Cyberstalking Examples (2023): The 3 Worst Attacks Ever
By Tibor Moes / Updated: June 2023
Cyberstalking Examples
Just as a physical shadow grows longer with the setting sun, a digital shadow can expand and loom over your life in the hands of a cyberstalker. In the vast and interconnected world of the internet, cyberstalking is the equivalent of being persistently followed down a dimly lit street. Let’s shed some light on this modern-day problem and explore its intricacies.
Summary
Cyberstalking is the use of digital communication to harass, intimidate, or track a person persistently. It’s a growing concern, leveraging technologies like emails, social media, and messaging apps to invade personal boundaries, often leading to emotional distress and, in severe cases, psychological trauma.
Example 1: Amy Boyer’s Case (1999). A classic early example, Amy Boyer was stalked and eventually killed by Liam Youens. Youens had hired an online investigation agency to obtain Boyer’s personal information. This tragic incident led to the adoption of stricter privacy laws and an increased focus on cyberstalking.
Example 2: The “MySpace Cyberstalking Case” (2006). A 13-year-old girl, Megan Meier, tragically ended her life following a hoax perpetrated by Lori Drew, the mother of a former friend. Drew created a fictional MySpace account pretending to be a teenage boy who flirted with and later turned against Megan. This case highlighted the severe emotional damage cyberstalking can cause.
Example 3: The Gamergate Harassment (2014). Zoe Quinn, a game developer, became a target of a widespread harassment campaign after a blog post by a former boyfriend. The abuse involved doxing, threats, and false accusations. It started a wider conversation about misogyny in gaming culture and led to discussions about online harassment and free speech.
Don’t become a victim of cybercrime. Protect your devices with the best antivirus software and your privacy with the best VPN service.
Cyberstalking Examples In-Depth
Amy Boyer’s Case (1999)
Imagine, for a moment, the internet in the late 90s. It was a time when our virtual and physical worlds were still learning to intermingle. Back then, the dark corners of the online world were relatively unexplored, and the internet was viewed as a brave new frontier. But even in those early days, shadows started to form, with one of the darkest emerging from the tragic case of Amy Boyer.
Amy Boyer was an average young woman, carving out her life in the small town of Nashua, New Hampshire. Little did she know, she was the object of an unhealthy obsession, stalked by a former high school classmate, Liam Youens. For years, Youens harbored this secret obsession, following Amy’s life from the shadows. He maintained an unsettling website detailing his fixation, a chilling precursor to the social media stalking we recognize today.
In 1999, the online and offline worlds collided in the worst possible way. Youens sought the help of an online investigation agency named ‘Docusearch’ to find more about Amy. Posing as a prospective employer, he acquired Amy’s Social Security number, work address, and other private details. This pivotal move crossed a dangerous line, turning virtual stalking into a physical threat.
On October 15, 1999, this obsession culminated in tragedy. Using the information he’d obtained, Youens confronted Amy outside her workplace and fatally shot her before turning the gun on himself. The online stalking had leaped from the shadows of the internet into the harsh light of day, claiming a life and shaking the community.
Amy’s death was a stark wake-up call to the potential dangers lurking in the digital landscape. Her case spurred legal action against Docusearch, resulting in a groundbreaking New Hampshire Supreme Court ruling in 2003. The court ruled that companies must ensure that sensitive information isn’t used for illegitimate or harmful purposes, setting a precedent for privacy laws.
Amy Boyer’s case was a grim reminder that the digital world could have real, tragic consequences. It changed how we view internet safety and privacy, sparking conversations and legislation to protect innocent individuals from similar fates.
As we reflect on this case, we’re reminded of how crucial it is to maintain vigilance in our online interactions. We must continue to push for stronger data privacy laws and promote safe digital habits. It’s through understanding and learning from cases like Amy’s that we can hope to create a safer online world for everyone.
The “MySpace Cyberstalking Case” (2006)
When you think about the internet in the mid-2000s, you may recall the rapid expansion of social media. Among the pioneers of this new digital frontier was MySpace, a platform that allowed us to connect with others in unprecedented ways. But, as the tragic story of Megan Meier illustrates, this new form of connection also opened the door to new forms of harm.
Megan Meier, a teenager from Missouri, was much like any other 13-year-old girl navigating adolescence. She had her fair share of self-doubt and was particularly sensitive about her appearance, much like many young teens. Megan found solace in MySpace, a platform where she could form connections and friendships.
In 2006, Megan became close with a boy named “Josh Evans” on MySpace. ‘Josh’ was kind, good-looking, and seemed interested in her. As the relationship blossomed, Megan’s self-esteem soared. She found happiness in their blossoming digital friendship, unaware of the looming darkness.
