0 ratings 0% found this document useful (0 votes) 88 views 23 pages Stalking Packet
The document outlines various types of stalkers, including rejected, resentful, predatory, intimacy seekers, incompetent suitors, and cyberstalkers, detailing their motivations and behaviors. It also discusses the characteristics of stalkers, their potential victims, and the impact of stalking in workplace and school environments. Additionally, it provides guidance on what to do if someone is being stalked, emphasizing the importance of documentation, safety, and formal complaints.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, 
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items 
Save Stalking_packet For Later Stalking —
Who are these people?
Rejected Stalker
The most common, persistent and intrusive of all stalkers, the rejected stalker is obsessed
with someone who is a former romantic partner or friend, and who has ended their
relationship with the stalker, or indicates that he or she intends to end the relationship.
Depending on the responses of the victim, the stalkers goals will vary, and the rejected
stalker usually struggles with the complex desire for both reconciliation and revenge. As
Mullen writes, "A sense of loss could be combined with frustration, anger, jealousy,
vindictiveness, and sadness in ever-changing proportions.” This stalker may be very
narcissistic, and may fee! humiliated by the rejection. In most cases, they will have poor
social skills and a poor social network. They are also the most likely to try to harm the
victim in some way, and may employ intimidation and assault in their pursuit, They may
become jealous if their victim enters or continues a romantic relationship with another
person. A history of violence in the relationship with the partner is not uncommon.
 
Resentful Stalker
This stalker is looking for revenge against someone who has upset them--it could be
someone known to the stalker or a complete stranger. The behaviors are meant to
frighten and distress the victim. The stalker views the target as being similar to those
who have oppressed and humiliated them in the past, and they may view themselves as
someone striking back against an oppressor. Or, the victim could be a professional
believed to have cheated or abused the stalker in some way. Often irrationally paranoid,
this kind of stalker can be the most obsessive and enduring. While the least likely to use
physical force, the resentful stalker is the most likely to verbally threaten the victim,
‘They may use personal threats, complaints to law enforcement and local government,
property damage, theft or killing of pet, letters or notes on the victim's car or house,
breaking into the victim's house or apartment, or watching the victim's movements.
Predatory Stalker
‘The least common of all the stalkers, this is the classic sexual predator whose plan is to
physically or sexually attack the victim. They are motivated purely by the desire for
sexual gratification and power over their victim. This type of stalker is sexually deviant,
hhas poor social skills, and usually has lower than normal intelligence. They usually will
not have any direct contact with the victim while they are stalking them. This stalker
‘may engage in such behaviors as surveillance of the victim, obscene phone calls,
fetishism, voyeurism, sexual masochism and sadism, exhibitionism. The victim can be
either someone the stalker knows, or a complete stranger.Intimacy Seeker
‘The intimacy seeker seeks to establish an intimate, loving relationship with their victim.
To them, the victim is a long sought-after soul mate, and they were meant to be together.
Also, they may have the delusion that the victim is in love with them-usually called
erotomania. They may interpret any kind of response from the victim as encouragement,
even negative responses. This stalker may write letters, send gifts, or call their victim.
They may believe the victim owes them love because of all they have invested in
stalking them, and is very resistant to changing their beliefs. The intimacy seeker has an
inflated sense of entitlement, and if they recognize they are being rejected, this stalker
‘may become threatening, or may try to harm the victim in some way, sometimes using
violence. (In this way, they may become a rejected stalker, see above.) This stalker may
become jealous if their victim enters or continues a romantic relationship with another
person. After the rejected stalker, the intimacy seeker is the most persistent type of
stalker. They are usually unresponsive to legal sanctions, viewing them as challenges to
overcome that demonstrate their love for the victim.
Incompetent Suitor
The Incompetent Suitor desires a romantic or intimate relationship with the victim but is
impaired in their social and courting skills. ‘This stalker may be very narcissistic, and cut
off from victim’s feelings (Lack of empathy). The incompetent believes that anyone
should be attracted to them. Typically, this stalker will repeatedly ask for dates, or call
on the phone, even after being rejected. They may attempt physical contact by trying
hold the victim's hand or kiss the victim, however, the will not become physically violent
or threatening. The incompetent suitor is less persistent than others, and is likely to have
stalked numerous others in the past, and will probably do so in the future. ‘They will
quickly stop stalking if threatened with legal action or after receiving counseling,
 
