{"id":10347,"date":"2022-02-23T12:36:54","date_gmt":"2022-02-23T12:36:54","guid":{"rendered":"http:\/\/TheNextWeb=1381123"},"modified":"2022-02-23T12:36:54","modified_gmt":"2022-02-23T12:36:54","slug":"domestic-abusers-are-weaponizing-everyday-tech-and-theres-no-quick-fix","status":"publish","type":"post","link":"https:\/\/www.londonchiropracter.com\/?p=10347","title":{"rendered":"Domestic abusers are weaponizing everyday tech \u2014 and there\u2019s no quick fix"},"content":{"rendered":"\n<p>Perpetrators of domestic abuse are <a href=\"https:\/\/www.refuge.org.uk\/our-work\/our-services\/tech-abuse-empowerment-service\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">increasingly<\/a> exploiting <a href=\"https:\/\/post.parliament.uk\/technology-and-domestic-abuse\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">digital tools<\/a> to coerce and control their victims. Where there is abuse in a relationship, technology will also feature in how that abuse is conducted. Police forces now expect as much, when responding to cases of domestic abuse.<\/p>\n<p>Such <a href=\"https:\/\/post.parliament.uk\/technology-and-domestic-abuse\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">technological abuse<\/a> features everyday tools, from smart devices to online platforms and mobile phone apps. And the information on where to find them and how to use them is easily accessible online, often using a simple Google search.<\/p>\n<p>To understand the extent of this problem, we <a href=\"https:\/\/pure.port.ac.uk\/ws\/portalfiles\/portal\/50080933\/Home_office_FINAL_report.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">conducted<\/a> a wide-ranging study for the UK government. We reviewed 146 domestic abuse cases reported in British and international media, and conducted in-depth interviews with support charity workers and frontline police officers in England.<\/p>\n<p>We found that abusers often have <a href=\"https:\/\/nixdell.com\/papers\/a046-freed.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">physical access<\/a> to their partners\u2019 devices and use them to monitor, harass and humiliate. Abusers can force their victims to disclose passwords, PIN codes or swipe patterns to get into their devices so they can install sypware \u2013 all without sophisticated tech knowledge.<\/p>\n<p>Geolocation software and other surveillance spyware <a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/14680777.2018.1447341?journalCode=rfms20\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">provide<\/a> new possibilities for abusers to monitor and track victims\u2019 movements. In our study, we found hundreds of tools online that could be used for these purposes.<\/p>\n<h2>Surveillance<\/h2>\n<p>Some apps are <strong><a href=\"https:\/\/digitalcommons.law.uidaho.edu\/idaho-law-review\/vol51\/iss3\/5\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">hint at the possibility of<\/a><\/strong> allowing hidden surveillance. One survey found <a href=\"https:\/\/press.avast.com\/use-of-stalkerware-and-spyware-apps-increase-by-93-since-lockdown-began-in-the-uk\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">a 93% increase<\/a> in the use of spyware and \u201cstalkerware\u201d apps since the beginning of the pandemic.<\/p>\n<p>We also found that there are tracking apps which are designed for legitimate purposes, such as child or anti-theft protection, and which are widely available on equally legitimate sites and app stores. Research shows these <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173574.3174241\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">have<\/a> been <a href=\"https:\/\/research.monash.edu\/en\/publications\/new-forms-of-gendered-surveillance-intersections-of-technology-an\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">exploited<\/a> to spy on or reportedly to <a href=\"https:\/\/www.vice.com\/en\/article\/aemeae\/meet-flexispy-the-company-getting-rich-selling-stalkerware-to-jealous-lovers\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">stalk<\/a> a partner (or ex-partner). Studies now <a href=\"https:\/\/ieeexplore.ieee.org\/document\/8418618\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">refer<\/a> to them as dual-use apps.<\/p>\n<p>Similar concerns have been voiced about covert monitoring devices and smart tech such as Apple\u2019s AirTags. These small bluetooth devices are designed to be paired with tracking apps for finding lost belongings, such as car keys. But stalkers have <a href=\"https:\/\/www.theguardian.com\/technology\/2022\/jan\/20\/apple-airtags-stalking-complaints-technology\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">reportedly<\/a> exploited them too.<\/p>\n<p>It\u2019s not just <a href=\"https:\/\/www.ucl.ac.uk\/steapp\/sites\/steapp\/files\/giot-report.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">smart devices<\/a> that are being used to access personal information. Smart locks, thermostats, networked TV and sound systems, as well as security monitoring equipment are also being exploited to control and terrify victims \u2013 to monitor their movements and any visits they get.<\/p>\n<p>Further, where an abuser has access to cloud-based voice services, they will be able to access past conversations, order information and other data that might give them insights into the plans of a victim, potentially even if they are planning to leave.<\/p>\n<h2>Harassment<\/h2>\n<p>We found that fake accounts on online platforms and social media are often set up with abusive intent. They can be used to present the victim in a derogatory manner. A man in Liverpool <a href=\"https:\/\/www.liverpoolecho.co.uk\/news\/liverpool-news\/dumped-boyfriend-created-fake-swinger-19591442\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">was jailed<\/a> after he listed his ex-girlfriend\u2019s workplace in accounts set up in her name on swinger and dating platforms.