A Cyberstalking Case in Indianapolis (+ Tips and Resources)

A Cyberstalking Case in Indianapolis (+ Tips and Resources)

At this point, we all hear about cyberstalking incidents almost daily. Most people either know a victim of cyberstalking or have been subjected to varying forms of cyberstalking at some point in the past. In Indianapolis recently, there was a harrowing case of a 26-year-old woman subjected to relentless online harassment. In June 2022, "Jane" began receiving unsolicited direct messages (DMs) on her social media accounts. The initial interactions, seemingly harmless, then took a menacing turn.

The persistent stalker escalated his tactics by creating numerous fake TikTok and Instagram profiles. Through these accounts, he didn't just impersonate Jane but went to the extent of disseminating false information about her, tarnishing her image, and reaching out to her friends and family for malicious and fraudulent reasons.

Understandably distressed, Jane, upon guidance, began to meticulously document every interaction. Armed with evidence, she approached law enforcement officials and filed a no-contact order against her cyberstalker, legally restricting him from communicating with her.

Jane's incident undeniably sounds familiar, and the following steps to defend against cyberstalkers will sound familiar too.


  • Limiting Personal Data Sharing: Always exercise caution when sharing personal details online. Avoid publicizing sensitive information like home address, workplace, or daily routines.
  • Enhance Privacy Settings: Make your social media profiles private. Periodically review and prune your followers or friends list to include only known individuals.
  • Avoid Engaging with Strangers: It is wise to refrain from responding if you receive unsolicited DMs or comments. Sometimes, even a negative response can encourage the stalker.
  • Document all Interactions: Every instance of unsolicited contact, whether a like, message, or comment, should be screenshot and stored. Such evidence can be invaluable in legal proceedings.
  • Report to Platforms: Social media platforms typically have mechanisms for reporting abusive behavior. Make sure to utilize them.
  • Legal Recourse: If the threat feels tangible, contact the legal system. A no-contact or restraining order can offer protection. But always remember, to build a substantial case, documentation is critical.
  • Two-Factor Authentication (2FA): This essential layer of protection ensures that even if a stalker gains access to your password, they can't break into your account without the second authentication, often sent to your phone.
  • Password Hygiene: Regularly change your passwords, ensuring they are a mix of letters, numbers, and symbols. Avoid obvious choices like birthdays or names of places and pets.
  • Stay Alert: Consistently review where your accounts are being accessed from. Any unfamiliar location or device might indicate unauthorized access.
  • Third-party Applications: Be cautious about linking your social media to third-party apps. They can be potential gateways for hackers and cyberstalkers.

Resources and Support

Victims of cyberstalking are not alone. There are numerous resources available:


As always, stay informed and stay safe.


Sincerely,

Bidemi “Bid” Ologunde


You can order a copy of my latest book,?Mind Maps,?here:?https://t.ly/tqt6x. Thank you!

#TheBidPicturePodcast?is available on these apps and everywhere you listen to podcasts:

Apple Podcasts | Google Podcasts | Amazon Music?| Spotify?| Tune In


Sponsored Ads

===

Work from home, earn some extra income, and test new products before they hit the shelves. Earn up to $500 per week.

>>> Click here to learn more <<<

===

Scammers and Spammers Hate Aura - and That's a Good Thing for You

Are you tired of unwanted emails, texts, and calls from scammers and spammers? Aura uses cutting-edge AI technology to scan the internet to identify where your personal information is exposed and being sold. With Aura, you can take control of your online privacy and secure your personal information. Reduce robocalls and keep your information safe from identity thieves. Try Aura free for 2 weeks and see if your information has been compromised. Start Free Trial

===

Your safer digital everyday - Surfshark

Protecting your connection is key. Surfing the web, you’re exposed to many risks: data breaches, hacking attacks, & snoopers. One solution to fight them all — a VPN. Get Surfshark with 82% off

===

Founded in 2019, Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone. In 2021, Atlas VPN became part of Nord Security — a leader in providing digital security and privacy solutions. While relatively new to the VPN scene, we are already trusted by more than 6 million users across the world. Our main driving force is to make digital privacy and security accessible to all consumers, irrespective of their budget or tech-savviness. Anyone is welcome to try Atlas VPN for free or sign up for Premium services with more additional features. Regardless of your decision, we will fully support your journey to privacy.

