Cyberstalking Action Plan

In many cyberstalking and domestic abuse cases there is a known individual - like an ex partner - who is using the internet to communicate and keep track of you. Often this ex-partner knows information about you that they shouldn’t and you are not sure how. You are also likely incredibly keen to ensure you regain your privacy and confidence of being online.

The vast majority of individuals suffering cyberstalking or domestic abuse who we work with have completely lost confidence in their devices (such as phones, laptops, home wifi router and computers) and their online accounts (especially social media, messaging apps and email). They have often bought multiple new phones in the hope that these new phones will be secure and unknown to their ex-partner. Some are visiting their local library to access the internet to avoid using their devices. Many assume that everything odd that happens - like a wrong number, a pop up on their device, a change in device settings - is part of the stalking until it is proven otherwise. It is also common that they haven’t been believed in the past and are starting to worry that they are going slightly mad - or are never going to escape the stalker.

This guide aims to arm you with the knowledge to regain your security, privacy and online confidence. In our experience these cases take time and it is important to move at your own pace. The following advice is closely aligned to the approach our volunteers take with cyberstalking and domestic abuse cases. If you would like to speak to one of our volunteers please use the chatbot here to describe your issue and ask to be connected with a volunteer when prompted (note this might be after it has linked you to one of our web guides).

We want to better understand the impact of you experiencing this issue, can you share your experience by filling in this online form? This will help us better protect future victims.

First thing is to make sure you are safe. If you feel in any immediate danger you should call 999. If you are worried about your mental health use this NHS guide to take the right course of action.

Step one: Get expert stalking help

Stopping the individual from being able to follow you online or contact you is part of the process, but it is unlikely to be the whole solution. We strongly advise that you work with a specialist organisation to get the right expert support for your issue and get a safety plan in place.

Find the right expertise to help you

If you are being stalked then working with a stalking charity will help you understand the level of risk in your situation, provide the key resources and options you have in front of you and provide emotional support. The same goes for domestic abuse. The cases we work on that have a specialist organisation working hand in hand with our cyber security advice tend to have much better outcomes. You will find links to organisations that may be able to help you in our Useful Links section.

One other benefit of working with a specialist charity is that they will have lots of experience in helping you work with the police - we do recommend that the police are involved in these cases. There is still a long way to go for police forces to fully understand stalking and domestic abuse cases and a specialist organisation can really help this process. It also helps to understand the law in these areas - even at a high level. For example this legal guidance on Stalking & Harassment from the Crown Prosecution Service will give you a feel.

Finally, they will also explore offline options to deal with the stalking such as the legal tools at your disposal and ensure there is a plan in place to keep you safe.

Start a case with us

The Cyber Helpline team has a lot of experience of providing the cyber security elements of these cases and often work hand in hand with other specialist organisations. If you are already engaged with another charity they can refer your case here. Alternatively, you can start a case with us now and we can always bring in another organisation if you are happy for us to do so.

Step one to do list

  1. Make sure you are physically and emotionally safe

  2. Contact a specialist charity

  3. Report the issue to the police

Step two: Understand the stalker’s motivation, approach to date and technical capability

You don’t always know who the individual is in cyberstalking and online harassment cases. If you don’t know who the stalker is then this step will be less relevant to you, but it is still worth reviewing and completing what you can. It is important to note that the following steps are still 100% applicable to you even if you don’t know the identity of the stalker - so keep reading.

For the purpose of this step we are going to assume that the threat is coming from an ex-partner or at least someone you know. The key focus of this step is understanding their capability, level of motivation and resources. What we are really trying to do here is understand the history of the case and what action they may be able to take in future. Things to think about:

The Stalkers Identity

In the vast majority of stalking cases the stalker is someone the victim knows. This might be an ex-partner, a work colleague or a rejected partner. The stalking activity might be carried out in a current or past relationship - often where there is or was some form of domestic abuse. However, with cyberstalking it can be easier for the stalker to hide their identity.