After a few weeks of warmth, the digital relationship took a bitter turn. ‘Josh’ started sending Megan cruel messages, publicly shaming her and driving her into a pit of despair. The harsh words and humiliation were too much for the sensitive teen, and the situation tragically ended in Megan’s suicide.
The twist in this tale was as shocking as the tragedy itself. ‘Josh’ didn’t exist. He was a creation of Lori Drew, the mother of one of Megan’s former friends. Lori, along with her daughter and an employee, had fabricated the ‘Josh’ persona to gain insight into what Megan was saying about her daughter.
This heartrending incident underscored the devastating power of cyberbullying, a form of cyberstalking, and marked a turning point in the public’s perception of online harassment. For the first time, many people saw how devastating online stalking and bullying could be, leading to severe emotional distress and tragically, even loss of life.
Unfortunately, Lori Drew’s prosecution was complicated by the lack of relevant laws at the time. Although she was initially convicted, the verdict was later overturned due to the absence of regulations concerning cyberbullying. This troubling outcome brought to light the pressing need for specific laws to deal with online harassment.
Megan Meier’s story is a stark reminder that cyberstalking isn’t limited to secret admirers or obsessive strangers; it can manifest in any relationship, even among those we trust. The case became a catalyst for the introduction of stricter laws to combat online harassment and protect vulnerable individuals, especially teenagers, from similar fates.
The ripple effects of Megan’s story continue to resonate today. Her legacy lives on in the ongoing fight for stricter cyberstalking and cyberbullying laws, driving us toward a future where every individual can safely navigate the digital world.
The Gamergate Harassment (2014)
In the digital age, the world of video games is much more than a pastime; it’s a culture, a community. But as with any community, it’s not immune to darker elements. This was made painfully clear in 2014 when a dark wave called “Gamergate” rolled through the gaming world.
At the center of the storm was Zoe Quinn, a game developer, known for her game “Depression Quest.” Quinn’s life was upended when an ex-boyfriend published a lengthy blog post filled with personal details and allegations about their relationship.
What happened next was a maelstrom of online abuse that came to be known as “Gamergate.” Internet trolls seized the blog post, twisting it into a rally cry against Quinn. Her personal information was publicly exposed – a practice known as doxing – leading to a barrage of hate mail, threats, and false accusations. The digital harassment was so severe it forced Quinn to leave her home for her safety.
But Gamergate was more than just a personal attack on Quinn; it was a cultural earthquake that cracked open discussions about gender and toxicity within gaming culture. As it turned out, Quinn was not the only one targeted. Several other women in the industry, like feminist critic Anita Sarkeesian and developer Brianna Wu, also became victims of similar harassment campaigns.
Gamergate exposed the internet’s darker side in stark relief. The global digital community had to face the reality that cyberstalking could escalate into an organized, mass harassment effort capable of upending lives and instigating widespread fear. It revealed that even industries built around entertainment and escapism weren’t safe from the insidious reach of cyberstalkers.
On a positive note, the Gamergate incident sparked a broader dialogue about misogyny within gaming culture and online spaces. It helped identify the urgent need for platforms to take a more proactive role in moderating content and protecting their users from harassment.
Zoe Quinn’s story serves as a potent reminder of the scale and intensity that cyberstalking can reach. It’s a call for us to continue striving for a safer, more inclusive internet, where one’s passion doesn’t become a gateway for harassment. The echoes of Gamergate continue to shape policies and discussions around online safety, inclusivity, and freedom of speech.
In confronting and learning from incidents like these, we can hope to turn the tides against cyberstalking, creating an online world where all users can feel secure and respected.
Conclusion
Navigating through the tales of Amy Boyer, Megan Meier, and Zoe Quinn, we’ve journeyed through the darker alleys of our digital world, exploring the haunting specter of cyberstalking. These stories serve as potent reminders of the urgent need for vigilance, empathy, and stronger regulations in the digital space. They highlight the human toll of online harassment and drive home the message that the internet, like the physical world, demands respect for personal boundaries.
As we evolve further into the digital age, the challenge lies not just in the technology we create but also in shaping the digital culture that surrounds it. Let’s remember these stories as we move forward, using them to fuel our efforts in creating a safer, more respectful online world. After all, it’s in understanding our past that we can best shape our future.
How to stay safe online:
- Practice Strong Password Hygiene: Use a unique and complex password for each account. A password manager can help generate and store them. In addition, enable two-factor authentication (2FA) whenever available.
