Cyber Stalker

Bearing Witness in the Digital Trenches

,

I’ve worked in IT for around 30 years. I used to tell young people that working in technology is more about solving puzzles and helping people than it is about the technology itself. With cyber threats growing more complex, my work necessarily turned to cybersecurity. I’ve seen more of the human heart than I ever expected—some of it brave and beautiful, much of it broken. I’ve had to create multiple fake digital identities so students could keep going to school under new names and email accounts because an abusive ex was stalking them. I’ve supported murder investigations. I’ve verified misconduct that meant people lost jobs. None of that feels like “just computers.” Some days it feels like walking through the valley of the shadow of death. And I’ll be honest, writing this I am weary tonight.

If you want to understand why this matters, read the report about a Glenrock teen whose family endured a year of stalking and impersonation; the adult behind it received probation. The family is pushing for stronger protections when adults target minors. Read it here: https://cowboystatedaily.com

Most of the ugliest cases I’ve seen weren’t Hollywood hacks. They were relentless harassment and impersonation—ordinary cruelty amplified by reach and speed. Evil loves confusion; it blurs who’s who. The most effective countermeasure isn’t a shiny tool; it’s a better process: pause, verify, and escalate.

The Voice-Cloning Reality Check

You’ve heard the stories: a grandparent gets a call—“Grandma, it’s me… I’m in trouble… don’t tell Mom”—or a stranger jumps in and demands money right now. Scammers can now mimic a loved one’s voice from a short clip. Here’s the hard truth from my own testing: I can mimic a voice with roughly 20 seconds of audio. Research shows convincing cloning from three seconds (Microsoft’s VALL-E) and even two seconds (Meta’s Voicebox). A convincing voice on the phone isn’t proof anymore. Treat surprise pleas—especially those demanding secrecy, urgency, or money—as suspect. See the FTC’s alert: Don’t trust the voice—verify

WHAT PARENTS CAN DO TONIGHT

  • Set a family code word. Any “emergency” call must include it. If not, hang up and call back using a saved number. [5]
  • Use two-channel verification/ Call to verify. Don’t act on scary calls or texts without confirming via another method (in person, a known number, or the school office line). The FTC’s guidance is simple: don’t trust the voice—verify. [2]
  • Lock down discoverability. Make profiles private; remove school/team names and daily schedules from bios; limit who can message or tag your child.
  • Harden accounts and the phone number. Turn on MFA for email, school portals, and socials; add a voicemail PIN and a carrier port-out PIN to block number takeovers.
  • Teach “pause, verify, escalate.” Kids should save evidence (screenshots, links), avoid replying, and hand it to a designated adult at school.
  • Report it. Preserve evidence and notify your school and local law enforcement; you can also report online crimes to the FBI’s IC3. [6]

FOR SCHOOLS & SMALL ORGS (QUICK HITS)

  • Default-private directories; no public class rosters or email-pattern pages.
  • Stand up an Identity Shield kit: same-day steps to mask directory visibility, rotate usernames/email, lock/reissue credentials, preserve evidence, and notify staff with a neutral “route to security” script.
  • One 30-minute tabletop each semester beats a dozen unread policy PDFs.

We can’t be naive or uninformed about the depravity of man as described in the Christian tradition. Even so, the light still shines. For us, that looks like telling the truth, defending the vulnerable, and stepping toward the mess instead of away from it.

If you read one thing today, read the Glenrock family’s account—and consider what it will take to keep **the next child—or maybe your child—**safe. [1]

Sponsor note: In October, we’re running a Cybersecurity Awareness Month series—weekly columns and practical tip sheets for families, seniors, and small businesses. We’re seeking local sponsors to underwrite the series. If your business, bank, nonprofit, or civic group would like to help, please contact the Plainsman Herald. Help us to help you to stay safe online.

Sources (print):
[1] Cowboy State Daily, Glenrock stalking/impersonation report (Mar. 24, 2025): https://cowboystatedaily.com/2025/03/24/teen-and-family-recall-harrowing-year-of-stalking-impersonation/

[2] FTC Consumer Advice: “Scammers use AI to enhance their family emergency schemes” (Mar. 20, 2023). https://consumer.ftc.gov/consumer-alerts/2023/03/scammers-use-ai-enhance-their-family-emergency-schemes

[3] Microsoft Research, VALL-E (3-second prompt). https://www.microsoft.com/en-us/research/project/vall-e-x/

[4] Meta AI, Voicebox (2-second sample). https://ai.meta.com/blog/voicebox-generative-ai-model-speech/

[5] National Cybersecurity Alliance, “Why your family and coworkers need a safe word…” (Mar. 31, 2025). https://www.staysafeonline.org/articles/why-your-family-and-coworkers-need-a-safe-word-in-the-age-of-ai

Help support our work by buying our books:



Check out our latest on Amazon.com



Check out our latest on Amazon.com



Check out our latest on Amazon.com

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.