Although our five-part series is around Cybersecurity Awareness month, it’s also Domestic Violence Awareness month so I wanted to dedicate today’s blog to briefly discuss the intersection of these two important issues and how abusers misuse and exploit technology to exert control and terrorize their victims.
The Role of Tech Companies
For those in the investigations industry we see how easy it is for abusers, fraudsters and others to use technology to perpetrate stalking and other crimes. This week I attended the National Sexual Violence Law Conference held by the Victim Rights Law Center here in Chicago. Presenter Matthew Herrick gave a harrowing, first-hand account about how a decade earlier, as an actor in his early 30s and recent transplant to New York City, his former partner stalked and impersonated him online, going as far as creating fake dating profiles of him on apps including Grindr and Scruff. This led to more than 1,400 (yes ONE THOUSAND FOUR HUNDRED) men arriving in person at his home and workplace over the course of 10 months. As you can imagine, Herrick - and others like him - have been terrorized by such relentless abusers who were either previous intimate partners, or just malevolent strangers.
While this case eventually led to criminal charges against Herrick’s ex by the Manhattan District Attorney's Office, not all victims get their day in court - or even the simple benefit of someone in law enforcement who takes them seriously. This case gained national attention not just for the criminal charges but because Herrick ultimately sued Grindr after it ignored his roughly 100 pleas to remove the fraudulent profiles and to block his abuser from making new ones.The case eventually went to the Supreme Court.
Some Steps We can All Take
Proactive digital hygiene can go a long way towards limiting abusers’ ability to monitor your activities and disrupt your health, well-being and safety. Everyone should be aware of:
- Internet of Things (IoT) and smart devices such as cameras, thermostats and speakers (think Alexa), fitness trackers, video doorbells and home security devices that can be used for surveillance, monitoring and tracking.
- “Stalkerware,” disguised or malicious apps, and software that can give the abuser access to myriad private data including location (real-time GPS) tracking, web history monitoring, photo and video access, and call and text message monitoring, to name a few.
- The importance of password security and the need for strong, unique passwords and multi-factor authentication (MFA) for all accounts, not just email. Use a password manager!!!!
Pay extra attention to your bank and fintech accounts, as access to them for abusers and cyberstalkers can surveil spending, control or limit access to funds and exploit other information to limit their victims’ ability to gain independence.
Criminal and Civil Laws and Remedies - And When to Bring in Investigators
Various federal and state criminal and civil laws apply to these types of malicious activity but many laws and available remedies haven’t kept pace with evolving technology. While federal and state prosecutors and law enforcement work tirelessly on these cases, they are simply not equipped to deal with the sheer volume of victims and complaints.
While not all cases result in criminal charges, there are civil actions and recourse victims can seek through the help of attorneys and investigators such as 221B Partners. In the past year alone, we’ve supported clients who are victims of cyberstalking, online harassment, doxxing, online threats (and investment and romance scams) by:
- Identifying a sexual assault perpetrator behind through what at first appeared to be an untraceable email address, phone number or social media handle
- Forensically capturing social media and other online activity of a stalker to be used in court, with metadata intact
- Identifying where non-consensual intimate images that were shared online have propagated to for copyright takedown requests and search engine suppression
- Conducting a comprehensive investigation into an individual making threats by email, phone and text message to numerous executives and company employees
- Online monitoring and physical surveillance of an individual making threats to family members
- Conducting a digital audit of a victim’s online presence to identify risks, threats and vulnerabilities and advising the client on better ways to stay safe online