UK: Twitter To Train Prosecutors To Fight Online Abuse

Twitter is to train prosecutors in England and Wales to better fight online abuse, as the Internet is increasingly used as a weapon by perpetrators of domestic abuse, rape and sexual violence against women.

The Crown Prosecution Service said the US-based social network would help it contend with criminal activity such as using the internet to post explicit images of former partners, an offence under the new revenge pornography laws, and the monitoring and stalking of victims using spyware and GPS.

Jenny Hopkins, chief crown prosecutor and the CPS lead on violence against women, told the Guardian that Twitter experts were being brought in to train prosecutors and update their skills and knowledge. “Social media is increasingly being used as a tool against women and I think it is really positive that Twitter is going to be training our lawyers in the months ahead,” Hopkins said.

Police and prosecutors are also seeing an increasing number of cases in which perpetrators use social media to facilitate crimes against women, including rape, blackmail, grooming, harassment and sexual violence.

Jason Lawrance, 50, faces a lengthy jail sentence recently after being found guilty at Derby crown court of raping five women that he had met on dating website Match.com. It is these kinds of cases that are worrying prosecutors.

The CPS is publishing new guidelines on prosecuting new and emerging social media crimes. For the first time, violence against women and girls has been highlighted as an area in which social media is being used by perpetrators. The guidelines are now out to public consultation for six weeks.

Alison Saunders, director of public prosecutions, said the use of multiple fake profiles by individuals on social media could, depending on the context, be a criminal offence. She added that new ways of targeting and abusing individuals online were constantly emerging and it was vital that prosecutors looked at the whole picture, both on and offline, when examining evidence.

“Worryingly, we have seen an increase in the use of cyber-enabled crime in cases related to violence against women and girls, including domestic abuse,” Saunders said. “Offenders can mistakenly think that, by using false online profiles and creating websites under a false name, their offences are untraceable. Thankfully, this is not the case and an online footprint will be left by the offender.”

According to a 2015 UN report, 18% of women in the EU have experienced a form of cyber-violence, a definition covering hacking, harassment, surveillance and revenge porn – since they were 15, which is equivalent to 32 million women.

Nick Pickles, Twitter’s head of UK public policy, said he hoped that by working with the CPS to give prosecutors an in-depth understanding of the social network and the rapid development of digital communication platforms, UK citizens would be better protected.

Twitter has long tried to curb sexist and other forms of abuse on its site. A year ago, its chief executive at the time, Dick Costolo, conceded that Twitter “sucks at dealing with abuse and trolls”, after an employee highlighted to him an article in the Guardian by columnist Lindy West about her experience with trolls on social media.

The new CPS guidelines highlight the changing landscape in which violence against women is being perpetrated. “Online activity is used to humiliate, control and threaten victims, as well as to plan and orchestrate acts of violence,” the document says.

Polly Neate, chief executive of Women’s Aid, said use of the Internet to enact domestic violence was frequently reported to the charity by victims. “These crimes may be perpetrated in the virtual world, but the fear and long-term damage they cause is all too real. A Women’s Aid survey last year found that for almost a third of women, threats made online … were then carried out,” she said.

Laura Higgins, founder of the Revenge Porn Helpline, said that in the year to February 2016, her organisation had received calls from 3,450 people of whom explicit images had been posted online. Seventy-nine per cent of the victims were women and 13 per cent of cases involved the type of blackmail sometimes known as “sextortion”.

In response to the conviction of Lawrance, a Match.com spokesman said the dating site had the “most heartfelt concern” for the victims, adding that “the safety of our members is our highest priority”.

Guardian: http://bit.ly/1TUKfI8

« Many Organisations Are Too Lax About Mobile Data Threats
Dark Territory: The Secret History of Cyber War »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

SafeCipher

SafeCipher

At SafeCipher, we pride ourselves on being your single vendor-neutral resource for navigating the complexities of cryptographic data encryption.

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

Crowe

Crowe

Crowe is a public accounting, consulting, and technology firm that combines deep industry and specialized expertise with innovation.

BlastWave

BlastWave

BlastWave deliver Operational Technology Cybersecurity solutions that minimize the available attack surface and protect against the rising tide of AI-powered cyber attacks.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

Flare Systems

Flare Systems

Flare proactively detects and remediates exposure across the clear & dark web, providing organizations with the equivalent of an automated cyber reconnaissance team.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

Mirazon

Mirazon

Mirazon was formed to provide networking infrastructure assistance to businesses large or small. We provide Managed IT Services, Cybersecurity, and IT Consulting.