1 / 81

The Safe and Strategic Use of Technology

The Safe and Strategic Use of Technology A guide for domestic violence advocates and those they serve. Why do we as advocates need to care about technology?. Why care?. It impacts our daily lives It helps us in our work It helps victims feel safer IT CAN BE RISKY IF NOT WELL THOUGHT OUT.

evers
Télécharger la présentation

The Safe and Strategic Use of Technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Safe and Strategic Use of Technology A guide for domestic violence advocates and those they serve

  2. Why do we as advocates need to care about technology?

  3. Why care? • It impacts our daily lives • It helps us in our work • It helps victims feel safer • IT CAN BE RISKY IF NOT WELL THOUGHT OUT

  4. Computers Telephones TTY Devices Fax machines E-mail GPS Camera and Detection Devices Answering machines Caller ID Internet Panic Buttons Data Systems E-911 211 TECHNOLOGY IS:

  5. Goals for this training • Put technology on your radar • Discuss technology and its benefits • Share technology risks and include in safety planning • Discuss resources for victims and advocates

  6. Your Relationship with Technology? • Not on Speaking Terms • Cordial Working relationship • Very Intimate SafetyNet@nnedv.org

  7. Power and Control Isolation Threats Destroying your Property Intimidation Limiting Your Independence Sexual Coercion Jealousy Humiliation SafetyNet@nnedv.org

  8. Benefits and Risksof using Corded, Cordless, Cell Phones and Related Devices Created by Cindy Southworth, NNEDV Expanded by John Brown, WVCADV and Charlie Hartmann, MCEDV

  9. Benefits of UsingCordless Telephones • Convenience • Productivity • Mobility

  10. Risks of UsingCell and Cordless Phones • Losing a call • Crosstalk • Loss of legal privilege • Interception

  11. Cordless Telephones Can be intercepted by: • Scanners • Ham radios Can be vulnerable to crosstalk heard through: • Baby Monitors • Other cordless phones

  12. FORVICTIMS Ask victims if they use them and inform them of the risk • Crosstalk • Interception

  13. FOR ADVOCATES • Limit identifying information or escape details on cordless phones • Be sure the cordless phone has been properly hung up. For additional safety unplug the phone • Consider providing cheap corded phones for staff and volunteers or changing to spread spectrum phones with frequency of 2.4 Ghz or better

  14. Cordless Telephones • New cordless phones are better but may still be intercepted with a high powered scanner: i.e. law enforcement, FBI, etc. • The ideal cordless phone today is 5.8 Ghz spread spectrum. 5.8 Ghz is a broader bandwidth than 2.4 Ghz, therefore safer. So even if the phone is not spread spectrum, if the frequency is 2.4 Ghz or higher, a scanner that you buy in a store cannot pick up the phone call.

  15. Cordless Telephones • The scanner needs to be within about 300 to 400 feet of the phone to pick up the call. • It is easy for a scanner to pick up a baby monitor. If you have a baby monitor turned on in a room, a nearby scanner can hear whatever the monitor can hear. • Need to check out legal liabilities regarding privacy rights being compromised because a center uses cordless or cell phones.

  16. Safer Use of Cell Phones • From in a car or anywhere “on the go” • Higher frequencies (2.4 Ghz or higher) • Spread spectrum • Digital instead of analog

  17. Risk of using Cell Phones Can be intercepted by: • Scanners Can be vulnerable to crosstalk heard through: • Baby Monitors • Other cordless phones

  18. Risk of using Cell Phones • ANALOG phones are easier to intercept than DIGITAL, digital channels are encrypted • Remember that digital phones can change to analog depending on the location of the towers

  19. Risk of using Cell Phones SILENT MODE, AUTO ANSWER These are two features that newer cell phones have. When these features are both programmed into a cell phone, an abuser can call the cell phone, it won’t ring but will be automatically answered. This leaves an open line for an abuser to hear everything going on.

  20. Risk of using Cell Phones E-911 The wireless E-911 program requires carriers, upon appropriate request by a local Public Safety Answering Point (PSAP), to report the telephone number of a wireless 911 caller and the location of the antenna that received the call and in the near future will require wireless carriers to provide far more precise location information, within 50 to 100 meters in most cases.

  21. Risks of E-911 • There is a GPS chip (tracking device) installed in each cell phone for 911. For a fee the cell phone company will provide a locator service that allows you to know where that phone is at all times.

  22. FORVICTIMS • Ask victims if use older cell phones, let them know it’s possible for their conversations to be monitored so they can limit what they say if they feel threatened • Ask if she suspects he may be monitoring her calls (Auto Answer, Silent Mode)

  23. FORVICTIMS • Talk to victims about cell phone limitations as E911 comes into effect • Victims may want to turn off cell phones when not in use for location safety and privacy • If there is a GPS device on the cell phone, a victim may want to leave the phone when she leaves

  24. FOR ADVOCATES • Use high frequency (above 900 Mhz)digital phones • Encourage cell phone companies to provide visible notice that a tracking system is subscribed. • If using an older phone to respond to hotline calls: • Use sparingly • Avoid identifying details

  25. Caller ID • Have line blocking on agency phone lines • Test all lines including fax lines to insure line blocking is in effect • Discuss safety planning with victims around Caller ID • Have an organizational policy about Caller ID: agency line blocking, accepting blocked calls, etc.

