0% found this document useful (0 votes)
88 views23 pages

Stalking Packet

The document outlines various types of stalkers, including rejected, resentful, predatory, intimacy seekers, incompetent suitors, and cyberstalkers, detailing their motivations and behaviors. It also discusses the characteristics of stalkers, their potential victims, and the impact of stalking in workplace and school environments. Additionally, it provides guidance on what to do if someone is being stalked, emphasizing the importance of documentation, safety, and formal complaints.

Uploaded by

Kimberly Baker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
88 views23 pages

Stalking Packet

The document outlines various types of stalkers, including rejected, resentful, predatory, intimacy seekers, incompetent suitors, and cyberstalkers, detailing their motivations and behaviors. It also discusses the characteristics of stalkers, their potential victims, and the impact of stalking in workplace and school environments. Additionally, it provides guidance on what to do if someone is being stalked, emphasizing the importance of documentation, safety, and formal complaints.

Uploaded by

Kimberly Baker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 23
Stalking — Who are these people? Rejected Stalker The most common, persistent and intrusive of all stalkers, the rejected stalker is obsessed with someone who is a former romantic partner or friend, and who has ended their relationship with the stalker, or indicates that he or she intends to end the relationship. Depending on the responses of the victim, the stalkers goals will vary, and the rejected stalker usually struggles with the complex desire for both reconciliation and revenge. As Mullen writes, "A sense of loss could be combined with frustration, anger, jealousy, vindictiveness, and sadness in ever-changing proportions.” This stalker may be very narcissistic, and may fee! humiliated by the rejection. In most cases, they will have poor social skills and a poor social network. They are also the most likely to try to harm the victim in some way, and may employ intimidation and assault in their pursuit, They may become jealous if their victim enters or continues a romantic relationship with another person. A history of violence in the relationship with the partner is not uncommon. Resentful Stalker This stalker is looking for revenge against someone who has upset them--it could be someone known to the stalker or a complete stranger. The behaviors are meant to frighten and distress the victim. The stalker views the target as being similar to those who have oppressed and humiliated them in the past, and they may view themselves as someone striking back against an oppressor. Or, the victim could be a professional believed to have cheated or abused the stalker in some way. Often irrationally paranoid, this kind of stalker can be the most obsessive and enduring. While the least likely to use physical force, the resentful stalker is the most likely to verbally threaten the victim, ‘They may use personal threats, complaints to law enforcement and local government, property damage, theft or killing of pet, letters or notes on the victim's car or house, breaking into the victim's house or apartment, or watching the victim's movements. Predatory Stalker ‘The least common of all the stalkers, this is the classic sexual predator whose plan is to physically or sexually attack the victim. They are motivated purely by the desire for sexual gratification and power over their victim. This type of stalker is sexually deviant, hhas poor social skills, and usually has lower than normal intelligence. They usually will not have any direct contact with the victim while they are stalking them. This stalker ‘may engage in such behaviors as surveillance of the victim, obscene phone calls, fetishism, voyeurism, sexual masochism and sadism, exhibitionism. The victim can be either someone the stalker knows, or a complete stranger. Intimacy Seeker ‘The intimacy seeker seeks to establish an intimate, loving relationship with their victim. To them, the victim is a long sought-after soul mate, and they were meant to be together. Also, they may have the delusion that the victim is in love with them-usually called erotomania. They may interpret any kind of response from the victim as encouragement, even negative responses. This stalker may write letters, send gifts, or call their victim. They may believe the victim owes them love because of all they have invested in stalking them, and is very resistant to changing their beliefs. The intimacy seeker has an inflated sense of entitlement, and if they recognize they are being rejected, this stalker ‘may become threatening, or may try to harm the victim in some way, sometimes using violence. (In this way, they may become a rejected stalker, see above.) This stalker may become jealous if their victim enters or continues a romantic relationship with another person. After the rejected stalker, the intimacy seeker is the most persistent type of stalker. They are usually unresponsive to legal sanctions, viewing them as challenges to overcome that demonstrate their love for the victim. Incompetent Suitor The Incompetent Suitor desires a romantic or intimate relationship with the victim but is impaired in their social and courting skills. ‘This stalker may be very narcissistic, and cut off from victim’s feelings (Lack of empathy). The incompetent believes that anyone should be attracted to them. Typically, this stalker will repeatedly ask for dates, or call on the phone, even after being rejected. They may attempt physical contact by trying hold the victim's hand or kiss the victim, however, the will not become physically violent or threatening. The incompetent suitor is less persistent than others, and is likely to have stalked numerous others in the past, and will probably do so in the future. ‘They will quickly stop stalking if threatened with legal action or after receiving counseling, This stalker believes that the victim is in love with them. They believe this even though the victim has done nothing to suggest itis true, and may have made statements to the contrary. The erotomaniac reinterprets what their vietim says and does to support the delusion, and is convinced that the imagined romance will eventually become a permanent union. This stalker may suffer from acute paranoia, and typically chooses a victim of