title for Matchmaking note
home | about | site use | resources | publications | timeline   spacer graphic   blaw

overview

statistics

studies

hearts

e-brides

law

scams

fidelity

cautions















related pages icon
related
guides:


Privacy

Security
& Infocrime


Identity
Crime





related pages icon
related
profiles:


surveillance

Social
Network
Services




















section heading icon     cautions

This page considers questions about self-help by users of online (and offline) matchmaking services.

It covers -

It is complemented by a more detailed note on cyberstalking.

section marker icon     introduction

We have suggested elsewhere on this site that individual responsibility is an important aspect of being online: regulatory bodies are not omnipresent and mechanisms for redress of injury may be slow or provide inadequate relief, particularly if injury is not readily characterised as a financial loss or physical damage.

So is a recognition that people can choose to manage their online presence rather than allowing the technology - and by extension a stalker - to manage them.

Management of that presence does not offer everyone immunity from harassment, danger and victimisation ... just as there is no comprehensive solution for all social interaction offline.

Management does however offer opportunities to minimise danger, in for example much the same way that ordinary people deal with risk by keeping their doors locked and being sensible about whom they invite inside. It also offers ways of responding when cyberstalking occurs.

There is no simple solution: responses vary from individual to individual (and from jurisdiction to jurisdiction), in the same way that there is variation in responses to offline stalking. Some people are better equipped than others to deal with a nasty on the net; some are luckier in finding advice and assistance from colleagues, service providers, lawyers and police or other investigators.

The following paragraphs offers suggestions about risk minimisation in online dating.

They are not comprehensive or prescriptive. Publications highlighted elsewhere on this site offer some pointers from Australia and overseas. There is for example a wealth of online information regarding the experience of stalking victims and of investigators or other third parties.

section marker icon     online

Online identity management includes -

  • being wary about what information you provide online, whether it is on a FaceBook or MySpace profile, in a blog, on a bulletin board, in the course of chat or in response to an online marketer's offer of an amazing deal
  • using pseudonyms in adult chat rooms
  • using gender-neutral names in other fora
  • not taking a contact's statements at face value
  • not using a pet's name as a password (particularly if the pet is referred to in a blog or elsewhere on the web)
  • wariness about sharing passwords with friends or colleagues (although you may take care, they may not)
  • protection of laptops, PDAs and personal computers - including use of passwords, caution in downloading potential spyware and attention to keeping virus protection up to date (few people would leave their front doors open 24/7 but many, alas, leave their machines wholly unguarded)
  • choosing online dating services and offline matchmakers on the basis of professionalism, rather than the lowest cost (professionals are less likely to expose your information and more likely to respond if you do have problems)
  • exercising caution about including personal mobile phone numbers in email footers.

section marker icon     offline

Offline identity management includes
exercising caution when initially meeting face to face.

That caution might include such measures as -

  • being careful not to have your date collect you up at your home or place of work (and conceaingl your address until you are confident that your new acquaintance is safe)
  • choosing not to go to your date's home or invite them to your home until after several public meetings have taken place
  • meeting in a public, well populated and well lit place
  • having a friend with you at the initial meeting
  • having a friend 'check in' on your mobile phone
  • alerting that person where you are going and when you expect to return.

What if something goes wrong?

There is no single set of rules for responding to online harassment and cyberstalking. That is because -

  • individual circumstances vary significantly (not all stalking is persistent, pathological and associated with violence)
  • legal regimes (along with access to those regimes and the expertise/interest of law enforcement personnel) vary.

As previously noted, the latter is a particular issue when stalking is taking place across national boundaries.

What can be done when someone is being stalked online?

A fundamental response is for victims to not despair. Some targets of stalking believe that they are powerless; others believe that cyberstalking is either not an offence or that it will not be taken seriously by police, courts and service providers. As indicated earlier in this note, those beliefs are incorrect. Australian law for example recognises electronic stalking, including harassment via SMS and email.

Victims can take a range of action, depending on their circumstances. Such responses include -

  • screening voice calls, SMS, chat and email. Filter email for example; if messages come from a particular address, send those messages into a folder that you (or your geek) can provide to police but that you do not need to look at yourself. If you are bothered by someone in an online forum you can often block communications from them, even become invisible to them.
  • if necessary, throwing away your current email address (particularly if it is a disposable webmail address in a service such as Hotmail) and start a new one, one that is only available to trusted friends/associates and that is not published on the web.
  • checking that the victim has not let the stalker into a personal computer. Make sure that virus protection is up to date; change the passwords. This is the same as keeping your front door locked or changing the locks. Some people have managed the experience by buying a new machine or wiping and reinstalling the software on an existing machine, just to be sure.
  • consider throwing away an existing SecondLife, MySpace or FaceBook profile: "changing address, hair colour, age and even gender online" is usually easier than moving house offline.
  • similarly creating a new presence in chat rooms and other online fora, ideally using different identity information (a different age, location, preferences) so that your reappearance cannot be readily detected. Request trusted friends/associates not to provide those details to anyone else.
  • traditional actions such as using a male friend to record the instructions on a female victim's answering machine.

Victims are typically advised to deny the cyberstalker the gratification of knowing that the target distressed. As with offline stalking, it is useful to resist the temptation to 'feed the beast': do not reply, do not 'legitimate' the harassment or 'validate' the cyberstalker's existence.

That non-response does not mean destruction of information that could be useful in identification and prosecution of an offender. It is important to remember that electronic messages such as SMS often provide traces that can be followed by investigators and used in court. If you do get nasty messages, do not delete them: they are evidence which might be used against the stalker. Store the email, log the chat, save the SMS.

Businesses such as ISPs and fora operators dislike trouble, whether because it is bad for their marketing, because they fear financial penalties imposed by courts and regulators or because immunity fades in some jurisdictions when there is an egregious lack of response to complaints.

Some will make a genuine effort to assist victims to identify oppressors or to expunge offensive comments (defamatory and threatening material in fora, blogs and personal sites) and ban the person who made those comments. Others, through ignorance of the law (or good manners) and managerial ineptitude, will take longer to respond when they receive a request to deal with improper material.

Victims should accordingly be persistent, on occasion insisting on talking to a manager rather than the (often underpaid and naive) people manning a call centre or the front counter.




::



 


this site
the web

Google

version of December 2006
© Bruce Arnold
caslon.com.au | caslon analytics