{"id":6093,"date":"2023-05-01T12:46:58","date_gmt":"2023-05-01T16:46:58","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=6093"},"modified":"2025-08-27T13:35:13","modified_gmt":"2025-08-27T13:35:13","slug":"what-to-do-if-you-are-being-stalked-or-harassed","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/","title":{"rendered":"What to Do if You are Being Stalked or Harassed?"},"content":{"rendered":"<p>Being stalked or harassed is one of the most unnerving experiences one can have. The sense that someone is always watching you is enough to push you to your mental limits. Many victims experience immense, long-lasting emotional and psychological harm. With the internet, anyone can get a front seat to another person\u2019s life \u2014 with or without their knowledge. Whether it occurs in person or virtually, knowing how to protect yourself and your loved ones is essential. Keep reading for our analyst\u2019s advice on what to do if you are being stalked or harassed.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Three_Signs_That_You_Are_Being_Stalked_or_Harassed\"><\/span>Three Signs That You Are Being Stalked or Harassed<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Being stalked and harassed isn\u2019t something that can be ignored. There comes a point where a person passes a line between genuine curiosity to obsessive behavior. You should be alarmed if someone constantly contacts you and crosses boundaries that make you feel unsafe. Here are three signs that can indicate stalking and online harassment.<\/p>\n<ol>\n<li><strong>You\u2019re receiving unwanted attention.<\/strong> One significant sign of stalking or harassment is receiving unwanted attention. This could come through phone calls, texts, emails, social media messages, or in-person visits. If you\u2019re receiving constant contact from someone that makes you feel uncomfortable or scared, that is a red flag.<\/li>\n<li><strong>Your privacy is being invaded.<\/strong> Another sign that you may be the victim of stalking or harassment is if your private life is being invaded. This could mean someone going through your mail, following you, or even breaking into your home.<\/li>\n<li><strong>You\u2019re feeling emotional distress.<\/strong> Being stalked and harassed is detrimental to the victim\u2019s wellbeing. Their sense of security and trust can be completely destroyed. Many victims describe constantly feeling fearful, stressed, or anxious, always wondering if a particular person is watching them.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"What_to_Do_if_You_Are_Being_Stalked\"><\/span>What to Do if You Are Being Stalked<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Being stalked online or in person is a terrifying prospect. Victims often feel like they have no safe space \u2014 even within their own home. However, there is help available and a path to regain your freedom. Our experts suggest you take the following course of action.<\/p>\n<ol>\n<li><strong>Take threats seriously:<\/strong>\u00a0If you are being stalked or harassed, you should always handle it seriously. Do not ignore or dismiss any threat, no matter how insignificant it may seem. Keep a record of all threats and report them to the authorities. It\u2019s best to inform your family, friends, and colleagues about the harassment you\u2019ve endured. They can help keep an eye out for you and your safety.<\/li>\n<li><strong>Document everything:<\/strong>\u00a0Keep a detailed record of everything, including dates, times, locations, and descriptions of the incidents. If possible, take photos or videos of the stalker or harasser. Save any messages, emails, or letters they send you. This documentation can help law enforcement build a case against the perpetrator.<\/li>\n<li><strong>Seek help:<\/strong>\u00a0You do not have to deal with a stalker or harasser alone. Seek help from law enforcement, victim advocates, mental health professionals, and cybersecurity experts. These professionals can provide emotional support and guidance on handling the situation.<\/li>\n<li><strong>Protect yourself:<\/strong>\u00a0Take action to distance yourself from the stalker or harasser. This may include changing your routine or location, securing your home and workplace, and avoiding contact with the perpetrator. You may also want to carry a self-defense tool, such as pepper spray.<\/li>\n<li><strong>Learn about legal options:<\/strong>\u00a0Legal options are available to victims of stalking and harassment. For example, you may be able to obtain a restraining order against the perpetrator. Understand your rights and the <a href=\"\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/#What_are_Your_Legal_Options_to_Stop_Harassment\">legal options available to you<\/a>. Consulting legal counsel may help you navigate the landscape.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"How_to_Protect_Yourself_Online\"><\/span>How to Protect Yourself Online<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>One of the most critical steps to protect yourself from\u00a0<a href=\"\/blog\/harassment\/how-to-report-cyber-harassment\/\">cyber stalking<\/a>\u00a0is securing your online personal data. Taking preventative measures before a threat arises can help you avoid falling victim. Here are some precautions our experts suggest.<\/p>\n<ul>\n<li><strong>Lock Down Your Accounts: <\/strong>Unless you\u2019re using your account for business, it\u2019s best to set it to You should vet the users you accept follow requests from. Update your passwords regularly and use unique passwords for each account. You should also enable two-factor authentication (2FA) when it\u2019s offered.<\/li>\n<li><strong>Avoid Oversharing Online: <\/strong>Stalkers do their homework on their victims. Any personal information you share online could be manipulated by a bad actor. Avoid sharing posts that display your travel habits, place of employment, or other identifiable information.