While poking about searching for things, I found a site about cyberstalking:
http://www.fireflysun.com/book/stalking_overview_tactics.php
Since we've been through it all with Vincent Bridges, just about everything said here rings true. I just didn't realize it was so widespread.
http://www.fireflysun.com/book/stalking_overview_tactics.php
Since we've been through it all with Vincent Bridges, just about everything said here rings true. I just didn't realize it was so widespread.
Overview of Tactics in Stalking
The following overview is a roadmap to the procedures or maneuvers used by stalkers to achieve objectives. Links to detailed reports on each of the tactics can be found in the section titled "Stalking Tactics."
The primary goal of the cyberstalker is to achieve greater control over the life of the victim. Some instrumental cyberstalkers (e.g. stakeholders in a business or academic community) may choose to remain invisible to instill in the victim a sense of fear and a sense that the cyberstalking may never end. Anonymity is required to sustain the kind of cyberstalking campaign that impacts the affairs of the victim (e.g. business transactions or online communications). Some cyberstalkers from the jilted or unrequited genre may need their victims to know who is responsible, as the goal is not so much that a victim's life is being disrupted, but who is disrupting the victim's life.
Creating documents that present a victim in a false and unflattering light is one of the most direct methods of seizing a victim's attention by force. The cyberstalker would like to believe that the victim is paying so much attention to him personally or to his handiwork that the victim has little if any time for that part of life where he is not concerned.
If the cyberstalker is distressed by the content of an author's book, he will design a cyberstalking strategy that assumes control of how the public views the book and / or diverts the author from marketing practices.
Cyberstalkers derive their greatest pleasure from disrupting their victims' relationships with third parties, where the third party is (a) the general "unspecified" audience, (b) significant others and current or prospective associates, and (c) providers of services the victim needs to use the Internet.
Some of the most egregious tactics deployed to disrupt the way a victim is perceived by the general population involves the creation of libelous Web sites search optimized through the dissemination of links in news groups. For maximum effect, the cyberstalker houses the libelous material on a network of hyperlinked Web sites bearing the name of the victim (e.g. JoeSmith.com, JoeSmith.org, JoeSmith.info). As a substitute for a Web site, a critical mass of deliverables to news groups and other Web-based forums may be sufficient to vandalize the front page of results for a Google search on the victim's name.
Tactics deployed in disrupting relationships with family & friends, colleagues, and other associates are more wide-ranging. Once cyberstalkers sleuth the identities of these third parties, they may begin dropping the names into messages that remain primarily about the victim, but eventually messages may be created as unctuous commentary about these third parties themselves. The goal of most instrumental cyberstalkers is to pressure the third parties to persuade the victim to stop using the Internet. This is achieved by creating a situation in which significant others and associates blame the victim for the stress they begin to feel as the harassment hits closer to home. In some cases, employers may be contacted directly or indirectly mentioned in messages (which may be accurate or misleading) about the victim's use of company property (e.g. PC) on company time.
Impersonation is also a popular tactic in the disruption of relationships with friends and associates. Victims may learn from a Google search on a name that they are the forged authors of a message (in some forum) that defames an associate or significant other or; conversely, that the associate (or significant other) may be forged authors of messages that defame the victim. Acts of impersonation vary so widely that no exhaustive list is possible, and any act of impersonation can potentially disrupt any and all category of relationship. A cyberstalker may create a faux directory entry for the victim (e.g. Yahoo profile), composed to appear as if they were written by the victims themselves (for maximum effect). The profile could be used to humiliate the victim by including a revealing or embarassing photograph (i.e. "pic"). The profile may be used to "out" a person who has been conducting business on the Web under a pen name. Cunningly sleuthed residential address information may also be included to expose the victim to risks. In cases of jilted or unrequited cyberstalking, a real or "doctored" photo may portray the victim in a sexually compromising position. Not only can everything you see on the Web be falsified, but some Web-based tools were created to doctor communications records that you would not normally associate with the Internet, as when a Web-based Caller ID Spoofing Tool was used to manufacture evidence one victim actually phoned his cyberstalker.b/b] Stalkers have even been known to impersonate authors in efforts to cancel speaking engagements.
Similarly, cyberstalkers may use or invent through aliases a confederate network to deliver a critical mass of false, fulsome, or frivolous complaints of abuse to a victim's providers of Web hosting, NNTP posting, or Internet Service. More options are available to the digitally savvy cyberstalker, who may use spam he routed through a victim's PC as evidence of victim abuse.
The cornerstone of the cyberstalker tactical plan is the lie ... and the truth. The same cyberstalker, in the same message, may disclose painfully accurate truths about who you are and where you can be reached and painfully inaccurate falsehoods. More typically, a cyberstalking gang divides this labor, with some members specializing in weaving lies out of whole cloth. In what amounts to great theater, the same cyberstalker may compose a message that feigns fly-on-the-wall knowledge of events / non-events in your life -- from your office to your bedroom. The division of labor available through gang stalking not only makes the individual stalker less conspicuous, but it can be used to divide the once-indivisible crime into a series of acts that cannot be considered criminal when viewed independently. Law enforcement officers are easily daunted by what they perceive as a prohibitively work-intensive challenge of identifying all the members of a cybergang and then attributing responsibility for various crimes or para-criminal acts among the members.
Cooperative networking may be used to recruit other belligerents and full-time flamers on the Web into the anti-victim gang (or to form such a gang). While the tactic sounds like great fiction, it is more the rule than the exception in Usenet's un-moderated "news groups."
In the era before Google, cyberstalkers in the instrumental genre were by and large impotent and could be effectively ignored. However Google gives cyberstalkers the power to affect the victim almost universally, in a way that compels the victim to monitor the cyberstalkers' activities for possible risks to his or her reputation, safety, employment and Web-based business. Many victims need a defensive strategy, a Web-based statement on the propaganda or harassment which, as you might suspect, also draws additional cyberstalking.