What is Cyberstalking and How to Prevent it?

What is Cyberstalking and How to Prevent it?

7 mins read21.1K Views 3 Comments
Anshuman
Anshuman Singh
Senior Executive - Content
Updated on Mar 27, 2024 11:45 IST

In today’s online world, it is easy to become a victim of Cyberstalking. Many experts view it as a vital crime, and today we will go into detail about Cyberstalking and how to avoid it entirely.

2022_06_What-is-Cyberstalking-how-to-prevent-it.jpg

What is Cyberstalking?

Cyberstalking is a crime committed when someone uses the internet and other technologies to harass or stalk another person online. Even though cyberstalking is a broad term for online harassment, it can include defamation, false accusations, teasing, and even extreme threats. Often these connections will not end even though the receiver requests the person to stop. The content addressed at the target is frequently improper and, at times, disturbing, leaving the individual beginning to feel fear.

2022_06_cyber-2.jpg

In this article, we will discuss Cyberstalking in great depth, but before doing that, let’s go over the topics we’ll be covering in this blog:

Recommended online courses

Best-suited Cyber Security courses for you

Learn Cyber Security with these high-rated online courses

1.5 L
3 years
2.5 L
2 years
1.95 L
2 years
1.12 L
6 months
1.85 L
6 months
60 K
6 months

Types of Cyberstalking 

The three most common types of cyber stalking are as follows:

Email stalking: This type of stalking involves the sender sending hateful, obscene, or threatening emails to the recipient. Sometimes the attacker may also include viruses and spam in the email.

You can also explore- What is Email Spoofing & how to prevent it?

Internet stalking: This type of stalking occurs when an individual spreads rumors or tracks victims on the internet. The goal of spreading rumors is to slander the victim.

Computer stalking: This type of stalking occurs when an individual hacks into a victim’s computer and takes control of it. This requires advanced computer skills; however, one can find guidelines on the web.

Examples of Cyberstalking

Some of the common examples of cyberstalking are:

  • Making rude, offensive, or suggestive online comments
  • Joining the same groups and forums to follow the target online
  • Sending the target threatening, controlling, or lewd messages or emails
  • Making a fake social media profile to follow the victim
  • Gaining access to the victim’s online accounts
  • Posting or disseminating real or fictitious photos of the victim
  • Attempting to obtain explicit photographs of the victim
  • Tracking the victim’s online movements using tracking devices
  • Mailing explicit photos of themselves to the victim on a regular basis, etc.

You can also explore- What is a Phishing attack?

Some of the real-life cases related to cyberstalking in India:

  • Khanna received a string of e-mails from a man who asked her to pose naked for him or pay him Rs 1 lakh in a clear case of cyber stalking. The woman stated that she began receiving these emails in the third week of November 2003. The accused threatened Khanna by posting her morphed images on sex websites alongside her contact details. She initially ignored the emails, but she soon began receiving letters in the mail that repeated the same threat. She felt compelled to notify the cybercrime unit of the incident.
  • The Rajkot cyber crime police arrested two men in separate cases on February 3, 2022, for alleged cyberstalking of teenage girls by morphing their pictures on social media.

Consequences of Cyberstalking

Cyberstalking is similar to stalking in that it has negative consequences for victims, both physically and mentally. Cyberstalking can have a wide variety of physical and emotional consequences for all who are attacked. Victims report various severe consequences of victimization, including increased suicidal ideation, fear, anger, depression, and PTSD symptomatology.

How to prevent Cyberstalking?

To prevent yourself from being the victim of cyberstalking, you should follow these habits:

Hide your IP address: Numerous apps and services display your IP address to the person you are interacting with. It might seem not very meaningful, but it is directly related to your personal information. Your IP address, for example, is linked to your internet bill, delivered to your home, and you pay for that using a credit card. Cyberstalkers can use your IP address to find your credit card information and physical address.

Adjust privacy settings: One of the first steps you can take to adjust your privacy settings. Most social media networks and other online accounts allow you to control who can see and contact you.

You can also explore- What is safe browsing & how to turn it on?

Avoid disclosing sensitive information: Unexpectedly, many people share personal information about themselves when filling out questionnaires or applying for coupons. This increases the possibility of someone obtaining your personal information and possibly making cyberstalking more accessible.

Update your software: When it comes to preventing information leaks, regular software updates are critical. Developers keep on updating and creating new updates to address security flaws and ensure the safety of your data.

Maintain a low profile: It can be difficult for some people to maintain a low profile online. But you should always refrain from posting personal information such as your phone number and address, and think twice before disclosing real-time information about where you are and who you’re with.

2022_06_PREVE-3.jpg

How to deal with Cyberstalking?

