Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations gkittelson on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Cyber Stalking

Status
Not open for further replies.

ttmac

Technical User
Aug 16, 2002
105
IE
Apologies if this thread is considered off topic, however, a tek-tips search for stalking, stalk and stalker proved fruitless.

The friend of a work colleague is the victim of cyber stalking via ICQ. The victim contacted ICQ who determined that the perpetrator was/is based in another country. ICQ for their part gave step-by-step remedial details.

The stalker, as part of their campaign, listed sites that the victim had recently visited.

To the best of my knowledge, the victim is running and maintaining anti-virus software but may not be aware of all the mal/spy-ware that abounds.

My question is, and assuming that the victim does not have a virus, how has the perpetrator managed to achieve this. I’m not asking for specifics that would potentially give ideas or methods.

My initial thoughts are that the perpetrator is: -
1. using some form of key logger,
2. using ICQ or ISP logs to determine usage, or
3. exploiting an open port/backdoor to gain access to usage tracks on the victims PC.

Personally, my first line of attack to solve this problem would be to install a firewall and to block all traffic except trusted applications. Thereafter, I would use Spybot, Ad-Aware and Bazooka.

Any comments and suggestions would be appreciated. Thanks in advance for any replies.

Bear in mind that I do not know or have access to either the victim or their PC.

Thanks,

Tom.
 
I would suspect that the method was either a key logger or a backdoor/trojan situation. Personally, if the stalker has accurate information about the victim, I wouldn't even mess around. Backup, Fdisk, format & reinstall. Then, only restore important documents - no settings or programs. Get a new e-mail address, ICQ account and a different IP address (if possible/or needed).
 
Another good line of defence, contact their ISP and Police! If the person is sending abusive, threatening or sexual messages, that is often an offence in many countries.
If you don't report it, then there is nothing they can do about it.

Stu..

2 decades from retirement, 2 minutes from a breakdown
 
Thanks all for the tips, I'll pass on the advice. I will keep you all posted when and if there are further developments.

Tom.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top