WAG

Provider Guide

Dealing With Stalkers & Harassment

Stalking and harassment are occupational hazards that many providers encounter. Whether it's an obsessive former client, an online troll, or someone who's fixated on you without ever having met you, the experience is frightening and isolating. This guide gives you practical tools to detect, document, and deal with stalking and harassment at every level.

If you are in immediate danger, call emergency services. This guide covers planning and response strategies, but no guide replaces calling for help when you feel physically threatened right now. In the UK, dial 999. In the US, dial 911. In Australia, dial 000. In New Zealand, dial 111.

Early Warning Signs

Stalking rarely begins as full-blown stalking. It escalates. Recognizing early warning signs gives you the best chance of stopping the behavior before it becomes dangerous.

Red Flags in Client Behavior

  • Excessive contact: Repeated texts, calls, or emails beyond what's normal for booking management. Especially concerning if they continue after you've asked them to stop or haven't responded.
  • Boundary pushing: A client who repeatedly tries to extract personal information — your real name, where you live, where you work outside of sessions, your daily routine.
  • Showing up unannounced: Appearing at your incall without a booking, or "coincidentally" appearing at locations they shouldn't know you frequent.
  • Gift escalation: Moving from appropriate gifts to extravagant, unwanted, or symbolically possessive gifts (jewelry, keys to their apartment, items that imply a relationship).
  • Jealousy about other clients: Questions about who else you see, how many clients you have, or expressions of jealousy about your other bookings.
  • Claiming a special relationship: Insisting that your connection is different from other client relationships, that you have "real feelings" for each other, or that you're in a relationship.
  • Threats disguised as concern: "I'm worried about you doing this work" or "I just want to take care of you" can be precursors to controlling behavior.
  • Research into your personal life: Mentions of information you never shared — your real neighborhood, a family member's name, a social media account you keep separate from work.

Documentation — Your Most Important Tool

If you suspect you're being stalked or harassed, documentation is everything. It's the foundation for restraining orders, police reports, and legal action. Start documenting immediately — even if you're not sure yet whether the behavior qualifies as stalking.

What to Document

  • Every contact attempt: Screenshot texts, emails, DMs, and voicemails. Include timestamps, phone numbers, email addresses, and usernames.
  • Physical encounters: Date, time, location, what happened, what was said, any witnesses. Write it down as soon as possible while details are fresh.
  • Online activity: Screenshots of social media comments, profile views (if the platform shows them), new accounts that appear to be the same person, forum posts about you.
  • Gifts and mail: Photograph anything sent to you. Keep items in a bag without handling them more than necessary (in case fingerprints become relevant).
  • Vehicle sightings: If you notice the same car near your home or incall, note the make, model, color, and license plate. Photograph it if you can do so safely.
  • Your emotional state: Courts consider the impact of stalking on the victim. A brief daily note about how the situation is affecting you — sleep, anxiety, work impact — can be powerful evidence.

How to Store Documentation

  • Use a dedicated folder on a cloud service (Google Drive, Dropbox, iCloud) that the stalker doesn't have access to
  • Back up everything in at least two locations
  • Share access with a trusted person in case something happens to you
  • Use a dedicated email address to forward evidence to — this creates an independent, timestamped record
  • Consider using a stalking documentation app like SmartSafe (AU) or Bright Sky (UK) that's specifically designed for this purpose

Don't delete anything. Even if messages are upsetting, don't delete them. Every piece of communication is evidence. If you can't bear to re-read them, have a trusted friend screenshot and file them for you.


Digital Stalking

For providers, digital stalking is often the first form of harassment — and sometimes the most insidious because it can happen without you knowing for a long time.

Common Digital Stalking Methods

  • Image searching: Using your work photos to find your real identity through reverse image search. This is why using unique photos across personal and work accounts is critical.
  • EXIF data mining: Photos contain metadata including GPS coordinates, device information, and timestamps. Always strip EXIF data before posting any photos.
  • Social media cross-referencing: Comparing details from your work profile (city, age, physical characteristics, interests) with public social media accounts to identify you.
  • IP tracking: If you run a personal website, analytics may expose visitor IP addresses, but the reverse is also true — visiting a stalker's website could expose your IP. Use a VPN consistently.
  • Fake booking attempts: Creating fake client identities to get through your screening process and obtain personal information.
  • Account monitoring: Obsessively watching your advertising profiles, social media, and review sites for updates about your location, schedule, and availability.

