You are on page 1of 3

Social Networking Sites: A Bonanza for Stalkers?

“Vengeance will be mine...,” educational backgrounds; fa- control access to specific infor-
declared a defiant message on vorite books, movies, and mu- mation (and members actually
MySpace.com. “I should have sic; and relationship status. exercise those options), every-
killed you all when I had a gun Others sites promote business, thing posted on a profile may
and some drugs.” This violent activism, networking, counsel- be visible
monologue, one of several ing, socializing, or many types
to all site visitors. Most sites
postings on the writer’s site, of recreational interests. Sites
require members to agree to
threatened his ex-wife, who such as MySpace, Facebook,
terms of proper conduct, but
had fled the state to escape his Friendster, and Xanga have at-
enforcement of such terms is
abuse. In postings on other tracted millions of members,
sporadic and often depends on
sites, he demanded photos of particularly among teenagers
members to report violations. 2

his family and warned that if he and young adults.


didn’t get to see the kids, “it
isn’t going to be real good, be- Links to Stalking
cause I’m gonna see them How Do They Work?
whether you let me or not.” The attractions of social net-
On many social networking working—access to an ever-
The increasing use of MySpace sites, anyone with a computer widening world of “friends”—
to threaten and stalk victims and Internet access can be- can lead users to overlook the
raises many important ques- come a member. Some sites pitfalls of these sites. Young
tions. Do social networking require only an e-mail address, people, in particular, may tend
sites enable stalking? What and many sites have no system to view such sites as “part of
recourse do victims have when to verify the validity of infor- their own little world,”3 not a
these sites are used to stalk? mation that registrants provide. public bulletin board with mil-
And what tools can help block A few sites, including MySpace lions of other visitors. They
the use of these sites to stalk?1 and Friendster, have minimum may not recognize that posting
age requirements (14 and 16, personal information may lead
respectively) although these to contacts from sexual preda-
What Are Social Networking sites have no reliable method tors, identity theft, fraud, or
Sites? to verify a user’s age. Once a stalking—or that anyone could
member, anyone can post per- post a bogus profile to dispar-
Social networking sites such as
sonal information, images, mu- age, misrepresent, harass,
MySpace and Facebook are vir-
sic, or other data on their Web threaten, or embarrass them.3
tual communities where people
pages, depending on the site’s
with mutual interests meet on-
features. On many sites,
line to share information and
members select a circle of Cases
build relationships. Site visi-
“friends” who can post mes-
tors can chat, debate, network, Several recent cases suggest
sages on their profiles, add
and socialize. On many sites, how stalkers and predators are
comments, or access pages not
members may post details beginning to use social net-
visible to other users. Unless
about themselves—photos; working sites In the months
the site allows members to
Page 2 www.ncvc.org/src The Source

the Virginia Tech massacre, the children, or income. Although mails, chats, instant messages,
shooter, Seung-Hui Cho, alleg- most of these questions are keystrokes, passwords, and
edly used Facebook to locate optional, users may automati- Web sites visited.
and stalk female classmates. cally answer them because
In July 2007, authorities in Lor- Legal Recourse
they are using the site to meet
ager, Louisiana, arrested a 17- other people. On many sites, Stalkers who use social net-
year old for stalking and cyber- all these answers go “public,” working sites as part of a pat-
stalking another teenage boy. remaining open to anyone who tern of stalking may be subject
The alleged stalker’s MySpace uses the site. Stalkers may to criminal charges. For exam-
page featured a video of the use such information to gain ple, someone who repeatedly
accused pistol-whipping an- access to site members. follows and tracks a victim in
other boy posing as the victim. her car, as well as posts a lewd
Many social networking sites
In 2006, a University of Kansas photo of the victim on a social
(e.g., Stalkerati) also have
student received death threats networking site, can be
search tools that can simulta-
from someone who found her charged with the crime of
neously pull personal informa-
class schedule on-line. He stalking. Also in many states,
tion about the same person
posted photos from the victim’s cyberstalking statutes enable
from a number of different
MySpace account on his own prosecutors to charge those
sites, including MySpace,
site, along with insults about who use technology to stalk
Friendster, Flickr and Google.
her appearance and her major. and harass their victims. Other
A recently shut-down site
Also last year, National Public states have general stalking
called fbstalker.com tracked
Radio’s Veronica Miller discov- laws that define ‘pattern of
changes in the profiles of users’
ered “Becky,” a MySpace conduct’ broadly enough to
friends while saving copies of
“cyber twin” who had copied a cover the use of technology to
each page to compare to sub-
stalk. Most of these laws are
photo of Miller from Facebook sequently updated files.5 Other
and published it—along with relatively new, however, and
sites, such as Profilesnoop and
photos of Miller’s family—on few cases involving social net-
Link View, allow visitors to
the imposter’s site. Although working sites have yet been
trace a user’s Internet Protocol
Miller’s impersonator did not prosecuted. offensive or de-
(IP) address (and even physical
threaten or stalk her (and famatory material regarding
location on Google Maps) with
MySpace promptly removed the victim from the site.
many social networking sites,
“Becky’s” site), the incident including Facebook.8
shows the potential of such
Stalkers can also use social New Laws
sites for stalking or harass-
networking sites to introduce
ment. Lawmakers are starting to pro-
spyware into the computers of
pose measures to govern the
their victims. Spyware infec-
use of social networking sites.
tion rates are increasing, an
Features to Watch In April 2007, for example, the
anti-spyware company spokes-
Several social networking site California legislature introduced
man told Business Week, in
features may increase users’ a bill to prevent individuals
part because “people are creat-
vulnerability to stalkers and from using social networking
ing multiple profiles, and the
other predators. For example, sites to incite harassment or
links on their sites will take you
new MySpace members are abuse against an individual.
to sites that will download ad-
Harassment would include
asked to supply a name or ware and spyware.”9 Stalkers
nickname and information posting digital images or mes-
can exploit this vulnerability on
about their marital status, sex- sages on Web sites to cause
their victims’ profile pages.
ual orientation, hometown, fear, harassment, or harm to
Once downloaded, spyware can
school, religion, education, in- an individual.10
help stalkers gather informa-
terests (e.g., music, movies, tion about all their victims’
television, books, and heroes), computer activity, including e-
Page 3 www.ncvc.org/src The Source