Get on board Atlas VPN with 85% off.

===

Triple Whale ?? is the source of truth for the data that helps you make better decisions. From integrations with your most important platforms, to ecommerce-training AI, Triple Whale helps you find the exact data points you need, with customization and personalization to fit your business.

Sign up for 15% off your first month

===

iubenda offers attorney-level software solutions to make websites and apps compliant with GDPR and EU Cookie Law, CCPA, LGPD, and other privacy laws. Trusted by over 85,000 clients in 100+ countries and suitable for all types of businesses – from simple blogs and e-commerce platforms to enterprise websites. iubenda’s software solutions allow creating legal documents like privacy and cookie policies, and terms and conditions, displaying cookie notices, managing consent and handling internal privacy across various countries and in multiple languages. The solutions are self-updating, responsive and cover multiple legislations, in 9 languages from a single central dashboard. Customer support is currently offered in English, Italian, German, Spanish, Portuguese and French.

See how it works!

===

Caffeinated Energy Bars - Verb Energy

Skip the overpriced lattes. Organic Green Tea in a plant-based bar that’s perfectly pocket-sized and ready to unwrap anytime, anywhere. Over 3000 5-star reviews.

5 BARS FREE

===

Softr lets you stop waiting for developers. Build software without devs. Blazingly fast. Trusted by 100,000+ teams worldwide

Start building now.

===

Michael G. Lortz

Cyber Exercise Designer | MBA, Process Development | Intelligence | Trainer | Author | Mentor | Active Clearances

1 年

In Florida, no-contact or restraining orders are only if there is an imminent threat. Harassment is not seen as an imminent threat. There was also recently a Supreme Court case in which a harasser's communication was deemed "free speech" as long as it didn't threaten the victim.

要查看或添加评论,请登录

Bidemi Ologunde的更多文章

  • The Expansion of Public Preschools and the Scarcity of Early Childhood Educators

    The Expansion of Public Preschools and the Scarcity of Early Childhood Educators

    The expansion of public preschools in the United States, particularly children from infancy to age 4 or 5, is a growing…

  • Shadow Games: Financial Espionage in New York City

    Shadow Games: Financial Espionage in New York City

    Spoofed Certificates, a Slacking Vendor, and the Initial Dismissal of a Critical Threat On January 3, 2024, TAP Air…

  • An 'Unusual Activity' Alert: A LastPass Fallout

    An 'Unusual Activity' Alert: A LastPass Fallout

    A Password Vault Breach Investigation at an High-Brow Atlanta Law Firm On Monday, November 6, 2023, shortly after 7:00…

  • The Inadvertent Insider: A Target of Opportunity

    The Inadvertent Insider: A Target of Opportunity

    How public expressions of workplace dissatisfaction led to a spear-phishing email, a watering hole attack, and tough…

  • Cloudy with a Chance of Unusually High Bills

    Cloudy with a Chance of Unusually High Bills

    A sanitized war story about credential stuffing attacks involving a high-profile cloud service account used for…

  • Second-Order Consequences

    Second-Order Consequences

    An ad-hoc, all-hands-on-deck, in-person-only briefing in New York City. In a previous life, “Ryan” worked as an…

  • Geopolitics: Electronic Warfare

    Geopolitics: Electronic Warfare

    The Incident On Wednesday evening, March 13, a Royal Air Force plane carrying UK Defence Secretary Grant Shapps…

  • Geopolitics: Haitian Crisis

    Geopolitics: Haitian Crisis

    The ongoing crisis in Haiti represents a confluence of deep-rooted political, socio-economic, and security challenges…

  • Insider Threat Attacks

    Insider Threat Attacks

    Recently, insider threat attacks have ramped up significantly, underscored by the recent indictment of former Google…

  • Little Bids & Pieces #13

    Little Bids & Pieces #13

    Claude 3.0 Artificial intelligence (AI) is experiencing a monumental shift with the recent release of Claude 3.

    1 条评论

社区洞察

其他会员也浏览了