1 / 30

Cyberstalking

Cyberstalking. Presentation by: Elizabeth Brooker & Ricki Ann Gandy .

lilika
Download Presentation

Cyberstalking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberstalking Presentation by: Elizabeth Brooker & Ricki Ann Gandy

  2. http://images.google.com/imgres?imgurl=http://cyberconnectus.files.wordpress.com/2009/05/stalk1.jpg&imgrefurl=http://cyberconnectus.wordpress.com/2009/05/19/stalker-on-the-network/&usg=__PrtOKG7yQYYdKqy--OXE8mFjpzc=&h=200&w=512&sz=67&hl=en&start=60&tbnid=WW7yMR8Pxapw-M:&tbnh=51&tbnw=131&prev=/images%3Fq%3Dcyberstalking%26gbv%3D2%26ndsp%3D18%26hl%3Den%26sa%3DN%26start%3D54http://images.google.com/imgres?imgurl=http://cyberconnectus.files.wordpress.com/2009/05/stalk1.jpg&imgrefurl=http://cyberconnectus.wordpress.com/2009/05/19/stalker-on-the-network/&usg=__PrtOKG7yQYYdKqy--OXE8mFjpzc=&h=200&w=512&sz=67&hl=en&start=60&tbnid=WW7yMR8Pxapw-M:&tbnh=51&tbnw=131&prev=/images%3Fq%3Dcyberstalking%26gbv%3D2%26ndsp%3D18%26hl%3Den%26sa%3DN%26start%3D54

  3. Cyberstalking can be defined as threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications. http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458

  4. What is Cyberstalking? • Using the Internet, through chat rooms and e-mail, to find, identify, and arrange to meet a person whom one intends to criminally victimize. • Sending multiple e-mails, often on a systematic basis, to annoy, embarrass, intimidate, or threaten a person or to make the person fearful that she or a member of her family or household will be harmed. Also called e-mail harassment. http://www.yourdictionary.com/law/cyberstalking

  5. Cyberstalking is a fairly new way of bullying on the internet. Computers have become more affordable which allows stalkers a new way to access their victims. • Cyberstalkers target their victims through: • chat rooms • message boards • discussion forums • e-mail • Cyberstalking takes many forms such as: • threatening or obscene e-mail; spamming • live chat harassment or flaming (online verbal abuse) • leaving improper messages on message boards or in guest books • sending electronic viruses • sending unsolicited e-mail • tracing another person's computer and Internet activity • electronic identity theft http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458

  6. From the INTERNET to you HOME • Similar to stalking off-line, online stalking can be a terrifying experience for victims, placing them at risk of psychological trauma, and possible physical harm. • Many cyberstalking situations do evolve into off-line stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault.

  7. How is it different than other types of stalking? Major Similarities • * Majority of cases involve stalking by former intimates, although stranger stalking occurs in the real world and in cyberspace.  • * Most victims are women; most stalkers are men.  • * Stalkers are generally motivated by the desire to control the victim.  http://www.wellspringalliance.org/DomesticViolence/Cyberstalking/tabid/339/Default.aspx

  8. How is it different than other types of stalking? Major Differences • * Offline stalking generally requires the perpetrator and the victim to be located in the same geographic area; cyberstalkers may be located across the street or across the country.  • * Electronic communications technologies make it much easier for a cyberstalker to encourage third parties to harass and/or threaten a victim (e.g., impersonating the victim and posting inflammatory messages to bulletin boards and in chat rooms, causing viewers of that message to send threatening messages back to the victim "author.")  • * Electronic communications technologies also lower the barriers to harassment and threats; a cyberstalker does not need to physically confront the victim. http://www.wellspringalliance.org/DomesticViolence/Cyberstalking/tabid/339/Default.aspx

  9. What are the effects of cyberstalking? • Victims of cyberstalking often experience psychological trauma, as well as physical and emotional reactions as a result of their victimization. Some of these effects may include: • changes in sleeping and eating patterns • nightmares • hypervigilance • anxiety • helplessness • fear for safety • shock and disbelief • From www.nvcv.org: National Center for Victims of Crime

  10. Cyberstalking and the Law • With personal information becoming readily available to an increasing number of people through the Internet and other advanced technology, state legislators are addressing the problem of stalkers who harass and threaten their victims over the World Wide Web. Stalking laws and other statutes criminalizing harassment behavior currently in effect in many states may already address this issue by making it a crime to communicate by any means with the intent to harass or alarm the victim. http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458

