Archive for February, 2013

Cyberstalking Behaviors Might Include:

February 26, 2013 0 Comments

Excessive attempts at contact via cell phone, texts, Facebook posts and e-mails Using social media “check-ins” or locational features to physically stalk a victim Excessive delivery of unwanted gifts, cards, or flowers to a victim’s home Contacting or threatening a victim’s family and friends Using your email address to sign up for excessive amounts of […]

Continue Reading »

Excessive Text Messages

February 23, 2013 0 Comments

Are you receiving excessive, harassing or threatening text messages from someone?  If someone is sending you unwanted or unsolicited text messages, we may be able to help you make them stop.  Many times, the sender of these excessive texts will state that the messages are justified for various reasons. Please save all of these text […]

Continue Reading »

Excessive Emails

February 23, 2013 0 Comments

Are you receiving excessive, harassing or threatening emails from someone?  If someone is sending you unwanted or unsolicited emails, we may be able to help you make them stop.  Many times, the sender of these excessive emails will state that the emails are justified for various reasons. Please save all of these emails, do not […]

Continue Reading »

IP Address Tracking

February 23, 2013 0 Comments

A common strategy used by cyberstalkers is to utilize tools like “Google Translate”, “Google Web Preview” or other sites to attempt to hide their IP address while they are stalking you.  We have experienced this tactic and have tools that allow us to track the IP address of the cyberstalker in spite of this strategy. […]

Continue Reading »

CyberStalking101.com Launches

February 14, 2013 0 Comments

CyberStalking101.com goes live on February 14, 2013. Happy Valentine’s Day! Contact Haskin & Associates for a free, no obligation consultation today. On a mobile device?  Click to call: 678.685.8948.

Continue Reading »

Cyberstalking is a Real Crime

February 7, 2013 0 Comments

“Aggressive outreach such as persistent emails, harassing posts or text messages are not acceptable forms of online communication and NCSA encourages affected individuals to contact  local law enforcement or victim service agencies to report such activities and get help.” “Stalkers generally leverage various kinds of technologies – including the Internet and Web connected devices – […]

Continue Reading »

Data Mining to Cyberstalk

February 7, 2013 0 Comments

Cyberstalkers may use public and private data to stalk you.  There are many companies that are more than willing to sell your personal information.   Full article on Tri-Parish Times Contact Haskin & Associates for a free, no obligation consultation today. On a mobile device?  Click to call: 678.685.8948.

Continue Reading »

The Cyberstalking Epidemic

February 7, 2013 0 Comments

If you are not worried about cyberstalking, you should be… Full Article on Mobiledia.com Contact Haskin & Associates for a free, no obligation consultation today. On a mobile device?  Click to call: 678.685.8948.

Continue Reading »