Title: Get Out of MySpace Get Out of MyFace: CyberStalking
1Get Out of MySpace Get Out of MyFace!
Cyber-Stalking
- UVM Officer Chris Hunter
-
- Henrietta Menzies, ResLife
Media Credit Jessie Velasquez
Download presentation_at_ http//www.uvm.edu/hmenzi
es/cyberstalking_wkshp.ppt
2What is Cyber-stalking?
- Threatening behavior or unwanted advances
using the Internet and other forms of online and
computer communications - It takes many forms such as
- threatening or obscene e-mail
- spamming (in which a stalker sends a victim a
multitude of junk e-mail) - live chat harassment or flaming (online verbal
abuse) - leaving improper messages on message boards or in
guest books - sending electronic viruses
- sending unsolicited e-mail
- tracing another person's computer and Internet
activity, - and electronic identity theft
3How does it happen?
- Cyber-stalkers target their victims through chat
rooms, blogs, message boards, discussion forums,
and e-mail - One Womans story I used to spend time in an
online womens community. One woman became a
little too dependent and attached herself to me a
little more than was comfortable. She read every
message board post I made, not just on that
particular site, but all over the web. She
followed me to every chatroom. She posted
non-stop on my old "guestbook". She called me at
home all of the time. She sent emails by the
dozen, daily. Sent ecards. Sent gifts, flowers,
began to "threaten" to come and visit me - and I
do mean threaten. Because by that point, I was
trying to pull away. She was making me nervous.
I was never afraid she would show up at my door
(I lived on a military base when it was the worst
and it would have been tough for her to get
through the gate). Now, sometimes I do worry - I
don't have that gate to protect me any longer. - Cyber-stalking can cross-over to physical
stalking and in extreme cases be a prelude to
more serious behavior, including physical
violence.
4How easy is it to get my info?
- All you need is a cell phone , im screen name,
email or IP-address ABIKA Pay to find info
_at_http//www.abika.com/ - Lets take a look at MySpace Facebook and see
what we find (volunteers?). www.Myspace.com
www.Facebook.com
5How can I protect myself?
- Post only information that you are comfortable
with others seeing and knowing about you.
Many people can see your page, including your
professors, the police, the College/ University
you attend, or the job you might want to apply
for in five years.
6Protecting myself online (cont)
- Make sure your screen name doesn't say too much
about you. Don't use your name, your age, or your
hometown. Even if you think your screen name
makes you anonymous, it doesn't take a genius to
combine clues to figure out who you are and where
you can be found. Consider a gender neutral
screen name/email account
7Protecting myself online (cont)
- Keep your information to yourself. Don't post
your number, address, phone number, or bank and
credit card account numbers and don't post
other people's information, either. - Be cautious about posting self-identifying
information that could be used to identify you or
locate you offline. This could include the name
of your college, sports team, clubs, and places
in town/ on campus where you work or hang out.
8Protecting myself online (cont)
- Consider not posting your photo. It can be
altered and broadcast in ways you may not be
happy about. If you do post one, ask yourself
whether it's one your mom would display in the
living room. Or one you would post up in your own
room. - Or use a creative non-identifiable photo
9Creative Photos (non-identifiable)
10Protecting myself online (cont)
- Trust your gut if you have suspicions. If you
feel threatened by someone or uncomfortable
because of something online, tell someone
(preferably a staff/professor/counselor/RA/RD/UVM
police) you trust. See resources later in
presentation and 1800-hotline number to call.
11HOW DID HARASSMENT BEGIN?
Includes Message boards, groups, usenet
Includes Auctions, personals, online dating,
virus, hacking, greeting cards, gaming, mailing
list, webcam, blogs, guestbook, spyware,
trojans, etc
12If you are a victim of Cyber-Stalking
- Hotline to call 1-800-FYI-CALL, 830 a.m. to
830 p.m., Monday through Friday, Eastern
Standard Time. - Change your email account and passwords
- Tell the harasser/cyber-stalker in clear terms to
stop contacting you. - Save all communications you send/receive to/from
the cyber stalker - Avoid letting your internet browsers remember
passwords and other personal information - Contact online directory listings such as
www.four11.com, www.switchboard.com, and
www.whowhere.com to request removal from their
directory.