higher social status. They will repeatedly try to approach and communicate with their supposed lover, and is typically unresponsive to threats of legal action of any kind. Without psychological treatment, this stalker is likely to continue with their activities. Cyberstalking and Cyberstalkers Cyberstalking is an extension of the physical act of stalking; however, the behavior ‘occurs using electronic mediums, such as the Internet and computer sypware. Someone who is physically stalking an individual may employ cyberstalking as another means to pursue, harass, or force contact. Or, cyberstalking may be the sole means of surveillance and pursuit of the victim. The stalker may join forums they know their target frequents, and pose as someone else in an attempt to contact their target, or they may contact other members to get information about the target or defame their character. They may use spyware to access their target's computer and the personal information contained within. Given the vast distances that the Internet spans, a "pure" cyberstalker will never move beyond electronic mediums and into physical stalking. Still, this does not mean that the behavior is any less distressing, frightening, or damaging, and a cyberstalker's motives can fit any of the categories described above. Moreover, given the ability of individuals to ‘mask’ their identity when using the Internet, linking the harassment to one particular individual can be difficult. Programs that mask IP (Internet Protocol) addresses, and anonymous remailers are merely two examples that hinder the identification of the stalker and their (digital) location. Who Becomes a Stalker Stalkers are usually isolated and lonely, coming from the "disadvantaged" of our society; however, a stalker can occupy any place in our entire social spectrum. Often, the stalking may be triggered by a significant trauma or loss in the life of the perpetrator, usually within at least seven years of the stalking behavior. (For example, relationship dissolution or divorce, job termination, loss/potential loss of a child, or an ill parent.) Most stalkers are not psychotic. In a comparative study of psychotic versus non- psychotic stalkers (Mullen et al. 1999), 63% of the sample was found to be suffering from a common psychiatric condition, such as major depression, personality disorder, or substance dependence--with personality disorder being the most common diagnosis. Ex-intimates: Common stalkers are people who previously shared a romantic relationship with the victim, and former intimates are the most common type of stalking target. This can be either from a long or short term relationship. Family members: A stalker may target a member of their family, such as a parent or sibling. This would most likely be a resentful or rejected stalker, and they would target a family member they feel had rejected, humiliated, or abused them in the past. Friends and Acquaintances: The victim may be stalked by an intimacy seeker or an incompetent suitor motivated by a desire to start a romantic relationship with the victim. The victim may be stalked by a resentful stalker, typically a neighbor, who may be involved in a disagreement with the victim about something such as noise, the location of a tree, or pets. Workplace Contacts: In their study of stalkers, Mullen (et al) found that 23% had a professional relationship with their victim, most often a medical practitioner. Other stalkers may be supervisors, fellow employees, service providers, clients, or others who show up at the victim's workplace. Stalking behaviors directed at the victim may include: sexual harassment, physical and sexual assaults, robberies, or even homicide. A violent workplace stalker usually has a history of poor job performance, a high rate of absenteeism, and a record of threats and confrontations with people they resent in the workplace. The United States Justice Department found that in the U.S., between the years 1992 and 1996 over 2 million people were the victims of violent crime in the workplace. This included: 1.5 million assaults 51,000 rapes 84,000 robberies Over 1000 homicides (disgruntled employees--usually resentful stalkers are responsible for most workplace homicides. Victims often do not tell their co-workers or supervisors about the person who is stalking them because they fear reprisals from the stalker or other employees, don't think they will be believed, or feel embarrassed about the situation. (For other reasons, see Confusion and Denial, on the home page) Doctors, nurses, psychologists, or other healthcare providers may become the targets of stalking by obsessed clients or patients. (Or the other way around) Teachers may become stalked by students. (Or the other way around.) Psychiatrists are at particular risk for being the targets of stalking because of their contact with people with psychiatric conditions. Strangers: These are most commonly Intimacy Seekers and Incompetent Suitors, but may also be Predatory stalkers or Resentful stalkers. These stalkers may hide their identity from their victims at first, and reveal it after stalking their victim for some time in order to get closer to them. Victims may be initially flattered when stalker approaches them and respond politely. ‘They may even agree to go on a date with their stalker, after many requests. This can have the unintentional effect of encouraging the stalker, and making them believe that their love is reciprocated. Gender: Stalkers are far more likely to be male, however, women can also become stalkers. Women are more likely to target someone they have known, usually a professional contact. Men are less likely to pursue other men, while females will often target other females. The majority of female stalkers are intimacy seekers seeking to establish relationships, whereas men show a broader range of motivations, and are more often to be seeking to restore relationships. Women are as likely to use violence as ‘men, and there does not tend to be a difference between genders regarding the duration of, asstalking. Thus, while the contexts and motives for stalking may differ between men and women, the intrusiveness of the behaviors and potential for harm does not. P. E Mullen, Sexual Harassment Support, 2006 What to do if you are being Stalked Get the message across Communicate to the stalker that their attention is unwelcome, but do not do this Yourself, In fact, do not have any