Cyber Stalking

Overt

  • Direct contact via any “cyber” source such as Instant Messaging; E­Mail; Blogs; Online communities such as MySpace, FaceBook, Yahoo! Groups

  • Fraudulent subscriptions to mailing lists

  • Indirect postings, articles, messages to third parties or general “bulletins” about the victim in online communities, blogs, or other places the victim may frequent or be alerted to

Covert

  • Gathering information via Instant Messaging profiles and away messages to learn habits, locations, phone numbers, e­mail addresses, other friends' information

  • Gathering information via online communities and blogs to better understand the victim dramatically increasing terror effectiveness

  • Conducting electronic surveillance by use of “spyware” or interception of network traffic (especially wireless)