Can Free Anti-Virus Apps Combat AI Cyber Attacks?
With advances in AI, cybersecurity threats are increasing every day. Both businesses and consumers have already been facing a myriad of daily cybersecurity threats, but AI has unleashed an unprecedented weapon in the war between you and online predators – the ability to automate and scale these attacks, making them more efficient and difficult to detect.
Many individuals and organizations still rely on free antivirus software, but given the increased sophistication of AI-powered cyber-attacks, it begs the question: are those free apps still enough?
With advances in AI, cybersecurity threats are increasing every day. Both businesses and consumers have already been facing a myriad of daily cybersecurity threats, but AI has unleashed an unprecedented weapon in the war between you and online predators – the ability to automate and scale these attacks, making them more efficient and difficult to detect.
We often hear of individuals and organizations that still rely on free antivirus software to protect their computers, but given the increased sophistication of AI-powered cyber-attacks, it begs the question: is it still enough?
Cybersecurity
From malware to phishing attacks, the need for robust cybersecurity measures has never been more critical. But a common misconception persists: that free antivirus software offers adequate protection. While free antivirus solutions may provide a basic level of security, they are often insufficient for comprehensive protection against sophisticated cyber threats. We believe that relying on free antivirus software is a risky gamble, here’s why.
Threats of AI-Powered Cyberattacks
AI can automate and scale up cyberattacks, making them more efficient and harder to detect. It significantly enhances the efficiency and effectiveness of the attacks by automating processes, analyzing large volumes of data, and adapting to security measures. Examples include:
· Automated Phishing Attacks: AI can craft convincing phishing emails by collating vast amounts of data to personalize messages for each target. It can be used to create highly personalized phishing emails by analyzing your social media profiles, public records, and other data sources. This increases the likelihood of a successful attack.
Statistics:
According to the Anti-Phishing Work Group (APWG), social media platforms are the most frequently attacked sector, targeted by 37.4% all phishing attacks in Q1 2024.
AI can create 20 times more unique phishing emails per hour than a human attacker can.
The average wire transfer amount requested in Business Email Compromise (BEC) attacks in Q1 2024 was $84,059, up nearly 50% from the prior quarter’s average
Malware: AI-driven malware can adapt its behavior to avoid detection by traditional security systems.
Examples:
Threat actors are increasingly using AI-generated YouTube Videos to spread a variety of stealer malware such as Raccoon, RedLine, and Vidar.
"The videos lure users by pretending to be tutorials on how to download cracked versions of software such as Photoshop, Premiere Pro, Autodesk 3ds Max, AutoCAD, and other products that are licensed products available only to paid users."
The Limitations of Free Antivirus Software
It Only Provides Basic Protection: Free antivirus programs typically offer a minimal level of protection. They are designed to detect and block only the most common and well-known threats. In contrast, advanced threats such as zero-day exploits, ransomware, and advanced persistent threats (APTs) often bypass these basic defenses. According to a report by AV-Comparatives, paid antivirus solutions detect 99.5% of malware samples, whereas free versions lag behind with an average detection rate of 92%.
Lack of Comprehensive Features: Paid antivirus solutions offer a range of features that go beyond simple malware detection. These include firewalls, anti-phishing tools (see above on AI-powered phishing exploits), secure browsing, identity theft protection, and more. Free versions typically lack these comprehensive features, leaving users vulnerable to various attack vectors. For instance, a survey by Cybersecurity Insiders found that 43% of businesses using free antivirus software experienced a data breach due to the lack of advanced security features .
Delayed Updates: Timely updates are crucial in the cybersecurity realm. Cyber threats evolve rapidly, and antivirus software must be updated frequently to recognize and neutralize new threats. Free antivirus solutions often receive updates later than their paid counterparts, leaving a window of vulnerability. In a study by PC Mag, it was found that paid antivirus solutions received updates 30% faster than free versions, highlighting a critical gap in protection.
Real-World Incidents Highlighting the Risks
ATT Data Breach: AT&T recently disclosed a data breach that exposed the personal information of millions of customers. The breach involved unauthorized access to customer information, including names, contact details, Social Security numbers, and account information.
o Phishing and Scams: With access to contact details, cybercriminals can launch targeted phishing attacks, attempting to trick consumers into providing additional sensitive information or accessing malicious websites.
o Account Hijacking: Criminals could potentially use the exposed account information to hijack AT&T accounts, change account settings, or gain access to other linked services
In Q2 2024, ReliaQuest identified 1,237 organizations on ransomware data-leak sites, up 20% from Q1 2024.
Cyber Management Alliance long list of organizations recently targeted by ransomware attacks.
In addition, many people and businesses who rely solely on free antivirus software may also be likely to overlook other critical security aspects, increasing their vulnerability to such breaches.
The False Sense of Security
One of the most dangerous aspects of free antivirus software is the false sense of security it provides. You may believe that you are fully protected, leading to lax behavior in other areas of cybersecurity. For example, you might use easy-to-guess passwords, ignore software updates, or engage in risky online behavior, assuming that your antivirus software has them covered. We’ve seen that this complacency can be disastrous.
The Financial Perspective
And from a financial standpoint, the cost of a data breach, especially for organizations, far outweighs the savings from using free antivirus software. According to the Ponemon Institute’s 2021 Cost of a Data Breach Report, the average cost of a data breach is $4.24 million. For small and medium-sized businesses, a single breach can be catastrophic, leading to financial ruin. Investing in robust, paid antivirus software is a small price to pay for the extensive protection it offers, potentially saving millions in the long run.
While free antivirus software may seem like an attractive option, especially if you’re budget-conscious, consider the real cost, especially if you become the victim of a cyber-attack. The limitations in detection capabilities, lack of advanced features, delayed updates, and the false sense of security it provides make it a risky choice. The rising tide of cyber threats necessitates robust, multi-layered security solutions that only paid antivirus software can deliver.
In the age of AI, it’s essential for everyone to prioritize cybersecurity and view it as an essential investment rather than an optional expense. By doing so, you can protect your data, maintain your reputation (and credit report), and avoid the potentially devastating financial consequences of a cyber-attack. In today’s environment, robust cybersecurity isn’t a luxury—it;s a necessity.
What is Bank Jugging? Avoid Becoming a Victim
Bank jugging is a tactic where thieves target individuals who they believe have just withdrawn a large sum of money from a bank, credit union, check cashing store or ATM. These criminals, known as "jugglers," profile or observe potential victims after they’ve made a withdrawal. Then they rob them in the parking lot or follow them to their next destination, hoping for an isolated location. Once the victim arrives at a less secure area, the juggler seizes the opportunity to steal the money. Here are some ways to reduce your chances of becoming a jugging victim.
Bank jugging is a tactic where thieves target individuals who they believe have just withdrawn a large sum of money from a bank, credit union, check cashing store or ATM. These criminals, known as "jugglers," profile or observe potential victims after they’ve made a withdrawal. Then they rob them in the parking lot or follow them to their next destination, hoping for an isolated location. Once the victim arrives at a less secure area, such as their home, job, or another stop, the juggler seizes the opportunity to steal the money, often through a vehicle break-in or directly confronting the victim.
Robber Jugging Victim
How Are Women Targeted?
While anyone can be a victim of bank jugging, women are often targeted for several reasons:
Perceived Vulnerability: Criminals may perceive women as easier targets, assuming they are less likely to fight back, easier to overcome or may be more distracted while managing other tasks, such as caring for children.
Routine Visibility: Many women might frequent banks during predictable times, such as on their lunch hour, making it easier for jugglers to anticipate and follow their movements.
Less Awareness: Jugglers may exploit the fact that women are often socialized to be polite and less confrontational, potentially making them less likely to notice or react to being followed.
Our friend Susan was targeted after the left her bank. The juggler walked directly up to Susan as though he knew her, smiled, and said, “Hi! How are you today?” Then he pushed her to the ground and took off with her purse.
Incidents and Statistics
Houston, Texas: In 2019, Houston police reported a 20% increase in bank jugging incidents. Women comprised nearly 60% of the victims, with many cases involving single women who were followed from the bank to their homes or workplaces.
Austin, Texas: Between January and October 2020, Austin saw over 150 bank jugging cases. In one notable incident, a woman was followed from a bank to a grocery store parking lot, where her car window was smashed, and $5,000 was stolen.
Los Angeles, California: A 2021 report highlighted a rise in bank jugging incidents targeting women. One incident involved a woman who was followed from a bank to a gas station, where she was physically confronted and robbed of $2,000.
How Can Women Keep Themselves Safe?
Using your Safety Intuition, staying aware of your surroundings and taking proactive measures are key to reducing your chances of becoming the victim of a bank jugging. Here are some strategies you can use to protect yourself:
Before Going to the Bank
Plan Ahead: If possible, avoid withdrawing large sums of money. Use online transactions or checks for significant payments.
Vary Your Routine: Don’t visit the bank at the same time or on the same day each week. Changing up your routine makes it harder for criminals to predict your movements.
At the Bank
Be Observant: Take note of anyone loitering in or around the bank. If someone seems to be paying undue attention to you or other customers, report it to the bank staff.
Minimize Display: Keep your transaction discreet and out of sight. Avoid openly counting money where others can see you.
Use the Drive-Thru: If your bank offers drive-thru services, consider using them to minimize the risk of being followed.
After You Leave the Bank
Check Your Surroundings: Before leaving the bank parking lot, take a moment to scan for any vehicles that might be following you. Make a few extra turns if you suspect someone is tailing you.
Avoid Unnecessary Stops: Go directly to your destination after leaving the bank. Avoid making additional stops where you could be more vulnerable.
Secure Your Money: If you must carry a large amount of cash, conceal it in a less obvious location within your vehicle or on your person.
Don't Immediately Go Home: If you suspect you're being followed, drive to a public place such as a police station, fire station, or well-lit convenience store. Lay on your horn when you get there.
At Home or Work
Be Quick: If you need to transport money from your vehicle to your home or office, do so quickly and discreetly.
Stay Vigilant: Keep an eye out for suspicious vehicles or individuals near your property. Trust your instincts; if something feels off, it probably is.
Use a Buddy System: If possible, have someone accompany you when making large transactions. Safety in numbers can deter potential criminals.
Additional Tips for Safety
Stay Connected: Let someone you trust know about your plans, especially if you are withdrawing a large sum of money. Share your expected timeline and check in with them once you're safely home or at your destination. Better yet, ask a trusted person to go with you.
Equip Your Car with Security Measures: Consider installing a dashcam or using apps that track your location and allow you to share it with trusted contacts in real-time.
