Translate

Sunday, May 1, 2011

When Stalking Goes Online Now You Don't Have to Own a Computer to Be a Victim



Most of us know what stalking is; what we don’t know is how pervasive it is. And with the advent of advanced technology and communications stalking just went cyber:

  • In 2003 a US woman sought protection after claiming that someone had provided her personal information (including her description and location) to men via an online dating service. The victim discovered the identity theft when she was contacted by a man who said they had arranged a casual encounter through the Lavalife.com dating service. Shortly thereafter she was contacted by a second man following chat with 'her' about arranging a separate encounter. She commented "You don't even have to own a computer to be the victim of an Internet crime any more."

  • A 44 year old publishing executive named Claire Miller was harassed by strangers who were responding to verging-on-pornographic promises someone had made in her name online. These postings included her home address and telephone number. 

  • A Glendale businessman stalked his ex-girlfriend using the GPS tracking device on a cell phone. He purchased a Nextel phone device that has a motion switch on it that turns itself on when it moves. As long as the device was on, it transmitted a signal every minute to the GPS satellite, which in turn sent the location information to a computer. The ex planted the phone underneath her car, paid for a service to send him the information and would log on to a website to monitor her location. The victim would suddenly ‘bump’ into him at the coffee shop, LAX, even the cemetery. She knew something was up — it wasn’t hard to realize as he was also phoning her 200 times a day — but police couldn’t help her. It was only when she called police after seeing him under her car that she got action (he was trying to change the cell phone battery). 

  • Amy Lynn Boyer was found by her stalker using online technology. Liam Youens was able to get Boyer’s place of employment and SSN by paying an online investigations agency a mere $154.00. They easily obtained her relevant information from a credit agency report and gave it to Youens. None of the people giving out Boyer’s personal information took responsibility to find out why Youens needed it. This is why: Youens went to Amy Boyer’s workplace, shot and killed her.
These are just some of the few documented cases of cyberstalking, when someone uses technology to maliciously target a specific victim with the intention harass, threat and intimidate.

It’s just like “traditional” stalking, but it's totally anonymous, thanks to the sophisticated technology we rely on everyday.

No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)