Understanding Stalking. A pattern of behavior directed specifically at one person that would cause a reasonable person to feel fear. “Any person who willfully.

Slides:



Advertisements
Similar presentations
Building A Safe Workplace: Preventing Workplace Violence.
Advertisements

How to protect yourself, your computer, and others on the internet
Dating Violence Mrs. Gennaro.
DATING VIOLENCE. STATE STANDARDS 7.3 Describe intellectual growth and development of adolescence. 7.4 Analyze necessary components of a healthy, safe.
Chapter 13 Abuse in Relationships. Nature of Relationship Abuse Physical abuse (violence): deliberate infliction of physical harm by either partner on.
Preventing and Overcoming Abuse (4:03) Click here to launch video Click here to download print activity.
Erika Russell S4Presentation Stalking can be defined as unwanted contact, which directly or indirectly communicates a threat or places the victim in.
Purdue University Calumet Counseling Center Gyte
Working With Stalking Victims Victim Advocates. What is Stalking? A course of conduct directed at a specific person that would cause a reasonable person.
Stalking California passes first state legislation on stalking in 1990 By 1997, all 50 states had stalking laws.
STALKING AND CYBERSTALKING: When your life changes at some else's hands.
 CLOSED ALL YOUR ACCOUNTS  STOLE ALL YOUR MONEY FROM YOUR BANK ACCOUNTS  HAD YOUR MEDICAL INSURANCE CANCELLED  MADE FALSE CLAIMS  DESTROYED YOUR.
Identifying Unhealthy Relationships
WHAT IS DOMESTIC VIOLENCE?
Cyber bullying and internet safety Parents meeting: staying safe online.
What you don’t know CAN hurt you!
Cyber and Internet Safety El Rodeo School September 11, 2013.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
The Extent, Nature, and Consequences of Intimate Partner Violence Beth Chaney Texas A&M University.
CYBERSAFE – PARENTING ONLINE. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration.
Cyberbullying Internet Saftey: Information for H.S. Students.
Teen Dating:.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
Stalking Stalking is a serious crime that occurs when one person engages in actions directed at another person (the target) which causes this person to.
What is Social Networking? Social networking sites provide teens and young adults with a virtual environment where they share stories, pictures, videos,
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Warning Signs of Unhealthy Relationships
VIOLENCE PREVENTION AND INTERVENTION PROGRAM (VPIP) TECHNIQUES TO PREVENT DATING VIOLENCE I. Indicators of Perpetrators and Victims of Dating Violence.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
STALKING. Basics of Stalking  Harassing, threatening, or menacing behavior  Is the behavior repeated conduct?  If suspect feels fear – take it seriously.
Julie provides advocacy, safety planning, shelter services, legal advocacy, support groups, protection order for clients.
February Is Teen Dating Violence Awareness Month.
Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said].
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.  Educate Us  Entertains Us  Connects Us  False Information  Opens Your Home to the Outside World  Bad.
STALKING STALKING STALKINGSTALKING. What is Stalking? A course of conduct directed at a specific person that would cause a reasonable person to feel fear.
Tips for Students 1 Prepared by Tina Dixon School Counselor Geneva High School.
Stalking Awareness Month
Malinda Levis, The Haven Project
Latino Justice Oral Paper Presentation
What do I say? What do I do?: A conversation about violence against women during Domestic Violence Awareness Month St. Cecilia’s Domestic Violence Education.
Building Vocabulary homicide assault rape victim LESSON 1 Understanding Violence BIG IDEA Violence is a major health problem in our society. I can explain.
Sgt. Melissa Holbrook Houston Police Department  Read report  Run criminal history check  Run location history for prior calls for service  Run check.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
SAFE AT HOME An Address Confidentiality Program Helping Victims Become Survivors.
What Parents and Students Need to Know Presented by Joan Reubens Pinellas County Schools, Prevention Office or Protect with.
 Sexual assault  Incest  Child abuse  Child pornography  Human Trafficking  Rape *If you are uncomfortable… please let me know and you can step.
ASU DEPARTMENT OF PUBLIC SAFETY. Sexually Based Violence Course The Sexually based Violence Course is established to inform the public about serious issues.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
DOMESTIC VIOLENCE.  Violence or physical abuse ________________________________ ____________________ usually violence by men against women.  When a.
DOMESTIC VIOLENCE October is Domestic Violence Prevention and Awareness Month.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Prevent and Report Sexual Misconduct
Add your agency name here Date of the training
Definition and Warnings
GOSSIP and CYBERBULLYING
STALKING (Obsession Harassment)
Virtual Battles: Cyberbullies
Appropriate Use of Technology
Lethality Assessment Program– Maryland Model (LAP)
GOSSIP and CYBERBULLYING
Definition and Warnings
February is Teen Dating Violence Awareness Month
What it is, how to spot it, and how to respond to it
Presentation transcript:

