UK: Twitter To Train Prosecutors To Fight Online Abuse

Twitter is to train prosecutors in England and Wales to better fight online abuse, as the Internet is increasingly used as a weapon by perpetrators of domestic abuse, rape and sexual violence against women.

The Crown Prosecution Service said the US-based social network would help it contend with criminal activity such as using the internet to post explicit images of former partners, an offence under the new revenge pornography laws, and the monitoring and stalking of victims using spyware and GPS.

Jenny Hopkins, chief crown prosecutor and the CPS lead on violence against women, told the Guardian that Twitter experts were being brought in to train prosecutors and update their skills and knowledge. “Social media is increasingly being used as a tool against women and I think it is really positive that Twitter is going to be training our lawyers in the months ahead,” Hopkins said.

Police and prosecutors are also seeing an increasing number of cases in which perpetrators use social media to facilitate crimes against women, including rape, blackmail, grooming, harassment and sexual violence.

Jason Lawrance, 50, faces a lengthy jail sentence recently after being found guilty at Derby crown court of raping five women that he had met on dating website Match.com. It is these kinds of cases that are worrying prosecutors.

The CPS is publishing new guidelines on prosecuting new and emerging social media crimes. For the first time, violence against women and girls has been highlighted as an area in which social media is being used by perpetrators. The guidelines are now out to public consultation for six weeks.

Alison Saunders, director of public prosecutions, said the use of multiple fake profiles by individuals on social media could, depending on the context, be a criminal offence. She added that new ways of targeting and abusing individuals online were constantly emerging and it was vital that prosecutors looked at the whole picture, both on and offline, when examining evidence.

“Worryingly, we have seen an increase in the use of cyber-enabled crime in cases related to violence against women and girls, including domestic abuse,” Saunders said. “Offenders can mistakenly think that, by using false online profiles and creating websites under a false name, their offences are untraceable. Thankfully, this is not the case and an online footprint will be left by the offender.”

According to a 2015 UN report, 18% of women in the EU have experienced a form of cyber-violence, a definition covering hacking, harassment, surveillance and revenge porn – since they were 15, which is equivalent to 32 million women.

Nick Pickles, Twitter’s head of UK public policy, said he hoped that by working with the CPS to give prosecutors an in-depth understanding of the social network and the rapid development of digital communication platforms, UK citizens would be better protected.

Twitter has long tried to curb sexist and other forms of abuse on its site. A year ago, its chief executive at the time, Dick Costolo, conceded that Twitter “sucks at dealing with abuse and trolls”, after an employee highlighted to him an article in the Guardian by columnist Lindy West about her experience with trolls on social media.

The new CPS guidelines highlight the changing landscape in which violence against women is being perpetrated. “Online activity is used to humiliate, control and threaten victims, as well as to plan and orchestrate acts of violence,” the document says.

Polly Neate, chief executive of Women’s Aid, said use of the Internet to enact domestic violence was frequently reported to the charity by victims. “These crimes may be perpetrated in the virtual world, but the fear and long-term damage they cause is all too real. A Women’s Aid survey last year found that for almost a third of women, threats made online … were then carried out,” she said.

Laura Higgins, founder of the Revenge Porn Helpline, said that in the year to February 2016, her organisation had received calls from 3,450 people of whom explicit images had been posted online. Seventy-nine per cent of the victims were women and 13 per cent of cases involved the type of blackmail sometimes known as “sextortion”.

In response to the conviction of Lawrance, a Match.com spokesman said the dating site had the “most heartfelt concern” for the victims, adding that “the safety of our members is our highest priority”.

Guardian: http://bit.ly/1TUKfI8

« Many Organisations Are Too Lax About Mobile Data Threats
Dark Territory: The Secret History of Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Guardsquare

Guardsquare

GuardSquare is the global reference in mobile application protection. We develop premium software for the protection of mobile applications against reverse engineering and hacking.

InsightCyber

InsightCyber

InsightCyber is on a mission to keep the world’s critical infrastructure, supply chains, and manufacturing operations cyber-safe, helping to prevent attacks that can have catastrophic impacts.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Cirosec

Cirosec

Cirosec is a specialized company with a focus on information security. We carry out pentests & audits and advise our customers in the German-speaking countries on information and IT security issues.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.