<\/p>\n<p>Legally, this is a grey area. Hacking a person\u2019s account is a clear criminal offence, while impersonating someone to create a fake account is not. In some but not all instances, it can be argued that doing so constitutes <a href=\"https:\/\/www.researchgate.net\/publication\/264365163_IH8U_Confronting_Cyberbullying_and_Exploring_the_Use_of_Cybertools_in_Teen_Dating_Relationships\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cyber-harassment<\/a>.<\/p>\n<p>A case in point is the man who, in 2018, <strong>reportedly<\/strong> set up a fraudulent Facebook profile of his ex-wife in which he falsely claimed she fantasised about <a href=\"https:\/\/www.thesun.co.uk\/news\/6889072\/husband-fake-facebook-profile-encouraged-rape-wife-revenge-plot\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">being raped<\/a>. Because he included contact details in the profile, a random stranger turned up at her workplace to meet her.<\/p>\n<p>Similarly, in 2017, another man <strong>allegedly<\/strong> <a href=\"http:\/\/www.outsmartmagazine.com\/2017\/04\/man-sues-grindr-after-1100-men-show-up-at-home-thanks-to-exs-revenge-scheme\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">set up fake Grindr accounts<\/a> in the name of his ex-boyfriend. Over 1,000 men turned up at the victim\u2019s house and workplace, looking for sex.<\/p>\n<p>Elsewhere, perpetrators are engaging in <a href=\"https:\/\/inherentlyhuman.wordpress.com\/2016\/02\/15\/not-revenge-porn-but-abuse-lets-call-it-image-based-sexual-abuse\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">image-based sexual abuse<\/a>. People might <a href=\"https:\/\/theconversation.com\/revenge-porn-is-sexual-violence-not-millennial-negligence-126233\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">threaten<\/a> to release intimate pictures or videos to retain control over their victim.<\/p>\n<p>In other instances we noted that perpetrators, in setting up fake social media profiles of their victims, have used these to disseminate intimate images of their victims. Other means of distributing these materials have been to send them directly to friends, family, and employers, as well as publishing them publicly online.<\/p>\n<p>The term <a href=\"https:\/\/theconversation.com\/revenge-porn-is-sexual-violence-not-millennial-negligence-126233\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u201crevenge porn\u201d<\/a> is widely understood as the sharing or distribution of nude or sexual images by jilted ex-lovers whose primary motivations are revenge or retribution. It <a href=\"https:\/\/theconversation.com\/dont-watch-pam-and-tommy-the-series-turns-someones-trauma-into-entertainment-176844\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">does not<\/a>, however, capture the full range of motivations under which perpetrators might be operating, from blackmail and extortion to control, sexual gratification, voyeurism, social-status building and monetary gain. It also focuses attention on the content of the image, rather than on the abusive actions of perpetrators who misuse nude or sexual images.<\/p>\n<p>Technological abuse does not require IT proficiency. Perpetrators are using everyday, affordable, accessible tech. What we need is a better, more accurate definition of what constitutes domestic abuse and support services that are equipped to deal with it. As one charity worker we spoke to put it:<\/p>\n<blockquote readability=\"14\">\n<p>We know that domestic violence takes place online as well, but our service provisions tend to be very much shelters, workers, keyworkers, support officers, social workers who deal with the physical act and taking people out of a situation. But when you talk about a phone and other digital devices, I don\u2019t think we\u2019re there yet.<\/p>\n<\/blockquote>\n<p><em>If you or anyone you know has been a victim of any of the aspects we discussed above, there is help available. Please reach out to Refuge Freephone 24-Hour National Domestic Abuse Helpline: 0808 2000 247<br \/>or visit www.nationaldahelpline.org.uk (access live chat Mon-Fri 3-10pm)<\/em><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/176187\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" class=\"js-lazy\"><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><noscript><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/176187\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" class><\/noscript><\/p>\n<p><em>This article by <a href=\"https:\/\/theconversation.com\/profiles\/lisa-sugiura-328760\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Lisa Sugiura<\/a>, Senior Lecturer in Criminology and Cybercrime, <a href=\"https:\/\/theconversation.com\/institutions\/university-of-portsmouth-1302\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">University of Portsmouth<\/a> and <a href=\"https:\/\/theconversation.com\/profiles\/jason-r-c-nurse-392784\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Jason R.C. Nurse<\/a>, Associate Professor in Cyber Security, <a href=\"https:\/\/theconversation.com\/institutions\/university-of-kent-1248\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">University of Kent<\/a>, is republished from <a href=\"https:\/\/theconversation.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/how-tech-is-driving-new-forms-of-domestic-abuse-176187\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">original article<\/a>.<\/em><\/p>\n<p> <a href=\"https:\/\/thenextweb.com\/news\/domestic-abusers-are-weaponizing-everyday-tech-and-theres-no-quick-fix\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Perpetrators of domestic abuse are increasingly exploiting digital tools to coerce and control their victims. Where there is abuse in a relationship, technology will also feature in how that abuse is conducted&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":10348,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/10347"}],"collection":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10347"}],"version-history":[{"count":0,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/10347\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/media\/10348"}],"wp:attachment":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}