Online Harassment: Resources and Legal Options in the US
Online harassment in the United States spans a broad spectrum of conduct — from targeted intimidation campaigns to coordinated identity-based abuse — and intersects with an increasingly complex patchwork of federal statutes, state criminal codes, and civil remedies. This page maps the service landscape for individuals seeking protective resources, the legal classifications that govern different harassment types, and the regulatory bodies and mechanisms through which complaints are filed and pursued. The sector includes law enforcement agencies, legal aid providers, platform-level enforcement frameworks, and specialized nonprofit advocacy organizations.
Definition and scope
Online harassment is defined by the Cyberstalking statute under 18 U.S.C. § 2261A as the use of any interactive computer service or electronic communication to engage in a course of conduct that places a person in reasonable fear of death or serious bodily injury, or causes substantial emotional distress. Federal law draws a distinction between cyberstalking — which requires demonstrated fear or distress — and general online harassment, which may meet thresholds under the Computer Fraud and Abuse Act (18 U.S.C. § 1030) when unauthorized access is involved.
All 50 states have enacted cyberstalking or cyberharassment laws, though the specific elements — intent standards, harm thresholds, and jurisdictional triggers — vary substantially by state (Cyberstalking Research Center, State Law Survey). The National Conference of State Legislatures tracks these statutory variations and classifies them by whether the conduct must be "repeated," whether third-party targeting is covered, and whether the statute includes provisions for civil protective orders.
Scope of coverage includes:
1. Direct harassment — messages, emails, or posts directed at a specific individual with threatening or intimidating content
2. Doxxing — the public disclosure of private identifying information to expose targets to third-party harm
3. Nonconsensual intimate image distribution (NCII) — colloquially referred to as "revenge porn"; criminalized in 48 states and the District of Columbia as of the Cyber Civil Rights Initiative's legislative tracker
4. Coordinated harassment campaigns — organized group targeting, including pile-on abuse and impersonation
5. Sextortion — coercive threats using intimate images or the threat of disclosure to extract compliance or payment
How it works
Online harassment operates through platform-mediated communication channels and exploits both technical access and social amplification. The escalation pattern across documented cases follows a recognizable structure:
- Initial contact or exposure — the harasser identifies a target through public profiles, data broker records, or breach datasets
- Escalation vector selection — direct messaging, public posting, email, or third-party recruitment
- Harm delivery — threats, image distribution, account compromise, or impersonation to damage professional or personal standing
- Obfuscation — use of anonymous accounts, VPNs, or proxy services to complicate attribution
The FBI's Internet Crime Complaint Center (IC3) processes complaints involving online harassment with a nexus to interstate wire communications, which triggers federal jurisdiction under 18 U.S.C. § 2261A. The IC3 logged 21,832 extortion complaints in 2022, a category that overlaps substantially with sextortion and harassment-based coercion, per the IC3 2022 Internet Crime Report.
Platform enforcement constitutes a parallel track. Under Section 230 of the Communications Decency Act (47 U.S.C. § 230), platforms are immunized from civil liability for third-party content, which limits civil claims against platforms directly but does not prevent enforcement of platform-specific terms of service. Victims navigating the online safety listings available through this reference can identify which service providers operate formal abuse response programs.
Common scenarios
Intimate partner and post-relationship harassment is the most common reported type, frequently involving NCII distribution, location tracking, and account takeover. Law enforcement referrals in these cases typically route through local domestic violence units before federal agencies become involved.
Workplace and professional identity targeting — including coordinated review attacks, false professional licensing complaints, and impersonation on LinkedIn or industry platforms — falls at the intersection of defamation law and harassment statutes. The FTC has enforcement authority where impersonation involves commercial deception, while the Equal Employment Opportunity Commission (EEOC) covers harassment tied to protected class characteristics in employment contexts.
Identity-based hate harassment — targeting individuals based on race, religion, sex, or national origin — may involve civil rights statutes enforced by the Department of Justice Civil Rights Division. The DOJ's Hate Crimes webpage outlines the federal charging standards under 18 U.S.C. § 249.
Contrast between anonymous harassment and identified harassment is operationally significant: anonymous cases require a subpoena or court order to compel platform disclosure of subscriber information before law enforcement can proceed, whereas identified cases can move directly to protective order applications or criminal complaint filing.
Decision boundaries
Selecting the appropriate legal or support pathway depends on the nature of conduct, the relationship between parties, and the severity of harm. The online-safety-directory-purpose-and-scope framework describes how service categories within this sector are classified.
Key decision thresholds:
- Criminal vs. civil pathway — criminal complaints require law enforcement initiation; civil actions (restraining orders, defamation suits) can be initiated independently through state courts
- Federal vs. state jurisdiction — federal charges apply when conduct crosses state lines, involves interstate wires, or meets the threat threshold under 18 U.S.C. § 2261A; state charges apply to intrastate conduct under local cyberharassment codes
- Platform removal vs. legal action — platform content removal is faster but does not create legal record; legal action preserves evidence and may result in damages or injunctive relief
- Emergency protective orders — available in most states within 24 hours of filing, without a full hearing, when immediate physical danger is documented
The how-to-use-this-online-safety-resource section of this reference explains how service listings are structured to support navigation across these pathways.
References
- 18 U.S.C. § 2261A — Cyberstalking Statute, U.S. House Legal Counsel
- 18 U.S.C. § 1030 — Computer Fraud and Abuse Act
- FBI Internet Crime Complaint Center (IC3)
- IC3 2022 Internet Crime Report
- National Conference of State Legislatures — Cyberstalking Laws
- Cyber Civil Rights Initiative — State Law Tracker
- 47 U.S.C. § 230 — Communications Decency Act, Section 230
- U.S. Department of Justice — Civil Rights Division, Hate Crimes
- Equal Employment Opportunity Commission (EEOC)
- Federal Trade Commission (FTC)