Previous All Posts Next

Cyber Stalking in North Carolina: Laws, Protection, and Forensics

Posted: March 31, 2026 to Cybersecurity.

Cyber Stalking in North Carolina: Laws, Protection, and Digital Forensics

Cyber stalking is a pattern of repeated, unwanted electronic contact or monitoring directed at a specific person that causes that person to feel fear, emotional distress, or concern for their safety. It encompasses behaviors carried out through email, text messages, social media, GPS tracking devices, spyware installed on personal devices, and any other digital communication technology. Unlike a single harassing message, cyber stalking involves a course of conduct: multiple acts over time that together create an atmosphere of intimidation, surveillance, and control. In North Carolina, cyber stalking is a criminal offense under N.C. General Statute 14-196.3, and victims have access to both criminal prosecution and civil protective orders to stop the behavior and hold offenders accountable.

If someone is monitoring your location, accessing your accounts without permission, sending threatening messages through fake profiles, or using technology to control and intimidate you, you are likely experiencing cyber stalking. North Carolina law takes these offenses seriously, and you have legal options. Petronella Technology Group's digital forensics team helps cyber stalking victims identify how they are being tracked, preserve evidence for court, and secure their devices against further surveillance.

North Carolina Cyberstalking Laws

North Carolina has multiple statutes that address different aspects of cyber stalking. Understanding which laws apply to your situation helps you communicate effectively with law enforcement and understand the potential consequences the offender faces.

N.C. Gen. Stat. 14-196.3: Cyberstalking

This is North Carolina's primary cyberstalking statute. Under N.C.G.S. 14-196.3, it is unlawful to use email, electronic communication, or an electronic monitoring device to do any of the following:

  • Threaten to inflict bodily harm to any person or to that person's child, sibling, spouse, or dependent, or threaten physical damage to the property of any person
  • Repeatedly communicate to another person to threaten, terrify, or harass that person
  • Knowingly make a false statement concerning death, injury, illness, disfigurement, or criminal behavior of another person, or a member of that person's family, to harass that person
  • Knowingly permit an electronic communication device to be used for any of the above purposes
  • Knowingly install, place, or use an electronic tracking device without consent to track the location of another person

A first offense under N.C.G.S. 14-196.3 is a Class 2 misdemeanor, carrying up to 60 days of imprisonment and a fine at the court's discretion. However, a second or subsequent offense, or cyberstalking in violation of a court order such as a protective order, is a Class I felony, carrying 3 to 12 months of imprisonment. If the offender is at least 18 years old and the victim is a minor, the offense is elevated to a Class H felony, carrying 4 to 25 months of imprisonment.

N.C. Gen. Stat. 14-196: Harassing Phone Calls and Electronic Communications

This statute covers a broader range of harassing electronic contact. Under N.C.G.S. 14-196, it is a Class 2 misdemeanor to use a telephone or electronic communication device to do any of the following:

  • Make a comment, request, suggestion, or proposal that is obscene, lewd, lascivious, filthy, or indecent with the intent to abuse, annoy, threaten, terrify, harass, or embarrass the recipient
  • Threaten to inflict injury or physical harm to the person or property of the person contacted or any member of that person's family
  • Make repeated communications to another person for the purpose of abusing, annoying, threatening, terrifying, harassing, or embarrassing any person at the called number
  • Knowingly make a false statement to a law enforcement agency concerning the death, injury, illness, or criminal behavior of another person to harass that person

While classified as a misdemeanor, N.C.G.S. 14-196 charges are often filed alongside the more serious cyberstalking charges under 14-196.3, adding additional counts that strengthen the prosecution's case. This statute is particularly relevant in cases involving persistent harassing text messages, voicemails, or anonymous messaging app communications.

N.C. Gen. Stat. Chapter 50B: Domestic Violence Protective Orders

North Carolina's Chapter 50B domestic violence protective order (DVPO) statute provides civil court protection for victims of domestic violence, which explicitly includes stalking and harassment by electronic means. A 50B protective order can be obtained against a current or former spouse, someone you live with or have lived with, someone you have a child with, a current or former household member, or someone of the opposite sex with whom you have been in a dating relationship.

