Stalking, Cyberstalking and Violent Crime

advertisement
Stalking, Cyberstalking and
Violent Crime
Lyndel Williams
Training Director
Texas Association Against Sexual Assault
Stalking and Pop Culture
“Be My Slave”
I want you to be my slave!
I got you under my spell!
You'll never live to tell
If you don't serve me well
Then you'll go straight to hell
You live for my command
You'll serve at my demand
You're kept like an animal in a cage
The victim of my unruly rage
[Chorus]
I've got you under my spell!
Be my slave, be my slave
You'll never live to tell
Be my slave, be my slave
If you don't serve me well
Be my slave, be my slave
Then you'll go straight to hell
I'll force you on your knees
You'd better aim to please
I keep you locked up and I have
the key
In bondage I'll keep you, you'll
never get free
I paid a decent price, yeahYou were on sale and you looked
kinda nice
But you've been acting up lately
You just don't know your place
I'll just fix that with a slap in the
face
“It’s not easy to describe the fear you
have when you see the stalker, or signs
of the stalker, everywhere you go, I
have given up all hopes of ever having a
safe life. For the rest of my life, I will be
looking over my shoulder, expecting to
see him there.”
“Sometimes I unlock my car and find
a rose on the seat-no note, just the
rose. Somehow he got into my car
and left it there; it’s all he needs to
do to terrorize me.”
“It’s going to take a bullet put in my
head before people understand how
serious this is.”
-Statement made by a stalking victim made about one
month before she was killed by her stalker in January
2003
The Peggy Klinke Story
Texas Penal Code
Section 42.027. Stalking
§ 42.072. STALKING. (a) A person commits an offense if the
person, on more than one occasion and pursuant to the
same scheme or course of conduct that is directed
specifically at another person, knowingly engages in
conduct, including following the other person, that: (1) the
actor knows or reasonably believes the other person will
regard as threatening: (A) bodily injury or death for the
other person; (B) bodily injury or death for a member of
the other person's family or household; or (C) that an
offense will be committed against the other person's
property;
Texas Penal Code
Chapter 33.07
ONLINE HARASSMENT. (a) A person commits an
offense if the person uses the name or persona of
another person to create a web page on or to post one
or more messages on a commercial social networking
site:
(1) without obtaining the other person's consent; and
(2) with the intent to harm, defraud, intimidate, or
threaten any person.
(b) A person commits an offense if the person sends an
electronic mail, instant message, text message, or
similar communication that references a name, domain
address, phone number, or other item of identifying
information belonging to any person:
Online Harassment
(1) without obtaining the other person's consent;
(2) with the intent to cause a recipient of the
communication to reasonably believe that the other
person authorized or transmitted the communication;
and
(3) with the intent to harm or defraud any person.
(c) An offense under Subsection (a) is a felony of the
third degree. An offense under Subsection (b) is a Class
A misdemeanor, except that the offense is a felony of
the third degree if the actor commits the offense with
the intent to solicit a response by emergency
personnel.
Changes to the Penal Code
 Code now includes dating partners
 Stalking can now be enhanced to a second degree felony
for a repeat offense, if the prior offense occurred in
another state
 SB82 clarifies different acts (e.g. leaving a note, following
the victim) can together constitute acts that are part of
the “same scheme or course of conduct.” Previously
argued they were 2 different courses of conduct
 The evidentiary change to CCP 38.46 is probably the most
meaningful change. To prove stalking, you have to prove
not only that the victim was actually in fear, but also that
a hypothetical reasonable person in the same
circumstances would be in fear
Stalking In Texas
• The two most reported stalking acts were repeated phone
calls and having things stolen
• Victims are likely to be under 35 years of age
• Asians showed the highest rate, followed by Hispanics
• Victims are likely to be single/never married
• Stalking victims are likely to be acquainted with the
offender
• Stalking is often preceded by violence. Of those who
previously knew the offender, 61.6% reported prior
violence
• Only 43% of victims reported the incidents to police
(Stalking in Texas, Crime Victims Institute)
Stalking Behavior
“Stalking behavior” is defined as one or more of
a constellation of behaviors that:
(a) are directed repeatedly toward a specific
individual (the “target”)
(b) are experienced by the target as
unwelcome and intrusive
(c) are reported to trigger fear or concern in
the target
Stalking Behavior
 2/3 of stalkers pursue their victims at least once per
week, many daily, using more than one method
 78% of stalkers use more than one means of approach
 Weapons are used to harm victims in about 20% of
cases
 Almost 1/3 of stalkers have stalked before
 Intimate partner stalkers frequently approach their
targets, and their behaviors escalate quickly
[Journal of Forensic Sciences 51, no. 1 (2006).]