<\/li>\n<li><strong>Report Suspicious Behavior: <\/strong>Cyberstalking often begins with interactions that aren\u2019t outright harmful. They may like and comment on all your posts in a non-threatening way. However, if something feels off, you should trust your gut and report it.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Real-Word_Case_of_Being_Stalked_and_Harassed\"><\/span>Real-Word Case of Being Stalked and Harassed<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Looking back at previous cases can help victims who are being stalked and harassed in a number of ways. First of all, it can help remove some of the stigma and isolation knowing that others have overcome similar circumstances. Furthermore, we can learn from the tactics used in these schemes \u2014 and the responses of the victims.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"16-year_Stalking_Scheme\"><\/span>16-year Stalking Scheme<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>From 2008 to 2024, a Massachusetts man named <a href=\"https:\/\/www.justice.gov\/usao-ma\/pr\/serial-cyberstalker-who-terrorized-women-16-years-sentenced-nine-years-prison\" target=\"_blank\" rel=\"noopener\">James Florence Jr.<\/a> stalked and harassed over twelve female victims, including two minors. His attack was fueled by AI, using digitally altered pictures and AI chatbots to impersonate the victims online.<\/p>\n<p>In one case, Florence Jr. posed as a university professor he\u2019d met in person through a mutual contact. He programmed chatbots to respond with her real information, such as her employment records, family, and home address. The chatbots would even invite men over, multiple of which showed up at the victim\u2019s home.<\/p>\n<p>Florence Jr. created over 60 profiles on nearly 30 platforms to carry out the scheme. He often posted collages of digitally altered explicit images of the victims with all their personal information attached.<\/p>\n<p>In April 2025, Florence Jr. pled guilty to seven counts of cyberstalking and one count of possession of child sexual abuse material (CSAM). He was sentenced to nine years in prison with an additional 10 years of supervised release. This case shows just how easy cyberstalking can be with modern technology.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"eBay_Stalking_Scandal\"><\/span>eBay Stalking Scandal<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>In 2019, <a href=\"https:\/\/www.justice.gov\/usao-ma\/pr\/final-defendant-ebay-cyberstalking-case-sentenced\" target=\"_blank\" rel=\"noopener\">eBay employees<\/a> conducted a campaign to stalk and harass the owners of the e-commerce blog EcommerceBytes. The scheme was carried out in response to critical coverage of eBay that executives viewed as a threat to business.<\/p>\n<p>The executives conjured up a three-part plan: mailing threatening packages, harassment on social media, and in-person stalking. Items sent to the couple included a bloody pig mask, live insects, and a book on losing a spouse.<\/p>\n<p>eBay\u2019s plan was to then step in as a \u201cwhite knight\u201d and help the couple investigate the harassment. However, things unraveled when the license plate of a rental car used for the stalking was photographed. The car rental was tied back to an eBay employee, and an investigation ensued.<\/p>\n<p>Ultimately, seven employees were fired and charged for their role in the stalking scheme. CEO Devin Wenig and CCO Steve Wymer were not charged, but the couple are seeking litigation against them. eBay paid $3 million in the criminal case.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Get_the_Help_You_Need_to_Stop_Being_Stalked\"><\/span>Get the Help You Need to Stop Being Stalked<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Having your every move watched is a horrifying experience that can impact your life in many ways. If you are going through this, your response is critical. Document everything, seek help, protect yourself, and learn about your legal options. You do not have to face this alone. Reach out for help and support. You have every right to live without the fear and stress of being stalked or harassed.<\/p>\n<p>And if you need any help responding to being harassed or stalked, you can count on <a href=\"\/contact-us\">Digital Forensics Corp<\/a>. Reach out to us anytime to speak with one of our specialists and plan your next step.<\/p>\n","protected":false},"excerpt":{"rendered":"Being stalked or harassed is one of the most unnerving experiences one can have. The sense that someone&hellip;","protected":false},"author":131,"featured_media":12080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[769],"tags":[],"class_list":{"0":"post-6093","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-harassment","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Being Stalked? Expert Advice to Stay Safe<\/title>\n<meta name=\"description\" content=\"Being stalked? Read expert advice on spotting signs, protecting yourself, and finding support when you need it most.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Being Stalked? Expert Advice to Stay Safe\" \/>\n<meta property=\"og:description\" content=\"Being stalked? Read expert advice on spotting signs, protecting yourself, and finding support when you need it most.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-01T16:46:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T13:35:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2023\/05\/Are_You_Being_Stalked_-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jack Gillespie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Being Stalked? Expert Advice to Stay Safe\" \/>\n<meta name=\"twitter:description\" content=\"Being stalked? Read expert advice on spotting signs, protecting yourself, and finding support when you need it most.