The Safe and Strategic Use of Technology A guide for domestic violence advocates and those they...
-
Upload
derick-baldric-hardy -
Category
Documents
-
view
213 -
download
0
Transcript of The Safe and Strategic Use of Technology A guide for domestic violence advocates and those they...
The Safe and Strategic Use of
Technology
A guide for domestic violence advocates and those they serve
Why care?Why care?
It impacts our daily livesIt helps us in our workIt helps victims feel safer
IT CAN BE RISKY IF NOT WELL THOUGHT OUT
TECHNOLOGY IS:TECHNOLOGY IS:
Computers Telephones TTY Devices Fax machines E-mail GPS Camera and
Detection Devices
Answering machines
Caller ID Internet Panic Buttons Data Systems E-911 211
Goals for this trainingGoals for this training
Put technology on your radarDiscuss technology and its benefitsShare technology risks and include
in safety planningDiscuss resources for victims and
advocates
Your Relationship with Your Relationship with Technology?Technology?
Not on Speaking Terms
Cordial Working relationship
Very Intimate
Power and
Control
Isolation
Destroying your Property
Intimidation
Sexual Coercion
Threats
Limiting Your Independence
Humiliation
Jealousy
Benefits and RisksBenefits and Risksof using Corded, of using Corded,
Cordless, Cell Phones Cordless, Cell Phones and Related Devicesand Related Devices
Created by Cindy Southworth, NNEDV
Expanded by John Brown, WVCADV and
Charlie Hartmann, MCEDV
Benefits of UsingBenefits of UsingCordless TelephonesCordless Telephones
Convenience
Productivity
Mobility
Risks of UsingRisks of UsingCell and Cordless PhonesCell and Cordless Phones
Losing a call Crosstalk Loss of legal
privilege Interception
Cordless TelephonesCordless Telephones
Can be intercepted by:ScannersHam radios
Can be vulnerable to crosstalk heard through:
Baby MonitorsOther cordless phones
FORFOR VICTIMSVICTIMS
Ask victims if they use them and inform them of the risk
CrosstalkInterception
FOR ADVOCATESFOR ADVOCATES
Limit identifying information or escape details on cordless phones
Be sure the cordless phone has been properly hung up. For additional safety unplug the phone
Consider providing cheap corded phones for staff and volunteers or changing to spread spectrum phones with frequency of 2.4 Ghz or better
Cordless TelephonesCordless Telephones
New cordless phones are better but may still be intercepted with a high powered scanner: i.e. law enforcement, FBI, etc.
The ideal cordless phone today is 5.8 Ghz spread spectrum. 5.8 Ghz is a broader bandwidth than 2.4 Ghz, therefore safer. So even if the phone is not spread spectrum, if the frequency is 2.4 Ghz or higher, a scanner that you buy in a store cannot pick up the phone call.
Cordless TelephonesCordless Telephones
The scanner needs to be within about 300 to 400 feet of the phone to pick up the call.
It is easy for a scanner to pick up a baby monitor. If you have a baby monitor turned on in a room, a nearby scanner can hear whatever the monitor can hear.
Need to check out legal liabilities regarding privacy rights being compromised because a center uses cordless or cell phones.
Safer Use of Cell PhonesSafer Use of Cell Phones
From in a car or anywhere “on the go” Higher frequencies (2.4 Ghz or higher) Spread spectrum Digital instead of analog
Risk of using Cell PhonesRisk of using Cell Phones
Can be intercepted by:Scanners
Can be vulnerable to crosstalk heard through:
Baby MonitorsOther cordless phones
ANALOG phones are easier to intercept than DIGITAL, digital channels are encrypted
Remember that digital phones can change to analog depending on the location of the towers
Risk of using Cell PhonesRisk of using Cell Phones
Risk of using Cell PhonesRisk of using Cell Phones
SILENT MODE, AUTO ANSWERThese are two features that newer cell phones have. When these features are both programmed into a cell phone, an abuser can call the cell phone, it won’t
ring but will be automatically answered. This leaves an open line for an abuser
to hear everything going on.
E-911E-911
The wireless E-911 program requires carriers, upon appropriate request by a
local Public Safety Answering Point (PSAP), to report the telephone
number of a wireless 911 caller and the location of the antenna that
received the call and in the near future will require wireless carriers to provide far more precise location information, within 50 to 100 meters in most cases.
