1 00:00:05,200 --> 00:00:07,880 Speaker 1: Hey, this is Annie and Samantha, and welcome to stuff 2 00:00:07,880 --> 00:00:18,759 Speaker 1: I've ever told your protection of I Heart Radio. I 3 00:00:18,840 --> 00:00:23,599 Speaker 1: have a very simple question for you today, Satanta. Do 4 00:00:23,720 --> 00:00:28,080 Speaker 1: you put tape over your webcam? Uh? So I used 5 00:00:28,080 --> 00:00:31,880 Speaker 1: to put post it notes over my webcam. The new 6 00:00:32,320 --> 00:00:34,320 Speaker 1: computer I've got you actually have a little button and 7 00:00:34,360 --> 00:00:39,040 Speaker 1: you could just slide over. Yeah, okay, yeah, so I 8 00:00:39,120 --> 00:00:42,280 Speaker 1: do that is that kind of I mean, that's nice 9 00:00:42,320 --> 00:00:44,519 Speaker 1: but also very telling of our times and what we're 10 00:00:44,560 --> 00:00:49,400 Speaker 1: talking about today. I have tape over mine. I didn't 11 00:00:49,440 --> 00:00:51,599 Speaker 1: have it for a while because I got a new laptop, 12 00:00:52,520 --> 00:00:54,560 Speaker 1: but then I was researching this episode and in the 13 00:00:54,560 --> 00:01:00,760 Speaker 1: middle of it, I went and found tape's earning for sure. 14 00:01:01,040 --> 00:01:03,400 Speaker 1: Oh yeah, yeah? And was that being said? Today we 15 00:01:03,440 --> 00:01:06,800 Speaker 1: are talking about cyber stalking and sex stortions, so trigger 16 00:01:06,840 --> 00:01:11,000 Speaker 1: warning for um some abusive behaviors, some controlling behavior and 17 00:01:11,240 --> 00:01:17,280 Speaker 1: stalking and yes, sexual abuse and domestic violence. Tat that 18 00:01:17,360 --> 00:01:19,959 Speaker 1: in there. Uh. And this has been on my mind because, 19 00:01:20,000 --> 00:01:22,080 Speaker 1: as I've spoken about on the show, I recently lost 20 00:01:22,120 --> 00:01:25,360 Speaker 1: my phone and I did Samantha knows, I did all 21 00:01:25,440 --> 00:01:27,479 Speaker 1: kinds of things to try to find it. I was like, 22 00:01:28,040 --> 00:01:31,280 Speaker 1: text this thing to my phone, and I was doing 23 00:01:31,319 --> 00:01:34,920 Speaker 1: the you know, Google Find my phone, and I was 24 00:01:35,000 --> 00:01:38,280 Speaker 1: looking online because you know, everything was like it's easy 25 00:01:38,319 --> 00:01:40,000 Speaker 1: to find your lost phone, but and it would say 26 00:01:40,000 --> 00:01:42,640 Speaker 1: you have to installed installed this before you lost it. 27 00:01:42,680 --> 00:01:45,760 Speaker 1: But while I was desperately searching for a way to 28 00:01:45,760 --> 00:01:51,240 Speaker 1: find my phone, I ran across so many of these 29 00:01:51,320 --> 00:01:55,640 Speaker 1: top Google search suggestions of things like how to spy 30 00:01:55,680 --> 00:01:58,240 Speaker 1: on your wife, how to find out if your wife 31 00:01:58,280 --> 00:02:03,520 Speaker 1: is cheating, so many apps to install secretly on someone's phone. 32 00:02:03,560 --> 00:02:06,440 Speaker 1: And this is like within the first two pages of Google. 33 00:02:06,520 --> 00:02:08,520 Speaker 1: When I'm like, I want to find my lost phone, 34 00:02:09,240 --> 00:02:12,440 Speaker 1: this is what was coming up. And I have I've 35 00:02:12,440 --> 00:02:14,720 Speaker 1: talked about it before, I know on an episode we 36 00:02:14,720 --> 00:02:16,840 Speaker 1: did with Bridget about how this is a new genre 37 00:02:16,840 --> 00:02:18,800 Speaker 1: of horror that really freaks me out, this whole kind 38 00:02:18,800 --> 00:02:23,960 Speaker 1: of cyberstalking, spying thing. There's that whole really disturbing Black 39 00:02:24,080 --> 00:02:27,560 Speaker 1: Mirror episode about it. For some reason, I'm reading a 40 00:02:27,560 --> 00:02:31,040 Speaker 1: creepy fan fiction about it that really disturbs me. I 41 00:02:31,080 --> 00:02:33,240 Speaker 1: wasn't and I didn't know that sory it was gonna go, 42 00:02:33,320 --> 00:02:35,800 Speaker 1: but it did, and now I can't stop reading. So 43 00:02:35,840 --> 00:02:38,639 Speaker 1: I don't know't do about that, and then I, I 44 00:02:38,680 --> 00:02:40,799 Speaker 1: don't know if you do this, matho, but I talked 45 00:02:40,880 --> 00:02:44,840 Speaker 1: to like the man that watches me as in like 46 00:02:44,960 --> 00:02:48,680 Speaker 1: in theory this like government poor government, SAP. That is like, wow, 47 00:02:48,720 --> 00:02:53,400 Speaker 1: she's reading more fan fiction. Did not do that. You 48 00:02:53,440 --> 00:02:57,360 Speaker 1: don't talk to your the poor spy that society. But 49 00:02:57,480 --> 00:03:01,799 Speaker 1: I have a dog to talk to, So okay, replaces that. 50 00:03:02,639 --> 00:03:04,959 Speaker 1: I got it. And then I was thinking about this 51 00:03:05,040 --> 00:03:10,080 Speaker 1: today because our company has some pretty big brother type policies. 52 00:03:10,120 --> 00:03:12,560 Speaker 1: So hello, big brother company. Yeah. I used to have 53 00:03:12,600 --> 00:03:15,360 Speaker 1: a friend who worked at a company in our building, 54 00:03:16,000 --> 00:03:18,919 Speaker 1: and they had to put in a flash drive every 55 00:03:18,960 --> 00:03:20,919 Speaker 1: time when they arrived to work so that the flash 56 00:03:20,960 --> 00:03:24,640 Speaker 1: drive would record everything they every website, they did, every 57 00:03:24,680 --> 00:03:26,720 Speaker 1: everything they did on the computer, and then they would 58 00:03:26,720 --> 00:03:28,600 Speaker 1: take out the flash drive and turn it back in 59 00:03:28,720 --> 00:03:31,000 Speaker 1: so they could look at what was on there. And 60 00:03:31,120 --> 00:03:34,840 Speaker 1: it's just one of those things for that could be 61 00:03:34,880 --> 00:03:38,880 Speaker 1: abused so easily. Yeah, especially the work they do. Could 62 00:03:38,880 --> 00:03:43,560 Speaker 1: you imagine, Oh oh lord, we just talked about the 63 00:03:43,560 --> 00:03:47,440 Speaker 1: fact like we had that virginity episode, We've had episode, 64 00:03:48,000 --> 00:03:52,640 Speaker 1: we've had women who killed episodes. All of those are 65 00:03:52,680 --> 00:03:57,440 Speaker 1: really concerting. If you just saw are you looking up nothing. 