The first question to ask is are you 100% sure you know who your cyber stalker is? What evidence do you have that the cyber stalker is the individual you think it is? Make a list of all of this evidence and make a note of all future interactions to gain a record of the stalking and an evidence base for the police.

If you have no idea who the cyberstalker is then it may be possible - with the help of the police - to find clues to their identity over the course of the stalking. When the stalker opens - or uses - an account on a service like Gmail, Facebook or Instagram the provider will log some data like IP address (the online location of the device being used) and this may provide insight into where the individual is and help you narrow down options. It is relatively straightforward to hide your IP address and other information online though so this isn’t always possible.

The Stalkers Approach

What has the stalker done to date? What accounts, websites and apps has the stalker used to contact you? Has there been a physical element to the stalking like turning up at your workplace or home? List out all of the forms of communication and where you suspect the stalker is getting information about you. This will be useful in coming up with a plan on how to both lock them out of your environment, but also for considering what channels you might leave open so that you can have some control over the engagement.

IT capability

Does the individual work in IT? Are they really good with computers? If yes, then they may be able to carry out more advanced action like using spyware or hacking your devices. If not, then they are unlikely to be able to do these things without expert help.

Access

How much physical access has the individual had to your current devices and accounts? Did they help you set up the devices? Did they set up your online accounts? Are you on a shared mobile phone contract? If the answer is yes to any of these questions then it is likely that they have been able to keep a good level of access to what you do online. For example if the individual set up your iCloud account they would be able to see photos, messages, emails and location information. Any account they have helped set up or had some access to needs extra attention in later steps.

Resources

Do they have their own computer and mobile phone? Do they have a lot of time and money? Anything advanced in cyber security takes a lot of time and money. If they have low resources then it is more likely to be standard activity like guessed passwords, access to online accounts etc. If they have a lot of resources available then more advanced cyber tools like spyware and other malware should be considered.

Motivation

Understanding the motivation of your stalker or abuser is an important step. If you have enlisted a specialist charity they will help you through understanding this. Stalking Risk Profile has a good overview of different types of stalker on their website here - these include the Rejected Stalker, the Resentful Stalker, the Intimacy Seeking Stalker, the Incompetent Suitor and the Predatory Stalker. Each type carries its own level of risk and standard types of stalking behaviours and should be used to guide the following steps.

Stalking Risk indicators

There is a common model used to understand the risk in stalking and domestic abuse cases called the DASH risk assessment. If you answer yes to any of the initial 12 questions then it is important you seek expert help as soon as possible. The 12 initial questions are:

  1. Are you very frightened?

  2. Is there previous domestic abuse or stalking/harassment history?

  3. Have they vandalised or destroyed your property?

  4. Have they turned up unannounced more than three times a week?

  5. Have they followed or loitered near your home or workplace?

  6. Have they made threats of a physical or sexual violence nature?

  7. Have they harassed or stalked any third party since the harassment began?

  8. Have they acted violently towards anyone else during the stalking incident?

  9. Have they engaged other people to help with their activities?

  10. Has the stalker had problems in the past year with drugs, alcohol or mental health?

  11. Is the stalker suicidal? Is there last resort thinking/finality?

  12. Have they ever been in trouble with the police or do they have a criminal history?

It is important to remember that step two is a step that often takes expert support to work through. Using the expertise and experience of experts is the best way to get a clear understanding of the situation you are in. Contact us if you need help here or get in touch with an expert stalking / domestic abuse charity.

Step two to do list

  1. Assess your stalkers capability

  2. Answer the 12 DASH questions

  3. Seek expert support to get a clear view of your level of risk

Step three: Deal with any urgent threats to safety, security & privacy

Many of our users who are experiencing cyberstalking have an immediate issue that they need support with. This could be a number of things including hiding location, cutting off access to online content or accounts, removing sensitive content online, dealing with lost or stolen devices or removing access to funds. For some it is simply urgent to know that their device is secure or they are not being listened to at home.

