Appendix
Appendix 1: Digital Safety Threats and Risks
A non-exhaustive overview of the types of digital safety threats and risks an individual can face when engaging with cases of online abuse.
Blackmail
An often criminal act in which coercion and threats to reveal true or false information about an individual to the public or a particular party are made in order to make a gain—most commonly money or property.1
Cyberbullying
Cyberbullying is cyber harassment when applied to minors.2 “Bullying that takes place over digital devices like cell phones, computers and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.”3
Cyber Harassment
“The use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a direct or implied threat of physical harm. Unlike physical harassment involving face-to-face contact, cyber harassment requires the use of ICT and is verbal, sexual, emotional or social abuse of a person, group of organization. The cyber harasser’s primary goal is to exert power and control over the targeted victim(s).”4 Cyber harassment is typically thought to apply to adult-aged individuals.
Cyber Stalking
“The use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both an online assailant tactic and typology of psychopathological ICT user. Cyberstalking includes direct or implied threats of physical harm, habitual surveillance and gathering information to manipulate and control a target.”5
Defamation
“The act of making untrue statements about another which damages his/her reputation.”6
Doxxing
“Releasing personal information about a target — information that hadn’t been public, identifies someone who had been anonymous, or is embarrassing. This could be an address, credit card, photos or any other data uncovered by doxxers and typically posted online. Motives vary from personal revenge to vigilante justice or just mischief.”7
Flaming
“The act of posting or sending offensive messages over the Internet. These messages, called “flames”, may be posted within online discussion forums or newsgroups, or send via e-mail or instant messaging programs.”8
Hacking
“Unauthorized intrusion into a computer or a network.” A hacker may “alter system or security features to accomplish a goal that differs from the original purpose of the system.”9
Hate Speech
“A communication that carries no meaning other than the expression of hatred for some group, especially in circumstances in which the communication is likely to provoke violence. It is an incitement to hatred primarily against a group of persons defined in terms of race, ethnicity, national origin, gender, religion, sexual orientation, and the like.”10
Impersonation
In a digital context, impersonation can be understood as pretending “to be someone else online (or by text message) without that person’s permission if you mean to cause harm.”11
Compelled Harm or Suicide
Compelling an individual to harm themselves or commit suicide.
Phishing
“A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims.”12
Ransomware
“Ransomware is a form of malicious software (or malware) that, once it’s taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising—not always truthfully— to restore access to the data upon payment.”13
Non-Consensual Intimate Image (NCII) Sharing
“The distribution of sexually graphic images of individuals without their consent. This includes both images originally obtained without consent (e.g. by using hidden cameras, hacking phones, or recording sexual assaults) as well as images consensually obtained within the context of an intimate relationship.”14 One common example of the non-consensual sharing of images is revenge porn.
Sextortion
“A serious crime that occurs when someone threatens to distribute your private and sensitive material if you don’t provide them images of a sexual nature, sexual favors, or money. The perpetrator may also threaten to harm your friends or relatives by using information they have obtained from your electronic devices unless you comply with their demands.”15
Swatting
“False reporting an emergency to public safety by a person for the intent of getting a (‘SWAT team’) response to a location where no emergency exists.” Often times the reported crime will be serious in nature such as a “home invasion, shooting or hostage situation, to ensure a robust police response.” “Swatters often use caller ID spoofing and other tactics to make the call appear legitimate while simultaneously hiding their identities.”16
Trolling
“The art of deliberately, cleverly, and secretly pissing people off, usually via the internet, using dialogue.”… “The most essential part of trolling is convincing your victim that either a) truly believe in what you are saying, no matter how outrageous, or b) give your victim malicious instructions, under the guise of help.”17
Appendix 2: Possible Consequences of Digital Safety Threats
A general list of possible consequences or side effects that affect victims and communities subject to cases of digital safety threats.
Individual Impacts
- Self-harm and suicidal ideations
- Depression and post-traumatic stress, including from increased anxiety
- Deterioration of physical health, including from increased rates of substance abuse and risky sexual behavior
- Increased violent behavior
- Alienation and fear of others (especially in youth)
- Lowered academic achievement and aspiration
- Loss of self-esteem and confidence
- Absenteeism from school
Community Impacts
- Self-censorship resulting from the fear of retribution or attack
- Paranoia and anxiety towards other groups, including government and law enforcement, leading to fear of reporting crimes
- Restricted access to digital tools and platforms
Citations
- Merriam-Webster's Dictionary of Law, [Page 53], source.
- IPredator, "Cyber Harassment Internet Defamation & Internet Trolls," iPredator, source.
- Stop Bullying, "What Is Cyberbullying," Stop Bullying, source.
- IPredator, "Cyber Harassment," iPredator.
- IPredator, "Cyber Harassment," iPredator.
- "Defamation," ALM Media Properties, source.
- "What is Doxing," NBC News, source.
- Sharpened Productions, "Flaming," TechTerms Dictionary, source.
- "Hacking," Techopedia, source.
- "Hate Speech Law and Legal Definition," US Legal, source.
- Paul Saputo, "Online Impersonation," Saputo Law Firm, PLLC, last modified November 5, 2015, source.
- "Phishing," TechTarget, source.
- Josh Fruhlinger, "What is Ransomware? How it Works and How to Remove It," CSO, November 13, 2017, source.
- Cyber Civil Rights Initiative, "Cyber Civil Rights Initiative," Frequently Asked Questions, source.
- Federal Bureau of Investigation, "What is Sextortion?," FBI Video Repository, source.
- Jamie Ducharme, "Swatting Led to an Innocent Man's Death in Kansas. Here's What to Know About It," TIME, December 31, 2017, source.
- Glen Coco, "Why Does Nobody Know What 'Trolling' Means?," VICE News, May 10, 2012, source.