320 likes | 491 Views
Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said]. What they found…. home phone number, food preferences, wife's personal e-mail address photos of his grandchildren,. Databrokers.
E N D
Every single datum about my life is private? That's silly," Scalia [said].
What they found….. • home phone number, • food preferences, • wife's personal e-mail address • photos of his grandchildren,
Stalking occurs most commonly in intimate partner relationships. Most dangerous and most lethal
Cell Phones as a Stalking Tool • Pretexting • Web Access • Excessive/Monitor Texting • Silent mode/auto Video
Trap Call Unblocks calls marked unknown or private and shows you the caller’s ID
GPS Tracking Devices Video 2
Social Networking & Stalking • Find your kids – find you. • online status indicator
Social Networking & Stalking • Photos and videos that are shared to harass • Information can be used in most courts
Email Accounts • Impersonation of victim or a “friend” (Spoofing) • Reading email
Email Accounts • Resetting account passwords • Spoofing email • IP Tracing
RCW 9.61.260 Cyberstalking • A person is guilty of cyberstalkingif he or she, with intent to harass, intimidate, torment, or embarrass any other person, and under circumstances not constituting telephone harassment, makes an electronic communication to such other person or a third party: • (a) Using any lewd, lascivious, indecent, or obscene words, images, or language, or suggesting the commission of any lewd or lascivious act; • (b) Anonymously or repeatedly whether or not conversation occurs; Threatening to inflict injury on the person or property of the person called or any member of his or her family or household.
Cyber Stalking & Orders • a)The perpetrator has previously been convicted of the crime of harassment, as defined in RCW 9A.46.060, with the same victim or a member of the victim's family or household or any person specifically named in a no-contact order or no-harassment order in this or any other state; or • (b) The perpetrator engages in the behavior prohibited under subsection (1)(c) of this section by threatening to kill the person threatened or any other person. (4) Any offense committed under this section may be deemed to have been committed either at the place from which the communication was made or at the place where the communication was received.
Questions that can surface cyberstalking in a DV case • How do you to communicate? In person, on the phone, text messages, GPS? • How many times do you communicate during a day? • Do your children use cell phones? Are you on a family plan?
Judicial Considerations • Be savvy. Demonstrate your knowledge of technology by addressing it in your orders. • Remember that you have a position of power. • Address safety concerns.
For further information Teresa Atkinson Technology Safety Program Coordinator teresa@wscadv.org 206-389-2525 ext. 103 Washington State Gender and Justice Commission 360-705-5290 Myra.Downing@courts.wa.gov