In a local tragedy a week ago, a woman, Tracy Coleman, her brother and her 13-year-old son were shot to death by the woman’s boyfriend, Sharif Whitlock. The murders took place 45 minutes after the woman had filed a domestic violence complaint against her boyfriend. The perpetrator fled the scene and later hanged himself.
The case was the lead incident in a story published yesterday by my local newspaper, the Press of Atlantic City. It was entitled, Hamilton Twp. shooting deaths show familiar domestic violence outcome. The well-done story focused on the larger issue of domestic violence. In Atlantic County, New Jersey over the last two years, 13 people have been killed in domestic violence situations, including three perpetrators. A total of 21 children lost a parent.
Reading about Coleman and Whitlock, I could see all the typical signs of a sociopathic perpetrator and a well-meaning victim. The couple had broken up, but Whitlock constantly called Coleman, accusing and threatening her. For her part, Coleman felt she couldn’t abandon someone who had so many problems.
And then came the statement with caught my attention: Whitlock used technology to try to control his girlfriend.
The article quoted Yasmine Lopez, Coleman’s friend and instructor in the dental hygienist class she was taking:
Lopez said in the days before the shooting, Whitlock constantly called and texted his girlfriend so much so that the cell phone in her pocket never stopped vibrating. During one of those calls on June 2, Lopez said she overheard Whitlock on the phone, making threats and telling Coleman, “Don’t you understand? I want to kill myself.”
The article then quoted from the police report:
When Coleman spoke to a police officer June 6, she said Whitlock had broken her cell phone. The complaint says Whitlock later bought a new phone, had the number changed to Coleman’s number giving him access to her friends and family and “called subjects on (her) contact list and harassed them.”
This harassment via technology now has a name: Digital abuse.
Control in the technology age
Cell phones, e-mail, Facebook and Twitter—digital technology provides abusers with another avenue for asserting control over their victims and monitoring what they are doing.
The Press reporters interviewed Susan Risdon, spokesperson for the National Domestic Violence Hotline. She said that digital abuse often runs in tandem with verbal abuse and physical violence.
“We see a lot of instances where someone will send their partner 50 to 80 text messages a day, and if they can’t get a hold of them, they’ll text their best friend, saying, ”˜Are you with her?’” Risdon said.
“Domestic violence involves control, trying to isolate someone from their friends and loved ones, and keeping them to yourself. Digital abuse is a way to extend that isolation.”
Abuse among youth
The victim in this case, Tracy Coleman, was 44 years old. But digital abuse is even more common among those who live and breathe everything digital—teenagers and young adults. A study by the Associated Press and MTV, which was released late last year, found that 50 percent of 14- to 24-year-olds have experienced some form of digital abuse.
Here’s how the study defined digital abuse:
- writing something online that wasn’t true
- sharing information that a person didn’t want shared
- writing something mean
- spreading false rumors
- threatening physical harm
- impersonation
- spying
- posting embarrassing photos or video
- being pressured to send naked photos
- being teased
- encouraging people to hurt themselves.
Last year MTV launched a campaign called aimed at stopping the spread of abuse in the form of sexting, cyberbullying and digital dating abuse. The goal is to “empower America’s youth to identify, respond to and stop the spread of various forms of digital harassment.”
The campaign is called A Thin Line, reflecting the thin line between what’s public and what should be private. The website explains several kinds of abuse: sexting, constant messaging, spying, digital disrespect and cruelty. It also offers suggestions for young people to take control of their digital domains. One of the key recommendations: If they see or experience abuse, report it.
I hope young people get the message. Maybe if they learn that digital bullying, harassment and threats are not okay, they’ll get the message that the same behaviors in real life are also not to be tolerated.
jeannie812, I think you are absolutely right about blocking this guy from your Facebook page. He can learn too much info about you just from looking at your friend’s pages… other people post more info about us, they post pictures of us, and they don’t block their info.
My page has every security option checked off, and I don’t say much about myself on top of that!!
I’ve been reading two books written by a woman stalked by 2 of her x-es for 40+ years, and both guys did her some major bodily harm. Her first X went to a mental hospital for the criminally insane for 17 yers but got out and went right back to stalking her. Even wrote her daily during the 17 yrs inside.
Prior to the 1990 laws, police did NOT take any “stalking” seriously at all. Things have changed somewhat, but NOT ENOUGH for sure!~
I’m just now educating myself on stalking, and what I am learning makes me uncomfortable—as former victims of psychopaths, we all I think have a sensitivity to what destruction these people can do even if it is never physical. Psychological stalking is as bad or worse than physical I think. I don’t want to live in TERROR and I won’t, but I do want to be INFORMED AND CAUTIOUS. I am making some changes in my life. I can’t erase what is out there on the internet about me, or information about me (been doing some searching about what is out there on me) but I can keep more information from being out there.
Erin B’s suggestion of 123people.com and intelus.com searches on yourself should prove very interesting! Give it a try!
oxy – I was thinking ‘criminally insane’ or some derivative of it.
What is stalking: “The National Institute of Justice’s Model Anti-Stalking Code doesn’t require stalkers to make a credible threat, but it does require victims to feel a high level of fear.” http://www.ojp.usdoj.gov/ovc/assist/nvaa/supp/t-ch21-2.htm
Both my ex’s stalk, one is more stealth than the other. As a result, I go to great lengths to keep anon and lay low, while still having a life.
FaceBook/MySpace (if you must use one, read this):
http://www.privacyrights.org/8-social-networking-privacy-tips
http://www.privacyrights.org – excellent eye-opener for women who have left an abusive spouse.
Privacy in education (including college): http://www.privacyrights.org/fs/fs29-education.htm#3
– Use of public records: In some states, voting records (just enrolling to vote) is a matter of public record and lists your physical address right online, no charge.
– Place real property in a trust, and list utilities under the name of the trust.
– Utilize a private mail box service to receive all personal mail.
– Place a “freeze” on your credit file.
– Place real property in a trust, and list utilities under the name of the trust.
– Utilize a private mail box service to receive all personal mail (USPS sells your data, when you move, USPS alerts *ALL* (ie, sell your info, again) databases you have moved and the new address. Try to never use USPS for residential or PO Box, instead use a private mail delivery such as “mailboxes etc”.
– TIP: If you currently have a PO Box or residential address, and want to change your mailing address, keep the old address while notifying “the few” and “necessary” of your new mailing address – do not use a “change of address form” at the post office. Then keep the old address until all mail ceases (approx two years).
Removal from data mining sites:
Google phonebook name removal: http://www.google.com/help/pbremoval.html
A lot of good removal information, here: http://www.squidoo.com/personalInformation
LexisNexis (big one!):
http://risk.lexisnexis.com/optstatus/ (opt-out for each computer you/your family uses)
http://privacypolicy.lexisnexis.com/choicepoint.html
“To underscore our commitment to privacy and our vision that good privacy is good business, we have adopted an online privacy policy for http://www.choicepoint.net, http://www.choicepoint.inc.com and http://www.choicepoint.com (except for atxp.choicepoint.com, which has a separate privacy policy). These sites are operated by LexisNexis Risk Solutions Inc. and/or its affiliates (“LexisNexis”).”
–>SEE PRIVACY POLICY FOR EACH (opt-out, even if you fax, upload, or mail them a form; this is one of, if not *the one* data miner the little guys (intellius, etc) use.