Sonia Hickey

Smartphones the cause and solution for cyberstalking spike

The humble smartphone is the latest weapon responsible for the surge in cyberstalking cases, but it is also one of the greatest tools to combat it. 

 

 

Sarah couldn’t figure out how her ex-boyfriend kept finding her.

She had changed phone numbers and mobile service providers. She moved in with friends, and changed houses a couple of times since then. She worked as a freelancer which meant her work schedule and location were unpredictable. But she’d see his car at the beach car park when she was walking her dog, and he’d brush past her in the grocery store an hour later.

Scared and frustrated, Sarah eventually searched her car and found a personal tracking device attached underneath.

The devices are available for as a little as $300 and can be purchased over the counter or online.

Stalkers have been known to place them into handbags and prams too because they are small and compact, and can be monitored via the Internet.

Sarah is one of an increasing number of people stalked through the use of technology. And personal tracking devices aren’t the only method used.

There are bots and automated trolls programmed to threaten targets on their social media accounts. There are remotely-installed programs to monitor the way someone uses their phone, and services that mask a caller’s original number. Abusers can even pretend to be another real person – with text messages and phone calls seemingly originating from that other person’s number.

There’s technology to alter voices from male to female, or indeed vice versa, allowing perpetrators to call banks and phone companies to impersonate their victim, and to close or even empty accounts.

Victims are being monitored by iCloud and even through the use of smart TVs – the list goes on.

According to the Australian Bureau of Statistics, an estimated 19% of women (1.6 million) and 7.8% of men (663,800) have been victims of stalking.

Stalking can take the form of loitering around homes or workplaces or following and watching targets. Telephones or emails are used in almost half of the cases that involve women.

With the advancement of technology, police and frontline domestic violence workers say they are fighting an ongoing battle against technology, and that more often than not, smartphones are the weapon of choice.

Stalking is often a component of domestic violence. And we are becoming familiar with statistics suggesting that one in three Australian women have experienced physical violence since the age of 15. And a quarter of all women in Australia have experienced physical or sexual violence in the form of a beating or rape, by their intimate partner.

But with the advancement of technology, police and frontline domestic violence workers say they are fighting an ongoing battle against technology, and that more often than not, smartphones are the weapon of choice.

Experts believe the key is to educate victims. They have found it can be harmful to victims to simply turn off their phones and shut down their social media accounts. This is because victims already feel alone and depressed, and further isolation can dangerously accelerate a downward spiral.

They point out that smartphones can be used in the war against cyber stalking – to collect evidence which can later be used to support a complaint. Victims can fight back by taking screen shots of abusive text messages, and can even use their phone’s camera and GPS coordinates to prove a person has breached an existing apprehended violence order (AVO).

The court can have regard to a pattern of behaviour when determining whether it amounts to intimidation or stalking.

Where an AVO is in place, section 14 of the Crimes (Domestic and Personal Violence) Act 2007 makes it an offence to contravene that order. The maximum penalty is two years’ imprisonment and/or a $5,500 fine.

Subsection 14(4) states that “unless the court orders otherwise” a person who contravenes an AVO “must be sentenced to a term of imprisonment if the act constituting the offence was an act of violence against a person.”

Unauthorised access to, or modification or use of computer data, is an offence under section 308H of the Crimes Act 1900 (NSW), which prescribes a maximum penalty of two years’ imprisonment for anyone who:

  • causes any unauthorised access to or modification of restricted data held in a computer, and
  • knows that the access or modification is unauthorised, and
  • intends to cause that access or modification.

“Restricted data” is that which is held in a computer, being data to which access is restricted by an access control system associated with a function of the computer.

The Criminal Code Act 1995 (Cth) contains a range of additional offences relating to the use of postal, telephone or Internet services which can capture acts of cyber stalking.

 

Sonia Hickey

Sonia Hickey is a freelance writer, magazine journalist and owner of “Woman with Words”. She has a strong interest in social justice and is a member of the Sydney Criminal Lawyers content team.

Related posts

Top