This stalker believes that the victim is in love with them. They believe this even though
the victim has done nothing to suggest itis true, and may have made statements to the
contrary. The erotomaniac reinterprets what their vietim says and does to support the
delusion, and is convinced that the imagined romance will eventually become a
permanent union. This stalker may suffer from acute paranoia, and typically chooses a
victim of higher social status. They will repeatedly try to approach and communicate
with their supposed lover, and is typically unresponsive to threats of legal action of any
kind. Without psychological treatment, this stalker is likely to continue with their
activities.
Cyberstalking and Cyberstalkers
Cyberstalking is an extension of the physical act of stalking; however, the behavior
‘occurs using electronic mediums, such as the Internet and computer sypware. Someone
who is physically stalking an individual may employ cyberstalking as another means to
pursue, harass, or force contact. Or, cyberstalking may be the sole means of surveillance
and pursuit of the victim. The stalker may join forums they know their target frequents,and pose as someone else in an attempt to contact their target, or they may contact other
members to get information about the target or defame their character. They
may use spyware to access their target's computer and the personal information contained
within. Given the vast distances that the Internet spans, a "pure" cyberstalker will never
move beyond electronic mediums and into physical stalking. Still, this does not mean
that the behavior is any less distressing, frightening, or damaging, and a cyberstalker's
motives can fit any of the categories described above. Moreover, given the ability of
individuals to ‘mask’ their identity when using the Internet, linking the harassment to one
particular individual can be difficult. Programs that mask IP (Internet Protocol)
addresses, and anonymous remailers are merely two examples that hinder the
identification of the stalker and their (digital) location.
Who Becomes a Stalker
Stalkers are usually isolated and lonely, coming from the "disadvantaged" of our society;
however, a stalker can occupy any place in our entire social spectrum. Often, the stalking
may be triggered by a significant trauma or loss in the life of the perpetrator, usually
within at least seven years of the stalking behavior. (For example, relationship
dissolution or divorce, job termination, loss/potential loss of a child, or an ill parent.)
Most stalkers are not psychotic. In a comparative study of psychotic versus non-
psychotic stalkers (Mullen et al. 1999), 63% of the sample was found to be suffering
from a common psychiatric condition, such as major depression, personality disorder, or
substance dependence--with personality disorder being the most common diagnosis.
Ex-intimates: Common stalkers are people who previously shared a romantic
relationship with the victim, and former intimates are the most common type of stalking
target. This can be either from a long or short term relationship.
Family members: A stalker may target a member of their family, such as a parent or
sibling. This would most likely be a resentful or rejected stalker, and they would target a
family member they feel had rejected, humiliated, or abused them in the past.
Friends and Acquaintances: The victim may be stalked by an intimacy seeker or an
incompetent suitor motivated by a desire to start a romantic relationship with the victim.
The victim may be stalked by a resentful stalker, typically a neighbor, who may be
involved in a disagreement with the victim about something such as noise, the location of
a tree, or pets.
Workplace Contacts: In their study of stalkers, Mullen (et al) found that 23% had a
professional relationship with their victim, most often a medical practitioner. Other
stalkers may be supervisors, fellow employees, service providers, clients, or others who
show up at the victim's workplace. Stalking behaviors directed at the victim may
include: sexual harassment, physical and sexual assaults, robberies, or even homicide. A
violent workplace stalker usually has a history of poor job performance, a high rate of
absenteeism, and a record of threats and confrontations with people they resent in the
workplace.The United States Justice Department found that in the U.S., between the years 1992 and
1996 over 2 million people were the victims of violent crime in the workplace. This
included:
1.5 million assaults
51,000 rapes
84,000 robberies
Over 1000 homicides (disgruntled employees--usually resentful stalkers
are responsible for
most workplace homicides.
Victims often do not tell their co-workers or supervisors about the person who is stalking
them because they fear reprisals from the stalker or other employees, don't think they will
be believed, or feel embarrassed about the situation. (For other reasons, see Confusion
and Denial, on the home page)
Doctors, nurses, psychologists, or other healthcare providers may become the targets of
stalking by obsessed clients or patients. (Or the other way around) Teachers may
become stalked by students. (Or the other way around.) Psychiatrists are at particular
risk for being the targets of stalking because of
their contact with people with psychiatric conditions.
Strangers: These are most commonly Intimacy Seekers and Incompetent Suitors, but
may also be Predatory stalkers or Resentful stalkers. These stalkers may hide their
identity from their victims at first, and reveal it after stalking their victim for some time
in order to get closer to them. Victims may be initially flattered when stalker approaches
them and respond politely. ‘They may even agree to go on a date with their stalker, after
many requests. This can have the unintentional effect of encouraging the stalker, and
making them believe that their love is reciprocated.
Gender: Stalkers are far more likely to be male, however, women can also become
stalkers. Women are more likely to target someone they have known, usually a
professional contact. Men are less likely to pursue other men, while females will often
target other females. The majority of female stalkers are intimacy seekers seeking to
establish relationships, whereas men show a broader range of motivations, and are more
often to be seeking to restore relationships. Women are as likely to use violence as
‘men, and there does not tend to be a difference between genders regarding the duration of,
asstalking. Thus, while the contexts and motives for stalking may differ between men
and women, the intrusiveness of the behaviors and potential for harm does not.
P. E Mullen, Sexual Harassment Support, 2006What to do if you are being Stalked
Get the message across
Communicate to the stalker that their attention is unwelcome, but do not do this
Yourself, In fact, do not have any direct contact with the perpetrator as long as they are
stalking you. Forcing contact is one of the goals of stalking, and you will simply be
reinforcing the behavior if you communicate directly with her/him, Have someone else
communicate your feelings for you. Have a friend, a teacher, supervisor, dean, or
someone else that you trust talk to the stalker.
Important note: Schools and some companies are now requiring immediate
intervention if they learn there is harassment occurring. If you are a student being
stalked by a teacher, professor, or other employee at your school, any school employee
you speak to about the harassment is required by law to report the behavior to the
administration. This is also becoming policy at some companies--if you are being
harassed by another employee, check your company sexual harassment policy before
talking to a supervisor as they may be obligated to report the harassment to the higher-
ups. If your situation reflects either of these, it's best to be careful who you talk to, or be
sure of the timing, otherwise you may end up in a formal investigation without wanting to
be, or before you are ready.
Be Safe
Utilize the National Center for the Victims of Crime safety plan measures included with
this packet.
Document Everything!
Document every incident of harassment: You will be tempted to ignore the behavior,
telling yourself it will stop eventually. However, in most cases, the stalking continues.
So, keep a log of what is happening, particularly if the perpetrator is a teacher, professor,
or supervisor. Document each incident, including dates, times, names of witnesses, etc.
Save e-mails to a disc and keep it at home. Do not throw away any mail or email that is
related to the harassment, even if the mail is anonymous. Do not throw away any gifts
that the stalker sends you. Save answering machine messages. If it is legal in your state,
try to tape record any phone calls. Take pictures of any property damage. Video tape
and/or photograph stalking behavior (camera phones can be a great tool for documenting
stalking).
Police reports can also be great sources of documentation, While the legislation in many
states does not allow for police intervention unless the stalking behavior contains threats
or involves attacks, police reports are an official form of documentation and could
strengthen a case later on. Even if the stalker’s behavior in your situation is not directly
threatening, see if you can file a police report anyway.Stalking By A Work Or School Employee
Document your work and/or school performance. Keep copies of performance
evaluations and memos that attest to the quality of your work. Save papers and exams
that have comments by your professors. Ask for written recommendations from your
teachers that you can keep on file for later. The stalker may question your work or school
performance in order to justify their behavior.
Document negative actions: Document any negative actions that you experience
because of your refusal to submit to the stalkers demands or attentions--for example, if
you are given a poor evaluation, a demotion, or low grade because of your rejecting the
stalker.
Power in numbers: If possible, find others who have had similar experiences as you
have had with the stalker, or within the environment where the harassment is occurring.
Cyberstalking
Utlilize the NCVC protocol on protecting yourself from cyberstalking included with this
packet.
Formal Complaints
‘What you can do to confront stalking usually varies from state to state. In some states,
you can file a complaint under the state statute, but only if your stalker has threatened
you with physical harm, In others, the statutes mandate that less extreme acts of
harassment are sufficient fora restraining order or police arrest. Obtain a copy of your
state's stalking statute in order to gain a clear understanding of what conduct constitutes
an offense under the statute. If you are being stalked by someone from your workplace
or school, and the stalking is such that you cannot file under your state statute, you can
use the formal channels for grievances provided by the institution.
Formal Complaints at School or Work
Begin with the available grievance channels: In the workplace, the Human Resources
department is usually responsible for dealing with sexual harassment complaints, at least
initially, so this may be the place to begin if you are being stalked by another employee at
work. At school, stalking will be in the "domain" of any number of departments: campus
security, affirmative action office, ombudsman, student affairs office, dean of students,
etc. Call your dean of students office to find out the proper channels for stalking at your
school. But be aware that the primary goal of any department you consult will be to
protect the schoo! or business from liability--ethics are not likely to guide their decisions,
nor will they be likely to guide many of the people involved in your situation. In many
cases, complainants are treated like "the enemy."Keep notes of meetings and phone conferences: Be sure to keep detailed notes of
every meeting you have regarding the stalking, including dates, names of participants,
and the meeting results. If possible, you might want to tape record the meetings, or bring
an advocate or friend so you have a witness to what transpired. It is also a good idea to
send written summaries of the results to the attendees after each meeting. (It shows them
‘you are keeping on top of things.)
Document retaliation: Retaliation for complaining about stalking is also illegal.
Document any instances you experience just as you would the harassment. It is likely
that the majority of the hostility comes from colleagues of the harasser, but this does not.
change the legality. All retaliation is unlawful regardless of who is doing it
Stay composed: Most importantly, remain calm and professional during the entire
Process as your demeanor and psychological state will be under scrutiny. Save your
anger for a private counselor's office.
If you have exhausted all the avenues and the problem continues or worsens, we
recommend you contact a lawyer (if you have not done so already). If you are thinking
of taking legal action, it is best for you to not leave school or your job without consulting
a lawyer first. Note: institutions, particularly universities, have been known to drag out
investigations so that too much time passes for the victim to file a lawsuit later on--there
is usually a 1 year statute of limitations on cases. If you suspect this is happening, go
ahead and consult a lawyer now.
Note on workplace harassment: In most cases, you must file with the EEOC, first,
before you can take any independent legal action. The EEOC will only rule on cases
where the harassment occurred within the last year, so the incidents will have to be
relatively recent. Do not leave your job if you are thinking about filing a formal
complaint with the EEOC, as this will weaken your case.
Note on school harassment: Recent changes to Title IX hold academic institutions
‘more liable for protecting harassment complainants from retaliation. Also, your identity
must be kept confidential except where necessary for investigative purposes. Know your
rights in this process ahead of time. If the institutional grievance channels do not clear up
the situation, besides contacting a lawyer, contact the U.S, Department of Education's
Office of Civil Rights.How Do I File a Complaint Under My State's Stalking Statute?
To file a complaint that will trigger an arrest and prosecution, it must be accompanied
with sufficient evidence to establish "probable cause" that the stalker engaged in conduct
that is illegal under the state's stalking statute. If law enforcement officials do not witness
such conduct first-hand, itis often up to the victim to provide them with the evidence
necessary to establish probable cause.
Again, victims would be well-advised to obtain a copy of their state's stalking statute in
order to gain a clear understanding of what conduct constitutes an offense under the
statute, While most state stalking statutes are written in laymen's terms, the exact
meaning of those terms is not always clear. Victims may wish to consult with law
enforcement officials, a victim witness coordinator, prosecutors, or a private attorney for
an explanation and interpretation of the specific stalking statute in question,
In other words, stalking victims are often put in a position of having to first prove their
case to a law enforcement official before being afforded the opportunity to prove their
case before a court of law. It is for this reason that itis crucial for stalking victims to
document every stalking incident as thoroughly as possible, including collecting and
keeping any videotapes, audiotapes, phone answering machine messages, photos of the
stalker or property damage, letters sent, objects left, affidavits from eye witnesses, notes,
etc. Experts also recommend that victims keep a journal to document all contacts and
incidents, along with the time, date and other relevant in-formation. (See, the NCVC
"Stalking: Safety Plan Guidelines," for more information concerning evidence and safety
strategies.)
Regardless of whether or not they have sufficient evidence to prove a stalking violation,
victims wishing to file a stalking complaint with law enforcement officials should do so
at the earliest possible point in time. In some cases, victims may also be able to file a
‘complaint in the jurisdiction where the offender resides, if itis different from the victim's.
If law enforcement officials refuse to investigate, or if they are not responsive to a
complaint filed, victims may always directly approach their local prosecutor.
It is also recommended that any person who suspects or believes that they are currently
being stalked should immediately seek the advice and assistance of local victim
specialists in developing a personalized safety plan or action plan. Victim specialists can
be found at local domestic violence or rape crisis programs -- which should be listed
under "Community Services Numbers" or "Emergency Assistance Numbers" in the front
section of the local phone book -- or in victim assistance programs located in most local
prosecutors' offices and in some law enforcement agencies -- which should be listed
under "Local, City or County Government" in the Blue Pages of the local phone book.Victims of Stalking
Safety Protocol
Victims of stalking include individuals presently at risk for imminent danger to their
physical and/or emotional welfare, and those with danger continually pending, but not
immediately at risk for harm. In addition to becoming familiar with stalking laws that
presently exist, victims of stalking should be informed about the resources and procedural
precautions available to assist and protect them. It is important for stalking victims to
recognize that their victimization is not their fault. Stalking is a crime that can touch
anyone, regardless of gender, race, sexual orientation, socio-economic status,
geographical location, or with whom a person may associate.
Unfortunately, there is no single psychological or behavioral profile for stalkers. Every
stalker is different. This makes it virtually impossible to devise a single effective strategy
for victims to cope with stalkers’ behavior which can then be applied to every single
situation and all circumstances. This is why itis so vital that victims of stalking
immediately seek the advice of local victim specialists who can work with them to devise
a safety plan or action plan to address their unique situation and circumstances. Victim
specialists can be found in local domestic violence and rape crisis programs, as well as in
victim assistance programs in local prosecutors’ offices and in some law enforcement
agencies.
The following is not intended to be a set of strict guidelines for stalking victims, but,
rather practical information to assist them. There is no guarantee that if you follow all, or
some, of these strategies that you will be safe; however, implementing these strategies
‘may reduce your odds of physical or emotional harm from your stalker. Any persons who
suspect or believe that they are currently being stalked should report all contacts and
incidents to their local law enforcement authorities.
Victims in Imminent Danger
The primary goal of a victim in imminent danger should be to locate a safe place for
her/himself. Safety for stalking victims can often be found in the following places:
* Police stations;
* Residences of family/friends (location unknown to perpetrators);
* Domestic violence shelters or local churches, ete.; and/or
* Public areas (stalkers may be less inclined toward violence or creating a disturbance in
public places).
If departure from the current location is not possible, but a telephone is accessible, a
victim may contact local law enforcement at 911 or any other law enforcement or
emergency number. If the police do not respond, a victim can ask to speak to the police
unit or division supervisor, or have someone who has assisted them in the past contact,
police.
In dangerous situations, family members or friends can assist in a victim's departure fromtheir home or office. It is advised that as much caution as possible always be exercised
when directly confronting the offender, as stalking sometimes escalates into violence.
Upon reaching safety, a victim may want to communicate with local law enforcement,
victim services, mental health professionals and/or some social services agencies in order
to receive additional assistance and referrals available in the community. A victim of
stalking should always identify her/himself as such and request confidentiality of all
information given and any records kept or filed. If the stalker caused property damage or
physical harm, the victim may choose to file a report with law enforcement as soon as
possible.
Victims in Danger, But Not Immediately at Risk
While a victim may not be in immediate danger, she/he needs to assess the probability of
impending danger. If a stalking victim determines that she/he is at risk for being in a
potentially harmful or violent situation, the following options may be considered:
1. Protection Order.
Generally, these orders require the offender to stay away from -- and not interfere with --
the complainant. If violated, they may be punishable by incarceration, a fine or both.
‘These orders are typically obtained through a magistrate's office or local court. Contact
the local clerk of court's office for information about where to obtain orders.
Restraining orders are not foolproof -- they often do not extend beyond certain lines of
jurisdiction, and can only be enforced if they are broken. Victims should be cautioned
against developing a false sense of security. In addition, some states only provide
protective orders to former spouses or intimates.
Orders are not assured -- they are at the court's discretion,
2. Stalking Laws.
Basically, stalking laws make it a crime to willfully, maliciously and repeatedly harass,
follow or cause credible threat to another individual in an attempt to frighten or cause
harm,
A victim's state or municipality may have a stalking law either in effect, passed but not
effective until a later date, or currently pending passage. In addition, some jurisdictions
are not enforcing their stalking laws, and in others the laws are under judicial challenge.
A victim may contact her/his local prosecutor's office to inquire about the state and
‘municipal stalking laws and their applicability to her/his case.
Mlegal Acts.
 