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2023\/05\/Are_You_Being_Stalked_.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Gillespie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/\"},\"author\":{\"name\":\"Jack Gillespie\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\"},\"headline\":\"What to Do if You are Being Stalked or Harassed?\",\"datePublished\":\"2023-05-01T16:46:58+00:00\",\"dateModified\":\"2025-08-27T13:35:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/\"},\"wordCount\":1294,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Are_You_Being_Stalked_.jpg\",\"articleSection\":[\"Resources for Victims of Internet Harassment\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/\",\"name\":\"Being Stalked? Expert Advice to Stay Safe\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Are_You_Being_Stalked_.jpg\",\"datePublished\":\"2023-05-01T16:46:58+00:00\",\"dateModified\":\"2025-08-27T13:35:13+00:00\",\"description\":\"Being stalked? Read expert advice on spotting signs, protecting yourself, and finding support when you need it most.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Are_You_Being_Stalked_.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Are_You_Being_Stalked_.jpg\",\"width\":2560,\"height\":1120,\"caption\":\"Being Stalked\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/what-to-do-if-you-are-being-stalked-or-harassed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources for Victims of Internet Harassment\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What to Do if You are Being Stalked or Harassed?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\",\"name\":\"Jack Gillespie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"caption\":\"Jack Gillespie\"},\"description\":\"Cybercrime Writer & Awareness Advocate \\\"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\\\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \\\"Sextortion Awareness for Children\\\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jack-gillespie-21aa85222\\\/\"],\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/jack-gillespie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Being Stalked? Expert Advice to Stay Safe","description":"Being stalked? Read expert advice on spotting signs, protecting yourself, and finding support when you need it most.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/","og_locale":"en_US","og_type":"article","og_title":"Being Stalked? Expert Advice to Stay Safe","og_description":"Being stalked? Read expert advice on spotting signs, protecting yourself, and finding support when you need it most.","og_url":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2023-05-01T16:46:58+00:00","article_modified_time":"2025-08-27T13:35:13+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2023\/05\/Are_You_Being_Stalked_-1.jpg","type":"image\/jpeg"}],"author":"Jack Gillespie","twitter_card":"summary_large_image","twitter_title":"Being Stalked? Expert Advice to Stay Safe","twitter_description":"Being stalked? Read expert advice on spotting signs, protecting yourself, and finding support when you need it most.","twitter_image":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2023\/05\/Are_You_Being_Stalked_.jpg","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Jack Gillespie","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/"},"author":{"name":"Jack Gillespie","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba"},"headline":"What to Do if You are Being Stalked or Harassed?","datePublished":"2023-05-01T16:46:58+00:00","dateModified":"2025-08-27T13:35:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/"},"wordCount":1294,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2023\/05\/Are_You_Being_Stalked_.jpg","articleSection":["Resources for Victims of Internet Harassment"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/","url":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/","name":"Being Stalked? Expert Advice to Stay Safe","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2023\/05\/Are_You_Being_Stalked_.jpg","datePublished":"2023-05-01T16:46:58+00:00","dateModified":"2025-08-27T13:35:13+00:00","description":"Being stalked? Read expert advice on spotting signs, protecting yourself, and finding support when you need it most.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2023\/05\/Are_You_Being_Stalked_.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2023\/05\/Are_You_Being_Stalked_.jpg","width":2560,"height":1120,"caption":"Being Stalked"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/what-to-do-if-you-are-being-stalked-or-harassed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources for Victims of Internet Harassment","item":"https:\/\/www.digitalforensics.com\/blog\/harassment\/"},{"@type":"ListItem","position":3,"name":"What to Do if You are Being Stalked or Harassed?"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba","name":"Jack Gillespie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","caption":"Jack Gillespie"},"description":"Cybercrime Writer & Awareness Advocate \"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \"Sextortion Awareness for Children\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.","sameAs":["https:\/\/www.linkedin.com\/in\/jack-gillespie-21aa85222\/"],"url":"https:\/\/www.digitalforensics.com\/blog\/author\/jack-gillespie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=6093"}],"version-history":[{"count":5,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6093\/revisions"}],"predecessor-version":[{"id":12082,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6093\/revisions\/12082"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/12080"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=6093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=6093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=6093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}