UK: Twitter To Train Prosecutors To Fight Online Abuse

Twitter is to train prosecutors in England and Wales to better fight online abuse, as the Internet is increasingly used as a weapon by perpetrators of domestic abuse, rape and sexual violence against women.

The Crown Prosecution Service said the US-based social network would help it contend with criminal activity such as using the internet to post explicit images of former partners, an offence under the new revenge pornography laws, and the monitoring and stalking of victims using spyware and GPS.

Jenny Hopkins, chief crown prosecutor and the CPS lead on violence against women, told the Guardian that Twitter experts were being brought in to train prosecutors and update their skills and knowledge. “Social media is increasingly being used as a tool against women and I think it is really positive that Twitter is going to be training our lawyers in the months ahead,” Hopkins said.

Police and prosecutors are also seeing an increasing number of cases in which perpetrators use social media to facilitate crimes against women, including rape, blackmail, grooming, harassment and sexual violence.

Jason Lawrance, 50, faces a lengthy jail sentence recently after being found guilty at Derby crown court of raping five women that he had met on dating website Match.com. It is these kinds of cases that are worrying prosecutors.

The CPS is publishing new guidelines on prosecuting new and emerging social media crimes. For the first time, violence against women and girls has been highlighted as an area in which social media is being used by perpetrators. The guidelines are now out to public consultation for six weeks.

Alison Saunders, director of public prosecutions, said the use of multiple fake profiles by individuals on social media could, depending on the context, be a criminal offence. She added that new ways of targeting and abusing individuals online were constantly emerging and it was vital that prosecutors looked at the whole picture, both on and offline, when examining evidence.

“Worryingly, we have seen an increase in the use of cyber-enabled crime in cases related to violence against women and girls, including domestic abuse,” Saunders said. “Offenders can mistakenly think that, by using false online profiles and creating websites under a false name, their offences are untraceable. Thankfully, this is not the case and an online footprint will be left by the offender.”

According to a 2015 UN report, 18% of women in the EU have experienced a form of cyber-violence, a definition covering hacking, harassment, surveillance and revenge porn – since they were 15, which is equivalent to 32 million women.

Nick Pickles, Twitter’s head of UK public policy, said he hoped that by working with the CPS to give prosecutors an in-depth understanding of the social network and the rapid development of digital communication platforms, UK citizens would be better protected.

Twitter has long tried to curb sexist and other forms of abuse on its site. A year ago, its chief executive at the time, Dick Costolo, conceded that Twitter “sucks at dealing with abuse and trolls”, after an employee highlighted to him an article in the Guardian by columnist Lindy West about her experience with trolls on social media.

The new CPS guidelines highlight the changing landscape in which violence against women is being perpetrated. “Online activity is used to humiliate, control and threaten victims, as well as to plan and orchestrate acts of violence,” the document says.

Polly Neate, chief executive of Women’s Aid, said use of the Internet to enact domestic violence was frequently reported to the charity by victims. “These crimes may be perpetrated in the virtual world, but the fear and long-term damage they cause is all too real. A Women’s Aid survey last year found that for almost a third of women, threats made online … were then carried out,” she said.

Laura Higgins, founder of the Revenge Porn Helpline, said that in the year to February 2016, her organisation had received calls from 3,450 people of whom explicit images had been posted online. Seventy-nine per cent of the victims were women and 13 per cent of cases involved the type of blackmail sometimes known as “sextortion”.

In response to the conviction of Lawrance, a Match.com spokesman said the dating site had the “most heartfelt concern” for the victims, adding that “the safety of our members is our highest priority”.

Guardian: http://bit.ly/1TUKfI8

« Many Organisations Are Too Lax About Mobile Data Threats
Dark Territory: The Secret History of Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

SynerLeap

SynerLeap

SynerLeap is ABB's innovation growth hub. Our aim is to help startups accelerate and expand across industries, ranging from industrial automation and robotics to grid technologies and smart cities.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

DTS Systeme

DTS Systeme

DTS Systeme is an IT service provider with a focus on the core areas of datacenter, technologies and IT security.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.