Take Defensive Tools: Always carry pepper spray or some other form of defensive tool. Keep it ready to use and be mentally prepared to use it.
Bank jugging is a serious threat; you can get hurt during the robbery, losing much more than your money. By staying vigilant and adopting proactive safety measures, you can significantly reduce your risk of becoming a victim.
Ammunition Vending Machines: Dangerous Loophole for Felons
The recent introduction of ammunition vending machines in grocery stores is a serious concern about public safety, particularly regarding the potential for convicted felons to gain easier access to bullets without a background check. While these machines may offer convenience for law-abiding citizens who suddenly find themselves without ammunition at 4:00 a.m. on the first day of doe season, they also present significant risks that can’t be ignored.
The recent introduction of ammunition vending machines in grocery stores is seriously concerning about public safety, particularly regarding the potential for convicted felons to gain easier access to bullets without a background check. While these machines may offer convenience for law-abiding citizens who suddenly find themselves without ammunition at 4:00 a.m. on the first day of doe season, they also present significant risks that can’t be ignored.
Ammunition Vending Machines in the Beer Aisle?
Over the last six months or so, AI-powered vending machines that dispense ammunition have been deployed in grocery stores in three states (Alabama, Oklahoma and Texas) with orders for more and expansion plans into Colorado on the way. The machines, made by American Rounds, enable customers to buy ammunition in minutes and are “as easy to use as an ATM,” according to the company’s website. These vending machines use driver’s licenses and facial recognition technology to verify the age and identity of customers, aiming to provide round-the-clock immediate access to ammunition for individuals over 21 with valid identification. While the intention is clearly to streamline the purchasing process, it begs a few questions: Should the process of buying bullets be as easy as impulsively buying a candy bar out of a machine? Will they be located in the beer aisle? Maybe they’ve already had a few, is a breathalyzer test also administered? A person could tell whether someone appeared to be under the influence, a machine, not so much. And finally, um, what about the laws?
Felons and Ammunition: Prohibited but Persistent
Yes, there are federal laws that prohibit convicted felons from possessing firearms or ammunition. And the law is clear: it's illegal for individuals with felony convictions to ship, transport, possess, or receive firearms or ammunition.
However, the hard reality is that many felons already still manage to obtain these items illegally. Let’s look at the stats:
In fiscal year 2018, there were 6,719 convictions under 18 U.S.C. § 922(g), (the federal law mentioned above) that prohibits certain persons, including felons, from possessing firearms or ammunition.
The average age of these offenders was 34 years (they’ll pass the age criteria for ammunition vending machines).
Even worse, 25.6% of these offenders were in the highest Criminal History Category (VI), meaning that they have a significant history (long rap sheet) of prior offenses.
These numbers highlight the already significant challenge of keeping firearms and ammunition out of the hands of people who already have a significant criminal history. And now we want to give them immediate, unfettered access from a machine? But let’s take a harder look at some of the things that could go wrong with this process.
Vending Machines: Making a Serious Problem Even Worse
Vending machines could exacerbate this already serious problem. Here's why:
Reduced Human Oversight: Traditional ammunition sales involve face-to-face interactions with store clerks who can potentially spot suspicious behavior and body language, or recognize known offenders. Vending machines eliminate this crucial human element.
Potential for Technology Failures: While the ammunition vending machines use AI and facial recognition, no technology is foolproof, especially because this technology is still so new. There's always a risk of system glitches or false positives that could allow unauthorized individuals to make purchases.
Hacking Concerns: As cybersecurity expert Andrew Whaley points out, these vending machines could be vulnerable to hacking. A sophisticated cyber-attack could potentially disable age verification systems or manipulate transaction records.
Increased Availability: Easy accessibility of these machines means that determined felons have more opportunities to attempt purchases, especially during off-hours when there's less overall surveillance.
Real-World Implications
While specific incidents involving ammunition vending machines are not yet widely reported due to their recent introduction, we can draw parallels from existing cases of felons illegally obtaining ammunition. For instance, a RAND study in the city of Los Angeles found that in just two months, 52 prohibited individuals in Los Angeles purchased over 10,000 rounds of ammunition. This occurred even with existing safeguards in place. Now, imagine how these numbers could increase with the widespread deployment of easily accessible vending machines. And plans are in place to greatly increase the number of vending machines deployed. As the CEO of American Rounds recently reported to Newsweek: "We have over 200 store requests for AARM [Automated Ammo Retail Machine] units covering approximately nine states currently and that number is growing daily."
As a society, we have to weigh the convenience offered by these vending machines against the potential risks they pose when known criminals can circumvent the law. And while technology can enhance many aspects of our lives, when it comes to items as sensitive as ammunition, we have to prioritize safety and security above all else.
Here are some additional safeguards that could be implemented if/when these machines do become more widespread. They could include:
Enhanced background check systems integrated with real-time law enforcement databases.
Strict cybersecurity protocols to prevent hacking attempts.
Regular audits and monitoring of vending machine transactions.
Limiting the locations and operating hours of these machines.
While ammunition vending machines may seem like another step toward progress, they also represent a potential step backwards in our efforts to keep communities safe from gun violence. As a retired law enforcement officer, I urge caution and thorough consideration of all potential consequences before widely adopting this technology. The ease of access these machines provide may come at too high a cost to public safety.
Your 6-Step Guide to Women’s Online Safety
Welcome to the wild web, ladies—where endless possibilities and lurking predators can be a digital blur. In this high-stakes online arena, every click can open doors to success or set off silent alarms.
Research shows about 9 out of 10 Americans say that being harassed or bullied online is a problem and a Pew Research Center study found that women are more than twice as likely as men to experience sexual harassment online. Here are 6 ways to protect yourself.
Welcome to the wild web, ladies—where endless possibilities and lurking predators can be a digital blur. In this high-stakes online arena, every click can open doors to success or set off silent alarms.
Navigating this cyber minefield means dodging everything from phishing scams to terrifying invasions of privacy. Research shows about 9 out of 10 Americans say that being harassed or bullied online is a problem and a Pew Research Center study found that women are more than twice as likely as men to experience sexual harassment online.
News4JAX Report
So many people that we talk to think that online attacks will never happen to them, but AI is turning scams and abuse into a goldmine, making it easier than ever for perpetrators to harass their victims.
Digital Health Checkup and Wellness
We recently contributed to a News4JAX report highlighting how pervasive these cyber threats can be, and how you can strengthen your online security.
1. Check your digital profile: Do a Google search on your name to check which websites you’re listed on, and clean up stale and incorrect data
2. Get notified in real time: Set a Google alert for your name and other relevant information. Google will notifiy you within hours if your name is mentioned online
3. Don’t overshare personal data: Including addresses and phone numbers of your work location. Many stalkers have unpleasantly surprised women at work
4. Location-enabled apps: Apps integrated with social media tracking can be exploited to track a victim’s movements.
5. Don’t tag Your social media location: Again, stalkers can determine your daily patterns and location. Some platforms allow users to search for posts and people by location
6. Device access: If someone has physical access to your devices, they can install tracking or keyboard apps that invades your privacy, track your location and even compromise your passwords
The only important thing anyone needs to know from your social media posts is that you’re having fun! A few simple changes to your privacy settings and sharing habits can make a big difference in safeguarding your personal space. Use your safety intuition to stay aware, check those settings to stay secure, and always think twice before you tag.
The Overlooked Free Tool to Online Security: Two-Step Authentication
In addition to exploiting old-school security issues like weak passwords (be honest, we’ve all used our pet’s or kid’s name), hackers are increasingly leveraging advanced technologies like artificial intelligence (AI), machine learning algorithms, and powerful computing platforms to enhance their attacks. The latest algorithms and powerful compute platforms make hacking far more effective, efficient and dangerous.
In addition to exploiting old-school security issues like weak passwords (be honest, we’ve all used our pet’s or kid’s name), hackers are increasingly leveraging advanced technologies like artificial intelligence (AI), machine learning algorithms, and powerful computing platforms to enhance their attacks. The latest algorithms and powerful compute platforms make hacking far more effective, efficient and dangerous in several ways:
Automated and Scaled Attacks: AI algorithms allow hackers to automate and scale up their attacks, targeting multiple companies simultaneously. This exponentially increases their chances of successfully breaching networks and systems.
Malware Evolution: Hackers use AI to develop malware that can evade detection by traditional security software. This malware is adept at adapting its code or behavior to avoid being identified by antivirus programs.
Password Cracking: The latest algorithms accelerate the process of cracking passwords by analyzing patterns and predicting likely combinations. AI-powered tools like PassGAN can crack 51% of common passwords in less than a minute, 65% in less than an hour, and 71% in less than a day. This is substantially faster than traditional methods, which often took weeks or months to crack complex passwords
With all of this going on, much of it in the news, it’s easy to become overwhelmed by online security. So much so, that many of us end up doing the bare minimum and just hope we don't become victims. (Pro tip: The “hope” method of security is rarely effective.)
So how can we protect ourselves effectively without overwhelm? One simple but powerful tool can make a big difference: Two-Step Authentication aka Two-Factor Authentication (2FA). It’s free, easy to implement and built into most current applications that need online security (such as email, bank apps, etc).
What is Two-Factor Authentication?
2FA adds an extra layer of security to your online accounts by requiring not only your password but also a second form of verification. This second factor could be a code sent to your phone, a fingerprint scan, or a hardware token. So if your account is hacked and someone tries to access your account, you’ll get a notification that an attempt has been made to access your account, but they won’t be able to because the hacker won’t have access to your code, scan or token. It’s like having a second lock on your front door – if one fails, the other still stands strong.
How Effective is 2FA?
You might be wondering, just how much of a difference does 2FA make? Let’s look at the numbers:
Microsoft reports that enabling 2FA can block over 99.9% of account compromise attacks. That’s a staggering statistic, showing just how effective this measure can be in preventing unauthorized access.
Google has found that adding a recovery phone number to your Google account can prevent up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks. These figures underscore the significant protection that even a simple form of 2FA can provide.
Symantec highlights that users who enable 2FA are approximately 80% less likely to have their accounts compromised than those who don’t. This reduction in risk is substantial and illustrates the practical benefits of adopting 2FA.
Implementing 2FA
Setting up 2FA is straightforward. As mentioned earlier, Most online services, including email providers, social media platforms, and financial institutions, offer 2FA options. Here’s a generalized guide to get you started:
Find the Security Settings: Navigate to the security settings of your online account.
Enable 2FA: Look for the option to enable two-factor authentication.
Choose Your Method: Select your preferred method of receiving the second factor, such as a text message, an authentication app, or a hardware token.