Effects of Stalking
All studies indicate stalking poses a serious
mental health threat to victims:
•
•
•
•
•
•
86% reported a change in personality (Hall (1998)
83% Reported heightened anxiety (Pathe and Mullen (1997)
74% Reported chronic sleep disturbance (Pathe and Mullen (1997)
55% Reported excessive tiredness (Pathe and Mullen (1997)
48% Reported appetite disturbance (Pathe and Mullen (1997)
47% Frequent headaches (Pathe and Mullen (1997)
Risk Markers for Stalking Violence
 Strong evidence:
 Threats
 Prior intimate relationship
 Not psychotic
 Substance abuse
Risk Markers for Stalking Violence
 Moderate evidence:
 Criminal history
 Violence history
 Young age
 Low education/IQ
 Revenge motive
 Not delusional
Risk Markers for Stalking Violence
•Little/no evidence:
•Personality disorder
•Gender of victim
•Hallucinations
•Victim of child abuse
•Employment status
Threat Assessment
• Have there been:
• Prior threats of violence
• Pursuit or following
• Emotional outbursts or rage
• Mental illness
• Substance abuse
• Possession or fascination with weapons
• Violations of protective orders
Threat Assessment
 Some high risk factors:
 Sexual intimacy between the victim and the
stalker
 Offenders past history
 Symbolic violence
 Threats to kill
 Suicidal threats or thoughts
 History of stalking
Characteristics of Stalking Victims
• Gender
• 78% women
• 22% men
• 94% of the stalkers identified by female
victims and 60% of male victims
identified their stalkers as male
• Overall, 87% of the stalkers identified
were men
Characteristics of Stalking Victims
• Stalked by Race
• American Indian/Alaskan Native 17%
• Mixed race 10.6%
• White 8.2%
• African-American 8.2%
• Asian/Pacific Islander 1.8%
• Age: on average, victims were 28 years of age
when first stalked
Prevalence of Stalking
 A NIJ & CDC survey indicated that:
 8% of women (1 in 12)
 2% of men (1 in 45)
 31% of female victims of intimate partner
stalking, report that they had been sexually
assaulted by their stalker
 81% of stalking victims who were stalked by an
intimate partner had been physically
assaulted by their partner
 In 2010 6.6 million individuals age 18 and over
were stalked in one year in the United States
Reasons For Not Reporting
• Didn’t think it was serious enough 72%
• Didn’t know the incident was a crime 44.6%
• Thought police wouldn’t think it was serious
33.6% Is this a true statement?
• Thought they lacked proof 25.9%
• Feared reprisals 15.3%
• Didn’t know how to report the incident 10.8%
• Didn’t want other people to know 8.9%
What To Do If You Are Stalked
• As early as possible tell him/her the
relationship is over
• Be as firm and direct as possible
• Avoid using tones or phrases that could be
misconstrued as implying a second chance
or playing hard to get
• Avoid all contact (no phone calls, counterharassing behavior, sending letters back)
Stalking Victim’s Priorities
• Being informed about whether anyone
was arrested
• Being involved in the decision to drop
the case
• Being informed about the defendants
earliest release from incarceration
• Being heard in decisions about the
defendants release on bond
• Making a victim’s impact statement for
PSI’s or parole consideration
Dangers Stalkers Pose to Their
Victims
Both intimate partner assault and stalking are
strongly associated with lethal and near-lethal
violence against women, especially when these two
perpetrator behaviors occur together and the
perpetrator is a former intimate. Not all stalking and
threatening behaviors pose an equal threat.
Following and spying on the woman, threatening
messages on the victim’s car; and threats to harm the
children were associated with two, four, and nine
times, respectively, greater likelihood of
attempted/actual femicide.
(American Journal of Public Health 1089-97 (2003))
Stalking and Intimate Partner
Femicide
 76% of intimate partner femicide victims have
been stalked by their intimate partner.
 67% had been physically abused by their
intimate partner.
 89% of femicide victims who had been
physically assaulted had also been stalked in
the 12 months before their murder.
