Cyber Stalking
Overt
-
Direct contact via any “cyber” source such as Instant Messaging; EMail; Blogs; Online communities such as MySpace, FaceBook, Yahoo! Groups
-
Fraudulent subscriptions to mailing lists
-
Indirect postings, articles, messages to third parties or general “bulletins” about the victim in online communities, blogs, or other places the victim may frequent or be alerted to
Covert
-
Gathering information via Instant Messaging profiles and away messages to learn habits, locations, phone numbers, email addresses, other friends' information
-
Gathering information via online communities and blogs to better understand the victim dramatically increasing terror effectiveness
-
Conducting electronic surveillance by use of “spyware” or interception of network traffic (especially wireless)