1 / 32

Understanding Stalking

Understanding Stalking. Stalking. A pattern of behavior directed specifically at one person that would cause a reasonable person to feel fear.

eddies
Download Presentation

Understanding Stalking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UnderstandingStalking

  2. Stalking • A pattern of behavior directed specifically at one person that would cause a reasonable person to feel fear. • “Any person who willfully harasses another person with the intent to injure, terrify, threaten, or intimidate commits the offense of stalking.” ~Section 28-311.03 NE Statute • Stalking is a crime in all 50 states, the District of Columbia, the US Territories, and the Federal government.

  3. Definition of Stalking • Stalking criminalizes otherwise non-criminal behaviors, such as sending letters or making phone calls, when the behavior is part of a pattern that creates an implicit or explicit threat to the victim. • Generally, stalking is an escalating series of actions and incidents.

  4. What Stalking Looks Like… • Persistent phone calls, messages, hang ups • Following or watching • Showing up where you are • Sending unwanted cards, gifts, letters, emails, etc. • Vandalism, breaking and entering, theft • Monitoring phone calls or computer use • Use technology, hidden cameras, GPS, etc. • Drive by, hang out at your school or work • Threaten to harm you, your family or your pets

  5. Scope of the Problem • About 1 in 12 women and 1 in 45 men will be stalked at least once in their lifetime • Nearly 3 in 4 stalking victims knew their offender in some capacity • Stalking is one of the leading indicators of homicide for women • 94% of female victims were stalked by men • 60% of male victims were stalked by men

  6. Stalking and Sexual Assault • 31% of stalking victims who were stalked by an intimate partner reported that they had also been sexually assaulted • In 10% of stalking incidents of college women, the stalker also forced or attempted sexual contact

  7. Stalking and Intimate Partner Violence • 81% of women stalked by a current/former intimate partners are also physically assaulted • 73% of intimate partner stalkers threatened victims with physical violence • Stalking duration of intimate partners exceeds 2 years on average • IP stalkers frequently approach victims, and behaviors escalate quickly

  8. When Stalking of Women Occurs in Intimate Partner Relationships

  9. Stalking and Lethality • 76% of intimate partner femicide victims had been stalked by that partner • 54% reported the stalking to police before they were killed by their stalkers • 90% of murders committed by boyfriends/husbands involve stalking prior the murder

  10. Stalking and Technology • 1 in 4 stalking victims reported experiencing some type of stalking through technology • Electronic monitoring was used to stalk 1 in 13 victims

  11. Common Technology Used in Stalking • Cell Phones • SMS/Test MMS messaging • GPS • Location-based services & apps • Emails Computer Monitoring Online Spaces Wireless Cameras & Surveillance Tools Caller ID Spoofing

  12. Cellular Phones • Features such as Caller ID, text messaging, call history, & voicemail can be monitored • Bluetooth technology is insecure • Can be used as a listening device: -Silent mode + Auto Answer = surveillance

  13. Computers, Copiers, & Faxes • Fax transmissions show the number it is sent from • eFax uses internet and is susceptible to interception just like emails • Hard drives store everything copied and sent on device • Monitor victims online with or without their knowledge • Impersonate victim with new pages • Hijack victims page to impersonate, embarrass, or harass • “Friend” victims family • Gather personal info about victim through search engines and public profiles

  14. Computers & Emails • Emails are not private or confidential • Impossible to completely erase history • “Window Washers” have severe limitations • Firewalls, anti-virus programs, spyware detectors offer very limited identification • Wireless networks are not always secure

  15. Online Spaces Watch: Creepy Facebook Stalker http://www.youtube.com/watch?v=dbRfOVgvrlU (Copy & Paste link into web search bar or see videos)

  16. Technology is not the enemy! • Criminals exploit situations to create an advantage for themselves • Technology doesn’t create abuse • Survivors can use technology strategically to enhance and maintain their safety • We need to keep up with the criminals to understand their methods of stalking in reference to technology

