Stalking or unwanted pursuit is a crime under the laws of all 50 states. Any person who willfully, maliciously, and repeatedly follows or harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her safety, or the safety of his or her immediate family is guilty of the crime of stalking. If you suspect you are being stalked please contact Laura's House for help.

A restraining order (sometimes called a protection order) is legal document which is signed by a judge and tells your abuser to stop the abuse or face serious legal consequences. It offers protection from abuse to both girl and boy victims.

Types of Unwanted Pursuit:

With technology advances the abuser can stalk, pursue, and bully the victim without leaving the comfort of home.


"Cyberbullying" is when a minor child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another minor child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.


Textual-Harassment is receiving hateful or threatening messages via text.

Text wars or text attacks

Text wars or text attacks are when kids gang up on the victim, sending thousands of text-messages to the victim's cell phone or other mobile device. The victim is then faced with a huge cell phone bill and angry parents.


Blogs are online journals. They are a fun way for kids and adolescents to send messages for all of their friends to see. However, kids sometimes use these blogs to damage other kids' reputations or invade their privacy. For example, in one case, a boy posted a bunch of blogs about his breakup with his ex-girlfriend, explaining how she destroyed his life, calling her degrading names. Their mutual friends read about this and criticized her. She was embarrassed and hurt, all because another kid posted mean, private, and false information about her.


Adolescents sometimes create websites that may insult or endanger another adolescent. They create pages specifically designed to insult another adolescent or group of people. Kids also post other kids' personal information and pictures.

Sending Pictures through E-mail and Cell Phones

Many of the newer cell phones allow kids to send pictures to each other. The kids receive the pictures directly on their phones, and may send it to everyone in their address books. Kids often take a picture of someone in a locker room, bathroom or dressing room and post it online or send it to others on cell phones.

Internet Polling

Who's Hot? Who's Not? These types of questions run rampant on the Internet polls, all created by adolescents. Such questions are often very offensive to others and are yet another way that adolescents can "bully" other adolescents online.

Sending Malicious Code

Many kids will send viruses, spyware and hacking programs to their victims. They do this to either destroy their computers or spy on their victim. Trojan Horse programs allow the cyberbully to control their victim's computer remote control, and can be used to erase the hard drive of the victim.

Changing social beliefs, attitudes and the behaviors that perpetuate domestic violence while creating a safe space in which to empower individuals and families affected by abuse.

View Laura's House

Participating Schools

Back To Top