This international database can help you identify and contact the owners of sites a cyberstalker is using.
Links Topic: Technical Information Resources
Domain Tools WHOIS Lookup
High Tech Crime Consortium
A professional organization which assists law enforcement and corporate investigators to obtain the knowledge and skills needed to combat high tech crime.
International Association of Computer Investigative Specialists
An international organization composed of law enforcement professionals dedicated to education in the field of forensic computer science.
Interpol: Information Technology Crime
Interpol's Information Technology working groups index.
The Shadowserver Foundation gathers intelligence on the darker side of the internet.
University of Dublin Centre for Cybercrime Investigation
The Center for Cybercrime Investigation is an education and research centre with strong relationships with law enforcement and industry.
Topical Collection: Computer Forensic Tool Testing - National Institute of Justice
This series of special reports presents test assertions, environments, and results on various mobile device acquisition tools and other alternatives.
How to Document Online Harassment on Twitter
Video via Tweet Reports: http://tweetreports.com/
Cyberstalking: Internet Protocol with Tish
A video production by a web-based technology reporter, 14 minutes in length:
Cyberstalkers target 3.4 million Americans each year. These are men, women and children of all ages and races -- who at first probably had no idea that their lives were being secretly watched and catalogued. Their emails intercepted. Their voicemails tapped into and downloaded. Their computer keystrokes recorded.
Then slowly, the eerie reality starts to set in as they begin to sense that even in the privacy of their own homes, they are never alone.
These victims of cyberstalking usually have no clue that in 75% of cases, the person stalking them is someone who was at one point close to them. Maybe even the same person they slept with at night. Perhaps someone they used to love and care for.
According to the National Center for Victims of Crime - Stalking Resource Center in Washington, D.C., most stalking victims never call the police to report the crime. They just silently let their privacy leak through the cracks -- wondering if they are being monitored every step of the way.
Says Michelle Garcia, Director of the Stalking Resource Center, "there's no clear reason as to why cyberstalkers stalk."
"Internet Protocol with Tish" is standing-up for these millions of cyberstalking victims around the world. We want them to know that they do not have to live like this. We also want them to know that there are laws to protect them. Court orders that can force an end to the stalking. Victims' groups that will provide support and counseling as they begin to work through the trauma of having someone they loved -- become the one they fear the most.
Abuse Network Clearinghouse
This site provides victims with a way of identifying the e-mail contact addresses of ISP abuse departments used by their cyberstalker, so the abuse can be reported.
A group dedicated to building a consensus about best practices in the debate surrounding spyware and other potentially unwanted technologies.
E-Evidence Information Center
A resource for information on, and links leading to, computer forensics books, websites and organizations.
I Can Stalk U - How? Geotagging
This site describes how to stop your smart phone or camera from adding this digital location data to each picture, which a stalker can use to locate you.
The Use of Technology to Stalk
Much useful information on all aspects of technology used to stalk, including cyberstalking.