A 50B protective order can specifically prohibit the respondent from:

  • Contacting the victim by telephone, email, text message, social media, or any other electronic means
  • Coming within a specified distance of the victim's home, workplace, or school
  • Possessing or using electronic tracking or monitoring devices directed at the victim
  • Harassing, threatening, or interfering with the victim in any way

Violation of a 50B protective order is a Class A1 misdemeanor, carrying up to 150 days of imprisonment. If the offender commits an act of cyberstalking while a 50B order is in effect, the cyberstalking charge is automatically elevated to a Class I felony under N.C.G.S. 14-196.3. Repeated violations can result in felony charges and increasingly severe sentences. The combination of a 50B protective order with cyberstalking criminal charges creates a strong legal framework for stopping the behavior and holding the offender accountable.

Federal Cyberstalking Law: 18 U.S.C. 2261A

When cyber stalking crosses state lines or uses interstate communication tools such as email, social media, and messaging platforms, federal law applies. Under 18 U.S.C. 2261A, it is a federal crime to use electronic communication to engage in a course of conduct that places a person in reasonable fear of death or serious bodily injury, or that causes, attempts to cause, or would be reasonably expected to cause substantial emotional distress. Federal cyberstalking carries a penalty of up to 5 years in federal prison, or up to life imprisonment if the victim suffers serious bodily injury or death as a result of the stalking. Because virtually all electronic communications cross state lines through internet infrastructure, federal jurisdiction is available in most cyberstalking cases.

Types of Cyber Stalking

Cyber stalking takes many forms, and offenders frequently use multiple methods simultaneously. Recognizing these tactics is the first step toward documenting the behavior and building a case for law enforcement and the courts.

GPS Tracking and Location Monitoring

Stalkers place physical GPS tracking devices on vehicles, in bags, or on personal belongings to monitor a victim's movements in real time. Consumer-grade GPS trackers are inexpensive and widely available, and many transmit location data to a smartphone app. Apple AirTags, Samsung SmartTags, and Tile trackers have all been used for stalking. In addition to physical trackers, stalkers exploit location-sharing features built into phones, apps, and family tracking services. If a stalker has access to a victim's iCloud or Google account, they can view the victim's real-time location through Find My iPhone, Google Maps Timeline, or similar services without the victim's knowledge.

Spyware and Stalkerware

Stalkerware is software secretly installed on a victim's phone or computer that monitors calls, text messages, emails, social media activity, browsing history, photos, and real-time location. Commercial stalkerware products are marketed as "parental monitoring" or "employee tracking" tools, but they are overwhelmingly used for intimate partner surveillance. These apps operate invisibly, with no icon visible on the home screen, and transmit all captured data to the stalker's own device. Common stalkerware apps include mSpy, FlexiSpy, Cocospy, and Spyic, among many others. Installing stalkerware on someone's device without their consent is a federal crime under the Computer Fraud and Abuse Act (18 U.S.C. 1030) and violates North Carolina's electronic monitoring provisions under N.C.G.S. 14-196.3.

Social Media Monitoring and Harassment

Stalkers create multiple fake accounts to follow, message, and monitor victims on social media platforms. They may leave threatening or harassing comments, send intimidating direct messages, tag the victim in disturbing posts, or create accounts that impersonate the victim. When the victim blocks one account, the stalker creates another. This pattern of creating new accounts to circumvent blocks is itself a form of harassment that platforms and courts recognize. Stalkers also monitor a victim's public posts to track their location, activities, relationships, and daily routines.

Email and Account Hacking

Gaining unauthorized access to a victim's email, social media, or cloud storage accounts gives a stalker direct access to private communications, photos, contacts, and location data. Stalkers may use stolen passwords, exploit password reset mechanisms, or use credentials obtained from data breaches. Once inside an account, the stalker can read all messages, forward emails to themselves, monitor the victim's communications in real time, and even impersonate the victim to damage their relationships and reputation.

Impersonation and Catfishing

Stalkers create fake profiles using the victim's name, photos, or personal information. These impersonation accounts may be used to damage the victim's reputation, contact the victim's friends and family with false information, create dating profiles in the victim's name, or lure new victims using the first victim's identity. North Carolina addresses impersonation through its identity theft statute (N.C.G.S. 14-113.20) and through the harassment provisions of N.C.G.S. 14-196.3.

Doxxing

Doxxing is the act of publicly releasing a person's private information, including their home address, phone number, workplace, family members' names, and other identifying details, with the intent to intimidate, harass, or incite others to target the victim. Stalkers use doxxing to make the victim feel unsafe and to recruit others into the harassment campaign. Doxxing that results in threats or physical harm can be prosecuted under both North Carolina and federal stalking and harassment statutes.

