Focused on Recovery

SURVIVOR RESOURCES

Find them here
Trauma-Informed Guidance

PROFESSIONAL RESOURCES

Find them here

SURVIVOR RESOURCES

Stalking

On-Demand Videos

On-Demand Viewing ButtonThe Threat Is Inside The House

Friends and family ask for assistance installing WiFi or configuring smart devices in the house. They are now asking for help ‘fixing my situation.’

The very same Internet of Things (IoT) which are installed for convenience can form a gilded, velvet-lined cage with an Alexa or Siri voice.

We will discuss how the community can apply information security (InfoSec) principles and scientific (forensic) principles to assist domestic abuse victims in cutting the electronic cord to their abuser. The counterintelligence mindset should be applied to the domestic situation- what can be gathered, what sources and methods can be used against a person in their own house, and how to detect the threat.

The talk will discuss the use of social media to detect physical surveillance, technical countermeasures for surveillance devices, lessons learned with forensics…and the ways to protect oneself against leaving data behind.

Operation Safe Escape: Training & Resources

Operation: SafeEscape Logo

We fight against domestic violence in three ways. First is by empowering the individuals impacted by domestic violence, helping them (and their children) turn from victims to survivors. We help to develop secure communication channels with their support system and local shelters, and then build on that to provide security and safety guidance relevant to their current step in the process.

Next, we make sure that the survivor has a safe place to go. To do this, we work with shelters, safe houses, support systems, social services, and advocacy groups in developing security solutions and training staff on counter-surveillance, physical security, cybersecurity, and other security concepts. The goal is to make sure all heroes fighting against domestic violence are safe.

Finally, we work with law enforcement to help provide resources and address any training gaps related to the technical aspects of abuse, stalking, harassment, and other crimes. We work with officers all over the country to help them understand the challenges that victims of domestic violence (and increasingly often, human trafficking) face even after the abuser has been removed from the home. We’re in the process of capturing some of these lessons learned in a formal training program.

Naturally, everything we do is free. We don’t charge individuals–not even shipping costs when we send them resources and tools. We don’t charge organizations for when we help them improve their security posture or stand up a formal program. We don’t charge departments or agencies for consulting and training. We only have one goal: to make sure everyone can feel safe.

Find out more at https://safeescape.org/

Personal Data Removal How-To's

The Smart Girl's Guide to Privacy book cover“The Smart Girl’s Guide to Privacy: Practical Tips For Staying Safe Online” by Violet Blue

The whirlwind of social media, online dating, and smartphones can make life a dream—or a nightmare. For every trustworthy website, there are countless jerks, bullies, and scam artists who would harvest your personal information for their own purposes. But you can fight back, right now.

In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will show you how to:

•Delete personal content from websites
•Use website and browser privacy controls effectively
•Recover from and prevent identity theft
•Figure out where the law protects you—and where it doesn’t
•Set up safe online profiles
•Remove yourself from people finder websites

Even if your privacy has already been compromised, don’t panic. It’s not too late to take control. Let The Smart Girl’s Guide to Privacy help you cut through the confusion and start protecting your online life. Find a book seller here – https://www.goodreads.com/book/show/25644910-the-smart-girl-s-guide-to-privacy

 

Extreme Privacy Book Cover“Extreme Privacy: What It Takes To Disappear” (3rd Edition) by Michael Bazzell

Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This 565-page textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out and provides explicit details of every step he takes to make someone completely disappear, including legal documents and a chronological order of events. The information shared in this book is based on real experiences with his actual clients, and is unlike any content ever released in his other books. The stories are all true, with the exception of changed names, locations, and minor details in order to protect the privacy of those described. For many, this is the only privacy manual needed to secure a new digital life.

An easy-to-follow guide that helps you remove traces of yourself online. Click the link to open the PDF workbook – https://inteltechniques.com/data/workbook.pdf

The Internet Privacy Handbook

SafeShepherd’s Handbook aims to give you a single source for the instructions you’ll need you remove your personal information from sites that expose your information.

