This international database can help you identify and contact the owners of sites a cyberstalker is using.
Links Topic: Safety and Privacy Resources
- strict warning: Non-static method view::load() should not be called statically in /home/cybersta/public_html/sites/all/modules/views/views.module on line 906.
- strict warning: Declaration of views_handler_filter::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /home/cybersta/public_html/sites/all/modules/views/handlers/views_handler_filter.inc on line 607.
- strict warning: Declaration of views_handler_filter::options_submit() should be compatible with views_handler::options_submit($form, &$form_state) in /home/cybersta/public_html/sites/all/modules/views/handlers/views_handler_filter.inc on line 607.
- strict warning: Declaration of views_handler_filter_boolean_operator::value_validate() should be compatible with views_handler_filter::value_validate($form, &$form_state) in /home/cybersta/public_html/sites/all/modules/views/handlers/views_handler_filter_boolean_operator.inc on line 159.
- strict warning: Declaration of views_handler_filter_term_node_tid::value_validate() should be compatible with views_handler_filter::value_validate($form, &$form_state) in /home/cybersta/public_html/sites/all/modules/views/modules/taxonomy/views_handler_filter_term_node_tid.inc on line 302.
- strict warning: Declaration of views_plugin_row::options_validate() should be compatible with views_plugin::options_validate(&$form, &$form_state) in /home/cybersta/public_html/sites/all/modules/views/plugins/views_plugin_row.inc on line 134.
- strict warning: Declaration of views_plugin_row::options_submit() should be compatible with views_plugin::options_submit(&$form, &$form_state) in /home/cybersta/public_html/sites/all/modules/views/plugins/views_plugin_row.inc on line 134.
Domain Tools WHOIS Lookup
The Shadowserver Foundation gathers intelligence on the darker side of the internet.
Introductory information on what spyware is, how it works, what it can do, and how to safeguard against it.
Australian Anti-Stalking and Bullying Website
A general information site on stalking, including cyberstalking and electronic harassment, for Australian citizens.
La cyberintimidation et le cyberharcèlement
Basic information for victims of cyberstalking or electroinic harassment. In French only.
Privacy and Cybercrime Institute
The Privacy Institute, located in Ryerson University, research privacy and cyber crime issues.
Stalking is a Crime: What to do if you are being stalked or criminally harassed
This brochure contains information that is intended to help keep you safe from stalking.
Centre for Cyber Victim Counselling
The Centre provides information, advocacy and emotional support for victims of cyberstalking in this country.
Domestic Abuse, Stalking and Honour Based Violence (DASH 2009) Risk Identification, Assessment and Management Model
A recently developed risk assessment tool for law enforcement and social service agencies.
Internet Watch Foundation
A reporting and advocacy service, which provides information to the government on issues surrounding abuse on the Internet.
Network for Surviving Stalking
NSS represents UK stalking victims and their families, including victims of cyberstalking.
Suzy Lamplugh Trust
The Trust raises awareness of the importance of personal safety and to help people to avoid violence and aggression and live safer, more confident lives.
Women's Aid Federation
Women's Aid provides education, general support information and services to victims of stalking in the UK, including those who are being cyberstalked.
Freedom from Fear Magazine: Internet Issue
A publication produced in conjunction with the United Nations Interregional Crime and Justice Research Institute, this online magazine issue contains many articles of interest and use to the public, to victims and to professionals.
State Cyberstalking, Cyberharassment and Cyberbullying Laws, National Conference of State Legislatures
Many states have enacted "cyberstalking" or "cyberharassment" laws or have laws that explicitly include electronic forms of communication within more traditional stalking or harassment laws. In addition, recent concerns about protecting minors from online bullying or harassment have led states to enact "cyberbullying" laws. This chart identifies only state laws that include specific references to electronic communication. However, other state laws may still apply to those who harass, threaten or bully others online, although specific language may make the laws easier to enforce. This chart classifies the various state laws addressing these three different types of online behaviors, as described below.