A victim may determine that the perpetrator has broken the law by entering the victim's
residence without her/his permission, stealing and/or destroying the victim's property,
physically and/or sexually assaulting the victims, eteIf so, these acts may be punishable. Notifying police of illegal acts may be important for
the following reasons:
1. If convicted, the perpetrator may be incarcerated and/or ordered to stay away from
the victim;
2. Charges may intimidate the offender, sending the message that his/her actions are
illegal and will not be tolerated; and
3. Notifying the police produces documentation, which may be useful in a future
complaint for
evidentiary or credibility purposes.
4. Documentation.
Documentation of stalking should be saved and given to law enforcement.
Documentation of the actions of the perpetrator may be useful in future complaints or
proceedings, for evidentiary or credibility purposes.
Documentation may take the form of photos of destroyed property/vandalism, photos of
any injuries inflicted on the victim by the perpetrator, answering machine messages saved
on tape, letters or notes written by the perpetrator, etc.
A victim should keep a written log of any crimes or suspicious activities committed by
the perpetrator. Discretion should be used when making entries and it should be kept in a
secured place, as the log may be used in court proceedings.
5. Contingency Plans.
While a victim may not be in imminent danger, the potential always exists; therefore, a
contingency plan
(asort of "fire escape plan") may be appropriate. Suggested considerations include:
1. Knowledge of, and quick access to, critical telephone numbers, including:
+ Law enforcement numbers and locations;
+ Safe places (such as friends, domestic violence shelters, etc.); and
* Contact numbers for use after safety is secured (such as neighbors/family,
attomneys,
prosecutors, medical care, child care, pet care, etc.).
2. Accessible reserve of necessities, including:
+ Victims may wish to keep a small packed suitcase in the trunk of their car, or
at another
readily accessible location, for quick departure;
«Reserve money may be necessary;3.
Other necessities -- such as creditors’ numbers and
personal welfare items such as medication, birth certificates, social security
information,
passports, etc. - should be readily available;
Miscellaneous items -- like always keeping as full a tank of gas as possible in
the car,
backup keys for neighbors, etc. - are practical; and
Ifa victim has a child(ren), she/he may want to pack a few toys, books, or
other special
items belonging to the child.
 