 79% of abused femicide victims reported being
stalked during the same period that they were
abused.
[McFarlane et al., (Stalking and Intimate Partner Femicide,” Homicide Studies 3, no. 4 (1999).]
Reports to Law Enforcement
• 54% of femicide victims reported
stalking to police before they were
killed by their stalker
• 46% of attempted femicide victims
reported stalking to the police before
the attempted murder
Tools of the Stalker
•
•
•
•
Contacting family, friends, employer
Disabling vehicles
Taking mail from the mailbox
Trying to obtain private information (using
police)
• False allegations
• Photography
• Trespassing
Tools of the Stalker
 Gifts and/or cryptic notes
 Vandalism
 Surveillance
 Constant communication
 Harassment tactics:




Disruption of services
Harassment of family members
Threats of violence
Threatening and/or harming family pets
Tools of the Stalker
• Animal Cruelty:
A survey of 50 of the largest shelters for
battered women in 49 states and the
District of Columbia found that 84.5% of
women and 63% of children entering a
shelter reported incidences of pet abuse in
the family
Survey of Sheltered Women
vs. the Community
Sheltered
Community
Pet threatened
70%
16.7%
Pet harmed or killed
54%
3.5%
Child witnessed pet abuse
61.5%
3.3%
Stalking Technology
Tracking via GPS
• As of 2005 the vast majority of cell phones in
the U.S. have GPS technology per FCC
regulations.
• Besides the victims phone the offender may buy
another phone and hide it in the victims car to
track her.
• If the offender and victim have joint custody of
a child the offender may purchase a phone and
either give it to the child or hide it in the child’s
possessions.
Services description
 Online tracking – real time object tracking.
 Travel history – get tracking data for the selected time
interval.
 SMS notification – geo-fence entering/leaving/crossing
notifications, which you will receive on your cell phone.
 Email notification – geo-fence control zone
entering/leaving/crossing notifications, which will be sent
your Email.
How to Start
Account Overview
Spy to Mobile
Account Settings, Reports
and Geo-fencing
Track Settings
Detecting and Protecting
• Signs that your phone has been
invaded:
• You seem to have trouble shutting it off, or it
stays lit up after you’ve powered down
• The phone sometimes lights up when you
aren’t making or receiving a call, or using
any other function
• You regularly hear odd background noises or
clicks when you're on the phone
• Set message life spans
• Set time limits for your messages to be read before they expire
and are deleted. Can be set to delete text after it is read.
• Recall messages
• Regret sending that text? Quickly remove it from the
recipient’s device before—or even after—he or she opens it.
• Delivered / Read Status
• Don’t waste time wondering if they got your message.
Automatically know when your message has been delivered to
the phone you’re sending and when the message has been read.
• Encrypt texts in transit and at rest
The Boss, the worlds first TORcertified Android Smart Phone
The Boss phone’s price starts at $275 going all the way up to $355. “The Boss
phone will have rooted Tor encryption for your privacy,” the Boss phones should
be shipped at some point in October 2015.
Tracking Key
 Potential users of the Tracking Key:
 Spouses: To validate or dismiss suspicions of infidelity
or undesirable, habitual behaviors.
 Records:
 Routes traveled
 Arrival address
 Duration of stops
 Records vehicle location with 2.5 meters
Tiny 3" tracker fits almost anywhere
Web-based system lets you view your tracker's realtime location online
Instant location alerts sent via text message or e-mail
5 days of rechargeable battery power
Web-based system lets you view your tracker's realtime location online
iShot Hidden Video Camera with
Recording (DVR)
Smoke Detector Day/Night Hidden
Camera
Uses:
As A Nanny Camera
To Monitor Your Home Or Office
For Private Investigators
Catch A Cheating Spouse
Keep An Eye On Your Kids When You're Not
Around
Caller ID Spoofing
SpoofCard Features
•
Caller ID Spoofing: SpoofCard's caller ID spoofing technology
allows you to set any number to display on the caller ID of the
person you're calling.
•
Call Recording: SpoofCard features free call recording so you can
record all your phone conversations and download them from the
SpoofCard web site or listen to them over the phone at any time. This
feature is great for everyone from prank callers to salesmen!
•
Voice Changing: SpoofCard also features a free voice changer
option that allows you to change your voice to sound like a man or
a woman on the phone. All you have to do is speak in your normal
voice and the called party will hear you in the changed voice with no
delay!