We believe that your personal data should never be used against you. Privacy should be accessible, and right now it’s just too darn complicated. This Handbook aims to give you a single source for the instructions you’ll need you remove your personal information from sites that expose your information.

GET STARTED HERE

Compromised Information Database

Find out if your personal information has been released in a data breach.

Find out more at haveibeenpwned.com (yes, this is legit).

How to Delete Your Facebook, Twitter, Instagram, and TikTok (by Wired Magazine)

SOCIAL NETWORKS WALK a fine line between being a useful tool and a crippling addiction. They’re also fraught with critics, who say that they damage our personal privacy and can convey misinformation. Whether you want your free time back or don’t like your personal info scattered about on the internet, you may be considering deactivating some accounts.

Wanting to delete your account is one thing, but actually being able to hit the delete button is another story. Social media outlets make money off of you and your information, so it shouldn’t come as a surprise that they don’t want to let you go. Because of this, the biggest networks have made it overly complicated to delete your account. But if you are set on getting rid of them, here’s what you’ll have to do.

Read the complete article here – https://www.wired.com/story/how-to-delete-your-facebook-instagram-twitter-snapchat/

Renaming Mobile Devices

Rename your Apple devices – CLICK HERE

Rename your Android devices – CLICK HERE

6 Ways to Delete Yourself From the Internet (Wired Magazine)

You’ll never be able to get a clean slate, but you can significantly downsize your digital footprint. Learn how to:

  • Opt out from data brokers
  • Get Google search results updated
  • Delete old online accounts
  • Clean up your digital history
  • “Go Nuclear”
  • Future protections

CLICK HERE to read the article (Make sure your device is safe to do so. Not sure? Try your local public library’s computers to do your important searches.)

Documentation Log (VictimsVoice - Legally Admissible Tool)

VictimsVoice screenshot iPhoneVictimsVoice Legally Admissible Tool

(CICK HERE to purchase a license of your own)
(CICK HERE to find a VictimsVoice Partner Member that can provide a free license)
(CICK HERE to donate a license to someone who may need one and can’t afford it)

VictimsVoice is a tool that fixes the legal documentation burdens victims face when recalling details for reporting acts of violence, abuse, and harassment. It is built to meet HIPAA, VAWA, VOCA, FVPSA, CCPA, and GDPR compliance, as well as the strict legal standards (Daubert Standard) of court admissibility, and provides the evidence needed for legal teams to successfully hold offenders accountable.

Documentation Log (SPARC - Paper-based)

Stalking Log Instructions

SPARC Paper-Based Log

(CICK HERE to access PDF file)

The stalking log should be used to record and document all stalking-related behavior. When reporting the incident, write down the person’s name and agency to whom you reported, including any badge or identification number they may have. If you make a report to someone, you can ask them to provide you with a copy of it for your records.

Important note: Since this information could potentially be introduced as evidence or inadvertently shared with the stalker at a future time, do not include any information in the log that you do not want the stalker to see.

Safety Planning Strategies

The guidance below is intended for general informational purposes only and is not designed to replace a personalized safety plan created with the assistance of a professional. The suggestions below are also not exhaustive. You are the expert on your own life and you know best what options might be possible or feasible.

CLICK HERE TO ACCESS THE RESOURCE

Step-by-Step How-to Guides (CETA)

The Clinic to End Tech Abuse (CETA)  provides a collection of materials, tools, and resources that we have created to help IPV survivors, support workers, and technologists discover and address tech-related risks. All of their resources are free to download and use. They use many of them as part of our Computer Security Clinic for IPV survivors in New York City. Their step-by-step how-to guides can be especially useful for providing help remotely.

CLICK HERE to access the resources.

PROFESSIONAL RESOURCES

Stalking

On-Demand Videos

On-Demand Viewing ButtonThe Threat Is Inside The House

Friends and family ask for assistance installing WiFi or configuring smart devices in the house. They are now asking for help ‘fixing my situation.’

