SlideShare una empresa de Scribd logo
1 de 58
Interconnected Nature
  of Gender & Sexual
    Violence Crimes
   Building a Stalking Case
Agenda


            • Introductions
            • Context
            • Law Enforcement Investigations
            • Threat Assessment
            • Safety Planning

© Margolis Healy & Associates, LLC
TWEET TWEET




                                     @margolishealy
                                       #vcsf2012



© Margolis Healy & Associates, LLC
Peggy Klinke




            • Pay attention to Patrick Kennedy’s legal
                   actions
            • Fact patterns


© Margolis Healy & Associates, LLC
Peggy Klinke




                 Lifetime Television for Women Video on
                              Peggy Klinke




© Margolis Healy & Associates, LLC
Peggy Klinke


         What did Patrick Kennedy do that was not
         illegal?
                 •       Waited outside work and gym
                 •       Watched her
                 •       Called her on cell phone
                 •       Dozen roses and wedding ring
                 •       8x11 flier with disparaging comments
© Margolis Healy & Associates, LLC
Peggy Klinke – Fact Pattern


         •       Peggy and Mark dated for 3 years
         •       Began stalking after breakup
         •       Mark Sparks
         •       ―Peggy is a Whore‖
         •       Patrick’s house on fire



© Margolis Healy & Associates, LLC
Peggy Klinke – Fact Pattern


         •       Peggy reported everything to police
         •       Obtained Restraining Order
         •       She moved to CA
         •       Patrick checked guns in Albuquerque
         •       Pays PI to find her



© Margolis Healy & Associates, LLC
Impact on Victims



                ―It’s going to take getting a bullet
                put in my head before people
                understand how serious this is.‖
                             Statement by Peggy Klinke made one month
                                   before she was killed in January 2003




© Margolis Healy & Associates, LLC
What is Stalking?



         • Stalking generally refers to repeated
               harassing or threatening behavior
               putting another person in fear
         • Experiencing repeated, obsessive, and
               frightening behavior that made the victim
               afraid or concerned for safety



© Margolis Healy & Associates, LLC
Stalking is a...



           Course of Conduct Crime
                                         not
                    Incident Based Crime

© Margolis Healy & Associates, LLC
Prevalence of Stalking

          • Estimated 3.4 million people are stalked
                 annually
                                      - Stalking Victimization in the United States, BJS (2009)



          • 1 out of every 12 U.S. Women (8.2
                 million) and 1 out of every 45 U.S. men
                 (2 million) has been stalked at some
                 point
                                      - National Violence Against Women Survey (1998)


          • 13.1% of college women were stalked
                 during one semester of college
                                      - The Sexual Victimization of College Women (2000)




© Margolis Healy & Associates, LLC
Prevalence - Femicide Study


          • 76% of femicide cases involved at least
                 one episode of stalking within 12
                 months prior to the murder

          • 85% of attempted femicide cases
                 involved at least one episode of
                 stalking within 12 months prior to the
                 attempted murder

                           - McFarlane et al. (1999). ―Stalking and Intimate Partner Femicide,‖ Homicide Studies


© Margolis Healy & Associates, LLC
IPV and Stalking


          • 81% of stalking victims who were
                 stalked by an intimate partner reported
                 that they had also been physically
                 assaulted by that partner

          • 31% were also sexually assaulted by
                 that partner
                                               - National Violence Against Women Survey (1998)




© Margolis Healy & Associates, LLC
Stalking Victims




© Margolis Healy & Associates, LLC
Stalking Reported to LE
Reported to Law Enforcement
 Reported to Law Enforcement
                         Campus Police
                           Campus Police
Municipal/Local/City Police/911
Municipal/Local/City Police/911
                          County Sheriff
                             County Sheriff
                               State Police

                                  State Police
                                       Other

                                        Other
                                           0%           20%      40%           60%            80%            100%

                                                 0%        20%         40%             60%             80%

      Both On/Off-Campus Stalking                     Off-Campus Stalking        On-Campus Stalking
  © Margolis Healy & Associates, LLC                              - The Sexual Victimization of College Women (2000)
Gender of Offenders
                    Female Victims                                  Male Victims

           Female Victims                                 Male Victims

   Male                                             Male
 Offender                                         Offender
                         67%                                        41%


                                     24%                                        43%
                                                                                           Female
                                       Female                                             Offender
                                       Offender

                                                  - Stalking Victimization in the United States, BJS (2009)



© Margolis Healy & Associates, LLC
Stalking Suspects

          • 94% of female victims were stalked by
                 men

          • 60% of male victims were stalked by
                 men

          • Overall, 87% of stalkers were men
                         Why is this relevant to a police
                                investigation??


© Margolis Healy & Associates, LLC
Stalking on Campus


          •      Stalking incidents lasted an average of
                 60 days
          •      30% of victims were stalked only off
                 campus
          •      66% of victims reported being stalked at
                 least 2 – 6 times per week


                                          - National Sexual Victimization of College Women Survey (2000)

© Margolis Healy & Associates, LLC
Law Enforcement Response




© Margolis Healy & Associates, LLC
Before we investigate…

            •      Complex, interrelated and underreported
                   violent crimes
            •      A Multi-disciplinary trained response is critical
                   for the effective investigation
            •      Policies enhance safety and accountability
            •      What is your message about gender/sexual
                   violence crimes on campus
            •      Who responds, what level of specialized
                   training do they have
            •      Is the response coordinated, compassionate,
                   objective and thorough = Professional

© Margolis Healy & Associates, LLC
Before we investigate…
            •      Rapport, trust and reassurance
            •      Multi-disciplinary coordinated response
            •      Avoid trying to prove a hypothesis (my ―gut‖
                   tells me…)
            •      Strategy for a good investigation = examine
                   all the evidence and let it take you to the
                   truth
            •      Always approach a case believing that a
                   crime occurred… victims feel they won’t be
                   believed