Follow the Prompts: Follow the on-screen prompts to complete the setup.
In a world where cyber threats are becoming increasingly sophisticated, taking simple steps like enabling Two-Factor Authentication can make a world of difference. It’s a small effort for a significant boost in your online security. Stay safe online and everywhere!
What is a Restraining Order? Why You Would Need One and What to Expect
Finding yourself needing a restraining order is something that no one ever imagines. Yet, for too many women, this becomes a harsh reality when dealing with abuse, threats, or harassment. While restraining orders are meant to protect you, it’s important to also know that the process can be dangerous and emotionally draining. Here’s a breakdown of what a restraining order means, why it can be so risky for women, and why the law needs to change.
Finding yourself needing a restraining order is something that no one ever imagines. Yet, for too many women, this becomes a harsh reality when dealing with abuse, threats, or harassment. While restraining orders are meant to protect you, it’s important to also know that the process can be dangerous and emotionally draining. Here’s a breakdown of what a restraining order means, why it can be so risky for women, and why the law needs to change.
What is a Restraining Order?
A restraining order, also known as a protection order, is a legal document issued by a court to keep an abuser away from you. It sets boundaries like maintaining a certain distance, stopping all forms of contact, and sometimes even moving out of a shared home. These orders are supposed to provide you with safety and peace, allowing you to go about your life without constantly looking over your shoulder.
If you have restraining order and there’s an incident with the perpetrator, it lets law-enforcement know that this person is a known problem. There are two very important facts about restraining orders that you need to know:
Keep the document on you at all times, even a copy on your phone. If there’s an incident and you don’t have it on you, it will slow up the process for law enforcement.
Do not contact the person that you have the restraining order against. For one thing, contact with them can lead to dangerous and potentially deadly situations (which is why you went to court to get it in the first place. But the person can then take you back to court and use the encounter to argue that the restraining order is now unnecessary.
Types of Restraining Orders
People generally only consider one type of restraining order, but there are actually several types:
Emergency Protective Orders (EPOs): Issued quickly when you need immediate protection, usually lasting only a few days.
Temporary Restraining Orders (TROs): These provide protection for a few weeks, until a court hearing can determine if a longer-term order is needed.
Permanent Restraining Orders: If a judge finds enough evidence during a hearing, they can issue a permanent restraining order. These can last several years or even indefinitely.
Differences Across States
Some people are surprised that the specifics of getting a restraining order can vary significantly depending on where you live. Here are a some of the key differences:
Eligibility: Some states only allow restraining orders for cases of domestic violence, while others also cover stalking, harassment, and other types of abuse.
Duration: How long a restraining order lasts can differ. For example, a temporary order might last up to 30 days in one state but only 7 days in another.
Enforcement: Penalties for violating a restraining order can vary. Some states have strict penalties, like immediate arrest, while others might require another hearing.
Filing Process: The forms and paperwork you need, as well as any associated fees, can differ. Some states waive fees for domestic violence cases.
It’s important to look up the specific laws in your state or get advice from a legal expert to know exactly what protections are available to you.
But there are some basics to every restraining order. Here’s what you need to know about the basic steps of the process:
File the Petition: Go to your local courthouse or their website to get the forms you need. Some courthouses offer help with filling out the forms.
Temporary Orders: If you’re in immediate danger, ask for an emergency or temporary restraining order. This can give you immediate protection until your court hearing.
Gather Evidence: Collect any evidence that supports your case, like text messages, emails, photos of injuries, police reports, or witness statements.
Court Hearing: This is where you present your case to a judge. Make sure that you’re prepared, bring all your evidence, and if possible, get legal representation. If you can’t afford an attorney, check with legal aid resources in your area. They may be able to help you access legal assistance for free or at a reduced cost.
The Reality of Facing Your Abuser in Court
One of the most terrifying parts of getting a restraining order that many women don’t realize is the requirement to face your abuser in court. This can be emotionally draining and physically dangerous. Here are some of the reasons why it’s such a perilous requirement for women:
Emotional Trauma: Having to recount the abuse and be in the same room with the person who is threatening the victim can be incredibly traumatic. It forces them to relive their worst moments in a public setting with the abuser sitting there smirking.
Intimidation: Abusers often use intimidation to control their victims. Facing them in court gives them another chance to intimidate and manipulate you, making it even harder to present your case.
Safety Risks: There’s always the risk of retaliation. Even just going to and from the courthouse can be dangerous, because the abuser knows exactly where the victim will be.
Why the Law Needs to Change
Making victims physically face their abusers in court is outdated and dangerous. Here’s what’s wrong and why the law should change:
Protecting Victims: The main goal of a restraining order is to protect victims. Forcing them to face their abuser contradicts this and puts you at more risk.
Emotional Well-being: The victim already on emotional overload and completely stressed out. Making them confront their abuser increases the trauma and hinders recovery.
Alternative Methods: With today’s technology, there are other ways for victims to provide testimony without being in the same room as their abuser. Video testimony, written affidavits, or closed-circuit TV are all options that can protect the victim’s well-being while ensuring justice is served.
The Emotional Journey Isn’t Just a Legal Process
Getting a restraining order isn’t just a legal process; it’s an emotional journey. But if you understand up front what’s involved, it can help to reduce the overwhelm and to plan for your safety and that of your family. Here are some of the things you may experience and what you can do to prepare:
Fear and Anxiety: You might be scared of retaliation from your abuser.
Solution: Have a safety plan and let trusted people know about your situation.
Reliving the Trauma: Describing abuse in public is painful.
Solution: Know that you can bring your support system to the hearing. Bring your friends, family, or a counselor.
Seek Support: Reach out to local domestic violence shelters, hotlines, and support groups.
Solution: They know the process, and can offer resources, emotional support, and sometimes even legal advice.
Restraining orders are crucial for protecting women from abusers, but the process of getting one can be dangerous and emotionally challenging. But if you know what you may be faced with, it may be less overwhelming because you can make plans and seek support.
But at the end of the day, forcing victims to face their abusers in court is an outdated practice that puts them at more risk. It’s long past time for the law to evolve to better protect victims. By adopting alternative methods for testimony and offering more robust support systems, the legal process can prioritize the safety and dignity of abuse survivors. Your safety is paramount, and seeking a restraining order is a brave first step towards reclaiming your life.
The current system often fails to account for the trauma and fear experienced by victims. It has to change so that victims aren’t retraumatized when they present their cases, and don’t have to come face-to-face with their abusers when they are supposed to be protected from them. Technology advancements are available to provide alternatives that ensure justice is served while prioritizing the victim’s safety and emotional well-being.
It’s time for our legal system to reflect these technical advancements and the reality of the dangers faced by those seeking protection
Traveling Solo? 10 Tips to Stay Safe this Summer
Summer is here, and with it comes the allure of solo travel for many of us. The freedom, the adventure, the Instagram-worthy moments—what's not to love? But while exploring the world on your own can be exhilarating, it also comes with its own set of risks. As advocates for women's safety, we've compiled these ten essential solo travel safety tips to ensure your journey is the absolute best, because you know you’re secure.
Summer is here, and with it comes the allure of solo travel for many of us. The freedom, the adventure, the Instagram-worthy moments—what's not to love? But while exploring the world on your own can be exhilarating, it also comes with its own set of risks. As advocates for women's safety, we've compiled these ten essential solo travel safety tips to ensure your journey is the absolute best, because you know you’re secure.
1. Research Your Destination Thoroughly
Before you even pack your bags, deep five into research – so important. Knowing the local customs, safe neighborhoods, and areas to avoid can make a significant difference. Websites, travel forums, and local blogs are treasure troves of information. Don't just stick to the glossy travel guides—real experiences from other solo female travelers, (girlabouttheglobe.com provides a ton of information) can provide invaluable insights. Think of it as your pre-adventure adventure.
2. Keep Your Location Private on Social
It's tempting to share every detail of your journey on social media, but broadcasting your exact location can be dangerous. When booking accommodations, choose reputable places with good reviews. Once you're there, avoid revealing where you're staying to strangers. It's okay to be vague about your plans—mysterious is the new sexy.
3. Stay Connected
Always let someone know your itinerary. Share your travel plans with a trusted friend or family member, and check in regularly. Modern technology is your friend—apps like Find My Friends or Life360 can keep your loved ones updated on your whereabouts in real-time. Plus, it gives them a chance to live vicariously through your epic adventures.
4. Blend In
Standing out as a tourist can make you a target. Dress conservatively and in line with local customs. Avoid flashy jewelry and accessories. The more you blend in, the less likely you are to attract unwanted attention. Think of it as a chance to become an international woman of mystery.
5. Trust Your Instincts
Your gut feeling is a powerful tool. We call it your Safety Intuition. If something feels off, trust yourself and remove yourself from the situation…immediately. Women tend to minimize this instinct, telling ourselves that it’s probably nothing, which is the messaging we’ve heard all of our lives. So, whether it’s an overly friendly stranger or a sketchy part of town, it’s better to be safe than sorry. Your safety intuition is like a superpower—use it wisely.
6. Mind Your Drinks
Drink spiking is a real threat, especially for solo travelers. Always watch your drink being made and never leave it unattended. Avoid accepting drinks from strangers, and stick to sealed bottles when possible. Remember, you're there to enjoy yourself, not star in a cautionary tale.
7. Technology is Your BFF
Download safety apps that can alert authorities or designated contacts (use more than one for backup) in case of emergencies. Become familiar with local emergency numbers and know how to contact your country’s embassy or consulate. Your phone is more than just a selfie machine—make it work for you.
8. Carry a Personal Defensive Tool
Whether it’s pepper spray, a personal alarm, or a tactical pen, having a means of self-defense can give you peace of mind. Couple of quick pro tips: Check your airline to make sure that you can pack your defensive tools in your checked luggage. If not, buy hornet spray at your destination: Cheap, effective and goes twenty-five to thirty feet; keep it in your room. Ensure you know how to use it and that it’s easily accessible. Be prepared and stay safe.
9. Friendly May Not be Your Friend
Meeting new people is one of the joys of travel, but exercise caution. Just because someone is friendly, doesn’t mean that they are your friend. Predators are expert actors and use charm to get you to lower your guard. Keep meetings in public places and avoid sharing too much personal information too soon. Trust is earned, not given. Make them work for it—you're worth it.
10. Secure Your Belongings
Petty theft is common in many tourist spots. Use anti-theft bags, keep your valuables close, and avoid carrying large amounts of cash. Consider using a money belt or hidden pouch for added security. Your stuff's important—treat it like royalty.
