61
© NNEDV © NNEDV Advocacy, Technology, and Safety Online Course: Part 1 of 4 Benefits and Risks of Technology Phone Technology

Advocacy, Technology, and Safety Online Course

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Advocacy, Technology, and Safety

Online Course: Part 1 of 4

Benefits and Risks of Technology

Phone Technology

Page 2: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Adapted from curriculum by:

The Safety Net Technology Project at the

National Network to End Domestic Violence

Email: [email protected]

Website: www.nnedv.org

Page 3: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Why do we need to know about technology?

• Survivors use technology.

• Abusers and perpetrators misuse technology.

• We use technology within our agencies and partnerships in ways that can impact confidentiality.

• Public as well as private data can be accessed by abusers and perpetrators.

Page 4: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Technology is not evil!

• Technology doesn’t create abuse. Rather, misuse of technology as a tactic is old behavior with new tools.

• Technology provides many benefits to programs and can enhance services.

• Survivors can use technology strategically to enhance and maintain their safety.

Page 5: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Risks

• Many risks exist when using technology. Stalkers can – “Spoof” Caller ID,– Intercept calls and call logs,– Track survivors with social location

applications or GPS tracking devices,– Impersonate survivors on social networking

sites, and– Monitor computer and mobile device usage.

Page 6: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Learning is Essential

• Thus, it is essential to learn about technology even if the advocate does not have a social networking profile or a smart phone.

• Learn more by– Visiting social networking sites “About Us” and

“Safety” pages,– Reading news stories about new features and legal

cases, and– Talking to people who use the most up to date

technology a co-worker with the newest smart phone or the IT Manager.

Page 7: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Answering Answering MachinesMachines

PhonePhoneTechnologyTechnology

Caller ID Faxes

Cordless Phones

Cell Phones

Wiretap & Bugs

TTY Machines

SCANNERS

Page 8: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Caller ID Risks

• Reverse directories give the physical address of a person/place based on the phone number – – www.AnyWho.com.www.AnyWho.com.

• Numbers are always available when calling toll free Numbers are always available when calling toll free numbers (800, 888).numbers (800, 888).

• Can be manipulated Can be manipulated with Spoof Cards & with Spoof Cards & VoIP.VoIP.

Page 9: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Safety Planning for Caller ID

Use pay-as-you-go phones purchased with cash or a VoIP number (i.e., Skype) that is not location specific.

Optional phone services available: distinctive ring, call trace (*57), per call # blocking (*67), call block of certain #’s (*60), and virtual voicemail.

Best Practices When calling survivors, safety plan around the use of Caller

ID and Blocking. Service providers working from home may want to have

their numbers blocked. Test lines frequently to make sure numbers are

still blocked.

Page 10: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Fax Machines & eFax

• Transmission shows the number it’s faxed from.

• eFax uses Internet and is susceptible to interception just like email.

• Most machines now store data copies of faxes.

Best Practices: Clear memory. Use Passwords.

Never send confidential information via eFax.

Page 11: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Cell Phone Safety & Best Practices

Encourage survivors to become familiar with all features of Encourage survivors to become familiar with all features of phone – including Bluetooth.phone – including Bluetooth.

If using cell phones to respond to hotline calls in an area If using cell phones to respond to hotline calls in an area where you still have analog coverage, use sparingly & where you still have analog coverage, use sparingly & avoid identifying details. avoid identifying details.

Look into account/plan for any services that are included Look into account/plan for any services that are included and enabled.and enabled.

Be careful of “gifts” – consider getting new phone.Be careful of “gifts” – consider getting new phone.

Always give location information to 911 in emergencies.Always give location information to 911 in emergencies.

Set Bluetooth to “hidden” and GPS to “911 only”. Set Bluetooth to “hidden” and GPS to “911 only”.

Page 12: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Text Messaging

• Messages can be falsified, spoofed, or sent anonymously from the carrier’s website or services.

• Nearly all 50 states explicitly include electronic communication in stalking or harassment laws.

• With a valid court order, the carrier MIGHT be able to retrieve messages that were "deleted" from the device or can document that a message was sent from one user to another.

• Law enforcement often takes photographs or video of the phone & text message content.

Evidence:

Page 13: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

13

Evidence & Text Messages

• Text messages are stored in an intermediate message server at the phone company at some point during the transmission.

• However, a message may disappear off the server immediately after the recipient receives it, so it may only be retrievable for a very short time period.

