Download presentation
Presentation is loading. Please wait.
Published byArthur Wilkinson Modified over 8 years ago
1
Technology & Stalking
2
Every single datum about my life is private? That's silly," Scalia [said].
3
What they found….. home phone number, home phone number, food preferences, food preferences, wife's personal e-mail address wife's personal e-mail address photos of his grandchildren, photos of his grandchildren,
4
Databrokers
7
Stalking occurs most commonly in intimate partner relationships. Most dangerous and most lethal
8
Cell Phones as a Stalking Tool Pretexting Web Access Excessive/Monitor Texting Silent mode/auto Video
9
Family Locator Plans
10
Trap Call Unblocks calls marked unknown or private and shows you the caller’s ID
12
GPS Tracking Devices Video 2
13
Common places GPS devices are often hidden.
14
Computers & Internet
15
Footprints on the Web
16
Internet History/Temp Files
17
Profiles: Impersonation, pose as victim
18
Personal Browser Accounts
22
Keystroke Logger
23
On-Line Social Networking
24
Social Networking & Stalking Find your kids – find you. Find your kids – find you. online status indicator online status indicator
25
Photos and videos that are shared to harass Photos and videos that are shared to harass Information can be used in most courts Information can be used in most courts Social Networking & Stalking
26
Email Accounts Impersonation of victim or a “friend” (Spoofing) Impersonation of victim or a “friend” (Spoofing) Reading email Reading email
27
Resetting account passwords Resetting account passwords Spoofing email Spoofing email IP Tracing IP Tracing Email Accounts
28
RCW 9.61.260 Cyberstalking RCW 9.61.260 Cyberstalking A person is guilty of cyberstalking if he or she, with intent to harass, intimidate, torment, or embarrass any other person, and under circumstances not constituting telephone harassment, makes an electronic communication to such other person or a third party: A person is guilty of cyberstalking if he or she, with intent to harass, intimidate, torment, or embarrass any other person, and under circumstances not constituting telephone harassment, makes an electronic communication to such other person or a third party: (a) Using any lewd, lascivious, indecent, or obscene words, images, or language, or suggesting the commission of any lewd or lascivious act; (a) Using any lewd, lascivious, indecent, or obscene words, images, or language, or suggesting the commission of any lewd or lascivious act; (b) Anonymously or repeatedly whether or not conversation occurs; Threatening to inflict injury on the person or property of the person called or any member of his or her family or household. (b) Anonymously or repeatedly whether or not conversation occurs; Threatening to inflict injury on the person or property of the person called or any member of his or her family or household.
29
Cyber Stalking & Orders a) The perpetrator has previously been convicted of the crime of harassment, as defined in RCW 9A.46.060, with the same victim or a member of the victim's family or household or any person specifically named in a no- contact order or no-harassment order in this or any other state; or a) The perpetrator has previously been convicted of the crime of harassment, as defined in RCW 9A.46.060, with the same victim or a member of the victim's family or household or any person specifically named in a no- contact order or no-harassment order in this or any other state; or9A.46.060 (b) The perpetrator engages in the behavior prohibited under subsection (1)(c) of this section by threatening to kill the person threatened or any other person. (4) Any offense committed under this section may be deemed to have been committed either at the place from which the communication was made or at the place where the communication was received. (b) The perpetrator engages in the behavior prohibited under subsection (1)(c) of this section by threatening to kill the person threatened or any other person. (4) Any offense committed under this section may be deemed to have been committed either at the place from which the communication was made or at the place where the communication was received.
30
Questions that can surface cyberstalking in a DV case How do you to communicate? In person, on the phone, text messages, GPS? How do you to communicate? In person, on the phone, text messages, GPS? How many times do you communicate during a day? How many times do you communicate during a day? Do your children use cell phones? Are you on a family plan? Do your children use cell phones? Are you on a family plan?
31
Judicial Considerations Be savvy. Demonstrate your knowledge of technology by addressing it in your orders. Be savvy. Demonstrate your knowledge of technology by addressing it in your orders. Remember that you have a position of power. Remember that you have a position of power. Address safety concerns. Address safety concerns.
32
For further information Teresa Atkinson Technology Safety Program Coordinator teresa@wscadv.org 206-389-2525 ext. 103 Washington State Gender and Justice Commission 360-705-5290 Myra.Downing@courts.wa.gov
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.