Harassment Campaigns and Coordinated Attacks

Some stalkers recruit others to participate in the harassment, either directly or by posting false information about the victim in online forums, message boards, or social media groups to provoke a pile-on effect. These coordinated harassment campaigns can involve dozens of people sending threatening messages, leaving negative reviews, contacting the victim's employer, or filing false reports with authorities. The original stalker orchestrates the campaign while appearing to have clean hands.

Warning Signs You Are Being Stalked Digitally

Many victims of cyber stalking do not immediately realize what is happening. The stalker's access to information may be attributed to coincidence, shared friends, or public information. Recognizing these warning signs early allows you to take protective action and begin documenting evidence before the situation escalates.

Device and Account Indicators

  • Unexplained battery drain: Stalkerware running in the background consumes significant battery power. If your phone's battery life has suddenly decreased without a change in your usage patterns, it could indicate hidden software running on the device
  • Unknown apps or processes: Check your installed applications list for apps you do not recognize. On Android, stalkerware sometimes appears as a system-sounding name like "System Service" or "Phone Manager." On iPhone, look for unfamiliar configuration profiles under Settings > General > VPN & Device Management
  • Increased data usage: Stalkerware transmits captured data (messages, calls, photos, location) to the stalker's server, which increases your cellular or Wi-Fi data consumption. Check your data usage for unexplained spikes
  • Accounts accessed from unknown locations: Most email and social media platforms show recent login activity. Check Gmail's "Last Account Activity," Facebook's "Where You're Logged In," and similar features on other platforms. Logins from unfamiliar devices, locations, or IP addresses indicate unauthorized access
  • Password reset emails you did not request: Receiving password reset notifications for accounts you did not initiate resets on indicates someone is attempting to gain access to your accounts
  • Devices behaving strangely: Phones lighting up when idle, making unusual sounds, taking longer to shut down, or showing brief screen flashes can indicate monitoring software is active

Behavioral Indicators

  • Someone knows your location without being told: If a person consistently knows where you are, where you have been, or where you are going without your having shared that information, they may be tracking your device or vehicle
  • Someone references private conversations: If someone reveals knowledge of private conversations, emails, or messages that they should not have access to, your accounts or devices may be compromised
  • Receiving messages from unknown or fake accounts: Multiple messages from accounts you do not recognize, especially accounts that seem to know personal details about you, suggest a stalker is using disposable accounts to maintain contact
  • Friends or family receiving strange messages about you: Stalkers sometimes contact a victim's social circle with false information, threats, or manipulative messages to isolate the victim or damage their relationships
  • Being tagged in posts or photos by unknown accounts: This is a method stalkers use to ensure the victim sees their content and knows they are being watched
Suspect You Are Being Stalked Digitally?

Petronella's digital forensics team can scan your devices for stalkerware, check for GPS trackers, audit your accounts for unauthorized access, and preserve evidence for law enforcement and protective order hearings. Every consultation is confidential. Request a confidential assessment or call 919-348-4912.

What to Do If You Are Being Cyber Stalked

If you believe you are being cyber stalked, take these steps in order. Acting methodically and preserving evidence from the beginning significantly strengthens both your criminal case and any protective order application.

1. Document Everything

Begin keeping a detailed log of every incident: date, time, platform, what happened, and how it made you feel. Take screenshots of every message, comment, post, email, and notification related to the stalking. Save voicemails. Photograph any physical evidence such as GPS trackers found on your vehicle or unfamiliar devices connected to your home network. Store all documentation in a secure location the stalker cannot access, such as a trusted friend's device, a new cloud account the stalker does not know about, or a USB drive kept in a safe place. This log becomes the foundation of your case.

2. File a Police Report

Contact your local police department and file a formal report. Bring your documentation log and any physical evidence. Request the case number and the name of the assigned officer. If the responding officer is unfamiliar with cyberstalking laws, specifically reference N.C.G.S. 14-196.3 and request that the report be forwarded to a detective or investigator who handles technology-facilitated crimes. Filing a police report creates an official record that supports your protective order application and establishes a timeline of law enforcement involvement.

3. Obtain a 50B Protective Order

If your stalker is a current or former intimate partner, household member, or someone you have been in a dating relationship with, you can file for a Chapter 50B Domestic Violence Protective Order. Go to the clerk of court in the county where you live, where the stalker lives, or where the stalking occurred. The clerk will provide the necessary forms. You can request an ex parte (emergency) temporary order that takes effect immediately without the stalker being present. A full hearing, where the stalker has the opportunity to respond, is scheduled within 10 days. At the hearing, present your documentation log, screenshots, police reports, and any forensic evidence. If the court grants the order, it can last up to one year and can be renewed.