Solo travel, especially in the summer, can be one of the most rewarding experiences of your life. And by taking these precautions, you can ensure that your journey is not only exciting but also safe. Remember, the team at Street Smart Safety for Women is always here to provide support and resources for your travel adventures. Stay safe and enjoy every moment of your solo travels!
For more tips for solo female travelers, check our original article Solo Travel Tips for Women: The Ultimate Summer 2024 Guide on WellDefined.com.
Stay Safe and Sassy at Pride Events
Hey fabulous folks! Pride events are everyone’s time to shine, strut, and celebrate the beautiful spectrum of the LGBTQ+ community. Whether you're waving your rainbow flag in June, catching some sun at a winter Pride in Fort Lauderdale or Blue Ridge Pride in September, safety should always be on your radar. Here’s your sassy, no-nonsense guide to staying safe while you party hard.
Hey fabulous folks! Pride events are everyone’s time to shine, strut, and celebrate the beautiful spectrum of the LGBTQ+ community. Whether you're waving your rainbow flag in June, catching some sun at a winter Pride in Fort Lauderdale or Blue Ridge Pride in September, safety should always be on your radar. Here’s your sassy, no-nonsense guide to staying safe while you party hard.
Pride Flag
Plan Like a Pro - Yes, queen…we all love a spontaneous moment, but a bit of planning goes a long way
Know the Layout: Get the lowdown on the event’s setup. Find those exits, first aid stations, and the best spots to see and be seen.
Check the Schedule: Keep tabs on what's happening and when. Parades, performances, drag shows—you don’t want to miss a thing.
Weather Savvy: Dress for the occasion, darlings. Sunscreen, water, and an outfit that screams 'I’m here, I’m queer' without melting in the heat - so tacky.
Squad Goals - Roll deep with your crew or at least have a backup plan
Buddy System: Partying with pals isn’t just more fun; it’s safer. No one gets left behind.
Share Your Location: Use your phone’s location-sharing feature with a trusted friend not at the event. Because disappearing acts are only fun in magic shows.
Meeting Points: Pick a spot to regroup if someone wanders off chasing glitter and rainbows.
Eyes Wide Open - Stay aware, stay safe, stay fabulous:
Stay Alert: Keep those eyes peeled for anything out of the ordinary. And that’s a lot to ask at a Pride event, because we’re all extraordinary!
Avoid Dark Corners: Stick to the main areas. Secluded spots are great for quiet moments, but not so much for safety.
Trust Your Gut: If something feels off, it probably is. Don’t stick around to find out.
Guard Your Goodies - Keep your stuff safe so you can focus on the fun:
Pack Light: Bring only the essentials. Leave the family jewels at home (or at least the pricey ones).
Secure Your Bag: A crossbody bag or fanny pack is your best friend. Hands-free for dancing and secure against sticky fingers.
Anti-Theft Gear: Look for bags with lockable zippers and RFID protection. Because tech can be fabulous too.
Hydrate and Moderate - Because nobody wants to be that person:
Water, Water, Water: Hydrate like it’s your job, especially if you’re in the sun.
Pace Yourself: Enjoy the drinks, but don’t go overboard. We’ve all seen the messy queen. Don’t be her.
Know Your Rights - Stay informed and empowered:
Local Laws: Brush up on the local laws and LGBTQ+ rights where you are. Knowledge is power.
Help on Hand: Have the contact info for event organizers, security, and local law enforcement. Better safe than sorry.
Emergency Ready - Because we can’t predict everything:
Emergency Exits: Know where they are. It’s Basic Safety 101.
Stay Cool: If something goes down, stay calm and follow instructions from event staff.
Report Suspicious Stuff: If you see something weird, say something. We’re all in this together.
Pride is a time to be loud, proud, and unapologetically you. With these tips, you can strut your stuff with confidence, knowing you’ve got safety covered. So go out there, have a blast, and show the world just how fabulous you are—safely!
Stay safe, stay proud, and slay all day!
Domestic Violence and Firearms: A Cop’s View of the SCOTUS Ruling
When I was working in law enforcement, the #1 most feared calls, bar none, were domestic violence calls, They were the only calls that required us to have backup. The reason that they are the most dangerous is because they are unpredictable, and more often than not, turned even more violent as we were enroute to the call, and after we arrived.
When I was working in law enforcement, the #1 most feared calls, bar none, were domestic violence calls, They were the only calls that required us to have backup. The reason that they are the most dangerous is because they are unpredictable, and more often than not, turned even more violent as we were enroute to the call, and after we arrived. Domestic violence calls were of the utmost priority and to denote that, were preceded on the radio by three high-pitched long tones, signifying an in-progress, possibly life-and-death situation. It was chilling hearing the tones, because you always knew someone was in a horrific situation, and getting there was critical for their safety, and/or survival.
Domestic violence calls were and still are, a violent mix of someone trying to exact control and revenge against someone they say that they love - their family, ex-partner, significant other or current spouse. These calls could be a combination of a violation of a restraining order (or protection order), aggravated assault with/a firearm, sexual assault, burglary, child abuse, arson, attempted murder or murder. Police know when they arrive that these incidents are all felonies of varying degrees. What is not always known, is whether the offender is armed with a firearm.
Firearms and Domestic Violence Homicide
Why should abusers not have access to firearms? Because over half of intimate partner homicides are committed with firearms. With a gun in the home, women in abusive relationships are five times more likely to be killed by their abusive partner.
The ruling comes at a time when firearms are a leading factor in intimate partner violence nationwide. According to Gun Violence Archive, there have been 952 domestic murders involving firearms in 2024...so far.
Findings also show that when a firearm is introduced into a domestic violence event, the perpetrator is twice as likely to kill the intimate partner and other victims as compared to perpetrators using other weapons.
Intimate Partner Violence and Mass Shootings
The availability of a firearm in the hands of an abuser also increases the danger to the rest of the family. Because If the perpetrator shoots and kills four or more people in an intimate partner homicide, it is then considered a mass shooting. When most people think of mass shootings, they imagine a gunman opening fire on random strangers in a public area. But the truth is that many mass shootings involve intimate partners and other family members in a private residence. How many of these lives could have been saved if the abuser's access to firearms had been prohibited?
Prohibiting people who have already demonstrated their propensity for violence from possessing firearms is a huge step in the right direction. But it is only a step. Much more work needs to be done to ensure victims of domestic abuse can feel safe from their abusers. We were holding our breath on this one.
We can exhale, for now.
What Mind Games Do Narcissists Play?
Narcissists are experts at psychological manipulation, using mind games to control and exploit their victims. And while anyone can fall prey to a narcissist, women are often particularly vulnerable due to our societal conditioning and gender-specific expectations. Understanding these manipulative tactics is crucial to recognize and protect yourself from becoming a victim. So, we’re going to explore the mind games that narcissists play, why women are especially susceptible and how you can keep yourself safe.
Narcissists are experts at psychological manipulation, using mind games to control and exploit their victims. And while anyone can fall prey to a narcissist, women are often particularly vulnerable due to our societal conditioning and gender-specific expectations. Understanding these manipulative tactics is crucial to recognize and protect yourself from becoming a victim. So, we’re going to explore the mind games that narcissists play, why women are especially susceptible and how you can keep yourself safe.
Understanding Narcissism
Narcissistic Personality Disorder (NPD) is characterized by a grandiose sense of self-importance, a lack of empathy for others, and a need for excessive admiration. Narcissists often view themselves as superior to others and feel entitled to special treatment, at your expense. And because they see themselves as better than anyone else, they have an inflated self-image. But that ego needs constant feeding, and to prop it up, they’re masters of manipulation, often at the expense of those around them. A lot of people think that these people only act this way with those that they’re involved with romantically, we’re here to tell you that a narcissist acts this way with everyone in their orbit (with the exception of love-bombing, but they do deploy an initial charm offensive to win over everyone they meet).
Once you understand narcissistic tactics, your “fake charm” alarm will go off when you encounter them, and you’ll go the other way.
Common Narcissistic Mind Games
Love Bombing
One of the most insidious tactics narcissists use is love bombing. This involves overwhelming their target with affection, compliments, and attention in the initial stages of the relationship. The goal is to create an intense emotional bond and dependency. Women, often socialized to value romantic gestures and emotional intimacy, can find themselves quickly swept off their feet, mistaking the narcissist's intense interest for genuine love. Love bombing is also the first step in the cycle of domestic abuse, where the abuser emotionally connects with the victim before beginning to abuse them.
Gaslighting
Gaslighting is the form of psychological manipulation where the narcissist makes their victim doubt their reality. It can involve denying things that were said or done, twisting facts, or outright lying. Over time, the victim begins to question their memory and perception, leading to confusion and a loss of self-trust. Women, who may already face societal pressures to be accommodating and doubt their assertiveness, can be particularly susceptible to this tactic. The important thing to remember about gaslighting is that the narcissist doesn’t just make the victim question actual events, but that they demean the victim as well. For example, Victim: “You were late coming home last night, I saw it on the Ring camera.” Narcissist: “No, I wasn’t. And you don’t know anything about anything, anyway, let alone technology.”
Triangulation
Narcissists may use triangulation to create jealousy and insecurity. This involves bringing a third person into the dynamic, such as an ex-partner, friend, or even a stranger, to make the victim feel threatened and to compete for the narcissist's attention. This tactic can be especially effective on women, who might feel pressured to compete and prove their worth in relationships.
Silent Treatment
The silent treatment is a form of emotional abuse where the narcissist ignores their victim to punish or control them. This can create anxiety and desperation in the victim, who may go to great lengths to regain the narcissist's attention and approval. Women, especially those who are raised to prioritize harmony and relationships, may find this form of rejection particularly painful and often try to appease the narcissist. In the appeasement, they forget their own feelings.
Projection
Projection involves the narcissist attributing their own negative qualities or behaviors on to the victim. For example, a narcissist who is unfaithful accuses their partner of infidelity. This not only deflects blame but also confuses the victim (gaslighting), making them doubt their own integrity. Women, who might already be conditioned to take on blame and guilt, can find themselves accepting these false accusations and working harder to prove their innocence.
The “Poor Me” Tactic
This is a big one. Narcissists are adept at self-victimization to elicit sympathy and manipulate others. This self-victimization can be particularly effective in maintaining control over women, who are often socialized to be nurturing and empathetic. When one crisis is over or seemingly resolved, the narcissist will then spin up another one. This isn’t necessarily isolated to relationships, a lot of people do this, particularly on social media, to get attention and sympathy.