Alert critical people to the situation who may be useful in formulating a
contingency plan, such as:
6. Prevent
Law enforcement;
Employers;
Family, friends, or neighbors; and
Security personnel.
tive Measures.
Install solid core doors with dead bolts. If victim cannot account for all keys,
change locks and secure spare keys.
If possible, install adequate outside lighting. Trim back bushes and vegetation
around residence.
Maintain an unlisted phone number. If harassing calls persist, notify local law
enforcement, but also keep a written log of harassing calls and any answering
machine tapes of calls with the stalker's voice and messages,
‘Treat any threats as legitimate and inform law enforcement immediately.
Vary travel routes, stores and restaurants, etc., which are regularly used. Limit
time walking, jogging, etc.
Inform a trusted neighbor and/or colleagues about the situation. Provide them.
with a photo or description of the suspect and any possible vehicles he/she may
drive,
If residing in an apartment with an on-site property manager, provide the
manager with a picture of the suspect.
Have co-workers screen all calls and visitors.
When out of the house or work environment, try not to travel alone if at all
possible, and try to stay in public areas. If you ever need assistance, yell
"FIRE" to get immediate attention, as people more readily respond to this cry
for assistance than to any other.
If financial means exist, use a "dummy" answering machine connected to a
published phone line. The number to a private unlisted line can be reserved for
close friends and family, then the stalker may not realize you have another line.7, Alternative Avenues of Assistance.
Assistance may be obtained from local sources, such as:
1. Domestic violence shelters or counselors;
2. Rape crisis programs or counselor
 
