The Safe and Strategic Use of Technology A guide for domestic violence advocates and those they...

81
The Safe and Strategic Use of Technology A guide for domestic violence advocates and those they serve

Transcript of The Safe and Strategic Use of Technology A guide for domestic violence advocates and those they...

The Safe and Strategic Use of

Technology

A guide for domestic violence advocates and those they serve

Why do we as advocates need to

care about technology?

Why care?Why care?

It impacts our daily livesIt helps us in our workIt helps victims feel safer

IT CAN BE RISKY IF NOT WELL THOUGHT OUT

TECHNOLOGY IS:TECHNOLOGY IS:

Computers Telephones TTY Devices Fax machines E-mail GPS Camera and

Detection Devices

Answering machines

Caller ID Internet Panic Buttons Data Systems E-911 211

Goals for this trainingGoals for this training

Put technology on your radarDiscuss technology and its benefitsShare technology risks and include

in safety planningDiscuss resources for victims and

advocates

[email protected] 6

Your Relationship with Your Relationship with Technology?Technology?

Not on Speaking Terms

Cordial Working relationship

Very Intimate

[email protected] 7

Power and

Control

Isolation

Destroying your Property

Intimidation

Sexual Coercion

Threats

Limiting Your Independence

Humiliation

Jealousy

Benefits and RisksBenefits and Risksof using Corded, of using Corded,

Cordless, Cell Phones Cordless, Cell Phones and Related Devicesand Related Devices

Created by Cindy Southworth, NNEDV

Expanded by John Brown, WVCADV and

Charlie Hartmann, MCEDV

Benefits of UsingBenefits of UsingCordless TelephonesCordless Telephones

Convenience

Productivity

Mobility

Risks of UsingRisks of UsingCell and Cordless PhonesCell and Cordless Phones

Losing a call Crosstalk Loss of legal

privilege Interception

Cordless TelephonesCordless Telephones

Can be intercepted by:ScannersHam radios

Can be vulnerable to crosstalk heard through:

Baby MonitorsOther cordless phones

FORFOR VICTIMSVICTIMS

Ask victims if they use them and inform them of the risk

CrosstalkInterception

FOR ADVOCATESFOR ADVOCATES

Limit identifying information or escape details on cordless phones

Be sure the cordless phone has been properly hung up. For additional safety unplug the phone

Consider providing cheap corded phones for staff and volunteers or changing to spread spectrum phones with frequency of 2.4 Ghz or better

Cordless TelephonesCordless Telephones

New cordless phones are better but may still be intercepted with a high powered scanner: i.e. law enforcement, FBI, etc.

The ideal cordless phone today is 5.8 Ghz spread spectrum. 5.8 Ghz is a broader bandwidth than 2.4 Ghz, therefore safer. So even if the phone is not spread spectrum, if the frequency is 2.4 Ghz or higher, a scanner that you buy in a store cannot pick up the phone call.

Cordless TelephonesCordless Telephones

The scanner needs to be within about 300 to 400 feet of the phone to pick up the call.

It is easy for a scanner to pick up a baby monitor. If you have a baby monitor turned on in a room, a nearby scanner can hear whatever the monitor can hear.

Need to check out legal liabilities regarding privacy rights being compromised because a center uses cordless or cell phones.

Safer Use of Cell PhonesSafer Use of Cell Phones

From in a car or anywhere “on the go” Higher frequencies (2.4 Ghz or higher) Spread spectrum Digital instead of analog

Risk of using Cell PhonesRisk of using Cell Phones

Can be intercepted by:Scanners

Can be vulnerable to crosstalk heard through:

Baby MonitorsOther cordless phones

ANALOG phones are easier to intercept than DIGITAL, digital channels are encrypted

Remember that digital phones can change to analog depending on the location of the towers

Risk of using Cell PhonesRisk of using Cell Phones

Risk of using Cell PhonesRisk of using Cell Phones

SILENT MODE, AUTO ANSWERThese are two features that newer cell phones have. When these features are both programmed into a cell phone, an abuser can call the cell phone, it won’t

ring but will be automatically answered. This leaves an open line for an abuser

to hear everything going on.

E-911E-911

The wireless E-911 program requires carriers, upon appropriate request by a

local Public Safety Answering Point (PSAP), to report the telephone

number of a wireless 911 caller and the location of the antenna that

received the call and in the near future will require wireless carriers to provide far more precise location information, within 50 to 100 meters in most cases.

Risk of using Cell PhonesRisk of using Cell Phones

Risks of E-911Risks of E-911

There is a GPS chip (tracking device) installed in each cell phone

for 911. For a fee the cell phone company will provide a locator service that allows you to know

where that phone is at all times.

