Digital Stalking National Centre for Cyberstalking Research 2013 Cyberstalking Cyberstalking is generally considered to be harassment that originates online, however it is also recognised that other forms of pre-existing stalking can transfer into online environments Occurrence of Cyberstalking Cyberstalking can be said to occur when there has been persistent and frequent unwanted contact from another individual/s The behaviour in question has caused fear and distress. Types of attack • • • • • • • • • • • Identity theft – controlling victim’s credentials Posting false profiles Posing as the victim and attacking others Discrediting in online communities Discrediting victim in workplace Direct threats through email/instant messaging Constructing websites targeting the victim Transferring attack to victim’s relatives Use of the victim’s image Provoking others to attack the victim Following the victim in cyberspace Prevalence of Problem 2.1 million across the UK 1.2 million females 0.9 million males Number of male victims is growing How Aggressors Obtain Information? Digital Footprints Personal information Financial information Internet usage Details of friends and family Daily activities Work Location and much more Social Networking Sites Facebook Twitter Geo-Location “Foursquare” app Discover where your friends are “Girls Around Me” app- banned by Foursquare Merging Facebook and Foursquare information with Google Maps and real-time GPS location data Tells where nearby women are; allows to see their full name, photos, and send them messages Facebook Check-in where you are Add people you are with Add date Risks Physical danger Identity theft Obtaining contact information Accounts takeover Post Traumatic Stress Disorder (PTSD) Observation and Understanding The ECHO Study - Electronic Communication Harassment Observation Commissioned by the Network for Surviving Stalking Pilot study commenced in September 2010 Analysis of the survey to be published in May 2011 New extended study launched and will run for one year Observation and Understanding The ECHO Study - Electronic Communication Harassment Observation The results indicated that 22.8% of cases (25.9% for males, 21.4% females) report that their harasser was a stranger 27.9% (21.2% males, 31.3% females) say the harasser was someone they dated/were married to Transmission to other Environments The more fixated an individual is, the more likely they are to move from one online environment to another until the target’s online presence is fully intruded upon Transmission to other Environments 73.55% of cases reported 2 or more mediums of harassment and 57.7% of cases reported that they had been harassed through more than 2 mediums (Phone calls, texts, e-mail, social networking sites, instant messages and physical environment) The Psychological Impact Post Traumatic Stress Disorder 32.7% of respondents who reported experiencing harassment indicate symptoms of PTSD according to the clinical questionnaire. Respondents indicating PTSD were more likely to report more changes to their lives due to the harassment 50 % of people experiencing harassment electronically and physically (combined stalking) experience PTSD Types of Traumas Cyberstalking victims 32.7% Combined stalking victims 50% Air crash survivors 22 - 40% Sexual assault 22-50% RTA survivors 11% Aid workers 30-50% Combat veterans 22-50% Bomb survivors 50% Effectiveness of services and other interventions 53.4%(47.7% males, 54.9% females) reported their problem to some authority 10.8% (10.2% for Males, 11.3% for females) of the cases reported ended due to legal intervention (by police or Solicitors) 37.2% of harassed people (27.3% of Males, 40.7% of Females) received some form of help to cope with the harassment. How to Protect Yourself? Assess what online information exists about you Change your e-mail and passwords for key online accounts and keep them safe Review all the privacy and security settings Avoid public forums Limit what you share Educate friends, family and work colleagues Gather evidence Report to police Seek help and support for the charities Cyberstalking Forensics The majority of evidence is gathered from the victims immediate physical vicinity Cyberstalking Monitor applications can record and transmit interactions between offender & victim simultaneously to law enforcement officers Event log files from ISPs, Telecoms, employer network systems, etc., can correlate offender communications Existing technologies can assist with attribution & prosecution of offenders such as CCTV, GPS, etc. Bringing Cyberstalking ‘Out of the Shadows’ The problem is multidisciplinary and requires a multidisciplinary approach More research is required to understand the problem Initial indications are that the behaviours and composition of the online stalking population differ significantly from traditional stalking – opening diverse lines of enquiry for research and the development of effective interventions Legal Change The Internet is a conduit through which an increasing amount of interaction with society is conducted. The impact on an individual of such communications is significantly greater than it was 10 years ago. Facebook, which now has over 600 million users (10% of the world's population), was only launched in 2004! Legal Change In recent years we have seen changes to legislation that recognise the impact of technology on society and the ease with which criminal offences can be committed. Most notably, the Police and Justice Act of 2006 amended the Computer Misuse Act of 1990. One change was the length of maximum jail sentence. Legal Change Malicious Communications Act of 1988 amended by the Criminal Justice and Police Act 2001 ensure electronic communications were covered. However, there should be reconsideration of whether the punishment currently legislated is sufficient. Legal Change Protection From Harassment Act 1997 - does not explicitly state electronic communications. A clear statement of electronic communications would assist investigating police officers in seizing evidence in cases of Cyberstalking. Current lack of power to seize evidence, and this only exacerbates the problem of attribution. Law Change Amendments have been made to the Protection of Freedoms Bill making stalking a specific offence in England and Wales. One of the amendments includes the ability for Police to have access to the use of the internet, email or any other form of electronic communication associated with stalking. The commencement order for the new law was 25th November 2012