In Colorado, stalking is defined as harassing someone (i.e., following, contacting, or watching another person) in a way that causes them to feel fearful. A first time offense is considered a Class 5 Felony, and a Class 4 Felony when there is a restraining order or injunction already in place.

However, the term “stalking” is more commonly used to describe specific kinds of behavior directed at a particular person, such as harassing or threatening another products person.

Stalking is a gender neutral crime, with both male and female perpetrators and victims. However, best statistics indicate that 75-80% of all stalking cases involve men stalking women. Most stalkers tend to fall into the young to middle-aged categories. Most stalkers have above-average intelligence. Stalkers come from every walk of life and every socio-economic background. Virtually anyone can be a stalker, just as anyone can be a stalking victim.

Advocates are available to provide confidential crisis intervention and emotional support through the Women and Gender Advocacy Center. Advocates in the office are full time staff members dedicated to working with students who have experienced trauma. We provide information about academic, legal, medical, emotional, and student conduct resources to students dealing with stalking. We also offer support to secondary survivors, such as intimate partners, friends, family, and you.

Call 970-491-6384 during business hours M-F. An advocate is available for walk-ins or scheduled appointments during business hours. All information shared with advocates is confidential unless the person is a danger to themselves, someone is in imminent danger, a child currently under 18 has been abused or if the perpetrator is currently in a position of power over minors (even if the survivor is over the age of 18).

For excellent information on stalking, including stalking behavior logs, safety plan guidelines, and a complete handbook for victims, contact the National Center for Victims of Crime Stalking Resource Center online at, call 1-800-FYI-CALL (M-F 8:30 AM – 8:30 PM EST).


  • One in 6 women (16.2%) and 1 in 19 men (5.2%) in the United States have experienced stalking victimization at some point during their lifetime in which they felt very fearful or believed that they or someone close to them would be harmed or killed. (National Intimate Partner and Sexual Violence Survey(NIPSV), 2011)
  • According to the National Center for Victims of Crime, 1,006,970 women and 370,000 men are stalked annually in the United States.
  • Two-thirds (66.2%) of female victims of stalking were stalked by a current or former intimate partner; men were primarily stalked by an intimate partner or an acquaintance, 41.4% and 40.0%, respectively. (NIPSV, 2011)
  • Repeatedly receiving unwanted telephone calls, voice, or text messages was the most commonly experienced stalking tactic for both female and male victims of stalking (78.8% for women and 75.9% for men). (NIPSV, 2011)
  • Approximately 1 in 3 multiracial non-Hispanic women (30.6%) and 1 in 4 American Indian or Alaska Native women (22.7%) reported being stalked during their lifetimes. One in 5 Black non-Hispanic women (19.6%), 1 in 6 White non-Hispanic women (16.0%), and 1 in 7 Hispanic women (15.2%) experienced stalking in their lifetimes. (NIPSV, 2011)
  • There is a strong link between stalking and other forms of violence in intimate relationships: 81% of women were also physically assaulted; 31% of women were also sexually assaulted (Tjaden, 1998).


  • Stalking starts young: “[52%] of stalking victims were 18-29 years old when the stalking started”(Tjaden & Thoennes, 1998).
  • More than 13% of college women indicated that they had been stalked during one college year (Fisher, 2000).
  • Campus stalking incidents lasted an average of 60 days (Fisher, 2000).
  • The most common consequence of campus stalking was psychological effects. In over 15% of the incidents, victims reported that the stalker threatened harm. In over 10% of the incidents, they reported forced or attempted sexual contact (Ibid).
  • The “highest rates of stalking victimization”(Baum, Catalano, & Rand, 2009) occur in persons ages 18 to 19 and 20 to 24.
  • On college campuses, 3 in 10 college women report being injured emotionally or psychologically from being stalked (Fisher, 2000).
  • According to a recent study of college students, those who self-identify as gay, lesbian, bisexual, or transgender “were twice as likely to experience cyberstalking or e-mail harassment from a stranger as were students who identified themselves as heterosexual”( Finn, 2004).
  • Four in five campus victims knew their attackers (Fisher, 2000), (boyfriend or ex-boyfriend (42.4%), classmate (24.5%), acquaintance (1 0.3%), friend (9.3%), or coworker (5.6%))
  • 25% of the stalking incidents among college women involve cyberstalking (Cyberstalking, 1999).

On Seeking Help

    • 83% of stalking incidents were NOT reported to police or campus law enforcement (Ibid).
    • 93.4% of victims confided in someone, most often a friend that they were being stalked (Ibid).
    • 26.7% of victims considered their victimization a personal matter, and did not report it to police.
    • Additionally, only “7% of victims contacted victim services, a shelter, or a helpline”(Baum, Catalano,& Rand, 2009).

