TECHNOLOGY & SEXUAL VIOLENCE
Shalina Lodhia - Counsellor, Criminologist, CV Writer
Counsellor: Domestic & Family Violence, Intergenerational Trauma, Fatherlessness, Sexual Assault, & Abortion Grief. Expert in Resume, Cover Letter & Selection Criteria Writing, Interview Prep & Career Development.
An article I wrote for a community page on Facebook for Indian women living in Australia who, like a lot of women across the world, have been subjected to sexual violence online and through various technological means. I have kept this article as simple as possible to convey my very important message to everyone reading. Share this with anyone you feel may benefit from it.
It is quite evident that technology and the use of technological devices, particularly mobile phones, laptops, tablets and music devices has evolved rapidly within the last 20 years. All of these devices have a camera which takes pictures, videos or music video clips – these can even be used in court if there is evidence on these devices. The evolution has come with great opportunities for individuals and businesses, but it has also come with devastating implications – which will be discussed in this article.
Sexual violence takes many forms – intimate partner sexual violence, child abuse, rape, stalking, harassment, threats or coercion. Sexual violence can also be promulgated technologically. The role that technology plays in acts of sexual violence is multifaceted - there are many ways technology can be used to instigate it and carry it out.
There are various ways technological devices can be obtained – legally or illegally through friends, family, the black market or even by stealing. Once the device as been obtained, the predator will then find ways to lure and exploit his or her target (a stranger, friend or family member) – there are a few ways this can be done.
The most common is through social media platforms such as Facebook or Instagram. The perpetrator pretends to be a different person to gain the trust of their victim/s. Once the trust has been gained and an online relationship has been formed via direct messaging where phone numbers may be exchanged and the nature of the conversation ends up explicit, personal or both depending upon how both parties conversate.
Even if phone numbers have not been exchanged, it is possible to continue on in an explicit conversation via social media. The predator now has an advantage over their victim and asks them for explicit photos - they could simply ask for a picture or video, or they may threaten to harm them or their family if they ask for one and the instructions have not been complied with. In the event that a photo has been sent willingly or unwillingly, the predator may request for more and if the request has not been met, the predator will threaten to upload the image they have online, to revenge porn websites or threaten to email or share it via social media to the victims friends or family. On the contrary, some online predators often offer gifts such as money in exchange for explicit material of the victim or their child.
** It is important to note that even if the victim has willingly agreed to send a sexually explicit photo or video after trusting the predator – it is still ILLEGAL as the person is not who they claim to be and should be reported to police immediately.
Online sexual violence is when the predator (known or not known to the victim and/or their family) secretly records, or takes pictures, or both, without the victim’s knowledge and distributes (or threatens to distribute) these illegal materials.
** It is important to note that security officers and authorities in various workplaces also have the power to misuse technology as they monitor surveillance cameras and have the capacity to take photos or videos of victims.
Alternatively, if two parties (friends or romantic partners) have consented to recording or taking pictures, after the friendship or relationship has dissolved, one party may expose or threaten to expose these photos/videos as form of revenge by uploading these to social media or sending to family members or friends.
While it may be tempting too, or it may just "happen" during a conversation, sharing personal information such as date of birth, where you live, what school you go to, where you work, names of friends, colleagues or family members is never ever a good idea. Use due diligence. Time and time again, innocent people have been targeted, lives have been lost, dignity has been taken away, material has been distributed due to the vile nature of these types of people.