© Margolis Healy & Associates, LLC
Case Management Steps

            • Reports & recognition of stalking
            • Investigative challenges & opportunities
            • Assessment, response & initial
                   Investigation
            • Stalker assessment
            • Interviews
            • Threat assessment
            • Safety planning
© Margolis Healy & Associates, LLC
Reports to Law Enforcement

          • 54% of femicide victims reported
                 stalking to police before they were
                 killed by their stalkers

          • 46% of attempted femicide victims
                 reported stalking to police before the
                 attempted murder

                                     LETHALITY

© Margolis Healy & Associates, LLC
Recognition of Stalking

          • Report of harassing behavior should raise
                 stalking flag for officer

          • Check whether incident is isolated or
                 repeated conduct, although a mere report of
                 harassing conduct should be cause to assume
                 the likelihood of prior behavior

          • If a victim expresses fear of suspect, these fears
                 should be taken seriously and inquiry should
                 be made to determine the origin of the fear

© Margolis Healy & Associates, LLC
Recognition of Stalking

          •      Review checklist of common harassing
                 behaviors with the complainant
          •      Check for prior police reports and in
                 which jurisdiction(s)
          •      Determine whether family or friends
                 have filed reports related to the suspect
                 or harassing behavior
          •      Engaging in more than one incident of
                 harassing behavior should trigger
                 evaluation as potential stalking case
© Margolis Healy & Associates, LLC
Case Study 1

            John Doe (college age male) is caught
            touching himself while watching a woman
            shower in a residence hall. Upon
            investigation, campus police learn that he
            has been caught peering in windows, etc.,
            at 4 women at other universities and
            colleges in 4 other states.
            What do we know?


© Margolis Healy & Associates, LLC
Investigative Challenges

          • Difficult to identify / officer misconceptions
          • Criminal acts in multiple jurisdictions (police,
                 law enforcement, victims)
          • Multiple victims?
          • Ongoing crime w/ varying activity levels over
                 several years
          • Few witnesses & little evidence
          • Technology
          • Police response cannot guarantee it will stop
                                     BUILD THE CASE
© Margolis Healy & Associates, LLC
Investigative Opportunities

          • Stalking is a course of conduct (ongoing, long-
                term crime)

          • Same victim, offender, locations?
          • Suspects often confess (they want to tell you
                how/why they are being misunderstood)

          • Police understand stalkers...
          • Technology

© Margolis Healy & Associates, LLC
Assessing the Complaint

          • Gathering basic information: personal data,
                 prior stalking.

          • Once stalking is suspected, gather pertinent
                 information: other incidents, threats to victim,
                 reaction of victim to behavior.

          • Relationship: how much does stalker know
                 about victim?


© Margolis Healy & Associates, LLC
Elements of an Effective
                                     Response

          1. Early identification & intervention (safety
             planning)
          2. Threat assessment & investigation
          3. Responding to technologies
          4. Training
          5. Relationship between law enforcement agency
             and:
                 - Other Law Enforcement Agencies
                 - Community Resources
                 - Prosecution
© Margolis Healy & Associates, LLC
Case Study II

            A female student changes residence hall
            floors in the same building. She notices
            that the clock radio in the bathroom on the
            5th floor is the same, unique looking clock
            radio that was in the bathroom on the 2nd
            floor, where she used to live.
            Suspicious, she calls campus police…
            What do we know?


© Margolis Healy & Associates, LLC
Stalker Assessment


          • Prior threats
          • Actual pursuit of victim
          • History of crime and violence, mental illness,
                 drug abuse, protective order violations
          • Tendency toward outbursts
          • Possession, knowledge of, fascination with
                 weapons



© Margolis Healy & Associates, LLC
Investigate the offender


            •      Offender’s history/background
            •      Social circles for similar, other victims,
                   interrelated crimes / conduct
            •      Social media, pre and post stalking
                   messages/calls
            •      Develop suspect interview strategy…
            •      Tie in offender behavior, background, anti-
                   violence prevention education

© Margolis Healy & Associates, LLC
Stalking Assessment

          • Annoying phone calls, text messages, etc?
          • Unsolicited correspondence?
          • Location patterns?
          • Threats of homicide or suicide?
          • Acts of vandalism or arson?
          • Is victim in fear? (document observations and
                 statements)


© Margolis Healy & Associates, LLC
Victim Interviews

          • Document demeanor & emotional state
          • Ascertain level of fear– is it consistent with
                 stalking behavior directed at them?
          • Is there more to the case than you are
                 hearing?
          • Avoid passing judgment
          • Negate self-blame
          • Make available support services

© Margolis Healy & Associates, LLC
Suspect Interview

          • Interview (stalkers like to talk)
          • Control the interview
          • Document demeanor & emotional state
          • Document, document, document
          • Miranda, when applicable
          • Avoid passing judgment


© Margolis Healy & Associates, LLC
Threat Assessment




             Every professional at every stage of a
          stalking case must be constantly assessing
                           the threat




© Margolis Healy & Associates, LLC
Threat & the Status Quo

          A change in the status quo raises the threat.
          Risk is high when:
                 - Protective order is served
                 - Following arrest
                 - Trial date approaching
                 - Upon receipt of ―no contact‖ letter from
                         victim
                 -       Following any contact with law enforcement
                 -       Stalker loses job

© Margolis Healy & Associates, LLC
Threat Assessment



          • How well does suspect know victim?
          • Is victim in fear? Why? Victim’s family,
                 friends, coworkers?

          • Is victim naive about the danger?



