Presentation is loading. Please wait.

Presentation is loading. Please wait.

Understanding Stalking. A pattern of behavior directed specifically at one person that would cause a reasonable person to feel fear. “Any person who willfully.

Similar presentations


Presentation on theme: "Understanding Stalking. A pattern of behavior directed specifically at one person that would cause a reasonable person to feel fear. “Any person who willfully."— Presentation transcript:

1 Understanding Stalking

2 A pattern of behavior directed specifically at one person that would cause a reasonable person to feel fear. “Any person who willfully harasses another person with the intent to injure, terrify, threaten, or intimidate commits the offense of stalking.” ~Section 28-311.03 NE Statute Stalking is a crime in all 50 states, the District of Columbia, the US Territories, and the Federal government. Stalking

3 Stalking criminalizes otherwise non-criminal behaviors, such as sending letters or making phone calls, when the behavior is part of a pattern that creates an implicit or explicit threat to the victim. Generally, stalking is an escalating series of actions and incidents. Definition of Stalking

4 Persistent phone calls, messages, hang ups Following or watching Showing up where you are Sending unwanted cards, gifts, letters, emails, etc. Vandalism, breaking and entering, theft What Stalking Looks Like… Monitoring phone calls or computer use Use technology, hidden cameras, GPS, etc. Drive by, hang out at your school or work Threaten to harm you, your family or your pets

5 Scope of the Problem About 1 in 12 women and 1 in 45 men will be stalked at least once in their lifetime Nearly 3 in 4 stalking victims knew their offender in some capacity Stalking is one of the leading indicators of homicide for women 94% of female victims were stalked by men 60% of male victims were stalked by men

6 Stalking and Sexual Assault 31% of stalking victims who were stalked by an intimate partner reported that they had also been sexually assaulted In 10% of stalking incidents of college women, the stalker also forced or attempted sexual contact

7 81% of women stalked by a current/former intimate partners are also physically assaulted 73% of intimate partner stalkers threatened victims with physical violence Stalking duration of intimate partners exceeds 2 years on average IP stalkers frequently approach victims, and behaviors escalate quickly Stalking and Intimate Partner Violence

8 When Stalking of Women Occurs in Intimate Partner Relationships

9 76% of intimate partner femicide victims had been stalked by that partner 54% reported the stalking to police before they were killed by their stalkers 90% of murders committed by boyfriends/husbands involve stalking prior the murder Stalking and Lethality

10 1 in 4 stalking victims reported experiencing some type of stalking through technology Electronic monitoring was used to stalk 1 in 13 victims Stalking and Technology

11 Computer Monitoring Online Spaces Wireless Cameras & Surveillance Tools Caller ID Spoofing Common Technology Used in Stalking Cell Phones SMS/Test MMS messaging GPS Location-based services & apps Emails

12 Features such as Caller ID, text messaging, call history, & voicemail can be monitored Bluetooth technology is insecure Can be used as a listening device: -Silent mode + Auto Answer = surveillance Cellular Phones

13 Fax transmissions show the number it is sent from eFax uses internet and is susceptible to interception just like emails Hard drives store everything copied and sent on device Monitor victims online with or without their knowledge Impersonate victim with new pages Hijack victims page to impersonate, embarrass, or harass “Friend” victims family Gather personal info about victim through search engines and public profiles Computers, Copiers, & Faxes

14 Emails are not private or confidential Impossible to completely erase history “Window Washers” have severe limitations Firewalls, anti-virus programs, spyware detectors offer very limited identification Wireless networks are not always secure Computers & Emails

15 Watch: Creepy Facebook Stalker http://www.youtube.com/watch?v=dbRfOVgvrlU Online Spaces (Copy & Paste link into web search bar or see videos)

16 Criminals exploit situations to create an advantage for themselves Technology doesn’t create abuse Survivors can use technology strategically to enhance and maintain their safety We need to keep up with the criminals to understand their methods of stalking in reference to technology Technology is not the enemy!

17 Follows victim & shows up where they are Monitors mileage & receipts Repeatedly calls victim, including hang-ups Drive by or hangs out at work, school, or home Sending unwanted letters, emails, texts, gifts Vandalism Stalking Tactics: “Old School Style”

18 Intimate Partner/Simple Obsession Stalker -Most common Love Obsession Stalker Erotomania Stalker Vengeance/Terrorism Stalker Mental illnesses Types of Stalkers

19 Jealous Narcissistic Obsessive and Compulsive Falls ‘instantly’ in love Does not take responsibility for own feelings or actions Needs to have control over others Socially awkward or uncomfortable Views self as a victim of society, family and others Unable to take ‘no’ for an answer Deceptive Often switches between rage and ‘love’ Difficulty distinguishing between fantasy and reality Sense of entitlement (“You owe me…”) Unable to cope with rejection Dependent on others for sense of ‘self’ Views his or her problems as someone else’s fault May be of above average intelligence Characteristics of a Stalker

20 Individual acts often not criminal Low reporting rates Deciphering the implied threats Understanding the context Documentation Hard to prove that technology is being used Hard cases to prove Often socially acceptable Complexities of Stalking

21 Don’t know it’s stalking Won’t be taken seriously Not believed Fear Escalates stalker Put self at greater risk Embarrassed & ashamed Previous efforts to seek help resulted in negative experience Why Victims Are Reluctant To Tell

22 Fear Vulnerable Nervous Depressed Stressed Eating problems Constant hyper vigilance Loss of trust Flashbacks Impact of Stalking on Victims Confusion Frustration Isolation Anger Self-blame Paranoia Loss of control of their lives

23 To be believed To be listened to For stalking behaviors to stops Safety and protection To know how to reach services Emotional support Lethality and risk assessment Safety planning To regain a sense of control over their life What Do Victims Need?

24 Help victim regain control of their life Assist victim to identify the stalking behaviors Identify ways to limit stalkers access to victim Support 24/7 Provide options not opinions Explain stalking log Resources and referrals Collaboration with law enforcement Advocate’s Role

25 Stalking Kit and Stalking Log Photographs Of anything received by the stalker or of the stalker if possible Other physical evidence Letters, gifts, etc… Emails Keep content and record of date/time received Cell phone Keep text messages, voicemails, etc… Documentation / Evidence

26 Protection Order Seek help from law enforcement Stalking safety plan Keep a stalking log Trust gut instinct Learn how to keep safe online Screen calls & record messages New phone #; New Email Keep old phone #; Old Email active Safety Options

27 No contact Avoid the “last talk” Cell phone/911 Avoid isolation Travel different routes Change locks/ passwords Freeze records where possible Alarm system Destroy discarded mail Address confidentiality program Safety Options

28 Know what information about yourself is on the internet Use anonymizers if concerned of search alerts Unless you trust the source, don’t give your information out Use a PO Box address or virtual number to maintain privacy Know the practices of organizations, agencies, and businesses and what they do with your information Confidential or identifying information should not be stored on a computer that is connected to the internet Safer Use of the Internet

29 Avoid easy passwords that stalker could guess Caution family/friends from sharing your info Don’t delete emails from stalker- used as evidence Use a safer computer when possible Don’t open attachments from unknown sources and be skeptical of requests for info Keep virus protections up to date in and install firewalls Safety Tips for Emails & Computers

30

31 Video https://www.youtube.com/watch?v=TFryq-51cYA Watch: Stalked: Someone’s Watching You- Burning Desire (Copy & Paste link into web search bar or see videos)

32 Nebraska Domestic Violence and Sexual Assault Coalition National Network to End Domestic Violence Stalking Resource Center Solved: Investigation Discovery (Stalked: Someone’s Watching You) WEB WISE WOMEN The National Campaign to Prevent Teen Pregnancy Resources


Download ppt "Understanding Stalking. A pattern of behavior directed specifically at one person that would cause a reasonable person to feel fear. “Any person who willfully."

Similar presentations


Ads by Google