While it is important to act quickly in these stages it is also important to step back and think about the impact of the decisions and changes you make. Often these immediate threats need to be considered as part of a wider safety plan. For example, cutting off the way a stalker was able to track your location may force the stalker to get location information in a way you don’t understand or that presents more risk. You also want to make sure you are preserving any evidence that may come in useful later in your case. Ensure that you take professional advice from stalking or cyberstalking experts when you make early changes.

Step three to do list

  1. Identify any immediate threats to your safety, security & privacy

  2. Discuss an action plan with your expert support to ensure it maintains or lowers your level of risk

  3. Deal with the immediate threats

Step four: Understand your online footprint

Now it is time to turn the attention back to yourself. The next step is getting a full understanding of your online footprint. This is the sum of the internet connected devices you have, what you do online and what data exists about you on the internet. If you can get a good feel of this then you will be able to understand what the cyber stalker can see about you, what information they have and how they might communicate or monitor you. This guide from The Centre for Protection of National Infrastructure (CPNI) is a really good overview of what this footprint is and how you can get an idea for yours.

Devices & Accounts

At The Cyber Helpline we have built an online form to gather information about your online footprint and we then work with you to fill in the gaps. Key areas to include are listed below. If you need to jog your memory for the accounts you use, places like your browser history and the apps list in your settings are a great place to start. Make sure you note the make, model and operating system (e.g. Windows 10, MacOS High Sierra, Android 9.0 Pie etc) running on each device. Also note where the stalker has had physical access or has been involved in the account set up.

Devices - smartphones, tablets, laptops, desktops, wearable technology (like Fitbit or Apple Watch), games consoles and WiFi router.

Smart home technology - smart speakers (Amazon Alexa, Google Dot etc), internet connected CCTV, smart doorbells, Smart TV, internet connected appliances, online thermostats.

Social media & communication - email, social media and chat accounts.

Money - online banking accounts, online pension access, savings apps, investment apps.

Entertainment - online accounts for dating, gambling, gaming and shopping.

Basically if it is a device that connects to the internet or is an account or service you use online then you need to note it down.

Researching yourself online

Once this is done, we need to start exploring what general information is on the internet about you. This is where you enter some basic details about yourself - like name - into search engines and see what is out there. See page 20 of the CPNI guide listed above - to get a full list of things to search for and where to search. Whatever you find is information that the cyberstalker will know about you. You need to think through the repercussions of this and start shaping your online footprint.

It is important to remember that if the cyber stalker is an ex partner, or someone who knows you well, then they are going to have a lot of knowledge about you that isn’t online. For example they may know what you do online, what devices you use, who you are connected to online and what type of passwords you use. This should also be taken into consideration when securing your online environment in later steps.

Step four to do list

  1. Make a list of all of the devices you use to connect to the internet

  2. Make a list of all of the things you do online and the accounts you have

  3. Search for information out there on the internet about you and try and minimise this as much as possible

Step five: Understand what you are trying to protect

This is a critical step that will be a guiding light for later steps. Here we need to think hard about what it is we are trying to secure or keep private. We need to think about what is valuable to you, but also what would be useful to the stalker in terms of enabling the stalking and overall impact of the stalking. In the cyber security world we often use the lens of confidentiality, integrity and availability and we will use this now as a framework for what is important to protect and what we are trying to do as part of making you more secure.

Confidentiality - limiting access and keeping things private

Removing any access that the stalker has is critical to giving you back your security & privacy. Common focuses as part of this area include:

  • Passwords - people store passwords in a range of ways such as password managers, notebooks, phone contacts and notes apps on phones. We need to make sure we understand where passwords are stored. We also need to understand if they were shared with the stalker.

  • Family information - your children’s contact details, school address, routines etc.