© Margolis Healy & Associates, LLC
Threat Assessment


          • Develop a timeline of stalking events
          • Look for escalation
             6/6/11 6/8/11           6/12/11   6/15/11    6/20/11     6/25/11



                             Showed up at
                                gym                Parked across         Cat
                   Threatening                     street all night
                       call                                           poisoned
                                        Dead roses

          letters


© Margolis Healy & Associates, LLC
The next phase in the violence relationship...




© Margolis Healy & Associates, LLC
―Please don’t do this to me‖




© Margolis Healy & Associates, LLC
Stalkers don’t just go away




This is the address of
the jail.




                                      This was addressed to
                                      the victim
 © Margolis Healy & Associates, LLC
Using children as agents to
                                     stalk




  Note to child to give to Mommy
© Margolis Healy & Associates, LLC
Ways we can strengthen
                                     cases

          • Empower victim to play an active
                 role in investigation
          • Document, document, document
          • Investigate stalker’s past (other
                 victims, acts, cases, witnesses)


© Margolis Healy & Associates, LLC
Advantages of Charging
                                     ―Stalking‖

          •      To prove a Course of Conduct, the state
                 may introduce evidence that would
                 otherwise be inadmissible
          •      If viewed within the correct context of the
                 law, stalking statutes can criminalize
                 seemingly benign behaviors
          •      When properly investigated and charged
                 aggressively, stalking cases can save
                 lives

© Margolis Healy & Associates, LLC
Important to Remember...


         • Any type of crime or any type of
                   noncriminal act directed toward
                   the victim can be part of a
                   stalking case
         • The law criminalizes non-criminal
                   behavior


© Margolis Healy & Associates, LLC
Safety Planning


          • How might safety planning in
                 stalking cases be the same as
                 safety planning in IPV/DV
                 cases?
          • How might it be different?

© Margolis Healy & Associates, LLC
Safety Planning – Goals


          1.Reduce risk of encounters with
            the stalker
          2.Create contingency plan for what
            to do if the victim does encounter
            the stalker


© Margolis Healy & Associates, LLC
Safety Planning - Guiding
                                     Principles


          •      The victim is responsible for her own safety

          •      Law enforcement can provide the tools to protect
                 herself/himself

          •      Victim must be proactive in planning for his/her
                 safety

          • Safety planning is case specific



© Margolis Healy & Associates, LLC
Strategic Considerations

          •      Safety planning begins at initial contact through
                 duration of case
          • Communicate regularly with victim
          • Keep victim actively involved in safety planning
          • Safety plan must continue to focus on what victim
                 feels will work
          •      Assess victim’s environment—home, work,
                 school, routines
          •      With criminal charges, keep victim apprised of
                 case/defendant status, and release (when
                 applicable)

© Margolis Healy & Associates, LLC
Strategic Considerations

          •      Encourage victims to report new offenses, and
                 fully inform victim of actions and reasons for
                 them
          •      Be prepared to intercede for victim if planning
                 puts victim’s job in jeopardy
          • Activate victim’s social supports
          • Involve children in planning process
          • Victim should carry cell phone (and battery)
          • Discourage victim from contacting stalker
© Margolis Healy & Associates, LLC
Safety Planning – Innovative
                                     App


         • Stalking Sacks
         • Victim & Offender Books
         • Flyers
         • Support Groups

© Margolis Healy & Associates, LLC
Things to remember…


         •      Focus on the victim
         •      Ask victim how she interprets the
                behavior (might not seem threatening to
                you or me, but to her…)
         •      If victim senses she is in danger… LISTEN!
         •      If the victim OR YOU suspect that the
                stalker/abuser has too much ―inside‖ info…
                he probably does!

© Margolis Healy & Associates, LLC
4 things to always strive for


         1. Making victims feel it is safe &
            appropriate to report stalking
         2. Recognizing stalking when we
            encounter it (even if the victim doesn’t)
         3. Making victims safer from stalkers
         4. Policy connection



© Margolis Healy & Associates, LLC
Resources




      •     Stalking Resource Center
            (www.ncvc.org/src)
      •     National Higher Education Center
            (www.higheredcenter.org)
      •     www.MargolisHealy.com



© Margolis Healy & Associates, LLC               68
                                                      6
Contact




                                     Dr. Gary J. Margolis
                              gmargolis@margolishealy.com
                                      1-866-817-5817




© Margolis Healy & Associates, LLC

Más contenido relacionado

La actualidad más candente

Powerpoint On Rape Final With Pictures
Powerpoint On Rape Final With PicturesPowerpoint On Rape Final With Pictures
Powerpoint On Rape Final With Picturesguest794bfc0
 
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...James Marsh
 
Pollock ethics 8e_ch12
Pollock ethics 8e_ch12Pollock ethics 8e_ch12
Pollock ethics 8e_ch12windleh
 
RAPE CASES IN "INDIA".AU
RAPE CASES IN "INDIA".AURAPE CASES IN "INDIA".AU
RAPE CASES IN "INDIA".AUVinish Kumar
 
Crime, Violence, and Criminal Justice
Crime, Violence, and Criminal  JusticeCrime, Violence, and Criminal  Justice
Crime, Violence, and Criminal JusticeStdcgb17
 
Racial profiling
Racial profilingRacial profiling
Racial profilingjbupp
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Carter F. Smith, J.D., Ph.D.
 
Pollock ethics 8e_ch13
Pollock ethics 8e_ch13Pollock ethics 8e_ch13
Pollock ethics 8e_ch13windleh
 
CJ & Violence Final Exam Paper
CJ & Violence Final Exam PaperCJ & Violence Final Exam Paper
CJ & Violence Final Exam PaperDevin Murphy
 
Sexual Assault Manual
Sexual Assault ManualSexual Assault Manual
Sexual Assault ManualHilary Conrad
 
Racial profiling and response cja 344
Racial profiling and response cja 344Racial profiling and response cja 344
Racial profiling and response cja 344Mimi Harvill
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...Carter F. Smith, J.D., Ph.D.
 
Perceptions of gang investigators regarding presence of military trained gang...
Perceptions of gang investigators regarding presence of military trained gang...Perceptions of gang investigators regarding presence of military trained gang...
Perceptions of gang investigators regarding presence of military trained gang...Carter F. Smith, J.D., Ph.D.
 

La actualidad más candente (20)

Powerpoint On Rape Final With Pictures
Powerpoint On Rape Final With PicturesPowerpoint On Rape Final With Pictures
Powerpoint On Rape Final With Pictures
 
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
 
Pollock ethics 8e_ch12
Pollock ethics 8e_ch12Pollock ethics 8e_ch12
Pollock ethics 8e_ch12
 
RAPE CASES IN "INDIA".AU
RAPE CASES IN "INDIA".AURAPE CASES IN "INDIA".AU
RAPE CASES IN "INDIA".AU
 
1.5.5 Liz Mulder
1.5.5 Liz Mulder1.5.5 Liz Mulder
1.5.5 Liz Mulder
 
Rape and date rape drug
Rape and date rape drugRape and date rape drug
Rape and date rape drug
 
Crime, Violence, and Criminal Justice
Crime, Violence, and Criminal  JusticeCrime, Violence, and Criminal  Justice
Crime, Violence, and Criminal Justice
 
Ethical Case study
Ethical Case studyEthical Case study
Ethical Case study
 
Racial profiling
Racial profilingRacial profiling
Racial profiling
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...
 
Gangs and the military
Gangs and the military Gangs and the military
Gangs and the military
 
Pollock ethics 8e_ch13
Pollock ethics 8e_ch13Pollock ethics 8e_ch13
Pollock ethics 8e_ch13
 
Ch5 rape
Ch5 rapeCh5 rape
Ch5 rape
 
CJ & Violence Final Exam Paper
CJ & Violence Final Exam PaperCJ & Violence Final Exam Paper
CJ & Violence Final Exam Paper
 
Sexual Assault Manual
Sexual Assault ManualSexual Assault Manual
Sexual Assault Manual
 
Mapping Gangs1
Mapping Gangs1Mapping Gangs1
Mapping Gangs1
 
Racial profiling and response cja 344
Racial profiling and response cja 344Racial profiling and response cja 344
Racial profiling and response cja 344
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...
 
Crime & Violence
Crime & ViolenceCrime & Violence
Crime & Violence
 
Perceptions of gang investigators regarding presence of military trained gang...
Perceptions of gang investigators regarding presence of military trained gang...Perceptions of gang investigators regarding presence of military trained gang...
Perceptions of gang investigators regarding presence of military trained gang...
 

Similar a The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build A Sexual Assault Case, VCSF 2012

Exploring the Challenges of Violence Against Women Crimes on Campus, Margolis...
Exploring the Challenges of Violence Against Women Crimes on Campus, Margolis...Exploring the Challenges of Violence Against Women Crimes on Campus, Margolis...
Exploring the Challenges of Violence Against Women Crimes on Campus, Margolis...Margolis Healy
 
Domestic homicide in the workplace lessons learned from the dupont-daniel case1
Domestic homicide in the workplace  lessons learned from the dupont-daniel case1Domestic homicide in the workplace  lessons learned from the dupont-daniel case1
Domestic homicide in the workplace lessons learned from the dupont-daniel case1Joy Vas, CHRP
 
Chas presentation final
Chas presentation finalChas presentation final
Chas presentation finalMargolis Healy
 
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...Margolis Healy
 
Voilence, abuse and harassment
Voilence, abuse and harassment Voilence, abuse and harassment
Voilence, abuse and harassment Arundhati Sahni
 
Domestic violence
Domestic violenceDomestic violence
Domestic violencegilljenn
 
Gender based violence_in_humanitarian_settings__a_practical_guidlines__by_dr_...
Gender based violence_in_humanitarian_settings__a_practical_guidlines__by_dr_...Gender based violence_in_humanitarian_settings__a_practical_guidlines__by_dr_...
Gender based violence_in_humanitarian_settings__a_practical_guidlines__by_dr_...Malik Khalid Mehmood
 
Domestic Violence (Research Project)
Domestic Violence (Research Project)Domestic Violence (Research Project)
Domestic Violence (Research Project)Serdar Sönmez
 
Hypothesis testing presentation
Hypothesis testing presentationHypothesis testing presentation
Hypothesis testing presentationSandra Cruz
 
Intimate partner abuse
Intimate partner abuseIntimate partner abuse
Intimate partner abuseCraigWood67
 
Evolutionary explanations of human aggression (2)
Evolutionary explanations of human aggression (2)Evolutionary explanations of human aggression (2)
Evolutionary explanations of human aggression (2)Angeline David
 
Combating Human Trafficking in the USA and investigating it Right
Combating Human Trafficking in the USA and investigating it RightCombating Human Trafficking in the USA and investigating it Right
Combating Human Trafficking in the USA and investigating it RightByron Olivere
 
What do we_know_about_sexual_abuse
What do we_know_about_sexual_abuseWhat do we_know_about_sexual_abuse
What do we_know_about_sexual_abuseKaterina Kolnogorova
 
122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and MeasurinCicelyBourqueju
 
122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and MeasurinChantellPantoja184
 
Domestic Violence
Domestic Violence Domestic Violence
Domestic Violence ETLEE4
 

Similar a The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build A Sexual Assault Case, VCSF 2012 (20)

Exploring the Challenges of Violence Against Women Crimes on Campus, Margolis...
Exploring the Challenges of Violence Against Women Crimes on Campus, Margolis...Exploring the Challenges of Violence Against Women Crimes on Campus, Margolis...
Exploring the Challenges of Violence Against Women Crimes on Campus, Margolis...
 
Domestic homicide in the workplace lessons learned from the dupont-daniel case1
Domestic homicide in the workplace  lessons learned from the dupont-daniel case1Domestic homicide in the workplace  lessons learned from the dupont-daniel case1
Domestic homicide in the workplace lessons learned from the dupont-daniel case1
 
Chas presentation final
Chas presentation finalChas presentation final
Chas presentation final
 
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
 
Domestic Violence Presentation
Domestic Violence PresentationDomestic Violence Presentation
Domestic Violence Presentation
 
Voilence, abuse and harassment
Voilence, abuse and harassment Voilence, abuse and harassment
Voilence, abuse and harassment
 
Domestic violence
Domestic violenceDomestic violence
Domestic violence
 
Domestic violence
Domestic violenceDomestic violence
Domestic violence
 
Gender based violence_in_humanitarian_settings__a_practical_guidlines__by_dr_...
Gender based violence_in_humanitarian_settings__a_practical_guidlines__by_dr_...Gender based violence_in_humanitarian_settings__a_practical_guidlines__by_dr_...
Gender based violence_in_humanitarian_settings__a_practical_guidlines__by_dr_...
 
Trapped in the Shadows: Sex Trafficking and Women's Health
Trapped in the Shadows: Sex Trafficking and Women's HealthTrapped in the Shadows: Sex Trafficking and Women's Health
Trapped in the Shadows: Sex Trafficking and Women's Health
 
Domestic Violence (Research Project)
Domestic Violence (Research Project)Domestic Violence (Research Project)
Domestic Violence (Research Project)
 
Hypothesis testing presentation
Hypothesis testing presentationHypothesis testing presentation
Hypothesis testing presentation
 
Intimate partner abuse
Intimate partner abuseIntimate partner abuse
Intimate partner abuse
 
Evolutionary explanations of human aggression (2)
Evolutionary explanations of human aggression (2)Evolutionary explanations of human aggression (2)
Evolutionary explanations of human aggression (2)
 
Combating Human Trafficking in the USA and investigating it Right
Combating Human Trafficking in the USA and investigating it RightCombating Human Trafficking in the USA and investigating it Right
Combating Human Trafficking in the USA and investigating it Right
 
What do we_know_about_sexual_abuse
What do we_know_about_sexual_abuseWhat do we_know_about_sexual_abuse
What do we_know_about_sexual_abuse
 
122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin
 
122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin
 
Domestic Violence
Domestic Violence Domestic Violence
Domestic Violence
 
Intimate Partner Violence
Intimate Partner ViolenceIntimate Partner Violence
Intimate Partner Violence
 

Más de Margolis Healy

Conducting concurrent titleix_and_criminal_investigations
Conducting concurrent titleix_and_criminal_investigationsConducting concurrent titleix_and_criminal_investigations
Conducting concurrent titleix_and_criminal_investigationsMargolis Healy
 
Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA AmendmentsTitle IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA AmendmentsMargolis Healy
 
MHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMargolis Healy
 
Building a compliant clery act program updated june3 2200
Building a compliant clery act program updated june3 2200Building a compliant clery act program updated june3 2200
Building a compliant clery act program updated june3 2200Margolis Healy
 
Comprehensive safety planning meeting of the minds april 3, 2014
Comprehensive safety planning meeting of the minds april 3, 2014Comprehensive safety planning meeting of the minds april 3, 2014
Comprehensive safety planning meeting of the minds april 3, 2014Margolis Healy
 
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Margolis Healy
 
VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote Margolis Healy
 
Margolis Healy Clery Center 2013 Clery Compliance Talking Papers
Margolis Healy Clery Center 2013 Clery Compliance Talking PapersMargolis Healy Clery Center 2013 Clery Compliance Talking Papers
Margolis Healy Clery Center 2013 Clery Compliance Talking PapersMargolis Healy
 
Building & Facilitating a Comprehensive Clery Compliance Program
Building & Facilitating a Comprehensive Clery Compliance ProgramBuilding & Facilitating a Comprehensive Clery Compliance Program
Building & Facilitating a Comprehensive Clery Compliance ProgramMargolis Healy
 
Margolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training ToolMargolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training ToolMargolis Healy
 
Title IX - Focusing on the Important SCCLEA
Title IX  - Focusing on the Important SCCLEATitle IX  - Focusing on the Important SCCLEA
Title IX - Focusing on the Important SCCLEAMargolis Healy
 
Active Shooter Exercise Presentation, 2013 SCCLEA Conference
Active Shooter Exercise Presentation, 2013 SCCLEA ConferenceActive Shooter Exercise Presentation, 2013 SCCLEA Conference
Active Shooter Exercise Presentation, 2013 SCCLEA ConferenceMargolis Healy
 
UNC Title IX Training Seminar, FEB 2013
UNC Title IX Training Seminar, FEB 2013UNC Title IX Training Seminar, FEB 2013
UNC Title IX Training Seminar, FEB 2013Margolis Healy
 
The White House - Gun Violence Reduction Executive Actions
The White House - Gun Violence Reduction Executive ActionsThe White House - Gun Violence Reduction Executive Actions
The White House - Gun Violence Reduction Executive ActionsMargolis Healy
 
Now Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact SheetNow Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact SheetMargolis Healy
 
MHA SCN Webinar on School Security
MHA SCN Webinar on School SecurityMHA SCN Webinar on School Security
MHA SCN Webinar on School SecurityMargolis Healy
 
Clery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceClery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceMargolis Healy
 
MHA How Safe Are Our Campuses??
MHA How Safe Are Our Campuses??MHA How Safe Are Our Campuses??
MHA How Safe Are Our Campuses??Margolis Healy
 
MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012Margolis Healy
 
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...Margolis Healy
 

Más de Margolis Healy (20)

Conducting concurrent titleix_and_criminal_investigations
Conducting concurrent titleix_and_criminal_investigationsConducting concurrent titleix_and_criminal_investigations
Conducting concurrent titleix_and_criminal_investigations
 
Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA AmendmentsTitle IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
 
MHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy Presentation
 
Building a compliant clery act program updated june3 2200
Building a compliant clery act program updated june3 2200Building a compliant clery act program updated june3 2200
Building a compliant clery act program updated june3 2200
 
Comprehensive safety planning meeting of the minds april 3, 2014
Comprehensive safety planning meeting of the minds april 3, 2014Comprehensive safety planning meeting of the minds april 3, 2014
Comprehensive safety planning meeting of the minds april 3, 2014
 
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
 
VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote
 
Margolis Healy Clery Center 2013 Clery Compliance Talking Papers
Margolis Healy Clery Center 2013 Clery Compliance Talking PapersMargolis Healy Clery Center 2013 Clery Compliance Talking Papers
Margolis Healy Clery Center 2013 Clery Compliance Talking Papers
 
Building & Facilitating a Comprehensive Clery Compliance Program
Building & Facilitating a Comprehensive Clery Compliance ProgramBuilding & Facilitating a Comprehensive Clery Compliance Program
Building & Facilitating a Comprehensive Clery Compliance Program
 
Margolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training ToolMargolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training Tool
 
Title IX - Focusing on the Important SCCLEA
Title IX  - Focusing on the Important SCCLEATitle IX  - Focusing on the Important SCCLEA
Title IX - Focusing on the Important SCCLEA
 
Active Shooter Exercise Presentation, 2013 SCCLEA Conference
Active Shooter Exercise Presentation, 2013 SCCLEA ConferenceActive Shooter Exercise Presentation, 2013 SCCLEA Conference
Active Shooter Exercise Presentation, 2013 SCCLEA Conference
 
UNC Title IX Training Seminar, FEB 2013
UNC Title IX Training Seminar, FEB 2013UNC Title IX Training Seminar, FEB 2013
UNC Title IX Training Seminar, FEB 2013
 
The White House - Gun Violence Reduction Executive Actions
The White House - Gun Violence Reduction Executive ActionsThe White House - Gun Violence Reduction Executive Actions
The White House - Gun Violence Reduction Executive Actions
 
Now Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact SheetNow Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact Sheet
 
MHA SCN Webinar on School Security
MHA SCN Webinar on School SecurityMHA SCN Webinar on School Security
MHA SCN Webinar on School Security
 
Clery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceClery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues Conference
 
MHA How Safe Are Our Campuses??
MHA How Safe Are Our Campuses??MHA How Safe Are Our Campuses??
MHA How Safe Are Our Campuses??
 
MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012
 
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
 

Último

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Último (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build A Sexual Assault Case, VCSF 2012

  • 1. Interconnected Nature of Gender & Sexual Violence Crimes Building a Stalking Case
  • 2. Agenda • Introductions • Context • Law Enforcement Investigations • Threat Assessment • Safety Planning © Margolis Healy & Associates, LLC
  • 3. TWEET TWEET @margolishealy #vcsf2012 © Margolis Healy & Associates, LLC
  • 4. Peggy Klinke • Pay attention to Patrick Kennedy’s legal actions • Fact patterns © Margolis Healy & Associates, LLC
  • 5. Peggy Klinke Lifetime Television for Women Video on Peggy Klinke © Margolis Healy & Associates, LLC
  • 6. Peggy Klinke What did Patrick Kennedy do that was not illegal? • Waited outside work and gym • Watched her • Called her on cell phone • Dozen roses and wedding ring • 8x11 flier with disparaging comments © Margolis Healy & Associates, LLC
  • 7. Peggy Klinke – Fact Pattern • Peggy and Mark dated for 3 years • Began stalking after breakup • Mark Sparks • ―Peggy is a Whore‖ • Patrick’s house on fire © Margolis Healy & Associates, LLC
  • 8. Peggy Klinke – Fact Pattern • Peggy reported everything to police • Obtained Restraining Order • She moved to CA • Patrick checked guns in Albuquerque • Pays PI to find her © Margolis Healy & Associates, LLC
  • 9. Impact on Victims ―It’s going to take getting a bullet put in my head before people understand how serious this is.‖ Statement by Peggy Klinke made one month before she was killed in January 2003 © Margolis Healy & Associates, LLC
  • 10. What is Stalking? • Stalking generally refers to repeated harassing or threatening behavior putting another person in fear • Experiencing repeated, obsessive, and frightening behavior that made the victim afraid or concerned for safety © Margolis Healy & Associates, LLC
  • 11. Stalking is a... Course of Conduct Crime not Incident Based Crime © Margolis Healy & Associates, LLC
  • 12. Prevalence of Stalking • Estimated 3.4 million people are stalked annually - Stalking Victimization in the United States, BJS (2009) • 1 out of every 12 U.S. Women (8.2 million) and 1 out of every 45 U.S. men (2 million) has been stalked at some point - National Violence Against Women Survey (1998) • 13.1% of college women were stalked during one semester of college - The Sexual Victimization of College Women (2000) © Margolis Healy & Associates, LLC
  • 13. Prevalence - Femicide Study • 76% of femicide cases involved at least one episode of stalking within 12 months prior to the murder • 85% of attempted femicide cases involved at least one episode of stalking within 12 months prior to the attempted murder - McFarlane et al. (1999). ―Stalking and Intimate Partner Femicide,‖ Homicide Studies © Margolis Healy & Associates, LLC
  • 14. IPV and Stalking • 81% of stalking victims who were stalked by an intimate partner reported that they had also been physically assaulted by that partner • 31% were also sexually assaulted by that partner - National Violence Against Women Survey (1998) © Margolis Healy & Associates, LLC
  • 15. Stalking Victims © Margolis Healy & Associates, LLC
  • 16. Stalking Reported to LE Reported to Law Enforcement Reported to Law Enforcement Campus Police Campus Police Municipal/Local/City Police/911 Municipal/Local/City Police/911 County Sheriff County Sheriff State Police State Police Other Other 0% 20% 40% 60% 80% 100% 0% 20% 40% 60% 80% Both On/Off-Campus Stalking Off-Campus Stalking On-Campus Stalking © Margolis Healy & Associates, LLC - The Sexual Victimization of College Women (2000)
  • 17. Gender of Offenders Female Victims Male Victims Female Victims Male Victims Male Male Offender Offender 67% 41% 24% 43% Female Female Offender Offender - Stalking Victimization in the United States, BJS (2009) © Margolis Healy & Associates, LLC
  • 18. Stalking Suspects • 94% of female victims were stalked by men • 60% of male victims were stalked by men • Overall, 87% of stalkers were men Why is this relevant to a police investigation?? © Margolis Healy & Associates, LLC
  • 19. Stalking on Campus • Stalking incidents lasted an average of 60 days • 30% of victims were stalked only off campus • 66% of victims reported being stalked at least 2 – 6 times per week - National Sexual Victimization of College Women Survey (2000) © Margolis Healy & Associates, LLC
  • 20. Law Enforcement Response © Margolis Healy & Associates, LLC
  • 21. Before we investigate… • Complex, interrelated and underreported violent crimes • A Multi-disciplinary trained response is critical for the effective investigation • Policies enhance safety and accountability • What is your message about gender/sexual violence crimes on campus • Who responds, what level of specialized training do they have • Is the response coordinated, compassionate, objective and thorough = Professional © Margolis Healy & Associates, LLC
  • 22. Before we investigate… • Rapport, trust and reassurance • Multi-disciplinary coordinated response • Avoid trying to prove a hypothesis (my ―gut‖ tells me…) • Strategy for a good investigation = examine all the evidence and let it take you to the truth • Always approach a case believing that a crime occurred… victims feel they won’t be believed © Margolis Healy & Associates, LLC
  • 23. Case Management Steps • Reports & recognition of stalking • Investigative challenges & opportunities • Assessment, response & initial Investigation • Stalker assessment • Interviews • Threat assessment • Safety planning © Margolis Healy & Associates, LLC
  • 24. Reports to Law Enforcement • 54% of femicide victims reported stalking to police before they were killed by their stalkers • 46% of attempted femicide victims reported stalking to police before the attempted murder LETHALITY © Margolis Healy & Associates, LLC
  • 25. Recognition of Stalking • Report of harassing behavior should raise stalking flag for officer • Check whether incident is isolated or repeated conduct, although a mere report of harassing conduct should be cause to assume the likelihood of prior behavior • If a victim expresses fear of suspect, these fears should be taken seriously and inquiry should be made to determine the origin of the fear © Margolis Healy & Associates, LLC
  • 26. Recognition of Stalking • Review checklist of common harassing behaviors with the complainant • Check for prior police reports and in which jurisdiction(s) • Determine whether family or friends have filed reports related to the suspect or harassing behavior • Engaging in more than one incident of harassing behavior should trigger evaluation as potential stalking case © Margolis Healy & Associates, LLC
  • 27. Case Study 1 John Doe (college age male) is caught touching himself while watching a woman shower in a residence hall. Upon investigation, campus police learn that he has been caught peering in windows, etc., at 4 women at other universities and colleges in 4 other states. What do we know? © Margolis Healy & Associates, LLC
  • 28. Investigative Challenges • Difficult to identify / officer misconceptions • Criminal acts in multiple jurisdictions (police, law enforcement, victims) • Multiple victims? • Ongoing crime w/ varying activity levels over several years • Few witnesses & little evidence • Technology • Police response cannot guarantee it will stop BUILD THE CASE © Margolis Healy & Associates, LLC
  • 29. Investigative Opportunities • Stalking is a course of conduct (ongoing, long- term crime) • Same victim, offender, locations? • Suspects often confess (they want to tell you how/why they are being misunderstood) • Police understand stalkers... • Technology © Margolis Healy & Associates, LLC
  • 30. Assessing the Complaint • Gathering basic information: personal data, prior stalking. • Once stalking is suspected, gather pertinent information: other incidents, threats to victim, reaction of victim to behavior. • Relationship: how much does stalker know about victim? © Margolis Healy & Associates, LLC
  • 31. Elements of an Effective Response 1. Early identification & intervention (safety planning) 2. Threat assessment & investigation 3. Responding to technologies 4. Training 5. Relationship between law enforcement agency and: - Other Law Enforcement Agencies - Community Resources - Prosecution © Margolis Healy & Associates, LLC
  • 32. Case Study II A female student changes residence hall floors in the same building. She notices that the clock radio in the bathroom on the 5th floor is the same, unique looking clock radio that was in the bathroom on the 2nd floor, where she used to live. Suspicious, she calls campus police… What do we know? © Margolis Healy & Associates, LLC
  • 33. Stalker Assessment • Prior threats • Actual pursuit of victim • History of crime and violence, mental illness, drug abuse, protective order violations • Tendency toward outbursts • Possession, knowledge of, fascination with weapons © Margolis Healy & Associates, LLC
  • 34. Investigate the offender • Offender’s history/background • Social circles for similar, other victims, interrelated crimes / conduct • Social media, pre and post stalking messages/calls • Develop suspect interview strategy… • Tie in offender behavior, background, anti- violence prevention education © Margolis Healy & Associates, LLC
  • 35. Stalking Assessment • Annoying phone calls, text messages, etc? • Unsolicited correspondence? • Location patterns? • Threats of homicide or suicide? • Acts of vandalism or arson? • Is victim in fear? (document observations and statements) © Margolis Healy & Associates, LLC
  • 36. Victim Interviews • Document demeanor & emotional state • Ascertain level of fear– is it consistent with stalking behavior directed at them? • Is there more to the case than you are hearing? • Avoid passing judgment • Negate self-blame • Make available support services © Margolis Healy & Associates, LLC
  • 37. Suspect Interview • Interview (stalkers like to talk) • Control the interview • Document demeanor & emotional state • Document, document, document • Miranda, when applicable • Avoid passing judgment © Margolis Healy & Associates, LLC
  • 38. Threat Assessment Every professional at every stage of a stalking case must be constantly assessing the threat © Margolis Healy & Associates, LLC
  • 39. Threat & the Status Quo A change in the status quo raises the threat. Risk is high when: - Protective order is served - Following arrest - Trial date approaching - Upon receipt of ―no contact‖ letter from victim - Following any contact with law enforcement - Stalker loses job © Margolis Healy & Associates, LLC
  • 40. Threat Assessment • How well does suspect know victim? • Is victim in fear? Why? Victim’s family, friends, coworkers? • Is victim naive about the danger? © Margolis Healy & Associates, LLC
  • 41. Threat Assessment • Develop a timeline of stalking events • Look for escalation 6/6/11 6/8/11 6/12/11 6/15/11 6/20/11 6/25/11 Showed up at gym Parked across Cat Threatening street all night call poisoned Dead roses letters © Margolis Healy & Associates, LLC
  • 42. The next phase in the violence relationship... © Margolis Healy & Associates, LLC
  • 43. ―Please don’t do this to me‖ © Margolis Healy & Associates, LLC
  • 44. Stalkers don’t just go away This is the address of the jail. This was addressed to the victim © Margolis Healy & Associates, LLC
  • 45. Using children as agents to stalk Note to child to give to Mommy © Margolis Healy & Associates, LLC
  • 46. Ways we can strengthen cases • Empower victim to play an active role in investigation • Document, document, document • Investigate stalker’s past (other victims, acts, cases, witnesses) © Margolis Healy & Associates, LLC
  • 47. Advantages of Charging ―Stalking‖ • To prove a Course of Conduct, the state may introduce evidence that would otherwise be inadmissible • If viewed within the correct context of the law, stalking statutes can criminalize seemingly benign behaviors • When properly investigated and charged aggressively, stalking cases can save lives © Margolis Healy & Associates, LLC
  • 48. Important to Remember... • Any type of crime or any type of noncriminal act directed toward the victim can be part of a stalking case • The law criminalizes non-criminal behavior © Margolis Healy & Associates, LLC
  • 49. Safety Planning • How might safety planning in stalking cases be the same as safety planning in IPV/DV cases? • How might it be different? © Margolis Healy & Associates, LLC
  • 50. Safety Planning – Goals 1.Reduce risk of encounters with the stalker 2.Create contingency plan for what to do if the victim does encounter the stalker © Margolis Healy & Associates, LLC
  • 51. Safety Planning - Guiding Principles • The victim is responsible for her own safety • Law enforcement can provide the tools to protect herself/himself • Victim must be proactive in planning for his/her safety • Safety planning is case specific © Margolis Healy & Associates, LLC
  • 52. Strategic Considerations • Safety planning begins at initial contact through duration of case • Communicate regularly with victim • Keep victim actively involved in safety planning • Safety plan must continue to focus on what victim feels will work • Assess victim’s environment—home, work, school, routines • With criminal charges, keep victim apprised of case/defendant status, and release (when applicable) © Margolis Healy & Associates, LLC
  • 53. Strategic Considerations • Encourage victims to report new offenses, and fully inform victim of actions and reasons for them • Be prepared to intercede for victim if planning puts victim’s job in jeopardy • Activate victim’s social supports • Involve children in planning process • Victim should carry cell phone (and battery) • Discourage victim from contacting stalker © Margolis Healy & Associates, LLC
  • 54. Safety Planning – Innovative App • Stalking Sacks • Victim & Offender Books • Flyers • Support Groups © Margolis Healy & Associates, LLC
  • 55. Things to remember… • Focus on the victim • Ask victim how she interprets the behavior (might not seem threatening to you or me, but to her…) • If victim senses she is in danger… LISTEN! • If the victim OR YOU suspect that the stalker/abuser has too much ―inside‖ info… he probably does! © Margolis Healy & Associates, LLC
  • 56. 4 things to always strive for 1. Making victims feel it is safe & appropriate to report stalking 2. Recognizing stalking when we encounter it (even if the victim doesn’t) 3. Making victims safer from stalkers 4. Policy connection © Margolis Healy & Associates, LLC
  • 57. Resources • Stalking Resource Center (www.ncvc.org/src) • National Higher Education Center (www.higheredcenter.org) • www.MargolisHealy.com © Margolis Healy & Associates, LLC 68 6
  • 58. Contact Dr. Gary J. Margolis gmargolis@margolishealy.com 1-866-817-5817 © Margolis Healy & Associates, LLC

Notas del editor

  1. MH&A experience(work, cients)LE experience (city, state, university)Experience with stalking casesIACP VAW InstituteCALEA
  2. Pay attention to the details of what Patrick did…
  3. Jurisdictional challengesMultiple police agencies/investigatorsCase coordination and deconfliction
  4. Recognize the technologyWhere are the photos and videos? Viral on the internet?Managing the parentsManaging the fear of other female students