Training the Trainers on Stalking - 98713

Solution Posted by
deepeyes
Solution Detail
Price: $30.00
  • From: Law, Cybercrimes
  • Posted on: Mon 22 May, 2017
  • Request id: # 79253
  • Purchased: 1 time(s)
  • Average Rating: No rating
Request Description
0
Solution Description

 

 

 

 

 

 

 

 

 

 

Training the Trainers on Stalking, Intimate Violence, and Stranger Violence

Module 5:  LASA 2

 

 

 

 

 

 

The purpose of this training exercise is to train the law enforcement on the aspects of stalking, intimate violence, and stranger violence.  It is to show the law enforcement on the different scenarios that could happen and how to approach it and what questions should be asked as well as the answers that would go along with it.  It would give the law enforcement a better understanding of the situations when it is presented to them.  I will provide three different scenarios for each crime, questions, and answers.  I will also identify a victimology or criminology theory related to each scenario. 

Stalking

 Shawn met a woman at a local gym. The two dated for several weeks, after which the woman broke up with Shawn, as she thought it was odd that he still lived with his mother, and had no friends. What the woman didn’t know was that Shawn had been charged with stalking before.

Following the breakup, Shawn began calling the woman repeatedly from his phone. When she didn’t answer, he began using other people’s phones to call. The woman asked Shawn to stop calling, but he later followed her to a bar, where he blocked her in with his car. The following day, Shawn broke into his victim’s apartment, breaking in the door. While nothing was taken, he left the closet light on, so she would know someone had definitely been there.

The woman, fearing for her life, then filed for a restraining order. Shawn continued to follow his victim, approaching her from the woods next to her work, and knocking on her door. When the woman heard Shawn climbing onto her balcony in the middle of the night, she called 9-1-1, and he left.

Shawn didn’t, however, stop his campaign of terror. He left dead rose petals around the victim’s door, and left a voicemail message, pretending to be from “victim’s services.” When the victim called back, Shawn said “gotcha!” The woman even tried to avoid her stalker by moving away. As she was leaving the U-Haul parking lot, she saw her stalker following her. As she arrived at her new apartment, Shawn was coming out of the building, and offered her money to help with moving expenses.

Questions and Answers:

1.      What are some of the common stalking behaviors?

a.       Repeated and unwanted communications through phone calls, mails, emails, or social media sites.

b.      Following the victim to work, school, home, or other places where they frequently visit.

c.       Making threats to the victim either directly or indirectly.

d.      Making threats to the family victim’s family, friends, co-workers, or even pets.

e.       Damaging the victim’s home, car, or other property, or threatening to do so.

f.       Repeatedly sending the victim unwanted gifts.

g.      Posting information, or spreading rumors about, the victim.

2.      Define stalking?

a.       Involves a stalker making repeated attempts to contact, or interfere with the life of, the victim.  A stalker may be a romantic partner, acquaintance, or even a total stranger.

3.      What are the types of stalker?

a.       Rejected stalker-begins stalking behaviors after a close relationship breaks down.

b.      Resentful stalker-is often paranoid and irrational in his/her beliefs that someone has wronged him/her. 

c.       Intimacy seeking stalker-acts out of feelings of loneliness, as he lacks close relationships.

d.      Incompetent suitor-is lonely, and lusts after the attention of others.

e.       Predatory stalker-engages in stalking behavior as a prelude to sexually attacking the victim.

f.       Cyber stalking-is a form of harassment committed through electronic communications, such as email, text messages, and

Attachments
Module_5_Assignment_1.docx
Module_5_Assign...