66 00:03:58,480 --> 00:04:03,400 Speaker 1: I'm fine Q And on all of those things right right, 67 00:04:03,640 --> 00:04:07,080 Speaker 1: we would we would raise some suspicions for sure. Well, 68 00:04:07,120 --> 00:04:09,840 Speaker 1: I would also as a social worker go into like 69 00:04:09,920 --> 00:04:12,160 Speaker 1: kids sites and look to make sure I can find 70 00:04:12,200 --> 00:04:14,120 Speaker 1: people see if I can stop them, like I have 71 00:04:14,200 --> 00:04:16,800 Speaker 1: to try to hunt them down, um and make sure 72 00:04:16,800 --> 00:04:19,839 Speaker 1: they're okay. I had to go into kids sites when 73 00:04:19,839 --> 00:04:22,560 Speaker 1: they would post like sexual explicit stuff like you have 74 00:04:22,640 --> 00:04:25,320 Speaker 1: to take this down. This is you know, child porn 75 00:04:25,400 --> 00:04:29,240 Speaker 1: stuff like that, so I, oh god, yeah, and talk 76 00:04:29,320 --> 00:04:32,160 Speaker 1: about stalking. I try not to think about it too much. 77 00:04:32,160 --> 00:04:33,680 Speaker 1: And I know it's like a running joke. And I 78 00:04:33,760 --> 00:04:35,760 Speaker 1: even texted my friend and was like, if I die, 79 00:04:36,480 --> 00:04:39,560 Speaker 1: you know, destroying my computer, destroying my search history and 80 00:04:40,279 --> 00:04:42,839 Speaker 1: work stuff aside, I think people would be they would 81 00:04:42,880 --> 00:04:45,320 Speaker 1: give me some wiggle room for that. But even like 82 00:04:46,760 --> 00:04:49,840 Speaker 1: the stuff I do, isn't that people wouldn't be surprised 83 00:04:49,880 --> 00:04:52,120 Speaker 1: if the fan fiction, like I don't know, but I 84 00:04:52,120 --> 00:04:55,320 Speaker 1: still wanted. I was like, it's kind of like I 85 00:04:55,400 --> 00:04:57,240 Speaker 1: have a setup, and like if I disappear, you go 86 00:04:57,360 --> 00:04:59,320 Speaker 1: to these places, take these things and get rid of 87 00:04:59,320 --> 00:05:02,880 Speaker 1: those things. Nothing is there anything bad. But I'm more embarrassed, 88 00:05:03,640 --> 00:05:07,440 Speaker 1: right exactly. It's the embarrassment you're not there to defend yourselves. 89 00:05:08,080 --> 00:05:10,760 Speaker 1: That's right. That's how I feel too, and it makes 90 00:05:10,800 --> 00:05:16,360 Speaker 1: you sound so much shadier. We're not hiding anything else, No, no, 91 00:05:16,480 --> 00:05:19,880 Speaker 1: definitely not. So. We have done past episodes on stocking. 92 00:05:20,040 --> 00:05:22,160 Speaker 1: Check those out if you want to learn more. We 93 00:05:22,200 --> 00:05:23,880 Speaker 1: did also discuss a lot of what we're gonna be 94 00:05:23,920 --> 00:05:26,680 Speaker 1: talking about in our grimming episode and the recent episode 95 00:05:26,680 --> 00:05:29,320 Speaker 1: we did with bridget about online harassment. All of that's 96 00:05:29,360 --> 00:05:32,360 Speaker 1: kind of about play in this conversation. And then I 97 00:05:32,400 --> 00:05:35,240 Speaker 1: did want to put this in here. Earlier in over 98 00:05:35,320 --> 00:05:38,680 Speaker 1: thirty women sued the website porn Hub and their parent 99 00:05:38,760 --> 00:05:41,640 Speaker 1: company mind Geek for operating as a quote, classic criminal 100 00:05:41,800 --> 00:05:45,960 Speaker 1: enterprise and hosting and profiting from content that, according to them, 101 00:05:46,120 --> 00:05:50,280 Speaker 1: is non consensual that may involve child pornography, sex trafficking, 102 00:05:50,320 --> 00:05:53,599 Speaker 1: and rape and sexual assault. The lawsuit claims that the 103 00:05:53,680 --> 00:05:57,760 Speaker 1: site and the company behind it allowed for the posting, incentivization, 104 00:05:57,880 --> 00:06:01,240 Speaker 1: and monetization of this content. In the words of one 105 00:06:01,279 --> 00:06:03,800 Speaker 1: of the attorneys representing the plaintiffs, the case is not 106 00:06:03,839 --> 00:06:07,200 Speaker 1: about consensual porn or negligence. It's about a porn company's 107 00:06:07,400 --> 00:06:10,640 Speaker 1: intentional election to include in their business model rape and 108 00:06:10,680 --> 00:06:15,279 Speaker 1: other non consensual content. The lawsuit alleges that the company 109 00:06:15,320 --> 00:06:18,080 Speaker 1: purchased bolt content from sex traffickers and hit it under 110 00:06:18,080 --> 00:06:22,640 Speaker 1: Sheld Corporations. Some girls report being pressured by boyfriends to 111 00:06:22,640 --> 00:06:26,720 Speaker 1: send videos of them undressing, which then got posted. So 112 00:06:26,800 --> 00:06:28,520 Speaker 1: that is also a part of what we're going to 113 00:06:28,600 --> 00:06:31,400 Speaker 1: be talking about. And this is a complicated situation that 114 00:06:31,440 --> 00:06:35,960 Speaker 1: often gets oversimplified. Of course, any of this content they're 115 00:06:35,960 --> 00:06:38,600 Speaker 1: talking about should get taken down, and porn Hub should 116 00:06:38,640 --> 00:06:40,680 Speaker 1: be held accountable for the content they host. But at 117 00:06:40,720 --> 00:06:44,479 Speaker 1: the same time, you do get conservative groups to crying 118 00:06:44,520 --> 00:06:47,400 Speaker 1: porn in general. That muddies the whole thing. And we've 119 00:06:47,440 --> 00:06:49,719 Speaker 1: talked about that before. We've you see that with like 120 00:06:49,800 --> 00:06:53,920 Speaker 1: human on and all that stuff. But yeah, this is 121 00:06:53,920 --> 00:06:56,000 Speaker 1: not exactly what we're talking about today, but we are 122 00:06:56,040 --> 00:07:00,560 Speaker 1: talking about things that allow for stuff like this to happen, right, 123 00:07:00,760 --> 00:07:04,400 Speaker 1: So let's get into the basics. What is cyber stalking. 124 00:07:04,520 --> 00:07:08,400 Speaker 1: According to Marshall, cyberstalking refers to the use of the internet, email, 125 00:07:08,520 --> 00:07:12,440 Speaker 1: or other telecommunication technologies to harass or stalk another person. 