If your stalker does not fall within the relationships covered by Chapter 50B, you can pursue a Chapter 50C Civil No-Contact Order, which is available to any person who is a victim of unlawful conduct including stalking, regardless of the relationship to the offender. The process is similar: file with the clerk of court, request a temporary order, and attend a hearing for a permanent order.

4. Report to Platforms

Report every harassing account, message, and post to the platform where it occurred. Most platforms have specific reporting categories for stalking, harassment, and impersonation. When you report, include as much context as possible. Platform reports can result in account suspensions, content removal, and cooperation with law enforcement. Even if the stalker creates new accounts, continue reporting each one. The pattern of account creation after suspension strengthens both platform enforcement and your legal case.

5. Scan Devices for Stalkerware

Have your phone, computer, and tablet professionally examined for stalkerware and other monitoring software. While consumer antivirus apps can detect some stalkerware, many commercial stalkerware products are specifically designed to evade standard detection. A professional digital forensics examination uses specialized tools to identify hidden processes, unauthorized configuration profiles, and data exfiltration activity that consumer tools miss. Do not attempt to remove suspected stalkerware yourself before a forensic examination, as removal may destroy evidence needed for prosecution.

6. Change All Passwords and Enable Two-Factor Authentication

Change passwords on every account: email, social media, cloud storage, banking, phone carrier, and any other service. Use a password manager to generate strong, unique passwords for each account. Enable two-factor authentication (2FA) using an authenticator app such as Google Authenticator, Authy, or Microsoft Authenticator. Do not use SMS-based 2FA if possible, as it is vulnerable to SIM swapping. Perform these changes from a device you are confident has not been compromised, such as a new device or a trusted friend's computer.

7. Engage Digital Forensics

Professional forensic investigation provides capabilities that go beyond what victims and general-purpose law enforcement can accomplish on their own. Engaging a forensics team early preserves volatile evidence and establishes a chain of custody that makes the evidence admissible in court proceedings. Petronella Technology Group's forensics team works with both cybersecurity and legal professionals to build comprehensive cases against stalkers.

How Digital Forensics Helps Cyber Stalking Victims

Digital forensics transforms a victim's sense of helplessness into a documented, evidence-backed case. The following capabilities are directly relevant to cyber stalking investigations.

Device Analysis for Stalkerware Detection

Forensic examiners use industry-standard tools to create a forensic image of the victim's device, which is a bit-for-bit copy that preserves all data including deleted files, hidden processes, and system logs. The image is analyzed for known stalkerware signatures, unauthorized configuration profiles, suspicious network connections, and data exfiltration patterns. The examination produces a detailed report documenting exactly what was found, how it got there, and what data it was capturing. This report serves as evidence in both criminal proceedings and protective order hearings.

GPS Tracker Detection

Physical GPS trackers can be concealed in a vehicle's undercarriage, wheel wells, dashboard, OBD-II port, or inside personal belongings. Forensic investigators use RF (radio frequency) detection equipment and physical inspection protocols to locate hidden trackers. When a tracker is found, the investigator documents its location, make, model, serial number, and any associated account information before it is removed. The tracker itself becomes physical evidence that can be linked to the stalker through purchase records, account registration, and cellular network data.

Account Audit and Unauthorized Access Detection

Forensic investigators audit the victim's email, social media, and cloud storage accounts for signs of unauthorized access. This includes analyzing login histories, reviewing connected devices and active sessions, checking for unauthorized email forwarding rules or filters that redirect messages to the stalker, examining API access tokens and third-party app permissions, and identifying recovery email addresses or phone numbers that may have been changed by the stalker. Each finding is documented with timestamps and technical detail suitable for presentation in court.

Evidence Preservation for Court

Digital evidence must be collected, preserved, and documented according to forensic standards to be admissible in legal proceedings. This means maintaining chain of custody, using write-blocking tools to prevent evidence modification, computing cryptographic hash values to verify integrity, and preparing reports that explain technical findings in language that judges and juries can understand. Improperly preserved evidence can be challenged and excluded, which is why professional forensic preservation is essential for both criminal prosecution and protective order hearings.

