In Britain 'Cyberflashing’ Is Now A Crime

‘Cyberflashing’ will become a new criminal offence with perpetrators facing up to two years behind bars under new laws to be introduced by the UK Government. The practice typically involves offenders sending an unsolicited sexual image to people via social media or dating apps, but can also be over data sharing services such as Bluetooth and Airdrop.

In some instances, a preview of the photo can appear on a person’s device, meaning that even if the transfer is rejected victims are forced into seeing the image.

Research by Professor Jessica Ringrose from 2020 found that 76 percent of girls aged 12-18 had been sent unsolicited nude images of boys or men. Ministers have recently confirmed that laws banning this behaviour will be included in the Government’s landmark Online Safety Bill alongside wide-ranging reforms to keep people safe on the Internet.

The new offence will ensure cyberflashing is captured clearly by the criminal law, giving the police and Crown Prosecution Service greater ability to bring more perpetrators to justice. It follows similar recent action to criminalise upskirting and breastfeeding voyeurism with the Government determined to protect people, particularly women and girls, from these emerging crimes.

Deputy Prime Minister, Lord Chancellor and Secretary of State for Justice, Dominic Raab said: “Protecting women and girls is my top priority which is why we’re keeping sexual and violent offenders behind bars for longer, giving domestic abuse victims more time to report assaults and boosting funding for support services to £185m per year.”

“Making cyberflashing a specific crime is the latest step, sending a clear message to perpetrators that they will face jail time.”

The change means that anyone who sends a photo or film of a person’s genitals, for the purpose of their own sexual gratification or to cause the victim humiliation, alarm or distress may face up to two years in prison. It follows a Law Commission review ‘Modernising Communications Offences’ which recommended that a new offence should be created.

“Tech has the power to bring people together and make our lives better, but it can also enable heinous behaviour from those who wish to abuse, harm and harass... “The forthcoming Online Safety Bill will force tech companies to stop their platforms being used to commit vile acts of cyberflashing. We are bringing the full weight on individuals who perpetrate this awful behaviour.”said the Digital Secretary, Nadine Dorries.

Mobile messaging platforms and Bluetooth communications have increased the scope for abuse and harm like cyberflashing and the creation of the new  offence enable Police to treat cyberflashing as seriously as in-person flashing.

This announcement builds on the Online Safety Bill  by making sure criminal law is fit for the Internet age and better protects victims from harmful communications online. This legislations will tackle a wide range of harmful private and public online communication, including sending abusive emails, social media posts and WhatsApp messages, as well as ‘pile-on’ harassment where many people target abuse at an individual such as in website comment sections.

The Online Safety Bill will also put more legal responsibility on social media platforms, search engines and other websites or apps which host user-generated content to tackle a range of illegal and harmful content on their services.

Gov.UK         TES:      University of Birmingham:     Bristol University Press

You Might Also Read: 

Britain Aims To Protect Children From Online Pornography:

 

« The App At The Frontline Of Information Warfare
The Lessons Learned From Log4j »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Black Duck Software

Black Duck Software

Black Duck Hub allows organizations to manage open source code security as well as license compliance risks.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Fingent

Fingent

Fingent develops strategic software solutions for businesses across the globe in areas including Network Security, Infrastructure Security, Application Security, Risk and Compliance.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

Systal Technology Solutions

Systal Technology Solutions

Systal is a global managed network and security service and transformation specialist. We help enterprise-level businesses maximise the security and business value of their complex IT infrastructure.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

Synergy ECP

Synergy ECP

Synergy ECP has a talented, dedicated staff to provide a broad range of services to the defense and intelligence industries.

InQuest

InQuest

InQuest specialize in providing comprehensive network-based security solutions that empower organizations to protect their most critical assets: their people.