Table of Content:

Online stalking is a severe criminal offense. Any perpetrator can go after anyone’s entire online activity, or even pursue them in real life to keep track of their action, only to harass them through different electronic media.

The Case

Our client, Susan (pseudonym), had a stalker that she could not get rid of at any cost.

Victim of Online Harassment can get depressed

The life of a school teacher can be quite difficult, as it already is. With the invasion of her personal life by an incessant stalker, her life was in complete shambles from the relentless approach this stalker made.

But even when he was as relentless as he was, he never saw the fault in his actions.

It all started one school morning when she was getting ready to go in. Every morning on a work day, there are lots of details she can either miss or things that can go wrong. Among all these overwhelming factors, there was the commotion that sent a shiver down her spine.

It was a rather simple text message, but it was the context of the message that shocked her to the core. It said something to the effect of “I know what you did yesterday evening.”.

A school teacher’s life is full of activities, and there’s very little room for personal events. So even when they take place, Susan always makes secrecy her utmost priority. But the level of detail the message contained convinced her that her alone time was not so secret anymore.

Once the shock had settled in, it kept coming. The advancement of the stalker did not stop. The entity continued to reach out to her in an invasive manner, like clockwork.

The entity would send her highly inappropriate messages at the most sensitive hours. Receiving a message like that can put her mental state in complete jeopardy.

But it just didn’t stop with text messages. The situation escalated even further when she started receiving photos or videos that would scare the daylight out of her soul.

Susan was traumatized, depressed, and scared at this point, and her first course of action was to go to the police and describe at length how her private life was being invaded without her consent, and there was nothing she could do about it.

But to make matters even worse, even after witnessing all the evidence, the police didn’t seem to care at all. They gave her the obvious verdict that it must have been some prankster or an estranged ex-boyfriend who was not very happy about them both splitting up. To them, online harassment was a petty and insignificant case.

At this point, Susan was hit with paranoia. She started doubting everyone she could think of, including most of her colleagues. But since there wasn’t substantial evidence to support her suspicions, as a result, her hands were tied in terms of taking any action.

At this point, the stalker reached the peak of harassment they could inflict on Susan. The messages wouldn’t stop, the images and videos would flood her inbox, and calls would startle her with weird, startling voices from different numbers each time. All these numbers were either from within the state she lived in or from the outside.

It was clear at this point that whoever was behind all of this, clearly did his homework, and he was putting it all to good use in the vilest manner imaginable.

Her physical and mental health started to crumble, and her family and relatives even encouraged her to leave the state. But she knew that even if she ran, all this wouldn’t stop. So she decided to face her problems once more and went to the police again.

This time, the police could see the effects of exhaustion and stress on her body, and yet they turned a blind eye to the whole thing. There were a lot of empty promises and good wishes, but nothing was done to resolve the conundrum she was in.

After getting no help from law enforcement and other family and relatives, she showed up at our doorstep for a solution.

There seemed to be no escape from this torment. Her family and relatives asked her to leave the state. But she wasn’t the type to run away to hide from her problems. She went to the police again.

The police saw the dark circles under her eyes and held on to their previous decision to just brush her pleas off as though they were nothing. All she was given were good wishes and empty promises. With almost all doors shut on her face and continued online harassment from the unknown stalker, she turned to us.

Solution

Unlike the law, we took her story very seriously and went through all the pieces of evidence she had on her mobile device. Our team of experts decided the best method of action to be a collaboration between Digital Forensic Services and OSINT Investigation.

Digital Forensics

Since the whole case started with text messages, we started to look for patterns within the sending time and mannerisms of the text messages themselves.

   

Then came along all the images and videos sent by the perpetrator. No matter what kind of data has been sent over the internet, it always leaves one sort of virtual trace or another. We traced the possible leads, leading us back to one single IP address that was used the most frequently when sending these files and messages.

OSINT Investigation

Under the laws of open source intelligence, all publicly available information is completely free for use by the finder of said information.

We contacted a lawyer who specializes in online harassment and open-source intelligence laws. In a court of law, virtual data like this can be counted as admissible evidence, and that’s exactly what we did.

Through OSINT, we didn’t just have an IP address in our hands. We had a definite permanent address, the identity of the perpetrator, and enough evidence to get him persecuted in a court of law.

The Result

Through our detailed investigation, we managed to narrow down the suspect and send them a fair warning over several emails.

These emails detailed the ramifications of his nefarious actions while warning him of the consequences if he chooses to continue what he’s doing.

The effort made by our entire digital forensics and OSINT teams paid off. The stalker was scared to the point he removed his online presence completely, and all the instances of harassment stopped forever.

RELATED POST
...
WHAT IS CRYPTOJACKING AND HOW…

Cryptojacking refers to the unauthorized use of a person’s or group’s processin…

...
A TROJAN'S TRAP UNRAVELED: RE…

Our victim here is MR. M, who had checked his emails one night before going to …

...
PRIVACY COMPROMISED: UNCOVERI…

Where you socialize, that’s where they hit hard. We secure your social media an…

...
IT INFRASTRUCTURE AUDIT- PROT…

Vulnerability exposed attacks are not uncommon in today’s world. To remain upda…

Get Updates

Sign up to receive the latest news