UK: Twitter To Train Prosecutors To Fight Online Abuse

Twitter is to train prosecutors in England and Wales to better fight online abuse, as the Internet is increasingly used as a weapon by perpetrators of domestic abuse, rape and sexual violence against women.

The Crown Prosecution Service said the US-based social network would help it contend with criminal activity such as using the internet to post explicit images of former partners, an offence under the new revenge pornography laws, and the monitoring and stalking of victims using spyware and GPS.

Jenny Hopkins, chief crown prosecutor and the CPS lead on violence against women, told the Guardian that Twitter experts were being brought in to train prosecutors and update their skills and knowledge. “Social media is increasingly being used as a tool against women and I think it is really positive that Twitter is going to be training our lawyers in the months ahead,” Hopkins said.

Police and prosecutors are also seeing an increasing number of cases in which perpetrators use social media to facilitate crimes against women, including rape, blackmail, grooming, harassment and sexual violence.

Jason Lawrance, 50, faces a lengthy jail sentence recently after being found guilty at Derby crown court of raping five women that he had met on dating website Match.com. It is these kinds of cases that are worrying prosecutors.

The CPS is publishing new guidelines on prosecuting new and emerging social media crimes. For the first time, violence against women and girls has been highlighted as an area in which social media is being used by perpetrators. The guidelines are now out to public consultation for six weeks.

Alison Saunders, director of public prosecutions, said the use of multiple fake profiles by individuals on social media could, depending on the context, be a criminal offence. She added that new ways of targeting and abusing individuals online were constantly emerging and it was vital that prosecutors looked at the whole picture, both on and offline, when examining evidence.

“Worryingly, we have seen an increase in the use of cyber-enabled crime in cases related to violence against women and girls, including domestic abuse,” Saunders said. “Offenders can mistakenly think that, by using false online profiles and creating websites under a false name, their offences are untraceable. Thankfully, this is not the case and an online footprint will be left by the offender.”

According to a 2015 UN report, 18% of women in the EU have experienced a form of cyber-violence, a definition covering hacking, harassment, surveillance and revenge porn – since they were 15, which is equivalent to 32 million women.

Nick Pickles, Twitter’s head of UK public policy, said he hoped that by working with the CPS to give prosecutors an in-depth understanding of the social network and the rapid development of digital communication platforms, UK citizens would be better protected.

Twitter has long tried to curb sexist and other forms of abuse on its site. A year ago, its chief executive at the time, Dick Costolo, conceded that Twitter “sucks at dealing with abuse and trolls”, after an employee highlighted to him an article in the Guardian by columnist Lindy West about her experience with trolls on social media.

The new CPS guidelines highlight the changing landscape in which violence against women is being perpetrated. “Online activity is used to humiliate, control and threaten victims, as well as to plan and orchestrate acts of violence,” the document says.

Polly Neate, chief executive of Women’s Aid, said use of the Internet to enact domestic violence was frequently reported to the charity by victims. “These crimes may be perpetrated in the virtual world, but the fear and long-term damage they cause is all too real. A Women’s Aid survey last year found that for almost a third of women, threats made online … were then carried out,” she said.

Laura Higgins, founder of the Revenge Porn Helpline, said that in the year to February 2016, her organisation had received calls from 3,450 people of whom explicit images had been posted online. Seventy-nine per cent of the victims were women and 13 per cent of cases involved the type of blackmail sometimes known as “sextortion”.

In response to the conviction of Lawrance, a Match.com spokesman said the dating site had the “most heartfelt concern” for the victims, adding that “the safety of our members is our highest priority”.

Guardian: http://bit.ly/1TUKfI8

« Many Organisations Are Too Lax About Mobile Data Threats
Dark Territory: The Secret History of Cyber War »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) handles security incidents on forskningsnettet, the National Research and Education Network (NREN) in Denmark.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

MACH37

MACH37

MACH37 is a market-centric cybersecurity accelerator program designed to facilitate the creation of the next generation of cybersecurity product companies.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Trickest

Trickest

Trickest enables Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.