3. Victim assistance coordinators in the prosecutor's office; and/or
4. Law enforcement.
Victim counselors may either give a referral number to the victim of a stalker, or offer to
make the call and have someone from the referral organization or program contact the
victim directly.
The possibility exists that there will be no appropriate referral in the victim's vicinity. In
such cases, local law enforcement agencies should be contacted,
Copyright © 1997 by the National Center for Victims of Crime. This information may be freely
distributed, provided that itis distributed free of charge, in its entirety and includes this copyright notice.Cyberstalking
If you are being harassed on-line, there are several things you should do:
1. If you are under 18, tell your parents or an adult you trust that you are being harassed
or threatened. Do not keep this to yourself. Parents must know what is going on to be
able to help and support you.
2. If you are getting harassing e-mail, get a new account or request a new log-on name
and password from your Internet service provider. Close your old account. Learn how to
use the filtering capabilities of your e-mail program to block e-mail from certain
addresses.
3. Save every piece of communication you get from the cyberstalker. Save all of the
header information you can if it’s an e-mail or newsgroup posting. Print a hard copy, and
copy the communication to a disk for documentation.
4, Start a log of each communication explaining the situation in more detail. Document
how the harassment is affecting your life and what steps you're taking to stop it.
5. Once and only once, contact your harasser directly and state in simple, strong, and
formal terms to stop contacting you and/or posting anything about you. (SHS
recommends that you have someone do this for you, thus avoiding any direct contact with
the stalker.) State that the communications are unwanted and inappropriate, and that you
will take further action if it does not stop. E-mail a copy to the system administrator of
your Internet service provider. Save copies of these communications, and note that you
sent them in your log.
6. If you receive harassing on-line messages and it is possible to trace the origin of the
unwanted message and you have informed the sender that you do not want to be
contacted, you may want to consider reporting the on-line stalker to the Intemet service
provider (ISP) because many ISPs have policies that prohibit the use of their services to
harass or abuse another person. Some ISPs may be willing to cancel the stalker’s account.
If you receive abusive e-mail, identify the domain (letters after the @ sign) and contact
the ISP. Most ISPs have an e-mail address such as abuse@ [domain name] or
postmaster @[domain name] that can be used for complaints. If that does not work, you
can usually find contact addresses by going to www.networksolutions.comv/cgi-
bin/whois/whois (do a "who is" search on whatever ISP you need). If e-mail complaints
don’t work, make a phone call. Save copies of these communications, and note all
contacts in your log.
Keep in mind, however, that this may be just a short-term fix or may even exacerbate the
situation if the stalker discovers that you notified the ISP. [Under those circumstances,
he/she may attempt to retaliate against you or begin/continue to stalk you off-line.
Regardless of whether the on-line stalking ceases, you need to be aware that the stalker
may have obtained personal information on you via the Intemet or through other sources,
and, consequently, you may be still at risk for off-line stalking, in which case youneed to do appropriate safety planning.]
7. Contact your local police. Report every incident of on-line abuse and provide the
police with copies of evidence you have collected, Save copies of any police incident
reports, and note each contact to law enforcement in your log. If the stalker is out of state,
you should also contact your local office of the Federal Bureau of Investigation.
8. Call the FBI Computer Crimes Unit in your local area, {The Federal Interstate
Stalking and Prevention Act, 18 U.S.C. Section 2261A, was amended in 2000 to cover.
on-line stalking as well as stalking by phone and mail. Also, some on-line stalking cases
may fall under 18 U.S.C. Section 875, Interstate Communications (to make threats to
physically harm or kidnap another person in interstate communications is a felony) or 47
U.S.C. Section 223, Obscene or Harassing Telephone Calls in Interstate
Communications.]
In order to better protect yourself on-line:
1. Use a gender-neutral, anonymous screen name. DO NOT USE YOUR
REAL NAME.
2. Never give your password to anyone, especially if someone sends you an
instant message (IM).
3. Don't provide your credit card number or other identifying information as
proof of age to access or subscribe to a web site run by a company with
which you are unfamiliar.
4. Tell children not give out their real name, address, or phone number over
the Internet without permission,
5. Use a free e-mail account such as Hotmail (www.hotmail.com) or YAHOO!
(www.yahoo.com) to pass messages in newsgroups, mailing listings, enter
chat rooms, fill out forms, or correspond with someone you don't know
well.
Don't give your primary e-mail address out to anyone you don’t know.
‘Spend time on newsgroups, mailing lists, and chat rooms as a "silent"
observer before "speaking" or posting messages.
8. When you do participate on-line, only type what you would say to
‘someone in person.
9. Don't respond to e-mail from a stranger; when you reply, you are verifying
your e-mail address to the sender.
10. On a regular basis (at least once a month), type your name into Internet
search engines to see what information, if any, pops up. To have your
name removed from any directories, contact each search engine on which
you are listed and request to be removed.
ae
(Tips #1 - 8 were developed by the George Mason University Sexual Assault
Services, 1999.)
NCVC Recommendations for Victims of On-line Stalking, 2008Idaho Stalking Laws
“Stalking- Means maliciously, and repeatedly, following or harassing behavior
towards another person and making a credible threat with the intent to place that
person in reasonable fear for his or her own safety, or the safety of his or her
immediate family.”
1* Felony)(L.C. 18-7905) -
Felony Stalking
a.Stalking while a CPOR or NCO is in effect
b Stalking while on probation/parole and violates a term of that probation/parole
c. Victim is under 16
d.During the course of the stalking Defendant possessed a deadly weapon
e.Previously been convicted of stalking (within 7 years)
£, Defendant was previously convicted of a crime against the same victim
involved in the stalking (specific list, i.e. domestics, battery’, assaults,
kidnapping, etc.)
Penalties: 5 years prison and/or $10,000 fine
2" (Misdemeanor)(I.C. 18-7906)-
Misdemeanor Stalking
a. Everything that does not rise to the level of felony stalking is a
misdemeanor
Penalties: _ 1 year county jail and/or $1,000 fineCANYON COUNTY
HE Ri rF F
a Expect the Best! ~
xpe
Survivor Checklist
Civil Protection Order:
 
