{"id":881,"date":"2011-01-03T10:00:20","date_gmt":"2011-01-03T16:00:20","guid":{"rendered":"http:\/\/thepizzy.net\/blog\/?p=881"},"modified":"2016-06-28T10:54:39","modified_gmt":"2016-06-28T15:54:39","slug":"how-to-handle-online-harassment-cyber-stalking","status":"publish","type":"post","link":"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-handle-online-harassment-cyber-stalking\/","title":{"rendered":"How to Handle Online Harassment &#038; Cyber Stalking"},"content":{"rendered":"<p>About 15 years ago, having an email address and\/or an instant messenger screen name meant you were riding the cutting edge of the internet. A couple of years after that, the hot trend was having a MySpace profile. Today, it&#8217;s generally assumed that everyone has at least a Twitter account or a Facebook page.<\/p>\n<p>Over time, and as online services gain more and more\u00c2\u00a0capabilities, a couple of things happen:<\/p>\n<ol>\n<li>We forget about all the old stuff we signed up for, and that information stays out there.<\/li>\n<li>We offer up even more of our personal information simply because the boxes are there for\u00c2\u00a0us.<\/li>\n<li>We open ourselves up to being tracked online and become subjects of data-mining projects because the boxes are <strong>not<\/strong> there to opt-out.<\/li>\n<\/ol>\n<p>Why is this a problem?<\/p>\n<p>If you don&#8217;t know the answer to this question, you probably shouldn&#8217;t\u00c2\u00a0join any social networking sites.<\/p>\n<figure id=\"attachment_882\" aria-describedby=\"caption-attachment-882\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"882\" data-permalink=\"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-handle-online-harassment-cyber-stalking\/stalking-real-life-facebook\/\" data-orig-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/stalking-real-life-facebook.png?fit=500%2C455&amp;ssl=1\" data-orig-size=\"500,455\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"facebook stalking\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Source: endlessorigami.blogspot.com&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/stalking-real-life-facebook.png?fit=300%2C273&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/stalking-real-life-facebook.png?fit=500%2C455&amp;ssl=1\" class=\"wp-image-882 size-full\" title=\"facebook stalking\" src=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/stalking-real-life-facebook.png?resize=500%2C455\" alt=\"Source: endlessorigami.blogspot.com\" width=\"500\" height=\"455\" srcset=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/stalking-real-life-facebook.png?w=500&amp;ssl=1 500w, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/stalking-real-life-facebook.png?resize=300%2C273&amp;ssl=1 300w, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/stalking-real-life-facebook.png?resize=150%2C136&amp;ssl=1 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-882\" class=\"wp-caption-text\">Still don&#8217;t know why it&#8217;s a problem?<\/figcaption><\/figure>\n<p>Nothing done online is 100% anonymous. Not only can the source of the effort to put it online be tracked, but also the person&#8217;s online persona (the account and global online identity of the person), as well as the physical place of the person. Once the information exists on the internet, it is available for search in one way or another, then compiled and categorized. The more information that&#8217;s out there, the more to\u00c2\u00a0gather.<\/p>\n<p>Why is this bad? Simple: cyber-stalkers or cyber-bullies. These acts are cyber-stalking or online harassment.<\/p>\n<blockquote><p><strong>Cyber-stalking<\/strong> is the use of the\u00c2\u00a0<a title=\"Internet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Internet\">Internet<\/a> or other electronic means to\u00c2\u00a0<a title=\"Stalking\" href=\"http:\/\/en.wikipedia.org\/wiki\/Stalking\">stalk<\/a> or harass an individual, a group of people, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, soliciting\u00c2\u00a0minors for sex, or gathering information to harass. \u00c2\u00a0&#8220;Harassment&#8221; must meet the criterion that a\u00c2\u00a0<a title=\"Man on the Clapham Omnibus\" href=\"http:\/\/en.wikipedia.org\/wiki\/Man_on_the_Clapham_Omnibus\">reasonable person<\/a>, with the same information, would regard it as enough to cause another reasonable person distress.<\/p>\n<p style=\"text-align: right;\">Source: <a href=\"http:\/\/en.wikipedia.org\/wiki\/Cyberstalking\" target=\"_blank\">wikipedia<\/a><\/p>\n<\/blockquote>\n<p style=\"text-align: left;\">The rest of this blog series will discuss how to protect your information from this kind of stalking effort, but the rest of this post will tell you what to do if you become a victim of these acts.<\/p>\n<h2>1.) Do NOT react. Period.<\/h2>\n<p>The <strong>very most important<\/strong> thing to remember is that you <strong>must not<\/strong> react. Don&#8217;t respond, don&#8217;t reply, don&#8217;t acknowledge the person at all. The people who get involved in this type of activity do it only to get a reaction out of the person, <a href=\"http:\/\/www.cnn.com\/2011\/OPINION\/01\/21\/pearlman.online.civility\/index.html?hpt=T2\" target=\"_blank\">as shown by this SI.com writer when he got angry tweets about one of his columns and contacted the person<\/a>. Often times they&#8217;ll do it under a fake online alias (whether it&#8217;s a fake human&#8217;s name, or a fake screen name) so that you can&#8217;t tell who it actually is.