direct contact with the perpetrator as long as they are stalking you. Forcing contact is one of the goals of stalking, and you will simply be reinforcing the behavior if you communicate directly with her/him, Have someone else communicate your feelings for you. Have a friend, a teacher, supervisor, dean, or someone else that you trust talk to the stalker. Important note: Schools and some companies are now requiring immediate intervention if they learn there is harassment occurring. If you are a student being stalked by a teacher, professor, or other employee at your school, any school employee you speak to about the harassment is required by law to report the behavior to the administration. This is also becoming policy at some companies--if you are being harassed by another employee, check your company sexual harassment policy before talking to a supervisor as they may be obligated to report the harassment to the higher- ups. If your situation reflects either of these, it's best to be careful who you talk to, or be sure of the timing, otherwise you may end up in a formal investigation without wanting to be, or before you are ready. Be Safe Utilize the National Center for the Victims of Crime safety plan measures included with this packet. Document Everything! Document every incident of harassment: You will be tempted to ignore the behavior, telling yourself it will stop eventually. However, in most cases, the stalking continues. So, keep a log of what is happening, particularly if the perpetrator is a teacher, professor, or supervisor. Document each incident, including dates, times, names of witnesses, etc. Save e-mails to a disc and keep it at home. Do not throw away any mail or email that is related to the harassment, even if the mail is anonymous. Do not throw away any gifts that the stalker sends you. Save answering machine messages. If it is legal in your state, try to tape record any phone calls. Take pictures of any property damage. Video tape and/or photograph stalking behavior (camera phones can be a great tool for documenting stalking). Police reports can also be great sources of documentation, While the legislation in many states does not allow for police intervention unless the stalking behavior contains threats or involves attacks, police reports are an official form of documentation and could strengthen a case later on. Even if the stalker’s behavior in your situation is not directly threatening, see if you can file a police report anyway. Stalking By A Work Or School Employee Document your work and/or school performance. Keep copies of performance evaluations and memos that attest to the quality of your work. Save papers and exams that have comments by your professors. Ask for written recommendations from your teachers that you can keep on file for later. The stalker may question your work or school performance in order to justify their behavior. Document negative actions: Document any negative actions that you experience because of your refusal to submit to the stalkers demands or attentions--for example, if you are given a poor evaluation, a demotion, or low grade because of your rejecting the stalker. Power in numbers: If possible, find others who have had similar experiences as you have had with the stalker, or within the environment where the harassment is occurring. Cyberstalking Utlilize the NCVC protocol on protecting yourself from cyberstalking included with this packet. Formal Complaints ‘What you can do to confront stalking usually varies from state to state. In some states, you can file a complaint under the state statute, but only if your stalker has threatened you with physical harm, In others, the statutes mandate that less extreme acts of harassment are sufficient fora restraining order or police arrest. Obtain a copy of your state's stalking statute in order to gain a clear understanding of what conduct constitutes an offense under the statute. If you are being stalked by someone from your workplace or school, and the stalking is such that you cannot file under your state statute, you can use the formal channels for grievances provided by the institution. Formal Complaints at School or Work Begin with the available grievance channels: In the workplace, the Human Resources department is usually responsible for dealing with sexual harassment complaints, at least initially, so this may be the place to begin if you are being stalked by another employee at work. At school, stalking will be in the "domain" of any number of departments: campus security, affirmative action office, ombudsman, student affairs office, dean of students, etc. Call your dean of students office to find out the proper channels for stalking at your school. But be aware that the primary goal of any department you consult will be to protect the schoo! or business from liability--ethics are not likely to guide their decisions, nor will they be likely to guide many of the people involved in your situation. In many cases, complainants are treated like "the enemy." Keep notes of meetings and phone conferences: Be sure to keep detailed notes of every meeting you have regarding the stalking, including dates, names of participants, and the meeting results. If possible, you might want to tape record the meetings, or bring an advocate or friend so you have a witness to what transpired. It is also a good idea to send written summaries of the results to the attendees after each meeting. (It shows them ‘you are keeping on top of things.) Document retaliation: Retaliation for complaining about stalking is also illegal. Document any instances you experience just as you would the harassment. It is likely that the majority of the hostility comes from colleagues of the harasser, but this does not. change the legality. All retaliation is unlawful regardless of who is doing it Stay composed: Most importantly, remain calm and professional during the entire Process as your demeanor and psychological state will be under scrutiny. Save your anger for a private counselor's office. If you have exhausted all the avenues and the problem continues or worsens, we recommend you contact a lawyer (if you have not done so already). If you are thinking of taking legal action, it is best for you to not leave school or your job without consulting a lawyer first. Note: institutions, particularly universities, have been known to drag out investigations so that too much time passes for the victim to