  17. Stalking Tactics: “Old School Style” • Follows victim & shows up where they are • Monitors mileage & receipts • Repeatedly calls victim, including hang-ups • Drive by or hangs out at work, school, or home • Sending unwanted letters, emails, texts, gifts • Vandalism

  18. Types of Stalkers • Intimate Partner/Simple Obsession Stalker -Most common • Love Obsession Stalker • Erotomania Stalker • Vengeance/Terrorism Stalker • Mental illnesses

  19. Characteristics of a Stalker • Jealous • Narcissistic • Obsessive and Compulsive • Falls ‘instantly’ in love • Does not take responsibility for own feelings or actions • Needs to have control over others • Socially awkward or uncomfortable • Views self as a victim of society, family and others • Unable to take ‘no’ for an answer • Deceptive • Often switches between rage and ‘love’ • Difficulty distinguishing between fantasy and reality • Sense of entitlement (“You owe me…”) • Unable to cope with rejection • Dependent on others for sense of ‘self’ • Views his or her problems as someone else’s fault • May be of above average intelligence

  20. Complexities of Stalking • Individual acts often not criminal • Low reporting rates • Deciphering the implied threats • Understanding the context • Documentation • Hard to prove that technology is being used • Hard cases to prove • Often socially acceptable

  21. Why Victims Are Reluctant To Tell • Don’t know it’s stalking • Won’t be taken seriously • Not believed • Fear • Escalates stalker • Put self at greater risk • Embarrassed & ashamed • Previous efforts to seek help resulted in negative experience

  22. Impact of Stalking on Victims • Confusion • Frustration • Isolation • Anger • Self-blame • Paranoia • Loss of control of their lives • Fear • Vulnerable • Nervous • Depressed • Stressed • Eating problems • Constant hyper vigilance • Loss of trust • Flashbacks

  23. What Do Victims Need? • To be believed • To be listened to • For stalking behaviors to stops • Safety and protection • To know how to reach services • Emotional support • Lethality and risk assessment • Safety planning • To regain a sense of control over their life

  24. Advocate’s Role • Help victim regain control of their life • Assist victim to identify the stalking behaviors • Identify ways to limit stalkers access to victim • Support 24/7 • Provide options not opinions • Explain stalking log • Resources and referrals • Collaboration with law enforcement

  25. Documentation / Evidence • Stalking Kit and Stalking Log • Photographs • Of anything received by the stalker or of the stalker if possible • Other physical evidence • Letters, gifts, etc… • Emails • Keep content and record of date/time received • Cell phone • Keep text messages, voicemails, etc…

  26. Safety Options • Protection Order • Seek help from law enforcement • Stalking safety plan • Keep a stalking log • Trust gut instinct • Learn how to keep safe online • Screen calls & record messages • New phone #; New Email • Keep old phone #; Old Email active

  27. Safety Options • No contact • Avoid the “last talk” • Cell phone/911 • Avoid isolation • Travel different routes • Change locks/ passwords • Freeze records where possible • Alarm system • Destroy discarded mail • Address confidentiality program

  28. Safer Use of the Internet • Know what information about yourself is on the internet • Use anonymizers if concerned of search alerts • Unless you trust the source, don’t give your information out • Use a PO Box address or virtual number to maintain privacy • Know the practices of organizations, agencies, and businesses and what they do with your information • Confidential or identifying information should not be stored on a computer that is connected to the internet

  29. Safety Tips for Emails & Computers • Avoid easy passwords that stalker could guess • Caution family/friends from sharing your info • Don’t delete emails from stalker- used as evidence • Use a safer computer when possible • Don’t open attachments from unknown sources and be skeptical of requests for info • Keep virus protections up to date in and install firewalls

  30. Video Watch: Stalked: Someone’s Watching You- Burning Desire https://www.youtube.com/watch?v=TFryq-51cYA (Copy & Paste link into web search bar or see videos)

  31. Resources Nebraska Domestic Violence and Sexual Assault Coalition National Network to End Domestic Violence Stalking Resource Center Solved: Investigation Discovery (Stalked: Someone’s Watching You) WEB WISE WOMEN The National Campaign to Prevent Teen Pregnancy

More Related