Skip to main content

Table 2 Adult RS-IBSA crime intervention points

From: Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders

Script stages Manager-place Guardian-target Handler-offender
1. Offender- victim and prehistory   Establish clear boundaries
General education regarding IBSA and potentially risky circumstances (i.e., reputational damage, psychological and physical harm)
Partners
Understanding both partners’ attitudes and perceptions about IBSA will bring more awareness in the event of any ‘triggers’ (e.g., break-ups, fights, saying “No”), online and physical privacy and respect for consent
Be aware that changes in the relationship (e.g., rejection, break-ups) may influence partners’ actions and potentially alter dynamics and safety around them
Be aware that gateway offences to IBSA (e.g., intimate covert filming and blackmail) are more latent
Be aware that offending does not always occur immediately after a break-up
Be aware that repeat victimisation and offending occurs more easily on the internet (i.e., images disclosed on the internet could resurface in future)
Public awareness of IBSA (issues around online and offline privacy, consent, intentional non-consent and potential contexts: e.g., break-ups, refusal to get back together, infidelity, new partner) (Barmore 2015; Gissell 2015; Salter and Crofts 2015)
Partners
Pre-establish boundaries, discuss boundaries, discuss concepts regarding IBSA perceptions, definitions, acceptable and non-acceptable behaviours, possible scenarios relating to consent and respect for online and offline privacy (Dawkins 2015)
2. Setting offline and online Social media sites testing tools to help people manage how they interact with former partners on social media after a relationship
Online platforms and intermediaries specialising in providing practical support to IBSA victims
Online platforms increasing technical controls against potential IBSA
Monitor offline and cyberstalking behaviours, verbal abuse on social media
Check on female (e.g., “How is ex responding to new male friend?”), signs of blackmail (e.g., abuser demanding sexual favours in exchange of non-disclosure) and other coercive control techniques (e.g., cutting off social support or financial support for child)
If socio-cultural minority, check for signs of blackmail, verbal threats (e.g., threats to “out” victim or inform victim that law enforcement/ intermediaries would not help them due to their socio-cultural orientation)
Presence of friends/family can act as handlers
Law enforcement’s online and offline presence and efforts against IBSA
3. Instrumental actualisation Have guardians present in location/at risk sites (social media) and moderators to maintain a strong and continued online presence
Prompts to log out of social media when not in use
If in direct contact with abuser, do not provide positive reinforcement and discourage IBSA
Alert victim immediately of the risk
If there is a high risk of disclosure, support victim to contact intermediary for additional advice and practical support for “potential” takedown requests and future actions.
If aware of the content of the images and the platforms that will be used in the disclosure, support the victim in reporting this possibility to the respective platforms
Increase public awareness in terms of guardianship and the role and practices required by encouraging people to actively look out for each other and identify circumstances in which men and women may be vulnerable
4. Offender approach method Having general security and privacy settings in place
Having reporting and flagging of images protocols in place
Information Service Providers (ISPs) and Social Media organisations should recalibrate anonymity standards to deter “anonymous” IBSA using the same tools and collaborative techniques they are utilising to fight terrorism
Education regarding common coercive control strategies (e.g., blackmail and threats) and ways to respond safely and effectively
Education and encouragement against peer pressure and to develop resilience
Education on online and physical safety—fully utilising general security and privacy settings on mobile devices and mobile apps to protect against physical level threats (Imgraben et al. 2014) (e.g., two-step authentication to access phone, logging out of social media apps and e-mail accounts when not in use, storing intimate images in ”hard-to-reach” folders that are encrypted with strong passwords, not disclosing passwords to partners, disabling automatic password saving functions and location settings, not allowing anyone to physically handle or use your mobile device without your supervision, if you have intimate images, never capture identifying features/backgrounds- face, tattoos etc.) being careful to delete all intimate images (including Cloud back-ups) when sending phones for repair, trading-ins or disposing of them
How to report and flag images
Remove excuses- general education on severe “privacy” and “trust” violations in relation to intimate partner violence and IBSA (e.g., “not knowing it is abuse” or “just for fun”) (Albury and Crawford 2012; Powell 2010; Salter and Crofts 2015)
International legal harmonisation (e.g., the criminalising of IBSA and EU’s ‘The Right to Be Forgotten’)
Intermediaries maintaining close ties with online platforms
Law enforcement alerting public that there are convictions and incarcerations for IBSA
5. Continuation Domestic intermediaries’ and information service providers’ ability to take immediate action on takedown requests and combat IBSA Support victim in maintaining a positive online presence Remove excuses-widespread messages against intimate partner violence and family violence and offences through digital communications technologies
IBSA is committed by those who have complete disregard for consent and online and offline privacy
IBSA is a domestic (sexual) violence offence and a communications offence (Bloom 2014)
Alerting the public to the potential criminal consequences of doxing (online disclosure of a victim’s personal details such as the victim’s full name, e-mail address, residential address, designation and place of employment or mobile number) multiplies risk to a victim’s personal and online safety (i.e., possible identity theft, in-the-flesh and online stalking and harassment)
6. Interaction and crime completion Online platforms to regularly prompt users to maximise use of security and privacy settings
Have effective avenues for IBSA victims to report their victimisation and flag new intimate images that surface or resurface
Support victim with personal online safety strategies (e.g., disable settings for location and friends tagging you in photos and checking you into places, control visibility)
Support victim with information on how to flag and report images
 
7. Post-action Assist intermediaries and law enforcement with criminal investigations Do not download, consume for personal pleasure or distribute intimate images of victim
Do not inform anyone else where to find the images and the contents of the images
If others have encountered and threaten to circulate the victim’s images, inform them that they might be interfering with police investigations and risk incriminating themselves in the process
Support victim with creating a digital evidence folder (documenting dates for online disclosure and victim finding out, URLs, screen names and usernames, taking screenshots and downloading copies of images from website, reporting abuse to the online platforms and flagging abusive content)
Supporting the victim with monitoring new content through Google reverse image searches for image file names, victim’s phone number, name or other words or usernames associated with victim’s images
Supporting victim with setting up a Google Alert to notify victim of new content about victim that needs to be removed
Education regarding victim blaming, slut shaming by law enforcement and intermediaries: Sexting is a safety issue and not a moral issue (Slane 2013)
8. Exit Keep digital evidence intact
Monitor repeat offending on same account or new accounts with similar image-based abusive patterns
Encourage victim not to delete personal social media account (doing so would make it harder to push negative content off top search pages of internet search engines)
Assist victim with creating new positive content on highly indexed pages
Establishing emotional support hotlines for victims
Education for friends and family regarding victim support
Encourage reporting
Continue to support victim in maintaining a positive online presence
 
\