file a lawsuit later on--there is usually a 1 year statute of limitations on cases. If you suspect this is happening, go ahead and consult a lawyer now. Note on workplace harassment: In most cases, you must file with the EEOC, first, before you can take any independent legal action. The EEOC will only rule on cases where the harassment occurred within the last year, so the incidents will have to be relatively recent. Do not leave your job if you are thinking about filing a formal complaint with the EEOC, as this will weaken your case. Note on school harassment: Recent changes to Title IX hold academic institutions ‘more liable for protecting harassment complainants from retaliation. Also, your identity must be kept confidential except where necessary for investigative purposes. Know your rights in this process ahead of time. If the institutional grievance channels do not clear up the situation, besides contacting a lawyer, contact the U.S, Department of Education's Office of Civil Rights. How Do I File a Complaint Under My State's Stalking Statute? To file a complaint that will trigger an arrest and prosecution, it must be accompanied with sufficient evidence to establish "probable cause" that the stalker engaged in conduct that is illegal under the state's stalking statute. If law enforcement officials do not witness such conduct first-hand, itis often up to the victim to provide them with the evidence necessary to establish probable cause. Again, victims would be well-advised to obtain a copy of their state's stalking statute in order to gain a clear understanding of what conduct constitutes an offense under the statute, While most state stalking statutes are written in laymen's terms, the exact meaning of those terms is not always clear. Victims may wish to consult with law enforcement officials, a victim witness coordinator, prosecutors, or a private attorney for an explanation and interpretation of the specific stalking statute in question, In other words, stalking victims are often put in a position of having to first prove their case to a law enforcement official before being afforded the opportunity to prove their case before a court of law. It is for this reason that itis crucial for stalking victims to document every stalking incident as thoroughly as possible, including collecting and keeping any videotapes, audiotapes, phone answering machine messages, photos of the stalker or property damage, letters sent, objects left, affidavits from eye witnesses, notes, etc. Experts also recommend that victims keep a journal to document all contacts and incidents, along with the time, date and other relevant in-formation. (See, the NCVC "Stalking: Safety Plan Guidelines," for more information concerning evidence and safety strategies.) Regardless of whether or not they have sufficient evidence to prove a stalking violation, victims wishing to file a stalking complaint with law enforcement officials should do so at the earliest possible point in time. In some cases, victims may also be able to file a ‘complaint in the jurisdiction where the offender resides, if itis different from the victim's. If law enforcement officials refuse to investigate, or if they are not responsive to a complaint filed, victims may always directly approach their local prosecutor. It is also recommended that any person who suspects or believes that they are currently being stalked should immediately seek the advice and assistance of local victim specialists in developing a personalized safety plan or action plan. Victim specialists can be found at local domestic violence or rape crisis programs -- which should be listed under "Community Services Numbers" or "Emergency Assistance Numbers" in the front section of the local phone book -- or in victim assistance programs located in most local prosecutors' offices and in some law enforcement agencies -- which should be listed under "Local, City or County Government" in the Blue Pages of the local phone book. Victims of Stalking Safety Protocol Victims of stalking include individuals presently at risk for imminent danger to their physical and/or emotional welfare, and those with danger continually pending, but not immediately at risk for harm. In addition to becoming familiar with stalking laws that presently exist, victims of stalking should be informed about the resources and procedural precautions available to assist and protect them. It is important for stalking victims to recognize that their victimization is not their fault. Stalking is a crime that can touch anyone, regardless of gender, race, sexual orientation, socio-economic status, geographical location, or with whom a person may associate. Unfortunately, there is no single psychological or behavioral profile for stalkers. Every stalker is different. This makes it virtually impossible to devise a single effective strategy for victims to cope with stalkers’ behavior which can then be applied to every single situation and all circumstances. This is why itis so vital that victims of stalking immediately seek the advice of local victim specialists who can work with them to devise a safety plan or action plan to address their unique situation and circumstances. Victim specialists can be found in local domestic violence and rape crisis programs, as well as in victim assistance programs in local prosecutors’ offices and in some law enforcement agencies. The following is not intended to be a set of strict guidelines for stalking victims, but, rather practical information to assist them. There is no guarantee that if you follow all, or some, of these strategies that you will be safe; however, implementing these strategies ‘may reduce your odds of physical or emotional harm from your stalker. Any persons who suspect or believe that they are currently being stalked should report all contacts and incidents to their local law enforcement authorities. Victims in Imminent Danger The primary goal of a victim in imminent danger should be to locate a safe place for her/himself. Safety for stalking victims can often be found in the following places: * Police stations; * Residences of family/friends (location unknown to perpetrators); * Domestic violence shelters or local churches, ete.; and/or * Public areas (stalkers may be less inclined toward violence or creating a disturbance in public places). If departure from the current location is not possible, but a telephone is accessible, a victim