ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Dealing with Telephone Stalkers

Updated on May 17, 2012
With the use of cell phones, stalkers can track you wherever you go.
With the use of cell phones, stalkers can track you wherever you go.

The Evolution of Telephone Stalking

Telephones offer a marvelous way for you to stay connected with others. Despite being miles away, you can maintain closeness to those who are important to you. They also help in times of emergency. With the punch of a few buttons or just one if you have speed dial, you are connected with those who are important. As a parent, it is a wonderful way to stay in touch with your children and your spouse. This wonderful tool now has the capability of sending pictures and text messages as well. These capabilities bring new thrills and ways of staying in touch.

Although phones offer many new wonders, in the hands of stalkers they are a nightmare. In previous generations, telephone stalkers were a nightmare. They often called repeatedly. Since we are conditioned to always answer the phone, there is a compulsion to answer even late at night. Upon answering you were vulnerable to the stalker on the other end. If you were raised to have good manners, you did not want to be rude and just hang up. Stalkers knew this and often kept you on the line until they finished their attack and hung up. The only defense at that time was to get an unlisted phone number, although that was an expensive undertaking and you risked people not being able to find you.

With the use of answering machines, there was a new defense against stalkers. You no longer had to answer the phone and hear them. The stalkers picked up on the learning curve rather quickly, leaving their harassing messages on the machines. Although they left their messages, you could erase them as quickly as you heard the familiar voice.

Even with the answering machine, the stalkers could launch long distance attacks. They could call from other cities or states. Some stalkers even found ways around the unlisted number obstacles.

The next technological leap was the advent of caller ID. With caller ID, you could identify the stalker and refuse their calls. Some stalkers countered this by blocking their number from being seen. For some reason, stalkers want to know a great deal about you, yet maintain their own anonymity. As technology advanced, you could even block the stalkers number. This was a high point in combating stalkers on the phone.

With the increased use of cell phones, the danger of stalkers exploded. Once they had your number they can call you, text you or even send photos and videos to you. The very tools that allow you to enjoy important people now brings a new level of intrusiveness as well. Some stalkers have even figured out how to program texts and messages to go out at particular given times. They no longer have to spend their time stalking you, they can automate it. For this reason, keeping your cell phone contact information protected is imperative. Putting your contact information out to the public risks increased exposure to stalkers.

The combining of cell phones with social media exposes you to a new type of stalker. People who have never even met you may begin stalking you for whatever reason, including identity theft. The more they know about you, the more information they have to be able to convince others that they are you. It is not longer about just harassing you, now stalkers can steal your money and who you are. They are not just an irritation, they now get into your lives and into your head. With the use of social media, they can find out who your family members are, where you live and who your friends are. With these new pieces of information, there is a new level of harassment possible. Since so many phones have social media applications, knowing how to deal with them is important in reducing stalking.

Since there are few regulations on social media, it is like the wild west. In the past, manners and good raising helped people know how to behave and interact. With social media and a generation often lacking in manners, there is a greater risk of abusive and harassing language. In such an environment, you can give them a piece of your mind and they can also give you a piece of their mind as well. The answer to the harassment, like unwanted television shows is to turn them off. You do not have to answer or respond to each comment on your profile or blog.

When the stalking types have false identities and avatars, they can harass you under their new screen name. By hiding behind an identity, you are no longer sure who your stalkers are. The way to lessen this threat is knowing what the privacy controls are and learning how to use them. Just because someone wants to be your friend, you do not have to be ‘nice’ and accept them. Stalkers often count on you being nice and then exploiting your niceness.

Another new danger with cell phones and social media like four square are programs that allow stalkers to identify people living in their area. Although knowing all the members of a particular gender who are single living in your area is wonderful for those who are dating. In the hands of a stalker, it becomes a new way of finding targets. Like an animal on the hunt, stalkers look for victims, rather than using their social skills to develop relationships. Such programs remain a threat whether or not you sign up with the service.

Another potential stalking danger are spy and GPS programs. When stalkers have access to your cell phone, they can activate or download tracking programs. Such programs may be good for suspicious parents of troublesome teens or even the protective types, yet in the hands of a stalker, they are a nightmare. With such programs, they can find you by tracking where you phone goes.

Stopping stalkers is no longer as simple as refusing to answer a phone call or getting an unlisted number. With cell phones, you need to protect your contact information both online and on your phone. You also need to protect your phone when you are not using it. This means being careful about who has access to it. You will also need to be careful about strangers wanting to use your cell phone. With cell phones it is also possible to be stalked without knowing that it is happening.


    0 of 8192 characters used
    Post Comment

    • profile image


      3 years ago

      I was drawn by the honsety of what you write

    • profile image


      3 years ago

      It's great to find soemnoe so on the ball


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)