NC Silver Alert Logo

The DUNN POLICE DEPARTMENT is searching for FELICITIA PEREZ
April 13, 2014 9:53 PM -- The N.C. Center for Missing Persons has issued a Silver Alert for a missing endangered woman, FELICITIA PEREZ.

NC Silver Alert Logo

The TRANSYLVANIA SHERIFF'S OFFICE is searching for ASHTON DAKOTA HOXIT
April 11, 2014 8:06 PM -- The N.C. Center for Missing Persons has issued a Silver Alert for a missing endangered man, ASHTON DAKOTA HOXIT.

NC Silver Alert Logo

The Chapel Hill Police Department is searching for Kathryn Loreena Perkins
March 31, 2014 12:21 AM -- The N.C. Center for Missing Persons has issued a Silver Alert for a missing endangered woman, Kathryn Loreena Perkins.

NC Silver Alert Logo

The SUNSET BEACH POLICE DEPARETMENT is searching for ROBERT NEWTON KUBELLE
March 26, 2014 12:03 AM -- The N.C. Center for Missing Persons has issued a Silver Alert for a missing endangered man, ROBERT NEWTON KUBELLE.

NC Silver Alert Logo

The Raleigh Police Department is searching for John Jacob Harris
February 28, 2014 12:11 AM -- The N.C. Center for Missing Persons has issued a Silver Alert for a missing endangered man, John Jacob Harris.

NC Silver Alert Logo

The Raleigh Police Department is searching for Michelle Marie Scott
February 10, 2014 3:35 PM -- The N.C. Center for Missing Persons has issued a Silver Alert for a missing endangered woman, Michelle Marie Scott.

NC Silver Alert Logo

The Hoke County Sheriffs Office is searching for Jeannie Kellam Landon
February 6, 2014 10:38 PM -- The N.C. Center for Missing Persons has issued a Silver Alert for a missing endangered man, Jeannie Kellam Landon.

Internet and Computer Safety

If you are in danger, please try to use a safer computer that someone abusive does not have direct or remote (hacking) access to.

  • If you think your activities are being monitored, they probably are. Abusive people are often controlling and want to know your every move. You don't need to be a computer programmer or have special skills to monitor someone's computer and Internet activities – anyone can do it and there are many ways to monitor with programs like Spyware, keystroke loggers and hacking tools.
  • It is not possible to delete or clear all the “footprints" of your computer or online activities. If you are being monitored, it may be dangerous to change your computer behaviors such as suddenly deleting your entire Internet history if that is not your regular habit.
  • If you think you may be monitored on your home computer, be careful how you use your computer since an abuser might become suspicious. You may want to keep using the monitored computer for innocuous activities, like looking up the weather. Use a safer computer to research an escape plan, look for new jobs or apartments, bus tickets, or ask for help.
  • Email and Instant/Text Messaging (IM) are not safe or confidential ways to talk to someone about the danger or abuse in your life. If possible, please call a hotline instead. If you use email or IM, please use a safer computer and an account your abuser does not know about.
  • Computers can store a lot of private information about what you look at via the Internet, the emails and instant messages you send, internet-based phone and IP-TTY calls you make, web-based purchases and banking, and many other activities.
  • It might be safer to use a computer in a public library, at a community technology center (CTC) at a trusted friend's house, or an Internet Café.

« this page last modified 02/21/11 »