Safety Net: The National Safe & Strategic Technology Project National Network to End Domestic Violence Cynthia Fraser on March 14, 2007 Your Relationship with Technology? From Radio Not on Speaking Terms Scanners to Spyware: Technology Abuse Cordial Working relationship & Survivor Safety Very Intimate
Hillsborough County Family Justice Center NNEDV Safety Net Training ~ Tampa, Florida [email protected] 1 [email protected] 2
Safety Net: Safety Net: National Safe & Strategic Technology Project National Safe & Strategic Technology Project Stalking, sexual violence, domestic violence, abuse Who is NNEDV At National Network to End Domestic Violence Fund Safety Net Project 1. Building a network of “techie advocates” 2. Safety Planning – Discussing risks & benefits as technologies evolve Our role as a TA Provider 3. Response – Increase systems capacity for survivor-defined prevention & intervention Today’s Agenda 4. Support Survivors in Self Determination
[email protected] 3 [email protected] 4
Important Additional Support: Beyond Training & TA: Resources & Materials State Domestic Violence Coalitions “Technology Advocates”
[email protected] 5 [email protected] 6
1 Technology Use… harass threaten • Phones •Email • Computers target stalk •PDAs •IM / Chat • Screen Readers environmental manipulation •GPS • Internet •Refreshable monitor Braille •Data • Wireless • Switches abuse groom • Caller ID •VoIP • Magnifiers impersonate • Faxes • TTY/Relay • Speech intercept victimize •Answering • WebCams synthesizers surveillance Machines • Scanners • Alert Buttons [email protected] 7 [email protected] 8
Phone, Internet & Data Intersect
Phone lines carry more than voices: People who are Deaf use TTY (teletypewriters) Phone devices to transmit signals across phone lines Fax machines transmit images & text Dial-up Internet connections – send data packets Technology
High speed Internet connections: Buy it with your cable TV package Watch movies on the Internet, use webcams Make phone calls – via VOIP & IM
Privacy Confidentiality laws & regulations…have a hard time keeping up as tech. rapidly merges
[email protected] 9 [email protected] 10
Record-A-Call Phone Handset: Threats on Answering Know laws @ 1-party 2-party consent & notice Machine Tapes & Voice Mail If abuser or perpetrator leaves a message, permission to be taped is usually assumed.