Understanding Stalking

A pattern of behavior directed specifically at one person that would cause a reasonable person to feel fear. “Any person who willfully harasses another person with the intent to injure, terrify, threaten, or intimidate commits the offense of stalking.” ~Section NE Statute Stalking is a crime in all 50 states, the District of Columbia, the US Territories, and the Federal government. Stalking

Stalking criminalizes otherwise non-criminal behaviors, such as sending letters or making phone calls, when the behavior is part of a pattern that creates an implicit or explicit threat to the victim. Generally, stalking is an escalating series of actions and incidents. Definition of Stalking

Persistent phone calls, messages, hang ups Following or watching Showing up where you are Sending unwanted cards, gifts, letters, s, etc. Vandalism, breaking and entering, theft What Stalking Looks Like… Monitoring phone calls or computer use Use technology, hidden cameras, GPS, etc. Drive by, hang out at your school or work Threaten to harm you, your family or your pets

Scope of the Problem About 1 in 12 women and 1 in 45 men will be stalked at least once in their lifetime Nearly 3 in 4 stalking victims knew their offender in some capacity Stalking is one of the leading indicators of homicide for women 94% of female victims were stalked by men 60% of male victims were stalked by men

Stalking and Sexual Assault 31% of stalking victims who were stalked by an intimate partner reported that they had also been sexually assaulted In 10% of stalking incidents of college women, the stalker also forced or attempted sexual contact

81% of women stalked by a current/former intimate partners are also physically assaulted 73% of intimate partner stalkers threatened victims with physical violence Stalking duration of intimate partners exceeds 2 years on average IP stalkers frequently approach victims, and behaviors escalate quickly Stalking and Intimate Partner Violence

When Stalking of Women Occurs in Intimate Partner Relationships

76% of intimate partner femicide victims had been stalked by that partner 54% reported the stalking to police before they were killed by their stalkers 90% of murders committed by boyfriends/husbands involve stalking prior the murder Stalking and Lethality

1 in 4 stalking victims reported experiencing some type of stalking through technology Electronic monitoring was used to stalk 1 in 13 victims Stalking and Technology

Computer Monitoring Online Spaces Wireless Cameras & Surveillance Tools Caller ID Spoofing Common Technology Used in Stalking Cell Phones SMS/Test MMS messaging GPS Location-based services & apps s

Features such as Caller ID, text messaging, call history, & voic can be monitored Bluetooth technology is insecure Can be used as a listening device: -Silent mode + Auto Answer = surveillance Cellular Phones

Fax transmissions show the number it is sent from eFax uses internet and is susceptible to interception just like s Hard drives store everything copied and sent on device Monitor victims online with or without their knowledge Impersonate victim with new pages Hijack victims page to impersonate, embarrass, or harass “Friend” victims family Gather personal info about victim through search engines and public profiles Computers, Copiers, & Faxes

s are not private or confidential Impossible to completely erase history “Window Washers” have severe limitations Firewalls, anti-virus programs, spyware detectors offer very limited identification Wireless networks are not always secure Computers & s

Watch: Creepy Facebook Stalker Online Spaces (Copy & Paste link into web search bar or see videos)

Criminals exploit situations to create an advantage for themselves Technology doesn’t create abuse Survivors can use technology strategically to enhance and maintain their safety We need to keep up with the criminals to understand their methods of stalking in reference to technology Technology is not the enemy!

