Home » Violence through stalking: How those affected should behave | > – Guide

Violence through stalking: How those affected should behave | > – Guide

by admin
Violence through stalking: How those affected should behave |  > – Guide

Status: 05/03/2023 10:24 am

Calls at night, constant stalking: Violence from stalking mostly affects women and is increasingly shifting to the internet. This is how victims of stalking and cyberstalking can protect themselves.

People of all ages, regardless of income, religion, nationality and gender can become victims of stalking. The Federal Criminal Police Office recorded a total of 2021 20,464 cases. According to the aid organization Weisser Ring eV, however, the number of unreported cases is far higher – at 600,000 to 800,000 cases. With a share of over 80 percent, the victims are mostly women. In addition, more than 80 percent of stalkers are mostly male and not unknown: In 75 percent of cases, those affected know their tormentor. It is often the ex-partner, but friends, colleagues, relatives or casual acquaintances can also become stalkers.

Further information

Advice centers, action alliances and emergency numbers – we have put together the most important contacts here. more

Definition of stalking: Criminal offense according to the Criminal Code

Stalking comes from the English and from the field of hunting. “To stalk” means “to stalk”. The Police define stalking as “repeated unlawful pursuit, stalking, penetrating harassment, threatening and terrorizing a person against their will up to physical and psychological violence.” Since 2007, stalking, which is criminally known as “stalking,” has been loud Section 238 of the Criminal Code (StGB) a crime. The new law gave victims the opportunity to report perpetrators.

How stalking often starts

Stalking usually begins harmlessly. Within a gradual process, however, distanced, superficial contacts can become intimate declarations of love. If the victim doesn’t allow himself or doesn’t allow himself to be approached anymore, the infatuation turns into anger. In many cases, stalkers are ex-partners. They often try to keep in touch after the relationship has ended in order to maintain control over the victim’s life. However, stalking has a variety of manifestations and can also take other courses.

Further information

Logo graphic of a woman with her arms crossed.  © NDR (M) Philipp Schönfeld

Sophie falls victim to a stalker. Anouk Schollähn tells her dramatic story – in an eight-part podcast. more

How do I know if I’m a victim of stalking?

Those affected are often unsure whether they are really victims of stalking. This is because many individual acts usually take place over a long period of time, so that victims only realize their situation at a late stage. Nevertheless, the police advise those affected to trust their gut feeling at an early stage and to contact the nearest police station or an aid organization such as the Weisser Ring: Anyone who is afraid of reporting their stalker can first get anonymous advice, for example online or by phone on 116 006 (every day between 7 a.m. and 10 p.m.).

See also  Creating a perennial bed: The best tips for planting | > - Guide - Garden

Typical stalking actions according to Weisser Ring are:

  • mass sending of messages via SMS, Messenger, e-mail, letters or packages
  • frequent phone calls (day and night)
  • recurring calls to mailbox and answering machine
  • Ambushing the victim (e.g. at home, at work or during leisure time)
  • Ordering goods on behalf of the data subject
  • unwanted gifts (e.g. flowers constantly in front of the apartment door)
  • Threats, insults, property damage
  • harassment and coercion

How victims should behave

With the help of a lawyer, those affected can clarify whether their specific case is a criminal offense under Section 238 of the Criminal Code. According to the police crime prevention of the federal states and the federal government, those affected should:

  • make it clear to the stalker in the presence of witnesses that they do not want any contact until further notice
  • consistently block any attempts at communication
  • do not accept any consignments of goods that you have not ordered
  • Do not dispose of documents with personal data in household waste
  • Inform friends, family and the environment about the situation (public protects)
  • Document calls, messages, letters and every contact
  • File a complaint (preferably in the presence of a person you trust)
  • to dial 110 in the event of an imminent threat to request police protection
  • have possible injuries caused by stalkers treated immediately and documented

Cyberstalking: Violence is shifting to the internet

Cyberstalking refers to the harassment and stalking of a person via digital means and channels of communication. For example, stalkers spread defamatory photos, videos and texts about their victims on social networks, mostly remaining anonymous. Punishing such crimes is sometimes difficult because the perpetrators can hardly be identified. In addition, the official responsibilities for criminal offenses on the Internet are often not clarified. It is also almost impossible to delete data if it has been disseminated, shared and commented on by third parties within a short period of time.

