Revenge Porn and the Distribution of Sexually Explicit Images: What’s consent have to do with it?

In February, a New York court dismissed a case against a man who posted nude images of his ex-girlfriend online by sharing them on his twitter account and emailing them to her employer and family.  While his actions were reprehensible he faces no punishment because, unfortunately, legal limitations in New York, and many other states, do not currently make what he did criminal. But that is changing.

When sexually explicit images are uploaded online and distributed without consent of the person in the image, it’s often done as a tactic of abuse meant to cause humiliation and harm to the person. Many of these images may have been taken or originally shared with someone else under the expectation of privacy and within a trusting relationship. Some images may have been captured without the victim’s knowledge. In either case, it is an unacceptable violation of trust and privacy. This abuse has been coined “revenge porn,” a term that has been getting a lot of media lately.

Whether the victim willingly took or originally shared the image is irrelevant. Sharing a picture with one person does not mean consent was given for mass, public distribution of the image, and it definitely is not a green light for the person who received the picture to do what they please with it. We make many decisions that can have severe consequences if someone we trusted abused that trust. I can give my neighbors a key to my house and still have a personal and legal expectation that they will not steal from me when I’m not home. I can give a store employee my credit card and expect that will only use the information to finalize the purchase that I have requested. If they do, I am legally protected.

We must stop blaming the victim and start holding abusers accountable in these cases. The person who shared these images with the intent to harm, injure, humiliate, and abuse. By focusing on the victim’s actions and questioning why the victim shared the picture in the first place, as Mary Anne Franks, a law professor at the University of Miami said, "…what we're really saying is if you're sexual with one person, society is entitled to treat you as sexual for all purposes…”

Fortunately, the perception of this behavior is changing, as is the legal landscape around it. Due to the strength and determination of many survivors, states have begun drafting and enacting legislation to address this issue.

Read our new handout on Images, Consent, & Abuse for more detailed information on this issue and tips for survivors. Additional resources can also be found at withoutmyconsent.org. This issue has gained momentum and attention recently as people speak up and speak out. Learn more at the above links and share to continue the conversation. 

The Internet IS Real

Guest Blog by Soraya Chemaly, keynote speaker at the Technology Summit 2013. 

Photo Credit: Kaofeng Lee

Photo Credit: Kaofeng Lee

When people think of how the Internet is used to exacerbate violence against women, they often, with good cause, think of stalking. According to the CDC's National Intimate Partner and Sexual Violence Survey (NISVS), one in 6 women and one in 19 men are stalked during their lifetimes. Less conservative estimates that define stalking as a reflection of fear felt by targets makes those numbers 1 in 4 women and one in 13 men.  

For the majority of women who experience stalking, women between the ages of 18-24, one of the most common ways they experience it is electronically.  The most recent Bureau of Justice statistics reveal that 1 in 4 stalking victims report cyber stalking (for example, 83% get e-mails from their stalkers.)  Stalking is integrated seamlessly with cyber stalking, defined by Take Back the Tech as: “(repeatedly) sending threats or false accusations via email or mobile phone, making threatening or false posts on websites, stealing a person’s identity or data or spying and monitoring a person’s computer and internet use. Sometimes the threats can escalate into physical spaces.”

But the Internet allows for endless creativity. Email messages and explicit threats, while hugely harmful and fear inducing, are only one dimension of how abusers can use the online environment to extend their reach and influence. 

Recently, I was contacted by a woman whose abusive ex-husband was regularly posting illustrations of past physical assaults against her. To a random viewer, or a content moderator, these images might seem vaguely disturbing, or maybe offensive. When viewed in isolation, they gave the appearance of being benign. When asked to remove this content, the hosting platform declined since their processes had no way to account for context.  The images did not identify an individual by name, nor did they seem particularly graphically violent or threatening. But, to person who experienced the violence, the images were triggering, anxiety provoking and hostile.  She grew increasingly anxious every day, restricted her activities and repeatedly contacted the police, who could not nothing to help her. 

In another instance, a woman (who’d gotten a restraining order against an abusive spouse), found herself the subject of his daily online updates of her whereabouts, clothing and movement.  Attempts to have his content removed, or to have his online profile suspended yielded no results. Her anxiety drove her to stay in her house for days and sometimes weeks at a time. As no threat was explicitly made, no false posts created, no identity stolen, no electronic theft of data involved, neither the hosting company, nor law enforcement, both of whom she’d sought help from was able or willing to intercede on her behalf.  In a situation like this, the incidence of cyber-stalking is sufficient to be considered an aggravating circumstance, but not a cause for action in and of itself. Despite it’s real deleterious effects. 

Technology used in these ways can make it all but impossible for victims of domestic violence to isolate themselves from their abusers, while simultaneously leading their day to day lives.  More than 50% of stalking victims lose 5 or more days from work in any given year.  Victims often miss work, lose jobs, and cannot take advantage of promotions. National Institute of Justice studies found that victims who work, “experienced twice as many stalking tactics and were stalked three times longer than unemployed victims.” Typically, stalkers often compromise their target’s ability to work by harassing and lying to coworkers, vandalizing workplaces and other similar tactics designed to destabilize their targets. 

Prevailing ideas about what constitutes harm (it must be imminent) and what would justify a suppression of speech make this response fairly typical. Online threats, harassment and stalking, especially if part of a matrix of intimate partner violence, often result in loss of speech and physical freedom for their targets, but are often treated as jokes and dismissed as “not credible.”

Women who live public lives are often cyber-stalked, sometimes by cyber mobs making explicit, graphic and violent threats. Without fail they are belittled for expressing anxiety or for changing their behavior as the result of fear.  When student debater Rebecca Meredith became the target of a vicious and misogynistic online mob assault in which her rape potential was debated publicly, a writer made a point of mocking her publicly for making a “fuss about ‘misogyny.’” Many people grappling with cyber-harassment get this message from online companies and law enforcement officials. 

This type of online amplification of violence against women happens every day and the harm that victims suffer as a result is routinely ignored and trivialized. There is no appropriate recourse, or even frame of consideration, for understanding the impact of online abuse. We have retrofitted (already insufficient) off-line parameters, so that law enforcement, legal and judicial responses cannot adequately support victims. 

Part of the problem resides in the idea that our online identities and experiences aren’t “real.”  For women in particular, because so much of our identities and reputations are tied up in our bodies and perceptions of our sexuality, this division between "real world" and the virtual one is particularly remote. Nonetheless, it is enshrined in technology, in policies, in our legal frameworks and in our notions of safety, harm, self-defense and free speech.  

Challenging an online culture that rewards abusers and penalizes  victims requires that legal, judicial and technology norms be reviewed, challenged and rewritten in ways that take into account the pervasive threat that victims of stalking, cyber stalking, sexual assault and domestic violence live with.  Imminent harm is an insufficient and outdated criterion on which to base our ideas about safety and danger, threats and free speech. 

Soraya L. Chemaly is a writer and activist. To view more of her work, visit: 

Twitter @schemaly | HuffPost | RHRealityCheck | Ms.Blog | The Guardian | Fem2.0 | Alternet | FeministWire | Salon | Women Under Siege | Role/Reboot | Tumblr