How to Document Online Harassment on Twitter
Video via Tweet Reports: http://tweetreports.com/
Cyberstalking: Internet Protocol with Tish
A video production by a web-based technology reporter, 14 minutes in length:
Cyberstalkers target 3.4 million Americans each year. These are men, women and children of all ages and races -- who at first probably had no idea that their lives were being secretly watched and catalogued. Their emails intercepted. Their voicemails tapped into and downloaded. Their computer keystrokes recorded.
Then slowly, the eerie reality starts to set in as they begin to sense that even in the privacy of their own homes, they are never alone.
These victims of cyberstalking usually have no clue that in 75% of cases, the person stalking them is someone who was at one point close to them. Maybe even the same person they slept with at night. Perhaps someone they used to love and care for.
According to the National Center for Victims of Crime - Stalking Resource Center in Washington, D.C., most stalking victims never call the police to report the crime. They just silently let their privacy leak through the cracks -- wondering if they are being monitored every step of the way.
Says Michelle Garcia, Director of the Stalking Resource Center, "there's no clear reason as to why cyberstalkers stalk."
"Internet Protocol with Tish" is standing-up for these millions of cyberstalking victims around the world. We want them to know that they do not have to live like this. We also want them to know that there are laws to protect them. Court orders that can force an end to the stalking. Victims' groups that will provide support and counseling as they begin to work through the trauma of having someone they loved -- become the one they fear the most.
12 Tips To Protect Yourself From Cyberstalking
Twelve tips that can prevent you from becoming a victim of cyberstalking.
Abuse Network Clearinghouse
This site provides victims with a way of identifying the e-mail contact addresses of ISP abuse departments used by their cyberstalker, so the abuse can be reported.
A group dedicated to building a consensus about best practices in the debate surrounding spyware and other potentially unwanted technologies.
Cell Phone Spying: Is Your Life Being Monitored?
Information on cell phone safety and privacy protection, including an overview of how your cell phone can be used to stalk you.
Cyberbullying / Stalking & Harassment - Wired Patrol
Wired Patrol's Cyberbullying / Stalking and Harassment page provides victims of cyberstalking with education and safety information, background information on what cyberstalking is and how to recognize it, as well as a reporting service.
Domestic Violence and Privacy: Electronic Privacy Information Center
Information on technological privacy, privacy laws or projects which EPIC advocates for, and information on how to ensure your privacy if in a domestic violence situation.
This relatively new organization seeks to provide victims with basic information on cyberstalking.
This site is designed to help ensure that Internet users have safe online experiences.
I Can Stalk U - How? Geotagging
This site describes how to stop your smart phone or camera from adding this digital location data to each picture, which a stalker can use to locate you.
Microsoft Online Safety and Privacy Education
Safety and computer security information from Microsoft, including notices of recent security updates for Windows systems
National Center for Victims of Crime Stalking Resource Center
The Center provides information and advocacy on victims of stalking, including cyberstalking, and makes referrals to appropriate social service agencies.
National Cyber Security Alliance
Their mission is to educate society to use the Internet safely and securely at home, work, and school.
National Network to End Domestic Violence: Technological Safety
This project creates resources to help victims and agencies respond effectively to the many ways that technology impacts victims of domestic violence sexual violence and stalking.
Network Abuse Clearinghouse Contact Database
If you are receiving harassing e-mail, you can use the Abuse Contact Database to get the e-mail contact address of the abuser's Internet service, so you can register a complaint with them.
Privacy Rights Clearinghouse: Online Privacy: Using the Internet Safely
Privacy and safety information from one of the leading US resources on privacy issues.
Take Back the Tech
Take Back The Tech! calls for everyone to take control of technology to end violence against women.
Technology Safety Planning with Survivors
Technological information which victims of stalking and domestic violence should be aware of.
The Use of Technology to Stalk
Much useful information on all aspects of technology used to stalk, including cyberstalking.
What is cyberstalking?
A series of articles on About.com by a well-known author and cyberstalking victim advocate. An excellent overview and introduction to the subject.
Who’s Watching You?—Spyware and Stalkers
An introduction to the use of spyware to cyberstalk, from the US National Center on Victims of Crime Stalking Resource Center.
Working to Halt Online Abuse
WHOA seeks to fight online harassment through education of the general public, education of law enforcement personnel, and empowerment of victims.