13Online Resources
- Wired Safetyhttp//www.wiredsafety.org/internet1
01/myspaceguide.html - MySpace Safety tipshttp//www.myspace.com/Module
s/Common/Pages/SafetyTips.aspx - GetNetWisehttp//www.getnetwise.org
http//privacy.getnetwise.org/ - National Center for Victims of Crime Stalking
Resource Centerhttp//www.ncvc.org/src/ - Cyber Angels http//www.cyberangels.org/
http//www.cyberangels.org/privacy.html - Working with Social Networking Sites
Tips!http//onguardonline.gov/socialnetworking_yo
uth.html - Cyber Tip Online http//www.cybertipline.com/
- Working to Halt Online Abuse http//www.haltabuse
.org/
14Stalking
- (1) "Stalk" means to engage in a course of
conduct which consists of following, lying in
wait for, or harassing, and - (A) serves no legitimate purpose and
- (B) would cause a reasonable person to fear for
his or her physical safety or would cause a
reasonable person substantial emotional distress. - (2) "Course of conduct" means a pattern of
conduct composed of two or more acts over a
period of time, however short, evidencing a
continuity of purpose. Constitutionally protected
activity is not included within the meaning of
"course of conduct." - (3) "Following" means maintaining over a period
of time a visual or physical proximity to another
person in such manner as would cause a reasonable
person to have a fear of unlawful sexual conduct,
unlawful restraint, bodily injury, or death. - (4) "Harassing" means actions directed at a
specific person, or a member of the person's
family, which would cause a reasonable person to
fear unlawful sexual conduct, unlawful restraint,
bodily - The Vermont Statutes Online Title 13 Crimes
and Criminal Procedure - Chapter 19 BREACH OF THE PEACE DISTURBANCES.
13 V.S.A. 1061. Definitions
15Aggravated Stalking
- (a) A person commits the crime of aggravated
stalking if the person intentionally stalks
another person, and - (1) such conduct violates a court order that
prohibits stalking and is in effect at the time
of the offense or - (2) has been previously convicted of stalking or
aggravated stalking or - (3) has been previously convicted of an offense
an element of which involves an act of violence
against the same person or - (4) the person being stalked is under the age of
16 years or - (5) had a deadly weapon, as defined in section
1021 of this title, in his or her possession
while engaged in the act of stalking. - (b) A person who commits the crime of aggravated
stalking shall be imprisoned not more than five
years or be fined not more than 25,000.00, or
both. - (c) Conduct constituting the offense of
aggravated stalking shall be considered a violent
act for the purposes of determining bail. (Added
1993, No. 95, 1 amended 2005, No. 83, 5.) - The Vermont Statutes Online Title 13 Crimes and
Criminal Procedure - Chapter 19 BREACH OF THE PEACE DISTURBANCES 13
V.S.A. 1063. Aggravated stalking
16Breach of the Peace by Electronic Means
- (a) A person who, with intent to terrify,
intimidate, threaten, harass or annoy, makes
contact by means of a telephonic or other
electronic communication with another and - (i) makes any request, suggestion or proposal
which is obscene, lewd, lascivious or indecent - (ii) threatens to inflict injury or physical harm
to the person or property of any person or - (iii) disturbs, or attempts to disturb, by
repeated anonymous telephone calls or other
electronic communications, whether or not
conversation ensues, the peace, quiet or right of
privacy of any person at the place where the
communication or communications are received
shall be fined not more than 250.00 or be
imprisoned not more than three months or both. If
the defendant has previously been convicted of a
violation of this section or of an offense under
the laws of another state or of the United States
which would have been an offense under this act
if committed in this state, the defendant shall
be fined not more than 500.00 or imprisoned for
not more than six months, or both. - The Vermont Statutes Online Title 13 Crimes and
Criminal Procedure - Chapter 19 BREACH OF THE PEACE DISTURBANCES 13
V.S.A. 1027. Disturbing peace by use of
telephone or other electronic communications
17Breach of the Peace by Electronic Means (Cont)
- (b) An intent to terrify, threaten, harass or
annoy may be inferred by the trier of fact from
the use of obscene, lewd, lascivious or indecent
language or the making of a threat or statement
or repeated anonymous telephone calls or other
electronic communications as set forth in this
section and any trial court may in its discretion
include a statement to this effect in its jury
charge. - (c) An offense committed by use of a telephone or
other electronic communication device as set
forth in this section shall be considered to have
been committed at either the place where the
telephone call or calls originated or at the
place where the communication or communications
or calls were received. (Added 1967, No. 171,
1 amended 1999, No. 124 (Adj. Sess.), 2.) - The Vermont Statutes Online Title 13 Crimes and
Criminal Procedure - Chapter 19 BREACH OF THE PEACE DISTURBANCES 13
V.S.A. 1027. Disturbing peace by use of
telephone or other electronic communications
18ANY QUESTIONS?
Get Out of MySpace Get Out of MyFace!
- THANKS FOR ATTENDING OUR WORKSHOP ON
- CYBER-STALKING