• Servers overwrite older messages and messages marked for deletion. Some carriers offer services to restore archived messages if the customer's phone is lost or stolen, and they may retain messages for an extended period of time to facilitate this service.

Page 14: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Benefits of Bluetooth

• It's wireless.

• It's inexpensive.

• You don't have to think about it.

• Bluetooth attacks

• Call interception

Risks of Bluetooth

14

Page 15: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

3 Important Phone Settings

1. To protect data and calls:

Bluetooth OFF

2. To protect evidence:

3. To keep location private:

15Text Questions to (904)

624-1807

Page 16: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Evidence Gathering Suggestions

• Report crimes to law enforcement and follow their instructions for evidence preservation

While waiting for law enforcement,

• Do not turn off phone

• Do not place any calls or send any text messages.

• Disconnect wireless connection by

– Using an RF Phone Bag

– Setting the phone to “airplane mode”

16

Page 17: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

3 Important Settings

1. To protect data and calls:

Bluetooth OFF

2. To protect evidence:

Airplane Mode ON

Wireless OFF

3. To keep location private:

17Text Questions to (904)

624-1807

Page 18: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Airplane Mode

• Turning on “Airplane Mode” on a mobile phone can protect text messages and call logs from alteration, but it will not protect voicemail messages.

Page 19: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

3 Important Phone Settings

1. To protect data and calls:Bluetooth OFF

2. To protect evidence:Airplane Mode ON

3. To keep location private:Location OFF/ GPS OFF

19Text Questions to (904)

624-1807

Page 20: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Advocacy, Technology, and Safety

Online Course: Part 2 of 4

Location Technology

Page 21: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Location, Location, Location

Page 22: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Global Positioning Systems (GPS)

• Track person/object using satellite technology.

• Active vs. Passive

• Commonly found in:

– Cell phones

– Watches

– Vehicle Navigation Systems

• Small and easily hidden.

• Affordable and readily available.

Page 23: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Phone Location Services

Page 24: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

24

Social Location Tracking

Double opt-in: Choose to see a friend’s location without agreeing to share your location.

Notification: Text messages or “notification” sent to notify you of your “friends’” locations

Turn location sharing on & off/set to false location: can set as invisible to all or to just one person. Perpetrator could set location at grocery store & go to victim’s home or monitor victim’s “check-ins.”

Page 25: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Risks of GPS

• Family or shared plans allow abuser to access account and GPS, either without consent or coerced.

• If abuser has access to the phone, GPS can still be activated without victim’s knowledge.

• GPS transmitters can be hidden in vehicles or objects.

• Tracking programs can be set to regularly deliver alerts via text message or email to the abuser.

Page 26: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Monitor Teen DriversMonitor Teen Drivers • Know what time they left, what time they arrived, and see a map of the exact location where the car was / is parked.

• Alerts can notify you when your teen leaves school early, is speeding, or visits a friend who has been declared off limits.

• With a click of the mouse, you can disable the car’s starter, turn on the dome light or flash the headlights.

Page 27: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

GPS Stalking Cases• Colorado, 2000 – Stalker

placed GPS in ex-wife’s car. Convicted: stalking “electronic surveillance.”

• Ohio, 2004 – Put GPS in ex-wife’s car. Convicted: felony menacing by stalking. Ordered to wear GPS device for 1 year!

• New York, 2009 – Former Giants football player put GPS in girlfriend’s car. Found to be second tracking device he had used.

Page 28: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Safety Planning for Location Technology

Trust instincts. Trust instincts.

Help to narrow down possible location, times, places.Help to narrow down possible location, times, places.

Learn about phone – Can it be tracked by GPS? Has Learn about phone – Can it be tracked by GPS? Has someone loaded a new program onto the phone? Ask carrier someone loaded a new program onto the phone? Ask carrier about tracking plans on account.about tracking plans on account.

Survivor, police, or mechanic can search the car. Look under Survivor, police, or mechanic can search the car. Look under the hood/seats/bumpers, in the trunk, dashboard, glove box, the hood/seats/bumpers, in the trunk, dashboard, glove box, etc. Consider leaving the car temporarily if still worried.etc. Consider leaving the car temporarily if still worried.

Does the car have OnStar or a Navigation System?Does the car have OnStar or a Navigation System?

Strategize about discovery of device, as well as removal as it Strategize about discovery of device, as well as removal as it could alert abuser to discovery.could alert abuser to discovery.