  • Live activity - making sure that any smart technology in your home isn't providing the stalker with live location, audio or video.

  • Location - often keeping your location confidential is critical to your safety plan.

  • Social interactions - Who you are talking to, what you are talking about and who you are meeting. All of these things can be key things to keep confidential from a stalker.

  • Secrets - you may have certain information that you do not want exposed.

Integrity - making sure your data, device and accounts haven’t been changed

The focus here is making sure that information has not been changed as part of the stalking or to enable the stalking. A technique called ‘gaslighting’ is often used in stalking and domestic abuse. This is a form of psychological manipulation where the stalker seeks to sow seeds of doubt in the victim, making them question their own memory, perception and sanity. Some examples in cyberstalking:

  • Conversation history - making sure your conversation history on email or messaging apps hasn’t been changed or the flow of communications is not being diverted.

  • Your online identity - ensuring that the stalker is not impersonating you online and either daming your reputation or manipulating those around you.

  • Online identities - verifying that the connections, followers and contacts you have online are the people they say they are.

  • Smart home actions - anything connected to the internet at home can be manipulated for information or as part of gaslighting. Making sure that the integrity of these home technologies is sound.

Availability - making sure you can access your data, accounts and devices when you need to

Availability is about making sure information is not deleted or restricted in any way.

  • Devices - stolen devices can often give a lot of access to your data. Keeping track and physical security of your devices is likely to be important.

  • Online data - the data in your accounts is likely to be a focus. Making sure you retain access to these accounts and data is likely to be key.

  • Account ownership - where the stalker is an ex-partner it is common that a lot of the utility bills, mobile phone contracts are in their name and they have authority to these accounts (and any data within them like itemised phone bills). Thinking about ownership and continuity will be important here.

  • Evidence - evidence of previous activity carried out by the stalker will be found in devices, online accounts, providers IT estate and in back-ups. The stalker may try to erase this evidence and it will likely be important to protect it.

Step five to do list

  1. Sit down and think about what data, devices and accounts are important to you

  2. Work through the key confidentiality, integrity and availability factors

  3. Map where the key things to protect are sorted on your online footprint

Step six: Find & preserve evidence

Stalking is a crime and should be reported to the police. Making sure that you collect the right evidence, protect the evidence integrity, store the evidence securely and share the evidence with the right people is critical to the ability of the police to do their job. It is important to note here that the advice from the police takes priority over our guidance here. Each investigation is different and the police are the lead authority on how this step should be handled. Here we will provide some guidelines that you can follow in the absence of police input.

Where does evidence exist?

If you are experiencing cyberstalking - i.e. there is no physical manifestation of the stalking - then the evidence is likely to be completely online. If you are experiencing cyber-enabled stalking - where the Internet is being used to support traditional stalking - then there will also be offline evidence you can gather. Here we are going to think about online sources. The following are typical places evidence can be found:

  • Devices - the devices where you have experienced the stalking are likely to hold evidence. Devices like computers and mobile phones store lots of data about use. There may also be malicious software on the device that can be used as evidence. Some of this data may not be readily available and the device would need to be imaged (an exact copy made that is forensically sound) and then that copy investigated to find the evidence. This is typically done by the police as part of the investigation, although there are private firms that offer this service in line with the police’s evidence standards. Remember that the stalkers’ devices will also have evidence and these may be seized by the police if they have enough reason to progress the investigation.

  • Applications - the applications on your devices are also likely to hold evidence. This might be the messages in email or messaging apps, it might be apps that are used to track activity or anything the stalker has used to carry out the stalking. This evidence would be gathered in largely the same way as outlined above - although the app provider may also be asked for information.

  • Online accounts - You may be able to find evidence in your online accounts. For example email accounts, Apple ID on Apple devices, Google accounts on Android devices have a lot of intimation about devices that have previously logged into your account, are connected right now and the device types and IP addresses involved. Many give you a snapshot of 30 or 60 days, but the providers store further back and the police can request it.

