Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Statewide Comprehensive IPV Training DAY 2 (August)

Statewide Comprehensive IPV Training DAY 2 (August)

This Statewide Comprehensive Training provides professionals with in-depth information about working in the field of domestic violence. The training emphasizes victim safety, victim empowerment, abuser accountability, and a comprehensive system’s response to intimate partner violence. MNADV emphasizes partnering with local domestic violence programs and utilizes local experts to present throughout the training. MNADV developed this training for professionals from a variety of different fields who encounter domestic violence in their work.

lucane lafortune

August 09, 2021
Tweet

More Decks by lucane lafortune

Other Decks in Education

Transcript

  1. MNADV’s 5-Day Comprehensive Intimate Partner Violence Training Day 2: Oppression,

    Immigration, AIPs, Predominate Aggressor, Lethality, Stalking
  2. Meet the Team Angel Campbell Training & TA Specialist Darrell

    Holly LAP Administrator Jenn Pollitt Hill Interim Executive Director K-Tony Korol Evans Statewide Trainer Lucane LaFortune Deputy Director Chimere Jackson Communications Specialist Mariesa Robinson Prevention Coordinator Melanie Shapiro Policy Director Renee Wells Operations Manager Lina Jaramillo LAP Project Lead
  3. Housekeeping • Certificates and CEUs • Cancellations • Attendance •

    Accessing Materials • All attendees will be MUTED except during breakout sessions. • Use the chat box to ask questions or engage in dialogue • Evaluations
  4. Review/Debrief of Day 1 Oppression BREAK Oppression Continued BREAK Immigration

    LUNCH Abuse Intervention Programs Predominate Aggressor BREAK Lethality BREAK Stalking Self Care/Evaulations
  5. Our Workshop Agreements • Active listening • Be open •

    Be present: silence that internal chatter • Push through growing edge • Respectfully challenge each other • Continue to have these conversations • Remember why we’re all here
  6. Day 2 Review and Debrief • What were your overall

    thoughts on the day? • What did you learn? • What surprised you? • What do you want to learn more about? • How will you do your work differently?
  7. Power & Control Wheels for Marginalized Groups • Add Mentimeter

    • Name some of the ways power and control shows up differently for marginalized groups. What were some of the different tactics used by the abusers?
  8. Objectives • Examine how systemic oppression complicates abuse for survivors,

    impacts our work culture and influences the anti-violence movement • Explore how recognizing our own privilege can help us better serve clients and grow as individuals • Discuss the importance of an intersectional approach when working with marginalized communities and domestic violence survivors • Examine the ways in which an anti-oppression framework can be incorporated into your work
  9. What is Oppression? The systematic subjugation of one social group

    by a more powerful social group for the social, economic, and political benefit of the more powerful social group. Rita Hardiman and Bailey Jackson state that oppression exists when the following 4 conditions are found:
  10. Rita Hardiman and Bailey Jackson state that oppression exists when

    the following 4 conditions are found: 1 The oppressor group has the power to define reality for themselves and others 2 the target groups take in and internalize the negative messages about them and end up cooperating with the oppressors (thinking and acting like them), 3 genocide, harassment, and discrimination are systematic and institutionalized, so that individuals are not necessary to keep it going, and 4 members of both the oppressor and target groups are socialized to play their roles as normal and correct.
  11. Types of Oppressions • “Isms” is a shorthand way of

    categorizing the systemic mistreatment of people according to one of their many identities, biological or cultural. • Ablism • Ageism • Classism • Heterosexism • Racism • Sexism
  12. How Discrimination shows up in DV Programs Breakout Group Questions:

    • How might you use your role in your domestic violence program to best deal with each of the following situations? • If the situation involves clear discrimination, what does the law require? • What does fairness require? • What are some of the challenges in implementing either? • How can we create a welcoming environment and a better understanding of the role of oppression & discrimination in our domestic abuse programs?
  13. How do You Work from an Anti-Oppression Lens or Framework?