The very same Internet of Things (IoT) which are installed for convenience can form a gilded, velvet-lined cage with an Alexa or Siri voice.

We will discuss how the community can apply information security (InfoSec) principles and scientific (forensic) principles to assist domestic abuse victims in cutting the electronic cord to their abuser. The counterintelligence mindset should be applied to the domestic situation- what can be gathered, what sources and methods can be used against a person in their own house, and how to detect the threat.

The talk will discuss the use of social media to detect physical surveillance, technical countermeasures for surveillance devices, lessons learned with forensics…and the ways to protect oneself against leaving data behind.


On-Demand Viewing ButtonFollowing The Digital Breadcrumbs

Identifying, Preserving, and Presenting Digital Evidence of Stalking and other Crimes

As technology becomes more integral to our lives, offenders have increasingly used – and misused – technology to facilitate stalking and other criminal activity. Stalking is a prevalent, dangerous, and often misunderstood crime that often intersects with intimate partner violence. It is imperative that digital evidence is identified, preserved, and presented to demonstrate how offenders assert power and control as well as how they locate, surveil, and monitor their victims.

This presentation will demonstrate how digital platforms can contain evidence of stalking, intimate partner violence, nonconsensual distribution of intimate images, and other related crimes. The presenters will demonstrate common technology misused by offenders, provide strategies for preserving digital evidence, and discuss theories of admission.

Operation Safe Escape: Training & Resources

Operation: SafeEscape Logo

We fight against domestic violence in three ways. First is by empowering the individuals impacted by domestic violence, helping them (and their children) turn from victims to survivors. We help to develop secure communication channels with their support system and local shelters, and then build on that to provide security and safety guidance relevant to their current step in the process.

Next, we make sure that the survivor has a safe place to go. To do this, we work with shelters, safe houses, support systems, social services, and advocacy groups in developing security solutions and training staff on counter-surveillance, physical security, cybersecurity, and other security concepts. The goal is to make sure all heroes fighting against domestic violence are safe.

Finally, we work with law enforcement to help provide resources and address any training gaps related to the technical aspects of abuse, stalking, harassment, and other crimes. We work with officers all over the country to help them understand the challenges that victims of domestic violence (and increasingly often, human trafficking) face even after the abuser has been removed from the home. We’re in the process of capturing some of these lessons learned in a formal training program.

Naturally, everything we do is free. We don’t charge individuals–not even shipping costs when we send them resources and tools. We don’t charge organizations for when we help them improve their security posture or stand up a formal program. We don’t charge departments or agencies for consulting and training. We only have one goal: to make sure everyone can feel safe.

Find out more at https://safeescape.org/

Stalking and Harassment Assessment and Risk Profile (SHARP)

The Stalking and Harassment Assessment and Risk Profile (SHARP) is a 43 item web-based assessment developed from the empirical research, clinical literature, stories from stalking victims, case studies, as well as feedback from victims, advocates, and other professionals in the field. SHARP provides an assessment of the “big picture” of the stalking situation.

CLICK HERE TO ACCESS THE TOOL

A Checklist for Law Enforcement Response to Stalking

The First Responders Guide to Stalking was created by the Department of Justice and the Stop Violence Against Women Grants Technical Assistance Project. This Checklist for Law Enforcement Response to Stalking provides guidance for law enforcement to enforce the law and thoroughly investigate stalking cases while being sensitive to the needs of victims. By using this Checklist, dispatchers and responding and investigating officers, as well as supervisors and agency policy-makers, can assess their response to stalking cases—both as individuals and as an entire agency. Fully implementing the Checklist’s practices will provide tools so law enforcement can safely and sensitively intervene to protect victims; hold offenders accountable for their violent, coercive actions; and reduce the likelihood of additional harm to or re-victimization of stalking survivors.

