Stalking or unwanted pursuit is a crime under the laws of all 50 states. Any person who willfully, maliciously, and repeatedly follows or harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her safety, or the safety of his or her immediate family is guilty of the crime of stalking. If you suspect you are being stalked please contact Laura's House for help.

Types of Unwanted Pursuit:

With technology advances the abuser can stalk, pursue, and bully the victim without leaving the comfort of home.


"Cyberbullying" is when a minor child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another minor child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.


Textual-Harassment is receiving hateful or threatening messages via text.

Text wars or text attacks

Text wars or text attacks are when kids gang up on the victim, sending thousands of text-messages to the victim's cell phone or other mobile device. The victim is then faced with a huge cell phone bill and angry parents.


Blogs are online journals. They are a fun way for kids and adolescents to send messages for all of their friends to see. However, kids sometimes use these blogs to damage other kids' reputations or invade their privacy. For example, in one case, a boy posted a bunch of blogs about his breakup with his ex-girlfriend, explaining how she destroyed his life, calling her degrading names. Their mutual friends read about this and criticized her. She was embarrassed and hurt, all because another kid posted mean, private, and false information about her.


Adolescents sometimes create websites that may insult or endanger another adolescent. They create pages specifically designed to insult another adolescent or group of people. Kids also post other kids' personal information and pictures.

Sending Images/Videos through Cell Phones

Cell phones and apps have made it easy for teens to access images and videos of other people. Some people take advantage of this and send these images and videos to other people or post it on social media.

Internet Polling

Who's Hot? Who's Not? These types of questions run rampant on the Internet polls, all created by adolescents. Such questions are often very offensive to others and are yet another way that adolescents can "bully" other adolescents online.

Sending Malicious Code

Many kids will send viruses, spyware and hacking programs to their victims. They do this to either destroy their computers or spy on their victim. Trojan Horse programs allow the cyberbully to control their victim's computer remote control, and can be used to erase the hard drive of the victim.

Changing social beliefs, attitudes and the behaviors that perpetuate domestic violence while creating a safe space in which to empower individuals and families affected by abuse.

View Laura's House

Participating Schools

Back To Top