    • Being conscious and active in the process of learning and recognizing that systemic oppression and discrimination is at play. • Actively working to acknowledge and shift power towards inclusiveness, accessibility, equity and social justice. • Ensuring that anti-oppression is embedded in everything that you do by examining attitudes and actions as well as policies and procedures. • Creating a space where people are safe, but can also be challenged.
  14. Ethical Dilemmas Breakout Group Questions: • What are some of

    the ethical dilemmas or organizational challenges that you see in the scenarios? • What are some of the barriers or challenges in addressing the issues you identified? How can we break through some of those barriers? • Describe some of the oppressions you identify. • Describe some similarities or differences in these scenarios with what happens (or could happen) in your own organization. • It is difficult, and some would argue unethical, for white people to undertake this discussion before dealing with white privilege. How do you feel about this? Can an organization support both discussions?
  15. What is Privilege? • Unearned social power accorded by the

    formal and informal institutions of society to ALL members of a dominant group (e.g. white privilege, male privilege, etc.). • Privilege is usually invisible to those who have it because we’re taught not to see it, but nevertheless it puts them at an advantage over those who do not have it. • All people are both privileged and non-privileged in certain aspects of their life. And privilege exists in all communities.
  16. Understanding Intersectionality • What does intersectionality mean? • What does

    it mean to have intersectional identities? • What privilege and power exists within those intersections? • Why is important to recognize these multiple layers of identity?
  17. Anger Management • Anger is primary problem. • Focus is

    managing the emotion. • Abuse is seen as loss of control. • Intervention is short term. • Generally, no identified victim. • No addressing of empathy for the victim. • Non-confrontational. • Little or no attention to accountability. • Viewed as personal mental health issue. • Abuse and control is primary problem. • Focus on changing beliefs & behavior. • Abuse is seen as taking control. • Intervention is long term. • There are identified victim(s). • Empathy building is common. • Confrontational. • Accountability is paramount. • Viewed a social, societal issue. Abuse Intervention Differences between Anger Management and AIP
  18. Maryland AIP Certification • All Abuse Intervention Programs (AIPs) in

    Maryland must be certified by the Governor’s Office of Crime Control and Prevention (GOCCP) • Each May, the Family Violence Council (FVC) (under GOCCP) accepts applications for re-certification of current programs and for new programs http://goccp.maryland.gov/victims/family- violence-council/abuse-intervention/
  19. AIP Guidelines • Purposes: • Ensure safety and well-being of

    all programs, abusers, and victims; • Strengthen programs; • Quality assurance; • Ensure an accountability response; • Best practices are recommendations, not requirements. Keep in mind: Even with the guidelines, of the 45 states with standards or guidelines for abuse intervention work, Maryland still has the least restrictive standards. Comprehensive list of other state standards: www.biscmi.org
  20. Minimum Qualifications of AIPs • Program response to survivors and

    courts • Focus on accountability and stopping the abuse • Connection with local comprehensive program
  21. Guidelines: Definition of Abusive Behavior In the Maryland AIP guidelines,

    abusive behavior is defined as: Any criminal offense where the offender and the victim are, or have been, married; in an intimate relationship, including dating and same sex relationships; or have a child together. • Pattern of coercive control • “Physical or emotional harm or intimidating to control the victim’s thoughts, feelings, or actions.” • Abusive behavior results in a culture of fear
  22. Guidelines: Types of Abuse • Physical • Verbal and emotional

    • Economic • Sexual abuse • Social isolation • Stalking • Forced Imprisonment • Failure to comply with immigration requirements
  23. Guidelines: Responsibility of Abusive Behavior • Abuser “bears sole responsibility”

    for their actions. • Substance use nor “emotional problems” will be tolerated as excuses
  24. Operating Standards Must comply with victim confidentiality laws Intake process:

    • Court or self-referral • AIP alerts the courts if program is not suitable • Take history of violence • Confidentiality waiver for abusive partner • Contract signed by AIP and abusive partner • Duration of the program • Fees • No new violence of any form • Refrain from drugs and alcohol • If cannot do the above, considered noncompliance of the program
  25. Program Format • Intimate partner violence only • Same-gender groups

