Subscribe via RSS Feed

Table of Contents

isoscyberstalkingbookmedium

The guide is over 36 thousand words and covers all aspects of dealing with online harassment.

Table of Contents

Chapter 1 – Introduction 6

Chapter 1 – Introduction  6
So where did all these cyber stalkers come from and what did they do before there was an Internet?                                                              6
Who Is This Book Written For? 6
What Is The Difference Between Cyber Bullying And Cyber Stalking? 7
What Can Be Done About The Problem Of Online Harassment? 8
Chapter 2 – Profile of A Cyber Stalker 10
Is There A Typical Cyber Stalker? 10
Personal Vendetta 11
Professional Cyber stalker 11
Sexual Predator 13
Blackmail 13
Not Always Clearly Defined 13
Personality Traits And Disorders 14
Chapter 3 – Avoid Being A Victim 16
What Makes Someone A Target? 16
Are You A Target Waiting For A Cyber Stalker To Find You? 16
The First Response Is The Most Important 17
Too Much Information 19
Chapter 4 – Tracking Down A Cyber Stalker 21
Proof Of Cyber Stalking Activities 21
Breaking Through The Pain Barrier 21
Information Analysis Using A Mind Map 22
Identify The Source 23
Are They Real Friends? 25
Two Can Play At That Game 25
Tracing Their Internet Address 26
Hiding Their Internet Address 28
Ways To Discover Their Real IP Address 28
A Job For A Real Hacker 29
Compromised Computer System 31
Chapter 5 – Dealing With A Cyber Stalker 32
Developing A Strategy 32
Goals Of An Anti Cyber Stalker Strategy 32
Damage Control 34
Deciding On A Strategy 34
Chapter 6 – Getting Malicious Material Removed 38
Cyber Stalking Is Seldom A Basis For Getting Material Removed 38
Size Does Matter 38
Location Is Important 39
Chapter 7 – Impersonation And Fake Identities 43
Using Fake Accounts 43
Fake Email Accounts 43
Fake Social Network Accounts 45
Making Impersonation Complaints 46
Getting Other Fake Accounts Removed 46
Chapter 8 – Defamation : Libel & Slander 48
Making Complaints For Defamation 48
Location Seems To Be A Major Consideration 48
Communications Decency Act 50
Explore Other Grounds For Removal 50
Chapter 9 – Copyright Violations 52
Under the Millennium 52
Safe Harbor Provisions 53
Google Refuses To Act 55
Chapter 10 – Making Complaints 60
Terms Of Service 60
Harassment 61
Personal Information 61
Vulgarity / Obscenity 62
Spamming / Solicitation / Cross Posting 62
Adult Material / Pornography 63
Inciting Hatred / Hate Speech / Discrimination 64
Phishing / Malware 65
Copyright Protection / Counterfeit Goods 65
Chapter 11 – Taking Legal Action 67
Seeking Legal Advice 67
Threat Of Legal Action 67
Why Take Legal Action 68
Preparation for Legal Action 69
Finding A Lawyer 70
When Legal Action Does Not Work 70
Chapter 12 – Reputation Repair 71
Reputation Repair Strategies 71
Protecting Personal Names Online 72
Reputation Repair On Search Engine Results 75
Providing Pages With Social Proof 78
Reputation Repair On Social Networks 79
Warning On Written Content 80
DIY Or Use Professional Services 80
Chapter 13 – Stalking The Stalker 81
Engagement Strategies Are A Last Resort 81
Victim’s Motivation For Using Engagement Strategies 82
Aggressive Exposure Strategies 82
The Power Of Ridicule 84
Using Dirty Tricks 85
Dig Up Dirt On The Cyber Stalker 85
Fighting Social Wars 86
Chapter 14 – Support & Resources 87
Membership Area 87
Victim Support Services 87
A Liberating Experience 88
About My Cyber Stalkers 89