Script stages | Manager-place | Guardian-target | Handler-offender |
---|---|---|---|
1. Offender- victim and prehistory | Establish clear boundaries General education regarding IBSA and potentially risky circumstances (i.e., reputational damage, psychological and physical harm) Partners Understanding both partners’ attitudes and perceptions about IBSA will bring more awareness in the event of any ‘triggers’ (e.g., break-ups, fights, saying “No”), online and physical privacy and respect for consent Be aware that changes in the relationship (e.g., rejection, break-ups) may influence partners’ actions and potentially alter dynamics and safety around them Be aware that gateway offences to IBSA (e.g., intimate covert filming and blackmail) are more latent Be aware that offending does not always occur immediately after a break-up Be aware that repeat victimisation and offending occurs more easily on the internet (i.e., images disclosed on the internet could resurface in future) | Public awareness of IBSA (issues around online and offline privacy, consent, intentional non-consent and potential contexts: e.g., break-ups, refusal to get back together, infidelity, new partner) (Barmore 2015; Gissell 2015; Salter and Crofts 2015) Partners Pre-establish boundaries, discuss boundaries, discuss concepts regarding IBSA perceptions, definitions, acceptable and non-acceptable behaviours, possible scenarios relating to consent and respect for online and offline privacy (Dawkins 2015) | |
2. Setting offline and online | Social media sites testing tools to help people manage how they interact with former partners on social media after a relationship Online platforms and intermediaries specialising in providing practical support to IBSA victims Online platforms increasing technical controls against potential IBSA | Monitor offline and cyberstalking behaviours, verbal abuse on social media Check on female (e.g., “How is ex responding to new male friend?”), signs of blackmail (e.g., abuser demanding sexual favours in exchange of non-disclosure) and other coercive control techniques (e.g., cutting off social support or financial support for child) If socio-cultural minority, check for signs of blackmail, verbal threats (e.g., threats to “out” victim or inform victim that law enforcement/ intermediaries would not help them due to their socio-cultural orientation) | Presence of friends/family can act as handlers Law enforcement’s online and offline presence and efforts against IBSA |
3. Instrumental actualisation | Have guardians present in location/at risk sites (social media) and moderators to maintain a strong and continued online presence Prompts to log out of social media when not in use | If in direct contact with abuser, do not provide positive reinforcement and discourage IBSA Alert victim immediately of the risk If there is a high risk of disclosure, support victim to contact intermediary for additional advice and practical support for “potential” takedown requests and future actions. If aware of the content of the images and the platforms that will be used in the disclosure, support the victim in reporting this possibility to the respective platforms | Increase public awareness in terms of guardianship and the role and practices required by encouraging people to actively look out for each other and identify circumstances in which men and women may be vulnerable |
4. Offender approach method | Having general security and privacy settings in place Having reporting and flagging of images protocols in place Information Service Providers (ISPs) and Social Media organisations should recalibrate anonymity standards to deter “anonymous” IBSA using the same tools and collaborative techniques they are utilising to fight terrorism | Education regarding common coercive control strategies (e.g., blackmail and threats) and ways to respond safely and effectively Education and encouragement against peer pressure and to develop resilience Education on online and physical safety—fully utilising general security and privacy settings on mobile devices and mobile apps to protect against physical level threats (Imgraben et al. 2014) (e.g., two-step authentication to access phone, logging out of social media apps and e-mail accounts when not in use, storing intimate images in ”hard-to-reach” folders that are encrypted with strong passwords, not disclosing passwords to partners, disabling automatic password saving functions and location settings, not allowing anyone to physically handle or use your mobile device without your supervision, if you have intimate images, never capture identifying features/backgrounds- face, tattoos etc.) being careful to delete all intimate images (including Cloud back-ups) when sending phones for repair, trading-ins or disposing of them How to report and flag images | Remove excuses- general education on severe “privacy” and “trust” violations in relation to intimate partner violence and IBSA (e.g., “not knowing it is abuse” or “just for fun”) (Albury and Crawford 2012; Powell 2010; Salter and Crofts 2015) International legal harmonisation (e.g., the criminalising of IBSA and EU’s ‘The Right to Be Forgotten’) Intermediaries maintaining close ties with online platforms Law enforcement alerting public that there are convictions and incarcerations for IBSA |
5. Continuation | Domestic intermediaries’ and information service providers’ ability to take immediate action on takedown requests and combat IBSA | Support victim in maintaining a positive online presence | Remove excuses-widespread messages against intimate partner violence and family violence and offences through digital communications technologies IBSA is committed by those who have complete disregard for consent and online and offline privacy IBSA is a domestic (sexual) violence offence and a communications offence (Bloom 2014) Alerting the public to the potential criminal consequences of doxing (online disclosure of a victim’s personal details such as the victim’s full name, e-mail address, residential address, designation and place of employment or mobile number) multiplies risk to a victim’s personal and online safety (i.e., possible identity theft, in-the-flesh and online stalking and harassment) |
6. Interaction and crime completion | Online platforms to regularly prompt users to maximise use of security and privacy settings Have effective avenues for IBSA victims to report their victimisation and flag new intimate images that surface or resurface | Support victim with personal online safety strategies (e.g., disable settings for location and friends tagging you in photos and checking you into places, control visibility) Support victim with information on how to flag and report images | |
7. Post-action | Assist intermediaries and law enforcement with criminal investigations | Do not download, consume for personal pleasure or distribute intimate images of victim Do not inform anyone else where to find the images and the contents of the images If others have encountered and threaten to circulate the victim’s images, inform them that they might be interfering with police investigations and risk incriminating themselves in the process Support victim with creating a digital evidence folder (documenting dates for online disclosure and victim finding out, URLs, screen names and usernames, taking screenshots and downloading copies of images from website, reporting abuse to the online platforms and flagging abusive content) Supporting the victim with monitoring new content through Google reverse image searches for image file names, victim’s phone number, name or other words or usernames associated with victim’s images Supporting victim with setting up a Google Alert to notify victim of new content about victim that needs to be removed | Education regarding victim blaming, slut shaming by law enforcement and intermediaries: Sexting is a safety issue and not a moral issue (Slane 2013) |
8. Exit | Keep digital evidence intact Monitor repeat offending on same account or new accounts with similar image-based abusive patterns | Encourage victim not to delete personal social media account (doing so would make it harder to push negative content off top search pages of internet search engines) Assist victim with creating new positive content on highly indexed pages Establishing emotional support hotlines for victims Education for friends and family regarding victim support Encourage reporting Continue to support victim in maintaining a positive online presence |