In January, the St. Louis Post-Dispatch ran an article about the use of mobile devices in stalking and domestic violence cases. Not only do stalkers--including jealous spouses or significant others--attach GPS devices to victims' vehicles to track their movements; they may sometimes even download apps or spyware onto victims' smartphones to monitor not just their movements, but also even their communications. Voice calls can be overheard, while key loggers record text messages, emails and instant messaging or chats.
The danger to victims should be apparent. Victims trying to make escape plans risk having their safety codes and travel arrangements found out. Even innocent communications can be used against a victim who may not realize the extent of a partner's jealousy.
As a law enforcement officer, you may be aware of these issues; if so, you probably know that there are limits on what you can do in cases like this. As the Post-Dispatch pointed out, in divorce proceedings in that region, judges tend to allow high-tech tracking to strengthen civil cases, and do not intervene unless a threat or harassment become apparent.
Even so, it may be difficult to gather enough evidence to support criminal charges -- assuming you have the right training and equipment to do so to begin with. So what can you do?
1. Recognize when high tech stalking may be occurring.
According to the National Network to End Domestic Violence (NNEDV), a victim who tells you that someone in his or her life “knows too much” about his or her movements, communications or other activities--who can repeat conversations word for word, is familiar with online contacts, or has precise location details, may have a digital stalker.
2. Assess the total risk.
Know where digital devices can be hidden in the home, vehicle(s), and other areas, and get the victim’s consent to search these places. Cell phones, GPS devices, digital video and/or audio recorders can all be used to monitor victims. Wireless hard drives, GPS devices, laptops or desktop computers, and even gaming equipment can all be used to store this evidence, as well.
Log the devices the victim knows about, and any devices he doesn’t. Ask how many of the various types of devices the suspect owns, keeping in mind that as the price of high tech drops, it is relatively easy to obtain new devices such as prepaid mobile phones—which can be used as cheap GPS trackers or listening devices, besides their conventional use.
3. Tag all sources of potential digital evidence and get it imaged.
These days, spyware can be installed on smartphones as easily as it can be loaded onto computers. Victims may delete upsetting text messages, but these -- along with call logs, images and emails -- may be critical pieces of evidence that need to be forensically extracted and analyzed.
The victim probably depends heavily on her phone, so help her understand that the phone you’re tagging has been compromised, that it’s no longer safe for her to own and that she needs a new one. Help her select a prepaid device, or find a local shelter that provides donated devices.
4. Help the victim understand the risks of social networking, smartphone usage and other digital resources.
Assess how he’s using his mobile device, the internet, GPS, gaming, and other digital devices and activities. Explain the difference between simple and complex passwords, and the importance of unique passwords for each device or service.
Show him how offenders can use geolocation tags in his real-time image uploads to learn where he is, how social networking or other apps’ location-based services can disclose his location, and any carrier-specific location technology that may be in use.
Also explain how the use of these technologies by people he knows -- partners, children, friends, and coworkers -- can be a “weak link” in his overall safety plan, and help him develop a plan to educate them.