Akhil Bhartiya Cyber Suraksha Sangathan (Regd.)
Regd. with Registrar of Society of NCT Delhi-Regd. No-287
Cyber Criminals se Suraksha, Digital India ki Raksha
अखिल भारतीय साइबर सुरक्षा संगठन (पंजी)
भारत की पहली साइबर क्राइम इन्वेस्टीगेशन एन जी ओ
ऑनलाइन रहें सतर्क, साइबर अपराध से रहें सुरक्षित
www.abcss.org Email: info@abcss.org
AMIT MALHOTRA
(Cyber Crime Investigation Specialist)
Founder Akhil Bhartiya Cyber Suraksha Sangathan
18 yrs experience in crime prevention, detection and investigation. Certified Ethical Hacker from Ec-Council. Certified Cyber Crime Investigator from Asian School of Cyber Laws. Presently working in the area of cyber crime investigation.
⚠️ How Cyber Stalking Happens
- Repeatedly sending unwanted messages or emails
- Monitoring victim's social media activity obsessively
- Creating fake profiles to gain victim's trust
- Installing spyware or tracking apps on victim's device
- Threatening or blackmailing via private messages
- Spreading false information or defaming online
- Tracking location using GPS apps or social check-ins
- Impersonating victim to damage reputation online
✅ How to Protect Yourself
- Keep social media profiles private — limit public visibility
- Never share real-time location on social media posts
- Block and report suspicious accounts immediately
- Use strong, unique passwords and enable 2FA on accounts
- Regularly check your devices for unknown apps or spyware
- Do not accept friend requests from unknown persons
- Avoid posting daily routine, home address or workplace online
- Tell a trusted person if you feel you are being watched online
🚨 If You Are a Victim of Cyber Stalking
- Do not respond to the stalker — any response may encourage further contact
- Block the stalker on all platforms — email, WhatsApp, Instagram, Facebook, LinkedIn
- Document all evidence — save screenshots, message logs, email headers and URLs
- Call National Cyber Helpline 1930 immediately for guidance
- File a complaint at cybercrime.gov.in — select "Cyber Stalking / Bullying" category
- File FIR at your nearest Cyber Crime Cell or police station — bring all evidence
- If your device is compromised, contact a cyber security expert to remove spyware
- Inform a trusted family member, friend or employer about the situation for safety
- Apply for a restraining or protection order through court if the stalker is known to you
Social Media Stalking
The stalker obsessively monitors, likes, comments on, screenshots or saves a victim's social media posts, stories and activity. They may create fake accounts to follow the victim after being blocked on real accounts.
Email & Message Harassment
Sending hundreds of unwanted emails, WhatsApp messages, SMS or DMs to the victim — ranging from flattery to threats. Even after being blocked, stalkers use new numbers or email addresses to continue the harassment.
GPS & Location Tracking
Secretly installing tracking apps, spyware or keyloggers on the victim's smartphone or computer to monitor their real-time location, calls, messages and internet activity without their knowledge or consent.
Identity Impersonation
Creating fake profiles using the victim's name, photos and personal information on social media, dating apps or matrimonial sites. The stalker uses these fake profiles to damage the victim's reputation, relationships or career.
Online Harassment & Trolling
Organising coordinated harassment campaigns against a victim — flooding their posts with abusive comments, sharing personal information publicly (doxxing), or encouraging others to bully, threaten or humiliate the victim online.
Image-Based Abuse (Morphing)
Downloading the victim's photos from social media and morphing them with obscene or vulgar content using photo editing tools, then circulating the manipulated images to humiliate, blackmail or coerce the victim.
Spyware & Keylogger Attack
Installing hidden surveillance software on the victim's devices — either physically or through a malicious link — to record every keystroke, capture screenshots, activate the camera or microphone, and monitor all online activity in real time.
Catfishing & Fake Relationship Stalking
Creating a completely fake online persona to build a romantic or friendly relationship with the victim over time. Once trust is established, the stalker extracts personal information, intimate photos or financial details and uses them for harassment or blackmail.
IT Act Section 66C: Identity theft using electronic means — up to 3 years imprisonment + ₹1 lakh fine. Applicable when stalkers impersonate victims by creating fake profiles.
IT Act Section 66E: Violation of privacy by capturing, publishing or transmitting private images of a person without consent — up to 3 years imprisonment + ₹2 lakh fine. Applicable in image morphing and voyeurism cases.
IPC Section 354D: Stalking — specifically criminalises cyber stalking of women. Whoever monitors a woman's internet use, contacts her repeatedly despite disinterest, or monitors her electronic communications faces up to 3 years imprisonment for first offence and up to 5 years for repeat offence + fine.
IPC Section 507: Criminal intimidation by anonymous communication — sending threatening messages via unknown numbers, fake profiles or anonymous emails. Up to 2 years imprisonment + fine.
IPC Section 499 & 500: Defamation — spreading false information about a person online to damage their reputation. Up to 2 years imprisonment + fine.
IPC Section 509: Word, gesture or act intended to insult the modesty of a woman — applicable to sending obscene messages, images or making obscene remarks targeting women online. Up to 3 years imprisonment + fine.