126 00:07:13,080 --> 00:07:16,000 Speaker 1: It's not the mere annoyance of an unsolicited email. We 127 00:07:16,040 --> 00:07:18,880 Speaker 1: get all of those. We know that it is methodical, deliberate, 128 00:07:18,920 --> 00:07:22,440 Speaker 1: and persistent. The communication, whether from someone known or unknown, 129 00:07:22,720 --> 00:07:25,840 Speaker 1: do not stop even after the recipient has asked the 130 00:07:25,880 --> 00:07:29,920 Speaker 1: sender to cease all contacts and are often filled with 131 00:07:30,000 --> 00:07:34,360 Speaker 1: inappropriate and sometimes really disturbing content. Cyber Stalking is an 132 00:07:34,400 --> 00:07:37,480 Speaker 1: extension of the physical form of stalking. Yes, and it's 133 00:07:37,480 --> 00:07:39,680 Speaker 1: related to sex storation, which is a term that first 134 00:07:39,760 --> 00:07:43,200 Speaker 1: started popping up in Though it may have first appeared 135 00:07:43,200 --> 00:07:46,440 Speaker 1: in nineteen fifty, the d J addressed it in two 136 00:07:46,440 --> 00:07:50,280 Speaker 1: thousand and eleven, and the FBI cautioned about it in So. 137 00:07:50,360 --> 00:07:54,239 Speaker 1: This is when someone threatens to release sensitive information, images 138 00:07:54,360 --> 00:07:58,080 Speaker 1: or videos unless the target sends new pictures, performs a 139 00:07:58,120 --> 00:08:02,320 Speaker 1: sexual favor, pay some some money, becomes a quote cam slave, 140 00:08:02,800 --> 00:08:05,560 Speaker 1: things like that. Maybe a mixture of all those things. Um. 141 00:08:05,760 --> 00:08:10,600 Speaker 1: Both of these uh. Cyberstalking and sextortion do more directly 142 00:08:10,600 --> 00:08:14,280 Speaker 1: impact girls and women. Experts estimate that the number of 143 00:08:14,280 --> 00:08:18,680 Speaker 1: people affected by cyberstalking is in the tens of thousands, 144 00:08:18,720 --> 00:08:22,880 Speaker 1: but could be in the hundreds of thousands. In there 145 00:08:22,880 --> 00:08:26,320 Speaker 1: were sixteen thousand, nine and seventy four complaints of cyberstalking 146 00:08:26,360 --> 00:08:31,280 Speaker 1: filed with the FBI, only sixteen were prosecuted. The FBI 147 00:08:31,400 --> 00:08:34,280 Speaker 1: has reported a recent uptick in cases that fall under 148 00:08:34,320 --> 00:08:39,240 Speaker 1: federal cyberstalking laws, although that's kind of complicated. There's no 149 00:08:39,280 --> 00:08:41,760 Speaker 1: real federal cyberstalking law. We'll get into that. There are 150 00:08:41,800 --> 00:08:44,280 Speaker 1: things that it falls under. The head of the Homeland 151 00:08:44,320 --> 00:08:47,640 Speaker 1: Security Investigations here in Atlanta said when asked about this, 152 00:08:47,880 --> 00:08:51,360 Speaker 1: predators used to stop playgrounds. This is the new playground, right. 153 00:08:51,760 --> 00:08:53,520 Speaker 1: I think one of the biggest problems that we've talked 154 00:08:53,520 --> 00:08:56,600 Speaker 1: about this before is that the laws cannot keep up 155 00:08:56,640 --> 00:09:01,160 Speaker 1: with technology, right, something that probably can do that. So 156 00:09:01,240 --> 00:09:03,640 Speaker 1: while we often think of women being the victims of 157 00:09:03,679 --> 00:09:07,480 Speaker 1: sex stortion, men and boys are not immune. They may 158 00:09:07,520 --> 00:09:10,640 Speaker 1: be enticed into performing sex acts in front of webcams 159 00:09:10,679 --> 00:09:14,480 Speaker 1: with an attractive woman who may herself be coerced, unaware 160 00:09:14,520 --> 00:09:17,439 Speaker 1: they're being recorded, and they are all then threatened with 161 00:09:17,800 --> 00:09:21,640 Speaker 1: this release of the footage and often very often shane 162 00:09:21,720 --> 00:09:24,040 Speaker 1: for it and guilted into it, and this has in 163 00:09:24,200 --> 00:09:27,640 Speaker 1: some cases lead to suicide. We know some teen deaths 164 00:09:27,679 --> 00:09:32,080 Speaker 1: because of this. In some cases, male perpetrators have impersonated 165 00:09:32,160 --> 00:09:37,240 Speaker 1: significant others to trick women and to sending them sexual videos. Yes, 166 00:09:37,480 --> 00:09:40,920 Speaker 1: and many perpetrators target women and girls who are expiring 167 00:09:40,960 --> 00:09:44,079 Speaker 1: actors and models under the guise of offering them a role. 168 00:09:44,559 --> 00:09:47,560 Speaker 1: Others would pose as celebrities, such as Justin Bieber, to 169 00:09:47,640 --> 00:09:52,320 Speaker 1: demand nude pictures from young girls. Sometimes, um they edit 170 00:09:52,360 --> 00:09:55,760 Speaker 1: the material to look as though they posted compromising images 171 00:09:55,800 --> 00:09:58,040 Speaker 1: or videos to porn site, so they'll make it look 172 00:09:58,080 --> 00:10:00,839 Speaker 1: like they did. Maybe they actually didn't, but they'll send 173 00:10:00,880 --> 00:10:02,720 Speaker 1: you something that makes you think that they did. And 174 00:10:02,840 --> 00:10:05,880 Speaker 1: many people who perpetrate these acts report that it is 175 00:10:05,920 --> 00:10:09,160 Speaker 1: all about power of feeling like you are controlling someone 176 00:10:09,360 --> 00:10:12,319 Speaker 1: and it's really heartbreaking to read, like the text exchanges 177 00:10:13,120 --> 00:10:15,640 Speaker 1: of you know, a young girl being like you're ruining 178 00:10:15,920 --> 00:10:20,839 Speaker 1: my life, please stop, and they're like no, why, really 179 00:10:20,840 --> 00:10:23,400 Speaker 1: really heartbreaking And yeah, as an actor, I've seen this, 180 00:10:23,520 --> 00:10:25,920 Speaker 1: and our agent will send out messages and be like, 181 00:10:26,240 --> 00:10:29,520 Speaker 1: if you get the message from this guy, he has 182 00:10:29,600 --> 00:10:32,040 Speaker 1: nothing to do with anything in movie or film. He's 183 00:10:32,080 --> 00:10:35,160 Speaker 1: just asking for pictures of people and that's just a 184 00:10:35,200 --> 00:10:37,600 Speaker 1: part of our business. That's like a message that goes 185 00:10:37,640 --> 00:10:43,080 Speaker 1: out to two people in an occupation. It's just odd. 186 00:10:43,640 --> 00:10:46,000 Speaker 1: Cyber bullying is a part of this conversation too, and 187 00:10:46,080 --> 00:10:51,559 Speaker 1: some argue that cyber stalking is a form of cyber bullying. 