Recognizing Stalking in Intimate Partner Cases. Part I: Recognizing Stalking in Intimate Partner Violence Cases 8/8/2017

Similar documents
Investigating & Prosecuting Stalking. Part II: Stalking Evidence: What to Look For and How to Get it Admitted. Thank you for joining us today!

Recognizing and Responding to Stalking on Campus

Know More, Do More: Identifying and Responding to Stalking

Stalking and Sexual Violence Stalking Context Context is critical!

Responding to Stalking

National Stalking Awareness Month

Stalking in Supervised Visitation

Facilitator Guide Know It. Name It. Stop It. Public Awareness Program

Stalking in Supervised Visitation

S-DASH (2009) Risk Identification Checklist For Use in Stalking and Harassment Cases

Victim s Stalking and Harassment Risk Identification Checklist (VS-DASH 2009) 1

Stalking ~~~~~ Presented by: Heather Putnam Danyel Albert

REPORT TO CONGRESS ON STALKING AND DOMESTIC VIOLENCE, 2005 THROUGH 2006

Release Date: 1/12/2011 Contact Details: Steve Watkins Communications Team, St Ann s Hospital, St Ann s Rd, N15 3TH

STALKING PRESENTED BY: HEATHER PUTNAM JEN LACHANCE-SIBLEY

Stalking, Questions and Answers

2005 National Stalking Awareness Month

Examining Intimate Partner Stalking And Use Of Technology In Stalking Victimization

Stalking and Domestic Violence

Stalking and harassment

Bulletin Board Packet Stalking is No Joke!

What is stalking? Stalking is a pattern of repeated, unwanted attention, harassment, and contact. It is a course of conduct that can include:

THE INCIDENCE AND NATURE OF STALKING VICTIMISATION

Embargoed for release to the public until Tuesday, January 13, 2009, at 9:00 a.m. EST. Stalking Victimization in the United States

National Stalking Awareness Month 2013 November 28, 2012

Problem-Specific Guides Series Problem-Oriented Guides for Police. No. 22. Stalking. by the National Center for Victims of Crime

New Frontiers of Stalking Video Voyeurism

The Psychology of Stalking Definitions p. 2 Incidence and Prevalence of Stalking p. 3 This Book p. 3 Current Findings p. 4 New and Controversial

TERMS AND CONDITIONS FOR USE OF MTN PROTECT SERVICE

Understanding the Mediating Role of Responsibility in Perceptions of Stalking. Adrian J. Scott, Emma Sleath, Lorraine Sheridan & Simon C.

Quarterly Crime Statistics Q (01 April 2014 to 30 June 2014)

Privacy Policy. April 2018

THE PSYCHOLOGY STALKIN0

Illinois Official Reports

Learning Objectives. Upon completing this section, students will understand the following concepts: The categories used to classify stalking cases.

INTEGRITY & LIFESTYLE QUESTIONNAIRE

Same-Sex and Opposite-Sex Stalking in the United States: An Exploration of the Correlates of Informal and Formal Coping Strategies of the Victims

CHAPTER IX: STALKING

CUBITT TOWN JUNIOR SCHOOL CCTV POLICY 2017

Public Figures and Stalking in the European Context

Unit 10: rules and regulation

Despite the widespread adoption of stalking legislation, there is no definitive antistalking

CYRIL JACKSON PRIMARY SCHOOL CCTV POLICY

Summary. Domain Domestic violence. Federal Department of Home Affairs FDHA

Monckton-Smith, Jane and Szymanska, Karolina and Haile, Sue (2017) Exploring the Relationship between Stalking and Homicide. Suzy Lamplugh Trust.

English as a Second Language Podcast ENGLISH CAFÉ 131

LEXKHOJ INTERNATIONAL JOURNAL OF CRIMINAL LAW ISSN (VOL I ISSUE III) Website: ID:

CONTENTS. Using Your Remote Getting Started Using your Whole Home DVR Video on Demand Pay Per View Search...

a lot of money a bonus to take a person to court an insufficient amount the public s need of something a negative aspect to chase or follow

Kyushu University Legal Research Bulletin Graduate School of Law, Kyushu University On-Line Edition ISSN:

LAZER s Sing with Stone Sour Contest

Public Educational and Governmental (PEG) & Commercial Access Rules & Regulations

