UK: Twitter To Train Prosecutors To Fight Online Abuse

Twitter is to train prosecutors in England and Wales to better fight online abuse, as the Internet is increasingly used as a weapon by perpetrators of domestic abuse, rape and sexual violence against women.

The Crown Prosecution Service said the US-based social network would help it contend with criminal activity such as using the internet to post explicit images of former partners, an offence under the new revenge pornography laws, and the monitoring and stalking of victims using spyware and GPS.

Jenny Hopkins, chief crown prosecutor and the CPS lead on violence against women, told the Guardian that Twitter experts were being brought in to train prosecutors and update their skills and knowledge. “Social media is increasingly being used as a tool against women and I think it is really positive that Twitter is going to be training our lawyers in the months ahead,” Hopkins said.

Police and prosecutors are also seeing an increasing number of cases in which perpetrators use social media to facilitate crimes against women, including rape, blackmail, grooming, harassment and sexual violence.

Jason Lawrance, 50, faces a lengthy jail sentence recently after being found guilty at Derby crown court of raping five women that he had met on dating website Match.com. It is these kinds of cases that are worrying prosecutors.

The CPS is publishing new guidelines on prosecuting new and emerging social media crimes. For the first time, violence against women and girls has been highlighted as an area in which social media is being used by perpetrators. The guidelines are now out to public consultation for six weeks.

Alison Saunders, director of public prosecutions, said the use of multiple fake profiles by individuals on social media could, depending on the context, be a criminal offence. She added that new ways of targeting and abusing individuals online were constantly emerging and it was vital that prosecutors looked at the whole picture, both on and offline, when examining evidence.

“Worryingly, we have seen an increase in the use of cyber-enabled crime in cases related to violence against women and girls, including domestic abuse,” Saunders said. “Offenders can mistakenly think that, by using false online profiles and creating websites under a false name, their offences are untraceable. Thankfully, this is not the case and an online footprint will be left by the offender.”

According to a 2015 UN report, 18% of women in the EU have experienced a form of cyber-violence, a definition covering hacking, harassment, surveillance and revenge porn – since they were 15, which is equivalent to 32 million women.

Nick Pickles, Twitter’s head of UK public policy, said he hoped that by working with the CPS to give prosecutors an in-depth understanding of the social network and the rapid development of digital communication platforms, UK citizens would be better protected.

Twitter has long tried to curb sexist and other forms of abuse on its site. A year ago, its chief executive at the time, Dick Costolo, conceded that Twitter “sucks at dealing with abuse and trolls”, after an employee highlighted to him an article in the Guardian by columnist Lindy West about her experience with trolls on social media.

The new CPS guidelines highlight the changing landscape in which violence against women is being perpetrated. “Online activity is used to humiliate, control and threaten victims, as well as to plan and orchestrate acts of violence,” the document says.

Polly Neate, chief executive of Women’s Aid, said use of the Internet to enact domestic violence was frequently reported to the charity by victims. “These crimes may be perpetrated in the virtual world, but the fear and long-term damage they cause is all too real. A Women’s Aid survey last year found that for almost a third of women, threats made online … were then carried out,” she said.

Laura Higgins, founder of the Revenge Porn Helpline, said that in the year to February 2016, her organisation had received calls from 3,450 people of whom explicit images had been posted online. Seventy-nine per cent of the victims were women and 13 per cent of cases involved the type of blackmail sometimes known as “sextortion”.

In response to the conviction of Lawrance, a Match.com spokesman said the dating site had the “most heartfelt concern” for the victims, adding that “the safety of our members is our highest priority”.

Guardian: http://bit.ly/1TUKfI8

« Many Organisations Are Too Lax About Mobile Data Threats
Dark Territory: The Secret History of Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

NSO Group

NSO Group

NSO Group develops technology that enables government intelligence and law enforcement agencies to prevent and investigate terrorism and crime.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

Chainkit

Chainkit

Chainkit detects adversarial anti-forensic tampering techniques that attackers use to evade detection and prolong dwell times inside a system.

Corsica Technologies

Corsica Technologies

Corsica Technologies is recognized as one of the top managed IT and cybersecurity service providers. Our integrated IT and cybersecurity services protect companies and enable them to succeed.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Kintek Group

Kintek Group

Kintek Group provides cybersecurity and managed services to protect organizations from threats that exist inside and outside their networks.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.