  11. Cyberstalking and the Law continued… • States have begun to address the use of computer equipment for stalking purposes by including provisions prohibiting such activity in both harassment and anti-stalking legislation (Riveira, 1,2). A handful of states, such as Alabama, Arizona, Connecticut, Hawaii, Illinois, New Hampshire and New York have specifically including prohibitions against harassing electronic, computer or e-mail communications in their harassment legislation. Alaska, Oklahoma, Wyoming, and more recently, California, have incorporated electronically communicated statements as conduct constituting stalking in their anti-stalking laws. A few states have both stalking and harassment statutes that criminalize threatening and unwanted electronic communications. Other states have laws other than harassment or anti-stalking statutes that prohibit misuse of computer communications and e-mail, while others have passed laws containing broad language that can be interpreted to include cyberstalking behaviors (Gregorie). http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458

  12. Cyberstalking and the Law continued… • Recent federal law has addressed cyberstalking as well. The Violence Against Women Act, passed in 2000, made cyberstalking a part of the federal interstate stalking statute. Other federal legislation that addresses cyberstalking has been introduced recently, but no such measures have yet been enacted. Consequently, there remains a lack of legislation at the federal level to specifically address cyberstalking, leaving the majority of legislative prohibitions against cyberstalkingat the state level (Wiredpatrol.org). http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458

  13. Section 13A-11-8Harassment or harassing communications. • (a)(1) HARASSMENT. A person commits the crime of harassment if, with intent to harass, annoy, or alarm another person, he or she either: • a. Strikes, shoves, kicks, or otherwise touches a person or subjects him or her to physical contact. • b. Directs abusive or obscene language or makes an obscene gesture towards another person. • (2) For purposes of this section, harassment shall include a threat, verbal or nonverbal, made with the intent to carry out the threat, that would cause a reasonable person who is the target of the threat to fear for his or her safety. • (3) Harassment is a Class C misdemeanor. • (b)(1) HARASSING COMMUNICATIONS. A person commits the crime of harassing communications if, with intent to harass or alarm another person, he or she does any of the following: • a. Communicates with a person, anonymously or otherwise, by telephone, telegraph, mail, or any other form of written or electronic communication, in a manner likely to harass or cause alarm. • b. Makes a telephone call, whether or not a conversation ensues, with no purpose of legitimate communication. • c. Telephones another person and addresses to or about such other person any lewd or obscene words or language. • Nothing in this section shall apply to legitimate business telephone communications. • (2) Harassing communications is a Class C misdemeanor. • (Acts 1977, No. 607, p. 812, §5530; Acts 1978, No. 770, p. 1110, §1; Acts 1979, No. 79-471, p. 862, §1; Acts 1996, No. 96-767, p. 1353, §1; Acts 1997, No. 97-552, p. 989, §1.) http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/CyberstalkingLaws/tabid/13495/Default.aspx

  14. I am a VICTIM- What should I do now? • Victims who are under the age of 18 should tell their parents or another adult they trust about any harassments and/or threats. • * Experts suggest that in cases where the offender is known, victims should send the stalker a clear written warning. Specifically, victims should communicate that the contact is unwanted, and ask the perpetrator to cease sending communications of any kind. Victims should do this only once. Then, no matter the response, victims should under no circumstances ever communicate with the stalker again. Victims should save copies of this communication in both electronic and hard copy form. • * If the harassment continues, the victim may wish to file a complaint with the stalker's Internet service provider, as well as with their own service provider. Many Internet service providers offer tools that filter or block communications from specific individuals. • * As soon as individuals suspect they are victims of online harassment or cyberstalking, they should start collecting all evidence and document all contact made by the stalker. Save all e-mail, postings, or other communications in both From www.nvcv.org: National Center for Victims of Crime