    • Timeline is at least 20 weeks (32 hours) for group and 12 weeks (16 hours) for individual • AIP notifies court monitors and victim of completion or discharge • No guarantee of safety for victim, even if completed • Discharge occurs if a new violent incident occurs
  26. Contact with Victim AIP Facilitators contact victim to: • Offer

    resources • Take history of violence • Provide info on AIPs • Inform them of abusive partner’s attendance, if desired AIP screens for abuser’s lethality and warns victim if needed and/or contacts law enforcement if there is a direct threat
  27. Best Practice Recommendations • Follow-up interviews with victims at 3,

    6, 9, 12 months • AIP contacts all current partners • Separation of services to victims and services to abusive partners ▪ Waiting rooms ▪ Limit contact on-site ▪ Couples counseling
  28. Best Practice Recommendations • Include related topics (parenting, substance use)

    • AIP maintains relationship with abusive partner’s probation/parole agent • 10-12 people per group • Groups preferred over individual counseling • Male and female co-facilitators
  29. Community Collaboration • Victim services • Mental health • Substance

    abuse • Domestic Violence Coordinating Council (county-wide) • Parole and probation Other organizations to connect with: • Maryland Abuse Intervention Collaborative (MAIC) • The Governor’s Family Violence Council (FVC) • The Maryland Network Against Domestic Violence (MNADV) • Community resources • Employment assistance • Parenting classes • Housing assistance, support groups
  30. Maryland Abuser Intervention Collaborative (MAIC) Purpose and Mission: to ensure

    that there are quality and effective abuse intervention programs throughout Maryland. Our mission is to improve victim safety, hold abusers accountable and eliminate intimate partner violence and abuse. Who We Are: a statewide network of experienced professionals committed to eradicating intimate partner violence. Current participation includes representation from the Governor’s Office of Crime Control & Prevention (GOCCP), the Maryland Network Against Domestic Violence (MNADV), Division of Parole and Probation (DPP), Department of Social Services (DSS), substance abuse programs, certified abuse intervention programs and abuse intervention programs seeking certification. Scope of Work: The Collaborative discusses coordinated community responses, promotes evidence-based best practices, conducts research, offers peer support and advocates for quality abuse intervention programs by educating, providing technical assistance to and collaborating with service providers and criminal justice professionals. To join MAIC’s listserv or to get more information about becoming a member of MAIC, please send an email to [email protected]. For a list of current certified abuse intervention programs and information on becoming a certified program, please visit the GOCCP website at http://goccp.maryland.gov/victims/family-violence-council/abuse-intervention/ or the MNADV website at https://mnadv.org/get-help/intervention/.
  31. Resources MAIC Co-Chairs: [email protected] • LaTisha Carter, My Covenant Place

    • Angelique Green-Manning, House of Ruth Maryland More information on AIPs in Maryland: http://goccp.maryland.gov/victims/family-violence-council/abuse- intervention/ • Operational guidelines • Application • List of certified programs • Complaint report form
  32. • S/he hit me too! • S/he attacked me first!

    • I was just trying to get him/her off of me! Common themes:
  33. Domestic violence is a pattern of behavior in which one

    person attempts to control an intimate partner through threats or actual use of physical violence, sexual assault, verbal and psychological abuse and/or economic coercion. Domestic Violence
  34. ▪ Dual arrest rates are higher for cases of simple

    assault that involve IP ▪ Mandatory arrest laws increase the likelihood that police will arrest both parties ▪ Dual arrest was more common in intimate partner cases if the primary offender was a female age 21 or older ▪ Dual arrest rates for same-sex couples were 10 times the rate observed in cases with male victims and female offenders and 30 times the rate in cases with female victims and male offenders Dual Arrests:
  35. ▪ Both parties are arrested. ▪ If both parties have

    injuries, often one party has acted in self-defense. ▪ In inappropriate dual arrests: ▪ Lessens ability to prosecute – often causing dismissal. ▪ Victims are further victimized. ▪ Decreases chances the victim will seek further help. ▪ Possible eventual homicide by offender. ▪ Increases liability. ▪ Abuser wins! 53 Dual Arrest:
  36. ▪Md. Criminal Procedure, 2-204: ▪If a police officer has probable

