320 likes | 362 Views
Understanding Stalking. Stalking. A pattern of behavior directed specifically at one person that would cause a reasonable person to feel fear.
E N D
Stalking • A pattern of behavior directed specifically at one person that would cause a reasonable person to feel fear. • “Any person who willfully harasses another person with the intent to injure, terrify, threaten, or intimidate commits the offense of stalking.” ~Section 28-311.03 NE Statute • Stalking is a crime in all 50 states, the District of Columbia, the US Territories, and the Federal government.
Definition of Stalking • Stalking criminalizes otherwise non-criminal behaviors, such as sending letters or making phone calls, when the behavior is part of a pattern that creates an implicit or explicit threat to the victim. • Generally, stalking is an escalating series of actions and incidents.
What Stalking Looks Like… • Persistent phone calls, messages, hang ups • Following or watching • Showing up where you are • Sending unwanted cards, gifts, letters, emails, etc. • Vandalism, breaking and entering, theft • Monitoring phone calls or computer use • Use technology, hidden cameras, GPS, etc. • Drive by, hang out at your school or work • Threaten to harm you, your family or your pets
Scope of the Problem • About 1 in 12 women and 1 in 45 men will be stalked at least once in their lifetime • Nearly 3 in 4 stalking victims knew their offender in some capacity • Stalking is one of the leading indicators of homicide for women • 94% of female victims were stalked by men • 60% of male victims were stalked by men
Stalking and Sexual Assault • 31% of stalking victims who were stalked by an intimate partner reported that they had also been sexually assaulted • In 10% of stalking incidents of college women, the stalker also forced or attempted sexual contact
Stalking and Intimate Partner Violence • 81% of women stalked by a current/former intimate partners are also physically assaulted • 73% of intimate partner stalkers threatened victims with physical violence • Stalking duration of intimate partners exceeds 2 years on average • IP stalkers frequently approach victims, and behaviors escalate quickly
When Stalking of Women Occurs in Intimate Partner Relationships
Stalking and Lethality • 76% of intimate partner femicide victims had been stalked by that partner • 54% reported the stalking to police before they were killed by their stalkers • 90% of murders committed by boyfriends/husbands involve stalking prior the murder
Stalking and Technology • 1 in 4 stalking victims reported experiencing some type of stalking through technology • Electronic monitoring was used to stalk 1 in 13 victims
Common Technology Used in Stalking • Cell Phones • SMS/Test MMS messaging • GPS • Location-based services & apps • Emails Computer Monitoring Online Spaces Wireless Cameras & Surveillance Tools Caller ID Spoofing
Cellular Phones • Features such as Caller ID, text messaging, call history, & voicemail can be monitored • Bluetooth technology is insecure • Can be used as a listening device: -Silent mode + Auto Answer = surveillance
Computers, Copiers, & Faxes • Fax transmissions show the number it is sent from • eFax uses internet and is susceptible to interception just like emails • Hard drives store everything copied and sent on device • Monitor victims online with or without their knowledge • Impersonate victim with new pages • Hijack victims page to impersonate, embarrass, or harass • “Friend” victims family • Gather personal info about victim through search engines and public profiles
Computers & Emails • Emails are not private or confidential • Impossible to completely erase history • “Window Washers” have severe limitations • Firewalls, anti-virus programs, spyware detectors offer very limited identification • Wireless networks are not always secure
Online Spaces Watch: Creepy Facebook Stalker http://www.youtube.com/watch?v=dbRfOVgvrlU (Copy & Paste link into web search bar or see videos)
Technology is not the enemy! • Criminals exploit situations to create an advantage for themselves • Technology doesn’t create abuse • Survivors can use technology strategically to enhance and maintain their safety • We need to keep up with the criminals to understand their methods of stalking in reference to technology