188 00:10:52,280 --> 00:10:54,160 Speaker 1: So a lot of times when you look up cyberstalking, 189 00:10:54,160 --> 00:10:57,240 Speaker 1: you'll you'll end up in cyber bullying websites that have 190 00:10:57,320 --> 00:11:00,240 Speaker 1: kind of a little section about cyberstalking. I do think 191 00:11:00,240 --> 00:11:03,160 Speaker 1: it is well, it's not like new, it's newer in 192 00:11:03,280 --> 00:11:06,959 Speaker 1: terms of people really trying to combat it or think 193 00:11:07,000 --> 00:11:11,800 Speaker 1: about how we can protect ourselves from it, and how 194 00:11:11,840 --> 00:11:14,880 Speaker 1: big of an issue that it is. Right, So we 195 00:11:14,920 --> 00:11:18,040 Speaker 1: do have some more numbers and specifics for you, but 196 00:11:18,200 --> 00:11:19,960 Speaker 1: first we had a quick break for word from our 197 00:11:20,000 --> 00:11:37,240 Speaker 1: sponsor and we're back, Thank you sponsored. So, just like stalking, 198 00:11:37,280 --> 00:11:42,640 Speaker 1: cyberstalking is usually perpetrated by someone the victim knows co workers, exs, 199 00:11:42,679 --> 00:11:46,240 Speaker 1: significant others, and friends. However, like I was saying before, 200 00:11:46,320 --> 00:11:48,000 Speaker 1: this is still kind of new, especially in terms of 201 00:11:48,080 --> 00:11:51,120 Speaker 1: data collection, and so some places say that kind of 202 00:11:51,120 --> 00:11:56,040 Speaker 1: the opposite thing, Um, where it's somebody who has this 203 00:11:56,720 --> 00:11:59,320 Speaker 1: like freedom of the internet, can do it from wherever. 204 00:12:00,400 --> 00:12:01,840 Speaker 1: It makes sense to me that it would be someone 205 00:12:01,840 --> 00:12:03,640 Speaker 1: you know, but also makes sense that it would be 206 00:12:03,679 --> 00:12:09,120 Speaker 1: somebody who's just looking for someone to target. Women aged 207 00:12:09,280 --> 00:12:12,680 Speaker 1: between eighteen to thirty are the most common targets. Once that, 208 00:12:12,760 --> 00:12:17,360 Speaker 1: he found that sextortion in particular victimizes children under eighteen 209 00:12:17,720 --> 00:12:21,920 Speaker 1: at all rate of seventy one compared to stalking. Some 210 00:12:22,000 --> 00:12:25,760 Speaker 1: experts argue that because of things like the lack of obstacles, 211 00:12:26,040 --> 00:12:29,040 Speaker 1: instant gratification, lack of need to be in the same 212 00:12:29,080 --> 00:12:33,640 Speaker 1: geographic location, and difficulty to prosecute, cyberstalking is more common 213 00:12:33,720 --> 00:12:39,679 Speaker 1: and more attractive for perpetrators. Sex tortionists are almost all male, 214 00:12:40,400 --> 00:12:44,200 Speaker 1: many are repeat offenders. Most do not adhere to the 215 00:12:44,240 --> 00:12:46,440 Speaker 1: conditions of their sextortion. So if they say send me 216 00:12:46,520 --> 00:12:50,280 Speaker 1: this and then I'll give you whatever back, most of 217 00:12:50,320 --> 00:12:53,200 Speaker 1: them don't. As I learned when looking online about how 218 00:12:53,240 --> 00:12:55,880 Speaker 1: to find a lost phone, there are so many apps 219 00:12:55,880 --> 00:12:57,400 Speaker 1: out there that can be used it's buy on people, 220 00:12:57,480 --> 00:13:01,559 Speaker 1: and their functionalities are terrifying, like vocation tracking, remote use 221 00:13:01,600 --> 00:13:04,760 Speaker 1: of camera. There's also a bunch of apps that quote 222 00:13:04,800 --> 00:13:08,400 Speaker 1: guarantee to put a stop to cyberstalking for a price, 223 00:13:08,440 --> 00:13:11,240 Speaker 1: which I can't speak to whether or not they work 224 00:13:11,320 --> 00:13:13,240 Speaker 1: or not, But I find that really infuriating that you 225 00:13:13,280 --> 00:13:17,120 Speaker 1: could be in a terrifying situation and it's you're desperate 226 00:13:17,160 --> 00:13:19,280 Speaker 1: and you go and are like, Okay, a hundred dollars 227 00:13:19,360 --> 00:13:23,000 Speaker 1: will just fix this, and then might not fix it right. 228 00:13:23,000 --> 00:13:25,120 Speaker 1: And that's kind of the same thing with identity fraud, 229 00:13:25,280 --> 00:13:27,800 Speaker 1: when we have these major corporations who have decided to 230 00:13:27,840 --> 00:13:30,080 Speaker 1: take advantage of it, like pay us a monthly fee 231 00:13:30,120 --> 00:13:33,679 Speaker 1: and we'll write maybe if not, we'll help you get 232 00:13:33,720 --> 00:13:37,440 Speaker 1: it back. Maybe we'll try. But I think that's also 233 00:13:37,480 --> 00:13:40,480 Speaker 1: a thing. And I know also out there within the 234 00:13:40,559 --> 00:13:43,719 Speaker 1: dark web there are white knights, I believe, who try 235 00:13:43,800 --> 00:13:47,040 Speaker 1: to come in and infiltrate systems to let people be aware. 236 00:13:47,080 --> 00:13:49,760 Speaker 1: So we had that situation of the dude who had 237 00:13:49,760 --> 00:13:53,160 Speaker 1: a camera, a ring camera, and they actually started talking 238 00:13:53,200 --> 00:13:55,920 Speaker 1: to each other. He was like, hey, your numbers listed 239 00:13:56,200 --> 00:13:58,079 Speaker 1: on the web. They can get you real quick. And 240 00:13:58,120 --> 00:14:00,000 Speaker 1: they had this things like what's like change the path 241 00:14:00,000 --> 00:14:03,240 Speaker 1: started right now. So there's definitely that too, being a 242 00:14:03,240 --> 00:14:07,480 Speaker 1: little more rare, still just as creepy maybe, but I 243 00:14:07,520 --> 00:14:16,960 Speaker 1: guess yeah, yeah, Okay, So speaking of creepy, imagine you 244 00:14:17,040 --> 00:14:19,640 Speaker 1: have a friend, our partner that knows your pen to 245 00:14:19,720 --> 00:14:22,480 Speaker 1: your phone, you leave the room for something, they could 246 00:14:22,520 --> 00:14:25,480 Speaker 1: easily change settings in your phone and saw a hidden 247 00:14:25,520 --> 00:14:28,800 Speaker 1: spywear app things like that. Sometimes these apps are called 248 00:14:28,880 --> 00:14:34,280 Speaker 1: spousewear or stalker, where these apps are usually specifically marketed 249 00:14:34,400 --> 00:14:37,120 Speaker 1: as a way to track your spouse and catch some 250 00:14:37,240 --> 00:14:41,120 Speaker 1: cheating like they're not even hiding. Others called dual use 251 00:14:41,160 --> 00:14:44,480 Speaker 1: apps are not intended to be used for cyper stalking, 252 00:14:44,800 --> 00:14:48,520 Speaker 1: but can be things like the I Lost my Phone app, 253 00:14:48,600 --> 00:14:50,720 Speaker 1: or apps used to keep track of where your kids 254 00:14:50,760 --> 00:14:54,200 Speaker 1: are or something like find my Friends can be modified 255 