What is the average length of partner stalking?
- - -
ABOUT THIS PROGRAM
The Threat Is Inside The House
Friends and family ask for assistance installing WiFi or configuring smart devices in the house. They are now asking for help ‘fixing my situation.’
The very same Internet of Things (IoT) which are installed for convenience can form a gilded, velvet-lined cage with an Alexa or Siri voice.
We will discuss how the community can apply information security (InfoSec) principles and scientific (forensic) principles to assist domestic abuse victims in cutting the electronic cord to their abuser. The counterintelligence mindset should be applied to the domestic situation- what can be gathered, what sources and methods can be used against a person in their own house, and how to detect the threat.
The talk will discuss the use of social media to detect physical surveillance, technical countermeasures for surveillance devices, lessons learned with forensics…and the ways to protect oneself against leaving data behind.
WHO SHOULD WATCH
This Lunch-N-Learn is valuable to victims and anyone who has an interest in assisting domestic abuse victims in their escape from an abusive situation.
Will Baggett, CFE, CCEE
Director of Digital Forensics and Operational Security, Operation Safe Escape
Will served in the Intelligence Community during the Global War on Terror focused on HUMINT collection in the CIA and Incident Responder for the State Department prior to joining Revolutionary Security, part of Accenture as a Senior Cybersecurity Consultant focused on Insider Threat. He recently trained NATO Special Operations Forces in Europe and Canada for cyber collection and exploitation. In the private sector, he has performed e-discovery, data recovery, mobile forensic analysis, and fatal automobile incident reconstruction forensic services. He is actively involved in the Digital Forensic effort to secure voting machines used in U.S. elections.
He has appeared as a speaker at DefCon 2019, multiple BSides events, HTCIA, the Diana Initiative conference, as well as at NATO SOF HQS, CANSOFCOM HQS and is the Director of Digital Forensics and Operational Security to Operation Safe Escape, providing assistance to domestic abuse victims seeking to cut the ties digitally to their abusers.
Stalking, Monitoring, and Tracking Resources
We fight against domestic violence in three ways. First is by empowering the individuals impacted by domestic violence, helping them (and their children) turn from victims to survivors. We help to develop secure communication channels with their support system and local shelters, and then build on that to provide security and safety guidance relevant to their current step in the process.
Next, we make sure that the survivor has a safe place to go. To do this, we work with shelters, safe houses, support systems, social services, and advocacy groups in developing security solutions and training staff on counter-surveillance, physical security, cybersecurity, and other security concepts. The goal is to make sure all heroes fighting against domestic violence are safe.
Finally, we work with law enforcement to help provide resources and address any training gaps related to the technical aspects of abuse, stalking, harassment, and other crimes. We work with officers all over the country to help them understand the challenges that victims of domestic violence (and increasingly often, human trafficking) face even after the abuser has been removed from the home. We’re in the process of capturing some of these lessons learned in a formal training program.
Naturally, everything we do is free. We don’t charge individuals–not even shipping costs when we send them resources and tools. We don’t charge organizations for when we help them improve their security posture or stand up a formal program. We don’t charge departments or agencies for consulting and training. We only have one goal: to make sure everyone can feel safe.
Find out more at https://safeescape.org/
“The Smart Girl’s Guide to Privacy: Practical Tips For Staying Safe Online” by Violet Blue
The whirlwind of social media, online dating, and smartphones can make life a dream—or a nightmare. For every trustworthy website, there are countless jerks, bullies, and scam artists who would harvest your personal information for their own purposes. But you can fight back, right now.
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will show you how to:
•Delete personal content from websites
•Use website and browser privacy controls effectively
•Recover from and prevent identity theft
•Figure out where the law protects you—and where it doesn’t
•Set up safe online profiles
•Remove yourself from people finder websites
Even if your privacy has already been compromised, don’t panic. It’s not too late to take control. Let The Smart Girl’s Guide to Privacy help you cut through the confusion and start protecting your online life. Find a book seller here – https://www.goodreads.com/book/show/25644910-the-smart-girl-s-guide-to-privacy
“Extreme Privacy: What It Takes To Disappear” (3rd Edition) by Michael Bazzell
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This 565-page textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out and provides explicit details of every step he takes to make someone completely disappear, including legal documents and a chronological order of events. The information shared in this book is based on real experiences with his actual clients, and is unlike any content ever released in his other books. The stories are all true, with the exception of changed names, locations, and minor details in order to protect the privacy of those described. For many, this is the only privacy manual needed to secure a new digital life.
An easy-to-follow guide that helps you remove traces of yourself online. Click the link to open the PDF workbook – https://inteltechniques.com/data/workbook.pdf
SOCIAL NETWORKS WALK a fine line between being a useful tool and a crippling addiction. They’re also fraught with critics, who say that they damage our personal privacy and can convey misinformation. Whether you want your free time back or don’t like your personal info scattered about on the internet, you may be considering deactivating some accounts.
Wanting to delete your account is one thing, but actually being able to hit the delete button is another story. Social media outlets make money off of you and your information, so it shouldn’t come as a surprise that they don’t want to let you go. Because of this, the biggest networks have made it overly complicated to delete your account. But if you are set on getting rid of them, here’s what you’ll have to do.
Read the complete article here – https://www.wired.com/story/how-to-delete-your-facebook-instagram-twitter-snapchat/
NATIONAL DOMESTIC VIOLENCE RESOURCES
When your employees need a tool to help them in their private life, having a workplace safety net can increase productivity, stabilize morale, and build loyalty – all affecting your bottom line.
VictimsVoice is an EAP-type solution that is helping people in unhealthy relationships document the RIGHT information to get legal protection and seek justice.
For more information about our corporate program, CONTACT VICTIMSVOICE.