may contact local law enforcement at 911 or any other law enforcement or emergency number. If the police do not respond, a victim can ask to speak to the police unit or division supervisor, or have someone who has assisted them in the past contact, police. In dangerous situations, family members or friends can assist in a victim's departure from their home or office. It is advised that as much caution as possible always be exercised when directly confronting the offender, as stalking sometimes escalates into violence. Upon reaching safety, a victim may want to communicate with local law enforcement, victim services, mental health professionals and/or some social services agencies in order to receive additional assistance and referrals available in the community. A victim of stalking should always identify her/himself as such and request confidentiality of all information given and any records kept or filed. If the stalker caused property damage or physical harm, the victim may choose to file a report with law enforcement as soon as possible. Victims in Danger, But Not Immediately at Risk While a victim may not be in immediate danger, she/he needs to assess the probability of impending danger. If a stalking victim determines that she/he is at risk for being in a potentially harmful or violent situation, the following options may be considered: 1. Protection Order. Generally, these orders require the offender to stay away from -- and not interfere with -- the complainant. If violated, they may be punishable by incarceration, a fine or both. ‘These orders are typically obtained through a magistrate's office or local court. Contact the local clerk of court's office for information about where to obtain orders. Restraining orders are not foolproof -- they often do not extend beyond certain lines of jurisdiction, and can only be enforced if they are broken. Victims should be cautioned against developing a false sense of security. In addition, some states only provide protective orders to former spouses or intimates. Orders are not assured -- they are at the court's discretion, 2. Stalking Laws. Basically, stalking laws make it a crime to willfully, maliciously and repeatedly harass, follow or cause credible threat to another individual in an attempt to frighten or cause harm, A victim's state or municipality may have a stalking law either in effect, passed but not effective until a later date, or currently pending passage. In addition, some jurisdictions are not enforcing their stalking laws, and in others the laws are under judicial challenge. A victim may contact her/his local prosecutor's office to inquire about the state and ‘municipal stalking laws and their applicability to her/his case. Mlegal Acts. A victim may determine that the perpetrator has broken the law by entering the victim's residence without her/his permission, stealing and/or destroying the victim's property, physically and/or sexually assaulting the victims, ete If so, these acts may be punishable. Notifying police of illegal acts may be important for the following reasons: 1. If convicted, the perpetrator may be incarcerated and/or ordered to stay away from the victim; 2. Charges may intimidate the offender, sending the message that his/her actions are illegal and will not be tolerated; and 3. Notifying the police produces documentation, which may be useful in a future complaint for evidentiary or credibility purposes. 4. Documentation. Documentation of stalking should be saved and given to law enforcement. Documentation of the actions of the perpetrator may be useful in future complaints or proceedings, for evidentiary or credibility purposes. Documentation may take the form of photos of destroyed property/vandalism, photos of any injuries inflicted on the victim by the perpetrator, answering machine messages saved on tape, letters or notes written by the perpetrator, etc. A victim should keep a written log of any crimes or suspicious activities committed by the perpetrator. Discretion should be used when making entries and it should be kept in a secured place, as the log may be used in court proceedings. 5. Contingency Plans. While a victim may not be in imminent danger, the potential always exists; therefore, a contingency plan (asort of "fire escape plan") may be appropriate. Suggested considerations include: 1. Knowledge of, and quick access to, critical telephone numbers, including: + Law enforcement numbers and locations; + Safe places (such as friends, domestic violence shelters, etc.); and * Contact numbers for use after safety is secured (such as neighbors/family, attomneys, prosecutors, medical care, child care, pet care, etc.). 2. Accessible reserve of necessities, including: + Victims may wish to keep a small packed suitcase in the trunk of their car, or at another readily accessible location, for quick departure; «Reserve money may be necessary; 3. Other necessities -- such as creditors’ numbers and personal welfare items such as medication, birth certificates, social security information, passports, etc. - should be readily available; Miscellaneous items -- like always keeping as full a tank of gas as possible in the car, backup keys for neighbors, etc. - are practical; and Ifa victim has a child(ren), she/he may want to pack a few toys, books, or other special items belonging to the child. Alert critical people to the situation who may be useful in formulating a contingency plan, such as: 6. Prevent Law enforcement; Employers; Family, friends, or neighbors; and Security personnel. tive Measures. Install solid core doors with dead bolts. If victim cannot account for all keys, change locks and secure spare keys. If possible, install adequate outside lighting. Trim back bushes and vegetation around residence. Maintain an unlisted phone number. If harassing calls persist, notify local law enforcement, but also keep a written log of harassing calls and any answering machine tapes of calls with the stalker's voice and messages, ‘Treat any threats as legitimate and inform law enforcement immediately. Vary travel routes, stores and restaurants, etc., which are regularly used. Limit time walking, jogging, etc. Inform a trusted neighbor and/or colleagues about the situation. Provide them. with a photo or description of the suspect and any possible vehicles he/she may drive, If residing in an apartment with an on-site property manager, provide the manager with a picture of the