Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said].

Similar presentations


Presentation on theme: "Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said]."— Presentation transcript:

1 Technology & Stalking

2 Every single datum about my life is private? That's silly," Scalia [said].

3 What they found….. home phone number, home phone number, food preferences, food preferences, wife's personal e-mail address wife's personal e-mail address photos of his grandchildren, photos of his grandchildren,

4 Databrokers

5

6

7 Stalking occurs most commonly in intimate partner relationships. Most dangerous and most lethal

8 Cell Phones as a Stalking Tool Pretexting Web Access Excessive/Monitor Texting Silent mode/auto Video

9 Family Locator Plans

10 Trap Call Unblocks calls marked unknown or private and shows you the caller’s ID

11

12 GPS Tracking Devices Video 2

13 Common places GPS devices are often hidden.

14 Computers & Internet

15 Footprints on the Web

16 Internet History/Temp Files

17 Profiles: Impersonation, pose as victim

18 Personal Browser Accounts

19

20

21

22 Keystroke Logger

23 On-Line Social Networking

24 Social Networking & Stalking Find your kids – find you. Find your kids – find you. online status indicator online status indicator

25 Photos and videos that are shared to harass Photos and videos that are shared to harass Information can be used in most courts Information can be used in most courts Social Networking & Stalking

26 Email Accounts Impersonation of victim or a “friend” (Spoofing) Impersonation of victim or a “friend” (Spoofing) Reading email Reading email

27 Resetting account passwords Resetting account passwords Spoofing email Spoofing email IP Tracing IP Tracing Email Accounts

28 RCW 9.61.260 Cyberstalking RCW 9.61.260 Cyberstalking A person is guilty of cyberstalking if he or she, with intent to harass, intimidate, torment, or embarrass any other person, and under circumstances not constituting telephone harassment, makes an electronic communication to such other person or a third party: A person is guilty of cyberstalking if he or she, with intent to harass, intimidate, torment, or embarrass any other person, and under circumstances not constituting telephone harassment, makes an electronic communication to such other person or a third party: (a) Using any lewd, lascivious, indecent, or obscene words, images, or language, or suggesting the commission of any lewd or lascivious act; (a) Using any lewd, lascivious, indecent, or obscene words, images, or language, or suggesting the commission of any lewd or lascivious act; (b) Anonymously or repeatedly whether or not conversation occurs; Threatening to inflict injury on the person or property of the person called or any member of his or her family or household. (b) Anonymously or repeatedly whether or not conversation occurs; Threatening to inflict injury on the person or property of the person called or any member of his or her family or household.

29 Cyber Stalking & Orders a) The perpetrator has previously been convicted of the crime of harassment, as defined in RCW 9A.46.060, with the same victim or a member of the victim's family or household or any person specifically named in a no- contact order or no-harassment order in this or any other state; or a) The perpetrator has previously been convicted of the crime of harassment, as defined in RCW 9A.46.060, with the same victim or a member of the victim's family or household or any person specifically named in a no- contact order or no-harassment order in this or any other state; or9A.46.060 (b) The perpetrator engages in the behavior prohibited under subsection (1)(c) of this section by threatening to kill the person threatened or any other person. (4) Any offense committed under this section may be deemed to have been committed either at the place from which the communication was made or at the place where the communication was received. (b) The perpetrator engages in the behavior prohibited under subsection (1)(c) of this section by threatening to kill the person threatened or any other person. (4) Any offense committed under this section may be deemed to have been committed either at the place from which the communication was made or at the place where the communication was received.

30 Questions that can surface cyberstalking in a DV case How do you to communicate? In person, on the phone, text messages, GPS? How do you to communicate? In person, on the phone, text messages, GPS? How many times do you communicate during a day? How many times do you communicate during a day? Do your children use cell phones? Are you on a family plan? Do your children use cell phones? Are you on a family plan?

31 Judicial Considerations Be savvy. Demonstrate your knowledge of technology by addressing it in your orders. Be savvy. Demonstrate your knowledge of technology by addressing it in your orders. Remember that you have a position of power. Remember that you have a position of power. Address safety concerns. Address safety concerns.

32 For further information Teresa Atkinson Technology Safety Program Coordinator teresa@wscadv.org 206-389-2525 ext. 103 Washington State Gender and Justice Commission 360-705-5290 Myra.Downing@courts.wa.gov


Download ppt "Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said]."

Similar presentations


Ads by Google