The cyberstalker might impersonate the victim and post inflammatory messages to bulletin boards or in chat rooms, causing viewers of that message to send threatening messages back to the victim who they believe sent them the offending messages.Each message -- whether from the actual cyberstalker or others -- will have the intended effect on the victim, but the cyberstalker's effort is minimal.I’ve encountered very few men who have a problem with this.
More complex forms of harassment include mail bombs, sending the target a devastating virus, or spamming the target with electronic junk mail.Cyberstalking shares important characteristics with offline stalking.A cyberstalker can also cause a lot of havoc in a chat group through flooding a target's Internet chat channel to disrupt conversation.A cyberstalker can also post messages in newsgroups to start malicious rumors.Am I being unfair with this expectation of not giving my phone number out and preferring to spend weeks on online chatter? If you’ve ever wondered why you struggle with men, it’s quite likely because you’ve never given much value to HIS circle in the Venn Diagram.
I actually do like this gentleman, which is unusual for me. I figure this is as good a time as any to float a pretty non-controversial theory of how to be successful in dating. Okay, so you know what a Venn Diagram looks like, right? I always ask for the man’s phone number, and offer to call him.
In addition, most law enforcement agencies have not had the training to recognize the serious nature of cyberstalking, or on how to investigate these offenses.
Unfortunately, some yet-to-be-enlightened officers have recommended to victims that they either turn off their computers, or that they call law enforcement again if the cyberstalkers confront or threaten them offline, in person. One of the most common forms of harassment is unsolicited hate mail, or obscene or threatening e-mail.
Finally, just as in physical stalking, online harassment and threats may be a prelude to physical violence or serious property damage.
In that sense, they must all be taken seriously on the first report by the victim.
Other things that pave the way for a cyberstalker are the often anonymous character of the Internet, and the practiced use of non-confrontational and impersonal communications.