Digital Defense Measures

  • Complete separation: Your work digital footprint and personal digital footprint should share zero overlap — different devices, different email providers, different phone numbers, different browsers. See our Digital OPSEC guide for details.
  • VPN at all times: A VPN masks your IP address and prevents location tracking through your internet connection.
  • Regular reverse image searches on yourself: Periodically run your work photos through Google Images and TinEye to see where they appear.
  • Monitor data breaches: Use services like Have I Been Pwned to check if your email addresses have appeared in data breaches.
  • Two-factor authentication everywhere: On every account — work and personal. Use an authenticator app, not SMS-based 2FA, which can be compromised through SIM-swapping.
  • Assume everything digital is permanent: Even "disappearing" messages on apps like Snapchat or WhatsApp can be screenshotted. Don't send anything digitally that you wouldn't want a stalker to possess.

Physical Stalking

Physical stalking is the most immediately dangerous form of harassment. If someone has located your home, your real workplace, or your regular routes, the threat level is serious.

Signs You're Being Physically Followed

  • The same person or vehicle appearing in multiple unrelated locations
  • Someone you recognize from a booking appearing in your personal life
  • Evidence of tampering with your car, mail, or property
  • Receiving items or messages that reference places you've been when you didn't tell anyone
  • Neighbors or friends mentioning that someone has been asking about you

Immediate Response

  • Do not go home: If you believe you're being followed, do not lead them to your home. Drive to a police station, a busy public place, or a friend's home. Call someone and stay on the phone.
  • Vary your routine: Change your routes, your schedule, your shopping locations. Predictability is a stalker's advantage.
  • Security audit of your home: Check locks, windows, lighting. Consider upgrading to smart locks, installing cameras (doorbell cameras are a good start), and adding motion-sensor lighting.
  • Inform trusted people: Tell friends, neighbors, and building management what's happening. Give them a photo of the stalker if you have one. Ask them to alert you if they see this person.
  • Consider temporarily relocating your incall: If a stalker knows your incall location, working from there isn't safe until the situation is resolved.

Restraining Orders and Legal Protection

Legal protection is available in most jurisdictions, but the process and effectiveness vary significantly.

United Kingdom

  • Stalking Protection Order: Police can apply for these on your behalf under the Stalking Protection Act 2019. They can be obtained without the stalker being convicted of a crime.
  • Non-Molestation Order: Available through family courts if the stalker is a former partner or family member. Breach is a criminal offense.
  • Restraining Order: Typically issued as part of criminal proceedings. The stalker must have been charged with or convicted of an offense.

United States

  • Protection Orders / Restraining Orders: Available in every state but procedures vary. Generally, you file at your local courthouse, present evidence, and a judge decides whether to issue the order.
  • Temporary vs. permanent orders: Temporary orders can often be obtained quickly (same day or within days). Permanent orders require a hearing where both parties can present evidence.
  • Interstate enforcement: Under the Violence Against Women Act, protection orders are enforceable across state lines.

Australia

  • Apprehended Violence Order (AVO): Available in NSW and similar provisions in other states. Police can apply on your behalf, or you can apply directly.
  • Family Violence Intervention Order: Available in Victoria for domestic and family situations.

Restraining orders are paper, not shields. A restraining order gives you a legal tool — it means the stalker can be arrested for contacting or approaching you. But it doesn't physically prevent them from doing so. Always maintain your safety precautions even with a restraining order in place. Some stalkers escalate when an order is served because they feel they've lost control.


Police Reporting — Pros and Cons

Whether to involve police is one of the most difficult decisions a provider facing stalking has to make. The answer depends heavily on your jurisdiction and your relationship with law enforcement.

Reasons to Report

  • Creates an official record that strengthens future legal action
  • May be required before you can obtain a restraining order
  • Police may be able to identify or locate the stalker through methods unavailable to you
  • If the situation escalates to violence, having a documented history of reports supports prosecution
  • In some jurisdictions, stalking-specific laws carry significant penalties that can genuinely deter

Reasons to Hesitate

  • Criminalized jurisdictions: If sex work is illegal where you are, reporting stalking may expose you to criminal charges. This is an unconscionable situation, but it's the reality in many places.
  • Police attitudes: Some officers don't take stalking seriously, particularly when the victim is a sex worker. "What did you expect?" attitudes persist.
  • Identity exposure: Filing a police report may require providing your real name and address, which becomes part of a record that others may be able to access.
  • Stalker escalation: Some stalkers escalate when they learn police are involved, feeling they have nothing left to lose.