‘Need the application?
Victim Information Notification Everyday:
Prosecutor is:
Appt with Prosecutor:
Next Court Date:
Medical:
Counseling:
‘No Contact Order:
Additional Follow Up Photos?
Crime Victims Compensation Application:
Comments:
 
 
 
Any questions or concerns, feel free to contact Aleshea Lind at 965-5293.Domestic Violence
Civil Protection Order
Fact Sheet
Who Qualifies: Family or household member meaning spouses, former spouses,
persons related by blood or marriage, person who reside or have resided together
and persons who have a child in common regardless of whether they have been
married or have lived together at any time.
What Qualifies: Domestic Violence means the physical injury, sexual abuse or
forced imprisonment or the threat thereof of a family or household member.
Where to Obtain a Protection Order: Canyon County Courthouse, 2™ Floor,
Clerks Office, 1115 Albany, Caldwell, ID 83605, 454-7577
When to Obtain a Protection Order: Monday through Friday before 12:30 p.m.
(Petition must be completed and turned into the Clerks Office by 12:30 p.m.)
 
Domestic Violence Orientation: Persons filing for a protection order will be
ordered to attend a domestic violence orientation. ‘The class is an overview of
domestic violence and protection orders that provides information to the petitioner
in order to assist them through the process.
When are the orientation classes held? There are two classes: one every
Tuesday from 3-5, Canyon County Courthouse, Third floor, Room 334 or one
every Thursday from 6-8, Canyon County Courthouse, Third floor, Room 334.
At the time of the class a legal advocate will be assigned to appear in court with
the petitioner for their 90 day order. The 90 day hearings are generally held on
Thursday mornings at the Canyon County Courthouse.
Copies of petitioner’s protection orders can be made at Valley Crisis Center ot
Hopes Door for schools, daycare’s, ete.
Protection Orders may be renewed for up to one year. Modification may be filed
at any time. This is done at the Canyon County Courthouse, Clerks Office.
If you have questions, you may call either local Canyon County Shelters.
Valley Crisis Center Hope’s Door
465-5011 or 467-4145 459-4779APPLICATION FOR COMPENSATION
RETURN APPLICATION TO:
CRIME VICTIMS COMPENSATION PROGRAM
  
 
 
 
INDUSTRIAL COMMISSION
P.O. BOX 83720
BOISE ID 83720-0041
(208) 334-6080 or (800) 950-2110
ELEASE NOTE: YOU MUST COMPLETE ALL OF THE FOLLOWING INFORMATION ON EACH
OF THE FOUR PAGES OF THIS APPLICATION. PLEASE P!
1. INFORMATION REQUIRED ABOUT THE VICTIM. ‘SEX: MALE. FEMALE,
VICTIM'S NAME: MARITAL STATUS:
VICTIM'S MAILING ADDRESS:
—_
CITY/STATE: PHONE :( >»
VICTIM'S SOCIAL SECURITY NUMBER:, VICTIM'S BIRTHDATE: _/__/
VICTIM'S DATE OF DEATH: __/
  
|__ (ifapplicable)
DID THE VICTIM MISS AT LEAST A WEEK OF WORK AS A RESULT OF CRIME RELATED INJURIES?
 
