Cyberstalking Services

What is Cyberstalking?Cyberstalking

The Canadian Department of Justice states “the terms cyberstalking and online harassment are often used to refer to three types of activities: direct communication through e-mail or text messaging; Internet harassment, where the offender publishes offensive or threatening information about the victim on the Internet; and unauthorized use, control or sabotage of the victim’s computer”.

Cyberstalking is an electronic means of harassment which causes a person to have a reasonable fear for their life or their safety.  Victims may experience anxiety, fear, changes in sleeping and eating patterns, shock, and disbelief - all of which can be disabling to the victim. Statistics state that a large portion of stalkers know their victim; the majority of stalkers are men, and the victims women. A cyberstalker’s intent is to harm the victim emotionally, sociology, financially, etc. leaving the victim devastated from the torture and abuse, and quite often no friends or family to turn too.


Cyberstalking Criminology

Criminology refers to the scientific behavioural study (sociology and psychology) of the nature, causation, correction and prevention of a crime.  It’s about theories that suggest why crimes are committed.  Cyberbullying and cybestalking  crimes are committed with the use of technology, typically through the internet; therefore, an understanding of the differences between societies and cultures plays a role in determining what is criminal activity and what is not. Criminology is also concerned with the social impact and reactions to the crime from the public, as well as from the criminal.


Cyberstalking Victimology

Victimology  is the  in-depth study of all information related to the victim.  This not only refers to physical characteristics (sex, age, height, weight, etc.) but personal traits (education, employment, residence, etc.) and information on their lifestyle (habits, hobbies, medical history, family, etc.).  Determining the victim’s characteristics can assist investigators in identifying and revealing a cyberstalker and why they chose a specific victim, as well as the risks the offender is willing to take to stalk the victim.  It’s this stage in an investigation where the victim-offender relationship is established and determination of where additional digital evidence may be discovered.


Our Techniques and MethodologyInfoTransec Lock

At InfoTransec, we have developed Standard Operating Procedures (SOP) for the acquisition, authentication, and analysis of digital evidence (AAA) following criteria specified by the Scientific Working Group on Digital Evidence (SWGDE) as well as, following International Organization on Computer Evidence (IOCE) principles. 

Digital evidence begins with the acquisition of information and/or physical items collected or stored for examination purposes. At InfoTransec, the acquisition of data is the first stage of a proper and successful investigation.  We use standard tools that can intercept the communications between an alleged victim and their cyberstalker.  The information collected can be emailed to the parents if the victim is a minor or directly to the victim’s email account.

Our expert Digital Investigation (DI) team can then authenticate the evidence acquired directly from live or offline devices following computer forensics rules and regulations resulting in fully admissible digital evidence investigation and report in any North American justice system. We are well established to undertake any type of investigation you require.

Our services are ideal for clients including:
  • Private Individuals
  • Legal Firms
  • Government Services including Police and education
  • Human Resources Departments
Contact us today for a free consultation.