    cause to believe a mutual battery occurred and arrest is necessary ▪The police officer shall consider whether one of the persons acted in self-defense when determining whether to arrest the person whom the police officer believes to be the primary aggressor. Maryland's Primary Aggressor
  37. ▪ Requires all of the following three factors: 1. The

    person actually believe that she/he was in immediate danger of bodily harm 2. Their belief was reasonable 3. They used no more force than what was reasonably necessary to defend themselves in light of the threatened or actual harm Maryland Self-Defense
  38. ▪ Both men and woman can be victims ▪ Abuse

    may appear mutual But abusers routinely: ▪ Accuse their partner of being equally abusive ▪ Claim to be the victim ▪ Use a pattern of coercive control BEST PRACTICE: When it appears a couple is mutually abusive, KEEP ASSESSING and asking questions about the relationship to determine the pattern of power and control!!! Determining Primary Aggressor
  39. ▪ Primary/Predominant aggressor is NOT who struck who first. ▪

    Rather, the predominant aggressor is the party who is the most significant aggressor: the party who poses the most serious threat and who has the greatest ability and inclination to inflict physical injury. Primary Aggressor
  40. ▪ They’re ready for you; ▪ Are you ready for

    them? Intimate Partner Criminals
  41. • Abuser is prepared • He said, she said –

    conflicting stories • Conflicting injuries • Conflicting demeanor Difficulties:
  42. ▪ 911* ▪ Witness Accounts ▪ Officer’s observations ▪ Physical

    evidence ▪ Prior history ▪ Criminal history of prior abuse? ▪ Prior history of protective orders? ▪ Prior calls for service? ▪ Demeanor and body language ▪ Physical size of the parties ▪ Offensive/Defensive Wounds Gathering Context:
  43. ▪ Who is demonstrating power and control? ▪ Following from

    room to room ▪ Does all the talking ▪ Keeps interrupting ▪ Threats ▪ Minimizing, denying and blaming Gathering Context:
  44. Victims Often: ▪ Fear their partner ▪ Fear retribution if

    they leave ▪ May attempt to explain their partner’s behavior ▪ May analyze their contribution to the violence ▪ Want to change the relationship ▪ Can see the relationship from their partner’s perspective ▪ Don’t exhibit genuine fear of partner ▪ Don’t fear retribution if they leave ▪ Criticize and blame their partner ▪ Keep the focus on their partner’s behavior ▪ Want to prove their point and complain about their partner ▪ Are unable or unwilling to see the relationship from their partner’s perspective Who’s The Victim? Abusers Often:
  45. • Who is fearful of whom? • Who poses the

    most danger to the other? • Who is seeking to stop the violence? • Who has the motive to lie or retaliate? • Is there corroboration? • Whose story makes the most sense? Questions to ask:
  46. Lethality Assessment Program (LAP) • Lethality Assessment Program: Maryland Model

    (LAP) • Identifying victims at the greatest risk of being killed, and • Encouraging them to go into domestic violence services
  47. Risk & Lethality • The most dangerous abusive partners are

    those who: • Engage in actual pursuit of the victim • Possess or are interested in weapons • Commit other crimes such as vandalism or arson • Are prone to emotional outbursts and rage • Have a history of violating protection orders, substance abuse, mental illness and/or violence, especially toward the victim • Have made threats of suicide or murder-suicide • The most dangerous times for a victim are when: • The victim has separated from the abusive partner • The abusive partner has been arrested or served with a protection order • The abusive partner has a major negative life event, such as the loss of a job or being evicted • The behaviors increase in frequency or escalate in severity
  48. Strangulation + Domestic Violence • Strangulation • Surviving victims of

    strangulation are 750% more likely to become a victim of a homicide1 • Injuries • May appear later • May not show • Learn signs and symptoms • Strangulation vs. Choking • Choking- object blocking the airway. For example, a piece of food. • Strangulation - when someone grabs another person’s neck/throat, and cuts of air and blood flow. . 1 Glass, et al. Non-fatal strangulation is an important risk factor for homicide of women (2008).
  49. Rape + Domestic Violence • Homicide • Woman forced to