FORFOR VICTIMSVICTIMS

Ask victims if use older cell phones, let them know it’s possible for their conversations to be monitored so they can limit what they say if they feel threatened

Ask if she suspects he may be monitoring her calls (Auto Answer, Silent Mode)

FORFOR VICTIMSVICTIMS

Talk to victims about cell phone limitations as E911 comes into effect

Victims may want to turn off cell phones when not in use for location safety and privacy

If there is a GPS device on the cell phone, a victim may want to leave the phone when she leaves

FOR ADVOCATESFOR ADVOCATES

Use high frequency (above 900 Mhz)digital phones

Encourage cell phone companies to provide visible notice that a tracking system is subscribed.

If using an older phone to respond to hotline calls:– Use sparingly– Avoid identifying details

Caller IDCaller ID

Have line blocking on agency phone lines

Test all lines including fax lines to insure line blocking is in effect

Discuss safety planning with victims around Caller ID

Have an organizational policy about Caller ID: agency line blocking, accepting blocked calls, etc.

Risks of using Corded Risks of using Corded PhonesPhones

Corded phones can easily be tapped

from inside or outside the home

Caller ID

In some states you can legally put a tap

on your own phone to record

conversations

Generally most phones can be used safely.

• Each type of phone has its own risks.

• The more you know and understand the risks, the better prepared you are to help victims.

• Be aware of what a victim says that may indicate a potential problem.

VOIP Internet Phone Calls

• Analog Telephone Adaptor ATA device converts analog signal to digital data Internet

• IP Phones with Ethernet connector via router Internet (soon WiFi)

• Computer to Computer (need Microphone, Speakers, etc.)

VoIP – Voice Over Internet Protocol

VoIP: increasingly usedVoIP: increasingly usedCost: Internet connection doubles as a phone

line, saves up to 50% compared to traditional local/long-distance phone companies

Many Canadian & US companies offer VoIP service: Vonage Canada, Bell Canada, Rogers Telecom, Telus, etc.

Many different VoIP implementations ~ needs a broadband Internet connection (DSL or cable) but can use a regular telephone

3 Types of VoIP services:3 Types of VoIP services: Fixed = from location service is being provided Nomadic = from any location with Internet access Foreign exchange = users in one exchange receive phone

calls dialed as local calls in another exchange they selected (e.g. a customer located in Ottawa with a Halifax local phone #).

2 types of 911: Basic 911 = you must tell them your location Enhanced 911 = automatically sends your location info.

(fixed address or location you registered or real time cell location)

Canada: VoIP & 911 accessCanada: VoIP & 911 accessCanadian Radio-television & Telecommunications

Commission (CRTC) decisions in 2005 required that: fixed VoIP service providers ensure same level of 911

service provided by “incumbent phone companies” to customers (E-911 or Basic 911)

nomadic or foreign exchange VoIP service providers implement interim solutions comparable to Basic 911 service.

VoIP provider notify existing & potential customers on the availability, characteristics & limitations of Basic & E- 911 services.

Canadian VOIP providers must ensure 911 access & customer notification

VOIP & 911 exampleVOIP & 911 exampleVonage VoIP customer dials 911Vonage’s national emergency line operator

views a computer screen for the most recent address the customer entered into Vonage’s company database.

Then Vonage then redirects the call to your local 911 dispatch based on that address

Time delay

Victim Safety: VoIP & E-911Victim Safety: VoIP & E-911 Register primary address for E-911 service Find out what TYPE of E-911 service is provided in your

region. Service providers may use different strategies or procedures for

handling 911 calls.

If move or traveling, consider re-registering primary address Can take several hours to process – service not immediately

available.

Obtain local emergency direct lines Police, Fire – check on local municipal websites

Other Safety Risks with VoIPOther Safety Risks with VoIP Spoofing: Use 3 way calling. Put 1st caller on hold, dial victim

2nd. Caller ID shows 1st # dialed

Unblocking blocked numbers: local phone company/ cell carrier send "Calling Party Number" (CPN) with every call. VoIP software can get system to unblock CPN.

Tapping: Most VoIP calls are unencrypted across the Internet, making tapping easy

Call Screening & Call forwarding: User predefines screening list of caller IDs (specific IDs or anonymous calls), then sets how each caller ID is processed

Call Transferring. Have a buddy call her.

Call log records all missed, outgoing, incoming & local #.

