How to Free Yourself from Cell Phone Stalkers

By on May 21, 2008

Although there is no universally accepted definition of cyberstalking, the term is used to refer to the use of the Internet, e-mail, or other electronic communications devices to stalk another person.

blinds

Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, e.g., following a person, appearing at a person’s home or place of work, making harassing phone calls, leaving harassing messages or objects, or vandalizing a person’s property.


Stalkers (who are more like “cyber-bullies” and less like “griefers”) are becoming more brazen — leaving threatening cell phone messages, explaining what the families are wearing and doing at the time — all in freaky, guttural voices. Turns out, it’s all technically feasible (although illegal, of course), and police are investigating.

It sounds like a horror movie, but innocent families have literally been terrorized in their own homes by groups of anonymous hackers.

Just imagine someone (using sophisticated technology) being able to see everything you do, listen to everything you say, and use that information to threaten your childrens’ lives! For sisters, Darcie Price and Heather Kuykendall, this is no horror movie; indeed, it’s been a campaign of technological terror that they say has been all too real . . .

The two sisters recently shared their story with viewers of The Morning Show, a video of which is provided below:

The messages they’ve received demonstrate that the caller has come to find out what their families are doing at a moment’s notice, what they’re wearing, and as you heard in the video, they’ve gone so far as to threaten school shootings and killing family members and pets!

The Kuykendalls say they got these calls almost every day, and they appear to come from the cell phone of the Kuykendall’s 16-year-old daughter, Courtney.

They believe their cell phones, as well as those owned by other families, have been taken over and the cell-phones’ cameras mysteriously turn on and off. While the mystery of the Kuykendall family’s cell phone experience hasn’t been fully explained, it has left most people convinced that such events are indeed possible.

Abusive people are often controlling and want to know your every move. You don’t need to be a computer programmer or have special skills to monitor someone’s computer and Internet activities – anyone can do it and there are many ways to monitor with programs like Spyware, keystroke loggers and other hacking tools, many of which are found free of charge on the internet.

Still, parents and teens alike, who are educated about cyber-bullying, stand a far lesser chance of being victimized. Contrary to common belief, a lot of bullies don’t suffer from low self-esteem — quite the opposite . . .

About

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>