Information & Advice
Anti Stalker Checklist
Step 1: Introduction, Pre-checklist If you are a helper or a target seeking help from a helper, the first step is to follow this protocol for general communication. If your phone or device is suspected to be wiretapped, do the following:
- At the very beginning of the call: do not discuss at that moment whether or not the line is tapped.
- If the partner or person on the call brings it up, redirect away from this topic as the tapper will overhear.
- At the very beginning of the call: do not discuss at that moment whether or not the line is tapped.
- If the partner or person on the call brings it up, redirect away from this topic as the tapper will overhear.
How Can I Help?
If you know someone who is being targeted, try your best to show unconditional support and comfort for them. Victims of both cyberstalking and stalking in general will need someone the most to be there for them in hard times. Always reach out and check in on them to see how they are doing and coping with the situation.
How Do I Notice Signs of a Victim of Stalking/Cyber-stalking?
Signs from victims of stalking often consists of anxiety, paranoia, being or acting tense, and nervousness. Most victims of stalking can be diagnosed with depression, anxiety, guilt, helplessness, shame, and PTSD (Post Traumatic Stress Disorder).
How Do I Protect My Device?
Cybersecurity is common and easily attainable nowadays. Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. Some of the available options to ensure the protection of private information on devices are:
1. Use a firewall.
2. Install an anti-virus program.
3. Install an anti-spyware package.
4. Use complex passwords.
1. Use a firewall.
2. Install an anti-virus program.
3. Install an anti-spyware package.
4. Use complex passwords.