Technology-Facilitated Abuse
Technology-facilitated abuse is the use of technology, the Internet, and online platforms (e.g., social media) to bully, harass, stalk, intimidate, or control a partner. This behavior is often a form of verbal or emotional abuse conducted online and is often used to maintain power and control over another.
What are the types of technology-facilitated abuse?
Image-Based Sexual Abuse (IBSA)
Image-based sexual abuse refers to a variety of image-based exploitative practices. It includes non-consensual creation and/or distribution of private, sexual images, or threats to distribute those images. This can happen regardless of whether those images were originally acquired with consent. This was previously referred to as “nonconsensual pornography” or “revenge porn.”
- Examples of IBSA include:
-
- Pressuring someone to take or send sexually explicit or intimate photos and videos
- Posting someone’s intimate images on social media without their consent
- Threatening to send someone’s intimate images to others without their consent
- Creating “deepfake” pornographic images using someone’s face or real images without their consent
- Posting images of sexual abuse
Sextortion
Sextortion is another type of technology-facilitated abuse. It occurs when an abusive partner has threatened to distribute intimate images of the victim without their consent in exchange for the victim meeting certain demands. Sextortion cases generally fall into two categories:
(1) Traditional sextortion, where the demand is more intimate images from the victim.
(2) Financial sextortion, where the demand is payment of some kind.
- Examples of sextortion include:
-
- Stealing a victim’s intimate images from their accounts or devices
- Offering something material, like shelter or drugs, in exchange for explicit images
- Secretly recording intimate or explicit content during video chats
Intimate Partner Surveillance (IPS)
The deliberate surveillance of an intimate partner with or without their knowledge is another type of technology-facilitated abuse. It includes using technology such as apps, spyware, or in-home technologies to monitor the victim’s movements or actions.
- Examples of IPS include:
-
- Using apps to track location or monitor social media
- Using smart devices in the home that have monitoring features
- Accessing public information like property records or paying for background checks online
- Downloading spyware to your partner’s phone that allows you to track their communications
- Hiding GPS trackers in the survivor’s car, clothing, or bags to monitor their location without their knowledge
Online Harassment and Abuse
Online harassment and abuse are just as serious as abuse happening “in real life.” It also happens more than people realize. A 2022 survey by The Hotline found that 100% of respondents reported experiencing at least one type of online harassment or abuse.
- Examples of online harassment and abuse include:
-
- Sending you negative, insulting, or threatening messages or emails
- Insulting or humiliating you in their posts online
- Constantly texting you or making you feel like you can’t be separated from your phone for fear that you’ll anger them
- Creating fake social media profiles in your name, or using your phone or email to send messages to others pretending to be you, as a way to embarrass or isolate you
Internet of Things Abuse
The Internet of Things refers to the everyday items we use that are connected or controlled through the Internet, Bluetooth, or other means. These items include:
- Smart appliances such as speakers, home assistants (like Alexa or Google Home), TVs, etc.
- Smart home systems like doorbells, thermostats, lights, security cameras, etc.
- Wearable items like health trackers, medical devices, sleep trackers, watches, etc.
Internet of Things abuse occurs when abusive partners use the Internet of Things to engage in surveillance and abuse of a victim. This type of technology-facilitated abuse typically happens inside the home.
- Examples of Internet of Things abuse include:
-
- Changing the code to the digital lock on the front door, and the victim doesn’t know how or why
- Playing loud music from the smart speaker and the survivor cannot turn it off
- A victim is looked into certain rooms when their abusive partner uses an app to control digital door locks
Help is available.
It can be hard to know if you are experiencing technology-facilitated abuse. Even when you recognize the abuse for what it is, it is challenging to know what to do about it. Our advocates are available 24/7 to explain what technology-facilitated abuse is and help you create a safety plan. You are not alone.