Stalking Tactics: “Old School Style” • Follows victim & shows up where they are • Monitors mileage & receipts • Repeatedly calls victim, including hang-ups • Drive by or hangs out at work, school, or home • Sending unwanted letters, emails, texts, gifts • Vandalism
Types of Stalkers • Intimate Partner/Simple Obsession Stalker -Most common • Love Obsession Stalker • Erotomania Stalker • Vengeance/Terrorism Stalker • Mental illnesses
Characteristics of a Stalker • Jealous • Narcissistic • Obsessive and Compulsive • Falls ‘instantly’ in love • Does not take responsibility for own feelings or actions • Needs to have control over others • Socially awkward or uncomfortable • Views self as a victim of society, family and others • Unable to take ‘no’ for an answer • Deceptive • Often switches between rage and ‘love’ • Difficulty distinguishing between fantasy and reality • Sense of entitlement (“You owe me…”) • Unable to cope with rejection • Dependent on others for sense of ‘self’ • Views his or her problems as someone else’s fault • May be of above average intelligence
Complexities of Stalking • Individual acts often not criminal • Low reporting rates • Deciphering the implied threats • Understanding the context • Documentation • Hard to prove that technology is being used • Hard cases to prove • Often socially acceptable
Why Victims Are Reluctant To Tell • Don’t know it’s stalking • Won’t be taken seriously • Not believed • Fear • Escalates stalker • Put self at greater risk • Embarrassed & ashamed • Previous efforts to seek help resulted in negative experience
Impact of Stalking on Victims • Confusion • Frustration • Isolation • Anger • Self-blame • Paranoia • Loss of control of their lives • Fear • Vulnerable • Nervous • Depressed • Stressed • Eating problems • Constant hyper vigilance • Loss of trust • Flashbacks
What Do Victims Need? • To be believed • To be listened to • For stalking behaviors to stops • Safety and protection • To know how to reach services • Emotional support • Lethality and risk assessment • Safety planning • To regain a sense of control over their life
Advocate’s Role • Help victim regain control of their life • Assist victim to identify the stalking behaviors • Identify ways to limit stalkers access to victim • Support 24/7 • Provide options not opinions • Explain stalking log • Resources and referrals • Collaboration with law enforcement
Documentation / Evidence • Stalking Kit and Stalking Log • Photographs • Of anything received by the stalker or of the stalker if possible • Other physical evidence • Letters, gifts, etc… • Emails • Keep content and record of date/time received • Cell phone • Keep text messages, voicemails, etc…
Safety Options • Protection Order • Seek help from law enforcement • Stalking safety plan • Keep a stalking log • Trust gut instinct • Learn how to keep safe online • Screen calls & record messages • New phone #; New Email • Keep old phone #; Old Email active
Safety Options • No contact • Avoid the “last talk” • Cell phone/911 • Avoid isolation • Travel different routes • Change locks/ passwords • Freeze records where possible • Alarm system • Destroy discarded mail • Address confidentiality program
Safer Use of the Internet • Know what information about yourself is on the internet • Use anonymizers if concerned of search alerts • Unless you trust the source, don’t give your information out • Use a PO Box address or virtual number to maintain privacy • Know the practices of organizations, agencies, and businesses and what they do with your information • Confidential or identifying information should not be stored on a computer that is connected to the internet
Safety Tips for Emails & Computers • Avoid easy passwords that stalker could guess • Caution family/friends from sharing your info • Don’t delete emails from stalker- used as evidence • Use a safer computer when possible • Don’t open attachments from unknown sources and be skeptical of requests for info • Keep virus protections up to date in and install firewalls
Video Watch: Stalked: Someone’s Watching You- Burning Desire https://www.youtube.com/watch?v=TFryq-51cYA (Copy & Paste link into web search bar or see videos)
Resources Nebraska Domestic Violence and Sexual Assault Coalition National Network to End Domestic Violence Stalking Resource Center Solved: Investigation Discovery (Stalked: Someone’s Watching You) WEB WISE WOMEN The National Campaign to Prevent Teen Pregnancy