Digital Foot Prints and Tracking
|The Internet allows cyber stalkers to follow and harass victims anonymously from anywhere in the world. Finding and tracking a cyber stalker is often difficult, especially if the person leaves few clues behind. If the cyber stalker repeatedly tries to talk to you or make his presence known, however, you can sometimes gather enough information to put an end to his behavior.Look for a Similar Name or Typing Style In the online world, discerning anyone’s true identity is a difficult task. The impersonal nature of the Internet allows people to become anyone they want to be. Even so, most people retain a similar typing style when they communicate with others online. Examine your cyber stalker’s messages, if she sends you any. Notice whether they are riddled with typos and errors, or if she has perfect grammar. Look for words misspelled a certain ways. The cyber stalker may also use a specific alias or screen name whenever she contacts you. Study all of your emails, social networking pages and the forums where you post to help you learn how the cyber stalker is stalking you.
Keep Records of Contact Not all cyber stalkers make themselves known to you, but many cannot resist trying to contact you in some way. If you receive strange or threatening emails, do not delete them. Save the emails, and copy the contents to a secure offline location. If the stalker tries to contact you through a forum, Facebook, Twitter or any other website, copy every word he types. This serves as proof of the cyber stalker’s harassment. If the cyber stalker becomes threatening or dangerous, law enforcement officers may request this information. Law enforcement can also sometimes track stalkers via their IP address. Many stalkers, however, know how to change or hide their IP address to prevent this.
If someone is cyberstalking you it is important that you save the evidence. Saving evidence means printing out harassing emails (along with the full email header). taking screen shots of all harassing emails. printing out harassing instant messages and private messages. taking screen shots of harassing instant messages and private messages. saving harassing text messages (don’t delete them). note dates and times of all harassment on paper. keep all harassing and threatening letters and make copies of the letters. keep all harassing and threatening voice-mail messages and phone numbers (don’t delete them). saving harassing messages or defamatory messages about you on social networking sites (e.g., Twitter, Facebook, etc.) printing harassing messages or defamatory messages about you on social networking sites (e.g., Twitter, Facebook, etc.) taking screen shots of all harassing messages or defamatory messages about you on social networking sites. Make sure to report abuse to the site administrator: Write down the profile URL of cyberstalker, bookmark profile page, save and print messages.