Anonymizers: Spoof Cards

Anonymizers:Anonymizers:Stalkers & Camophone.comStalkers & Camophone.com

Cheap web-based service spoofs caller ID using VoIP

Web provider keeps no records of callers or calls

To make a phone call, you give the following info:

1. Phone number of party you’re calling

2. Phone number to reach you3. Caller ID you wish to send

Answering MachinesAnswering Machines

Answering MachinesAnswering Machines

If an abuser leaves a threatening message, the victim has a recording

Do not erase the messageHave the police come and either tape

the message or retrieve the recordingIt is possible that threatening

messages may be used in a court case

TTY DevicesTTY Devices

Helpful for victims who are deaf or hearing impaired

It is easy to impersonate someone, so may want to have code word with victim

Know TTY and Relay etiquette TTY devices keep records and

transcripts of calls Victim and program may want to clear

history of call

Fax machinesFax machines

•Fax headers include sender’s fax number

•If possible enter 000-000-0000 in the header instead of the fax number

• Be sure to line block the fax machine

Benefits and RisksBenefits and Risksof Using Computersof Using Computers

Benefits of Using Benefits of Using ComputersComputers

InternetE-mailData CollectionFinancial Systems

InternetInternet

Using the InternetUsing the Internet

Excellent resource for victims and advocates

BUT...

It is impossible to clear the history of where on the internet you’ve been, even if the website says you can.

Software to clear footprints is not foolproof and gives false sense of security.

If you do clear history, it can raise suspicions if abuser has been monitoring computer activity.

Ways Computer Activity Ways Computer Activity Can Be MonitoredCan Be Monitored

When you visit websites, the pages you view leave footprints not only in your Internet history but all over your hard drive.

These footprints can be site addresses, pictures, graphics and logos that appear on all the pages you visit.

It is impossible to delete or clear all computer footprints, which is why it is important for you to use a safer computer.

SpywareSpyware

Spyware is a computer program that can monitor all computer activities

They can be installed on your computer directly or remotely. (i.e. via internet or e-mail)

Spector Pro automatically records everything your spouse, children and employees do on-line. Features include stealth email monitoring, chat and instant message recording, complete keystroke logging and much more….

Spector Pro

The ONLY software that captures their emails and IMMEDIATELY forwards them to you. eBlaster also captures both sides of chat conversations, instant messages, keystrokes typed, applications launched and web sites visited-then sends you a detailed Activity Report every hour….

eBlaster

               

Don't take chances with your privacy by using an inferior spy scanner! If your PC is infected with spy software, SpyCop will detect it with our brute force method of scanning! SpyCop literally goes through every program file on your hard drive leaving no "stone" unturned.

Consider a Safer Consider a Safer ComputerComputer

If you think your activities are being monitored, they probably are

Consider using a computer at:– a friend’s house– a family member’s house– the public library– an Internet cafe

[email protected] 53

Social Networking

[email protected] 54

Online Social NetworkingOnline Social Networking

Since 2001, online social networking has expanded to over 300 websites, including:– Friendster– MySpace– Facebook– LiveJournal– Tagged– Tribe.net– Xanga.com– Meetup.com

[email protected] 55

They’re Popular!They’re Popular!

Traffic on Facebook has grown 272% in the past year

Traffic on MySpace has grown 318% in the

last year

Stats taken from a March 8, 2006 USA Today article

[email protected] 56

What Do People Do? What Do People Do?

Online DatingMeet new friendsBlogShare favorite sites, images, etc.Find people with common interests

[email protected] 58

What are the Risks?What are the Risks?

Your friends’ friends’ friends will be able to see your info and become part of your social circle

So - personal info posted online is not privatePredators troll online communities to find

victimsYour family, teachers, coworkers, coaches

can all access your info

[email protected] 59

SAFETYSAFETYTIPSTIPS

From MySpace & Tagged

[email protected] 60

Be a Savvy UserBe a Savvy User

Use code phrasesThink 2x before posting personal infoIf you use your dog’s name as a password

(which you shouldn’t) – don’t post your dog’s name online!

Think before accepting new “friends”Think before posting photos - Adults need to

model

[email protected] 61

Cameras Cameras Voyeurism

Child Pornography

Footage distributed without consent

Footage of assault distributed Upskirting and Downblousing

Kids lured to post photos of themselves

EmailEmail

Safely Using EmailSafely Using Email

Never forward or share email addresses or content without permission

Create accounts abuser doesn’t know about Do not give the password to the abuser Use different passwords, not words abuser

may know (no birthdates, pet names, pin numbers, etc) Use a combination of letters and numbers

Do not check the box that says “remember password”

Safely Using EmailSafely Using Email

Have more than one email account Create free email accounts at

yahoo.com or hotmail.comWhen registering for free email, do

not use any form of your full name or address…

Use fake information for your SAFETYChange your password regularly

Advocate EmailAdvocate Email

Have a policy about how to respond safely to email from victims

Use web forms instead of “mail to” addresses on websites

NEVER send client names or identifying information in email

SurveillancePhone Locating & GPS

What is GPS?What is GPS?