Redwall. Technologies LLC

2018 Visiting Undergraduate Student Application

Abstract. The majority of the stalking literature reports on male stalkers and female victims. The current work

WUWF TV. Guide to Policies and Procedures WATCHDOG TELEVISION FROM THE UNIVERSITY OF WEST FLORIDA

February 2007 Edition /A. Getting Started Guide for the VSX Series Version 8.5.3

CHAPTER II REVIEW OF LITERATURE. Talking about the similar characteristics of literary works, it can be related

A short dramedy by Jeri Weiss

blink USER GUIDE Bluetooth capable Reclocker Wyred 4 Sound. All rights reserved. v1.0

Somebody's watching you

Using the Kilgore College Library Online Resources Psychology Sociology Social Work

Review of the Need for Stalking Legislation in Northern Ireland.

Getting Started Guide for the V Series

Digital TV. Connected. Amino Set Top Box Instructional Manual. Your pathway to the world. Digital TV powered by Celect Communications

Facilitators Guide to The Decision

Cell Phone Signal Booster. User Manual. NEED HELP? support.weboost.com

Once Upon a Midnight Stalker: A Content Analysis of Stalking in Films

Getting Started Guide for the V Series

How Millennials Get News: Inside the Habits of America s First Digital Generation

Unpaid Internship - Job Description

Course Projection - subject to change and error; consult catalog and course schedule to confirm details

Designed in Colorado, USA. Bluetooth Cable. Quick Start Guide

QUICK START GUIDE. IP Camera & NVR Bundle ENGLISH

STAR s Pick Your Purse

Using the Kilgore College Library Online Resources Psychology Sociology Social Work

CHARLOTTE MECKLENBURG PUBLIC ACCESS CORPORATION

93.3 KIOA s Gadget Grab

ADDING ESSENTIAL INFORMATION TO VIDEO

Dispatcher: Emergency. Caller: [unintelligible] we re right here at Macys um at Mall of America somebody got stabbed.

VideoSplitter HDMI 4K PT

A Study of the Predictors of Persistence in Stalking Situations

Course Projection subject to change and error; consult catalog and course schedule to confirm details. Program Advisor

Welcome to the Online Public Inspection File Webinar: A Refresher Course

IMIDTM. In Motion Identification. White Paper

SACRAMENTO POLICE ACADEMY NON-AFFILIATE RECRUIT QUESTIONNAIRE NAME:

ISO Digital Forensics- Video Analysis

STALKING E RISCHIO DI VIOLENZA (STAR V) FINAL REPORT EXECUTED BY UNIVERSITÀ DEGLI STUDI DI MODENA E REGGIO EMILIA UNIVERSITÀ DEGLI STUDI DI MILANO

DVI. Instructions. 3. I control the money in my home and how it is spent. 4. I have used drugs excessively or more than I should.

#205: Someone's following me: Stalking, stalkers and their victims

G4S ACADEMY BODYCAMS GUIDE VERSION

Metal Theft Taskforce Identification Booklet

February 22, To whom it may concern:

May 2006 Edition /A. Getting Started Guide for the VSX Series Version 8.5

VIDEO MINI GUIDES ACTIVISTS LAWYERS LAWYERS SUPPORTING SUPPORTING ACTIVISTS. vae.witness.org

Programming Policy. Policy Reviewed 2013 Scheduled review date 2016

Crime and Punishment. Before you read Work with a partner. Have you read a newspaper today? What was the headline?

VAI. Instructions Answer each statement truthfully. Your records may be reviewed to verify the information you provide.

Solicitors & Investigators Guide For Questioned Document Examination Page 1 of 5

OBJECTIVES. 1. Explain the concept of REspect verses respect in the tactical law enforcement setting.

