A Focus on the Victim Annette Cox, Manager

Slides:



Advertisements
Similar presentations
Leading Your Organization in the Aftermath of a Crisis Bob VandePol SOMEONE VALUEOPTOINS.
Advertisements

Rachael Johnson - NSPCC Aims To identify the impact of sexual abuse; To identify the need for services; To describe a model developed within NSPCC 1.
The Effects of Childhood Sexual Abuse on College Age Students Linda Crummett, ACSW, LCSW Mental Health Counselor Student Health Services Montana State.
It is every person’s human right to a life free of violence Business P F PO Box 555, Drummoyne NSW 2047 ABN Counselling.
GROUP 4 ARTHUR CASTRO ALLISON DE LA ROSA COURTNEY MCELHANEY JEAN SUH Creating an Evidence-Based Program for Sexual Assault.
ABUSE1 Elder Abuse, Neglect and Exploitation Training for Professionals Please Sign In.
Towards a Child-Friendly Approach in the Justice System ~ Training of Legal & Clinical Personnel ~ Pamela Hurley Making Children’s Rights Work Montreal,
Human Trafficking: A Physician’s Perspective Rick Kooima Aug. 12, 2014.
3 STUDENT ASSESSMENT DEPARTMENT
Domestic Violence in the Dominican Republic An assessment of an abused women’s shelter Tara Trudnak, MPH Wayne Westhoff, Ph.D, MPH, MSW Ludovina Rodriguez,
Older, wiser … and homeless Counselling older adults experiencing homelessness Emerging priorities in mental health and addictions: the virtual world,
Domestic Violence Jeanette Smith Senior Crown Prosecutor.
Virginia RULES Teens Learn & Live the Law Victims’ Rights.
Tarun Singh Service delivery manager
Challenges when Working with LGBT Survivors of IPV
Claude JANIZZI Chairman of the Lanzarote Committee
A College Study of Grief, Depression, and Anxiety
Victims’ Rights.
Mental vulnerability & risk
United States District Judge Eastern District of New York
PRESENTED BY: Anne Seymour National Crime Victim Advocate
Copyright © 2005 Pearson Education Canada Inc.
Copyright © 2013, 2004 by Saunders, an imprint of Elsevier Inc.
TRIPLE JEOPARDY: Protecting
L.E.I.H.T. Task Force Law Enforcement to Investigate Human Trafficking
Trauma Informed Practice
Preventing Hate Crimes
DEVELOPMENTAL PSYCHOLOGY
Social Support Groups Matrix Intensive Outpatient Program
Economic Abuse & Financial Exploitation in later life
Human Trafficking: Invisibility of Women in Labor Trafficking
Strategies to Assist with Vicarious Trauma
Ten Tips for Judicial Training on Elder Abuse
Theory of Social Development
CJS 205 STUDY Lessons in Excellence-- cjs205study.com.
Department of Public Safety Bystander Intervention
PSYCHOSOCIAL CARE AND SUPPORT FOR CHILDREN IN EMERGENCIES
The Rights of Victims.
Section 1: RECOGNITION Module 6: Dynamics of family violence
Erik Erikson Eight Ages of Man
Tackling Child Sexual Exploitation & Abuse – A National Perspective CPC Self Evaluation Overview of Findings Moira McKinnon Chair National CSE Group.
Anti-radicalisation Radicalisation is a process by which an individual or group comes to adopt increasingly extreme political, social, or religious ideals.
And Gender Based Violence
השנים שאחרי וקורבנות משנית: השלכות משפטיות של פגיעה פלילית בילדים
Criminal Investigation
Challenges of Achieving Best Evidence (ABE) In Child Sexual Abuse Cases How young is too Young? Ann Stuart MBE Independent Safeguarding Consultant.
The Path to Justice: Migrant and Refugee Women’s Experience of the Courts Report prepared for the Judicial Council on Cultural Diversity JCCD.
Module 13 Trauma-Informed Care
Personal Social Health Economic education
_____________________________________________________________________
Minnesota Department of Public Safety
What to Do If You Are Falsely Accused of a Crime?
The American Indian/Alaska Native National Resource Center for Substance Abuse and Mental Health Services Crisis Care Red Lake, Minnesota Dale Walker,
Crisis Intervention Learning Module: Volunteer Training Level 2.
Missing children and young people and Hidden Missing
Intimate Partner Violence:
Abuse of older women – Long-term suffering and stigma
Official Crime statistics
Victim Remedy and Witness Protection
Mental Health in the Correctional System
Resolving Conflict & Preventing Violence
Once the scene has been secured, a lead investigator will start processing the crime scene area.
_____________________________________________________________________
Human Trafficking and Child Welfare Services
SERVING UNDOCUMENTED SURVIVORS OF HUMAN TRAFFICKING
Finding Sex Partners On-Line: What’s the Risk for STI
Erickson’s Eight Stages
Once the scene has been secured, a lead investigator will start processing the crime scene area.
Affair Recovery: It Doesn’t Have to be the End
Presentation transcript:

A Focus on the Victim Annette Cox, Manager Victim Witness Assistance Program United States Attorney’s Office U. S. Department of Justice

Overview Crime Demographic Expectations Measure of Success

In General Health Financial Fear-Loss of Independence Shame Stage of Life Isolation Trust

An Important Subset Less likely to recover from victimization Financially Emotionally Physically Targeted for age/disability Odds favor perpetrator/Less likely to report

Less Likely to Report Victims may: Not self-identify as a victim Refuse help Have unclear or disjointed memories Protect the identity of their perpetrator “In order to assist victims of sex trafficking, it is helpful to anticipate some of the actions of the victim and understand that these responses are often a part of learned loyalty, dependency and distrust that has been encouraged by the trafficker or as result of the trauma they have experienced. For example, the victim may: Not self-identify as a victim or a victim of trafficking Refuse help Run away from shelters Have unclear or disjointed memories Lie or provide canned stories Be aggressive Protect the identity of their trafficker/pimp, and others”

Victims Identifying victims Grooming victims Controlling victims

Interview Technique Assess Age Related Function Initial Assumptions Senses (Eyesight and Hearing) Memory Initial Assumptions Practice Heightened Awareness Errors Corrections Ask

Technique Memory Long Term Short Term Other Contributing Factors Quality of Information Other Contributing Factors Some Solutions