    have sex when not wanted was the 5th most predictive item on risk assessment table.5 • A physically-abused woman also experiencing forced sex was more than 7x more likely than other abused women to be killed. 5 • Suicide • Those who experienced sexual assault were 5.3 times more likely to report threatening or attempting suicide compared with women who experienced physical abuse only.7 5 Campbell, et al., 2003 6 Adams 2007 7 McFarlane et al 2005 6
  50. Stalking + Domestic Violence Intimate Partner Stalkers: • More separation

    attempts than victims of intimate partner violence alone1 • More likely to assault third parties than non-intimate stalkers2 • More likely to physically approach victim3 • More insulting, interfering and threatening3 • More likely to use weapons3 • Behaviors more likely to escalate quickly3 • More likely to re-offend3 1 Logan et al, Stalking victimization on the context of intimate partner violence (2007) 2 Sheridan and Davies Criminal Behavior and Mental Health, (2001) 3 The RECON Typology of Stalking, Mohandie et al (2006) = Increased risk for victims
  51. Stalking + Domestic Violence • Stalking by an intimate partner

    without physical violence can still be life-threatening. • A partner who is overly jealous AND/OR controls daily activities are evidence-based factors of lethality. • Greater likelihood of attempted/actual murder: • 2x: Following and spying: • 4x: Threatening messages on car • 9x: Threats to harm children Jackie Campbell. 2003.“Risk Factors for Femicide in Abusive Relationships: Results From a Multisite Case Control Study”
  52. Stalking Turned Lethal • Shana Grice, 19 - ex-boyfriend was

    stalking her • Reported the stalking to police 5 times in 6 months: • Following • Installing GPS on her car • Deflating her tires • Sending unwanted flowers • Threatening text messages • Breaking into her house to watch her sleep • Was fined for wasting police time and making a false report. • “He stalked her. That obsession with her translated into killing her. He would not allow anyone else to be with her.“
  53. Physical Abuse + Stalking • Lethality Risk: •76% of femicide

    by intimate partner victims had AT LEAST 1 episode of stalking within year prior to murder •85% of attempted femicide by intimate partner had AT LEAST 1 episode of stalking within year prior to attempted murder McFarlane et al. Stalking and Intimate Partner Femicide, (1999) Physical Abuse Stalking Greater indicator of potential lethality than either behavior alone
  54. Violence/Homicide In 1/3 of homicides related to DV, the homicide

    itself was the first act of physical violence. Jackie Campbell. 2003.“Risk Factors for Femicide in Abusive Relationships: Results From a Multisite Case Control Study”
  55. Escalation of Threats 3/1/21 3/6/21 3/10/21 3/12/21 3/13/21 3/14/21 9

    text messages in 1 night Threatening call Called victim’s workplace repeatedly Sent picture of dead roses to victim on Snapchat Parked across street all night Slashed tires
  56. Escalation of Threats 9 text messages in 1 night Threatening

    call Called victim’s workplace repeatedly Sent picture of dead roses to victim on Snapchat Parked across street all night Slashed tires
  57. “Just get a gun!” • Guns increase the probability of

    death in incidents of domestic violence.1 • Firearms were used to kill more than 2/3 of spouse and ex-spouse homicide victims from 1990-2005. 2 • DV assaults involving a firearm are 12x more likely to result in death than those involving other weapons or bodily force. 3 • Abused women are five times more likely to be killed by their abusive partner if the abusive partner has access to a firearm. 4 • Almost 37% of DV victims in one study reported having been threatened or harmed with a firearm. 5 • Laws that prohibit the purchase of a firearm by a person subject to a domestic violence restraining order are associated with a reduction in the number of intimate partner homicides. 6
  58. “Just get a gun!” A Montgomery, Alabama man arrested this

    weekend faces two domestic violence charges after allegedly breaking into his ex-girlfriend's home, beating her and stealing a firearm she tried to protect herself with. … The victim ran to a bedroom, attempting to get a handgun for protection, but court records state Ramos-Cornado was able to gain control of the weapon and turn it on the victim. Ramos-Cornado then allegedly "pistol-whipped" and strangled the victim until she lost consciousness. When she awoke, her gun and multiple credit cards were missing. Police arrested Ramos-Cornado this Saturday, and he was jailed on bonds totaling $60,000. He was slated to appear in court on Monday morning.
  59. Stalking A pattern of behavior directed at a specific person

    that would cause a reasonable person to feel fear. Stalking Resource Center
  60. What is Stalking? • In Maryland, stalking is a crime.

