The Silent Stalkers



Technology has significantly enabled and enhanced "silent stalking" by providing new, often undetectable, methods for perpetrators to monitor, track, and control victims. This phenomenon — known as cyberstalking or tech-facilitated abuse — exploits common digital tools and platforms for harassment and surveillance. Stalkers use a variety of technologies to maintain a persistent, terrifying presence in a victim's life, often without the victim's immediate knowledge. 

STALKERWARE/SPYWARE: One of the methods used is malicious software that is secretly installed on a victim’s smartphone or computer, giving the stalker access to real-time location data, messages, call logs, and even the ability to remotely active the device’s camera and microphone.

SOCIAL MEDIA MONITORING: Stalkers frequently monitor victims' social media accounts for check-ins, tagged photos, and interactions to piece together daily routines and gather personal information.

PHISHING: Perpetrators use deceptive emails or messages to trick victims or their friends and family into revealing passwords, personal information, or new contact details.

The silent nature of this abuse makes it hard to detect. Signs might include a rapidly draining phone battery, unexpected charges on phone bills, or the appearance of unknown apps or devices. The core of prevention is limiting the personal information a potential stalker can find. Here are some tips that will help you.

  • • Be cautious about personal details you share online. 
  • • Avoid posting your home address, phone number, date of birth, workplace, or specific daily routines. 
  • • Adjust your privacy settings to make all social media accounts private, and disable geolocation services and GPS on your devices and social media apps. 
  • • Avoid “checking in” to locations and posting real-time travel plans. 
  • • Only accept friends or followers from people you know or have met in person. 
  • • Periodically Google yourself to see what information is publicly available. 
  • • Use a neutral screen name or pseudonym that doesn’t reveal your real name, gender or personal interests. 
  • • When using dating services, do not provide your full name, phone number, or email until you have met the person in a public place and feel comfortable sharing more information.