Spoof Card
“Swatting” Police
KEYSWEEPER
 KeySweeper is a stealthy Arduino-based device,
camouflaged as a functioning USB wall charger, that
wirelessly and passively sniffs, decrypts, logs and
reports back all keystrokes from any Microsoft
wireless keyboard in the vicinity.
 All keystrokes are logged online and locally. SMS
alerts are sent upon trigger words, usernames or
URLs, exposing passwords. If unplugged,
KeySweeper continues to operate using its internal
battery and auto-recharges upon repowering. A web
based tool allows live keystroke monitoring.
KEYSWEEPER
For complete instructions on how to build a KeySweeper: http://samy.pl/keysweeper/
Stalking and Social Media
 Social networking sites can provide information:








Your name or nickname
Martial status and whether you have children
Sexual orientation
Hometown
Schools attended
Religion
Education
Interests: music, movies, television, books and hero's
 Once entered these answers go public, stalkers can
then gain access to site members
Stalking and Social Media
 There are search tools that can simultaneously pull
personal information about the same person from
different sites:
 Stalkerati
 Profilesnoop
 Link view
 These sites allow visitors to trace a user’s Internet
Protocol (IP) address and even physical addresses
using Goggle maps.
 Although these sites have been recently shut down it
is safe to assume others have popped up.
Remote Administration Software
RATs
 A remote administration tool (a RAT) is a piece of
software that allows a remote "operator" to control a
system as if he has physical access to that system.
While desktop sharing and remote administration
have many legal uses, "RAT" software is usually
associated with criminal or malicious activity.
Malicious RAT software is typically installed without
the victim's knowledge, often as payload of a Trojan
horse, and will try to hide its operation from the
victim and from security software.
RATs
 RAT Trojans can generally do the following:
 Log keystrokes, keystroke capture software
 Change the desktop wallpapers
 Downloads, uploads, deletes, and rename files
 Destroys hardware by overclocking
 Drop viruses and worms
 Record and control victim's screen remotely
 Record video with a connected webcam
 Record sound with a connected microphone
 Control mouse or keyboard
 Steal passwords, credit card numbers
Stalking and Social Media
Data Brokers
Data Brokers
 How is the info mined:
 Victim rents an apartment
 Get’s utilities turned on
 New cell phone number used to obtain
credit
 Changes address on drivers license
 Have you ever Googled yourself
 Have you ever paid to see what information is
available on you
Data Brokers
 Where does the information come from:
 Experian sells a list of names of expectant families
and newborns
 Datalogix has lists of people classified as "allergy
sufferers" and "dieters.” Acxiom sells data on
whether an individual has an "online search
propensity" for a certain "ailment or prescription."
 Walt Disney also responded and described sharing
even more information: not just a person's name
and address and what they purchased, but their
age, occupation, and the number, age and gender
of their children.
Search Engines and Data Brokers






Some of the information available from these data
broker sites may include:
Full name (and aliases)
Physical addresses (current and past)
Marital status
Telephone number (and past numbers)
Date of birth
Other personal information including mortgage info,
employment status, and possible relatives
Data Brokers
 Acxiom, recently profiled by the New York
Times, says it has information on 500 million
people worldwide, including "nearly every
U.S. consumer.“
 After the 9/11 attacks, CNN reported, Acxiom
was able to locate 11 of the 19 hijackers in its
database.
Types of Stalkers
Simple Obsessional
• Category represents 70-80% of all stalking
cases
• Virtually all domestic violence cases involving
stalking fall under this category
• Characteristics of this type of stalker:
•
•
•
•
Socially maladjusted and inept
Emotionally immature
Often subject to feelings of powerlessness
Unable to succeed in relationships by socially-acceptable
means
• Jealous bordering on paranoid
• Extremely insecure about themselves, suffers from low self
esteem
Simple Obsessional
•
•
•
•
Self-esteem is often closely tied to their relationship
Self-esteem is bolstered by domination of partner
Their greatest fear is the loss of their partner
When deprived of their partner they feel their life is
without worth
-Most dangerous type of stalking case!
Will literally stop at nothing to regain their “lost
possession”
-Most likely category to result in a murder: “If I can’t
have you, nobody will.”
