Cyberstalking
Introduction
• Stalking is the act of following a particular person for a long time. Usually, a
stalker follows the following person everywhere and also threatened by
repeatedly calling or sending messages.
• In cyberstalking, the stalking is done by using the internet or electronic media
which involves sending emails and SMSs to that person or victim.
• Cyberstalkers take unfair advantage of the internet to keep them unidentified.
The cyberstalking cases are going on increasing with the widespread internet
boom.
• Cyberstalking is a serious crime and there are few provisions in India to deal
with it.
Cyberstalking
• Cyberstalking is the use of the Internet or other electronic means to stalk or harass
an individual, a group, or an organization.
• It may include false accusations, defamation, slander and libel.
• It may also include monitoring, identity theft, threats, vandalism, or gathering
information that may be used to threaten or harass.
• Cyberstalking is sometimes referred to as Internet stalking, e-stalking or online
stalking.
• Cyberstalking is a crime in which the attacker h arasses a victim using electronic
communication, such as or instant messaging (IM), or messages posted to a Web site
or a discussion group.
• A cyberstalker relies upon the anonymity afforded by the Internet to allow them to
stalk their victim without being detected.
• Cyberstalking messages differ from ordinary spam in that a cyberstalker targets a
specific victim with often threatening messages, while the spammer targets a
multitude of recipients with simply annoying messages.
Types of Cyber Stalking
• Catfishing
• Monitoring location check-ins on social media
• Visiting virtually via Google Maps Street View
• Hijacking webcam
• Installing Stalker ware
• Looking at geotags to track location
Catfishing
• In Catfishing, Stalkers create a fake profile on social media to approach
victims.
• Sometimes they copy the existing user's profile with photos to look it
like a real one.
Monitoring location check-ins on social media
• Stalkers keep an eye on the activities of a victim from their check-ins on
social media such as Facebook and Instagram.
• This is an easier job for a stalker to gauge a victim's behavioural pattern
quite accurately.
Visiting virtually via Google Maps Street View
• If a stalker discovers the victim's address, then it is not
hard to find the area, neighbourhood, and
surroundings by using Street View.
• Tech-savvy stalkers don't need that too. They can
discover the victim's place from the posts or photos
posted on social media.
Hijacking webcam
• Computer's webcam hijacking is one of the most
disgusting methods of cyberstalking to invade the
victim's privacy.
• Stalkers push malware-infected files into the victim's
computer which gives them access to the webcam.
Installing Stalker ware
• One more method which is increasing its popularity is
the use of Stalker ware.
• It is a kind of software or spyware which keeps track
of the location, enable access to text and browsing
history, make an audio recording, etc.
• And an important thing is that it runs in the
background without any knowledge to the victim.
Looking at geotags to track location
• Mostly digital pictures contain geotags which is having
information like the time and location of the picture.
• Geotags comes in the EXIF format embedded into an image
and is readable with the help of special apps.
• In this way, the stalker keeps an eye on the victim and gets
the information about their whereabouts.
How stalking works?
• Personal information gathering about the victim.
• Establish a contact with the victim through telephone/ cell phone. –
start threatening or harassing
• Keep sending repeated messages asking for various kinds of favours
or threaten the victim.
• Post victim’s personal information on any website related to illicit
services.
Cyberstalking Examples
• Electronic messaging such as classic emails, text messages and
Twitter.
• Spamming and/or sending threatening emails to the victim or victim’s
family, friends or co-workers.
• Posting the victim’s personal information such as name, address,
phone numbers, and e-mail address online.
• Posting offensive comments in the victim’s name.
Cyberstalking Examples
• Hacking into the victim’s computer, accounts and mobile devices.
• Unwanted advertising.
• Attaching spyware to emails or installing it on the computer.
• Setting up websites that threaten the victim or encourage others to
contact, harass or harm them.
• Computer Monitoring Software, or “SpyWare,” allows a cyberstalker
to monitor computer and Internet activities and discover a victim’s
efforts to escape or access help. This software can be installed
remotely or by physically accessing the victim’s computer.
Provisions For Cyberstalking In India
• Information Technology Act, 2000 - When a person publishes or sends salacious material via
electronic media is to be charged under Section 67 of the Act.
• Data protection is very important to prevent cyberstalking which is easily leaked by hackers.
For data protection, IT Amendment Act, Section 43A has been included the provision for the
inclusion of a Body Corporate. If a firm or a company transmits sensitive information about a
person, according to the act such body corporate will be liable to pay the damages by
compensation.
• Under Section 67 of the Act, when a stalker sends or posts any obscene content to the victim
via electronic media then they will be liable to punish with 5 years of jail and Rs. 1 Lacs fine. If
the incidence repeats then they will be liable to punish with 10 years of jail and Rs. 2 Lacs fine.
• As per the provision provided in the law, when a stalker misuses victim's personal information
to post an obscene message or comment on any electronic media, then this action is
punishable for defaming and harming a person's reputation with imprisonment of 2 years, fine
or both.
Provisions For Cyberstalking In India
• The criminal law (Amendment) Act, 2013 - According to the act,
Stalking is an offence under Section 354D of the IPC (Indian Penal
Code).
When a man is trying to communicate with a woman without her
interest over the internet via email, instant messages or any other
electronic communication is the offence of stalking.
Cyberstalking Prevention
• By not affirming these dangers are real, people do not have to be concerned or
set boundaries on the information they reveal online.
• Cyberstalkers and iPredators rely on the public not becoming educated on the
necessary steps involved to reduce their potential of becoming their next
target.
• The steps needed for online protection and reasonable security is quite easy
and straightforward.
• Educate yourself and loved ones on iPredator and cyberstalking profiles, set
boundaries on personal information disclosed online, refrain from engaging in
social exchanges with people you do not know, familiarize yourself with local
laws on cyber harassment and always have local law enforcement’s contact
information at hand.