00:14:54,320 --> 00:14:58,920 Speaker 1: to track someone without their knowledge. Google and Apple claim 256 00:14:58,960 --> 00:15:01,360 Speaker 1: to have consulted to me stick violence groups to address 257 00:15:01,360 --> 00:15:04,600 Speaker 1: these concerns, but most of their advice still requires that 258 00:15:04,680 --> 00:15:08,240 Speaker 1: you are the verily suspicious and aware of the ins 259 00:15:08,240 --> 00:15:10,600 Speaker 1: and outs of technology, So you would still have to 260 00:15:10,640 --> 00:15:14,000 Speaker 1: have some level of I don't trust my friend or 261 00:15:14,040 --> 00:15:16,680 Speaker 1: spouse or whatever right, which a lot of people don't 262 00:15:16,720 --> 00:15:19,400 Speaker 1: necessarily have. Because when I was looking this up, and 263 00:15:19,440 --> 00:15:22,880 Speaker 1: I consider myself pretty technologically savvy, I was like, wait, 264 00:15:27,040 --> 00:15:30,760 Speaker 1: this is terrifying, right. So, one NPR survey of eighty 265 00:15:30,760 --> 00:15:33,920 Speaker 1: two domestic violence shelters found that eight of them had 266 00:15:33,960 --> 00:15:37,200 Speaker 1: to help people with whose partners used GPS to track 267 00:15:37,280 --> 00:15:40,080 Speaker 1: their movements. And by the way, we've also seen cases 268 00:15:40,640 --> 00:15:43,560 Speaker 1: murder cases to quick kidnapping cases, any hype of cases 269 00:15:43,880 --> 00:15:47,360 Speaker 1: where detectives and law enforcement actually use this as well. 270 00:15:47,400 --> 00:15:50,080 Speaker 1: They tracked I remember that was one case. They tracked 271 00:15:50,080 --> 00:15:53,560 Speaker 1: a watch, a fitness watch for a righte case, and 272 00:15:53,640 --> 00:15:55,560 Speaker 1: there was a whole back and forth about is this 273 00:15:55,880 --> 00:16:00,400 Speaker 1: changing people's rights? Is constitutionally okay? Yeah, but just you 274 00:16:00,800 --> 00:16:02,560 Speaker 1: and I have one of these. I have a fitness watch, 275 00:16:02,680 --> 00:16:06,200 Speaker 1: but it definitely locates your GPS and it also shows 276 00:16:06,200 --> 00:16:08,880 Speaker 1: what you're doing sort of kind of tailed by the monitoring, 277 00:16:09,200 --> 00:16:13,600 Speaker 1: really creepy, but I use it and then dealt with 278 00:16:13,680 --> 00:16:16,560 Speaker 1: partners who spied on them with apps. And many of 279 00:16:16,560 --> 00:16:19,760 Speaker 1: these shelters have a digital detox center. And if you've 280 00:16:19,760 --> 00:16:22,280 Speaker 1: ever seen a spy movie, you know you gotta get 281 00:16:22,400 --> 00:16:25,560 Speaker 1: your phone. You'll get your GPS. Yeah. So a lot 282 00:16:25,600 --> 00:16:28,760 Speaker 1: of these domestic violence shelters provide like a what we 283 00:16:28,800 --> 00:16:31,880 Speaker 1: would call like a brick phone. Essentially, all it does 284 00:16:32,680 --> 00:16:36,640 Speaker 1: is call and that is it. So this this MPR 285 00:16:36,720 --> 00:16:40,240 Speaker 1: study also profiled an app called m spy for about 286 00:16:40,240 --> 00:16:42,560 Speaker 1: seventy dollars a month. This app instructure you how to 287 00:16:42,640 --> 00:16:45,200 Speaker 1: install it and then hide any trace of it, even 288 00:16:45,240 --> 00:16:48,800 Speaker 1: with a verified symbol next to it, making it look legit. 289 00:16:49,280 --> 00:16:54,840 Speaker 1: It monitors text messages, callogus, call recordings, pictures, videos, every 290 00:16:54,840 --> 00:16:59,280 Speaker 1: website visited, every key tight. This allows people to figure 291 00:16:59,320 --> 00:17:02,240 Speaker 1: out people's you, their names, and passwords. It could be 292 00:17:02,360 --> 00:17:06,280 Speaker 1: used to block phone numbers, further isolating the victim, and 293 00:17:06,440 --> 00:17:09,200 Speaker 1: location tracking all on top of that. But one of 294 00:17:09,200 --> 00:17:12,960 Speaker 1: the scariest things is the eaves drop function. When someone calls, 295 00:17:13,080 --> 00:17:16,399 Speaker 1: whether you answer or not, the speaker phone is activated 296 00:17:16,520 --> 00:17:20,240 Speaker 1: and recording starts. So someone who gets like probably twenties 297 00:17:20,280 --> 00:17:24,040 Speaker 1: spam calls a day, that would be a lot, a 298 00:17:24,119 --> 00:17:27,400 Speaker 1: lot of eavesdropping that could happen to me. Right, So, 299 00:17:27,640 --> 00:17:31,560 Speaker 1: most but not all, states have laws against cyber stalking, 300 00:17:31,600 --> 00:17:35,320 Speaker 1: and it's recent and those that don't usually they'll prosecute 301 00:17:35,320 --> 00:17:39,520 Speaker 1: cyber stalking under harassment or stalking laws. There isn't a 302 00:17:39,560 --> 00:17:42,239 Speaker 1: federal law against cyber stalking, but there is one that 303 00:17:42,320 --> 00:17:47,000 Speaker 1: covers it. So so many loopholes. However, many officials aren't 304 00:17:47,000 --> 00:17:49,639 Speaker 1: fully up to date on the ways people can be 305 00:17:49,680 --> 00:17:52,760 Speaker 1: harassed and victimized using technology. We know this, many of 306 00:17:52,760 --> 00:17:55,320 Speaker 1: them don't even understand the technology. Many of them don't 307 00:17:55,359 --> 00:18:00,560 Speaker 1: believe this technology right, which makes this whole thing super difficult. Uh, 308 00:18:00,640 --> 00:18:03,960 Speaker 1: many law enforcement officers don't have the resources, even though 309 00:18:03,960 --> 00:18:07,080 Speaker 1: they get millions of dollars, they have lots of weapons. 