Follows victim & shows up where they are Monitors mileage & receipts Repeatedly calls victim, including hang-ups Drive by or hangs out at work, school, or home Sending unwanted letters, s, texts, gifts Vandalism Stalking Tactics: “Old School Style”

Intimate Partner/Simple Obsession Stalker -Most common Love Obsession Stalker Erotomania Stalker Vengeance/Terrorism Stalker Mental illnesses Types of Stalkers

Jealous Narcissistic Obsessive and Compulsive Falls ‘instantly’ in love Does not take responsibility for own feelings or actions Needs to have control over others Socially awkward or uncomfortable Views self as a victim of society, family and others Unable to take ‘no’ for an answer Deceptive Often switches between rage and ‘love’ Difficulty distinguishing between fantasy and reality Sense of entitlement (“You owe me…”) Unable to cope with rejection Dependent on others for sense of ‘self’ Views his or her problems as someone else’s fault May be of above average intelligence Characteristics of a Stalker

Individual acts often not criminal Low reporting rates Deciphering the implied threats Understanding the context Documentation Hard to prove that technology is being used Hard cases to prove Often socially acceptable Complexities of Stalking

Don’t know it’s stalking Won’t be taken seriously Not believed Fear Escalates stalker Put self at greater risk Embarrassed & ashamed Previous efforts to seek help resulted in negative experience Why Victims Are Reluctant To Tell

Fear Vulnerable Nervous Depressed Stressed Eating problems Constant hyper vigilance Loss of trust Flashbacks Impact of Stalking on Victims Confusion Frustration Isolation Anger Self-blame Paranoia Loss of control of their lives

To be believed To be listened to For stalking behaviors to stops Safety and protection To know how to reach services Emotional support Lethality and risk assessment Safety planning To regain a sense of control over their life What Do Victims Need?

Help victim regain control of their life Assist victim to identify the stalking behaviors Identify ways to limit stalkers access to victim Support 24/7 Provide options not opinions Explain stalking log Resources and referrals Collaboration with law enforcement Advocate’s Role

Stalking Kit and Stalking Log Photographs Of anything received by the stalker or of the stalker if possible Other physical evidence Letters, gifts, etc… s Keep content and record of date/time received Cell phone Keep text messages, voic s, etc… Documentation / Evidence

Protection Order Seek help from law enforcement Stalking safety plan Keep a stalking log Trust gut instinct Learn how to keep safe online Screen calls & record messages New phone #; New Keep old phone #; Old active Safety Options

No contact Avoid the “last talk” Cell phone/911 Avoid isolation Travel different routes Change locks/ passwords Freeze records where possible Alarm system Destroy discarded mail Address confidentiality program Safety Options

Know what information about yourself is on the internet Use anonymizers if concerned of search alerts Unless you trust the source, don’t give your information out Use a PO Box address or virtual number to maintain privacy Know the practices of organizations, agencies, and businesses and what they do with your information Confidential or identifying information should not be stored on a computer that is connected to the internet Safer Use of the Internet

Avoid easy passwords that stalker could guess Caution family/friends from sharing your info Don’t delete s from stalker- used as evidence Use a safer computer when possible Don’t open attachments from unknown sources and be skeptical of requests for info Keep virus protections up to date in and install firewalls Safety Tips for s & Computers

Video Watch: Stalked: Someone’s Watching You- Burning Desire (Copy & Paste link into web search bar or see videos)

Nebraska Domestic Violence and Sexual Assault Coalition National Network to End Domestic Violence Stalking Resource Center Solved: Investigation Discovery (Stalked: Someone’s Watching You) WEB WISE WOMEN The National Campaign to Prevent Teen Pregnancy Resources