Revenge Porn and the Distribution of Sexually Explicit Images: What’s consent have to do with it?

In February, a New York court dismissed a case against a man who posted nude images of his ex-girlfriend online by sharing them on his twitter account and emailing them to her employer and family.  While his actions were reprehensible he faces no punishment because, unfortunately, legal limitations in New York, and many other states, do not currently make what he did criminal. But that is changing.

When sexually explicit images are uploaded online and distributed without consent of the person in the image, it’s often done as a tactic of abuse meant to cause humiliation and harm to the person. Many of these images may have been taken or originally shared with someone else under the expectation of privacy and within a trusting relationship. Some images may have been captured without the victim’s knowledge. In either case, it is an unacceptable violation of trust and privacy. This abuse has been coined “revenge porn,” a term that has been getting a lot of media lately.

Whether the victim willingly took or originally shared the image is irrelevant. Sharing a picture with one person does not mean consent was given for mass, public distribution of the image, and it definitely is not a green light for the person who received the picture to do what they please with it. We make many decisions that can have severe consequences if someone we trusted abused that trust. I can give my neighbors a key to my house and still have a personal and legal expectation that they will not steal from me when I’m not home. I can give a store employee my credit card and expect that will only use the information to finalize the purchase that I have requested. If they do, I am legally protected.

We must stop blaming the victim and start holding abusers accountable in these cases. The person who shared these images with the intent to harm, injure, humiliate, and abuse. By focusing on the victim’s actions and questioning why the victim shared the picture in the first place, as Mary Anne Franks, a law professor at the University of Miami said, "…what we're really saying is if you're sexual with one person, society is entitled to treat you as sexual for all purposes…”

Fortunately, the perception of this behavior is changing, as is the legal landscape around it. Due to the strength and determination of many survivors, states have begun drafting and enacting legislation to address this issue.

Read our new handout on Images, Consent, & Abuse for more detailed information on this issue and tips for survivors. Additional resources can also be found at withoutmyconsent.org. This issue has gained momentum and attention recently as people speak up and speak out. Learn more at the above links and share to continue the conversation. 

Social Media and Stalking: Q&A with the Safety Net Team

The Safety Net team recently wrote an article on social media and stalking for the New York State Office for the Prevention of Domestic Violence. Check out the full Q&A here!

Here is a snippet of some of the questions and answers:

Q: What is social media?
A: Social media is user generated content that promotes engagement, sharing, and collaboration. It includes a wide range of websites and applications that can be accessible from computers, smart phones, and tablets. Facebook, Twitter, and Instagram are three of the most popular social media platforms, although there are many more. 

Q: How do abusers misuse social media?
A: Abusers misuse social media as a tool to harass, manipulate, and threaten. Abusers often send harassing messages or post offensive images – even explicit images of the victim that may or may not have been taken with consent (sometimes referred to as “revenge porn”). 

Q: How do survivors safely use social media? 
A: Social media usually involves sharing personal information. Users should look at privacy options and take note of what will always be public and what they have more control over. Some sites have rules against using fake names while others allow it. Many sites encourage users to share their location as well. Survivors should only share information that they are comfortable with. 

Q: What can a survivor do if an abuser is misusing online spaces? 
A: It depends on what the survivor wants to happen. One important step is documenting all contact and harassment. The survivor can take screenshots or photographs of the activity. A few platforms, like SnapChat, will tell the sender if the recipient takes a screenshot, so it might be safer to take a picture of the screen since notification may escalate abusive behavior. The survivor can also save all messages. It may be tempting to hit delete to make them disappear, but original messages will be important for evidence. 

Read the full article here.

 

10 Easy Steps to Maximize Privacy

Photo source: Ruth Suehle for opensourceway.com via flickr.com/ photo cropped from original

Photo source: Ruth Suehle for opensourceway.com via flickr.com/ photo cropped from original

We live in a world of constant technology use and lots of sharing. Technology has made it easier for families, friends, co-workers, and long-lost classmates to connect, and our online lives are just as important to us as our offline ones. But what you share doesn’t always stay within those circles and can be shared much more broadly than expected. Sometimes our technology gets out of our control.