CLICK HERE TO ACCESS THE RESOURCE

Documentation Log (VictimsVoice - Legally Admissible Tool)

VictimsVoice screenshot iPhoneVictimsVoice Legally Admissible Tool

(CICK HERE to request information about becoming a VictimsVoice Partner Member)

When your clients’ need to document each incident of abuse, there’s a tool that you can help them access. VictimsVoice helps survivors become more willing and credible witnesses by making sure they collect the RIGHT evidence in the RIGHT way so investigators can build a better case and prosecutors can more effectively and appropriately hold abusers accountable.

VictimsVoice is a tool that fixes the legal documentation burdens victims face when recalling details for reporting acts of violence, abuse, and harassment. It is built to meet HIPAA, VAWA, VOCA, FVPSA, CCPA, and GDPR compliance, as well as the strict legal standards (Daubert Standard) of court admissibility, and provides the evidence needed for legal teams to successfully hold offenders accountable.

Safety Planning Strategies

The guidance below is intended for general informational purposes only and is not designed to replace a personalized safety plan created with the assistance of a professional. The suggestions below are also not exhaustive. You are the expert on your own life and you know best what options might be possible or feasible.

CLICK HERE TO ACCESS THE RESOURCE

Stalking Response Checklist for DV/SA Organizations

A checklist to help assess your agency’s response to stalking.

CLICK HERE TO ACCESS THE RESOURCE

Training Modules for Public Awareness (SPARC)

Scripted workshops and guidance for community educators, including You discussion guides.

CLICK HERE TO ACCESS THE RESOURCE

Brochures and Posters Request (SPARC)

Print “Understanding Stalking” Brochures and Posters Available to Order for Free (brochures in English and Spanish).

CLICK HERE TO ACCESS THE ORDER FORM

For More on the Use of Technology to Stalk

IACP Cyber Security Center
Information and guidance for law enforcement investigating crimes that use technology

Search.org
A resource for law enforcement to find the appropriate portals and contacts for subpoenas etc.

Training and/or Assistance (SPARC, AEquitas)

AEquitas
24/7 technical assistance for prosecutors

SPARC Training Request Form
We are funded to provide training to all current and potential OVW grantees. We are happy to provide additional training for specialized disciplines.

AEquitas Additional Resources

Confronting Racial Bias Against Black and African American Victims in the Prosecution of Sexual Violence, Domestic Violence, Stalking, and Human Trafficking – Article  |  Recorded panel discussion

Safeguarding Victim Privacy in a Digital World: Ethical Considerations for Prosecutors – Webinar

The Internet & Intimate Partner Violence: Technology Changes, Abuse Doesn’t – Article

Prosecuting Image Exploitation – Article

Stop Calling It ‘Revenge Porn’: Prosecuting Image Exploitation – Webinar

Step-by-Step How-to Guides (CETA)

The Clinic to End Tech Abuse (CETA)  provides a collection of materials, tools, and resources that we have created to help IPV survivors, support workers, and technologists discover and address tech-related risks. All of their resources are free to download and use. They use many of them as part of our Computer Security Clinic for IPV survivors in New York City. Their step-by-step how-to guides can be especially useful for providing help remotely.

CLICK HERE to access the resources.

Domestic Violence in the Workplace

On-Demand Videos

On-Demand Viewing ButtonWhen Domestic Violence Impacts Your Workplace

Domestic violence clearly impacts the motivation, productivity, and morale of employees, and as business owners and leaders, there are things you can, should, and must do to support your team. This 50-minute workshop covered the following:

>  What should employers think about how domestic violence (DV) affects their workplace?
>  What laws are implicated in DV scenarios?
>  How does HIPAA confidentiality factor in?
>  How do you address remote working employees in areas of threats and vulnerabilities?
>  How do you keep your workplace safe?

Ayesha Hamilton, an employment law attorney in NJ, NY, and PA covered the legal obligations, as well as safety, security, training, and the morale of your entire team.


On-Demand Viewing ButtonThe Empathetic Workplace

No workplace is immune to trauma, from claims of harassment or bias to large-scale impacts like the pandemic. When we respond well to those in trauma, we build trust that yields increased productivity, engagement, satisfaction, and loyalty.

