stalking and cyberstalking n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
STALKING AND CYBERSTALKING PowerPoint Presentation
Download Presentation
STALKING AND CYBERSTALKING

Loading in 2 Seconds...

play fullscreen
1 / 19

STALKING AND CYBERSTALKING - PowerPoint PPT Presentation


  • 137 Views
  • Uploaded on

STALKING AND CYBERSTALKING. WHEN YOUR LIFE CHANGES AT SOMEONE ELSES HANDS. WHAT WOUD YOU DO IF SOMEONE:. CLOSED ALL YOUR ACCOUNTS STOLE ALL YOUR MONEY FROM YOUR BANK ACCOUNTS HAD YOUR MEDICAL INSURANCE CANCELLED MADE FALSE CLAIMS DESTROYED YOUR CREDIT RATING.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'STALKING AND CYBERSTALKING' - rozene


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
stalking and cyberstalking

STALKING AND CYBERSTALKING

WHEN YOUR LIFE CHANGES

AT SOMEONE ELSES HANDS

what woud you do if someone
WHAT WOUD YOU DO IF SOMEONE:
  • CLOSED ALL YOUR ACCOUNTS
  • STOLE ALL YOUR MONEY FROM YOUR BANK ACCOUNTS
  • HAD YOUR MEDICAL INSURANCE CANCELLED
  • MADE FALSE CLAIMS
  • DESTROYED YOUR CREDIT RATING
my stalker was someone i knew

MY STALKER WAS SOMEONE I KNEW

PASSWORDS

IMPORTANT DATA

PERSONAL INFORMATION

FAMILY INFORMATION

slide4

Moore maintains a blog at her website alexisamoore.com where she covers issues related to cyberstalking, privacy protection, identity theft and public safety.

ALEXIS MOORE

ONE WOMANS’ STORY

OF

SURVIVAL

AND

ADVOCACY

interpersonal violence
INTERPERSONAL VIOLENCE

CYBERSTALKING

  • Cyberstalking is a technologically-based “attack” targeting a specific person to attack for reasons of anger, revenge or control.
  • Victims often feel harassed, embarrassed, and humiliated.
  • Cyberstalking can involve the harassment of family, friends, and employers while using scare tactics to isolate victims.
  • Stalking is characterized by repeated harassment or threatening behavior toward an individual.
    • All of the following can be examples of types of stalking:
    • following a person
    • appearing at a person's home or place of business
    • making harassing phone calls
    • leaving written messages or objects
    • vandalizing a person's property

STALKING

cyberstalking legislation
CYBERSTALKING LEGISLATION

18 U.S.C. 875(c), it is a federal crime, punishable by up to five years in prison and a fine of up to $250,000, to transmit any communication in interstate or foreign commerce containing a threat to injure the person of another.

47 U.S.C. § 223 : US Code - Section 223: Obscene or harassing telephone calls in the District of Columbia or in interstate or foreign communications

murphy case
MURPHY CASE

The first person charged with cyberstalking was Robert James Murphy. He violated Title 47 of the U.S. Code 223 which prohibits the use of telecommunications to annoy, abuse, threaten or harass anyone. Murphy was sending obscene messages and pictures to his ex-girlfriend for more than 4 years. The woman, Joelle Ligon, was deleting these e-mails at first but then started collecting them as evidence. Murphy pleaded guilty to two counts of cyberstalking.

how cyberstalking occurs on campus and elsewhere
HOW CYBERSTALKING OCCURS ON CAMPUS(AND ELSEWHERE)

EASY ACCESS TO TECHNOGOGY

TODAY’S STUDENTS ARE MORE TECH SAVVY

WI-FI, INTERNET CAFÉ’S, DORM ROOMS, ETC. OFFER

OPPORTUNITY FOR PRIVACY TO STALK

VARIETY OF TYPES OF TECHNOLOGY AVAILABLE

slide10
TMI

AVOID OVER-SHARING OF YOUR PERSONAL INFORMATION

PROVIDING TOO MUCH INFORMATION ONLY AIDS CYBERSTALKERS AND PUTS YOUAT RISK

stop think send
stop * THINK * SEND

DID YOU KNOW?

ONCE YOU PLACE SOMETHING ON THE INTERNET, IT’S OUT THERE FOREVER

NAME

ADDRESS

PHONE #

CREDIT CARD #

SOCIAL SECURITY #

PERSONAL AND PROFESSIONAL IDEAS

the 3 strike rule
THE “3 STRIKE” RULE

WHEN YOU OR SOMEONE YOU LOVE EXPERIENCE

3 OR MORE INSTANCES OF UNWANTED, INTIMIDATING, THREATENING,

OR

ANNOYING

BEHAVIOR FROM THE SAME INDIVIDUAL IT’S TIME TO REACH OUT FOR HELP

what you need to know
WHAT YOU NEED TO KNOW

OBTAINING A RESTRAINING ORDER OR ORDER FOR PROTECTION

Stalking and cyberstalking require a repeated course of conduct, amongst other elements, in order to be classified as stalking or cyberstalking…

stalking motive
STALKING MOTIVE

OBSESSION?

STRESS?

COMPETITION?

POWER AND CONTROL?

ANXIETY?

HATRED?

WHAT MOTIVATES A STALKER?

slide16

EFFECTS OF STALKING

  • FEAR - WORRY - STRESS
  • INABLILITY TO CONCENTRATE
  • INCREASED USE OF ALCOHOL AND OTHER DRUGS
  • DIFFICUTLY WITH JOB, SCHOOL WORK, SPORTS, SOCIAL ACTIVITIES
  • DROPPING OUT OF SCHOOL AND LIFE
  • LOSS OF INCOME
  • LOSS OF JOBS AND INTERNSHIPS
  • LOSS OR CONFLICT WITH RELATIONSHIPS
what do i do if someone is stalking me
WHAT DO I DO IF SOMEONE IS STALKING ME?

DOCUMENT THE CONTACTS

DATES, TIMES, PLACES, WHAT IS SAID, WHAT IS DONE, NAMES AND ADDRESSES OF WITNESSES

CHANGE YOUR PASSWORDS, IDENTIFYING INFORMATION, PHONE NUMBERS, LOCKS, ETC.

REDUCE CONTACT WITH STALKER BY CUTTING OFF THEIR ACCESS: STRICTER SECURITY ON FACEBOOK OR OTHER INTERNET SITE

ALTER YOUR ROUTINE

CONTACT LAW ENFORCEMENT EVERYTIME THE STALKER MAKES CONTACT WITH YOU

TELL FAMILY & FRIENDS WHERE YOU’RE GOING

DON’T ACCEPT THE BLAME FOR THE STALKERS BEHAVIOR

TRUST YOUR INSTINCTS

slide18

RESOURCE LIST

RESOURCES DON’T EXIST

IN THE U.S.

alexis moore
ALEXIS MOORE

Founder and president of Survivors in Action, a national advocacy group that provides individual assistance to victims of abuse, including victims who have experienced cyberstalking, stalking and cyberbullying. As a expert, consultant, speaker, advocate and author Moore travels extensively to educate and empower the public. She provides expert testimony at Senate and Assembly Public Safety Hearings and has contributed to legislation around the globe. Through her program “High-Tech Self Defense for the 21st Century," she teaches audiences about high-tech crimes such as identity theft and cyberstalking and how to protect yourself.