Playing the Victim
Narcissists also often portray themselves as victims of circumstance, unfair treatment, or past trauma to gain sympathy and support. This can involve exaggerated or fabricated stories of hardship and betrayal. Women, who are typically more empathetic and compassionate, may feel compelled to provide emotional support and overlook the narcissist's abusive behavior.
Guilt-Tripping
And by playing the victim, narcissists also guilt-trip their target into complying with their demands. They may accuse the victim of being insensitive or unloving if they do not cater to the narcissist's needs. Women, who might be more inclined to prioritize others' feelings and avoid conflict, can be particularly vulnerable to this manipulation.
Martyrdom
Narcissists often adopt a martyr complex, portraying themselves as self-sacrificing and noble while subtly manipulating their victim into feeling indebted or guilty. This can involve highlighting their own efforts and sacrifices, often exaggerating or fabricating their contributions. Women, who may be conditioned to value selflessness and caregiving, can find themselves trapped in this dynamic, constantly trying to live up to the narcissist's expectations.
Why Are Women Are Particularly Vulnerable to These Type of Narcissistic Mind Games?
Several factors contribute to women's heightened vulnerability to narcissistic abuse:
Societal Conditioning
Women are often raised to be nurturing, empathetic, and accommodating. These traits, while positive, can be exploited by narcissists who seek to manipulate and control. The expectation to prioritize relationships and harmony can make it difficult for women to recognize and resist abusive behavior. Narcissists and abusers are well aware of this and look for these victims that they can exploit.
Gender Roles
Traditional gender roles can reinforce women's susceptibility to narcissistic manipulation. The pressure to be a perfect partner, mother, or caregiver can make women more likely to tolerate abusive behavior and internalize blame for relationship problems.
Lack of Awareness
Narcissistic abuse is often subtle and insidious, making it difficult to recognize. Women, who might be more focused on maintaining relationships and avoiding conflict, may overlook or rationalize red flags. Additionally, societal stigma around discussing abusive relationships can prevent women from seeking help or sharing their experiences.
Emotional Investment
Women are often more emotionally invested in relationships, making them more vulnerable to manipulation. Narcissists exploit this emotional investment to create dependency and control. The fear of losing the relationship can make it challenging for women to leave, even when they recognize the abuse.
How to Protect Yourself from Narcissistic Abuse
Recognizing the signs of narcissistic manipulation is the first step in protecting oneself. By building self-awareness, setting boundaries, and seeking support from trusted friends, family, or professionals, you can start to break free from narcissistic abuse. Education and empowerment are crucial in fostering resilience and ensuring that women can protect themselves from psychological manipulation.
Keep in mind that narcissists hone their skills with every relationship and are adept at a variety of mind games to control and exploit their victims. Women are often particularly vulnerable due to societal conditioning and gender-specific expectations. Your best defense is to understand these tactics and to recognize the signs of narcissistic abuse. When you start to see these patterns in people that you meet, you can protect yourself and ensure that all of your relationships are respectful and focused on both people involved.
The Man vs Bear Meme
A TikTok trend recently sparked a debate showed that the majority of women surveyed said they would feel more comfortable encountering a bear than an unknown man in the woods. This response has resonated with many women, who have shared their own experiences and perspectives on social media.
9 out of 10 women instantly chose the bear, without even needing to think about it. This near-universal consensus among women is striking, especially given how divided we can be on other issues. Our almost unanimous agreement comes from the fact that we know what to expect from a wild animal. Based on experience, we can’t say the same of men.
A TikTok trend recently sparked a debate showed that the majority of women surveyed said they would feel more comfortable encountering a bear than an unknown man in the woods. This response has resonated with many women, who have shared their own experiences and perspectives on social media.
The reasons women have given for choosing a bear over a man:
1. No Victim-Blaming: No one would question what I was wearing if the bear attacked me.
2. No Accusations of Consent: No one would accuse me of liking the bear attack.
3. Clearer Motives: A bear's motives are easier to understand.
4. No Gaslighting: A bear won't accuse me of leading them on by being nice to them.
5. No Forced Pregnancy: I would not be forced to carry the bear's babies to term in 27 states.
6. Fewer Horrific Outcomes: The bear will either kill me or leave me alone - there are not 400 other horrible ways a bear can hurt me. There are worse fates in life than dying.
7. No Human Trafficking: Bears do not traffic women.
8. No Victim-Blaming Supporters: A bear's friends won't come out to say how nice the bear is and how my attack is ruining its life.
9. No Doubts About the Attack: No one will question if the bear attack really happened.
10. Basic Humanity: The bear sees me as a human being.
11. If I survive the bear attack, I won't have to see the bear at family reunions.
12. The bear did not pretend to be my friend for months beforehand.
13. A bear would not film the attack and send it to their friends.
The Statistics
When asked to choose between a man or a bear, 9 out of 10 women instantly chose the bear, without even needing to think about it. This near-universal consensus among women is striking, especially given how divided we can be on other issues. Our almost unanimous agreement doesn’t stem from the fact that we feel safe with the bear, we just know exactly what to expect from them. Something we can’t say about men.
According to the World Health Organization, one in three women globally have been the victim of an assault over the course of their lifetime.
In 2022, nearly 89,000 women and girls were killed intentionally across the globe, the highest yearly number recorded in the past two decades. Source: UN Women
Every year, there are 433,648 victims (age 12 or older) of rape and sexual assault in the U.S., according to the Sexual Assault Victims Advocacy Center.
One out of every 6 American women has been the victim of an attempted or completed rape in her lifetime, while 1 out of every 33 American men have.
The National Institute of Health found that men who have been raped overwhelmingly report the perpetrator was another man, in 87% of cases.
Every 68 seconds another American is sexually assaulted, 90% of the victims are women, reports the Rape, Abuse & Incest National Network.
Meanwhile, black bears have killed just 61 people in North America in the last 124 years. And you have a much higher chance of being killed by a dog (30-50 people per year), a swarm of bees (100 people per year), or by lightning (28 people per year).
Women are just playing the odds.
The Reality
This trend reflects the reality that women face - the pervasive threat of violence, harassment, and objectification by men. While the bear may pose a physical danger, women feel that the bear's motives are more straightforward and that they are less likely to face the complex trauma and aftermath of an attack by a man. And no, certainly not all men. But the issue is, at least the bear presents as a bear. With male human predators, we can’t tell.
The Concrete Jungle Survival Manual: Property Crime and Women
While on patrol, I saw my fair share of crime over the years. And one thing I can tell you is that property crime, while often overlooked, can have a big impact on personal safety - especially for women.
I spent over 28 years patrolling the streets of South Florida, and let me tell you, property crime was a constant concern. And the impact on victims went far beyond just the financial loss. So many victims felt violated, anxious, and even afraid to go about their daily lives after experiencing these kinds of crimes. What can you do?
When I was working as a deputy sheriff, I saw and investigated my fair share of crime over the years. And one thing I can tell you, is that property crime, while often overlooked, can have a big impact on personal safety - especially for women living in big cities.
I spent over 28 years patrolling the streets of South Florida, and property crime was a constant concern; home and auto burglaries, auto thefts, delivery thefts - you name it, it happened.
And the impact on victims went far beyond just the financial loss. So many victims felt violated, anxious, and even afraid to go about their daily lives after experiencing these kinds of crimes.
Risk of More Severe Crimes
Property crimes, such as burglaries and thefts, can inadvertently signal to predators that a home might be an easy target for a larger payday. When properties are repeatedly targeted, like burglarizing vehicles or thefts from carports or garages, it’s usually a green light to potential offenders that security measures are lax, or that valuable items are easily accessible.
This is a dangerous perception for victims, because it can increase the risk of more severe crimes, such as home invasions. Also, as property crime rates increase in an area, there can be a corresponding rise in criminal presence, elevating the likelihood of residents encountering intruders physically. When that occurs, the results can be devastating to the homeowners in many ways.
Ripple Effects of Property Crimes
It's easy to think of property crimes as "victimless" - after all, no one gets physically hurt, right? Well, that’s not true all the time. But the truth is, these crimes can have a profound psychological impact, especially for women. Think about it - your home is supposed to be your safe space, your sanctuary. When someone breaks in and steals your belongings, that sense of security is shattered. You start to feel vulnerable and anxious in your home and your neighborhood.
And it's not just your home that can be targets. Car burglaries and package thefts from residential areas, are rampant in many areas, leaving women feeling unsafe getting in and out of their vehicles or even accepting deliveries. The stress of constantly having to be on the lookout, of wondering if your car will be broken into or your packages stolen, can be exhausting and take a real toll.
Residents Are Increasingly Concerned About Crime
The concern of property crime has been rising over the past several years. Burglaries, thefts, and vandalism are often highlighted in the media. This heightened awareness is valid, as several urban areas note spikes in property crime rates.
As an example, Albuquerque, New Mexico, has been noted for having the highest rate of property crime among U.S. cities, with significant issues in motor vehicle theft. Similarly, large cities like Seattle, Washington, and San Francisco, California, have also experienced high rates of property crimes such as burglary and larceny-theft.
The latest statistics illustrate that the overall trend in property crime across the U.S. showed an increase in 2022, marking a shift from a decade-long decrease. This recent uptick includes various types of property crimes, with motor vehicle theft and larceny-theft being the most prevalent.
This community concern stresses the need for immediate action and emphasizes broader calls from all of us for a more effective and responsive criminal justice system.
Staying Safe at Home
So what can we do about it? As women, we have to be proactive about protecting ourselves and our property. Here are some tips I always shared with the community:
Home Security
Predators are lazy, and always look for easy targets. Don’t let yours be that target.
• Install a good home security system with an alarm, motion sensors and cameras. This can deter break-ins and also provide evidence if a crime does occur.
• Make sure all of your doors and windows are locked, even when you're home.
• Consider installing extra lighting around your home, especially in dark areas like the backyard or side entrances.
• Get to know your neighbors and look out for each other. They’ll pay more attention if you aren’t anonymous. Return the favor!
Vehicle Security
Vehicle security is especially important for women, because predators drive around shopping areas looking for unsuspecting women.
• Try to park in a well-lit, populated area (Park in your driveway: Use motion sensor lighting)
• Avoid isolated or underground parking garages if possible
• Never leave valuables in plain sight in your car. Keep hidden in the trunk. Especially don’t leave anything with your name/address in your car
• Consider having an alarm with a GPS tracker or an anti-theft device installed in your vehicle
• Be aware of your surroundings when getting in and out of your car, especially at night. Be prepared by carrying a self-defense tool like Pepper Gel, a Personal Sonic Alarm. You can also use your car key fob alarm to scare off a predator, but we like self-defense tools better.