Risk of using Cell PhonesRisk of using Cell Phones
Risks of E-911Risks of E-911
There is a GPS chip (tracking device) installed in each cell phone
for 911. For a fee the cell phone company will provide a locator service that allows you to know
where that phone is at all times.
FORFOR VICTIMSVICTIMS
Ask victims if use older cell phones, let them know it’s possible for their conversations to be monitored so they can limit what they say if they feel threatened
Ask if she suspects he may be monitoring her calls (Auto Answer, Silent Mode)
FORFOR VICTIMSVICTIMS
Talk to victims about cell phone limitations as E911 comes into effect
Victims may want to turn off cell phones when not in use for location safety and privacy
If there is a GPS device on the cell phone, a victim may want to leave the phone when she leaves
FOR ADVOCATESFOR ADVOCATES
Use high frequency (above 900 Mhz)digital phones
Encourage cell phone companies to provide visible notice that a tracking system is subscribed.
If using an older phone to respond to hotline calls:– Use sparingly– Avoid identifying details
Caller IDCaller ID
Have line blocking on agency phone lines
Test all lines including fax lines to insure line blocking is in effect
Discuss safety planning with victims around Caller ID
Have an organizational policy about Caller ID: agency line blocking, accepting blocked calls, etc.
Risks of using Corded Risks of using Corded PhonesPhones
Corded phones can easily be tapped
from inside or outside the home
Caller ID
In some states you can legally put a tap
on your own phone to record
conversations
Generally most phones can be used safely.
• Each type of phone has its own risks.
• The more you know and understand the risks, the better prepared you are to help victims.
• Be aware of what a victim says that may indicate a potential problem.
• Analog Telephone Adaptor ATA device converts analog signal to digital data Internet
• IP Phones with Ethernet connector via router Internet (soon WiFi)
• Computer to Computer (need Microphone, Speakers, etc.)
VoIP – Voice Over Internet Protocol
VoIP: increasingly usedVoIP: increasingly usedCost: Internet connection doubles as a phone
line, saves up to 50% compared to traditional local/long-distance phone companies
Many Canadian & US companies offer VoIP service: Vonage Canada, Bell Canada, Rogers Telecom, Telus, etc.
Many different VoIP implementations ~ needs a broadband Internet connection (DSL or cable) but can use a regular telephone
3 Types of VoIP services:3 Types of VoIP services: Fixed = from location service is being provided Nomadic = from any location with Internet access Foreign exchange = users in one exchange receive phone
calls dialed as local calls in another exchange they selected (e.g. a customer located in Ottawa with a Halifax local phone #).
2 types of 911: Basic 911 = you must tell them your location Enhanced 911 = automatically sends your location info.
(fixed address or location you registered or real time cell location)
Canada: VoIP & 911 accessCanada: VoIP & 911 accessCanadian Radio-television & Telecommunications
Commission (CRTC) decisions in 2005 required that: fixed VoIP service providers ensure same level of 911
service provided by “incumbent phone companies” to customers (E-911 or Basic 911)
nomadic or foreign exchange VoIP service providers implement interim solutions comparable to Basic 911 service.
VoIP provider notify existing & potential customers on the availability, characteristics & limitations of Basic & E- 911 services.
Canadian VOIP providers must ensure 911 access & customer notification
VOIP & 911 exampleVOIP & 911 exampleVonage VoIP customer dials 911Vonage’s national emergency line operator
views a computer screen for the most recent address the customer entered into Vonage’s company database.
Then Vonage then redirects the call to your local 911 dispatch based on that address
Time delay
Victim Safety: VoIP & E-911Victim Safety: VoIP & E-911 Register primary address for E-911 service Find out what TYPE of E-911 service is provided in your
region. Service providers may use different strategies or procedures for
handling 911 calls.
If move or traveling, consider re-registering primary address Can take several hours to process – service not immediately
available.
Obtain local emergency direct lines Police, Fire – check on local municipal websites
Other Safety Risks with VoIPOther Safety Risks with VoIP Spoofing: Use 3 way calling. Put 1st caller on hold, dial victim
2nd. Caller ID shows 1st # dialed
Unblocking blocked numbers: local phone company/ cell carrier send "Calling Party Number" (CPN) with every call. VoIP software can get system to unblock CPN.
Tapping: Most VoIP calls are unencrypted across the Internet, making tapping easy
Call Screening & Call forwarding: User predefines screening list of caller IDs (specific IDs or anonymous calls), then sets how each caller ID is processed
Call Transferring. Have a buddy call her.
