use of technology to stalk
play

Use of Technology to Stalk In Person Training Webinars Online - PDF document

Stalking 2.0 The Use of Technology to Stalk September 10, 2018 at 2-3:30pm CDT Jennifer Landhuis, Stalking Prevention, Awareness, and Resource Center (SPARC) This project was supported by Grant No. 2015-TA-AX-K027 awarded by the Office on


  1. Stalking 2.0 The Use of Technology to Stalk September 10, 2018 at 2-3:30pm CDT Jennifer Landhuis, Stalking Prevention, Awareness, and Resource Center (SPARC) This project was supported by Grant No. 2015-TA-AX-K027 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this (document/program/exhibit) are those of the authors and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women. 1 Use of Technology to Stalk In ‐ Person Training Webinars Online Resources Individual & Organizational Assistance Policy/Protocol Development & Consultation National Stalking Awareness Month Materials

  2. For Additional Resources *www.stalkingawareness.org (coming soon!) * Training modules * Victim resources * Practitioner guides * Webinars *Follow us on Twitter SPARC @followuslegally Fair Use This presentation includes the creative work of others. This property is being used by permission or under claim of “fair use” (17 USC § 107). This presentation was created pursuant to fair use guidelines, and further use or distribution is prohibited. Defining Stalking Behavioral Statutory

  3. Stalking A pattern of behavior directed at a specific person that would cause a reasonable person to feel fear Behaviors Involving Technology IPV Stalking and Technology *Stalker’s access to victim accounts * Infer or compel disclosure of credentials * Offender is owner of account *Victims often report having “no idea” of what stalker may have done to their device Freed et al., Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Mutiple Stakeholders, 1(46) PACM ON H UMAN ‐ C OMPUTER I NTERACTIONS (2017)

  4. Professionals and Technology *Shared social circles make it nearly impossible to block the stalker. Victims report trusting the “wrong person” *A small percentage of professionals include discussion of risk factors related to technology *Disconnecting is often not realistic or safe Freed et al., Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Mutiple Stakeholders, 1(46) PACM ON H UMAN ‐ C OMPUTER I NTERACTIONS (2017) Cell Phone Technologies TrapCall (trapcall.com)

  5. Call and Text Spoofing Gives caller ability to change number shown on caller ID or text, change sound of voice and to record calls Video clip Spoof Phone Calls

  6. Evidence with a SpoofCard *Phone records from: victim, “friend”, and suspect *Victim’s records show “friend” called *Friend’s records show no call *Suspect’s records show a call to SpoofCard * Call the number and record *Financial records of suspect Evidence with an App * If you have access to suspect’s phone, screen shot of app downloaded * If no access, can you access “store” to look for a history of the app being downloaded * Financial records if the suspect paid for the app Truth in Caller ID Act, 2009 *No person or entity in the United States shall, with the intent to defraud, cause harm, or wrongfully obtain anything of value, knowingly cause, directly or indirectly, any caller identification service to transmit or display misleading or inaccurate caller identification information *FCC can levy up to $10,000 per violation In 2016 the FCC filed a Notice of Apparent Liability against two individuals and proposed levying a fine of $25,000 each.

  7. Filing a Complaint With FCC * File a complaint online at https://consumercomplaints.fcc.gov * By phone 1 ‐ 888 ‐ CALL ‐ FCC (1 ‐ 888 ‐ 225 ‐ 5322); TTY: 1 ‐ 888 ‐ TELL ‐ FCC (1 ‐ 888 ‐ 835 ‐ 5322); ASL: 1 ‐ 844 ‐ 432 ‐ 2275 * By mail (include your name, address, contact information and as much detail about your complaint as possible) Federal Communications Commission Consumer and Governmental Affairs Bureau Consumer Inquiries and Complaints Division 445 12th Street, S.W. Washington, DC 20554 Global Positioning Systems (GPS) and Locating Devices GPS Devices

  8. Geotagging Camera GPS Geotagging Exif Viewers Show Geo ‐ Info Exif: Exchangeable image file format: Descriptive data (meta ‐ data) in an image file that include the date the photo was taken, resolution, shutter speed, focal length and geolocation