Package Delivery
Here’s some ways that you can reduce theft of your packages and deliveries:
• See if you can have packages delivered to your workplace or a trusted neighbor, so the packages don’t signal you’re not home all day.
• Install a secure package delivery box or locker at your home
• Ask your delivery service to require a signature for all packages
• Monitor your deliveries and report any missing items immediately
Stay Vigilant, Stay Safe
Property crime is a reality. And it is serious. But it can be reduced. Stay vigilant, be proactive, and look out for each another. We can reduce our risk and increase our safety and security.
As I always advise people: Secure your property, trust your instincts, and look out for your neighbors by reporting suspicious activity to the authorities. By coming together, we can make our homes and communities safer.
A Law Enforcement Veteran Shatters Six Sexual Assault Myths
As a retired female deputy sheriff, I've taken too many calls and seen too many lives ravaged by sexual assault. And throughout my career, I've also encountered numerous myths surrounding the victims, which somehow twist the blame.
These narratives are dangerous, because they not only distort the reality of these vicious crimes, but also contribute to the stigmatization and re-victimization of survivors. So, it's crucial to address and debunk these myths with facts and change society’s tendency to victim blame.
As a retired female deputy sheriff, I've taken too many calls and seen too many lives ravaged by sexual assault. And throughout my career, I've also encountered numerous myths surrounding the victims, which somehow twists the blame. These narratives are dangerous, because they not only distort the reality of these vicious crimes, but also contribute to the stigmatization and re-victimization of survivors. So, it's crucial to address and shatter these myths with facts, and work toward changing society’s tendency to victim blame.
Myth 1: Sexual assault is often the result of miscommunication or a mistake.
Fact: Sexual assault is a crime, never simply a mistake.
Sexual assault is just not a misunderstanding between two people. It is a deliberate act of violence where the victim’s consent or permission is not given. Miscommunication implies a mutual error in understanding. But here’s the truth: Sexual assault means that one person unilaterally imposes their will on another without the agreement of the victim. This is a clear crime, where the perpetrator's intent is to control and dominate.
Myth 2: Sexual assault is provoked by the victim's actions, behaviors, or the way they dress.
Fact: Sexual assault is never the victim's fault.
This one is one of the most damaging: The distorted thinking that the victim's appearance or behavior can provoke an assault. This type of thinking shifts the blame from the perpetrator to the victim. Victim blaming. The truth is that sexual assault is a violent crime that is driven solely by the perpetrator's decision to exert power and control, never by the victim. No one "asks" for or deserves to be assaulted, regardless of their behavior or how they dress.
Myth 3: Most sexual assaults occur between strangers.
Fact: Most sexual assaults are committed by someone the victim knows.
Contrary to the frightening stranger-danger narratives, over 80% of sexual assaults are committed by someone the victim knows, such as a friend, family member, or acquaintance. I’ve seen it time again. Many women don’t even realize that they have been the victim of a crime because they know the person, so they never report it. And the fact that the victim knows the perp highlights the betrayal and breach of trust that goes along with these crimes, making them even more traumatic for the victim.
Myth 4: If the victim doesn't fight back, it wasn't really sexual assault.
Fact: Victims may freeze in fear or not physically resist due to the size/strength of the attacker or other factors.
The absence of physical resistance does not equate to consent. Many victims experience what is known as "freeze response" during an assault. This psychological and physiological reaction is a common response to extreme fear and does not imply consent or willingness
Myth 5: Victims who do not appear to be injured were not really assaulted.
Fact: Many survivors are not physically injured, as the threat of violence alone is often sufficient for the victim to submit.
Physical injury is not a prerequisite for sexual assault. The threat of harm, coercion, or manipulation can compel a victim to submit without physical resistance. Emotional and psychological injuries are often more prevalent and can be just as, if not more, damaging as physical wounds
Myth 6: Men cannot be sexually assaulted.
Fact: Men can be and are sexually assaulted, though it is often underreported.
Anyone can be the victim of a sexual assault, and the stigma surrounding male victimization leads to underreporting and a lack of support for those affected. Recognizing that men can be and are victims is critical for providing necessary resources and support for all survivors
Understanding that these myths are lies is essential for supporting survivors and preventing sexual assault. As a community, we must create the environment where survivors feel safe enough to come forward, and where perpetrators are held accountable for their actions and prosecuted to the full extent of the law.
How to Report Sexual Assault: A Guide for Women
Sexual assault is a traumatic experience that leaves deep emotional scars. Victims often grapple with fear, confusion, and distress, of not knowing where to turn, or what next steps to take. Should you even report the sexual assault to police?
As a former law enforcement officer, I've seen this many times. I think it's important for every woman to know how you can report sexual assault.
Sexual assault is a traumatic experience that leaves deep emotional scars. Victims often grapple with fear, confusion, and distress, of not knowing where to turn, or what next steps to take. Should you even report the sexual assault to police?
As a former law enforcement officer, I've seen this many times. I think it's important for every woman to know how to report sexual assault, even anonymously, while receiving medical care and legal support.
The Importance of Consent
Understanding consent is THE criteria in defining sexual assault. It must be informed, voluntary, and active. It can't be inferred from silence, previous sexual relationships, or incapacitated states (due to drugs, alcohol, passed out or otherwise unconscious).
The bottom line: Any sexual activity without explicit consent is sexual assault. Period.
So it's important to clearly communicate your boundaries. And if those boundaries are violated, know that it constitutes a legal offense that you have the right to report.
Understanding "Jane Doe" Reporting
For many survivors, privacy is a major concern when coming forward about a sexual assault. "Jane Doe" reporting can be a suitable option for those who wish to keep their identities confidential. Also known as "Restricted Reporting" in law enforcement term, the survivor's name and identifying details are kept anonymous in public and official records, which provide a sense of security and control, at a time when everything feels out of control.
How it works: When you report an assault as Jane Doe, law enforcement and medical providers will use a pseudonym to protect your identity from being publicly disclosed. This report still allows for a thorough investigation and immediate medical attention, but separates your personal identity from the case's public face. No one will know unless you want them to know.
Medical Attention: The First Step to Healing and Justice
Following a sexual assault, it is crucial to seek medical attention immediately. Not only for health reasons but also to preserve evidence through a forensic exam, also known as a rape kit.
What to expect during a forensic exam:
Examination of injuries for immediate and future medical care.
Evidence collection including clothes and swabs which may contain the perpetrator's DNA.
Emergency contraception and preventive treatments for STIs.
This exam is best conducted as soon as possible to ensure the preservation of evidence. Hospitals typically have systems in place to conduct these exams confidentially and with sensitivity.
The Role of a Comprehensive Police Report
A thorough police report is essential in the pursuit of justice. It not only initiates the legal process, but also serves as the essential document that can be referred to throughout the case.
It should include:
Detailed narratives of the incident from the victim and any witnesses
Physical evidence, collected and catalogued
Documentation of the victim's statements and responses from the accused if available
Initial observations by officers and first responders on the scene
The police report is crucial for legal proceedings throughout the judicial system, ensuring that all details are accurately and systematically recorded.
Supplementing the Report: It’s important to remember that memories can clarify over time. If you recall additional details days, weeks, or even months later, you can supplement your initial report. This can be critical as new memories can provide additional evidence that strengthens your case.
Seeking an Advocate
During this challenging time, having a supportive advocate can make a significant difference. A victim’s advocate can offer you:
Emotional support as you process the assault
Guidance through the medical and legal systems ensuring your rights are upheld
Confidentiality advocates are not associated with law enforcement and serve your interests alone
These advocates are usually provided by hospitals or local women’s shelters. They are trained to handle such sensitive situations with the care and confidentiality they require.
Preparing for Testifying in a sexual assault case
If your case goes to court, being prepared for the defense tactics employed by the accused can be crucial. Common strategies include:
Claiming consent
Establishing an alibi
Attacking your credibility
Here’s how you can prepare:
Document everything: Keep a detailed account of events and interactions following the assault. This includes saving texts, emails, photos, or any communications related to the incident.
Preserve physical evidence: Do not wash or dispose of the clothing you were wearing during the assault and try to retain any receipts, photographs, or witness information from the event.
Be consistent in your statements: From your first report to every detail recounted to healthcare or law enforcement personnel, consistency is key. Inconsistencies can be exploited by defense attorneys to undermine your credibility.
Emotional and Legal Support Networks
Reach out to support networks available for sexual assault survivors, including:
Professional Counseling
Support groups
Legal aid organizations
Making Your Decision to report sexual assault
Deciding whether to report a sexual assault is intensely personal. It's essential to consider all aspects of your health and safety in this decision-making process.
What you can control:
Choosing when and how to report the assault.
Deciding who gets to know about it.
Determining what outcomes you are comfortable pursuing.
Reporting a sexual assault is a brave but difficult step. Whether you choose to remain anonymous through a Jane Doe report or openly seek justice, the priority should always be your safety and well-being.
Understanding your rights, the importance of medical care, and the support systems available can help empower you to make the best decision for your situation.
Remember, you are not alone, and numerous resources are dedicated to assisting you.
Women Living Alone Safely: Apartment Securiy
Living alone can be exciting —it's your own little retreat where every detail reflects your personal touch. But when you're a woman on your own, it's also incredibly important to feel secure and protected within your walls. Understanding the need for safety isn't about paranoia or living in the red zone; it’s about making your home a true sanctuary.
In this post, I’m going to share some essential security tips that can help any woman feel safer living alone.
Solo and Secure: Apartment Security Tips for Women Living Alone
Living alone can be exciting —it's your own little retreat where every detail reflects your personal touch. In fact, I think that every woman should live on her own for at least a year at some point in her life! You learn so much about yourself and you get to do just what you want to do. It may seem frightening at first, but I found that it was a lot of fun!
But when you're a woman on your own, it's also incredibly important to feel secure and protected within your walls. Understanding the need for safety isn't about paranoia or living in the red zone; it’s about making your home a true sanctuary.
In this post, I’m going to share some essential security tips that can help any woman feel safer living alone. We’ll look at everything from high-tech security systems to simple, everyday practices that can significantly enhance your apartment's security. Ready to create a safer space for yourself? Let’s get started with some smart, practical advice to keep your solo living arrangement secure.
The best way to secure your apartment is by layering old-school tactics with modern technology to create a safe space that gives you peace of mind. Here’s how you can reinforce your living space:
🔑 Upgrade Your Locks
Invest in high-quality deadbolts and consider a smart lock that notifies you who comes and goes. A sturdy lock is your first line of defense.