No___ Yes___IF YES, please complete the following:
VICTIM'S EMPLOYER'S BUSINESS NAME AT THE TIME OF CRIME:
VICTIM'S EMPLOYER'S MAILING ADDRESS :
CITY/STATE: z: PHONE: ( d,
CONTACT PERSON, PAY RATE $ PER HOUR,
 
DATES MISSED WORK: FROM. To
DID YOU RECEIVE TIPS ORGRATUITIES? No____ Yes ‘tyes, please estimate the amount per week you
received.
 
2. IF THIS CASE INVOLVES A DECEASED VICTIM, WE REQUIRE THE FOLLOWING INFORMATION ([f ihe victim
1s not deceased, SKIP THIS SECTION AND GO TO SECTION NO. 3)
DID THE VICTIM HAVE CHILDREN OR OTHER DEPENDENTS? IF SO PLEASE COMPLETE THE
FOLLOWING:
‘Name of Child/Dependent Date of Birth Relationship to Victim
 
 
 
If additional space is needed, please attach separate sheet of paper
 
 
‘***CONTINUE TO PAGE 2 OF THE APPLICATION *#*
rev: 07/15/004
3. IF YOU ARE COMPLETING THIS APPLICATION FOR A MINOR OR DECEASED VICTIM, THE FOLLOWING
INFORMATION IS REQUIRED ABOUT YOU
YOUR NAME;
 
YOUR EMPLOYER'S NAME: PHONE (____)
‘YOUR SOCIAL SECURITY NUMBER: PHONE ( d.
‘YOUR MAILING ADDRESS:
CITY/STATE: Zp:
 
 
 
YOUR RELATIONSHIP TO VICTIM:
(IF LEGAL GU. Jor CONSERVATOR
4. INFORMATION REQUIRED ABOUT THE CRIME
 
  
MUST PROVIDE COPY OF COURT ORDER)
   
 
 
‘TYPE OF CRIME:
DATE OF aM
CRIME: TIME, PM (or From To )
LOCATION: (Street
OF CRIME: (Town/City) address where crime occurred),
LAW ENFORCEMENT AGENCY CRIME REPORTED TO:
DATE CRIME aM
DISCOVERED: DATE CRIME REPORTED : TIME, PM
 
 
 
NAME OF INVESTIGATING OFFICER, REPORT NO :
 
 
NAME OF PERSON(S) WHOCOMMITTED CRIME =
RELATIONSHIP TO VICTIM AND AGE OF PERSON(S) WHO COMMITTED CRIME +,
(example: friend, acquaintance, uncle, brother, sister, stranger, et.)
BRIEFLY DESCRIBE INCIDENT ([f additional space is needed, please attach separate sheet of paper)
 
 
 
 
NAME OF VICTIM/WITNESS COORDINATOR:,
HOW DID YOU LEARN OF THIS PROGRAM?,
 
5, INFORMATION REQUIRED ABOUT OTHER BENEFIT SOURCES
 
CHECK IF YOU OR THE VICTIM HAVE OR HAVE APPLIED FOR ANY OF THE FOLLOWING BENEFITS:
© CAR INSURANCE © MEDICAL INSURANCE 0) HEALTH & ACCIDENT INSURANCE
0 WORKERS COMPENSATION © SICK LEAVE WAGE LOSS INSURANCE
Q. DISABILITY INSURANCE © SOCIAL SECURITY BENEFITS] INDIAN HEALTH SERVICES
Q MEDICARE: MEDICARENO._ 0 MEDICAID: MEDICAID NO.
© OTHER: (explain),
 
‘***CONTINUE TO PAGE 3 OF THE APPLICATION***
2‘NAME & ADDRESS OF INSURANCE COMPANY:
$e
‘TELEPHONE NO: POLICY NO.
SECOND INSURANCE POLICY INFORMATION:
NAME & ADDRESS OF INSURANCE COMPANY,
eee
TELEPHONE NO; POLICY NO.
ARE YOU BEING REPRESENTED BY A PRIVATE ATTORNEY IN A CIVIL LAWSUIT OR INSURANCE ACTION
RELATING TO THIS INCIDENT ?,
ATTORNEY'S NAME PHONENO(___)
ATTORNEY'S ADDRESS.
 
CITY/STATE, —— Po
IF YOU HAVE NOT SUED THE PERSON WHO COMMITTED THE CRIME IN A CIVIL ACTION, DO YOU PLAN TO SUE
THAT PERSON? YES
     
6, STATISTICAL INFORMATION: The following information is used for statistical purposes only. It is needed to comply with
federal regulations.
Race: White Black Native American __Hispanic_Oriental/Asian ___ Other
Are you aU. S. citizen? Yes. No.
‘Are you an Idaho resident? Yes___ NO,
Disabilities: Hearing __Mot Visual Mental Multiple __ Other None
7. INFORMATION REQUIRED REGARDING MEDICAL, DENTAL, MENTAL HEALTH TREATMENT, ETC.
 
 
 
      
LIST NAMES OF ALL DOCTORS, DENTISTS, CLINICS, HOSPITAL, COUNSELORS, AMBULANCE, AND ANY OTHERS
WHO HAVE PROVIDED TREATMENT OR SERVICES TO THE VICTIM RELATING TO THE CRIME. (Attach additonal pages
ifnecessary).
COMPLETE NAME OF PROVIDER COMPLETE MAILING ADDRESS, CITY, STATE ZIP
 
 
 
 
 
 
 
 
‘“***CONTINUE TO PAGE 4 OF THIS APPLICATION****
3E wi CTI TO AND SIGNED TO TION
 
 
INFORMATION RELEASE,
give permission to release to and receive from any hospital, clini, doctor, insurance company, employer, mental health provider,
treatment center, person, agency of any other entity any needed information to the IDAHO CRIME VICTIMS COMPENSATION
PROGRAM. [ also give permission tothe Program to release copies of any of my medical or mental health records necessary tothe
prosecuting attomey to secure restitution from the alleged offender in order to reimburse the fund.
understand the information will be used to determine compensation benefit, and that only information needed to make a decision
about the application on any claim for compensation benefits or otherwise deemed necessary by the Program to achieve its statutory
‘mandate will be requested from other entities or released by the Program. With these exceptions, all information provided willbe kept
strictly confidential.
 