Worldwide Radio Navigation System Worldwide Radio Navigation System developed by US Defense Dept.developed by US Defense Dept.

24 Satellites in space generate & 24 Satellites in space generate & receive radio signals that allow a GPS receive radio signals that allow a GPS receiver/chip on earth to estimate its receiver/chip on earth to estimate its locationlocation

GPS Chips – Stalking ToolsGPS Chips – Stalking Tools(Global Positioning System)(Global Positioning System)

Used in phones, OnStar, hiking, and more Used in phones, OnStar, hiking, and more These devices can be attached to cars, placed in other, These devices can be attached to cars, placed in other,

smaller itemssmaller items

GPS & Enhanced 911GPS & Enhanced 911 In US (1996 FCC rules, & 1999 law) mandated: adding GPS/location chips to new cell phones Phased upgrading of 911 emergency dispatch centres so

they can get # & exact location of a 911 cellphone caller via GPS chip

some regional difficulty rolling this out due to costs

In Canada: some police forces use GPS to track police cars 2007: Bell Canada completed Toronto trial of cellphone

GPS for 911 calls, using a system that can locate the caller within 50 metres. CRTC monitored trial. Expect more trials before any new CRTC rules.

Bell Canada Seek n FindBell Canada Seek n Find

Locate family members & subscribers who have given you permission right from your computer. $5/month

Depends on phone type Permission? For your billing

account, use unique PIN. For others, send text message. they must give approval for your phone to locate them.

Bell CanadaSeek & Findmap: shows

locations of mobile phones & landmarks

List contacts you can locate

Landmarks: home, work, child’s school

History: record of “your locates” for past 7 days

GPS & US State Stalking Cases• Colorado 2000: Stalker placed GPS in ex-wife’s car. Convicted: stalking “electronic surveillance”.

• Wisconsin 2002: GPS to track former live-in girlfriend. Convicted: stalking, burglary

•Glendale. CA 8/2004: Man arrested when trying to change battery under ex-girlfriend’s car.

•Ohio 12/2004: put GPS in ex-wife’s car. Convicted: felony menacing by stalking. Ordered to wear GPS device for 1 year!

•Missouri 12/2005: Police Officer put GPS in ex-girlfriend’s car. Officer was fired.

Trust your instincts – if you thinks you are being followed too regularly… there might be a GPS

GPS device might be small, about the size of a cell phone or possibly in a small box, look for a wire.

Police might search car for her – advocacy & educational might be needed

Victims can search the car : under the hood, under the car seats, under the bumpers, in the trunk

Or take the car to a (new) mechanic to search ($20?) A private investigator can do a thorough search, but it

could cost hundreds or thousands Consider leaving the car temporarily if still worried

GPS Safety PlanningGPS Safety Planning

GPS Monitoring GPS Monitoring for Offendersfor Offenders

Offender wears ankle bracelet & GPS unit at all times

Information is downloaded & sent to probation/parole officer

Supervising officer creates “hot zones” (victim’s home & workplace, schools, etc.) where offender is barred from going—officer is notified if location violation occurs

With “active” monitoring, supervising officer receives immediate violation alerts and can send help to victim

With “passive” monitoring, supervising officer receives information, typically at the end of each day, and provides no immediate protection for victim(s)

Public Eye In the SkyPublic Eye In the SkyLive Web Cams

Surveillance Camera

Data SystemsData Systems

Data CollectionData Collection

PRIVACY POLICIESPRIVACY POLICIES Have privacy/confidentiality policies for

computer data as well as written data. Include in the policy:

– Who has access– What they have access to– When files are purged/deleted

Victim InformationVictim Information

Who has access to victim information Content of the records Storage of information Security of data

Keep in mind: These records can be subpoenaed.

Data, Stats & SecurityData, Stats & Security

NO confidential client names on any computer connected to the internet

Install a software firewall (A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your computer)

Have Antivirus software and keep it up to date.

NEVER open attachments from unknown sources

Helpful LinksHelpful Links

www.mainstreetsafety.com (general tech safety)

www.victimbar.org (legal)www.download.com (firewalls)Shelter net – www.shelternet.caAssaulted women’s Helpline-

awhl.orgFemaide-briserlesilence.ca

Hurtful LinksHurtful Links

Information Brokers www.publicdata.com www.knowx.com www.docusearch.com www.peoplefind.com www.whoswho.com