Expert Testimony for Protective Orders and Criminal Cases

Forensic investigators can testify as expert witnesses in protective order hearings and criminal trials. Expert testimony explains technical evidence, including how stalkerware works, how GPS trackers transmit data, how account access logs demonstrate unauthorized entry, and how the totality of the digital evidence establishes a pattern of stalking behavior. In protective order hearings where the stalker claims the contact was coincidental or the victim is exaggerating, forensic evidence and expert testimony can be decisive.

Protective Orders in North Carolina: What Electronic Contact Is Prohibited

When a North Carolina court issues a 50B Domestic Violence Protective Order or a 50C Civil No-Contact Order, the prohibited conduct typically includes all forms of electronic contact. Understanding what the order prohibits helps victims recognize violations and report them immediately.

What a Protective Order Covers

A standard protective order in North Carolina prohibits the respondent from contacting the victim by any means, which courts interpret to include:

  • Phone calls, text messages, and voicemails
  • Emails from any email address
  • Direct messages on any social media platform
  • Comments on the victim's social media posts
  • Contact through third parties directed by the stalker (proxy contact)
  • Creating fake accounts to contact or monitor the victim
  • Using electronic tracking or monitoring devices
  • Accessing the victim's accounts or devices without authorization
  • Posting about the victim online in a harassing or threatening manner

Consequences of Violating a Protective Order

Violating a 50B protective order in North Carolina is a Class A1 misdemeanor for the first offense, carrying up to 150 days of imprisonment. Law enforcement can arrest the violator without a warrant if there is probable cause to believe a violation has occurred. Any cyberstalking committed while a protective order is in effect is automatically elevated from a misdemeanor to a Class I felony. Repeated violations demonstrate a pattern that prosecutors use to seek enhanced sentences and that judges consider when deciding whether to issue longer-term or more restrictive orders.

Documenting Violations

If the stalker violates the protective order, screenshot or record the violating contact immediately. Note the date, time, and platform. Call law enforcement and reference your protective order case number. File a separate police report for each violation. Each documented violation strengthens the case for criminal prosecution and demonstrates to the court that stronger measures are needed.

Technology Safety Planning

A technology safety plan addresses the digital dimensions of your personal safety. Work through these steps with a trusted advocate, forensics professional, or domestic violence counselor.

Device Security

If your current phone has been compromised with stalkerware, the safest approach is to obtain a new device. Purchase a new phone on a new account that the stalker does not know about. Do not restore from a backup of the compromised device, as the stalkerware or compromised settings may transfer to the new phone. Set up the new device from scratch with new accounts and new passwords. Keep the compromised device powered on and undisturbed until forensic examination is complete, as turning it off or factory resetting it may destroy evidence.

Account Separation

Create entirely new email accounts that the stalker has no knowledge of. Use these new accounts for sensitive communications, legal correspondence, safety planning, and new social media profiles. Do not link new accounts to old phone numbers or recovery email addresses that the stalker knows. Consider using a separate email provider from what you used before.

Network Security

Use a VPN (Virtual Private Network) on all devices to encrypt your internet traffic and prevent the stalker from monitoring your online activity through network-level surveillance. Change your home Wi-Fi password and network name. Check your router's connected devices list for any devices you do not recognize. If the stalker had physical access to your home, consider replacing the router entirely, as some advanced monitoring tools can be installed on router firmware.

Privacy Settings and Digital Hygiene

Review and restrict privacy settings on all social media accounts. Disable location tagging on photos. Turn off location sharing in all apps. Review which apps have access to your location, contacts, microphone, and camera, and revoke permissions for any apps that do not need them. Disable Bluetooth and AirDrop when not in use, as these can be exploited for proximity tracking. Google your own name, phone number, and address periodically to check what information about you is publicly available, and request removal from data broker sites.

Trusted Contacts

Identify 2 to 3 trusted people who know your situation and can serve as emergency contacts. Share your real-time location with these trusted contacts through a secure method such as a dedicated safety app. Establish a check-in schedule and a code word or phrase that signals you need immediate help. Make sure your trusted contacts know how to contact law enforcement on your behalf and have copies of your protective order.

How Cyber Stalking Connects to Other Digital Threats

Cyber stalking often intersects with other forms of online abuse and digital crime. Understanding these connections helps victims and their advocates identify the full scope of what is happening.

Sextortion: Stalkers who gain access to intimate images through hacked accounts or surveillance may escalate to sextortion, threatening to distribute the images unless the victim complies with demands. If you are experiencing both stalking and threats related to intimate content, see our comprehensive guide on sextortion: what to do if you are being blackmailed online.

