Information from the Confidential Address Program – if you are a victim of stalking, check your own state for that program, it is a very powerful resource.
Non-consensual tracking (NCT) is “the monitoring of a person’s location without their consent.”
The increase in personal tracking devices (e.g., Airtags, Tiles, etc.) may increase NCT risks for victims of stalking and other crimes. An online token from EndTAB.org provides information about NCT and ways to prevent it. You can find it at:
There is a TED talk about stalker-ware with tips to protect yourself. You can find it at:
I know the feeling of being watched, and not knowing when, or if, your stalker will jump out and attack. You become hyper-vigilant and frightened at the slightest noise or suspicious act.
These bracelets are survivor-made safety jewelry. Designed to empower you before a situation becomes an emergency. I saw this product on Facebook – it sounded interesting. I would have loved to have had this for Morgan to wear during the stalking – we were always trying to find ways to keep her safe. Check it out to see if it might be a good product in your safety toolkit. Use the promo code below for your discount.
I corresponded with them and they said, “We’re happy to extend a 20% promo code for you and your readers if you’d like to promote the product. Please use MorganIngram20.” I believe you also get free shipping on your first order. Go to https://getflare.com/products?
Check them out on Facebook https://www.facebook.com/buyflarejewelry/
Facts and answers about the bracelet: https://getflare.com/pages/faqs
Let me know what you think.
I have heard from many victims of stalking over the years that their emails were being hacked. They would use other computers, the library, anything they could, in order to send private emails without their stalker reading them and/or using them to locate their victim.
Proton Mail is a highly encrypted email service. https://protonmail.com
Is ProtonMail really safe?
ProtonMail is the world’s largest secure email service. It offers end-to-end encryption and lots of other great security features to keep your communications private. Even the company hosting your emails has no way of reading them, so you can rest assured that they can’t be read by third parties either.
Last night, on Morgan’s 30th birthday, Steve and I tossed red roses into the ocean, while talking to Morgan. I had remembered that she loved red roses, so that was our birthday present to her.
The first 3 stems that went into the water seemed to follow each other with the tide and then formed a circle, reminding me of the 3 of us, Morgan, Steve and myself…always together. I started to cry – it was as though Morgan was giving us a sign that we were still together.
We then walked off the pier, to follow the tide, wondering if the roses would eventually make it back to land. It was such a peaceful feeling, standing in silence, watching the tide gently float the flowers towards shore. When we arrived home, we continued Morgan’s birthday celebration with a homemade white cake with chocolate frosting in a sheet pan…just like Morgan used to make for everyone. It was a beautiful ending to a very emotional day, loving and missing Morgan.