academic Press. * Mullen, Paul E.; Pathé, Michele; Purcell, Rosemary (2000). ''Stalkers and Their Victims''. Cambridge University Press. * Hitchcock, J.A. (2006). ''Net Crimes & Misdemeanors: Outmaneuvering the Spammers, Swindlers, and Stalkers Who Are Targeting You Online''. CyberAge Books. * *
Cyberstalking – Is it Covered by Current Anti-Stalking Laws?
by Craig Lee and Patrick Lynch


External links


Privacy Rights Clearinghouse
; Academic and government studies
United States Law and the Internet: Georgia State University College of Law
(2001) * * , Minnesota Center Against Violence and Abuse (2002) * ''United States Department of Justice'' (August 1999).

by ''Cyber Crime Journal'' ; Blogs, stories
Surviving the Extinct Marsuplial
'' ic' An ongoing blog by several victims of a single stalker documenting his activities
Cautionary tale of online romance and revenge
FBI The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, t ...
(2013) {{Privacy Stalking Cybercrime Internet terminology