Technology Summit 2014 Starts Today!

Today is the first day of our 2014 Technology Summit in beautiful San Jose, CA. We are so excited to welcome advocates, law enforcement, and attorneys from all over the country, Guam, Canada, and Australia! The morning opened with remarks from NNEDV president and CEO Kim Gandy and Santa Clara County Supervisor Cindy Chavez, and the day will continue with presentations on what service providers need to know when abusers misuse technology to abuse, stalk, and harass.

In our 15 years of working on this issue, the most important thing that we’ve learned is how critical it is for everyone to work together and be a part of this conversation. The collective knowledge, skills, and expertise of everyone are needed to address the multifaceted needs of survivors and move forward towards an end to violence.

We are so thrilled to have so many people dedicated to supporting victims of domestic and sexual violence and stalking join us. To all our attendees, and all the advocates and service providers working to help victims, thank you for what you do every day. You never know how many lives you’ve changed in your work. The work you do not only changes the lives of women and men you serve, but their children’s lives and their children’s lives. Thank you for getting up every day and doing this important work.

We are looking forward to 3 more days of expert trainings and information from all 27 of our amazingly brilliant presenters. Follow us on Twitter and Instagram, #techsummit14, to follow the conversation.

 

Cell Phone Location, Privacy and Intimate Partner Violence

The Domestic Violence Report recently published an article Safety Net wrote on cell phone location privacy and safety. This comprehensive article discusses how cell phone location is misused by abusers to stalk and monitor victims and tips on what victims can do. It explores the different ways cell phone location information can be revealed and concludes with proposed federal legislation on location privacy and best practices for app developers who want to collect location information through their apps.  Read the full article.

photo: Ron Wiecki

photo: Ron Wiecki

Meanwhile, here are a few safety tips on what to do if someone is misusing your cell phone location information as a tool to monitor or stalk you.  

1.      Safety first. If removing the tracking app or turning the phone off may be more dangerous, develop a safety plan regarding how to continue using the phone so that the abuser does not become suspicious. Simultaneously create a plan on how to communicate with others until the program can be removed completely or you’re able to get a new phone.

2.      Keep a log. Knowing the pattern of the abusive person’s behavior and what information they seem to know can help the survivor narrow down how the abuser is getting his or her information. Abusers can be creative and can find many ways to monitor and stalk a victim, often using more than one technology or method.

3.      Secure your phone. Become familiar with the security settings and put a lock code on the phone.

4.      Don’t install unknown apps or programs. Be careful not to install programs that are unknown, especially if the suggested app is from the abuser or mutual friends. Also, be aware of what permissions or access to data on your phone that the app requires before you download.

5.      Limit apps that are using your location. Know which applications are using your location and either limit its ability to use your location or delete the app, unless you are confident in what the purpose is and the extent of the sharing and access to your personal information.

6.      Use privacy settings. If a location program is already on the phone, the user should learn about its settings and features. Knowing what controls are available may allow for continued use while also maintaining privacy and control.

7.      Turn off phone. For short periods of time, a survivor can cut off communication from the phone by putting the phone on airplane mode or turning the phone off and taking out the battery. However, be aware that when the phone is turned back on, all communications will continue and location information may be shared again.

8.      Start fresh. When getting a new cell phone, don’t import everything from the old phone to the new one. Porting over all the data may inadvertently install the tracking application as well.

Want a more thorough safety plan? Download our Cell Phone & Location Safety Strategies handout.

New Survey: Technology Abuse & Experiences of Survivors and Victim Service Agencies

In a survey conducted by the Safety Net Project at NNEDV, nearly 90% of programs report that survivors come to them for help after abusers intimidated and made threats via cell phone, text messages and email, and 75% of programs noted that abusers accessed victim’s accounts (email, social media, etc.) without the victim’s consent and oftentimes without their knowledge. Intimidation, threats, and access of information about victims aren’t new tactics within the context of domestic violence, sexual assault, stalking, or trafficking. However, the use of technology as a tool to facilitate these tactics means that the harassment and abuse can be much more invasive, intensive, and traumatizing. 

Technology gives abusers more methods of controlling and monitoring victims. Seventy-two percent of programs reported that a survivor’s location is being tracked by smart phones or other devices; more than half of the programs report that survivors are saying abusers are spoofing caller ID (manipulating caller ID so that it appears as though someone other than the abuser is calling); and nearly 70% of programs report that abusers are posting pictures or videos of victims online for the purpose of distressing or harming the victim. Programs also report that survivors are asking for help on how to manage their technology and stay safe while using them. Survivors frequently ask for help with cell phones (71%); followed by how to manage location privacy, whether through cell phones or other location devices (62%), and computer or laptop use (56%). 

These two newest infographics show how technology is being misused by abusers against survivors. NNEDV conducted a survey of more than 750 victim service agencies across the United States, including American Samoa, Guam, the Northern Mariana Islands, and the U.S. Virgin Islands, through a grant from the Office for Victims of Crime. This is one of the most comprehensive reviews of what survivors are telling victim service providers about how abusers misuse technology to harass, stalk, and harm.