(Zona and colleagues' (1993))
Types of Stalkers
 Erotomania:
 Stalker believes he/she is loved by the victim
(delusional)- not trying to establish a relationship
 Object of affection is usually of a higher status and
can be a complete stranger
 Efforts to contact the victim are common
 Males (forensic samples) come into contact with
the law during misguided pursuits to “rescue” the
victim from imagined danger. Females are seen in
clinical samples.
(Zona and colleagues' (1993))
Love Obsessional





Represents about 20-25% of all stalking cases
Casual acquaintances, co-worker, or a complete stranger
Includes celebrity stalking (David Letterman, Madonna, etc)
Most suffer from a mental disorder (Schizophrenia/Paranoia)
Most are unable to develop normal relationships so they
retreat to fantasy relationships
 They attempt to live out their fantasies and expect victim’s
to play their roles
 May attempt to force victim to comply with use of threat
and intimidation
Love Obsessional
 If they can’t have a positive relationship, they
will settle for a negative one
 May murder victim in a twisted attempt to link
themselves to the victim forever
(Rebecca Schaeffer-Robert Bardo)
 Factors which enhance risk:
 Excessive number of letters
 Stated intention/evidence of directed travel to
encounter the victim
 Duration of one year or more
False Victimization Syndrome
 This occurs when an individual attempts to convince
others that they are being stalked to re-establish a
failing relationship and/or gain attention.
(Zona, Palarea, and Lane, 1998)
 Individuals who exhibit these characteristics may also
fit the criteria for histrionic personality disorder (DSMIV, 1994): demanding to be the center of attention,
shallow expression of emotions which shift rapidly,
and speaks in a manner that is overly impressionistic
and lacking in detail.
 Rare occurrence
Nonpsychotic vs. Psychotic Stalkers
Nonpsychotic:
 More prone to surveillance
 Significantly more likely to threaten
and physically assault their victim
 Violent assault were perpetrated
against prior sexual partners
 More likely to possess a weapon at the
time of the stalking
Nonpsychotic vs. Psychotic Stalkers
 Psychotic Stalkers
 Less likely to assault his victim
 Less likely to possess a weapon at the time of
the stalking
 It was surmised that Nonpsychotic stalkers
show a far greater propensity for
intimidation and violence than the
psychotic stalker and are more calculating
and resourceful in their use of violence
Status Quo
Any change in the status quo raises
the threat level!
 High risk times:
 When protective order is served
 Following arrest
 Upon any contact with law enforcement
 Stalker losses his job
 Disconnect phone
Orders of Protection
In…situations and in circumstances
where normal and rational individuals
want to avoid further legal problems
protective orders provide a valuable
sanction for the victim’s welfare and
peace of mind…{but, a} protective order
is merely a piece of paper that carries
only as much force and effect as the
offender attaches to it.
(Wallace & Kelly, 1995, p.108)
Orders of Protection
• Keep you protective order with you at
all times (copies at work, with a friend, in
your vehicle)
• Inform family, friends and neighbors that
you have a protective order in effect
• Call the police immediately if the
protective order is violated
• Plan alternate ways to keep yourself safe
Suggestions for Increasing Safety
 Documentation: keep record of all stalking/harassing
behavior
 Cut ties with prior associates, friends, and family
involved, associated or known by the offender
 Devise a safety plan
 Establish escape routes
 Choose pre-determined places to meet
 Pack a survival kit
 Extra clothes, toiletries, prescriptions, cash, food, etc.
 Protective or custody orders
 Credit cards or checkbook
 Disposable cell phones
Suggestions for Increasing Safety
 Don’t hesitate to ask for help (in public)
 Inform people: family, employer, neighbors and coworkers
 Install dead bolts, lock all windows and place a
dowel in sliding glass doors
 Utilize a private mail box service (not with USPS)
 Install outdoor lighting
 Trim hedges
 Locks on fuse boxes and fence gates
 Firearms?
 Dogs
Suggestions for Increasing Safety
 Vehicle safety:
 Keep your gas tank at least half-full and
have a locking gas cap
 Keep your car locked at all times
 Be cautious of valet parking
 Visibly check car prior to entering
 Vary your routes
 If followed drive to a Police or Fire Station.
Sound the horn to attract attention
Lyndel Williams
Training Director
Texas Association Against Sexual Assault
6200 La Calma, Suite 110
Austin, Texas 78752
williams@taasa.org
Download