2. What is Cyber Stalking
Cyberstalking is the use of the Internet or other electronic
means to Stalk or Harass an individual, Group of
individuals or an organization.
3. Cyber Stalking Forms
Cyberstalking can take many forms, including:
harassment, embarrassment and humiliation of the victim
emptying bank accounts or other economic control such as ruining
the victim's credit score
harassing family, friends and employers to isolate the victim
scare tactics to instill fear and more.
4. Who are
the most
likely
victims ?
Anyone can be a victim
of cyberstalking.
However, females are
more likely to become
victimized than males.
Educational institution
are also a very likely
target for cyberstalking.
5. Types of Cyberstalker
• They are noted for the ferocity of their
attacks.
Vindictive
Cyberstalker
• Their only motive is to annoy
Composed
Cyberstalker
• They’re attempt is to form a relationship with
the victim but turns on them if rebuffed
Intimate
Cyberstalker
• Groups with motive.
Collective
Cyberstalker
6. How do Cyberstalkers meet theirTargets?
Search Engines Online Forum Chat Room
Online Communities
Bulletins &
Discussion Boards
Social Networks
7.
8.
9. HowVictims are Stalked?
False Accusations
Many cyberstalker try to damage the reputation of their victim
and turn other people against them. They post false
information about them on websites. They may set up their
own websites, blogs or user pages for this purpose. They post
allegations about the victim to newsgroups, chat rooms, or
other sites that allow public contributions.
Making Threats
Attempts to gather information about the victim. Cyberstalker
may approach their victim's friends, family, and work
colleagues to obtain personal information. They may advertise
for information on the Internet, or hire a private detective.
10. Monitoring their target's online activities and attempting to trace their IP
address in an effort to gather more information about their victims.
Monitoring
Many cyberstalkers try to involve third parties in the harassment. They
may claim the victim has harmed the stalker or his/her family in some way,
or may post the victim's name and telephone number in order to
encourage others to join the pursuit.
Encouraging others to harass the victim
11. They order items or subscribe to magazines in the victim's name.
These often involve subscriptions to pornography
Cyberstalking is a form of cyberbullying.
Ordering goods and services
13. Effects of Cyber stalking
• Placing victim at risk of psychological trauma.
• Shock and disbelief.
• Changes in sleeping and eating patterns.
• Physical and emotional reactions
• Nightmares
• Anxiety
• Helplessness
• Fear for safety
14. Cyber Stalking in Pakistan
Cyber harassment has been generally
accepted as a routine part of Pakistani
women’s daily lives.
Cultural norms and the idea of “honor” may
be a reason for victims not to seek help
and report harassment.
15. PUNISHMENT UNDER NEW
CYBER LAW
If you try to get into a relation with someone online through internet website, email,
chat rooms, discussion forum, Message board, even SMS, phone or any
communication tool despite there is disinterest from the other party then you can be
jailed for THREE YEARS or imposed a fine which may extend to ONE MILLION
RUPEES or with both
Examples:
• You repeatedly call someone, despite the other party asks you to not to
• You send emails with no interest shown by the other party
• You do something in a manner that other party is harassed out of your actions
If you call, chat with someone and other party has no issues with that then its all cool,
nothing to worry about.
16. If victim of the cyber stalking is a minor the punishment may extend
to FIVE YEARS or with hue which may extend to TEN MILLION
RUPEES or with both.
Cyber stalking offences include:
• Making contact in a manner that minor is harassed
• Taking photographs, making videos and distributing them without
consent
• Blackmailing
• Spying on minors
PUNISHMENT UNDER NEW CYBER LAW
18. Never reveal
your home
address.
Password
protect all
accounts.
Conduct an
internet search
using your name
and phone
number.
Be suspicious of
any incoming
emails, telephone
calls or texts that
ask you for your
identifying
information.
Never give out
your Social
Security
Number
If you are leaving a
partner, spouse or
boyfriend or
girlfriend- reset
every single
password on all of
your accounts to
something they
cannot guess.
If you think
you're a target,
have your PC
checked by a
professional.
Do not share
your activities
on social media
Preventions