310 00:18:07,280 --> 00:18:10,840 Speaker 1: Just all that. Some outlets have pointed out, the prosecution 311 00:18:10,960 --> 00:18:14,439 Speaker 1: is frequently quite lenient and they are even no matter what, 312 00:18:14,600 --> 00:18:17,000 Speaker 1: and we've seen them in way too many cases when 313 00:18:17,080 --> 00:18:20,359 Speaker 1: it comes to bullying. They don't even have that on 314 00:18:20,480 --> 00:18:24,680 Speaker 1: record for face to face bullying, So having it on 315 00:18:24,720 --> 00:18:28,720 Speaker 1: an internet text doesn't worry, especially when you start talking 316 00:18:28,720 --> 00:18:34,280 Speaker 1: about the First Amendment, which is completely misinterpreted for this specifically. Yeah, 317 00:18:34,440 --> 00:18:37,840 Speaker 1: and and there are so many case studies are examples 318 00:18:37,880 --> 00:18:40,360 Speaker 1: that were given in researching this, and I know we've 319 00:18:40,400 --> 00:18:42,919 Speaker 1: talked about them before, but where women would you know, 320 00:18:43,000 --> 00:18:45,960 Speaker 1: be like, I'm being cyber's doctor, this is what's happening 321 00:18:46,000 --> 00:18:49,040 Speaker 1: to me, And they would have to explain the technology, 322 00:18:49,080 --> 00:18:51,159 Speaker 1: like they would have to do this whole extra step, 323 00:18:51,800 --> 00:18:54,320 Speaker 1: and then kind of having yet this amus like are 324 00:18:54,320 --> 00:18:59,240 Speaker 1: you sure this is athic response? Can't you just delete it? Yeah? 325 00:18:59,280 --> 00:19:02,399 Speaker 1: And this isn't in fluid the victim blaming that is 326 00:19:02,440 --> 00:19:05,159 Speaker 1: associated with all of this, So immediately, if you have 327 00:19:05,200 --> 00:19:09,600 Speaker 1: a sexy picture, you can credibility goes out the window. Yeah. Yeah, 328 00:19:10,359 --> 00:19:13,400 Speaker 1: So the technology available and the level of data collection 329 00:19:13,440 --> 00:19:16,679 Speaker 1: that happens on the Internet just at large has played 330 00:19:16,680 --> 00:19:20,640 Speaker 1: into these high numbers of cyberstalking that are yes, continuously 331 00:19:20,640 --> 00:19:23,840 Speaker 1: going up. So on top of all the things we've 332 00:19:23,840 --> 00:19:26,680 Speaker 1: talked about with phone, there's also cyberstalking online and that 333 00:19:26,680 --> 00:19:29,760 Speaker 1: that can involve similar thingies like tracking online and selling 334 00:19:29,800 --> 00:19:34,440 Speaker 1: tracking apps on someone's laptop, and also yeah, access to cameras, 335 00:19:34,480 --> 00:19:38,760 Speaker 1: sending unsolicited or threatening messages, overwhelming a target of cyberstalkings, 336 00:19:38,840 --> 00:19:42,879 Speaker 1: chat channels with messages, starting online rumors, or sharing videos 337 00:19:42,960 --> 00:19:47,400 Speaker 1: or pictures edited or not without consent, like revenge porn, blackmailing, 338 00:19:47,560 --> 00:19:50,679 Speaker 1: setting up websites that host stories that may be true 339 00:19:50,760 --> 00:19:54,159 Speaker 1: are not about the person breaking into online accounts to 340 00:19:54,240 --> 00:19:58,000 Speaker 1: pose as a person and ruin their reputation, spy where 341 00:19:58,400 --> 00:20:02,160 Speaker 1: um oh, and even like hidden cameras in people's homes 342 00:20:02,160 --> 00:20:05,200 Speaker 1: with some audio capabilities. Things like that. All of this 343 00:20:05,359 --> 00:20:08,200 Speaker 1: usually takes place over time, and it is a very 344 00:20:08,359 --> 00:20:13,040 Speaker 1: very scary experience that is yes, often dismissed. Cyberstalking can 345 00:20:13,080 --> 00:20:17,520 Speaker 1: result in negative outcomes like trouble sleeping, hyper vigilance, nightmares, 346 00:20:17,640 --> 00:20:20,600 Speaker 1: high levels of stress, trouble eating, feelings of loss of 347 00:20:20,600 --> 00:20:25,919 Speaker 1: control and safety, feelings of helplessness, fear and isolation, things 348 00:20:25,960 --> 00:20:29,159 Speaker 1: like that. Yeah, there's so many things. So online dating 349 00:20:29,560 --> 00:20:32,840 Speaker 1: has also played into this, which sucks because a part 350 00:20:32,840 --> 00:20:36,120 Speaker 1: of dating could be sending sexy backs, messages, are videos. 351 00:20:36,920 --> 00:20:38,960 Speaker 1: I've never done that. Part of this is because I 352 00:20:39,000 --> 00:20:41,639 Speaker 1: worked in social worka I knew what was happening. But 353 00:20:42,359 --> 00:20:45,400 Speaker 1: and since at least of the US is fifty four 354 00:20:45,440 --> 00:20:49,480 Speaker 1: million single people have tried online dating, there's a lot 355 00:20:49,560 --> 00:20:52,200 Speaker 1: for would be cyber stokers to mind from. And thanks 356 00:20:52,240 --> 00:20:54,600 Speaker 1: to the fact we're constantly tied to our phone just 357 00:20:54,760 --> 00:20:58,359 Speaker 1: I am, computers and other technology, there are so many 358 00:20:58,440 --> 00:21:01,040 Speaker 1: avenues for us to be victim mind and again turn 359 00:21:01,119 --> 00:21:04,320 Speaker 1: things but depend on into sources of fear and harassment. 360 00:21:04,359 --> 00:21:07,760 Speaker 1: And yeah, when it's on, when they have one picture, 361 00:21:08,040 --> 00:21:10,400 Speaker 1: it doesn't even matter, it can be there for it's 362 00:21:10,440 --> 00:21:12,680 Speaker 1: there forever. Like I remember having to show a kid 363 00:21:13,160 --> 00:21:17,480 Speaker 1: who had been sending pics of herself to a boy, 364 00:21:17,640 --> 00:21:19,000 Speaker 1: which I was like, this is a huge sake, is 365 00:21:19,000 --> 00:21:21,520 Speaker 1: gonna come back by you if you're not careful. And 366 00:21:21,680 --> 00:21:23,680 Speaker 1: also the fact that you're sending a picture of yourself. 367 00:21:23,720 --> 00:21:27,080 Speaker 1: It can actually be considered child porn other story, but 368 00:21:27,160 --> 00:21:28,919 Speaker 1: having to show her that I could go back and 369 00:21:28,960 --> 00:21:32,400 Speaker 1: pull it up for her and she was kind of like, oh, 370 00:21:32,520 --> 00:21:38,639 Speaker 1: so definitely it doesn't disappear. Yeah, um, And and it 371 00:21:38,840 --> 00:21:41,280 Speaker 1: is really really unfortunate because if we're not looking to 372 00:21:41,359 --> 00:21:46,040 Speaker 1: fear monger or anything, just something you should be aware of. 373 00:21:46,119 --> 00:21:49,639 Speaker 1: And it sucks. It does because you shouldn't have to 374 00:21:49,640 --> 00:21:51,840 Speaker 1: worry about that. If you're dating online and you do 375 00:21:51,960 --> 00:21:55,120 Speaker 1: want to send the singing picture, it is extremely unfortunate 376 00:21:55,400 --> 00:21:58,760 Speaker 1: that that is something we have to worry about. And yeah, 377 00:21:58,800 --> 00:22:02,720 Speaker 1: a lot of people, especially people who were like got 378 00:22:02,720 --> 00:22:06,200 Speaker 1: the flooded of channels or whatever, they would just talk 379 00:22:06,240 --> 00:22:08,639 Speaker 