See also  After the storm comes the heat: Up to 32 degrees in Lower Saxony | > - News

There are also other forms of cyberstalking. For example, a stalker can gain access to his victim’s cell phone in order to monitor it digitally. With the help of a “stalkerware” app that the perpetrators install on the victim’s cell phone, or with other apps, chat messages, SMS, locations and other data can be transmitted to their own digital devices and read. Only a short access to the smartphone is required to install such apps. Victims are often unaware that such an app has been installed. An indication of this can be a rapidly draining battery.

This is how victims of cyberstalking can protect themselves

Anyone who fears being spied on via the Internet should carry out a “basic digital cleaning”.

For this purpose, it should be checked which devices in the household are Internet-enabled. Not only typical, digital means of communication such as smartphones, smartwatches, laptops and computers should be considered. Stalkers can also misuse WLAN routers, vacuum cleaner robots, game consoles, smart toys such as talking teddies with Bluetooth function or smart home devices such as digital doorbells. Those affected by cyberstalking should protect themselves as follows:

  • reset all internet-enabled devices in the household, including WLAN routers and smart home devices, to the factory settings
  • Delete apps including their accounts and only reload necessary apps
  • assign individual passwords for each user account in apps, social media, e-mail, etc., choose secure passwords and use 2-factor authentication
  • If possible, deny access to location, photos, microphone, etc. in all necessary apps
  • Close or tape webcams on laptops, tablets, etc. when not in use
  • Secure smartphone with facial recognition, access code or fingerprint
  • Encrypt WLAN at least with WPA, ideally with WPA2

Messenger services and social media:

  • Delete the profile picture, but at least not make it public, only make it visible to people you trust
  • Turn off blue ticks for read messages
  • Disable unsolicited addition to groups
  • Disable message preview
  • do without “WhatsAppWeb”.
  • Check the need for your own social media accounts and delete them if necessary
  • Make existing social media accounts private instead of public
  • about privacy settings Facebook, Instagram & Co. inform
See also  Schleswig-Holstein current: news at a glance | > - News

Adjust user behavior:

  • exclusively in private mode (incognito mode) surfing
  • do not store sensitive data on end devices, but in clouds or on external hard drives

Especially if the stalker is an ex-partner and lived in the household, digital devices and access should be completely reset, renewed or deleted. Sometimes, however, a factory reset does not completely remove spy software, so it may be advisable to buy new digital devices. At the end of all measures, a new e-mail address should also be set up to which only the person concerned has access.

Criticism: Sacrifice in the obligation to bring

In general, publishing content on the Internet is not a criminal offence. Therefore, victims of stalking must first collect a large amount of evidence and records in order to prove that the stalkers have committed a crime. Those affected can refer to the following paragraphs:

Victims of stalking are usually exposed to extreme psychological stress over a long period of time. Only a few of those affected manage to obtain a contact ban in court. The Weisser Ring criticizes the fact that those affected have to collect evidence of the stalking and are therefore “obligated to provide it”.

Die NO STALK App The aid organization is intended to support those affected in collecting evidence and hold more stalkers accountable in the future: By installing the app, all contacts made by the stalker are automatically documented on the smartphone of the person affected.

Further information

View of a closed barrier in front of a rifle club (Festhalle).  A 19-year-old woman was violently killed nearby on Sunday night.  © dpa Photo: Friso Gentsch

Proceedings were already under way against the alleged perpetrator in 2020. He is said to have pursued a young woman. more

This topic in the program:

NDR 2 | 04.05.2023 | 06:00 a.m

Keywords for this article

Right

NDR Logo

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy