Cyberstalking By Tanisha White, Samantha Dial, and Keamara Bracy

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Cyber Stalking By Matthew Hall. What is cyber stalking? According to techarget.com, it is defined as a crime in which the attacker harasses a victim using.
Cyber Safety Assessment Review
Forms of Cyberbullying
Realizing the Hidden Fear
Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Sexting and Cyber-bullying Legal Issues Deputy Phyllis Applin Livingston County Sheriff’s Office.
STALKING AND CYBERSTALKING: When your life changes at some else's hands.
Cyberbullying.
 CLOSED ALL YOUR ACCOUNTS  STOLE ALL YOUR MONEY FROM YOUR BANK ACCOUNTS  HAD YOUR MEDICAL INSURANCE CANCELLED  MADE FALSE CLAIMS  DESTROYED YOUR.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
INTERNET SAFETY FOR STUDENTS
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
 Cyber stalking is harassing people by threatening, monitoring, stealing someone’s identity theft, etc.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
Cyber and Internet Safety El Rodeo School September 11, 2013.
The ultimate guide to cyber- bullying.. Cyber-bullying is the use of electronic information and communication to bully or otherwise harass an individual.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Using internet and cell phones safely
CYBERSAFE – PARENTING ONLINE. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
DUSDStudent Bullying Presentation Grades What is Bullying? No student or group of students shall, through physical, written, verbal, or other means,
Cyber Crimes.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Diane Travis Artina Orum Paris Conner Conner, Travis, Orum.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Computer crimes.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Cyber Bullying Counseling Sessions G. Malek Fall 2011.
What is Harassment?? Harassment is when hurtful or upsetting things are repeatedly said or done to someone. Harassment CAN: Involve physical violence.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
E-Safety Parent Talk Helping to keep your children safe online.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
 Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group,
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Cyber and Internet Safety (Parents’ Night)
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Digital Citizenship Middle School
Teaching Internet Safety
Issues In media studies: Cyberbullying
Appropriate Use of Technology
BULLYING AND MORE Presented by Dana Rahman Assistant District Attorney
STOP. THINK. CONNECT. Online Safety Quiz.
Jeopardy iT Final Jeopardy iT $100 $100 $100 $100 $100 $100 $200 $200
Follow safety rules so that YOU: Avoid getting HURT.
Personal Safety Online
Presentation transcript:

Cyberstalking By Tanisha White, Samantha Dial, and Keamara Bracy

What is Cyberstalking? Cyberstalking is the use of technology to harass or stalk. Cyber stalking is the repeated use of technology to threaten, annoy, mentally harm, a specific individual or group of individuals. Cyber stalking is also used to retrieve information about a specific individual so that the perpetrator may obtain personal gain. The United States government has enacted statutes against cyberstalking, but in some states concrete evidence of bodily harm is required for legal interference. Tanisha White

Tools used to Cyberstalk Technology tools that are commonly used to cyberstalk: Internet- emails, MySpace, face book, Twitter, viruses, spyware, hacking, cyber impersonation, chat rooms, spams and scams etc Cell phones- harassing calls, text messages, and phone taps. Hidden cameras – There have been documented case in where the stalker hid cameras to watch their victims. Fax machines- Fax header information has been used by stalkers to retrieve the location of their victims. TTY/TTD- Teletypewriters and Telecommunications devices for the deaf were used in a documented stalking case. Global Positioning- This tool can be used to locate the whereabouts of a moving vehicle. Pagers- Perpetrators can obtain the your pager number harass through page texts. Tanisha White

Why do people cyberstalk? Personal Gain Revenge Mental incompetency Boredom Obsession Self worth Religious crusade Gang affiliation For a reaction Sexual predators Racial discrimination Sexual orientation Superiority Tanisha White

Types of cyber stalking Impersonation- Pretending to be someone else with the hope of damaging their character, reputation, and relationships. Financial compensation- Stealing financial information online for your own personal gain. Hacking- Hacking into someone’s personal computer to gather personal or financial information. Visual intruders- High tech binoculars, telescopes, hidden cameras, and night vision goggles are all tools that can be used by stalkers to visually invade a person’s privacy. Websites- Stalkers use websites as tools to gather information. With this information stalkers can obtain your home and email address, the school you and your children attend, your place of work, etc. Phone stalking- Cell phones are the most common phone used for stalkers , but house phones are even more vulnerable to stalking because of phone lines. A stalker can attach devices to your outdoor phone pole and listen in on all of your calls. Tanisha White

Spams and Scams There are many forms of online scams that are used to obtain your personal information. The scams may come in the form of account suspensions, lottery winnings, pin/password retrieval, chain letters, PayPal security maintenance, bank information requests ,etc. Tips on avoiding scams Never give scammers a personal bank account that doesn’t have any money in it. They may use the account for illegal purposes. Never fill in personal information into an email or a website that you got from a link in the email. You will likely find your account broken into and your information has been stolen. If you think it might be a legitimate warning. Always go to the website by manually typing it into your account and then logging in. Never give financial information to a website unless you’re certain that that the site is legitimate. Tanisha White

Tips on avoiding scams If you receive an email that tells you to send it to everyone in your address book throw it way. If it’s a nice message you think is worth passing along send it to http://www.snopes.com/ before submitting it. Always log off your account on a public computer. People can use you information instead of their own to receive free things. If something sounds too good to be true always keep in mind that it probably is. If you would like to pursue it anyways always research the site before putting any information in. If unwanted spam persists, visit http://www.spamcop.net/. Tanisha White

What to do if you’re being cyberstalked If you’re under the age of 18 tell you’re parents or another adult that you trust. Victims should give their stalkers a clear written warning that the contact is unwanted. If the stalking persists victims may want to file a complaint with the perpetrator's internet service provider. Victims should collect and save all documents and evidence that the stalker bestows. Victims should start a log and document details that occur within the unwanted contact. Victims should report a complaint to local law enforcement about the harassment. Victims should save copies of their police reports Tanisha White

What to do if you’re being cyberstalked Victims should also document time and dates of harassment as well as how it’s affecting their lives. Victims that are persistently being harassed may want to change their phone number, email address, internet service provider. Victims of cyber stalking should consider using encryption software or privacy protection programs. Victims may also want to learn how to use the filtering capabilities of email programs to block e-mails from certain addresses. victims should contact online directory listings such as www.four11.com, www.switchboard.com, and www.whowhere.com to request removal from their directory. Victims should never agree to meet with their stalker face to face to try and work things out. Tanisha White

Organizations and websites against Cyberstalking www.haltabuse.org. http://www.knightsofliberty.com/ http://www.wiredsafety.org/cyberstalking_ha rassment/stalker.html www.cyberangels.org http://18xeem.com/home/?p=168 www.krollworldwide.com www.icginc.com www.usdoj.gov/criminal/cybercrime/cybersta lking.htm Tanisha White

Characteristics of cyberstalkers Anyone can be a stalker. No one is immune to cyber stalkers, but researchers have discovered two types of characteristics shown below that potential victims should be cautious of. Psychopathic Personality Stalker Psychotic Personality Stalker Generally male May be male or female Absence of mental disorder Delusions or delusional fixation Targets familiar victims Usually targets strangers Harassment may be anonymous Attempt to contact the victim Usually some precipitating stressor Absence of precipitating stressor This is a somewhat general and broad classification system on which to examine stalking. The latter category usually implies the presence of some mental disorder, and the individual may not or may not be aware of his actions *http://www.angelfire.com/wizard/cheech0/cyberstalkers.html* Tanisha White

The Effects of Cyberstalking Keamara Bracy

The impact of cyberstalking impacts are…… Wide ranging Severe Psychologically traumatic Keamara Bracy

Cyberstalking may be intangible, but the effects on victims are very real! O ne victim described her feelings to being stalked by a neighbor as, "It really does get to you on an emotional and psychological level because you know that this person is thinking about you all the time. You know that they're looking out of their window for you O Keamara Bracy

Psychological Effects The effects of cyber-stalking are similar to the effects of traditional stalking because cyber-stalking is an extension of the physical form of stalking. Cyber-stalking is a very threatening and frightening crime and can cause psychological trauma to those who experience it. Keamara Bracy

Some of the emotional responses include: anxiety fear nightmares shock and disbelief helplessness hyper-vigilance changes in eating changes in sleeping patterns high levels of stress feeling of being out of control sense of the loss of personal safety Keamara Bracy

Effects…. These effects have the potential to produce a large drain on both criminal justice resources and the health care system, and it is therefore in the best interests of the authorities to take swift action when cases are presented to them. Keamara Bracy

Victims experiencing these reactions and many others might consider seeking out support from friends, family and victim service professionals in order to cope with the trauma resulting from cyber stalking. http://www.sociosite.org/pictures/stalking.gif Keamara Bracy

How do you know you're being attacked How do you know you're being attacked? Your computer may "pull" as you're typing-as if it's resisting you. Your mouse may move by itself You may find your security programs disabled or non functional You may be denied access to sites or to your computer itself Your computer may crash suddenly and often Your phones may start sounding weird, with bursts of static followed by sudden cutoff Your phones may echo Keamara Bracy

As with all stalking, the greatest trauma is the faceless terror that it brings into a victim's life--24 hours a day, seven days a week. The Internet becomes an electronic curtain behind which the stalker hides while terrorizing the victim at home and work, with friends and neighbors, and with countless people that the victim does not even know…….. Keamara Bracy

In cyber stalking the perpetrator could be in  another state, around the corner, or in the next cubicle at work. The stalker would be a former friend or lover, a total stranger met in the chat room, or simply a teenager playing a practical joke. http://campussqueeze.com/wp-content/uploads/2007/11/creephoodie.jpg Keamara Bracy

It is estimated that there are about 2,00,000 real-life stalkers in United States alone. Roughly one in 1,250 persons is a stalker - and that is a large ratio. iowabiz.typepad.com/.../01/22/cyberstalker.jpg Keamara Bracy

Cyberstalking LAWS S Dial

Cyberstalking Laws Cyberstalking – is the use of the internet or other electronic means to stalk someone. Cyberstalkers are unwelcome intruders, they are no different then stalkers in the physical world. Cyberstalkers can be: Pedophiles Young, Old, Black, White, Tall, Short People with grudges They can be ANYONE! Criminals S Dial

Cyberstalking Laws Because the Internet is a recent development Cyberstalking Laws and their implementation are sill in development. The Center for Democracy and Technology is focused on the balance between internet legislation and the rights of a netizen. *netizen -citizen of the internet community S Dial

Cyberstalking Laws National Center for Missing and Exploited Children Organizations that help locate and gather evidence against Cyberstalkers: National Center for Missing and Exploited Children Cyberangels Blue Ridge Thunder Local Computer Crime Units S Dial

Cyberstalking Laws Federal Cyberstalking Laws Under Section 18 U.S.C. 875(c) *It is a Federal crime punishable by up to 5 years in prison and a fine of up to $250,000, to transmit any communication in interstate or foreign commerce containing a threat to injure the person of another. Section 875(c) applies to any communication actually transmitted in interstate or foreign commerce - thus it includes threats transmitted in interstate or foreign commerce via the telephone, e-mail, beepers, or the Internet. *http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm S Dial

Cyberstalking Laws Section 18 U.S.C 875 is an important tool, it is not an all-purpose ant-cyberstalking statute. This section only applies to actual threats * http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm S Dial

Cyberstalking Laws Certain forms of Cyberstalking can be prosecuted under Section 47 U.S.C 223: *One provision of this statute makes it a federal crime, punishable by up to two years in prison, to use a telephone or telecommunications device to annoy, abuse, harass, or threaten any person at the called number. *Section 223 applies only to direct communications between the perpetrator and the victim. Thus, it would not reach a cyberstalking situation where a person harasses or terrorizes another person by posting messages on a bulletin board or in a chat room encouraging others to harass or annoy another person. Moreover, Section 223 is only a misdemeanor, punishable by not more than two years in prison. * http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm S Dial

Cyberstalking laws in Alabama Section 13A-11-8 *(b)(1) HARASSING COMMUNICATIONS. A person commits the crime of harassing communications if, with intent to harass or alarm another person, he or she does any of the following: *http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/CyberstalkingLaws/tabi d/13495/Default.aspx S Dial

Cyberstalking Laws Section 13A-11-8 *a. Communicates with a person, anonymously or otherwise, by telephone, telegraph, mail, or any other form of written or electronic communication, in a manner likely to harass or cause alarm. (2) Harassing communications is a Class C misdemeanor. *http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/CyberstalkingLaws/tabi d/13495/Default.aspx S Dial

Cyberstalking Laws The United States Government is passing laws every year to help prevent online cyberstalking. In 2006 Congress passed a bill stating: *It is a federal crime to "annoy" someone over the Internet. *The law makes it a crime to anonymously "annoy, abuse, threaten or harass" another person over the Internet. *http://web.ebscohost.com/ehost/detail?vid=1&hid=2&sid=e384a182-817c-4892-b379- 1347cc7cea26%40sessionmgr10&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=afh&AN=J0E050087383506 S Dial

Work Cited Cyberstalking Laws (2009). Cyberstalking. Retrieved from http://www.ccmostwanted.com/topics/cstalk.htm (2009, March 12). State Electronic harassment or "cyberstalking" laws. Retrieved from http://www.ncsl.org/IssuesResearch/TelecommunicationsInfo rmationTechnology/CyberstalkingLaws/tabid/13495/Default. aspx Willing, R. (2009, February 15). Cyberstalking law opens debate on what's annoying. Retrieved from http://web.ebscohost.com/ehost/detail?vid=1&hid=13&sid= 7fbb9ecc-4d91-4354-a99f- 912c2de79ccd%40sessionmgr11&bdata=JnNpdGU9ZWhvc3Qt bGl2ZQ%3d%3d#db=afh&AN=J0E050087383506 S Dial

Work Cited cont. http://www.fbi.gov/publications/leb/2003/mar2003/mar03leb.htm#p age_11 http://www.mincava.umn.edu/documents/commissioned/stalkingandt ech/stalkingandtech.html http://www.haltabuse.org/help/scam.shtml http://www.spamcop.net/ http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&Doc umentID=32458 http://www.angelfire.com/wizard/cheech0/cyberstalkers.html http://www.rvap.org/pages/cyberstalking/ http://usm.maine.edu/womenctr/sarv/cyberstalking/ http://www.buzzle.com/articles/if-i-should-die-before-i-wake.html http://www.feelsafeagain.org/cyberstalking.html Tanisha White