1: about how like every notification they'd get on their phone 380 00:22:08,640 --> 00:22:11,879 Speaker 1: would just send this fear fear through them. And it 381 00:22:12,000 --> 00:22:14,679 Speaker 1: is something we depend on. It is something that a 382 00:22:14,680 --> 00:22:18,840 Speaker 1: lot of us used for all kinds of like fun things, 383 00:22:18,880 --> 00:22:22,120 Speaker 1: so to have it turned into that. So some experts 384 00:22:22,160 --> 00:22:25,439 Speaker 1: breakdown cyberstalking into types. One of the most common is 385 00:22:25,520 --> 00:22:29,880 Speaker 1: email cyberstalking. This can involve trying to fix a relationship, 386 00:22:30,040 --> 00:22:34,800 Speaker 1: start a relationship, threatening or traumatizing through unsolicited messages sending 387 00:22:34,880 --> 00:22:40,400 Speaker 1: viruses or flooding someone's inbox. Um. Then there's internet cyberstalking 388 00:22:40,400 --> 00:22:44,520 Speaker 1: with the goal of slandering are threatening the victim. This 389 00:22:44,640 --> 00:22:48,280 Speaker 1: can involve breaking into accounts, spoofing, sending pornographic images, and 390 00:22:48,359 --> 00:22:53,280 Speaker 1: using spyware. Doxing can fall under this to posting private information, 391 00:22:53,720 --> 00:22:57,040 Speaker 1: posing as the victim and asking strangers for sexual activity, 392 00:22:58,119 --> 00:23:01,040 Speaker 1: or building entire websites yes, with the intent of inviting 393 00:23:01,080 --> 00:23:04,520 Speaker 1: strangers to degrade and her ask the victim. Victims have 394 00:23:04,600 --> 00:23:06,960 Speaker 1: reported strangers showing up at their door a place of 395 00:23:07,280 --> 00:23:12,439 Speaker 1: expecting sex. In one case, over one thousand people showed 396 00:23:12,560 --> 00:23:16,159 Speaker 1: up at his home. But then there are computer cyber stalkers, 397 00:23:16,600 --> 00:23:22,440 Speaker 1: stalkers who control the victims computer, which is also terrifying. 398 00:23:24,520 --> 00:23:28,160 Speaker 1: Also terrifying. UM, So we do have some some advice, 399 00:23:28,720 --> 00:23:30,639 Speaker 1: but first we're gonna pause for one more gup for 400 00:23:30,680 --> 00:23:48,080 Speaker 1: a word fromer sponsor and we're back. Thank you sponsor. So, 401 00:23:48,320 --> 00:23:50,560 Speaker 1: if you suspect or have confirmed you are the target 402 00:23:50,560 --> 00:23:53,800 Speaker 1: of cyberstalking, organizations have some steps and advice to take, 403 00:23:54,200 --> 00:23:57,480 Speaker 1: which is further complicated because a lot of it's online. 404 00:23:58,160 --> 00:24:01,760 Speaker 1: So again, if you have already looked this up, it 405 00:24:01,840 --> 00:24:05,119 Speaker 1: can be something frightening or perhaps not even possible on 406 00:24:05,160 --> 00:24:09,320 Speaker 1: your home devices. Here's what Marshall recommends. Trust your instincts 407 00:24:09,320 --> 00:24:11,920 Speaker 1: and exercise caution if you have an abuser who is 408 00:24:11,920 --> 00:24:15,000 Speaker 1: good with technology, So if you notice things like difficulty 409 00:24:15,080 --> 00:24:17,359 Speaker 1: turning off phone, or if it takes longer than normal 410 00:24:17,720 --> 00:24:21,240 Speaker 1: and unexplained increase in your data bill and increase in 411 00:24:21,320 --> 00:24:25,440 Speaker 1: battery changage, it could be a spyware app. Experts also 412 00:24:25,480 --> 00:24:28,040 Speaker 1: suggest checking to see if your phone is rooted or 413 00:24:28,200 --> 00:24:31,800 Speaker 1: jail broken. Backing up your phone is also a good idea. 414 00:24:32,119 --> 00:24:34,480 Speaker 1: All of this is with the caveat that a salcer 415 00:24:34,520 --> 00:24:36,760 Speaker 1: abuser may be able to see what you're doing, so 416 00:24:36,880 --> 00:24:40,240 Speaker 1: you have to take that into account and make sure 417 00:24:40,280 --> 00:24:44,200 Speaker 1: you're doing what is best for you and your particular situation. 418 00:24:44,800 --> 00:24:47,720 Speaker 1: On the security questions, don't answer with something guessable, answer 419 00:24:47,760 --> 00:24:49,879 Speaker 1: with something weird. I've been doing this for years. Works 420 00:24:49,880 --> 00:24:54,199 Speaker 1: for me as far as I know right, have a 421 00:24:54,280 --> 00:24:58,359 Speaker 1: safety plan in place. Organizations like RAIN or the National 422 00:24:58,359 --> 00:25:01,040 Speaker 1: Sexual Assault Hotline can help with this, and some have 423 00:25:01,160 --> 00:25:03,919 Speaker 1: quick clothes features for laptops. I know. There's been a 424 00:25:03,920 --> 00:25:06,879 Speaker 1: lot of features that allow for that, and also features 425 00:25:06,880 --> 00:25:08,320 Speaker 1: that could ask for help, but it looks like you're 426 00:25:08,359 --> 00:25:10,840 Speaker 1: talking to a friend. You can also seek out a 427 00:25:10,880 --> 00:25:13,520 Speaker 1: safer computer at a public place if you think yours 428 00:25:13,560 --> 00:25:17,840 Speaker 1: might be compromised. Um, and this is an option for you. Yeah, 429 00:25:18,280 --> 00:25:21,440 Speaker 1: create new email accounts. Look at the settings in your phone, 430 00:25:21,480 --> 00:25:25,320 Speaker 1: stuff like security, GPS, changing passwords and pin numbers. When 431 00:25:25,359 --> 00:25:29,760 Speaker 1: I lost my phone that it was like, over several days, 432 00:25:29,800 --> 00:25:31,600 Speaker 1: I kept thinking of other things I had to change 433 00:25:31,600 --> 00:25:34,159 Speaker 1: my password on, Like oh yeah, that one too. Oh yeah, 434 00:25:34,680 --> 00:25:39,960 Speaker 1: so yeah. Use a corded phone for a more private conversation. Again, 435 00:25:40,000 --> 00:25:42,119 Speaker 1: if this is something you have access to, um baby, 436 00:25:42,160 --> 00:25:45,439 Speaker 1: monitors can be listening in on as well. UM get 437 00:25:45,480 --> 00:25:48,359 Speaker 1: a new or donated phone. Some crisis centers, like we said, 438 00:25:48,359 --> 00:25:52,720 Speaker 1: provide these if possible. Learn more about policies of agencies 439 00:25:52,760 --> 00:25:56,080 Speaker 1: and companies when it comes to publishing online data. We 440 00:25:56,160 --> 00:25:58,880 Speaker 1: talked about options like delete me in a recent episode 441 00:25:58,880 --> 00:26:02,080 Speaker 1: with Bridget that can help you find and delete public information. 