Stalking with technology involves the use of a wide array of technologies to stalk victims. Cyber-stalking, defined as “threatening behavior or unwanted advances directed at another using the internet and other forms of online and computer communications”(Kilmartin & Allison, 2007), and “the repeated use of the internet, e-mail, or related digital electronic communication devices to annoy, alarm, or threaten a specific individual or group of individuals”(Kilmartin & Allison, 2007 (pg. 29)), is the most commonly researched form of stalking with technology. Cyber-stalking also includes the use of spyware to monitor a victim’s computer use. Online databases prove problematic for victims because many public records, such as housing location and tax information, can allow a stalker access to a victim’s personal information. In many states, the removal of this information is allowed only for the personal records of peace officers and other public officials (Southworth, Finn, Dawson, Fraser, & Tucker, 2007). A 2009 BJS survey also found that of its participants, “[m]ore than 1 in 4 stalking victims reported some form of cyberstalking was used”(Baum, Catalano, & Rand, 2009).

  • Small camera technologies enable a stalker to survey a victim’s activities and guests, to ascertain a victim’s current location, and to enable more sophisticated acts of peeping, among other uses. Footage may also be used to gather information to insult, intimidate, and harass victims.
  • Global positioning systems (GPS) are used by stalkers to monitor victim movement by the placement of a device in cars, purses, or other personal belongings. This enables stalkers to surprise victims by showing up without announcement. You may not be aware that these devices are being used. They can be small and well hidden.
  • Faxes: Though not used as widely now as they once were. Many official businesses may still require this option.  When faxes are sent, they are often imprinted with identifiable or traceable information about where the fax originated. Faxes can provide stalkers information to locate you in safe housing, lawyers’ offices, or on a new job.
  • Social Media: Stalkers often utilize social media sites to gain knowledge about the daily habits of their victims. They may have access to specific locations if you have the GPS activated on the sites when uploading pictures or giving specific status updates. In dating/former dating relationships it may be likely that you have shared a password with your stalker. If so, change the password or discontinue use of that site.
  • Telephones equipped with caller-ID have provided stalkers with information about victim’s work or home location. Cordless (land based) phones are easily intercepted by baby monitors, walkietalkies, and other cordless phones, compromising personal discussions and safety planning. Cellular telephones can also be intercepted. Cell phones also allow a stalker to send unwanted text and picture messages to a victim. And often times Smartphones have GPS enabled as a default. This can give your stalker access to your locations. Additionally, printed and online cell phone billing records show one’s entire call log, making that information available to a stalker.
  • Chat Room: Even if you are not using a chat room, your stalker can use this forum to have others contact you for them, keep track of your movements, etc.
  • Instant Messages (IM): Similar to chat rooms but it is one-to-one communication.
  • Internet Service Provider (ISP): The host from which one gains the Internet connection and ability. Most colleges and universities provide Internet services for their students. Some students also choose to acquire a private host. If your stalker has access to your computer they can easily check your activity to monitor your daily activities.
  • Spam: A message sent many times via email and posted to newsgroups. When receiving it through email, the person’s name is usually not in the TO: line. The return address is usually forged or fake. There are websites that stalkers can access to send you unidentifiable emails.

While technologies can offer protection for victims (for example, the ability to call 911 from anywhere with a cellular phone), it is important to note the potential danger of these technologies when employed by a stalker.

Trust your instincts. If something doesn’t feel right it probably isn’t. Be wary about how much information you reveal and advertise to others. Keeping a low profile, especially in regards to cyber-stalking, is important for maintaining your privacy. If possible, carry a cell phone on you at all times in case you need to call for help.

If you are being stalked, you need to make it very clear to the stalker that you are not interested. A firm “No” is a clear and concise message that you are not interested in their advances. Don’t try to be polite by making up other excuses, as this leaves open windows for the stalker to think there is a chance.

Notify family members or close friends if you believe you are being stalked, both to build support and put them on the lookout. When going on a trip, give trusted a friend your itinerary so that they can notify authorities if something goes wrong. Vary your habits (ex: taking different ways to class) so that you are not an easy target for your stalker to follow.

Document Everything. The key to prosecuting a stalker is to document. Everything this individual does must be chronicled from the moment you believe you are being stalked. Also save everything the stalker sends you and record when and where you found it. Tape record phone calls the stalker leaves you and save voicemails, emails, instant messages, text messages and any social media contacts (facebook, twitter, etc). Experts also recommend that victims keep a journal to document all contacts and incidents, along with the time, date and other relevant information. Keep your records in a safe place and make a copy to leave in another location.

You may want to contact victim’s rights advocate groups (such as the Women and Gender Advocacy Center) who provide domestic violence or stalking advocacy and/or can get you connected to the appropriate resources. Early intervention is always best when trying to stop stalking.

What motivates a stalker?