Page 29: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

3 Important Geolocation Strategies

1. Phone Settings:

Location OFF/ Customize

2. Online Profile Settings:

Location OFF

3. Visit cell phone provider to assist with settings 29

Page 30: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

3 Important Geolocation Strategies

1. Phone Settings:

OFF/ Customize

2. Online Profile Settings:

Location OFF

3. Visit cell phone provider to assist with settings 30

Page 31: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

3 Important Geolocation Strategies

1. Phone Settings:

OFF/ Customize

2. Online Profile Settings:

OFF

3. Visit cell phone provider to assist with settings.

31

Page 32: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Advocacy, Technology, and Safety

Online Course: Part 3 of 4

Securing Online Activities

Page 33: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Survivors are online!

Survivors…

• Communicate over email & instant messaging.

• Use searches to find information and support.

• Visit our websites for information about local and national services, legal rights, options, safety planning.

• Connect with others through social networking sites.

• Create and contribute to blogs and online forums to share stories, resources, and support.

• Access online counseling services.

Page 34: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Emails & Computers

• Emails are not private or confidential.

• Impossible to erase history.

• “Window Washers” have severe limitations.

• Firewalls, anti-virus programs, Spyware detectors offer very limited identification of Spyware.

• Wireless networks are not always secure.

Page 35: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Safety Planningfor Emails & Computers

Avoid easy passwords that the abuser could guess.

Caution family/friends from sharing addresses when sending or forwarding e-mails – use Bcc.

Never delete emails from computer that may be used as evidence.

Use a “safer computer” when possible.

Never open attachments from unknown sources and be skeptical of requests for information.

Keep virus protections up-to-date & install firewalls.

Page 36: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Spyware• Records all:

• Keystrokes typed• Websites visited• Emails & instant messages • Details of applications and

windows opened• It can:

• Take snapshots of screen• Restart, shutdown, & logoff

computer• Control the desktop

and mouse• Make computer talk

Page 37: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Spyware

• Sends info to monitor via email in the form of a detailed “Activity Report” and/or screenshots.

• Operates in “stealth mode”, so difficult to detect.

• Inexpensive ($30 and ) and easy to purchase.

• Spyware can be installed by someone who has physical access to the computer/phone OR by sending an email or Instant Message.

Page 38: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Safety Planning for Computer Monitoring

Try to use a “safer” computer to avoid spy software and keystroke logging hardware.

Consult computer professional; run computer program to detect spy ware (i.e. SpyBot).

Strategize if spy ware is detected - involve police, don’t want to alert abuser.

Create new account on “safer” computer and only access that account from that computer.

Page 39: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Online Social Networking

• Hundreds of sites. Each collect and share different types of information.

• Not just for teens! Used by people of all ages.

• Information from social networks are used in legal cases, hiring determinations, and education applications.

• Abusers misuse to impersonate and cause harm.

Page 40: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

40

What are the Risks?

• Your friends’ friends’ friends will be able to see your info and become part of your social circle

• Personal info posted online is not private —like a billboard on a highway

• Predators troll online communities to find victims

• Family, teachers, coworkers, coaches, employers can all access your info

• Other people can post information about you on their own pages – even if your page is private

Page 41: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

CyberstalkingConsiderations

• Social Engineering

• Impersonation and Authentication

• Threats and Invasion of Privacy

• Deletion of Evidence

Text Questions to (904) 624-1807 41

Page 42: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Sites and problematic behavior

• Public threats on Facebook wall; private threat in instant and private messaging

• Impersonation on all sites

• Retweets on Twitter

• Anonymous harassment on Formspring.me

• Harassment of trafficking victim on Tagged.com

• 3rd party contact: Social Engineering

Text Questions to (904) 624-1807 42

Page 43: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

3 Important SN Strategies

1. To document Social Networking posts

PRINT SCREEN

2. To protect your page:

3. To keep location private:43

Text Questions to (904) 624-1807

Page 44: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

3 Important SN Strategies1. To document Social Networking posts

PRINT SCREEN

2. To protect your page: Super Deactivate Account

3. To keep location private:44

Page 45: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

45

Privacy Settings

• Privacy settings vary on social networking sites.

• Limit access to your posts to friends/ followers/ circles that you know personally and can trust with this information.

• Survivors experiencing stalking via social networking sites should limit profile access to friends only and limit profile information shared.