If You Decide to Report

  • Bring your documentation file — organized chronologically with clear evidence
  • Request to speak with a detective or specialist officer rather than a patrol officer
  • You can bring a support person or advocate with you
  • Clearly state that you are reporting stalking, and reference the specific legislation in your jurisdiction
  • Ask for a case number and the name of the officer handling your case
  • If you're not taken seriously, escalate — ask to speak with a supervisor, contact a victims' advocacy organization, or file a complaint about the handling

Security Upgrades

Whether or not you're currently dealing with stalking, these security measures reduce your vulnerability.

Physical Security

  • Locks: Deadbolts on all exterior doors. Smart locks that generate unique codes (so you can see who entered when). Chain locks or security bars for an additional layer.
  • Cameras: Doorbell cameras, exterior security cameras, and (with appropriate legal consideration) interior cameras in common areas. Cloud-stored footage is more secure than local storage that can be stolen.
  • Lighting: Motion-sensor exterior lights eliminate dark approaches to your home or incall.
  • Windows: Window locks, privacy film, and curtains that prevent seeing in. Ground-floor windows are particularly vulnerable.
  • Mail: Consider a PO Box or mail forwarding service so your physical address doesn't appear on correspondence.
  • Neighbors: Good relationships with neighbors are free security cameras. They notice unusual people and vehicles.

Personal Security

  • Vary your routes and routines — never be predictable
  • Park in well-lit, visible areas
  • Keep your phone charged at all times
  • Share your location with a trusted person using a live-tracking app
  • Consider a personal safety alarm or device
  • If legal in your jurisdiction, carry defensive tools you're trained to use

Changing Your Work Identity

Sometimes the safest response to a persistent stalker is to disappear — professionally. This means retiring your current work identity and rebuilding under a new one.

  • When to consider it: When a stalker has connected your work identity to your real identity and you can't effectively separate them. When continuing under your current name puts you in ongoing danger.
  • New identity checklist: New working name, new phone number, new email addresses, new advertising accounts, new photos (with a different photographer using a different style), new incall location if possible.
  • Transferring regulars: Trusted regular clients can be quietly informed of your new identity. Be selective — only tell clients you trust absolutely.
  • Grieving the loss: Losing a work identity you've built over years — your reputation, your reviews, your following — is a genuine loss. Allow yourself to feel it while also recognizing that safety takes priority over branding.

Online Harassment Management

Online harassment is different from stalking but can be equally damaging and sometimes evolves into stalking.

  • Trolls vs. threats: Distinguish between random internet harassment (unpleasant but usually not dangerous) and targeted, persistent campaigns against you (potentially dangerous). The former can often be ignored or blocked; the latter requires a response.
  • Block aggressively: Don't engage with harassers. Block, mute, and report. Engagement — even to defend yourself — gives them what they want: your attention.
  • Platform reporting: Use platform reporting tools for threats, harassment, and doxxing. Platforms don't always respond quickly, but reports create a paper trail.
  • Doxxing response: If your personal information is published online, contact the hosting platform for removal, file DMCA requests for stolen photos, and consider consulting a lawyer specializing in cyber harassment.
  • Negative review campaigns: If someone is posting false negative reviews to damage your business, contact the review platform with evidence of the campaign. Most platforms have policies against coordinated harassment.

When to Involve a Lawyer

Legal involvement isn't always necessary, but there are clear situations where it becomes advisable:

  • The stalker has made explicit threats of violence
  • You need a restraining order and want professional help with the application
  • The stalker is harassing you through legal channels (frivolous lawsuits, CPS reports)
  • You've been doxxed and need to pursue removal through legal mechanisms
  • Law enforcement isn't taking your reports seriously and you need advocacy
  • The stalker is a person with power or resources (a wealthy client, someone in law enforcement, a public figure)

Look for lawyers who specialize in stalking, harassment, or family violence. Sex-work-friendly lawyers are ideal — organizations like SWEAT, NSWP, and local advocacy groups can often provide referrals.


Support Resources

  • UK: National Stalking Helpline (0808 802 0300), Paladin National Stalking Advocacy Service, Suzy Lamplugh Trust
  • US: Stalking Prevention, Awareness, and Resource Center (SPARC), National Domestic Violence Hotline (1-800-799-7233), NNEDV Safety Net project
  • Australia: 1800RESPECT (1800 737 732), Stalking Prevention resources through state police services
  • International: Your local sex worker organization can often connect you with stalking-specific resources that are safe for providers to access

Being stalked is not your fault. It's not a consequence of your profession. It's not something you brought on yourself. It's a crime committed by someone who has chosen to violate your boundaries, your safety, and your peace. You deserve protection, support, and resolution — and you have the right to pursue all three, regardless of how you earn your living.


Related guides: Safety Essentials · Digital OPSEC · Safety Technology · Know Your Rights · Setting Boundaries