442 00:26:02,840 --> 00:26:06,000 Speaker 1: Get a private mailbox for communications you want to keep private, 443 00:26:06,240 --> 00:26:10,679 Speaker 1: and covering your webcam with h as any does removable tape. 444 00:26:10,760 --> 00:26:12,879 Speaker 1: If yours doesn't have the picture that allows you to 445 00:26:13,119 --> 00:26:16,720 Speaker 1: just shut it off, just slide it on over. Yeah. Um, 446 00:26:16,880 --> 00:26:19,879 Speaker 1: they also recommended things like using a gender neutral password, 447 00:26:20,200 --> 00:26:22,600 Speaker 1: never giving out your password. So I know a lot 448 00:26:22,640 --> 00:26:25,400 Speaker 1: of us are guilty of never giving out personal information 449 00:26:25,480 --> 00:26:28,320 Speaker 1: to a site or online entity you don't trust. And 450 00:26:28,400 --> 00:26:30,960 Speaker 1: if you have children, instruct them on these security measures 451 00:26:31,000 --> 00:26:34,000 Speaker 1: to um, don't respond to an email from an unknown person, 452 00:26:34,440 --> 00:26:36,560 Speaker 1: regularly search your name to see what it comes up. 453 00:26:36,600 --> 00:26:41,919 Speaker 1: That takes a lot of courage, I know. But on 454 00:26:42,040 --> 00:26:44,960 Speaker 1: top of that, most organizations suggest keeping an incident log 455 00:26:45,000 --> 00:26:48,840 Speaker 1: of any communications with the cyber stalker. And yes, having 456 00:26:48,880 --> 00:26:51,200 Speaker 1: these conversations with children so they know how to stay 457 00:26:51,240 --> 00:26:54,359 Speaker 1: safe online, and something else that could help that. We 458 00:26:54,400 --> 00:26:57,760 Speaker 1: talked about a lot more data right now. The situation 459 00:26:57,840 --> 00:27:02,280 Speaker 1: is seriously understudied and misunderstood. Like as I was saying, 460 00:27:02,280 --> 00:27:05,680 Speaker 1: as we were going through this, I saw conflicting things 461 00:27:05,720 --> 00:27:10,040 Speaker 1: all over the first Yeah, I mean when it comes 462 00:27:10,080 --> 00:27:13,320 Speaker 1: to an anemone and the internet, it gives a lot 463 00:27:13,359 --> 00:27:16,040 Speaker 1: of free access and stuff like swatting does a whole 464 00:27:16,080 --> 00:27:18,400 Speaker 1: different level when you come to like Twitch and all 465 00:27:18,440 --> 00:27:20,800 Speaker 1: those things. And yeah, that's the other part is there's 466 00:27:20,880 --> 00:27:23,680 Speaker 1: more and more technology, things like Amazon on their legs, 467 00:27:23,680 --> 00:27:26,720 Speaker 1: I doing the sidewalk feature but that immediate was like nope, 468 00:27:26,720 --> 00:27:29,600 Speaker 1: because it shows for some reason wants you to share 469 00:27:30,640 --> 00:27:35,280 Speaker 1: with the strangers, and I feel like, hey, Amazon, that's dumb. Dumb. 470 00:27:35,760 --> 00:27:39,280 Speaker 1: Also things like Google, who have been accused repeatedly of 471 00:27:39,359 --> 00:27:43,359 Speaker 1: data mining, as well as having companies that are all 472 00:27:43,440 --> 00:27:47,800 Speaker 1: the time hacked, all of the credit card companies, all 473 00:27:47,840 --> 00:27:50,320 Speaker 1: of the credit overseeing companies, like they get all that 474 00:27:50,359 --> 00:27:54,879 Speaker 1: information and identities being sold because they have features like that. 475 00:27:54,920 --> 00:27:57,520 Speaker 1: We're not even talking about that as part of the 476 00:27:57,520 --> 00:28:01,359 Speaker 1: sobberstalking because yeah, that's easily accessible. We've known for a 477 00:28:01,359 --> 00:28:03,320 Speaker 1: long time if you go to white Pages and you 478 00:28:03,320 --> 00:28:06,040 Speaker 1: want to pay some money, you can get complete access 479 00:28:06,080 --> 00:28:08,920 Speaker 1: to home phone number address. You just have to pay 480 00:28:09,320 --> 00:28:13,480 Speaker 1: ten dollars a subscription, which is really really absurd and 481 00:28:13,920 --> 00:28:16,960 Speaker 1: quite quite alarming as in fact, so that doesn't even 482 00:28:17,000 --> 00:28:20,119 Speaker 1: include any of that. We're talking more about the personal level. 483 00:28:20,320 --> 00:28:22,760 Speaker 1: But when it comes to and we've talked about this 484 00:28:22,840 --> 00:28:27,639 Speaker 1: with bridget corporate responsibility and no one really really actually 485 00:28:28,080 --> 00:28:31,960 Speaker 1: dealing with that, that's a whole different conversation. It is. 486 00:28:32,119 --> 00:28:34,640 Speaker 1: It's it's another one of those things where so much 487 00:28:34,640 --> 00:28:38,720 Speaker 1: of the advice for giving in this is basically putting 488 00:28:38,720 --> 00:28:41,120 Speaker 1: the impetus on you and the responsibility on you to 489 00:28:41,200 --> 00:28:44,320 Speaker 1: be vigilant when you shouldn't have to be so concerned 490 00:28:45,320 --> 00:28:50,880 Speaker 1: that a company that you use got hacked right now, right, 491 00:28:51,240 --> 00:28:53,800 Speaker 1: and yeah, we shouldn't have to pay extra money for 492 00:28:53,880 --> 00:28:56,560 Speaker 1: buying a service that should have been already included in 493 00:28:56,600 --> 00:29:01,320 Speaker 1: the service that we're paying for, right just little self, 494 00:29:01,360 --> 00:29:08,360 Speaker 1: do this a little poppy well, listeners, As always, we 495 00:29:08,440 --> 00:29:11,600 Speaker 1: would love to hear from you. You can email us 496 00:29:11,640 --> 00:29:13,760 Speaker 1: at Steffie your mom Stuff, I hurt me dot com. 497 00:29:13,960 --> 00:29:15,680 Speaker 1: You can find us on Instagram at steff I Never 498 00:29:15,760 --> 00:29:18,240 Speaker 1: Told You, are on Twitter at mom Stuff Podcast. Thanks 499 00:29:18,280 --> 00:29:21,800 Speaker 1: as always to our super producer Christina, Thank you, and 500 00:29:21,960 --> 00:29:23,920 Speaker 1: thanks to you for listening Stuff I Never Told You 501 00:29:24,000 --> 00:29:25,880 Speaker 1: production if I high Radio for more podcast and I 502 00:29:25,960 --> 00:29:28,360 Speaker 1: Hear Radio via Hear Radio app, Apple podcast, or wherever 503 00:29:28,360 --> 00:29:29,640 Speaker 1: you listen to your favorite shows.