Page 46: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

3 Important SN Strategies1. To document Social Networking posts

PRINT SCREEN

2. To protect your page:

Deactivate Account

3. To keep location private:

Location:

OFF

46Text Questions to (904)

624-1807

Page 47: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Safety Considerations for Social Networks

• Is the survivor or her children active on any of these sites including alumni, job search, or online dating sites?

• Has an abuser posted a profile of a survivor without the survivor’s knowledge?

Page 48: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Advocacy, Technology, and Safety

Online Course: Part 4 of 4

Using and Stalking Log

How Survivors Can Benefit from Technology

Page 49: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Using an Evidence Log

• Use a journal or a log to document incidents of stalking behavior.

• Using this tool provides helpers such as advocates and law enforcement with a timeline of events and a list of existing evidence.

• Even partial information about the event can be useful as it can help to narrow down the types of technologies being used by the stalker.

Page 50: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Using a Stalking Log

• Include all information relevant to the event:

– Date and time

– Description

– Witness

– Type of technology used (if known)

– Location

– Saved Evidence (printed email, text message stored on phone, call log, photo)

– Police report number and officer’s name and badge number

Page 51: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Using an Stalking Log

• Safety plan with survivors around safe storage of this evidence.

• Important questions:

– Will the survivor store hard copies or electronic copies?

– Where will the evidence log and saved evidence be stored?

– Who has access to that storage location?

Page 52: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

7 Ways Survivors CanBenefit From Technology

1. If a survivor “friends” with stalker on social location applications, she or he can check-in at a false location like the library or grocery store when meeting with an advocate.

Page 53: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

7 Ways Survivors CanBenefit From Technology

2. With Gmail and Facebook, a user can discover when her or his account has been accessed. This is useful in discovering if the account has been accessed in another location or by another person.

Facebook: Account Settings >Security>Active Sessions>Login Approvals, Recoginized Devices, and Active Sessions

Gmail: (Bottom right of screen) Details

Page 54: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

7 Ways Survivors CanBenefit From Technology

3. Take control of your webcam.

– If the landline or mobile phone has been compromised, use Skype or other VoIP services.

• When not using,

– Cover laptop web camera with tape.

– Uninstall cameras if never used.

– If possible, disconnect webcam from computer and store when not using.

Page 55: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

7 Ways Survivors CanBenefit From Technology

4. Incorporate contact restrictions specifically in Injunction for Protection (IFP). Include in the IFP: no social networking contact, no text messaging, or voicemail contact.

OR

• Communicate with the perp ONLY via text message or email so that threats, visitation order violations, or IFP violations are documented.

Page 56: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

7 Ways Survivors CanBenefit From Technology

5. When communicating via text message or email, use a code word, code phrase, or a set exchange of code words or phrases to confirm the sender’s identity.

Example text exchange,

Sender (Caller ID says Mom):

Survivor:

Sender:

Page 57: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

7 Ways Survivors CanBenefit From Technology

6. Create an anonymous social networking profile.

– Use an anonymous profile image such as nature scene or cartoon picture.

– Use a name other than your own.

– Use false profile data such as home town and employer or leave profile data blank.

Page 58: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

7 Ways Survivors CanBenefit From Technology

7. Use Google Voice to place phone calls and text message for free without using your own personal cell or home phone number. Visit www.google.com/voice to learn more.

Page 59: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Next Steps for Advocates

Safety Plan with Survivors about their tech use. Share safety & privacy tips.

Work with law enforcement, community members, & policy makers to hold abusers accountable.

Keep learning about technology benefits & risks.

Visit www.nnedv.org for more information and handouts

Page 60: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

Before Sharing Online

• Although it is vital to get tech safety information to victims, we need to do it in ways that do not give ideas or explicit instructions to abusers.

• Please do NOT post explicit tech information on the web or publish in newsletters that will be posted on websites.

• Visit the NNEDV website: www.nnedv.org/SafetyNet to see what materials and information we have provided online. Or contact Safety Net Team at [email protected] to discuss further.

Page 61: Advocacy, Technology, and Safety Online Course

© NNEDV© NNEDV

The Safety Net Technology Project at the

National Network to End Domestic Violence2001 S Street, NW Suite 400

Washington, DC 20009Phone: 202-543-5566

Website: www.nnedv.org

Email: [email protected]

This contact information is intended for advocates and allies. The project does not have staffing and coverage to take calls directly from victims/survivors.

Advocates are encouraged to contact the Safety Net Tech Team for assistance by phone or email about individual victims (identifying details about the victim are

not needed).