So, with my case which included Cyberstalking as well as the defined word "Stalking", it took years to finally prove it.
I knew from the very beginning when I left him that I was going to have issues when he said: "You can only get rid of me with a restraining order and a stick."
I don't even think at that time I took him seriously, I mean who goes around stalking other people? The financial burden and time that goes into something like that is quite large.
I can say though that I do believe the stalking on the physical side was done by a PI he hired but those too are very costly.
So in a summary, I was probably under device control since about 2014 - that for me is still a guess. I am not in the IT field and it is not easy to identify at all.
When I started realising that I believed my device was cloned or monitored, I started setting traps, I needed to do the process of elimination to see what part of my phone he was in. Was it just Facebook, WhatsApp, emails or more?
In the end I knew my entire device was cloned. Every single picture I took, message I sent and call I made, he knew about. He took this information and used it afterwards to play with my mind while throughout the entire process telling me I am crazy to think he would do such a thing but went on to dangle information in my face from my device.
It took years to figure it out, I had to learn that I was part of a game he enjoyed playing and although I was desperate to get out of this mess he put me in, it was going to take a while.
How did I catch him? Several times actually, and that was by placing information in 1. My google drive (it had to be insane information, the kind he would react to) because my other tactics didn't work.
I would say things to people, only one or two at first over a WhatsApp chat that I knew would set him off to respond to. Of course none of the information of was placing on chats or in my device was true. What was true was that it needed to end, and this was the only way I knew how. SAPS could not help me, they wanted evidence.
The power of baiting him and then screenshotting the responses while I diarised everything I was doing in a handwritten journal is what led me to a successful open and closed case. He also threatened me over the chats and I took screenshots of that too and sent it to friends to keep safe because my data would literally vanish.
I also purchased applications from the play store to pull phone reports from my phone which included settings which is now pertinent to the case.
He further to that admitted to the online exploit and there were other things that took place as well which will come out in the near future.
So if you have an cyberstalker, you need to play them at their own game. Everyone will slip up at some stage. He did, many times.
I got lucky!
Definition of cyberstalking
The definition of cyberstalking is a crime in which the stalker harasses a victim through electronic communication. This could happen through email, texts, calls, or messages posted on a website or discussion forum. A cyber stalker relies on the anonymity of the internet, which allows them to stalk victims without being identified. Cyberstalking is different from cyber spam, where a spammer targets a group of people with annoying messages. Whereas cyber stalkers target a specific victim and often use threatening messages.
The legal definition of cyberstalking is:
“The use of electronic communication to harass or threaten someone with physical harm.”