cyberstaliking examples

Cyberstalking Examples: Stalking generally involves harassing or threatening behavior that an individual or group engages in repeatedly targeting a victim(s). Cyberstalking is the same, but includes the methods of intimidation and harassment via information and communications technology. Cyberstalking consists of harassing and/or tormenting behaviors in the form of:

  • I. Electronic messaging such as classic emails, text messages and Twitter.
  • II. Spamming and/or sending threatening emails to the victim or victim’s family, friends or co-workers.
  • III. Posting the victim’s personal information such as name, address, phone numbers, and e-mail address online.
  • IV. Posting offensive comments in the victim’s name.
  • V. Creating and posting sexually explicit images of the victim or victim’s loved ones.
  • VI. Hacking into the victim’s computer, accounts and mobile devices.
  • VII. Subscribing the victim to pornography sites and unwanted advertising.
  • VIII. Attaching spyware to emails or installing it on the computer.
  • IX. Setting up websites that threaten the victim or encourage others to contact, harass or harm them.
  • X. Computer Monitoring Software, or “SpyWare,” allows a cyberstalker to monitor computer and Internet activities and discover a victim’s efforts to escape or access help. This software can be installed remotely or by physically accessing the victim’s computer.

Most stalking laws in the United States require the offender(s) to make a credible threat of violence against the victim. In addition to directly threatening the victim with harm, family members who are threatened may also be grounds for arrest. Depending on state laws, the alleged stalker’s course of conduct can constitute an implied threat. The National Center for Victims of Crime is a dedicated association, which can assist locating and defining state stalking laws and how to proceed.

While some stalking and cyberstalking conduct involving annoying or bothersome behavior falls short of illegal stalking, these behaviors may be a prelude to more intense stalking and violence. The goal is to treat these actions as serious and not to minimize. Although these behaviors could be defined as harassment, the time to become proactive is when knowledge of these actions becomes apparent.

Cyberstalkers are often motivated by negative emotions or serious psychological factors. Psychiatric illness, obsession fixations, revenge, hate, anger and jealousy are common affective states fueling the cyber stalker. At times, the victim may not even know or ever met the cyberstalker indicating another red flag of alert. Once aware of any indication of harassment or stalking has been initiated, the immediate next step is contacting local authorities. Although contacting local authorities may sound overblown or drastic, the potential outcome of not doing so may be far worse.

The methods the cyberstalker engages in ranges from novice to advanced. The more advanced they are in new electronic technology, the more proficient they become at targeting their victim. One of the methods few victims are aware of used by the cyberstalker is called cyber or digital surveillance. Cyber surveillance has both positive and negative applications. In the wrong hands, cyber surveillance can be deadly.

Credit for this article goes to and the full article is here. In 1999 Doc became the first Tampa Bay Area used car dealer to offer cars for sale on eBay. But soon afterword the new venue became infested with used car scams.

Members were taught to trust their trading partners which was the principal the venue was founded under. European scammers stole photos and descriptions from legitimate sellers and created scam listings at unrealistically low prices. The carnage began!

cyberstalking of docsquality cars ebay motors deadbeat bidder car scam example
Deadbeat bidder on John Schneider’s (Bo Duke) the General Lee 1969 Dodge Charger. Deadbeat bidders turned eBay into the laughing stock of Wall Street.

The scams got so bad company forums were loaded with fraud complaints that moderators deleted. In 2004 Doc registered the domain (ebms) to warn consumers about car scams and to verify the legitimacy of any online vehicle transaction. EBMS was probably not the best choice for the sites domain, but sucks sites were common in those days. So here it is 16 years later and EBMS is still online, though it’s been a battle keeping it that way! 😥

The site was hacked, cracked, ddosed, and WordPress was SQL Injected altering keywords so search would not index them. Right about 2013 Doc’s hobbyist webmaster skills improved and he was fending the hackers off. But when his website became difficult to hack, the smear campaign was launched targeting his excellent eBay sellers feedback. He was accused of selling stolen cars and rolling back odometers. Rumor was spread that he was kicked off the marketplace because he was a scammer!

This website shares Doc’s story how eBay Inc allegedly targeted him with a cyberstalking smear campaign that’s still ongoing 8 years later. We’ve all read the DOJ Complaint how 6 former eBay executives and their team members went after a blogger and her husband in Natick MA. Believe me the Natick eBay arrests are merely the tip of the iceberg that sank the Titanic, and should take eBay Inc down with it. What they have done to Doc is well documented on this domain as well as here and here.

In closing, it’s nobody’s fault but theirs they screwed the most trusted motor vehicle trading venue into the ground. Doc warned consumers to beware of fraud and has paid heavily for his efforts. Had execs listened to their trustworthy sellers eBay Motors would by now be the only trustworthy venue to trade vehicles on worldwide!