Gathering evidence

gathering evidence

gathering evidence

Prove they were present at the event: date/time stamped images & video of people together in place and time or email and phone records proving they contacted you. If you don’t have photo evidence of stalking then it’s like it never happened. Psychological abuse by groups of people is just too way out there, so it is critical to have photos and preferably video of the event.

When & who to document: if I get that feeling that I’m on someone’s radar that’s a good time to get out the video camera and pan the room to get not only the harasser but also the hidden spotters. If I think its a swarm I will walk the room and take images of everyone. This has paid off big time. I recently realized that a frumpy woman who was harassing me with Julie Wyszysnki after I posted the Guts and Garters piece was actually Kathy Hobbs the CEO of Media Logic in Seattle, but I didn’t bother to take her photo. Very annoyed with myself!

I know its weird to video people, so just smile, everyone likes an eccentric. Tell anyone who asks you’re taking videos for art project.

Stalkers don’t want to draw attention to themselves and will pretend nothing is happening and look away. People who are not messing with me are likely to get annoyed and give a dirty look or even say something to me. I’ve only once had a man get mad at me. Although I agreed to delete the images of him, next time I’m going to email them to myself (without acknowledging this) and then delete the photos.

Therapeutic: documenting and analysing the abuse helps objectify it. They stuff they do says more about them then about me. The day will come when the American public can judge for themselves if this is acceptable activity for their government and community to be involved in.

Helping others: documenting helps others going through the same thing and help them face it and begin taking it on. People experiencing prolonged psychological abuse report feeling as if being pushed to suicide. By documenting you may help save lives. The lives you help save maybe able to help you.

Prove they are connected to each other: Being together at an event proves people are connected to each other even if you can’t establish business and social connections. For example, Glen Allan who is a physical education instructor was positively identified by his connections to people known to involved with harassment, Michelle Butler and Dan Korslund.

Proving connections to harassment aimed at you: via records of phone bills, email records, credit card transactions with organizations behind the harassment.

Video: is best because capturing the person’s personality, voice and body movements makes for better identification. Capturing images frame-by-frame: run the video and control frames using the left/right arrow keys. Use the print screen button to capture the frame and paste into MS paint, crop and save.

Children: Avoid taking photos of kids as this can be interpreted as harassing a family. If possible crop the photo to only include enough of the kid to document the use of children in harassment. If children are being used to harass, capture a quick image of the kid and then focus the reset of the video on the adult.

Screen captures: For best quality results, enlarge the image in the browser to a desired size before copying and pasting into paint shop. Hold down the Ctrl key while tapping the + key until the image is the desired size. Press the print screen button, paste into Microsoft Paint. Crop as needed. Then save as JPEG.

Screen shots:

  • First time around faces: always get a screen shot the first time you identify someone. They might change the photo to one that is more iffy, change their hair or block the public from viewing their photos.
  • First time around cyber gas-lighting: always get a screen shot of if you think someone is trying to gas-light via Facebook. People that do this often have the gaslight image up for only a day. You can always delete it if it turns out to be insignificant.
  • GPS, Computer, etc: I use my old iPhone to capture annomalies on my other devices. It’s light and easy to carry in my purse.
  • Links: Always copy the links to online sources of information and images.
  • .mht: you can also save simple copy of the web page.

Contact information: I prefer to use people’s work address and only use their home address if that what they have posted publicly. If no contact information is available then a link to their LinkedIn profile, etc. Always provide full path links to your sources of contact info.

Disappearing information: Many times after I’ve identified a high-profile target, their information disappears from view or they change to poor quality photograph (see Manipulated Images). Screen shots: be sure to also capture the URL. Do not rely on ‘link’s in your reports to be always able to find documents. Pages go away or are renamed. Also, when an organization is first identified it is a good idea to take screen captures of as many employees as possible, particularly people in leadership and co-workers in the same department of stalkers.

Incident Reports: Use your event log, and the dates of your images and videos to create reports.

My reports formats:

  • Summary: It is for the benefit of whoever is handling your case. When their boss asks what they are working on this is the script they can read from. This is also used in the table of contents. A hard copy of the TOC is attached to cover letters that accompany CD’s mailed with PDFs of reports.
  • Narrative: tells about a specific event along with photos, maps and diagrams. Remember to always give source information for your images.
  • background: if there were other events leading up to this event I put that information here.
  • Evidence: copies of emails and such.
  • Questions: if any
  • Identification table: a row for each person with three columns. 1) my photo of them if available 2) web face photo 3) contact info: name, title, education, employer and contact info if available 4) links to this information. 5) bio if significant. 6) other reports named in 7) how are they connected to a stalking group if not an employee or family member.

This entry was posted in 6 Fighting back, To Catch a Stalker. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s