Identity Theft: Stalkers with access to a victim's accounts and personal information may commit identity theft, opening accounts, making purchases, or filing fraudulent documents in the victim's name. Monitor your credit reports and consider placing a credit freeze with all three bureaus.

Intimate Partner Violence: Cyber stalking is one of the most reliable indicators that physical violence may follow. Research published by the National Network to End Domestic Violence (NNEDV) shows that technology-facilitated abuse is present in virtually all domestic violence cases. If you are experiencing cyber stalking from a current or former partner, treat it as a serious safety threat and develop a comprehensive safety plan that addresses both digital and physical security.

Workplace Disruption: Stalkers sometimes contact a victim's employer, coworkers, or clients with false information to damage the victim's professional reputation and livelihood. Organizations should have protocols for handling third-party harassment of employees and should engage their cybersecurity team when an employee reports being stalked.

Get Professional Help to Stop Cyber Stalking

Petronella Technology Group provides digital forensics investigation, device analysis, evidence preservation, and expert testimony for cyber stalking cases in North Carolina. We work directly with law enforcement and attorneys to build cases that hold stalkers accountable. Contact us for a confidential consultation or call 919-348-4912.

Resources for Cyber Stalking Victims in North Carolina

The following organizations provide crisis intervention, legal advocacy, counseling, and safety planning for stalking victims. All services listed are free or low-cost.

  • InterAct of Wake County — Crisis intervention, legal advocacy, and shelter for victims of domestic violence and stalking in the Raleigh-Durham area. 24-hour crisis line: 919-828-3005. Website: interactofwc.org
  • North Carolina Coalition Against Domestic Violence (NCCADV) — Statewide resource connecting victims to local domestic violence programs, legal aid, and safety planning services. Website: nccadv.org
  • NC Victim Assistance Network (NC VAN) — Statewide referral service for crime victims, including stalking and harassment. Connects victims to local advocacy organizations, legal aid, and victim compensation programs. Website: nc-van.org
  • National Domestic Violence Hotline — 24/7 crisis support, safety planning, and referrals. Call 1-800-799-7233 or text START to 88788. Website: thehotline.org
  • NNEDV Safety Net Project — The National Network to End Domestic Violence's technology safety program provides resources specifically addressing technology-facilitated abuse, stalkerware, and digital safety planning. Website: techsafety.org
  • Stalking Prevention, Awareness, and Resource Center (SPARC) — National resource center for stalking information, research, and victim services. Website: stalkingawareness.org
  • North Carolina Attorney General's Office — File complaints related to online harassment and cyberstalking at ncdoj.gov/file-a-complaint or call 877-566-7226
  • FBI Internet Crime Complaint Center (IC3) — Report cyberstalking that crosses state lines or involves federal offenses at ic3.gov

Key Takeaways

  • Cyber stalking is a crime in North Carolina. Under N.C.G.S. 14-196.3, cyberstalking can be charged as a misdemeanor or felony depending on the circumstances, with penalties up to 25 months of imprisonment
  • Protective orders cover electronic contact. A 50B or 50C order can prohibit all forms of digital contact, tracking, and monitoring. Violation is a criminal offense with up to 150 days imprisonment
  • Document everything from day one. Screenshots, logs, and saved messages form the foundation of both criminal cases and protective order applications
  • Professional forensics strengthens your case. Device analysis can detect stalkerware, GPS trackers, and unauthorized account access that would otherwise go unproven
  • Do not remove stalkerware yourself. Have your device forensically examined first to preserve evidence of what was installed, when it was installed, and what data it captured
  • Create a technology safety plan. New devices, new accounts, VPN, restricted privacy settings, and trusted contacts are all part of a comprehensive digital safety strategy
  • Help is available. InterAct of Wake County (919-828-3005), the National Domestic Violence Hotline (1-800-799-7233), and NNEDV Safety Net all provide free support for technology-facilitated stalking

Cyber stalking is not something you have to endure alone. North Carolina law provides strong criminal penalties and civil protective orders to stop stalkers and hold them accountable. The combination of legal action, professional digital forensics, and a comprehensive technology safety plan gives victims the tools to reclaim their safety and their lives.

If you or someone you know is experiencing cyber stalking in North Carolina, contact Petronella Technology Group for a confidential consultation. Our digital forensics team specializes in stalkerware detection, evidence preservation, GPS tracker identification, and expert testimony for protective order hearings and criminal cases. Call 919-348-4912 or visit our incident response page for immediate assistance.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now