  15. I am a VICTIM continued… • Victims may also want to start a log of each communication explaining the situation in more detail. Victims may want to document how the harassment is affecting their lives and what steps they have taken to stop the harassment. • Victims may want to file a report with local law enforcement or contact their local prosecutor's office to see what charges, if any, can be pursued. Victims should save copies of police reports and record all contact with law enforcement officials and the prosecutor's office. • Victims who are being continually harassed may want to consider changing their e-mail address, Internet service provider, a home phone number, and should examine the possibility of using encryption software or privacy protection programs. Any local computer store can offer a variety of protective software, options and suggestions. Victims may also want to learn how to use the filtering capabilities of email programs to block e-mails from certain addresses. • Furthermore, victims should contact online directory listings such as www.four11.com, www.switchboard.com, and www.whowhere.com to request removal from their directory. • Finally, under no circumstances should victims agree to meet with the perpetrator face to face to "work it out," or "talk." No contact should ever be made with the stalker. Meeting a stalker in person can be very dangerous. From www.nvcv.org: National Center for Victims of Crime

  16. Testimonies: Cyber-stalking horror stories A few years ago, a 50-year-old security guard made advancements toward a young woman and she rejected him. To get revenge, he impersonated her in chats, posted her phone number on message boards, and solicited her rape by posting his messages that were made in her name. She was harassed by at all hours of the night by men knocking on her door announcing that they wanted to rape her. He was convicted and received 6 years in prison. http://www.ask.com/bar?q=cyberstalking+stories&page=1&qsrc=178&dm=all&ab=1&title=Testimonies%3A+Cyber-stalking+horror+stories+-+by+Mona+Gallagher+-&u=http%3A%2F%2Fwww.helium.com%2Fitems%2F639682-testimonies-cyber-stalking-horror-stories&sg=YHJwFS0U0XWNqKx3s%2BonNqIyPcwE0as5ogMc5ooGOcM%3D&tsp=1257266088925 http://www.bing.com/images/search?q=pictures+of+cyberstalking#focal=e6a0ae85e9db24d405bec5aea22ec38b&furl=http%3a%2f%2fwww.wsiltv.com%2fm%2fpics%2f1235599975_sm.jpg&FORM=IGRE4

  17. Testimonies continued… A 13-year-old girl met a man on the Internet, whom she believed to be a peer near her age. The 47-year-old man posing as a teen, was able to get personal information that led him to her home. A month after their meeting, the man kidnapped her from her home. Signs of fighting and her broken glasses led authorities to believe that she fought with her assailant. The man was identified through his Internet messages and authorities traced him. He shot himself as the officers entered, and sadly, they found the young girl dead from a gunshot wound. Further evidence led authorities to believe that the 13-year-old girl was not his first and only victim. http://images.google.com/imgres?imgurl=http://www.childsafetyaustralia.com.au/children/webstalking/images/kids_computer.jpg&imgrefurl=http://www.childsafetyaustralia.com.au/children/webstalking/webstalking.htm&usg=__hRn8bOh0QzP7Pky4IOIe5OFDlIE=&h=265&w=400&sz=26&hl=en&start=20&um=1&tbnid=p3XA8HxNCYUTTM:&tbnh=82&tbnw=124&prev=/images%3Fq%3Dparents%2Btelling%2Bchildren%2Bto%2Bbe%2Bcareful%2Bonline%26gbv%3D2%26ndsp%3D18%26hl%3Den%26sa%3DN%26start%3D18%26um%3D1

  18. Predators can even be in law enforcement! In September of 2007, a Federal agent was indicted for cyber-stalking a former girlfriend. He used a Department of Homeland Security database to cyber-stalk and track the activities of her and her family. He faces 10 years in prison and a hefty fine.

  19. REAL LIFE Rachel North’s Cyberstalker is Arrested in London Internet Café http://images.google.com/imgres?imgurl=http://www.mattwardman.com/blog/wp-content/uploads/20070604-fjl-button-1.jpg&imgrefurl=http://www.mattwardman.com/blog/2007/06/07/rachel-norths-cyberstalker-is-arrested-in-london-internet-cafe/&usg=__T4O3blKRCFtQIsJMabTi7BOV8zQ=&h=171&w=131&sz=6&hl=en&start=45&tbnid=jFTBgGwLPLYcaM:&tbnh=100&tbnw=77&prev=/images%3Fq%3Dcyber%2Bstalker%2Barrested%26gbv%3D2%26ndsp%3D18%26hl%3Den%26sa%3DN%26start%3D36

  20. How to stay SAFE ONLINE! • Select a gender-neutral username, email address, etc. • Keep your most important email address confidential. • Get a free of charge email account. • Don't give out information just for the reason that it is requested. • Block or disregard unnecessary users. • Don't tolerate others to force you into inconsistency. • prowl in a new environment to study neighboring customs. • If a situation develops as stressful, depart it. http://www.predators.tv/research/cyberstalking.asp#5 • http://www.reslife.cmich.edu/rama/Image/Cyberstalking.jpg

  21. How to stay SAFE ONLINE! • Observe what you "say" on the internet. • Be acquainted with what's inside your autograph folder. • Never use a industry account for individual use. • Never offer your password to anyone • Never give out your credit card information • Individually supervise children's internet use. • Teach children to never, provide personal information online. • Be very careful about putting pictures of you or your kids online.

