Catch Your Cyberstalker: Track and Trace Your Cyberstalker
It is imperative if you’re being cyberstalked to SAVE all evidence so that you can build a case against the person harassing and threatening you. It’s important that you don’t delete evidence. Instead, you’ll want to take screen shots, print all messages, and save harassing emails or voice mail messages.
If someone is cyberstalking you it is important that you save the evidence. Saving evidence means
printing out harassing emails (along with the full email header).
taking screen shots of all harassing emails.
printing out harassing instant messages and private messages.
taking screen shots of harassing instant messages and private messages.
saving harassing text messages (don’t delete them).
note dates and times of all harassment on paper.
keep all harassing and threatening letters and make copies of the letters.
keep all harassing and threatening voice-mail messages and phone numbers (don’t delete them).
saving harassing messages or defamatory messages about you on social networking sites (e.g., Twitter, Facebook, etc.)
printing harassing messages or defamatory messages about you on social networking sites (e.g., Twitter, Facebook, etc.)
taking screen shots of all harassing messages or defamatory messages about you on social networking sites. Make sure to report abuse to the site administrator: Write down the profile URL of cyberstalker, bookmark profile page, save and print messages.
Once you have all this evidence you can present it to your local authorities or a lawyer.
If your cyberstalker is stalking you anonymously (harassing you using a username) you may sometimes be able to track the person down. You may even be able to lure your cyberstalker to you on your own turf to discover their IP address (An Internet Protocol address). To do this you should set up a personal website by registering a domain name privately and obtaining Web hosting. NameCheap.com and Godaddy.com are good places to check out. Post the address to your new site on all of your social networking profiles. Your site name could be whatever you choose. Set up a blog — preferably WordPress on your domain — and create blog posts. You may even install WordPress easily by obtaining Cpanel Web hosting and installing WordPress via Softaculous. Make sure to make it known that you own the website and are the one blogging. Also, make sure blog comments are turned on. You may want to set comments into moderation mode so that way the comments won’t be published to the public right away unless you approve it.
Now wait for him or her to send harassing messages via your blog comments. The WordPress panel logs all the IP address of all users who submit comments. Print out the harassing messages along with the IP address and save this as evidence. Don’t delete the comments. Leave all the comments in moderation mode. You now have an IP address that can be traced back to the cyberstalker. Take this evidence with you to the authorities or present them to your lawyer.
Before creating your blog:
make sure your computer is free from viruses.
carefully fill out your domain name registration details & make sure that you’re indeed registering it privately.
hire outside help if you need someone to set up your blog.
once you’ve set up your blog don’t reply via your blog comments to your cyberstalker.
don’t engage with your cyberstalker via email ever.