{understand this information release is valid for one year from the date of my signature and that I can cancel this release by writing to
the Program at any time, except any information that has already been received and used its not subject to cancellation.
1 understand a photocopy or facsimile of ths signed form is as valid as the original, and that my signature gives permission forthe
release of all information specified in this permission form.
Federal law specifically requires that ay disclosure or redisclosure of mental health, drug/alcohol or AIDS related information must be
accompanied by the following written statement:
‘This information has been disclosed to you from records protected by Federal confidentiality rules (42 CRF Part 2). The Federal
rules prohibit you from making any further disclosure of this information unless disclosure is expressly permitted by the writen
Consent of the person to whom it pertains or as otherwise permitted by 42 CFR Part 2. A general authorization forthe release of
medical or other information is NOT sufficient for this purpose. The Federal rules restrict any use of this information to criminally
{investigate or prosecute any drug/aleohol abuse patient.
 
 
 
 
XXX, DATE
jctim is a minor)
relationship to victim.
9. REPAYMENT AND SUBROGATION AGREEMENT
understand that Idaho law requires me to contact and repay the Program if1 receive crime-related payments from the offender, a civil
lawsuit, an insurance program, any other government or private agency or any other source aftr I receive payment(s) from the
Program.
1 las acknoiviédge thatthe Prograim has a first lien against any money payable to mé from any of such sources.
understand and agree to the terms of this Repaymedt And Subrogation Agreement,
 
XXX DATE
Applicant signature (parent or guardian must sign if victim is a minor)
Printed Name of Applicant relationship to vietim,
 
 
10. APPLICATION CERTIFICATION
 
 
 
 
{ certify thatthe information inthis application is true and correct to the best of my knowledge. I understand by signing below I agree
to ll ofthe provisions inthis Application for Compensation.
XxX, DATE
‘Applicant signature (parent or guardian must sign i victim is @ minor)
Printed Name of Applicant. relationship to victim, =
 
4COMMUNITY RESOURCES
IF YOU NEED HELP, CALL:
CANYON COUNTY PROSECUTOR'S OFFICE
‘VICTIM WITNESS UNIT
CANYON COUNTY SHERIFF'S OFFICE
VICTIM WITNESS UNIT
NAMPA POLICE DEPARTMENT
VICTIM WITNESS UNIT
NAMPA CITY PROSECUTOR
‘VICTIM WITNESS UNIT
NAMPA FAMILYJUSTICE CENTER
CALDWELL CITY PROSECUTOR'S OFFICE
PARMA/WILDER VICTIM WITNESS COORDINATOR
SART - Sexual Assault Response Team
EMERGENCY SHELTER
VALLEY CKISIS CENTER (NAMPA).
HOPES DOOK (CALDWELL)
PROJECT DOVE
HOUSING
Community Family Shelter
Lighthouse Rescue Mission (men only)
‘Nampa Housing Authority
Boise City Light
Community House
Serenity House
Booth Center
COUNSELING SERVICES
SANE SOLUTIONS __
VALLEY CRISIS CENTER
 
 
IDAHO DOMESTIC VIOLENCE HUTLINE, — — ~
‘Compassionate Friends Support Group (Meets 2nd Friday of each moath at St Lakes Mercian at 715 pm)
Uaho Suicide Prevention Hotline
PROJECT ROSE 2-HOUR CRISIS HOTLINE.,
LEGAL SERVICES
‘Domestic Violence Legal Advice Line
IDAHO VOLUNTEER LAWYERS
IDAHO LEGAL AID.
PROTECTION ORDERS.
INFORMATION/ADVOCACY
IDAHO CARE LINE
ADVOCATES AGAINST FAMILY VIULENCE
TDAHO COALITION AGAINST SEXUAL AND DUMESTIC VIOLENCE,
IDAHO COUNCIL ON DOMESTIC VIOLENCE,
NUTRITION
 
HEALTH AND WELFARE (FOOD STAMP PROGRAM)
NAMPA
CALDWELL
IDAHO HUNGER ACTION COUNCIL,
 
WIC PROGRAM (WOMEN AND INFANT CARE), :
1LOCAL CHURCHES Q¢ANY HAVE FOOD CUPEUARDS AVAILABLE TO THOSE IN NEED - CONSULT YOUR LOCAL TELEPHONE DIKECTORY
SUPERVISED VISITATION & EXCHANGES
ROCK OF AGES
EMPLOYMENT
SOUTHWEST CENTER FOR NEW DIRECTIONS B51.
SOUTHWEST PRIVATE INDUSTRY COUNCIL,
JSAP PROGRAM (HEALTH AND WELFARE] _
JOB PROGRAM DEPT. OF EMPLOYMENT.
IDAHO COMMERCE AND LABOR....
‘MEDICAL SERVICES
‘TERRY REILLY HEALTH SERVICES
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
454.7391
455.5970
475.5718
475.5721
415.570
455.3116
722.59)
497-1726
465-5011
 
(641)-889.2900
461.3733
461-5030
466-2601
368.9901,
389.9840
424-1323
343.3571
463.2314
465-5011
1-800-669-3176
467-1947
1-800-564-2120
 
1-877-500-2980
334-4510
454.2591
454.7577
459.6279
384.0819
334.6512
465-444
454.0421
336-7010
455-5330
455-1499
385.3126
322-4028
454.7705
454-7680
364-7781
au