<\/p>\n<p>If it&#8217;s happening over a SMS, or via your mobile phone, you can use apps like <a href=\"http:\/\/mrnumber.com\/\" target=\"_blank\">Mr. Number<\/a>, <a href=\"https:\/\/www.callersmart.com\/guides\/50\/Cyberstalking-What-Is-Cyberstalking-and-What-to-Do-if-You-re-a-Victim\">CallerSmart<\/a>, or <a href=\"https:\/\/hangouts.google.com\/\">Google Hangouts<\/a> \/ <a href=\"https:\/\/www.google.com\/voice\">Google Voice<\/a> to block the number from contacting you, and possibly report them via the service to help other users of the app.<\/p>\n<p>As upsetting and stressful as the messages like this will be, avoiding a response\u00c2\u00a0is the most important thing to remember.<\/p>\n<h2>2.) It&#8217;s not personal, it&#8217;s serial.<\/h2>\n<p>It is most likely that the person behind the act doesn&#8217;t even know you. Instead they have a preset collection of messages and responses and look for people online that have posted something related to the subject they have created responses for.<\/p>\n<p>In my most recent case, I had someone come after me because my\u00c2\u00a0fianc\u00c3\u00a9e\u00c2\u00a0and I went to dinner at Uno&#8217;s Pizza. Later I found out he sent the same message to someone who&#8217;s girlfriend had a party for him at TGI Fridays. In the real world, we had no connection. Online, we fit the individual&#8217;s serial criteria.<\/p>\n<h2>3.) Take action on the site.<\/h2>\n<p>Chances are, this is all taking place on a public website that you don&#8217;t have control over. If you do have control over it, then you are probably aware of how to block the person. If you&#8217;re not, contact your web host&#8217;s customer service to ask about your options.<\/p>\n<p>Most people who get targeted aren&#8217;t their own web host, I&#8217;ll focus on them: block the person.<\/p>\n<p>My instance described above happened on YouTube. YouTube can\u00c2\u00a0block users from sending you messages, posting on your channel, and making comments on your videos. More extreme measures might also include blocking your Subscriber list, Friends list, or even Channel from public view altogether.<\/p>\n<p>The main thing to remember, no matter what the social site is: make sure you have taken proper measures to prevent this person from contacting you&#8230;and don&#8217;t urge the person by responding or indicating that you even received a message from them.<\/p>\n<h2>4.) If needed, report it to the web service.<\/h2>\n<p>If the person\u00c2\u00a0continues to find ways around the privacy measures available from the web service, then visit the help pages to find out what their policies are on harassment and other unwanted acts.<\/p>\n<p>For me, it took 3 separate reports, and a nasty message via Twitter to finally get results. Among the other things I did in preparation for the last day, I don&#8217;t know if it was the person, or YouTube themselves, but at the end of the day the individual&#8217;s account disappeared\u00c2\u00a0(after being active for several months with several thousand views to it).<\/p>\n<h2>5.) If it continues, report it to the police or FBI.<\/h2>\n<p>If the web service is not taking the proper actions, or if the person is threatening your physical safety by disclosing personal information, making physical threats, or other types of harassment, contact the Police. According to the <a href=\"http:\/\/www.us-cert.gov\/cas\/tips\/ST06-005.html\" target=\"_blank\">US-CERT webpage on dealing with cyber-bullies<\/a> the local police department or FBI branch are good places to start when reporting online harassment. If you are unsure where your local FBI office is, <a href=\"http:\/\/www.fbi.gov\/contact-us\/field\" target=\"_blank\">here is a directory of all their US locations<\/a> that you can search by providing your state or zip.<\/p>\n<h2>Recap&#8230;<\/h2>\n<p>The most important things to remember when someone picks you as a target for their online harassment are:<\/p>\n<ol>\n<li><strong>Do not react<\/strong>: They feed off\u00c2\u00a0the target&#8217;s reactions.<\/li>\n<li><strong>It&#8217;s not personal<\/strong>: Don&#8217;t take anything they say personal. It&#8217;s just stuff they found online, or made up completely.<\/li>\n<li><strong>Block the person<\/strong>: Take any measures necessary to block the person from further contact.<\/li>\n<li><strong>Contact the Website:<\/strong> If the person is making extra effort to get around the blocks you&#8217;ve put in place, contact the website<\/li>\n<li><strong>Contact the Police\/FBI<\/strong>: If the threats are becoming more real, or the harassment does not stop, alert the local\u00c2\u00a0authorities\u00c2\u00a0before it&#8217;s too late.