Call log records all missed, outgoing, incoming & local #.
Anonymizers:Anonymizers:Stalkers & Camophone.comStalkers & Camophone.com
Cheap web-based service spoofs caller ID using VoIP
Web provider keeps no records of callers or calls
To make a phone call, you give the following info:
1. Phone number of party you’re calling
2. Phone number to reach you3. Caller ID you wish to send
Answering MachinesAnswering Machines
If an abuser leaves a threatening message, the victim has a recording
Do not erase the messageHave the police come and either tape
the message or retrieve the recordingIt is possible that threatening
messages may be used in a court case
TTY DevicesTTY Devices
Helpful for victims who are deaf or hearing impaired
It is easy to impersonate someone, so may want to have code word with victim
Know TTY and Relay etiquette TTY devices keep records and
transcripts of calls Victim and program may want to clear
history of call
Fax machinesFax machines
•Fax headers include sender’s fax number
•If possible enter 000-000-0000 in the header instead of the fax number
• Be sure to line block the fax machine
Benefits of Using Benefits of Using ComputersComputers
InternetE-mailData CollectionFinancial Systems
It is impossible to clear the history of where on the internet you’ve been, even if the website says you can.
Software to clear footprints is not foolproof and gives false sense of security.
If you do clear history, it can raise suspicions if abuser has been monitoring computer activity.
Ways Computer Activity Ways Computer Activity Can Be MonitoredCan Be Monitored
When you visit websites, the pages you view leave footprints not only in your Internet history but all over your hard drive.
These footprints can be site addresses, pictures, graphics and logos that appear on all the pages you visit.
It is impossible to delete or clear all computer footprints, which is why it is important for you to use a safer computer.
SpywareSpyware
Spyware is a computer program that can monitor all computer activities
They can be installed on your computer directly or remotely. (i.e. via internet or e-mail)
Spector Pro automatically records everything your spouse, children and employees do on-line. Features include stealth email monitoring, chat and instant message recording, complete keystroke logging and much more….
Spector Pro
The ONLY software that captures their emails and IMMEDIATELY forwards them to you. eBlaster also captures both sides of chat conversations, instant messages, keystrokes typed, applications launched and web sites visited-then sends you a detailed Activity Report every hour….
eBlaster
Don't take chances with your privacy by using an inferior spy scanner! If your PC is infected with spy software, SpyCop will detect it with our brute force method of scanning! SpyCop literally goes through every program file on your hard drive leaving no "stone" unturned.
Consider a Safer Consider a Safer ComputerComputer
If you think your activities are being monitored, they probably are
Consider using a computer at:– a friend’s house– a family member’s house– the public library– an Internet cafe
Online Social NetworkingOnline Social Networking
Since 2001, online social networking has expanded to over 300 websites, including:– Friendster– MySpace– Facebook– LiveJournal– Tagged– Tribe.net– Xanga.com– Meetup.com
They’re Popular!They’re Popular!
Traffic on Facebook has grown 272% in the past year
Traffic on MySpace has grown 318% in the
last year
Stats taken from a March 8, 2006 USA Today article
What Do People Do? What Do People Do?
Online DatingMeet new friendsBlogShare favorite sites, images, etc.Find people with common interests
What are the Risks?What are the Risks?
Your friends’ friends’ friends will be able to see your info and become part of your social circle
So - personal info posted online is not privatePredators troll online communities to find
victimsYour family, teachers, coworkers, coaches
can all access your info
Be a Savvy UserBe a Savvy User
Use code phrasesThink 2x before posting personal infoIf you use your dog’s name as a password
(which you shouldn’t) – don’t post your dog’s name online!
Think before accepting new “friends”Think before posting photos - Adults need to
model
Cameras Cameras Voyeurism
Child Pornography
Footage distributed without consent
Footage of assault distributed Upskirting and Downblousing
Kids lured to post photos of themselves
Safely Using EmailSafely Using Email
Never forward or share email addresses or content without permission
Create accounts abuser doesn’t know about Do not give the password to the abuser Use different passwords, not words abuser
may know (no birthdates, pet names, pin numbers, etc) Use a combination of letters and numbers
Do not check the box that says “remember password”
Safely Using EmailSafely Using Email
Have more than one email account Create free email accounts at
yahoo.com or hotmail.comWhen registering for free email, do
not use any form of your full name or address…
Use fake information for your SAFETYChange your password regularly
Advocate EmailAdvocate Email
Have a policy about how to respond safely to email from victims
Use web forms instead of “mail to” addresses on websites
NEVER send client names or identifying information in email
What is GPS?What is GPS?
