Cyberstalker hacks into the victim’s e-mail account:
Cyberstalker hacks in to the victim’s e-mail account and sends threatening emails to himself and indicates to law enforcement as well as other 3rd parties that it came from the victim. Often this tactic is utilized as part of a “smoke and mirror routine” to confuse law enforcement, prosecutors and even a jury to assist the cyberstalker in escaping a stalking conviction.
There are many free web based e-mail account options available today: Yahoo, Msn, Live, Gmail, the list goes on and on. For many cyberstalkers hacking in to the victim’s e-mail account is not enough, many cyberstalkers create multiple e-mail accounts using their victims names or initials and send e-mails out to unsuspecting 3rd parties including the victims relatives, clients, employers, co-workers, friends that include pornographic material, defamatory statements, keylogging spyware etc..
Caller ID Spoof to manipulate caller id:
A Cyberstalker purchases from online web site a spoof card which allows the stalker to manipulate the caller id to reveal any name and number that the stalker desires. Many of the caller id spoof web sites also provide a voice enhancer which alters the stalkers voice also helping the stalker to avoid detection by the authorities.
For a small fee, the stalker purchases a code which allows for manipulation of the caller id. www.spoofcard.com/ offers you the ability to change or spoof what someone sees on their caller ID display when they receive a phone call leaving no trace of evidence behind. This is especially dangerous when victims are lured in to providing private information such as date and times of appointments, credit or bank account information or other private records believing that the caller is a credit card company, bank, employment agency or similar.
Cyberstalkers apply for credit in the victim’s names:
Whether the account is approved or not the credit inquiry costs the victim valuable points pertaining to the FICO score. The majority of stalkers are former intimate partners or those who had a business or professional relationship with the victim. Many cyberstalkers know the personal identifying information of their victims or obtain it online making opening up credit card accounts online and by mail simple and easy because nobody checks the legitimacy of the applications before processing.
Cyberstalking victims who experience this sort of identity theft as abuse find themselves with destroyed credit ratings form the numerous credit inquiries. Others endure the endless hours of having to repair the inaccurate information being utilized to open these accounts. Often times the cyberstalker will utilize inaccurate address, phone numbers and misspell the victims name in order to damage their credit rating further. This creates a very time consuming task for victims who now must make hundreds of telephone calls, write letters and contact the credit agencies to have the accounts canceled, information deleted/updated and try to have their good names restored.
Use of a keylogging spyware:
The spyware is emailed to the victims as an innocuous file, such as a photo, e-card or other attachment to an email. When the cyberstalking victims click on the disguised file, the keylogger spyware silently installed in the background without the victims’ knowledge. This spyware records every keystroke typed on the victim’s computer (including passwords); captures images of the computer screen; and records Web sites visited.
For business professionals who work with consumer private information such as those in the banking and finance industry this can be devastating not only for the cyberstalking victim but also to those that they are working with.
Accessing Telephone Records:
Unsuspecting victims cellular and landline phone records are accessed providing the cyberstalker with vital information pertaining to the victim’s day to day life and events.
Manipulation of telephone numbesr to make it appear to be from a “legitimate source”. Cases are reported more frequently involving the use of email spoofing or cloning as well as fax spoofing. The cyberstalker sends e-mails/faxes to the victim’s co-workers, clients, family, friends and other 3rd parties that appear to be from the victim or a legitimate source which includes pornographic materials or disparaging remarks pertaining to the victim.
EFT Bank Transfers from Victims Accounts.
The majority of consumer private records and information including date of birth, social security number and banking information are available online today and cyberstalkers utilizing a technique known as electronic funds transfer will often contact their victims banks by phone or online using the banks automated systems and request Electronic Funds Transfers from their victims bank accounts. The transfers known as EFT, allow the cyberstalker to remotely withdraw money from the victims account electronically online or by phone.
Many victims are those who utilize automatic bill pay in their checking accounts. These victims discover they have been victimized when they learn that their auto payments have been made – two times or for a larger amount than that which was designated or scheduled. Victims often find that their bank accounts have been emptied – which appears on the surface to any observing banking official as a “legitimate” electronic bill pay; but instead it is actually a cyberstalker’s handiwork torturing the victim by manipulating the victim’s finances-without a trace.
Use of Craig’s List to victimize:
Cyberstalker’s create listings on Craig’s List using the victims name, address, phone number and provide other personal information advertising in personal ad’s or similar. Unsuspecting victims often receive hundreds of phone calls, knocks on their door and have no idea that it has happened until the calls and disturbances take place.
Use of online databases to gain consumer personal information. There are millions of databases that house consumer private records including license plate information, driver’s license information, social security numbers, date of birth, address history, phone information, banking information and more with the click of a mouse. All a cyberstalker has to do is key in words like, “license plate trace”, “phone records trace”, “bank account trace” and hundreds of web sites appear that provide these private records and more. Datafurnishing companies like http://abika.com/, http://sourceresources.com/, www.merlindata.com/, www.knowx.com/, these and the thousands of other datafurnishing companies like them, provide millions of consumer records to 3rd parties without notifying the consumer when the records are released.
The exponential rise in the billion dollar on-line datafurnishing business is one of the main reasons why the identity theft epidemic will continue and why stalking victims find it very difficult to protect their privacy. Identity thieves and stalkers can easily obtain consumer private records and information without the victim’s knowledge or consent with the “click of the mouse”.