Prevention: The Best Defense


The best defense against social networking features to keep them safe. We will periodically
site stalking is to use the sites with extreme report our findings at www.ncvc.org/src. For
caution. Wise users carefully consider what more information, please visit the SRC Web site
they post (see “Think Before You Post, p. XX). or call 202-467-8700.
Last names, school names, favorite hangouts,
phone numbers, and addresses make it easy
for stalkers to locate victims. Photos with
identifiers (like school names or locations) also
increase a victim’s vulnerability. Posted infor- For victim assistance, please call 1-800-FYI-
mation is permanently public. “You can’t take CALL M-F 8:30 AM - 8:30 PM EST or email
it back,” warn experts Larry Magid and Anne gethelp@ncvc.org
Collier, about information posted on-line.
“Deleted” information can be recovered, for
example, from Google’s cache of deleted and
changed Web pages and from Internet Archive
(archive.org), which offers access to deleted
postings.12
1
As told to staff by a stalking survivor.
Users can also boost security by limiting on-
line “friends” to people they actually know and 2
Massachusetts Attorney General, “Consumer Advisory: AG Reilly Warns
by activating all available privacy settings. Parents about the Potential Dangers of Children Using Social Networking Sites
Such and MySpace and Xanga,” August 29, 2006, www.ago.state.ma.us/
Since June 2006, MySpace has allowed all us- sp.cfm?pageid=986&id=1710 (accessed February 26, 2007).
ers to keep their profiles private—open only to
3
those designated as “friends.” MySpace also Justin Pope, “Colleges Warn about Networking Sites,” the Associated Press,
August 2, 2006 (accessed March 4, 2007).
offers other privacy options: to control how
others may add their names to friends lists, to 4
Adam Geller, “VA Gunman Had 2 Past Stalking Cases,” Associated Press,
approve friends’ comments before hosting, to April 18, 2007, www.newsday.com (accessed July 24, 2007).
hide the feature that shows when they are on- 5
Florida Parishes Bureau, “Loranger Teen Booked in Threats to Harm Other
line, or to prevent e-mailing photos. To acti- Teen, Cyberstalking,” Capital City Press, July 12, 2007.
vate these features, members must change 6
KUJH-TV News, “Facebook Used to Aid Stalkers, May 4, 2006,
their settings and choose the privacy options www.tv.ku.edu/newsd (accessed March 5, 2007).
they prefer. Although stalkers can find ways
7
around these protections, members who use Veronica Miller, “Stalking Becky, The Girl Who Stole MySpace,” National
Public Radio, All Things Considered, August 6, 2006, http://www.npr.org/
them are less vulnerable than those who do templates/story/story.php?storyId=5622009 (accessed July 25, 2007).
not.
8
Andy Meyers, “On-line Stalking Nothing New,” The Brandeis Hoot, Septem-
ber 8, 2006, www.thehoot.net (accessed March 5, 2007).
Networking Safely 9
Arik Hesseldahl, “Social Networking Sites a ‘Hotbed’ for Spyware, Business
Week, August 18, 2006, http://www.msnbc.msn.com/id/14413906, (accessed
The social networking revolution presents October 12, 2007).
complex dilemmas. The convenience and ap-
10
peal of these sites are undeniable, and stalk- Jaikuman Vijayan, “California Eyes Stronger Cyberstalking Laws, Com-
puterWorld Government, 04/25/07. www.computerworld.com (accessed July
ing cases that involve social networking are 24, 2007).
still quite rare. Yet as stalkers diversify their
tactics, they are likely to exploit any available
11
Larry Magid and Elaine Collier, Myspace Unraveled: A Parent’s Guide to
Teen Social Networking, Berkeley, CA: Peachpit Press, 2007, pp. 122-3.
technology. For stalking victims as well as the
public, safe social networking will require 12
Ibid.
awareness and vigilance.
As the Stalking Resource Center continues to
track this issue, we welcome insights from the
field about these sites, related cases, and new

You might also like