Worldwide Radio Navigation System Worldwide Radio Navigation System developed by US Defense Dept.developed by US Defense Dept.
24 Satellites in space generate & 24 Satellites in space generate & receive radio signals that allow a GPS receive radio signals that allow a GPS receiver/chip on earth to estimate its receiver/chip on earth to estimate its locationlocation
GPS Chips – Stalking ToolsGPS Chips – Stalking Tools(Global Positioning System)(Global Positioning System)
Used in phones, OnStar, hiking, and more Used in phones, OnStar, hiking, and more These devices can be attached to cars, placed in other, These devices can be attached to cars, placed in other,
smaller itemssmaller items
GPS & Enhanced 911GPS & Enhanced 911 In US (1996 FCC rules, & 1999 law) mandated: adding GPS/location chips to new cell phones Phased upgrading of 911 emergency dispatch centres so
they can get # & exact location of a 911 cellphone caller via GPS chip
some regional difficulty rolling this out due to costs
In Canada: some police forces use GPS to track police cars 2007: Bell Canada completed Toronto trial of cellphone
GPS for 911 calls, using a system that can locate the caller within 50 metres. CRTC monitored trial. Expect more trials before any new CRTC rules.
Bell Canada Seek n FindBell Canada Seek n Find
Locate family members & subscribers who have given you permission right from your computer. $5/month
Depends on phone type Permission? For your billing
account, use unique PIN. For others, send text message. they must give approval for your phone to locate them.
Bell CanadaSeek & Findmap: shows
locations of mobile phones & landmarks
List contacts you can locate
Landmarks: home, work, child’s school
History: record of “your locates” for past 7 days
GPS & US State Stalking Cases• Colorado 2000: Stalker placed GPS in ex-wife’s car. Convicted: stalking “electronic surveillance”.
• Wisconsin 2002: GPS to track former live-in girlfriend. Convicted: stalking, burglary
•Glendale. CA 8/2004: Man arrested when trying to change battery under ex-girlfriend’s car.
•Ohio 12/2004: put GPS in ex-wife’s car. Convicted: felony menacing by stalking. Ordered to wear GPS device for 1 year!
•Missouri 12/2005: Police Officer put GPS in ex-girlfriend’s car. Officer was fired.
Trust your instincts – if you thinks you are being followed too regularly… there might be a GPS
GPS device might be small, about the size of a cell phone or possibly in a small box, look for a wire.
Police might search car for her – advocacy & educational might be needed
Victims can search the car : under the hood, under the car seats, under the bumpers, in the trunk
Or take the car to a (new) mechanic to search ($20?) A private investigator can do a thorough search, but it
could cost hundreds or thousands Consider leaving the car temporarily if still worried
GPS Safety PlanningGPS Safety Planning
GPS Monitoring GPS Monitoring for Offendersfor Offenders
Offender wears ankle bracelet & GPS unit at all times
Information is downloaded & sent to probation/parole officer
Supervising officer creates “hot zones” (victim’s home & workplace, schools, etc.) where offender is barred from going—officer is notified if location violation occurs
With “active” monitoring, supervising officer receives immediate violation alerts and can send help to victim
With “passive” monitoring, supervising officer receives information, typically at the end of each day, and provides no immediate protection for victim(s)
Data CollectionData Collection
PRIVACY POLICIESPRIVACY POLICIES Have privacy/confidentiality policies for
computer data as well as written data. Include in the policy:
– Who has access– What they have access to– When files are purged/deleted
Victim InformationVictim Information
Who has access to victim information Content of the records Storage of information Security of data
Keep in mind: These records can be subpoenaed.
Data, Stats & SecurityData, Stats & Security
NO confidential client names on any computer connected to the internet
Install a software firewall (A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your computer)
Have Antivirus software and keep it up to date.
NEVER open attachments from unknown sources
Helpful LinksHelpful Links
www.mainstreetsafety.com (general tech safety)
www.victimbar.org (legal)www.download.com (firewalls)Shelter net – www.shelternet.caAssaulted women’s Helpline-
awhl.orgFemaide-briserlesilence.ca