  • Providers - The social media, email, telecommunications providers and all online account providers store data on activity, log-ins and end user identifiers (such as IP address, browser version, device type etc.). Many are required to store elements of this data for years and this data can be requested by the police as part of a live investigation.

  • Back-ups - if your devices or data is backed-up then there is a good chance that evidence exists in the back-ups even if it is no longer on your devices. If you are backing up to iCloud, Google, another cloud storage provider or an external hard drive you own then these could all be good places to search for evidence.

Evidence integrity guidelines

Below is some best practice guidance for handling devices and online accounts that might have evidence. This is more focused on those receiving devices for investigation, but it will give you a good feel for how to protect the evidence.

If you have a device that could be used for evidence:

  • Don’t turn the device on if turned off

  • If it is not charged, do not charge

  • Turn phones off

  • Secure the device and document anyone who has had access to it

  • Don’t plug anything in to the device

  • Don’t open any files, applications or pictures

  • Do not copy anything from the device

  • Take a picture of the device (from all angles)

  • Get the PIN / passwords

  • Only trust someone with forensic training

If you have an online account that you think contains evidence:

  • Contact the provider - they can sometimes kick off a process that ensures no information is deleted

  • Screenshot the page

  • Copy URLs & usernames

  • Save the webpage (complete) to an external device or CD - you can do this by going to File>save on your computer.

  • Screenshot any malicious logins (make sure you can get all information - some you have to click on the device to get IP address etc.)

  • Screenshot connected devices

  • Don’t delete any logs or history

Storing evidence

Storing the evidence until it is handed over to the police is a crucial step in maintaining the integrity of the evidence. Devices should be securely stored where people do not have access. Any access granted to the device should be logged (who, time, date, why, what they did). In particular it needs to be stored somewhere the stalker does not have access.

With screenshots and digital evidence this would ideally be stored onto a memory stick or hard drive that is not connected to the internet and is stored then the same processes as above followed. Storing these on a device that you think is part of the stalker’s online activity puts the evidence at risk and may also alert the stalker to your intentions.

Sharing evidence

This evidence should only be shared with the police, an expert who is helping you with the case or a private firm who offers computer forensics investigations in line with the police’s evidence standards. Sharing this information - particularly devices - may cause more harm than good if the individual is not properly trained. In terms of actually sharing the evidence, ideally you want to physically hand over the devices to the police and you want to make sure any files sent online are done so on secure accounts.

Step six to do list

  1. Think about where evidence may exist within your online footprint

  2. Preserve the evidence by making copies and storing securely

  3. Share the evidence only with experts

Step seven: Secure your core environment

At this stage our homework is done and it is time to start reclaiming your security and privacy online. The focus of this step is to select a small section of your online footprint and work to secure it as best as possible. Once you are confident this small section of your footprint is secure we will eventually work through the rest.

Select a core section of your online footprint

Using the online footprint you worked on is the previous step, you should now select the key parts you can’t live without. This is the absolute core of your online footprint that is key to your day to day life. For most of our cases this includes the home wifi network, a smartphone, a laptop or desktop, an email account, an online banking account and a messaging app. Securing this type of environment allows you to access the internet at home, be confident in a few key devices and stay connected to others. Your core online footprint may be different, which is absolutely fine, but the focus is on as small an environment as possible. Just pick the absolute core.

As stated above, it is likely that you find yourself with a number of different devices in your quest for privacy. There are a number of ways you can choose which device to focus on such as a) select those with a better reputation for security - for example Apple devices are considered more secure than Windows or Android devices or b) select the device you started with - many of our users had an iPhone or a Samsung phone that they turned off and then bought cheaper, disposable phones at a later date or c) simply select the device you feel more comfortable with or trust the most.