So what can you do? Here are some quick ways to ensure that your tech use and sharing is done a little bit more safely. Although these may sound simple, these are some of the easiest things to forget to do and some of the easiest ways to lose control and privacy. 

1.    Log out of accounts and apps
Yeah, this is kind of duh advice, but you’d be surprised at how many people forget to log out of their accounts. They only realize they forgot when someone else posts something outrageous on their Timeline or feed. Logging out of your account is even more important if you’re using someone else’s device. Uncheck the “keep me logged in” feature and don’t allow the web browser to remember your password to automatically log you in. Doing so will make it easy for anyone to pick up your computer, tablet or smartphone, and post away, pretending to be you. 

2.    Use strong passwords
Use passwords to prevent strangers, parents (if you have nosy parents), and children (if you have nosy children) from accessing your accounts. Don't use the same password for more than one account, a password that someone who knows you can easily guess, or a one-word password that can be easily cracked. Create a password system so that you use unique passwords only you will know. 

3.    Review privacy settings
Review the privacy settings on all your online accounts, particularly your social media ones. Most sites allow users to limit what others see, whether it’s status updates or profile information. Don’t forget that it’s more than just social networks like Facebook or Twitter that have privacy settings. Most online accounts, such as Amazon, allow you to limit who can see your profile information. 

4.    Minimize location sharing
Smart phones have GPS location capability and you could be sharing your location without even knowing it. You can control which app has access to your location by turning off that option through your smart phone. (Most phones have location privacy options in the settings.) Some social network sites also allow you to manage your location privacy through the site’s privacy settings. 

5.    Don’t include location coordinates in your pictures
Did you know that when you take a picture on your smart phone, you could inadvertently share your location as well? That means that the selfie you just posted and uploaded online could contain your exact GPS coordinates. You can turn off that capability through the privacy setting on your camera app. Don’t forget that even if you turned off the location option for your camera app, the photo sharing app that you’re using may share your location—so turn off the location option for the app as well. 

6.    Be thoughtful about connecting social media accounts
Yeah, you can connect your Instagram to your Facebook or your Foursquare account to other social networks—and yeah, that may make it easier to update them all with just one click. But that also means that a lot more people will have access to lots of info about you. It also makes it more difficult to lock down your privacy. So be thoughtful about which social media accounts you connect. 

7.    Be careful when using free wireless networks
Free internet is always awesome. But you pay for it by being more vulnerable to risks. Using open wireless networks at your local coffee shop or sandwich shop can leave you susceptible to hackers accessing your private information. If you’re going to check bank accounts, buy something where you have to give your credit card information, or do anything sensitive, wait until you are back on a secure network. And if your personal wireless network doesn’t have a password on it, for the love of any deity, put a password on it!

8.    Use HTTPS everywhere
Not all websites are created equal. Some sites are more vulnerable to viruses, which makes your computer/tablet more vulnerable. However, some sites have a secure version – you can tell by looking at the link in the URL address bar. If it starts with https, it’s a secure page vs. http, which is just a normal page. (The next time you’re checking your bank account or buying something online, check out the address bar; it'll probably be green.) The easiest way to ensure that you’re using the secure page whenever you can is to download the HTTPS-everywhere browser add-in. Each time you go to a site, it’ll try to open the secure (https) site rather than the normal one. If the site doesn’t have a secure page, it’ll default to the normal page. 

9.    Use Incognito, Private Browsing, or InPrivate Browsing
Currently, Google Chrome, Mozilla Firefox, and Microsoft Explorer allow you to browse privately. Basically, privately browsing means that someone can’t open your web browser after you’ve used it and go through the history to see what you’ve been up to. Browsing privately is safer if you’re using a friend’s computer or tablet or are on a public computer. Keep in mind though that you have to close the browser to erase your history. If you leave it open, users after you can still see your browsing history.

10.    Use more than one email address
Email addresses are free, so have as many as you want! You can use one specific email address with a super strong password for your banking and shopping. Use another email for all the junk mail and accounts you have to create in order to use a particular web service. You could even consider using different email addresses for different social media accounts. Using different emails for different accounts is safer because if someone guesses one of your email + password combo, they don’t have access to all your accounts. You can even go one step further and download a service that “masks” your account address, so that you’re never using your actual email address.