    • It is legally defined as “a malicious course of conduct that includes approaching or pursuing another where the person intends to place or knows or reasonably should have known the conduct would place another in reasonable fear of suffering serious bodily injury, assault, rap or sexual offense, false imprisonment, or death, or that a third person likely will suffer any of the acts listed.” Criminal Law §3-802
  61. • Something may be frightening for the victim but not

    to you • Stalking behaviors often have specific meaning that is only understood between abuser and victim • Stalking criminalizes otherwise non-criminal behavior Context Stalking Resource Center
  62. Stalking & Lethality • 54% of femicide victims reported stalking

    to police before they were killed by their stalkers. • 76% of intimate partner femicide victims have been stalked by their intimate partner. • 89% of femicide victims who had been physically assaulted had also been stalked in the 12 months before their murder. McFarlane & Campbell, et al., 1999. Femicide Victims Stalked by Partner Stalked by Partner Not Stalked by Partner 76% 24%
  63. • Behaviors occur over an extended period of time. •

    Watershed period (Miller): • 2-4 weeks and will stop; OR • Will likely continue for 6- 12 months; AND • Can continue for years. BJS Stalking Victims in the US (2013). Stalking Statistics: Duration of Stalking Incidents
  64. Stalking is Rarely Charged • Between 5% and 16% of

    stalking cases are actually charged as stalking when police already have all the information they need to charge.1 • 1,785 domestic violence reports:2 • 1 in 6 cases evidence of stalking • 1 official stalking charge TK Logan, Research on Partner Stalking: Putting the Pieces Together, University of Kentucky (2010) Police often do not charge stalking, even when cases include the criminal elements. In reports, neither victims nor officers use the word stalking.
  65. What Does Stalking Look Like? • Following or spying (in

    person) • Contacting your friends or your family • Breaking into or vandalizing your property or going through your garbage
  66. What Does Stalking Look Like? • Making threatening calls or

    hang-ups or sending threatening texts • Sending hate mail, e- mail or instant messages • Spreading rumors • Posting details about person’s life • Revenge Porn Whore Frigid Slut Dumb Loser Easy
  67. What Does Stalking Look Like? • Following or spying (virtual)

    • Using social media to track or harass • Using surveillance • Installing spyware or GPS tracking software on your computer or cell phone
  68. What Does Stalking Look Like? • Approaching you at home,

    work, or in a public place • Waiting for you at home, work, or in a public place • Repeatedlysending unwanted notes or gifts
  69. What Does Stalking Look Like? • Threats • Property damage

    • Forced confrontations • Threatening or actually harming self • Threats to victim about harming others
  70. Linking IPV & Stalking: The Danger IPV Stalking often starts

    during the relationship. Stalking behaviors escalate during separation. Following, spying, & leaving threating messages are red flags for lethality. Risks reach their apex for victims who are divorced or separated from their partner.
  71. Why Understanding Stalking & Technology is Important Survivors use technology.

    Abusers and perpetrators misuse technology. We use technology within our agencies and partnerships in ways that can impact confidentiality. Public as well as private data can be accessed by abusers and perpetrators.
  72. Technology is NOT Evil! Technology doesn’t create abuse. Rather, misuse

    of technology as a tactic is old behavior with new tools. Survivors can use technology strategically to enhance and maintain their safety. Technology provides many benefits to programs and can enhance services. If we didn’t know this before, COVID has shown us the importance of technology in service provision.
  73. Cell Phone Safety: What to Know • Monitoring Call log,