One extra thing to consider here is home technology. If you lived with the individual or they had physical access to your house then you may want to focus on any home smart technology that may enable surveillance. For example if you have an internet connected home security system - that has cameras and microphones - then you are likely to want to include this in your core environment due to the risk it presents.

Work to secure this core environment

At The Cyber Helpline we believe that a good level of cyber security can be reached with minimal expenditure, if any. Unless you have a cyber stalker who you know has a high level of IT capability and resources (see step two) then enabling free security functionality and having good security behaviors should be enough.

Let’s work through an example. Above we listed a typical core environment. Let’s assume that a more detailed version of this is:

  • Home WiFi network = A Sky router as part of a wider package.

  • Smartphone = An iPhone 6s.

  • Laptop = A MacBook Pro

  • Email = A Gmail account

  • Bank account = Santander

  • Messaging app = WhatsApp

  • Home security = Canary Pro

You can see a worked example of the written advice we would give to secure the above core environment here. This advice would typically be provided after the case history is taken, the user has filled in our Online Footprint form and a core environment has been selected. Once this advice has been provided over email our Helpline Responders would provide telephone and email support to the user to help them through the process.

Now you can Google pretty much any device or account and find a guide for how to secure them. We recommend that you have a search online for security advice - start off with the providers themselves - and then start working through the advice. There are also security resources like Get Safe Online and the National Cyber Security Centre’s site which are useful. If you have a case with us we will provide some specific advice for each aspect. We also have a number of web guides that might help.

Learn about good security behaviours

Good security isn’t just about how secure your internet connection, devices and online accounts are. It is also about what you do online and how you react to certain situations. Reading some articles on how to keep yourself secure can go a long way in keeping you secure. Booking some time regularly to think about your security is also a very good idea while you are being stalked and beyond. The Get Safe Online and National Cyber Security Centre’s site are good sources of information, but here are some general tips and things to think about:

  1. Be suspicious and trust your gut.

  2. Use good passwords and change them regularly.

  3. Enable two-factor authentication on all sites and devices where it is offered.

  4. Always review the security settings of new accounts and devices and enable functionality.

  5. Make sure you update software on all devices you own as soon as an update is available.

  6. Be careful about where you access the Internet. Use your mobile data unless you trust the wireless connection is secure.

  7. Don’t click on links or attachments in emails. Criminals sending you emails is the most likely way for you to be targeted.

  8. Install and use antivirus on your devices.

  9. Don’t let people have physical access to your devices.

  10. Be careful about what you share and who you connect with online.

  11. Back up your data regularly and keep this backup secure.

Step seven to do list

  1. Select your core online footprint

  2. Work to secure this core environment

  3. Learn how best to keep this environment secure and protect your privacy

Step eight: Secure your wider environment

Now we are confident that you have a good level of security in your core environment, and you have learnt the basics of keeping it secure, we can move on to your wider environment.

Remove what you don’t use or need

Before we do though we need to try and reduce it is much as possible. Go back to step three and look at what is left outside of your core environment. If there is anything you don’t use anymore, or would rather not use as a result of the stalking, now is the time to close the accounts. It is important to close these accounts properly and not leave them dormant - or deactivated - in case they are hacked and used at a later date. Remember that there is a difference between deactivating an account and deleting an account. With deactivation your account is taken offline, but still exists and you can log in and reactivate it. With deletion the account is permanently deleted.

Sites like AccountKiller can be useful in understanding how to delete online accounts, but often the provider’s website is the best source of information. For example here is Facebook’s guide on how to permanently delete a Facebook profile. If in doubt, get in touch with the provider and get them to talk you through the best way to delete your account and data.

Secure the rest of your online footprint

With the rest of your online footprint selected, it is time to methodically work through each aspect putting security in place. Again you can use the providers websites, online guides from reputable sources or start a case with us and get tailored advice.

