We got you covered.

The Stalker – Much More Than a Physical Threat

Must Read

The development of the internet in the 21st century has added another, deep layer of complexity to personal protection. Reports of online stalking and harassment are becoming more common. But how serious is the threat a stalker poses? How likely is it that they will turn physical?

This article will give guidance on how to assess and deal with threats. These are complex issues involving both psychological and mental problems. Therefore, I do not intend to cover this topic in-depth but only to outline the framework.

Breaking Down Stalker Terminology

Before discussing how to assess the threat, what control measures can be implemented, and the impact, let’s clarify the term stalker. According to the Cambridge Dictionary, a stalker is a person who illegally follows and watches someone, especially a woman, over some time. The American definition is: Someone who follows a person, usually intending to hurt that person.

Back in the day, stalking had different names and definitions. For example, during the early 20th century, psychiatrists used erotomania to describe the delusion of being loved by someone, often a prominent or famous person.

In the early 21st century, discussions of erotomania and star-stalking depicted offenders as both male and female but generally of lower status than their victims.

The status of stalking as a criminal offense is relatively new, having emerged in the early 1990s and adopted by most countries worldwide. As a result, some countries provide a measure of protection under existing harassment laws, whereas others have enacted new laws to protect victims of stalking.

Stalking in Practice

After clarifying the meaning and brief history of stalking, it is time to examine how to assess the risk of threats from stalking. Dealing with stalking threats is no different than dealing with any other type of threat. Any professional EP operator knows that the key to dealing with any threat is to understand the danger and be proactive.

Professional EP operatives must first understand what type of stalking threat they have to deal with, the profile of the stalker, and potential impacts. Once the method of stalking and the profile are established, the risk and threat assessments can be conducted. There are two types of stalking methods ― physical and cyber.

Physical stalking involves:

  • Following someone.
  • Appearing at a person’s home or place of business.
  • Making harassing phone calls.
  • Leaving written messages or objects.
  • Vandalizing one’s property.

Cyberstalking is when the stalker uses the Internet and social media platforms to harass his victim.

In order to implement the proper control measures and maximize their efficiency, the stalker needs to undergo profiling. There are three types of stalkers, as follows: intimate, vengeful, and delusional stalker.

  1. An intimate stalker is usually a partner or ex-partner who cannot and/or will not accept that the relationship has come to an end.
  2. A vengeful stalker is the most dangerous stalker as their mission is to get revenge.
  3. A delusional stalker is usually an individual with a history of mental illness. He believes that he is in love and will create an entire relationship in his head even though he may not have met the person.

stalker

Control Measures

Once the stalker’s profile and their methods are identified, it’s time for a risk assessment and identifying control measures. Ideally, the initial risk assessment should be conducted by a mental health professional. The assessment and management of the risk should reflect the following concerns:

  • Is the stalking ongoing, or if it has stopped, will it reoccur?
  • Does the victim suffer from significant psychological or social damage?
  • Will the stalking escalate to a physical and/or a sexual assault?

Most risk assessments on stalking have focused almost exclusively on the probability of an assault. However, most victims are not assaulted.

Stalking causes psychological and social damage due to chronic fear and intimidation, irrespective of the presence or absence of an actual assault.

Because most victims suffer from psychological and social damage, the initial risk and threat assessments should be conducted in collaboration with a mental health professional. This will give a better understanding of the profile of the offender and the impacts on the victim.

The control measures depend on the profiles of both the protectee and the stalker, as well as the methods of stalking. For example, a multi-layered security approach needs to be put in place if the victim is a high-profiled or a high-net-worth individual.

How to Strengthen Your Security

In the 21st century, regardless of the stalking method, the initial approach is to start online. Many stalkers select their victims online and use social media platforms for intelligence. Therefore, the first control measure should be strengthening online security on any threat from stalking.

Primary control measures in physical stalking involve strengthening online security, controlling one’s Internet presence, and disabling the GPS tracking on all social media platforms when out and about.

If you perceive that someone is following you, I recommend the following steps:

  • finding a safe public place and asking for help,
  • a daily change of one’s routes and routines,
  • ensuring a company,
  • securing one’s residence by changing the standard locks with a higher-grade security system,
  • installing a security alarm,
  • ensuring CCTV coverage on all entries and exits,
  • parking one’s vehicle in a well-lit area, ideally covered by CCTV (in case a garage is not available), and
  • reporting to the authorities.

Primary control measures in cyberstalking involve:

  • strengthening one’s online security,
  • checking the privacy settings on all social media accounts,
  • using VPN services,
  • disabling the GPS tracking on all social media platforms,
  • keeping records of any suspicious or malicious activity once the stalking activity is confirmed, and
  • filing a report to the authorities.

In Conclusion

Stalking is a complex behavior that risks causing psychological, social, and/or physical damage to the victim. Therefore, when a protection specialist conducts the risk and threat assessments, it is essential to consult with mental health professionals regarding the potential impacts on the protectee as we determine appropriate control measures.

As EP professionals, before we undertake any assignment, we need to ensure a deep understanding of the subject. If we have any doubts, don’t hesitate to reach out to professionals from the relevant sectors. In this case, one vital resource would be a discussion with a mental health professional. This collaboration will ensure that our risk assessment and control measures are adequate, efficient to the best of the client’s needs.

 

References:

Crisis Shelter of Lawrence County

www.crisisshelter.org

National Center for Victims of Crime

www.ncvc.org

Stalking Resource Center page

www.ncvc.org/src/Main.aspx

National Stalking Awareness Stalking Month

www.stalkingawarenessmonth.org

National Domestic Violence Hotline

www.ndvh.org

National Coalition Against Domestic Violence

www.ncadv.org/resources

Working to Halt Online Abuse

www.haltabuse.org

Wired Safety

www.wiredsafety.org/cyberstalking_harassment/

Cyberangels

www.cyberangels.org

Privacy Rights Clearinghouse

www.privacyrights.org

Association of Threat Assessment Professionals

www.atapworldwide.org

Online Safety and Help

www.wiredsafety.org

Sign Up for Our Newsletter

Get the latest news and articles from EP Wired.

Latest News

Satellite Phones Explained: How, Where, and When to Use Them

Satellite phones have countless different applications, from remote travel, and expeditions, to protection, security, and more. They’re an invaluable...

More Articles Like This

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.