Have you ever sent a photograph or sel-fie using a mobile phone or a computer? If not sha-red via webcams in a virtual chat-room, then perhaps to a loved one via a text mes-sage or an email attachment, or posted on “family-friendly” social networking and micro-blogging sites such as Face-book, Instagram or Twitter? Now imagine this image, even doctored or morphed onto other bodies, posted on pornography sites or used for “sextortion” (the malafide use of sexual images obtained either consensua-l-ly—for instance during a relationship, or illegally without permiss-ion, or by hackers through spycams and mali-cious software. According to a rec-ent media report, the FBI received 18,000 sexto-rtion--rela-ted complaints in 2021. Yet, this is just the tip of the iceberg. Image-based abuse—including, but not limited to, sextortion and ‘revenge pornography’—where an ex-partner posts intimate pictures or videos online as a vicious form of retribution—is only one of the many ways in which digital technologies are being used to perpetrate sexual and gender-based harm.
Sextortion, Revenge Pornography, Sexual Harassment...: Gender Violence On Internet
A long look at legal aspects of gender violence facilitated by digital communication technologies on Internet and social media
Other forms include online rape threats and simulated rape, misogynistic hate-speech (e.g. directed at female politicians and journalists), cyb-er bullying, and as a tool to intimidate rape sur-vivors and victims of sex trafficking. In rese-a-rching rape victims’ suicides for my doctoral dissertation some years ago, I came across chilling instances, where rapists not only recorded their crimes but also circulated them via MMS clips, or thr-eatened to upload the videos on YouTube as a sha-ming tactic to silence the victim. While many survivors probably did stay silent due to fear or social pressure—such that we may never hear the-ir stories—some publicly fought for justice, tak-ing on the system with or without family support. Some others took their own lives. I still remember the heartbreaking case of a young wom-an in India, gangraped and blackmailed by her boyfriend and his friends, who died after lea-ving a suicide note: “Punish him, God, because I loved him.”
Countless other injuries are inflicted through apps, online dating platforms and cloud-based services every day. Thus, despite the many posit-ive opportunities for connection made possible through digital technologies in our work and our worlds, they can unfortunately also exacerbate existing inequities and enable the targeting of vulnerable people, e.g. minority women conside-red less deserving of respect. Earlier this year, for instance, a male graduate in computer applicati-ons was arrested by Delhi Police for “auctioning” Muslim women through his online app ‘Sulli Dea-ls,’ hosted on Github using photographs sourced without permission.
This is not just an Indian or a South Asian problem—it is global. The 2012 case in Steubenville, Ohio, for instance, where a teenage rape victim was photographed not only by one of the perpet-r-ators on his iPhone, but also by several witnesses of the assault—all of whom shared her naked, still--unconscious images via phone, email and Twitter with hashtags. Images were also circ-ulated in numerous other high-profile cases in the US, such as the Stanford rape case (The People of the State of California v. Brock Allen Turner, 2015). In Austra-lia, the rape of a teenage girl was filmed and sold as a DVD in Melbourne schools and on the internet in 2006. In New Zealand, a gro-up of men gang--raped minor girls and shared the-se images on a Facebook page for two years. From around the world, this list of documented cases goes on and on; and when we account for unrepo-r-ted cri-mes, presumably a higher number owing to the social stigma associated with sexual viole-nce, official statistics are only a fraction of the act-ual numbers.
In fact, technology-facilitated sexual violence has become so ubiquitous in the present day that it calls for an overhauling of earlier theoretical frameworks. One example is British scholar Liz Kelly’s 1988 work, arguing that while rape and inc-est were criminalised by law, other forms of sexual harassment, such as street-flashing and cat-calling, were often normalised, even though these were all a part of a continuum, sha-ped by similar socio-cultural ideas about gender. While this model has not lost its relevance even 30 yea-rs down the line, many earlier forms of sexual abuse have now been altered by technology e.g. cyber--fl-a-shing is fast replacing street-flashing, with uns-o-l-i-cited images of genitalia now sent on sma-rt--phones via bluetooth. There are so many instances in conte-mporary culture that it led to my revising the syll-a-bus of a university course I teach on global dim-ensions of sexual violence, to add new mater-ial on tech-facilitated sexual violence.
But updating a course syllabus is easier than updating legal systems worldwide. While sexual violence is a criminal offence in most countries, cyb-er--criminology is a relatively new field, and its gendered aspects, newer still. Hence, legislative gaps remain when it comes to the contemporary use of communication technologies to inflict sexual harms, such as the non-consensual creation or distribution of intimate images. In these cases, existing criminal and civil laws on sexual harassm-ent, extortion, identity theft and fraud are used for purposes of prosecution. Only a few jurisdictions have specific laws to address technology-facilitated sexual violence.
In 2015, the Criminal Code of Can-ada recogni-sed as a crime the non-consensual use of sexuali-sed images. In the same year, New Zeal-and made online acts causing serious emotio-nal distress a criminal offence. Other countries like Australia, Japan, UK, etc., have also introdu-ced new legislation, with more jurisdictions follo-wing suit. Yet, challenges remain everywhere. Und-er the federal system of the United States, many states have pas-sed new laws and more Sen-ate bills have been und--er consideration. But the US law does grant a deg-ree of legal immunity to onl-ine platfo-rms hos-ting harmful content, and vict-ims often run up aga--inst additional legal obs-t-ac-les such as the spec-ific language around intent, proving the extent to which our privacy has been inva-ded (in the few states where image-based abuse is recogn-ised as a priv-acy violation or civil infract-ion), and the seriousness of emotional distress and harm it causes.
Solutions, then, are not simple. Instead, they call for individual and community-based measures, legislative amendments, partnerships bet-ween various stakeholders within local juri-s-di-ctions, as well as global cooperation. On an individual level, it cannot hurt to be mindful that those we encounter online (like those we encounter in person) may have a range of motivations while enjoying the additional protect-ion of distance, if not anony-mity. Individual bystander intervention on social media also remains important, wherever possible. So does the need for gender-sensitive policies on digital platforms, and working with experts in pre-par-e--dness for yet newer technologies. Syst-e-mic changes such as education and public sensitisation, and mental health resources for those aff-ected, can play a big role. To live in our brave new world of digital technologies, its many possibilities and multiple challenges, we need a bra-ve new vision.
(This appeared in the print edition as "The World of Bobs and Vagenes")
(Views expressed are personal)
Debotri Dhar is faculty affiliate for Women and Gender Studies at Center on Finance, Law and Policy, University of Michigan, Ann Arbor
- Previous StoryElections 2024: Ashok Tanwar Joins Congress Again; Sehwag Endorses Congress Candidate In Haryana
- Next Story