Transcription:

Thank you for joining us today! Part I: Recognizing Stalking in Intimate Partner Violence Cases August 9, 2017 2-3:30pm Central Time Elaina Roberts, Legal Director, Stalking Resource Center and Detective Mark Kurkowski, Regional Domestic Violence Prevention Team, St. Louis Metropolitan Police Department This project was supported by Grant No. 2015-TA-AX-K027 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this (document/program/exhibit) are those of the authors and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women. The materials are available on our website: http://www.bwjp.org/training/webinarrecognizing-stalking-ipv-cases-part-1.html AUDIO OPTIONS The audio component can be heard by VoiceoverIP (VoIP) or telephone: VoIP: Select "connect" to internet audio on the Start tab to get your audio streaming through your computer. Telephone: Select I am dialed in on the Start tab and dial in from you telephone. Your standard long distance charges will apply. Dial-in: 641-715-3670 Passcode: 732746 AUDIO TROUBLESHOOTING for VoIP Verify you selected connect to the internet audio If your computer & speaker volume are turned all the way up, & volume is too low, run the audio wizard under Tools at the top of your screen. If still low volume, try a headset (which is recommended). Lastly, if all your troubleshooting attempts have failed please dial in from a telephone. Your computer &/or network don t have the requirements (bandwidth, memory, etc) for VoIP on this webinar. Recognizing Stalking in Intimate Partner Cases Battered Women s Justice Program Webinar Series Part I August 9, 2017 1

Thank you OVW! This project was supported by Grant No. 2015-TA-AX-K035 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this publication/program/exhibition are those of the author(s) and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women. National Center for Victims of Crime 2016 Content of this presentation may be reproduced for educational purposes with the permission of the Stalking Resource Center. Please contact the Stalking Resource Center at src@ncvc.org or 202-467-8700 for permission. Stalking Resource Center In-person training Webinars Individual & organizational assistance Fact sheets, brochures, manuals, guides Policy/protocol development & consultation Videos Online resources National Stalking Awareness Month materials www.victimsofcrime.org/src Stalking Behavior 2

Victim & Offender Relationship Current/Former IP 43% 62% Acquaintance 26% 37% Stranger 17% 15% Family member 7% 11% Person of authority 3% 2% 0 10 20 30 40 50 60 70 Male victims Female victims - The National Intimate Partner and Sexual Violence Survey (NISVS): 2010-2012 State Report Gather info on non-offending parent Family court Deliver technology to monitor/track non-offending parent Using kids Legal system harassment File false police reports Proxy stalking OP violations 50% - 60% of partner stalking victims say others were involved in stalking 81% of male victims 69% of female victims - Logan et al (2006) NVAW 1998 Pattern of Behavior 2/3 of stalkers pursue their victim at least once per week 78% of stalkers use more than one means of approach Weapons used to harm or threaten victims in about 20% of cases - The RECON Typology of Stalking - The RECON Typology of Stalking (2006) 3

Recidivism Occurs in 60% of stalking cases Time between intervention and recidivism was about 2 months Ranged from 1 day to 6 years - The RECON Typology of Stalking (2006) Domestic violence re-abuse occurs in 24% to 60% of cases The majority of offenders do so within 6 months of beginning probation and/or a batterer program - Klein et al, (2005) Duration of Stalking Stalking Victimization in the United States, BJS (2009) Stalking & Other Crimes 4

Stalking and Other Crimes Among stalking cases 24% involve property damage 21% involve a direct attack on the victim 15% involve an attack on another person or pet Charged items to credit card Took money from accounts Opened/closed accounts Identity Theft 30% 52% 54% 0% 20% 40% 60% Stalking and Domestic Violence 3/4 of women who experienced stalking-related behaviors experienced other forms of victimization (sexual, physical, or both) 81% of stalking victims who were stalked by an intimate partner reported that they had also been physically assaulted by that partner. - National Violence Against Women Survey (1998) - Stalking acknowledgement and reporting among college women experiencing intrusive behaviors (2007) Intimate Partner Stalkers Increased Risk for Victims More likely to physically approach victim More insulting, interfering and threatening More likely to use weapons Behaviors more likely to escalate quickly More likely to re-offend The RECON Typology of Stalking, Mohandie et al (2006) 5

IP Stalking Violence Jealous Illegal drug use Direct threats Where there is evidence of the presence of all of these factors, the risk of stalking violence is heightened. - Women s Experience of Violence During Stalking by Former Romantic Partners (2005) Greatest risk of violence Lethality Risks 76% Femicide by intimate partner At LEAST 1 episode of stalking within year prior to murder 85% Attempted femicide by intimate partner At LEAST 1 episode of stalking within year prior to attempted murder - Stalking and Intimate Partner Femicide, McFarlane et al. (1999) Lethality Risks Almost 70% of femicide victims experienced physical abuse Almost 90% of those victims had also been stalked - Stalking and Intimate Partner Femicide, McFarlane et al. (1999) 6