Katharine Manning, author of The Empathetic Workplace and an attorney with more than 25 years’ experience on issues of trauma and victimization, provided an understanding of the prevalence of trauma and its effect on both the person in trauma and those interacting with them, then gives practical advice on how to support those in trauma in the workplace while protecting yourself from compassion fatigue and not running afoul of legal obligations.

This 50-minute workshop covered how to gain the expertise to respond with calm and confidence to traumas at work, whenever and wherever they arise

.


On-Demand Viewing ButtonThe Employed Domestic Violence Victim

Roughly three-quarters of domestic violence victims are employed outside the home, but the abuse they experience doesn’t always stay in the house when they leave for work.

This program examines the impact of domestic violence on employee victims and their co-workers and the employment laws that support them, as well as the variety of ways an employer can help.

Participants will learn about the sabotage and “spillover” tactics of abusers, review provisions that protect a victim’s job and confidentiality, and discover an assortment of safety strategies that can save the lives of abused employees and their co-workers.

MD Earned Sick and Safe Leave Employee Notice (Maryland)

The Maryland Healthy Working Families Act requires employers with 15 or more employees to provide paid sick and safe leave for certain employees. It also requires that employers who employ 14 or fewer employees provide unpaid sick and safe leave for certain employees.
For more information, visit https://www.dllr.state.md.us/paidleave/paidleaveposter.shtml

NJ SAFE Act (New Jersey)

The New Jersey Security and Financial Empowerment (“SAFE”) Act provides leave for employees who are victims of domestic violence or sexual assault or have a family member who is a victim. The amendment also expands the definition of “family member” under the SAFE Act to mirror the definition under the NJFLA.

For more information, visit https://www.nj.gov/labor/forms_pdfs/lwdhome/AD-289_9-13.pdf

Desktop One-Sheet Resource for HR

Blackbird Resource coverDownload your complimentary copy of The One Page You Need on Your Desk if You Work with People.
It’s packed with quick references to get the people you work with to the right resources quickly.
CLICK HERE

Sample Work-Related Domestic Violence Policies

National Center on Domestic and Sexual Violence

This 15-page word document can be used as a guide to building out your own workplace policy. Always consult your attorney when drafting formal policies to ensure it meets local, state, and federal guidelines, laws, and regulations. ACCESS HERE

Cornell Law School

Domestic Violence and the Workplace Model Policy and Toolkit
Editable versions of the Domestic Violence and the Workplace Policy and Toolkit, including a Model Policy (.doc) and Toolkit (.ppt). ACCESS HERE

Workplaces Respond to Domestic and Sexual Violence: A National Resource Center

Model Workplace Policy on Domestic Violence, Sexual Violence, and Stalking
Clear guidelines help employers appropriately respond to domestic violence, sexual violence, and stalking impacting the workplace, and promote a workplace culture of prevention and support. ACCESS HERE

Reading Materials (Books)

The Empathetic Workplace Book

THE EMPATHETIC WORKPLACE
5 Steps to a Compassionate, Calm, and Confident Response to Trauma on The Job

– Katharine Manning

THE STEP-BY-STEP LASER METHOD TO ADDRESS WORKPLACE TRAUMA
You shouldn’t just prepare for reports of trauma in the workplace. You should plan for it.

The Empathetic Workplace provides practical advice to help those who work with humans respond to issues that are uniquely human.

Find a bookseller and listen to an audio clip on the web at http://www.katharinemanning.com/my-book/

.


Stop Signs BookSTOP SIGNS
Recognizing, Avoiding, and Escaping Abusive Relationships
Lynn Fairweather

Most abusers display warning signs that intelligent women miss—mostly because the majority of women have not been trained to recognize them. In this groundbreaking book, Lynn Fairweather—an expert in the field of intimate partner violence response and prevention—provides women with the information they need to recognize dangerous men before they become victims of abuse.

Find a bookseller online – https://presagetraining.com/about-the-book/