🪟 Strengthen Your Windows
Secure your windows with window side locks and apply security films that make the glass hard to break.
📹 Install Security Cameras
Set up cameras at your entry points. Use systems like Ring or Nest Cam motion sensors for live feeds directly to your phone.
🚨 Reliable Alarm System
Loud alarm systems can alert you, scare off intruders and alert law enforcement. Integration with your smartphone will immediately advise you of a breach if you’re away from home.
👀 Peephole & Digital Viewers
NEVER open your door before knowing who is on the other side. Digital door viewers can also store images and help you monitor visitors.
🗣 Smart Home Assistants
Devices like Amazon Echo or Google Home can control lights, simulate noise, and integrate with your security system to enhance your safety.
🌐 Wi-Fi Security
Protect your network to keep your smart devices safe. Use strong passwords and keep your firmware updated to shield against hacks.
📱 Security Apps
Apps like bSafe or Noonlight can alert emergency services with your location at the tap of a button, providing an extra layer of security.
🔊 Old-School Tricks
Place a rubber door stopper under your door when you’re home. Then when you leave, put a small strip of tape on the door and doorjamb that will immediately let you know if someone has opened the door while you were gone.
🤝 Be Social
Engage with your neighbors, in person and online. They’ll have more of an interest in watching out for you, and you can return the favor!
🐕 Consider a Furry Friend
Dogs aren’t just great companions— their barks effectively deter predators.
🏠 Curtains and Blinds
Use heavy curtains or blinds to cover your windows, especially on the ground floor.
Your living space is your safe space. By upgrading traditional security methods with the latest technology, you’re creating layers of defense that enhance your security and providing you with peace of mind.
Five Techniques for Bystander Intervention
Looking for a Few Good Men…
In the wake of Laken Riley’s tragic murder while running, and the bizarre series of recent incidents where women have been randomly punched in the face in New York City, it’s clear that ensuring women’s safety is a community responsibility. regardless of gender.
Guys, we need your help. We need ALL hands on deck, because we all have a duty to watch out for each other and to stand against violence and harassment in ANY form.
Looking for a Few Good Men…
In the wake of Laken Riley’s tragic murder while running, and the bizarre series of recent incidents where women have been randomly punched in the face in New York City, it’s clear that ensuring women’s safety is a community responsibility. regardless of gender.
Guys, we need your help. We need ALL hands on deck, because we all have a duty to watch out for each other and to stand against violence and harassment in ANY form. And a big part of that is being an active bystander.
What this means is recognizing when someone is in danger or uncomfortable, and choosing to help de-escalate or positively influence the situation. It certainly does NOT mean trying to be a hero and putting yourself in danger as well. But it could involve some low-risk actions such as calling 911, creating a distraction, or simply checking in on the person at risk.
For both men and women, here are some ways everyone can help:
· Educate Yourself and Others: Understand the signs of harassment and violence. Share resources and information on how to intervene safely.
· Speak Up: If you see someone being harassed or feel that someone's behavior is threatening, consider safe ways to intervene. It could mean making your presence known, offering support to the victim, or involving law enforcement, if necessary.
· Support Victims: Show empathy and support to those who have experienced violence or harassment. Listen to their stories without judgment and offer them help by finding professional support if needed.
· Promote Safe Spaces: Advocate for policies and environments in your workplaces, communities, and social groups that prioritize safety and respect for everyone.
· Lead by Example: Model respectful behavior in all of YOUR interactions. Challenge sexist jokes or comments that normalize violence against women. Encourage respect and consent in ALL ways.
The loss of the young jogger in Georgia and the assaults in New York City are stark reminders of the realities many women face daily. These patterns of escalating violence against women are a time to reflect on our role in creating a society where everyone can feel safe. As professionals, as colleagues, and as members of the community, it is essential that we have each other’s back and support each other.
Guys, this means you too.
The Real Issue Behind Attacks on Running Women
Running women are constantly aware of their safety. We’re runners/walkers and get many questions from the running community about staying safe while running. Of course, we’re all shaken by the tragic murder of Laken Riley. Not only because a young woman was struck down, but also because we all realize that we face the same danger, just because we’re outdoors, quietly enjoying ourselves. And while we can (and do) talk to women every day about how to be safe, the basic issue isn’t that women don’t keep themselves safe…
Running women are constantly aware of their safety. We’re runners/walkers and get many questions from the running community about staying safe while running. Of course, we’re all shaken by the tragic murder of Laken Riley. Not only because a young woman was struck down, but also because we all realize that we face the same danger, just because we’re outdoors, quietly enjoying ourselves.
And while we can (and do) talk to women every day about how to be safe, the basic issue isn’t that women don’t keep themselves safe - it’s that of men’s violence against women.
The politicization of Ms. Riley’s murder is as tragic as her death is. Because the furor over the legality of the perpetrator’s immigration status blurs the larger issue that is SO common that it is completely ignored. The harsh reality that women are at risk of men’s violence. Period. Whether we’re simply out and about, or in our homes with our family, who supposedly loves us.
We went back and analyzed eight high-profile murders of women runners since 2016. And here’s what we found: It doesn’t matter WHEN or WHERE we’re out. From the streets of Manhattan to the rural paths of Iowa, from the early hours of the morning to the middle of the day, and into the early evening, female joggers have been targeted in acts of violence that have ended tragically. The victims, women who simply sought the freedom and peace that comes with a run, have become symbols of a pervasive issue that transcends location, time, and circumstance: Violence against women.
And the perpetrators of these heinous crimes have only one thing in common: They are men. They are men who killed women. While differing in background, method, and race, the ONLY thing that they did share was that they chose to attack a woman.
This fact alone unites the cases of Laken Riley, Karina Vetrano, Vanessa Marcotte, Mollie Tibbetts, and Eliza Fletcher, among others. These women, and sadly many more, met with violence while engaging in the simple act of running—a pursuit that should be safe for everyone.
While we have immigration laws that should be held to, let’s not forget the larger issue that women face every day, irrespective of anything else.
The Hidden Hand Influencing Social Media Regulation - Putting Our Children At Risk
Despite the massive effect of technology and social media on our daily lives over the last decade, Congress has passed absolutely zero legislation surrounding it. In fact, it has done absolutely nothing about it in the 21st century. Why are our children’s lives are at risk while legislators sit idly by? The answer probably won’t surprise you, but the numbers behind it may.
In our book, Street Smart Safety for Women, we discuss how the former Facebook company (now Meta and including Instagram) prioritizes profits over the safety of its more than three billion (now almost 4 billion) users, specifically endangering women and children.
Our discussion was based on The Facebook Files, a series of articles by the Wall Street Journal (WSJ) in October 2021 that was drawn from tens of thousands of internal company documents submitted to the SEC and Congress by Frances Haugen, a former Meta product manager turned whistleblower.
Senate Subcommittee Hearings: 2021
In The Facebook Files and subsequent testimony to a Senate subcommittee in October, 2021, Ms. Haugen explained how Meta is aware of how its products harm teen’s mental health, contribute to misinformation and the open use of human trafficking on its platforms. However, the corporation chooses to focus on “breakneck growth and astronomical profits.”
At the hearing, lawmakers from both parties insisted that this was an issue that they could agree on, that they were united behind user’s safety, and that Haugen’s disclosures were the motivation that they needed on Capitol Hill to take action.
But we wrote, “There were Congressional hearings and a lot of pearl clutching aplenty on both sides of the aisle, calling for change. Ms. Haugen testified before Congress in hopes that the bombshell would provoke government oversight of Facebook. But ultimately, Congress could not decide what to do, so they did what they have always done: nothing.”
In fact, despite the massive effect of technology and social media on our daily lives over the last decade, Congress has passed absolutely zero legislation surrounding it. In fact, it has done absolutely nothing about it in the 21st century.
By law, social media companies aren’t held responsible for anything posted on their platforms. Section 230 of the Communications Decency Act (CDA) of 1996 provides them with immunity regarding content posted by users of their platform, nor are they responsible for any crimes that are committed on their platform. And that hasn’t changed since, well, 1996. Which means that they “self-regulate” and do whatever they feel like doing since there aren’t any laws to break.
And that’s just the way that the social media companies like it.
Social Media Impact on Our Children
Before we go on, let’s understand how we definitively know that social media is negatively impacting our young people, and that this isn’t just repression of free speech.
First of all, according to the American Psychological Association (APA): Children’s brains change between the ages of ten and twelve, “making social rewards (compliments on a new hairstyle, laughter from a classmate) a lot more satisfying…making preteens extra sensitive to attention and rewards from others.” And their brain makes no differentiation between online or offline attention. In other words, “Young people’s biology is making them particularly vulnerable to – and in some cases, even exploited by social media.”
Secondly, in May, 2023, pointing out the effects on teen’s brain development, the U.S. Surgeon General issued an Advisory calling attention to the growing concerns of social media on young people’s mental health. The Advisory noted the effects on young women in particular: “A study conducted among 14-year-olds found that greater social media use predicted poor sleep, online harassment, poor body image, low self-esteem, and higher depressive symptom scores with a larger association for girls than boys.”
In addition, in April, 2023, the Guardian published the results of their two-year investigation into repeated claims that Facebook and Instagram have become major sales platforms for child trafficking. “What makes social media platforms so powerful as a tool for traffickers…is the way that they make it possible to identify and cultivate relationships with both victims and potential sex buyers. Traffickers can advertise and negotiate deals by using different features of the same platform: sellers sometimes post publicly about the girls they have available, and then switch to private direct messages to discuss prices and locations with buyers.”
And last, but certainly not least, recent Meta documents show that one hundred thousand children a day are sexually harassed on its platforms.
It appears that the experiment of allowing social media companies to “self-regulate” isn’t going well for our young people.
Senate Subcommittee Hearings: 2024
In the little over two years since Ms. Haugen testified, where do we stand now?
Now that the effects of social media on our children are becoming more widely understood, legislators are under increasing fire by families who have lost loved ones to the effects of social media on their mental health. As the result, a growing number of lawmakers are (still/again) urging legislation to curb the spread of child sexual abuse images online and to make the tech platforms accountable for better safeguarding children.
So, yet another Senate subcommittee hearing was recently held to do something after years of inaction by Congress in regulating social media companies.
On January 31, 2024, four social media executives were called before yet another Senate subcommittee. The CEO’s of Meta, Tic Toc, Snap and X (formerly Twitter) were “grilled” by “outraged” Senators on both sides of the aisle who (again) took the opportunity to grandstand for their constituents, many acting as though that they’d never heard of such a thing.