Physical Abuse Stalking Greater indicator of potential lethality than either behavior alone Misuse of Technology Technology is Not the Enemy Criminals exploit the technology to create an advantage for themselves Most of the technologies used by stalkers have legitimate and legal functions We must keep up with the criminals and work to enact progressive, inclusive stalking legislation 7

What type of technology do you think stalkers use the most? A)Cell Phone B)Computer/laptop/tablet C)GPS Stalker Tactics For both female and male victims the most common tactics experienced were: Unwanted messages, including text and voice, and unwanted phone calls Females: 76% Males: 72% Threats of physical harm Females: 68% Males: 70% - The National Intimate Partner and Sexual Violence Survey (NISVS): 2010-2012 State Report Cell Phones 8

Cell Phones Calls, texts, photos, video Cell phone settings can be manipulated to provide access to the victim Listening device GPS tracking 9

Location Based Services Search for: Locate Find kids, find friends Track spouse 10

Cell Phone Spyware Listen to calls View contact lists Read text messages Activate speaker/camera Locate Detecting Cell Phone Spyware Offender knows things that they could only know if they have access to the phone Battery overuse and/or high data usage Offender has or had physical access Clicks or sounds when on calls Call &Text Message Spoofing Call & send text messages anonymously 11

Spoofing Documentation & Evidence Match call logs Offender outgoing call to spoof company Look for different access numbers Victim incoming call from friend / family Suspect s financial records Suspect s phone/computer history Court order to spoofing companies Truth in Caller ID Act, 2009 No person or entity in the United States shall, with the intent to defraud, cause harm, or wrongfully obtain anything of value, knowingly cause, directly or indirectly, any caller identification service to transmit or display misleading or inaccurate caller identification information FCC can levy up to $10,000 per violation In 2016 the FCC filed a Notice of Apparent Liability against two individuals and proposed levying a fine of $25,000 each. Text vs. Messaging Text uses cellular services Shows up on phone bill Messaging Facebook Messenger imessage Kik Lots of others imessage and IM are data 12

Disappearing SMS & MMS SMS & MMS Both users need to have the app Cell Phones - Documentation Document communications Audio: on phone and separately Text: On phone Digital image of phone face Most cell companies no longer maintain the content of text messages Victims can get detailed copies of their own phone bills Cellphones Victim Safety Regularly ask victims about their cell phone use Discuss spyware potential Discuss account privacy Discuss location settings 13

Cellphones Victim Safety Consider completely wiping phone & restoring to factory settings discuss potential safety risks of this action Consider keeping phone but not using it for anything that could reveal location of victim but also using a different, safer phone (no-contract phones, donated phones) Social Media Social Networking Sites How stalkers can exploit SNS: Gather information on the victim Location Plans Communicate Post on victim s page Post about the victim on their own or other s pages Create fake sites 14

Virginia Craigslist Rape Wyoming Craigslist Rape Fake Social Media Posts This video shows you how to tamper with comments on Facebook.Perhaps you want to destroy the reputation of someone you hate or make them look like a hated person GPS & Locating Devices 15

16

Resources for Professionals Video and discussion guide available at www.victimsofcrime.org/src/resources/publications#video 17

Can be downloaded at www.victimsofcrime.org/src Available for download at www.ncvc.org/src For Victim Service Providers For removal of online information Safe Shepherd www.safeshepherd.com/advocates Reputation.com www.reputation.com/domesticviolence Technology Safety Planning www.nnedv.org 18

NNEDV SafetyNet Project www.nnedv.org Technology Safety Planning with Survivors This handout provides 12 tips about technology use to discuss if someone you know is in danger. Survivors & Technology An interactive safety planning tool access to intelligence databases information sharing analytical support investigative support and research www.riss.net equipment loans confidential funds training and publications field staff support technical assistance 19

Mobile Phone Seizure Guide App Available for iphone 20

www.justnet.org www.ectcoe.net 21

IACP International Association of Chiefs of Police Thank you! Elaina Roberts, JD Legal Director, Stalking Resource Center eroberts@ncvc.org Detective Mark Kurkowski St. Louis City Police Department mlkurkowski@slmpd.org For additional information and assistance: 202-467-8700 www.victimsofcrime.org/src 22