In Britain 'Cyberflashing’ Is Now A Crime

‘Cyberflashing’ will become a new criminal offence with perpetrators facing up to two years behind bars under new laws to be introduced by the UK Government. The practice typically involves offenders sending an unsolicited sexual image to people via social media or dating apps, but can also be over data sharing services such as Bluetooth and Airdrop.

In some instances, a preview of the photo can appear on a person’s device, meaning that even if the transfer is rejected victims are forced into seeing the image.

Research by Professor Jessica Ringrose from 2020 found that 76 percent of girls aged 12-18 had been sent unsolicited nude images of boys or men. Ministers have recently confirmed that laws banning this behaviour will be included in the Government’s landmark Online Safety Bill alongside wide-ranging reforms to keep people safe on the Internet.

The new offence will ensure cyberflashing is captured clearly by the criminal law, giving the police and Crown Prosecution Service greater ability to bring more perpetrators to justice. It follows similar recent action to criminalise upskirting and breastfeeding voyeurism with the Government determined to protect people, particularly women and girls, from these emerging crimes.

Deputy Prime Minister, Lord Chancellor and Secretary of State for Justice, Dominic Raab said: “Protecting women and girls is my top priority which is why we’re keeping sexual and violent offenders behind bars for longer, giving domestic abuse victims more time to report assaults and boosting funding for support services to £185m per year.”

“Making cyberflashing a specific crime is the latest step, sending a clear message to perpetrators that they will face jail time.”

The change means that anyone who sends a photo or film of a person’s genitals, for the purpose of their own sexual gratification or to cause the victim humiliation, alarm or distress may face up to two years in prison. It follows a Law Commission review ‘Modernising Communications Offences’ which recommended that a new offence should be created.

“Tech has the power to bring people together and make our lives better, but it can also enable heinous behaviour from those who wish to abuse, harm and harass... “The forthcoming Online Safety Bill will force tech companies to stop their platforms being used to commit vile acts of cyberflashing. We are bringing the full weight on individuals who perpetrate this awful behaviour.”said the Digital Secretary, Nadine Dorries.

Mobile messaging platforms and Bluetooth communications have increased the scope for abuse and harm like cyberflashing and the creation of the new  offence enable Police to treat cyberflashing as seriously as in-person flashing.

This announcement builds on the Online Safety Bill  by making sure criminal law is fit for the Internet age and better protects victims from harmful communications online. This legislations will tackle a wide range of harmful private and public online communication, including sending abusive emails, social media posts and WhatsApp messages, as well as ‘pile-on’ harassment where many people target abuse at an individual such as in website comment sections.

The Online Safety Bill will also put more legal responsibility on social media platforms, search engines and other websites or apps which host user-generated content to tackle a range of illegal and harmful content on their services.

Gov.UK         TES:      University of Birmingham:     Bristol University Press

You Might Also Read: 

Britain Aims To Protect Children From Online Pornography:

 

« The App At The Frontline Of Information Warfare
The Lessons Learned From Log4j »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

Lanner Electronics

Lanner Electronics

Lanner Electronics is a leading hardware provider for advanced network appliances and industrial automation solutions including cyber security.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

PartnerRe

PartnerRe

PartnerRe provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

BuddoBot

BuddoBot

BuddoBot has been a pioneering force in cybersecurity and information technology since 2008.

Exaforce

Exaforce

At Exaforce, we are on a mission to 10× improve the productivity and efficacy of security and operations teams using our transformative multi-model AI engine.

Greenway Solutions

Greenway Solutions

Greenway Solutions are trusted advisors relied upon by our clients to combat sophisticated adversaries in the fraud and security domain.