Stalkers can be driven by several different reasons, and most have stalked more than one person in their lifetime. Stalkers are obsessed with their victims, and this obsession is expressed in many ways. Some common reasons for this obsession include power, control, and sometimes revenge. Most stalkers don’t take responsibility for their actions and blame others for making them do what they do. Relationship violence perpetrators often stalk their victims during the course of the relationship and especially after the victim leaves the relationships.

Types of Stalkers

Love Obsession Stalkers

This category is characterized by stalkers who develop a love obsession or fixation on another person with whom they have no personal relationship. The target may be only a casual acquaintance or even a complete stranger. The stalker begins to make contact with the victim in a variety of ways that may initially seem harmless, but their continued presence generates fear and terror for the victim. “Peeping Toms” should not be taken lightly, and can pose a very real threat to their victims. This category represents about 20-25 percent (20-25%) of all stalking cases. Stalkers in this category include those who develop fixations on regular, ordinary people-­ including classmates, their instructors, casual acquaintances or people they pass on campus.

The vast majority of love obsessional stalkers suffer from a mental disorder. Regardless of the specific disorder, nearly all display some delusional thought patterns and behaviors. Since most are unable to develop normal personal relationships through more conventional and socially acceptable means, they are have a life of fantasy relationships with persons they hardly know, if at all. They then attempt to act out their fictional plots in the real world.

They believe they can make the object of their affection love them. They desperately want to establish a positive personal relationship with their victim. When the victim refuses to follow the script or doesn’t respond as the stalker hopes, they may attempt to force the victim to comply by use of threats and intimidation. When threats and intimidation fail, some stalkers turn to violence.

Simple Obsession Stalkers

This second category represents 70-80 percent (70-80%) of all stalking cases and is distinguished by the fact that some previous personal or romantic relationship existed between the stalker and the victim before the stalking behavior began. Virtually all relationship violence cases involving stalking fall under this rubric, as do casual dating relationships. Simple Obsession stalkers exhibit a variety of characteristics, including desire for extreme control, obsessive behavior, vengeful attitudes, an inability to handle rejection, and an assumption of little or no responsibility for their actions.

The self-esteem of simple obsession stalkers is often closely tied to their relationship with their partner. In many cases, such stalkers bolster their own self-esteem by dominating and intimidating their mates. They often charm their perspective victim at first, but begin to slowly take over and control their lives. Exercising power over another gives them some sense of power in a world where they otherwise feel powerless. Stalkers turn to threats and violence as a means of reestablishing control of the victim.

Once the victim literally becomes the stalker’s primary source of self-esteem, their greatest fear becomes the loss of this person. Their own self-worth is so closely tied to the victim that when they are deprived of that person, they may feel that their own life is without worth. It is exactly this dynamic that makes simple obsession stalkers so dangerous. In the most acute cases, such stalkers will literally stop at nothing to regain their “lost possession” –their partner– and in so doing, regain their lost self-esteem. Rejection often triggers this type of stalking.  Stalkers are the most dangerous when their victims determine to physically remove themselves from the offender’s presence on a permanent basis by leaving the relationship. Indeed, stalking cases which emerge from relationship /dating violence situations constitute the most common and potentially lethal class of stalking cases.

(Adapted from , 2008)

  • Gifts or Notes: Stalking may start off as little gifts or notes either given to the victim or left where they will find it. The notes may be pleasant, sexually oriented, or simply off-the-wall depending on the stalker. They typically get worse as the gifts are continually rebuked.
  • Constant Communication: Stalkers work to harass their victims with a continual stream of information so that they know the assailant is always lurking out there.
  • Surveillance: Most stalkers are very good at tracking their victims. They follow, peep, and record. They usually keep logs or diaries, or memorize as much about the victim as possible. Electronic means of stalking have increased significantly in recent years.
  • Threats of Violence: Threats of violence may be a way to get the victim to do the stalker’s bidding. Also, there are stalkers who make no direct threat but do in fact commit acts of violence against their victims. Even if there are no physical threats of harm, continual harassment and surveillance become a very real emotional and psychological threat to victims of stalking.
  • Legal Harassment Tactics: Stalkers may file small claims or other legal actions against their victims. These cases are usually eventually dropped, and are strictly used to harass and manipulate the victim.
  • Libel and/or Slander: Stalkers may make slanderous (put downs, harmful words and or implications, etc.) remarks to victims’ friends or associates, thereby causing victims damage in both interpersonal relationships and associations in the workplace.
  • Harassment of Family Members: Stalkers may resort to harassing family members if they are not able to contact the victim directly. A jealous stalker may make threats to a significant other if they view them as a barrier. Some stalkers may harass victims’ pets.
  • Fraud: A stalker may run up large bills on the victim’s calling and credit cards, or go through the mail to disrupt services.
  • Vandalism: This is a common tactic used by stalkers, causing emotional and financial burden on the victim.
  • Trophy Collection: Some stalkers will commit burglary both to further their information gathering as well as spur on their fantasies. Several types of stalkers are known to collect items from their victims residences.