  26. Risks of using Corded Phones • Corded phones can easily be tapped from inside or outside the home • Caller ID • In some states you can legally put a tap on your own phone to record conversations

  27. Generally most phones can be used safely. • Each type of phone has its own risks. • The more you know and understand the risks, the better prepared you are to help victims. • Be aware of what a victim says that may indicate a potential problem.

  28. VOIP Internet Phone Calls

  29. VoIP – Voice Over Internet Protocol • Analog Telephone Adaptor ATA device converts analog signal to digital data Internet • IP Phones with Ethernet connector via router Internet (soon WiFi) • Computer to Computer (need Microphone, Speakers, etc.)

  30. VoIP: increasingly used • Cost: Internet connection doubles as a phone line, saves up to 50% compared to traditional local/long-distance phone companies • Many Canadian & US companies offer VoIP service: Vonage Canada, Bell Canada, Rogers Telecom, Telus, etc. • Many different VoIP implementations ~ needs a broadband Internet connection (DSL or cable) but can use a regular telephone

  31. 3 Types of VoIP services: • Fixed = from location service is being provided • Nomadic = from any location with Internet access • Foreign exchange = users in one exchange receive phone calls dialed as local calls in another exchange they selected (e.g. a customer located in Ottawa with a Halifax local phone #). 2 types of 911: • Basic 911 = you must tell them your location • Enhanced 911 = automatically sends your location info. (fixed address or location you registered or real time cell location)

  32. Canada: VoIP & 911 access Canadian Radio-television & Telecommunications Commission (CRTC) decisions in 2005 required that: • fixed VoIP service providers ensure same level of 911 service provided by “incumbent phone companies” to customers (E-911 or Basic 911) • nomadic or foreignexchange VoIP service providers implement interim solutions comparable to Basic 911 service. • VoIP provider notify existing & potential customers on the availability, characteristics & limitations of Basic & E- 911 services. Canadian VOIP providers must ensure 911 access & customer notification

  33. VOIP & 911 example • Vonage VoIP customer dials 911 • Vonage’s national emergency line operator views a computer screen for the most recent address the customer entered into Vonage’s company database. • Then Vonage then redirects the call to your local 911 dispatch based on that address • Time delay

  34. Victim Safety: VoIP & E-911 • Register primary address for E-911 service • Find out what TYPE of E-911 service is provided in your region. • Service providers may use different strategies or procedures for handling 911 calls. • If move or traveling, consider re-registering primary address • Can take several hours to process – service not immediately available. • Obtain local emergency direct lines • Police, Fire – check on local municipal websites

  35. Other Safety Risks with VoIP • Spoofing: Use 3 way calling. Put 1st caller on hold, dial victim 2nd. Caller ID shows 1st # dialed • Unblocking blocked numbers: local phone company/ cell carrier send "Calling Party Number" (CPN) with every call. VoIP software can get system to unblock CPN. • Tapping: Most VoIP calls are unencrypted across the Internet, making tapping easy • Call Screening & Call forwarding: User predefines screening list of caller IDs (specific IDs or anonymous calls), then sets how each caller ID is processed • Call Transferring. Have a buddy call her. • Call log records all missed, outgoing, incoming & local #.

  36. Anonymizers: Spoof Cards

  37. Anonymizers:Stalkers & Camophone.com • Cheap web-based service spoofs caller ID using VoIP • Web provider keeps no records of callers or calls • To make a phone call, you give the following info: • Phone number of party you’re calling • Phone number to reach you • Caller ID you wish to send

  38. Answering Machines

  39. Answering Machines • If an abuser leaves a threatening message, the victim has a recording • Do not erase the message • Have the police come and either tape the message or retrieve the recording • It is possible that threatening messages may be used in a court case

  40. TTY Devices • Helpful for victims who are deaf or hearing impaired • It is easy to impersonate someone, so may want to have code word with victim • Know TTY and Relay etiquette • TTY devices keep records and transcripts of calls • Victim and program may want to clear history of call

  41. Fax machines • Fax headers include sender’s fax number • If possible enter 000-000-0000 in the header instead of the fax number • Be sure to line block the fax machine

  42. Benefits and Risksof Using Computers

  43. Benefits of Using Computers • Internet • E-mail • Data Collection • Financial Systems

  44. Internet

  45. Using the Internet Excellent resource for victims and advocates BUT...

  46. It is impossible to clear the history of where on the internet you’ve been, even if the website says you can. • Software to clear footprints is not foolproof and gives false sense of security. • If you do clear history, it can raise suspicions if abuser has been monitoring computer activity.

  47. Ways Computer Activity Can Be Monitored • When you visit websites, the pages you view leave footprints not only in your Internet history but all over your hard drive. • These footprints can be site addresses, pictures, graphics and logos that appear on all the pages you visit. • It is impossible to delete or clear all computer footprints, which is why it is important for you to use a safer computer.

  48. Spyware • Spyware is a computer program that can monitor all computer activities • They can be installed on your computer directly or remotely. (i.e. via internet or e-mail)

  49. Spector Pro Spector Pro automatically records everything your spouse, children and employees do on-line. Features include stealth email monitoring, chat and instant message recording, complete keystroke logging and much more….

  50. eBlaster The ONLY software that captures their emails and IMMEDIATELY forwards them to you. eBlaster also captures both sides of chat conversations, instant messages, keystrokes typed, applications launched and web sites visited-then sends you a detailed Activity Report every hour….

More Related