One thing it is important to consider here is leaving a channel of communication open to the stalker. In step two we noted the stalkers approach to date - the good thing about this is that we understand it and can work around it. If you completely block the stalker from his/her usual channels then their behaviour may change and therefore be unpredictable. For example in extreme cases this could force a physical form of stalking. Work with your expert charity - or us - to consider what you should leave open and how you can minimise the impact on you. If the stalker is sending emails to a specific email account you could filter these emails into a folder or abandon that email account, but keep it open to review messages every so often.

Step eight to do list:

  1. Review the rest of your online footprint

  2. Decide what you no longer need and close down accounts or wipe and get rid of devices

  3. Work to secure what is rest of your online footprint

Step nine: Monitor, log and course correct

You have worked hard to secure your environment, but the job isn’t finished. Maintaining security takes ongoing action and there is little doubt that the stalker will continue to communicate with you and try to invade your online security and privacy. As incidents happen it is important to keep a log of them noting key information like accounts used, devices, time, date, usernames etc. You should also screenshot the issues as much as possible and keep a copy.

In our experience there are three categories of online incidents:

  • Priority one: Evidence that your secure environment has been breached - this is where you know that the stalker has managed to hack into your environment. They might have gotten into your email or social account and sent a message to you from your own account. Your antivirus may have detected some spyware or other form of malware. It may be that a piece of information has gotten into the hands of the stalker that was only on a device or in an online account. Priority one events should be immediately tackled by re-securing the affected devices/accounts and then reported to the police.

  • Priority two: Direct contact from the outside to your secure environment - priority two events are where the stalker has managed to open a new line of communication with you. Maybe they have opened a new email account or social media account and used this to send you messages. Or maybe they have managed to hack one of your friends and family’s accounts and used that. In these cases you should note the details of the new accounts, report them to the police and the service providers and then block them from being able to send you messages.

  • Priority three: Security alerts from failed activity - now you have improved security in place you are more likely to be alerted to suspicious activity on your accounts. For example you might receive a two-factor authentication code you didn’t request (meaning someone is trying to log into one of your accounts); get a notification that someone has tried to connect a new device to your account or see in your security settings a list of failed logins to your account. These you only need to log, note down the details and pass onto the police if you have a live case.

During the stalking you are likely to have a heightened sense of awareness about online activity. Anything that happens you don’t understand - like a pop-up, change in settings or glitch - you are likely to consider as part of the stalkers activity. Work to understand the issue - get expert help if needed - and work to put it into one of the categories above.

Step ten: Don’t lose heart

It can be a long road dealing with a cyberstalker - both in terms of the emotional rollercoaster and the practical side of dealing with the stalking. While you are online there is always going to be a way for the individual to contact you - maybe through a fake account or by going through your friends and families accounts. The trick is to keep going and not lose faith in the process. Keep identifying new issues with your online footprint and keep re-securing it.

As time goes on you will get more and more confident being online and in your core environment. The cyberstalker will appear around the edges, but not be able to penetrate your online privacy. Knowing where and how the stalker is likely to appear online also provides you with more control in how you engage.

The cyber security part is often the easy bit. Dealing with the emotional challenge of being stalked and the risk and disruption that brings to your life can be incredibly difficult. Make sure you are getting emotional support and seek expert support for your mental health if you need it.

Step ten to do list:

  1. Don’t lose heart - these cases take time, but you will see improvement if you stick with it.

  2. Make sure you have the right support around you - be that friends and family or mental health professionals. Use our Useful Links page to find some organisations that might be able to help.

Step eleven: Donate, we need your support to protect people from cyberstalkers

To help people like you we rely 100% on donations from people like you.

Without donations we cannot keep our service free and provide help to the most vulnerable victims of cyber crime when they need it most.

As a not-for-profit organisation, 100% of your donation goes towards keeping The Cyber Helpline up and running - so 100% goes towards helping people like you. 

Donate now and help us support victims of cyber crime.

Step eleven to do list:

  1. If you found this guide helpful please donate to allow us to help more people like you.