Send a clear written message to the cyberstalker indicating that you do not want to be contacted by them. Do not interact with the stalker after receiving a warning. If the harassment continues, contact the police. Call a family member or friend for assistance if you believe you are being tracked by spyware.

Check your devices for spyware or indications of compromised accounts, and change all passwords. Block the person from your social media accounts using privacy settings, and report the abuse to the network. Even if the attacker does not back down, call the police.

Difference between Cyberstalking and Cyberbullying

Cyberstalking occurs when a victim is harassed online via electronic channels, text messaging, social networking sites, discussion forums, and so on for retaliation, anger, or control. A stalker could be a stranger or a friend of the victim. When adults are involved, it is referred to as cyberstalking.

Cyberbullying occurs when a child or a teenager is mistreated, disrespected, tormented, intimidated, humiliated, or aimed at by another individual of the same age range via the internet.

Laws in India against Cyberstalking

The following laws are available in India to deal with cyberstalking:

  • Section 67 of the Information Technology Act of 2000: Penalises stalkers who send or cause to be sent or published obscene posts or content on electronic media with up to three years in prison and a fine.
  • Section 67A of the Information Technology Act of 2000: Penalises anyone who sends or causes to be sent or published in electronic media any material containing sexually explicit acts or conduct. Up to five years in prison and a fine of up to five lakh rupees are the penalties.
  • Section 354D of the Indian Penal Code, 1860: Under this section, if a person monitors a woman’s use of the internet, email, or any other form of electronic communication, that person may face up to 3 years in prison as well as a fine. This is a bailable offense for first-time offenders but not for repeat offenders.

If a woman is a victim of cyberstalking, she can file a complaint with any cybercrime unit, regardless of where the incident occurred. Cyber cells are being established to address the grievances of female victims.

You can also explore- What is Cyber Law?

Frequently asked questions (FAQ)

Que1. What types of crimes are involved in cyberstalking?
Ans1.
Threats, libel, defamation, sexual harassment, and other actions to control, influence, or intimidate their target are all examples of cyberstalking.

Que2. Who is most vulnerable to cyberstalking?
Ans2.
Females between the ages of 18 and 30 are the most likely victims of cyberstalking.

Que3. What causes cyberstalking?
Ans3.
Cyberstalking happens because of a variety of factors such as vengeance, anger, control, or even lust.

Que4. What should you do if someone is harassing you online?
Ans4.
Report the cyber-harassment or cyberstalking to the police district where your business and home are located, including all documentation.

Que5. What are some possible cyberstalking countermeasures?
Ans5.
There are numerous possible countermeasures, including:

  • Keeping your IP address hidden
  • Changing your privacy settings
  • Avoiding the disclosure of sensitive information
  • Upgrade your software
  • Keeping a low profile, and so on.
Top Trending Tech Articles:
Career Opportunities after BTech Online Python Compiler What is Coding Queue Data Structure Top Programming Language Trending DevOps Tools Highest Paid IT Jobs Most In Demand IT Skills Networking Interview Questions Features of Java Basic Linux Commands Amazon Interview Questions

Recently completed any professional course/certification from the market? Tell us what liked or disliked in the course for more curated content.

Click here to submit its review with Shiksha Online.

FAQs

What types of crimes are involved in cyberstalking?

Threats, libel, defamation, sexual harassment, and other actions to control, influence, or intimidate their target are all examples of cyberstalking.

Who is most vulnerable to cyberstalking?

Females between the ages of 18 and 30 are the most likely victims of cyberstalking.

What causes cyberstalking?

Cyberstalking happens because of a variety of factors such as vengeance, anger, control, or even lust.

What should you do if someone is harassing you online?

Report the cyber-harassment or cyberstalking to the police district where your business and home are located, including all documentation.

What are some possible cyberstalking countermeasures?

There are numerous possible countermeasures, including: Keeping your IP address hidden Changing your privacy settings Avoiding the disclosure of sensitive information Upgrade your software Keeping a low profile, and so on.

About the Author
author-image
Anshuman Singh
Senior Executive - Content

Anshuman Singh is an accomplished content writer with over three years of experience specializing in cybersecurity, cloud computing, networking, and software testing. Known for his clear, concise, and informative wr... Read Full Bio

Comments

(3)

E=MAIL ME ON (hack4net8@ gmail.com) WE RECOVER YOUR LOST CRYPTO BY SCAMMERS , WE HACK WHATSAPP AND ALL SOCIAL MEDIA HACKING ALL TYPES OF PHONE , ZERO SCAMS , MONEY BACK GUARANTEE ?? ALOT OF FAKE HACKES HERE--WE OFFER ALL HACKING ?? I GIVE PROOF ON JOBS I WORK FIRST ON MY PROFILE TO SHOW IM LEGIT

Reply to Danny Rose