suspect. Have co-workers screen all calls and visitors. When out of the house or work environment, try not to travel alone if at all possible, and try to stay in public areas. If you ever need assistance, yell "FIRE" to get immediate attention, as people more readily respond to this cry for assistance than to any other. If financial means exist, use a "dummy" answering machine connected to a published phone line. The number to a private unlisted line can be reserved for close friends and family, then the stalker may not realize you have another line. 7, Alternative Avenues of Assistance. Assistance may be obtained from local sources, such as: 1. Domestic violence shelters or counselors; 2. Rape crisis programs or counselor 3. Victim assistance coordinators in the prosecutor's office; and/or 4. Law enforcement. Victim counselors may either give a referral number to the victim of a stalker, or offer to make the call and have someone from the referral organization or program contact the victim directly. The possibility exists that there will be no appropriate referral in the victim's vicinity. In such cases, local law enforcement agencies should be contacted, Copyright © 1997 by the National Center for Victims of Crime. This information may be freely distributed, provided that itis distributed free of charge, in its entirety and includes this copyright notice. Cyberstalking If you are being harassed on-line, there are several things you should do: 1. If you are under 18, tell your parents or an adult you trust that you are being harassed or threatened. Do not keep this to yourself. Parents must know what is going on to be able to help and support you. 2. If you are getting harassing e-mail, get a new account or request a new log-on name and password from your Internet service provider. Close your old account. Learn how to use the filtering capabilities of your e-mail program to block e-mail from certain addresses. 3. Save every piece of communication you get from the cyberstalker. Save all of the header information you can if it’s an e-mail or newsgroup posting. Print a hard copy, and copy the communication to a disk for documentation. 4, Start a log of each communication explaining the situation in more detail. Document how the harassment is affecting your life and what steps you're taking to stop it. 5. Once and only once, contact your harasser directly and state in simple, strong, and formal terms to stop contacting you and/or posting anything about you. (SHS recommends that you have someone do this for you, thus avoiding any direct contact with the stalker.) State that the communications are unwanted and inappropriate, and that you will take further action if it does not stop. E-mail a copy to the system administrator of your Internet service provider. Save copies of these communications, and note that you sent them in your log. 6. If you receive harassing on-line messages and it is possible to trace the origin of the unwanted message and you have informed the sender that you do not want to be contacted, you may want to consider reporting the on-line stalker to the Intemet service provider (ISP) because many ISPs have policies that prohibit the use of their services to harass or abuse another person. Some ISPs may be willing to cancel the stalker’s account. If you receive abusive e-mail, identify the domain (letters after the @ sign) and contact the ISP. Most ISPs have an e-mail address such as abuse@ [domain name] or postmaster @[domain name] that can be used for complaints. If that does not work, you can usually find contact addresses by going to www.networksolutions.comv/cgi- bin/whois/whois (do a "who is" search on whatever ISP you need). If e-mail complaints don’t work, make a phone call. Save copies of these communications, and note all contacts in your log. Keep in mind, however, that this may be just a short-term fix or may even exacerbate the situation if the stalker discovers that you notified the ISP. [Under those circumstances, he/she may attempt to retaliate against you or begin/continue to stalk you off-line. Regardless of whether the on-line stalking ceases, you need to be aware that the stalker may have obtained personal information on you via the Intemet or through other sources, and, consequently, you may be still at risk for off-line stalking, in which case you need to do appropriate safety planning.] 7. Contact your local police. Report every incident of on-line abuse and provide the police with copies of evidence you have collected, Save copies of any police incident reports, and note each contact to law enforcement in your log. If the stalker is out of state, you should also contact your local office of the Federal Bureau of Investigation. 8. Call the FBI Computer Crimes Unit in your local area, {The Federal Interstate Stalking and Prevention Act, 18 U.S.C. Section 2261A, was amended in 2000 to cover. on-line stalking as well as stalking by phone and mail. Also, some on-line stalking cases may fall under 18 U.S.C. Section 875, Interstate Communications (to make threats to physically harm or kidnap another person in interstate communications is a felony) or 47 U.S.C. Section 223, Obscene or Harassing Telephone Calls in Interstate Communications.] In order to better protect yourself on-line: 1. Use a gender-neutral, anonymous screen name. DO NOT USE YOUR REAL NAME. 2. Never give your password to anyone, especially if someone sends you an instant message (IM). 3. Don't provide your credit card number or other identifying information as proof of age to access or subscribe to a web site run by a company with which you are unfamiliar. 4. Tell children not give out their real name, address, or phone number over the Internet without permission, 5. Use a free e-mail account such as Hotmail (www.hotmail.com) or YAHOO! (www.yahoo.com) to pass messages in newsgroups, mailing listings, enter chat rooms, fill out forms, or correspond with someone you don't know well. Don't give your primary e-mail address out to anyone you don’t know. ‘Spend time on newsgroups, mailing lists, and chat rooms as a "silent" observer before "speaking" or posting messages. 8. When you do participate on-line, only type what you would say to ‘someone in person. 9. Don't respond to e-mail from a stranger; when you reply, you are verifying your e-mail address to the sender. 