With the families of young people who’d lost their lives as the result of social media harm looking on, one Senator “strongly” challenged Meta CEO Mark Zuckerberg to apologize to the families, which he did, sort of. He said that “I’m sorry for everything you’ve been through.” An “apology” that accepted no responsibility. And, as with many empty amends, there was no commitment to action.
Astronomical Profits
To be fair, Mr. Zuckerberg testified during the hearing that Meta spent $5B on safety in 2023. It seems like a lot of money, doesn’t it? But is it?
The day after the hearings, no sooner had the Senator’s dusted off their hands and gone back to the office (or whatever it is that they do) after their hard work of public thrashing social media executives, Meta announced blowout Q4 2023 earnings. The company reported a 25% year-over-year surge in quarterly revenue to $40.1B, and annual revenue of almost $135B, while profit more than tripled. It further announced its first-ever dividend and a $50B stock buyback. That amount topping its 2023 stock buyback of $40B and 2022 buyback of $28B.
That $5B Meta spent on user safety in 2023? Well, kiddos…Meta has priorities, and your safety isn’t one of them. It seems as though Ms. Haugen was on to something when she discussed the company’s focus on “astronomical profits.”
The Hidden Hand
Why is it that our lawmakers seem unable to pass legislation on the one issue that they seemingly agree on: Our children’s safety? It turns out that there is a hidden hand behind the gridlock: Lobbyists. In our book, we note: “On January 21, 2022, the Washington Post reported that seven of the largest tech companies spent a record $70M in 2021 lobbying the U.S. government. The companies (Meta, Google, Amazon, Apple, Uber, Twitter (now X) and Microsoft) are spending to limit any legislation that would curtail their power and influence. The article notes that Meta led the pack, spending just over $20M….
What do these social media giants get for their investment? Exactly what they paid for: Zero oversight by legislators.”
So, continuing to focus on Meta, what is their current lobbying spend, a little over two years after the Washington Post article? According to Open Secrets, based on data from the Senate Office of Public Records, Meta spent $19.3M on 2023 lobbying the federal government and employs about 70 lobbyists (chart below).
$19M may seem like a lot of money, but when you compare it to Meta’s $135B profits, it’s a drop in the bucket. Quite the bargain, actually.
Source: www.opensecrets.org/federal-lobbying/clients/summary?id=D000033563 Based on data from the Senate Office of Public Records. Data for the most recent year was downloaded on January 24, 2024
and includes spending from January 1 - December 31.
Where Do We Go From Here?
If the 2024 Senate subcommittee hearings have illustrated anything, it’s that lawmakers are hopefully hearing their constituents. The only thing that is stronger than lobbyist dollars are citizen’s voices. Contact your representatives. Keep up the pressure. Make your voice heard.
In the meanwhile, keep the lines of communication open with your children. Monitor their social media. Let them know it’s for their safety, not a point of intrusion. Psychologist Dr. Amy Orbin provides insight into how parents can help their children navigate social media: Treat it like swimming in the ocean. “It can be an extremely dangerous place for children. Before parents let children swim in any open water, they make sure the child is well-prepared and equipped to handle problems that arise. They provide safety vests, swimming lessons, often in less dangerous waters, and even then, parents provide a huge amount of supervision.”
And all is not lost on the legislative front. In our next post, we’ll cover how states are filling in the legal gaps that Congress has looked away from.
The Power Dynamics of Workplace Bullying: Lessons from Korean War POWs and Domestic Abuse
A recent Forbes article on workplace bullying brought back memories. The manager at one of my last corporate jobs checked many of the boxes that Forbes notes about the bullying profile. And what many people don’t understand is that it never starts out that way. And it can happen to anyone.
A recent Forbes article on workplace bullying brought back memories. The manager at one of my last corporate jobs checked many of the boxes that Forbes notes about the bullying profile:
Repetitive emails that give unnecessary direction
Exclusion from work meetings or withholding communications vital to job performance
Misrepresentation of employee performance or behavior
Frequent requests for work below the employee competence level (trivial, time-consuming demands)
Long-term assigning of tasks beyond the employee’s duties without compensation
But what many people don’t understand is that it never starts out that way. And it can happen to anyone.
During the interview process, my former manager was personable and charming. I felt lucky to be working for him. However, in just a few weeks, the bullying and abusive behavior commenced. And like many people, I put up with it because of the perceived ROI - I did the math: I needed the job.
We use a similar example in our book as a parallel that most people can understand to explain why victims of domestic abuse stay in a violent relationship: At some level, they can’t afford to leave. Some would advise the employee to quit for just find another job. But what if the economy is headed toward recession and lay-offs (resource actions) are widespread. Now imagine that you have a seriously ill family member dependent upon the medical benefits that your job provides. T
Then how much workplace bullying would you put with?
These dynamics are important to remember as we close out the end of Domestic Violence Awareness month. Awareness of the commonalities in both of these situations will help in understanding those trapped in these positions, and to break the cycle of victim shame.
And, these dynamics of power at home and in the office also parallel a surprising population: Korean War POWs. Here are six common characteristics:
1. The Cycle of Abuse
In domestic abuse situations, experts often refer to the "cycle of abuse" where periods of tension build-up, followed by an abusive incident, reconciliation, and calm before the cycle begins again. This cycle can be seen in workplace bullying as well, where periods of tension and emotional abuse are interspersed with short-lived periods of calm or apparent remorse from the perpetrator.
2. Breaking the Spirit of POWs
During the Korean War, some POWs were subjected to psychological torture designed to break their spirit. This process was designed to create a sense of hopelessness and total dependency on the captor. Similarly, workplace bullies may employ tactics designed to break down an individual's self-worth, ensuring that the victim feels trapped and helpless within the workplace environment.
3. Isolation
Both domestic abusers and the captors of Korean War POWs often used isolation as a tactic. In domestic abuse, victims may be isolated from friends and family. In POW camps, prisoners were often isolated from fellow inmates. In workplaces, bullies can use isolation to exclude victims from social events, meetings, or vital communication, exacerbating feelings of alienation.
4. Gaslighting
Gaslighting is a manipulative tactic where the abuser makes the victim question their reality or sanity. Domestic abusers and POW camp guards have used this to make victims doubt their own experiences. Similarly, workplace bullies may trivialize or dismiss the empolyee’s concerns, making them question their own perceptions.
5. Fear of Retaliation
Just as domestic abuse victims may fear further violence if they speak out or attempt to leave, and Korean War POWs feared punishments for defiance, employees subjected to workplace bullying may fear job loss, further isolation, or heightened abuse if they confront the bully or seek external help.
6. The Bystander Effect
In many abusive situations, bystanders may be aware of the abuse but choose not to intervene. This phenomenon has been observed in domestic abuse cases, POW camps, and workplaces. The reasons can range from fear of becoming the next target, disbelief, or even normalization of the abusive behavior. When I reported my manager’s behavior to HR during my exit interview, the representative said that “she knew,” yet nothing was ever done.
The parallels between workplace bullying, Korean War POW experiences, and domestic abuse illustrates the profound impact of power and control dynamics in various settings. Recognizing that these patterns exist in many scenarios is the first step in addressing and mitigating their harmful effects.
But it shouldn’t be the last.
Running Safety for Women
A good run is so much fun! It clears your head; helps you feel strong and it’s something you do just for you. Yet, as many women know, that sense of freedom can come with personal safety concerns. And with rising reports of women feeling unsafe during runs, it's important to be informed, prepared, and proactive in our approach to running safety.
A good run is so much fun! It clears your head; helps you feel strong and it’s something you do just for you. Yet, as many women know, that sense of freedom can come with personal safety concerns. And with rising reports of women feeling unsafe during runs, it's important to be informed, prepared, and proactive in our approach to running safety.
A Snapshot of Women's Safety Concerns
A 2020 survey by Runner's World found that:
84% of women have experienced some form of harassment during a run, compared to just 50% of men.
Of the women surveyed, 27% said they've been followed by someone on foot, bicycle, or in a vehicle.
34% of women runners opt to run only during daylight hours to feel safer.
Over 70% of women carry a phone for safety reasons when they run.
But it’s important to understand the facts about running safety and to challenge popularly held beliefs, particularly surrounding the best time of day to run safely. For example, many people believe that their safety is assured if they run at a particular time. Some think that predators only attack at night, so they don’t have to take safety measures during the day. But during her 28 years on the street in law enforcement, Joy found that many predators strike with impunity during daylight hours. Other runners mistakenly believe that the early morning hours before dawn are safe, as though attackers resemble vampires who have found their way home before sunrise. Still others alter their training routine during the fall and winter months when it gets dark earlier. The truth of the matter is that predators can strike at anytime, anywhere. And you need to be prepared.
Personal Safety Tips for Female Runners
Stay Visible: Choose brightly colored clothing, especially during early morning or evening runs. Reflective gear and LED lights can also help increase visibility.
Plan Your Route: Let someone know where you're going and when you plan to return. There are also apps available that can share your real-time location with trusted contacts.
Vary Your Routine: Changing up your routes and run times can make you less predictable to potential harassers or attackers.
Train with a Buddy: There's safety in numbers. Consider joining a local running group or coordinating with a friend.
Trust Your Instincts: If something feels off, pay attention to that feeling. That’s your safety intuition warning you that something is wrong. Don’t dismiss it or minimize it, as many women are socialized to do. What are you feeling? Can you identify what’s causing it? It could even be a medical situation that’s beginning to unfold. Stop and analyze. If needed, change your direction, find a public place, or call someone. Your safety intuition is your body’s natural warning system.
Carry a Personal Defense Tool: Carry a self-defense tool in your hand that you can use to immediately protect yourself, if necessary. Bear spray or dog spray are good options. They contain industrial-strength pepper spray that can go much further than regular pepper spray. If you choose the pepper-spray option, use the kind that straps around your hand for easy access. You don’t want to be fumbling if you need to use it. Remember to aim for the eyes, spray horizontally so that both eyes are affected. A personal alarm is also a good option, but keep in mind that it won’t help you defend yourself.
Empower Yourself with Knowledge
It's not just about physical precautions. Keeping your safety top of mind will keep you from panicking, as you’ll have the tools and plan to know exactly what to do in an emergency. Equipping yourself with knowledge can make a significant difference.
While it's disheartening that we have to think about these things, it's crucial to prioritize your safety. Remember, it's not about living in fear, but about empowering yourself with knowledge and tools to stay safe. Continue to run with strength, passion, and confidence, but always keep your well-being as your top priority.
Run strong and stay safe out there.