<\/li>\n<\/ol>\n<p>Next up, finding out <a href=\"http:\/\/thepizzy.net\/blog\/2011\/01\/how-to-find-yourself-online\/\">what information is out there about yourself<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>About 15 years ago, having an email address and\/or an instant messenger screen name meant you were riding the cutting edge of the internet. A couple of years after that, the hot trend was having a MySpace profile. Today, it&#8217;s generally assumed that everyone has at least a Twitter account or a Facebook page. Over [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2131,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[506,706,528,3],"tags":[730,718,723,724,733,762,731,712,729,725,726,728,727,200,732],"class_list":["post-881","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","category-privacys-a-joke","category-security-tech","category-tech","tag-bullying","tag-cyber-harassment","tag-cyber-bully","tag-cyberstalking","tag-harassing","tag-how-to-contact-police-for-online-harassment","tag-online-predators","tag-privacy","tag-report-cyber-harassment","tag-report-cyberbullies","tag-report-cyberstalking","tag-report-online-bullying","tag-report-online-harassment","tag-security","tag-stalking"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/griefer.png?fit=720%2C540&ssl=1","jetpack_likes_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/prOO4-ed","jetpack-related-posts":[{"id":858,"url":"https:\/\/thepizzy.net\/blog\/2010\/12\/privacys-a-joke-introduction\/","url_meta":{"origin":881,"position":0},"title":"Introduction to Privacy&#8217;s a Joke","author":"[[Neo]]","date":"December 27, 2010","format":false,"excerpt":"Privacy's a joke. Security is not. After dealing with online harassment for the first time on a third-party site, and with a person whose IP and other information I didn't readily have available as the Administrator of the site, I learned a lot from how they operate to how one\u2026","rel":"","context":"In &quot;Privacy's a Joke&quot;","block_context":{"text":"Privacy's a Joke","link":"https:\/\/thepizzy.net\/blog\/category\/security-tech\/privacys-a-joke\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/dreamstime_4473313hello-my-name-iscropped1-300x203.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1095,"url":"https:\/\/thepizzy.net\/blog\/2011\/02\/using-friend-lists-for-facebook-privacy\/","url_meta":{"origin":881,"position":1},"title":"Using Friend Lists for Facebook Privacy","author":"[[Neo]]","date":"February 7, 2011","format":false,"excerpt":"To achieve a more granular level of privacy on Facebook, you can create Custom Friend Lists and use them in your privacy settings","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":977,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-plug-your-personal-information-leaks\/","url_meta":{"origin":881,"position":2},"title":"How to plug your personal information leaks","author":"[[Neo]]","date":"January 17, 2011","format":false,"excerpt":"If you don't know where your personal information could be leaked, you'll never know where to plug it. Here's some of the common holes.","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/4199131336_63c0e1d1621-225x300.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":933,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-find-yourself-online\/","url_meta":{"origin":881,"position":3},"title":"How to find yourself online","author":"[[Neo]]","date":"January 10, 2011","format":false,"excerpt":"I'm sure at one point or another, everyone has done the \"ego search.\" You go to Google, type in your name, and see what comes up about you. From what I'm told, there's even a fun ranking system based on the number of pages that show up about you. It's\u2026","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/ID-1001605881.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1373,"url":"https:\/\/thepizzy.net\/blog\/2012\/11\/a-face-lift-and-an-update\/","url_meta":{"origin":881,"position":4},"title":"A face-lift and an update","author":"[[Neo]]","date":"November 25, 2012","format":false,"excerpt":"After nearly a year of silence, it is time for an update. Several major tech-related events have gone on in my life, and I'll recap them all here.","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/thepizzy.net\/blog\/category\/tech\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2012\/11\/665770_10100345213052324_1529765953_o.jpg?fit=851%2C315&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2012\/11\/665770_10100345213052324_1529765953_o.jpg?fit=851%2C315&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2012\/11\/665770_10100345213052324_1529765953_o.jpg?fit=851%2C315&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2012\/11\/665770_10100345213052324_1529765953_o.jpg?fit=851%2C315&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1058,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/configuring-your-facebook-application-security-settings\/","url_meta":{"origin":881,"position":5},"title":"Configuring your Facebook Application Security Settings","author":"[[Neo]]","date":"January 25, 2011","format":false,"excerpt":"One of the least-checked settings on Facebook, is the permissions you've given every app\/game\/quiz you've ever used with the site.","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"Facebook Security Logo - Source: allfacebook.com","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/facebook-sec-logo1-116x150.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/comments?post=881"}],"version-history":[{"count":25,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/881\/revisions"}],"predecessor-version":[{"id":889,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/881\/revisions\/889"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/media\/2131"}],"wp:attachment":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/media?parent=881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/categories?post=881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/tags?post=881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}