10. On a regular basis (at least once a month), type your name into Internet search engines to see what information, if any, pops up. To have your name removed from any directories, contact each search engine on which you are listed and request to be removed. ae (Tips #1 - 8 were developed by the George Mason University Sexual Assault Services, 1999.) NCVC Recommendations for Victims of On-line Stalking, 2008 Idaho Stalking Laws “Stalking- Means maliciously, and repeatedly, following or harassing behavior towards another person and making a credible threat with the intent to place that person in reasonable fear for his or her own safety, or the safety of his or her immediate family.” 1* Felony)(L.C. 18-7905) - Felony Stalking a.Stalking while a CPOR or NCO is in effect b Stalking while on probation/parole and violates a term of that probation/parole c. Victim is under 16 d.During the course of the stalking Defendant possessed a deadly weapon e.Previously been convicted of stalking (within 7 years) £, Defendant was previously convicted of a crime against the same victim involved in the stalking (specific list, i.e. domestics, battery’, assaults, kidnapping, etc.) Penalties: 5 years prison and/or $10,000 fine 2" (Misdemeanor)(I.C. 18-7906)- Misdemeanor Stalking a. Everything that does not rise to the level of felony stalking is a misdemeanor Penalties: _ 1 year county jail and/or $1,000 fine CANYON COUNTY HE Ri rF F a Expect the Best! ~ xpe Survivor Checklist Civil Protection Order: ‘Need the application? Victim Information Notification Everyday: Prosecutor is: Appt with Prosecutor: Next Court Date: Medical: Counseling: ‘No Contact Order: Additional Follow Up Photos? Crime Victims Compensation Application: Comments: Any questions or concerns, feel free to contact Aleshea Lind at 965-5293. Domestic Violence Civil Protection Order Fact Sheet Who Qualifies: Family or household member meaning spouses, former spouses, persons related by blood or marriage, person who reside or have resided together and persons who have a child in common regardless of whether they have been married or have lived together at any time. What Qualifies: Domestic Violence means the physical injury, sexual abuse or forced imprisonment or the threat thereof of a family or household member. Where to Obtain a Protection Order: Canyon County Courthouse, 2™ Floor, Clerks Office, 1115 Albany, Caldwell, ID 83605, 454-7577 When to Obtain a Protection Order: Monday through Friday before 12:30 p.m. (Petition must be completed and turned into the Clerks Office by 12:30 p.m.) Domestic Violence Orientation: Persons filing for a protection order will be ordered to attend a domestic violence orientation. ‘The class is an overview of domestic violence and protection orders that provides information to the petitioner in order to assist them through the process. When are the orientation classes held? There are two classes: one every Tuesday from 3-5, Canyon County Courthouse, Third floor, Room 334 or one every Thursday from 6-8, Canyon County Courthouse, Third floor, Room 334. At the time of the class a legal advocate will be assigned to appear in court with the petitioner for their 90 day order. The 90 day hearings are generally held on Thursday mornings at the Canyon County Courthouse. Copies of petitioner’s protection orders can be made at Valley Crisis Center ot Hopes Door for schools, daycare’s, ete. Protection Orders may be renewed for up to one year. Modification may be filed at any time. This is done at the Canyon County Courthouse, Clerks Office. If you have questions, you may call either local Canyon County Shelters. Valley Crisis Center Hope’s Door 465-5011 or 467-4145 459-4779 APPLICATION FOR COMPENSATION RETURN APPLICATION TO: CRIME VICTIMS COMPENSATION PROGRAM INDUSTRIAL COMMISSION P.O. BOX 83720 BOISE ID 83720-0041 (208) 334-6080 or (800) 950-2110 ELEASE NOTE: YOU MUST COMPLETE ALL OF THE FOLLOWING INFORMATION ON EACH OF THE FOUR PAGES OF THIS APPLICATION. PLEASE P! 1. INFORMATION REQUIRED ABOUT THE VICTIM. ‘SEX: MALE. FEMALE, VICTIM'S NAME: MARITAL STATUS: VICTIM'S MAILING ADDRESS: —_ CITY/STATE: PHONE :( >» VICTIM'S SOCIAL SECURITY NUMBER:, VICTIM'S BIRTHDATE: _/__/ VICTIM'S DATE OF DEATH: __/ |__ (ifapplicable) DID THE VICTIM MISS AT LEAST A WEEK OF WORK AS A RESULT OF CRIME RELATED INJURIES? No___ Yes___IF YES, please complete the following: VICTIM'S EMPLOYER'S BUSINESS NAME AT THE TIME OF CRIME: VICTIM'S EMPLOYER'S MAILING ADDRESS : CITY/STATE: z: PHONE: ( d, CONTACT PERSON, PAY RATE $ PER HOUR, DATES MISSED WORK: FROM. To DID YOU RECEIVE TIPS ORGRATUITIES? No____ Yes ‘tyes, please estimate the amount per week you received. 2. IF THIS CASE INVOLVES A DECEASED VICTIM, WE REQUIRE THE FOLLOWING INFORMATION ([f ihe victim 1s not deceased, SKIP THIS SECTION AND GO TO SECTION NO. 3) DID THE VICTIM HAVE CHILDREN OR OTHER DEPENDENTS? IF SO PLEASE COMPLETE THE FOLLOWING: ‘Name of Child/Dependent Date of Birth Relationship to Victim If additional space is needed, please attach separate sheet of paper ‘***CONTINUE TO PAGE 2 OF THE APPLICATION *#* rev: 07/15/00 4 3. IF YOU ARE COMPLETING THIS APPLICATION FOR A MINOR OR DECEASED VICTIM, THE FOLLOWING INFORMATION IS REQUIRED ABOUT YOU YOUR NAME; YOUR EMPLOYER'S NAME: PHONE (____) ‘YOUR SOCIAL SECURITY NUMBER: PHONE ( d. ‘YOUR MAILING ADDRESS: CITY/STATE: Zp: YOUR RELATIONSHIP TO VICTIM: (IF LEGAL GU. Jor CONSERVATOR 4. INFORMATION REQUIRED ABOUT THE CRIME MUST PROVIDE COPY OF COURT ORDER) ‘TYPE OF CRIME: DATE OF aM CRIME: TIME, PM (or From To ) LOCATION: (Street OF CRIME: (Town/City) address where crime occurred), LAW ENFORCEMENT AGENCY CRIME REPORTED TO: DATE CRIME aM DISCOVERED: DATE CRIME REPORTED : TIME, PM NAME OF INVESTIGATING OFFICER, REPORT NO : NAME OF PERSON(S) WHOCOMMITTED CRIME = RELATIONSHIP TO VICTIM AND AGE OF PERSON(S) WHO COMMITTED CRIME +, (example: friend, acquaintance, uncle, brother, sister, stranger, et.) BRIEFLY DESCRIBE INCIDENT ([f additional space is needed, please attach separate sheet of paper) NAME OF VICTIM/WITNESS COORDINATOR:, HOW DID YOU LEARN OF THIS PROGRAM?, 5, INFORMATION REQUIRED ABOUT OTHER BENEFIT SOURCES CHECK IF YOU OR THE VICTIM HAVE OR HAVE APPLIED FOR ANY OF THE FOLLOWING BENEFITS: © CAR INSURANCE © MEDICAL INSURANCE 0) HEALTH & ACCIDENT INSURANCE 0 WORKERS COMPENSATION © SICK LEAVE WAGE LOSS INSURANCE Q. DISABILITY INSURANCE © SOCIAL SECURITY BENEFITS] INDIAN HEALTH SERVICES Q MEDICARE: MEDICARENO._ 0 MEDICAID: MEDICAID NO. © OTHER: (explain), ‘***CONTINUE TO PAGE 3 OF THE APPLICATION*** 2 ‘NAME & ADDRESS