    texts, voicemails voicemail can be monitored. • Programs meant to backup and restore data make it difficult to render these devices secure if an abuser can get to them. • Devices can be tracked and disabled remotely. • Some apps share data with social media by default. • Spoofing
  74. Messages can be falsified, spoofed, or sent anonymously from the

    carrier’s website or services. Nearly all 50 states explicitly include electronic communication in stalking or harassment laws. Text Messaging Bad News & Good News Evidence With a valid court order, the carrier MIGHT be able to retrieve messages that were "deleted" from the device or can document that a message was sent from one user to another. Best practice is to take photographs or video of the phone & text message content. Screenshots can also be acceptable • Bad: Messages can be falsified, spoofed, or sent anonymously from the carrier’s website or services. • Good: Nearly all 50 states explicitly include electronic communication in stalking or harassment laws. • With a valid court order, the carrier MIGHT be able to retrieve messages that were "deleted" from the device or can document that a message was sent from one user to another. • Take photographs, video, or screenshots of the phone & text message content.
  75. Cell Phone Safety & Best Practices Become familiar with features.

    Use cell phones with analog coverage sparingly. Check for included & enabled services. Be wary of “gifts.” Give location info to 911 in a crisis. Set Bluetooth to “hidden” & GPS to “911 only”.
  76. Email • Email is not private or confidential. • It

    is impossible to completely erase history. • Wireless networks are not always secure. • Firewalls, anti-virus protection, and spyware detectors offer little actual security in finding spyware or keystroke software.
  77. Perpetrators use Social Media to: • Monitor the survivor’s page

    • Impersonate the survivor • “Friend” survivor’s friends & family • Gather personal information through search engines, profiles, and “check-ins”
  78. GPS Tracking on Vehicles • Does the car have OnStar

    or a navigation system? • OBD (diagnostics port) can be used to track. • How easy is it to get an OBD, install, & track someone?
  79. Spyware Considerations • Documentation • Option of getting a new

    primary phone and keeping old one for documentation • Victim Safety • Removal of spyware may escalate abuser’s behavior • Removal • Cell phone providers can’t “check” the phone • Factory reset
  80. Documenting the Abuse • Victims can document what is happening.

    –Keep a log to establish a pattern of stalking behavior –Take screenshots (computer + phone), photos, print out pages –Keep emails, text messages, or voicemails • Search for software on suspect’s computer • Search warrants should be sought for the collection and forensic examination of the perpetrator’s computer • Include storage devices (USBs), and computer systems • Search for monitoring websites/URLs 118
  81. Documenting the Abuse… • Check for equipment purchases • Use

    any other options for gathering information (offender on probation or parole?) • “Snag it”(You can create a video of you navigating through webpages) • Wayback Machines • Don’t forget circumstantial evidence (abusive partner knows facts/information otherwise not known to others) 119
  82. Cell Phones: Documenting Evidence • Audio – on the phone

    and separately • Voicemail – Suspect’s own voice, abusers tell victim what they’re going to do • Powerful evidence in court • Abusive partners will tell the victim what they are going to do, or what they did • Text • On Phone • Digital Image of phone face • Victims can get detailed copies of their own phone bills
  83. Advise Disengagement • Recommend complete disengagement (no contact with abusive

    partner) • Explain concept of intermittent reinforcement BUT… • Realize victims engage in behaviors to keep themselves safe: • Maintain contact, negotiation, minimizing threat • Contact may be a safety strategy
  84. Safety Issues To Consider • Will abuser know if posts

    or devices are removed? • Removing posts/devices may not stop the abuse and may escalate control and harassment. • Removing posts from one site will not guarantee its removal from the internet. • Removing posts/devices may also remove the evidence. • Will the removal put the survivor in more danger? • Trust the survivor’s instincts. • Strategize & safety plan around issues.
  85. Menti What is something you learned that you never really

    considered before with regards to stalking?
  86. Evaluations Questions to think about: • What did you learn

    that you’re going to take with you back to your work? • Is there something you wanted to learn about that wasn’t addressed, or wanted more time spent on it? • Was there something that can be improved for next time? https://md.coalitionmanager.org/formmanager/formsubmission/create?formId=147