  22. State legislatures address cyber-stalking laws and related statutes primarily, but the Violence Against Women Act of 2000 made cyber-stalking a part of the federal interstate stalking statute. • Victims can also report cyber-stalking to the State's Attorney and local law enforcement. • Internet Service Providers will block the offender when you report cyber-stalking and will often cancel his account. http://www.helium.com/items/639682-testimonies-cyber-stalking-horror-stories

  23. The availability of computers and the growing Internet community has bred a den of predators. Keep yourself and your children safe by talking to each other on safe communication and keeping personal information off of the Internet. http://www.helium.com/items/639682-testimonies-cyber-stalking-horror-stories

  24. This is what parents need to know: "In his study of teen blogs, researcher David Huffaker of Georgetown University found: • that 20% of teens posted their full names • 67% listed their ages • 59% revealed their locations • 61% divulged some sort of contact information http://safemoves.org/cyber_smartz.htm

  25. ." Bloggers' full names can be Googled by future college admissions decision makers and employers, not to mention people with ill intentions. http://www.kinkysexpuppet.com/images/myspace-stalker-lg.gif Many kids are using photo blogs as well, such as MySpace.com, posting pictures of themselves in various states of dress. http://www.8ball.co.uk/tshirts/facebookstalkert-shirt_2_111408_olive-cream-print_m.jpg

  26. One Solution from Safe Moves: As is the case with any safety issue relating to children, a multi-faceted approach generally yields the best results. While children need a certain amount of privacy, they also need parental involvement and supervision in their daily lives. But the success of any education initiative must also involve teachers, counselors and the school system. In this age of overworked and underpaid educators, however, issues like cyber safety almost always fall by the wayside, victims of the lack of funding and the amount of time available for critical programs like these. While a myriad of good programs teaching “cyber safety” are available in the form of books and information on the web, no program currently exists that takes this issue directly into schools to address the victims one-on-one. http://safemoves.org/cyber_smartz.htm

  27. IN-SCHOOL INTERNET SAFETY EDUCATION The key to the success of Safe Moves’ programs has been age appropriateness. Rather than gather ALL the students in a K-6 elementary school at one assembly, founder Pat Hines recognized years ago that first-graders learn in a far different way than sixth graders. Therefore, two assemblies per school per day are held to present the program: Grades K-3 in the morning and Grades 4-6 in the afternoon.Using a combination of age-appropriate pop music, hip sets and costumes, talented actors and presenters and a cohesive plot/script, Cyber Safe Moves, in conjunction with sponsors, will create program curriculum that meets State of California teaching standards. Obviously, for middle schools and high-schools, the program will be tailored to their jargon, tastes and sensibilities.Program materials and leave-backs will include a Cyber Safe Moves “Web Safety Checklist” for parents, along with a sponsor coupon and fun trinkets for students. http://safemoves.org/cyber_smartz.htm

  28. The following cyber safety rules will be included: • Don’t give out personal information of any kind without parent’s permission. • Tell parents right away if you come across any information that makes you feeluncomfortable. • Never agree to get together with someone you “meet” online without first letting a parent. If they agree, be sure the meeting is in a public place and your parent iswith you. • Never send a picture of yourself or anything else to someone without checking a parent. • Do not respond to any e-mail messages that are mean or make you feel uncomfortable. Tell a parent right away so they can contact the internet service provider. • Talk to parents about setting up rules for going online. Together, decide on the time of day you can go online, the length of time you can spend there, and areas that are okay for you to visit. • Don’t give out ANY Internet password to anyone (even your best friend) other than a parent. • Be a good online citizen and don’t do anything that hurts other people or is against the law. http://safemoves.org/cyber_smartz.htm

  29. Preparing a child for life = preparing them for the Internet.

  30. THE END! Thank You!

More Related