OF INSURANCE COMPANY: $e ‘TELEPHONE NO: POLICY NO. SECOND INSURANCE POLICY INFORMATION: NAME & ADDRESS OF INSURANCE COMPANY, eee TELEPHONE NO; POLICY NO. ARE YOU BEING REPRESENTED BY A PRIVATE ATTORNEY IN A CIVIL LAWSUIT OR INSURANCE ACTION RELATING TO THIS INCIDENT ?, ATTORNEY'S NAME PHONENO(___) ATTORNEY'S ADDRESS. CITY/STATE, —— Po IF YOU HAVE NOT SUED THE PERSON WHO COMMITTED THE CRIME IN A CIVIL ACTION, DO YOU PLAN TO SUE THAT PERSON? YES 6, STATISTICAL INFORMATION: The following information is used for statistical purposes only. It is needed to comply with federal regulations. Race: White Black Native American __Hispanic_Oriental/Asian ___ Other Are you aU. S. citizen? Yes. No. ‘Are you an Idaho resident? Yes___ NO, Disabilities: Hearing __Mot Visual Mental Multiple __ Other None 7. INFORMATION REQUIRED REGARDING MEDICAL, DENTAL, MENTAL HEALTH TREATMENT, ETC. LIST NAMES OF ALL DOCTORS, DENTISTS, CLINICS, HOSPITAL, COUNSELORS, AMBULANCE, AND ANY OTHERS WHO HAVE PROVIDED TREATMENT OR SERVICES TO THE VICTIM RELATING TO THE CRIME. (Attach additonal pages ifnecessary). COMPLETE NAME OF PROVIDER COMPLETE MAILING ADDRESS, CITY, STATE ZIP ‘“***CONTINUE TO PAGE 4 OF THIS APPLICATION**** 3 E wi CTI TO AND SIGNED TO TION INFORMATION RELEASE, give permission to release to and receive from any hospital, clini, doctor, insurance company, employer, mental health provider, treatment center, person, agency of any other entity any needed information to the IDAHO CRIME VICTIMS COMPENSATION PROGRAM. [ also give permission tothe Program to release copies of any of my medical or mental health records necessary tothe prosecuting attomey to secure restitution from the alleged offender in order to reimburse the fund. understand the information will be used to determine compensation benefit, and that only information needed to make a decision about the application on any claim for compensation benefits or otherwise deemed necessary by the Program to achieve its statutory ‘mandate will be requested from other entities or released by the Program. With these exceptions, all information provided willbe kept strictly confidential. {understand this information release is valid for one year from the date of my signature and that I can cancel this release by writing to the Program at any time, except any information that has already been received and used its not subject to cancellation. 1 understand a photocopy or facsimile of ths signed form is as valid as the original, and that my signature gives permission forthe release of all information specified in this permission form. Federal law specifically requires that ay disclosure or redisclosure of mental health, drug/alcohol or AIDS related information must be accompanied by the following written statement: ‘This information has been disclosed to you from records protected by Federal confidentiality rules (42 CRF Part 2). The Federal rules prohibit you from making any further disclosure of this information unless disclosure is expressly permitted by the writen Consent of the person to whom it pertains or as otherwise permitted by 42 CFR Part 2. A general authorization forthe release of medical or other information is NOT sufficient for this purpose. The Federal rules restrict any use of this information to criminally {investigate or prosecute any drug/aleohol abuse patient. XXX, DATE jctim is a minor) relationship to victim. 9. REPAYMENT AND SUBROGATION AGREEMENT understand that Idaho law requires me to contact and repay the Program if1 receive crime-related payments from the offender, a civil lawsuit, an insurance program, any other government or private agency or any other source aftr I receive payment(s) from the Program. 1 las acknoiviédge thatthe Prograim has a first lien against any money payable to mé from any of such sources. understand and agree to the terms of this Repaymedt And Subrogation Agreement, XXX DATE Applicant signature (parent or guardian must sign if victim is a minor) Printed Name of Applicant relationship to vietim, 10. APPLICATION CERTIFICATION { certify thatthe information inthis application is true and correct to the best of my knowledge. I understand by signing below I agree to ll ofthe provisions inthis Application for Compensation. XxX, DATE ‘Applicant signature (parent or guardian must sign i victim is @ minor) Printed Name of Applicant. relationship to victim, = 4 COMMUNITY RESOURCES IF YOU NEED HELP, CALL: CANYON COUNTY PROSECUTOR'S OFFICE ‘VICTIM WITNESS UNIT CANYON COUNTY SHERIFF'S OFFICE VICTIM WITNESS UNIT NAMPA POLICE DEPARTMENT VICTIM WITNESS UNIT NAMPA CITY PROSECUTOR ‘VICTIM WITNESS UNIT NAMPA FAMILYJUSTICE CENTER CALDWELL CITY PROSECUTOR'S OFFICE PARMA/WILDER VICTIM WITNESS COORDINATOR SART - Sexual Assault Response Team EMERGENCY SHELTER VALLEY CKISIS CENTER (NAMPA). HOPES DOOK (CALDWELL) PROJECT DOVE HOUSING Community Family Shelter Lighthouse Rescue Mission (men only) ‘Nampa Housing Authority Boise City Light Community House Serenity House Booth Center COUNSELING SERVICES SANE SOLUTIONS __ VALLEY CRISIS CENTER IDAHO DOMESTIC VIOLENCE HUTLINE, — — ~ ‘Compassionate Friends Support Group (Meets 2nd Friday of each moath at St Lakes Mercian at 715 pm) Uaho Suicide Prevention Hotline PROJECT ROSE 2-HOUR CRISIS HOTLINE., LEGAL SERVICES ‘Domestic Violence Legal Advice Line IDAHO VOLUNTEER LAWYERS IDAHO LEGAL AID. PROTECTION ORDERS. INFORMATION/ADVOCACY IDAHO CARE LINE ADVOCATES AGAINST FAMILY VIULENCE TDAHO COALITION AGAINST SEXUAL AND DUMESTIC VIOLENCE, IDAHO COUNCIL ON DOMESTIC VIOLENCE, NUTRITION HEALTH AND WELFARE (FOOD STAMP PROGRAM) NAMPA CALDWELL IDAHO HUNGER ACTION COUNCIL, WIC PROGRAM (WOMEN AND INFANT CARE), : 1LOCAL CHURCHES Q¢ANY HAVE FOOD CUPEUARDS AVAILABLE TO THOSE IN NEED - CONSULT YOUR LOCAL TELEPHONE DIKECTORY SUPERVISED VISITATION & EXCHANGES ROCK OF AGES EMPLOYMENT SOUTHWEST CENTER FOR NEW DIRECTIONS B51. SOUTHWEST PRIVATE INDUSTRY COUNCIL, JSAP PROGRAM (HEALTH AND WELFARE] _ JOB PROGRAM DEPT. OF EMPLOYMENT. IDAHO COMMERCE AND LABOR.... ‘MEDICAL SERVICES ‘TERRY REILLY HEALTH SERVICES 454.7391 455.5970 475.5718 475.5721 415.570 455.3116 722.59) 497-1726 465-5011 (641)-889.2900 461.3733 461-5030 466-2601 368.9901, 389.9840 424-1323 343.3571 463.2314 465-5011 1-800-669-3176 467-1947 1-800-564-2120 1-877-500-2980 334-4510 454.2591 454.7577 459.6279 384.0819 334.6512 465-444 454.0421 336-7010 455-5330 455-1499 385.3126 322-4028 454.7705 454-7680 364-7781 au

You might also like