  9. EXIF Data EXIF Data Sites that strip EXIF data Sites that DO NOT strip before posting photos EXIF data before posting • Facebook photos: • Twitter • Google • eBay • Tumblr • Instagram – unless pic was added to Photo Map • DropBox • Flickr – gives the option • Email Disabling Geo ‐ Data Search “how to disable geotagging on a [phone make/model]”

  10. Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual ‐ use apps: designed for a legitimate purpose but can be repurposed by a stalker (Find my iPhone) *Most require physical access to the phone *Many are covert

  11. Detecting Cell Phone Spyware Offender knows things that they could only Battery overuse and/or know if they have high data usage access to the phone Offender has or had Clicks or sounds when physical access on calls Cell Phone Safety Documentation Document communications *Audio: on phone and separately *Text: *On phone *Digital image of phone face *StitchIt; Tailor Apps *Victims can get detailed copies of their own phone bills

  12. Cameras How Can Cameras Be Disguised? Camera Considerations Equipment is inexpensive and easy to access Look for cameras or common objects in which cameras may be hidden Camera detection •Signal detectors •Lens detectors

  13. Computers and Tablets Spyware Spyware Documentation and Evidence Detecting spyware  Has computer been performing strangely?  Has battery been depleting faster than usual? Commercial spyware detectors (McAfee, Norton, Symantec) may or may not find spyware Forensic analysis

  14. Keystroke Logging Hardware *Can be keyboard ports, special keyboards, or mouse *No software to install or configure ‐ just plug it in *Need physical access to install & remove Victim Safety *Educate victims about possibilities *Spyware “cleaners” do not guarantee safety * Removal may escalate offender’s behavior *Encourage victims to use a “safer” computer * Shared computers at the library or elsewhere Social Media

  15. Social Media Reach TechCrunch 2017 Exploiting Social Media Gather information on the victim • Location • Plans Communicate • Post on victim’s page • Post about the victim on their own or other’s pages Create fake sites Facebook

  16. Facebook Documentation *Capture and save screenshots (PrntScrn) *Some sites offer a “download your information” service in account settings Facebook Online Request Facebook.com/records Facebook.com/safety/groups/law/guidelines (general info) Instagram

  17. Same Process as Facebook Online: * Law enforcement officials are encouraged to use the Law Enforcement Online Request System at facebook.com/records for the submission, tracking and processing of requests. Please note that a government ‐ issued email address is required to access the Law Enforcement Online Request System. Mail: * Attn: Law Enforcement Response Team 1601 Willow Road Menlo Park, CA 94025 Email: * lawenforcement@instagram.com Snapchat SnapChat Ghost Mode Ghost Mode allows you to turn your location on and off on the Map! Only Me (no one sees you) Select Friends (you choose who sees you) My Friends (all your friends can see you)

  18. SnapChat Legal process submissions and general questions: lawenforcement@snapchat.com All requests must contain a username Vanity name. Non ‐ unique. Can’t be Username. Unique. Can be used to locate a Snapchat account used to locate a Snapchat account Nonconsensual Distribution of Intimate Images Non ‐ Consensual Distribution of Intimate Images *Sexually explicit media that is publicly shared online without the consent of the pictured individual *34 states + DC have laws, federal law proposed www.cybercvilrights.org/revenge ‐ porn ‐ laws

  19. Resources for Non ‐ Consensual Distribution of Intimate Images *Safeshepherd.com/advocates *Cyberrightsproject.com *Cybercivilrights.org For victims: 1 ‐ 844 ‐ 878 ‐ CCRI *Cagoldberglaw.com *Dmcadefender.com *Copybyte.com Resources Documentation STALKING INCIDENT LOG Location of Witness Name(s) Police Called Officer Name Date Time Description of Incident Incident (Attach Address and Phone #) (Report #) (Badge #)

  20. www.ae aequit quitasr sresou esource.or org

  21. Going Forward Discuss technology safety concerns with victims of stalking Consider all forms of technology that might be utilized by stalkers Safety plan with stalking victims around their use of technology Jennifer Landhuis, M.S. Director jlandhuis@aequitasresource.org 202 ‐ 819 ‐ 1381 @followuslegally

Recommend


More recommend