- Invest in Your Safety: Buying the best antivirus for Windows 11 is key for your online security. A high-quality antivirus like Norton, McAfee, or Bitdefender will safeguard your PC from various online threats, including malware, ransomware, and spyware.
- Be Wary of Phishing Attempts: Be cautious when receiving suspicious communications that ask for personal information. Legitimate businesses will never ask for sensitive details via email or text. Before clicking on any links, ensure the sender's authenticity.
- Stay Informed. We cover a wide range of cybersecurity topics on our blog. And there are several credible sources offering threat reports and recommendations, such as NIST, CISA, FBI, ENISA, Symantec, Verizon, Cisco, Crowdstrike, and many more.
Happy surfing!
Frequently Asked Questions
Below are the most frequently asked questions.
What is the psychological impact of cyberstalking?
The psychological impact of cyberstalking can be severe. Victims often experience feelings of fear, stress, anxiety, and depression. In some cases, the constant harassment and invasion of privacy can lead to post-traumatic stress disorder (PTSD). It’s essential for victims to seek professional help if they’re feeling overwhelmed by these emotions.
How can we protect ourselves from cyberstalking?
Protecting yourself from cyberstalking involves both proactive and reactive measures. Proactively, you can guard your personal information, use strong, unique passwords, adjust your social media privacy settings, and be cautious about who you interact with online. Reactively, if you believe you’re being stalked, document everything, report the behavior to the appropriate platform, and if necessary, involve law enforcement.
What are the laws against cyberstalking?
Laws against cyberstalking vary by country and even by state or region within countries. In the United States, for instance, federal law recognizes cyberstalking as a criminal offense under the ‘Violence Against Women Act.’ Many states have specific laws or have updated their harassment and stalking laws to include digital forms. However, legislation globally is still catching up to the nuances of cyberstalking.

Author: Tibor Moes
Founder & Chief Editor at SoftwareLab
Tibor is a Dutch engineer and entrepreneur. He has tested security software since 2014.
Over the years, he has tested most of the best antivirus software for Windows, Mac, Android, and iOS, as well as many VPN providers.
He uses Norton to protect his devices, CyberGhost for his privacy, and Dashlane for his passwords.
This website is hosted on a Digital Ocean server via Cloudways and is built with DIVI on WordPress.
Security Software
Best Antivirus for Windows 11
Best Antivirus for Mac
Best Antivirus for Android
Best Antivirus for iOS
Best VPN for Windows 11
Cyber Threats
Advanced Persistent Threat (APT)
Adware
Adware Examples
Black Hat Hacker
Bloatware
Botnet
Botnet Examples
Brute Force Attack
Business Email Compromise (BEC)
Catfishing
Clickjacking
Computer Virus
Computer Virus Examples
Computer Worm
Computer Worm Examples
Credential Stuffing
Cross-Site Request Forgery (CSRF)
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) Examples
Cross-Site Scripting (XSS) Types
Crypto Scam
Cyber Espionage
Cyber Risk
Cyber Squatting
Cyber Threat
Cyber Threat Examples
Cyber Threat Types
Cyberattack
Cyberbullying
Cyberbullying Examples
Cyberbullying Types
Cybercrime
Cybercrime Examples
Cybercrime Types
Cyberstalking
Cyberstalking Examples
Data Breach
Data Breach Examples
Data Breach Types
Data Leak
DDoS Attack
DDoS Attack Examples
Deepfake Examples
Doxxing
Doxxing Examples
Email Spoofing
Exploit
Exploit Examples
Exploit Types
Fileless Malware
Grey Hat Hacker
Hacking
Hacking Examples
Hacking Types
Hacktivism
Identity Theft
Identity Theft Examples
Identity Theft Types
Insider Threat
IP Spoofing
Keylogger
Keylogger Types
Malicious Code
Malicious Code Examples
Malvertising
Malware
Malware Examples
Malware Types
Man In The Middle Attack
Man in the Middle Attack Examples
Online Scam
Password Cracking
Password Spraying
Pharming
Phishing
Phishing Email
Phishing Email Examples
Phishing Examples
Phishing Types
Ransomware
Ransomware Examples
Ransomware Types
Robocalls
Rootkit
Rootkit Examples
Scareware
Security Breach
Session Hijacking
Smishing
Smurf Attack
Social Engineering
Social Engineering Examples
Social Engineering Types
Spam
Spam Examples
Spam Types
Spear Phishing
Spear Phishing Examples
Spoofing Examples
Spyware
Spyware Examples
SQL Injection
SQL Injection Examples
SQL Injection Types
Trojan Horse
Trojan Horse Examples
Vishing
Watering Hole Attack
Whale Phishing
Zero Day Exploit
Zero Day Exploit Examples