Types of cyberviolenceIn practice, acts of cyberviolence may involve different types of harassment, violation of privacy, sexual abuse and sexual exploitation and bias offences against social groups or communities.

Cyberviolence may also involve direct threats or physical violence as well as different forms of cybercrime.
There is not yet a stable lexicon or typology of offences considered to be cyberviolence, and many of the examples of types of cyberviolence are interconnected or overlapping or consist of a combination of acts.

Not all of forms or instances of cyberviolence are equally severe and not all of them necessarily require a criminal law solution but may be addressed by a graded approach and a combination of preventive, educational, protective and other measures.
 

Cyberharassment

Cyberharassment is perhaps the broadest form of cyberviolence and involves a persistent and repeated course of conduct targeted at a specific person that is designed to and that causes severe emotional distress and often the fear of physical harm.

Cyberharassment is often accomplished by a “storm of abuse”. Harassers terrorize victims by threatening violence. Offenders post defamatory falsehoods to cause the victim embarrassment or worse among friends, family or co-workers. Offenders impersonate victims in online ads, and suggest – falsely – that their victims are interested in sex with strangers. Sometimes, harassers manipulate search engines to ensure the prominence of the lies in searches of victims’ names. Harassers invade victims’ privacy by posting their sensitive information, such as nude images or national identity numbers. Or harassers may use technology to knock people offline. Cyberharassment in popular discourse may be described as or related to “revenge porn” or “sextortion.”

Cyberharassment is often targeted at women and girls and termed “cyber violence against women and girls” (CVAWG or Cyber VAWG) involving:

  • Unwanted sexually explicit emails or other messages;
  • Offensive advances in social media and other platforms;
  • Threat of physical or sexual violence;
  • Hate speech meaning language that denigrates, insults, threatens or targets an individual based on her identity (gender) and/or other traits (such as sexual orientation or disability).

Cyberharrassment thus involves a range of conduct, including for example “cyberbullying” and “revenge porn”.

Back to top

ICT-related violations of privacy

Many forms of cyberviolence represent or are related to a violation of victims’ privacy. This may include computer intrusions to obtain, steal, reveal or manipulate intimate data, the researching and broadcasting of personal data (“doxing”), or acts such as “cyberstalking” or “sextortion/revenge porn”.

Back to top

Cybercrime

Considering the definition proposed above, some forms of cybercrime may also be considered acts of cyberviolence, such as illegal access to intimate personal data, the destruction of data, blocking access to a computer system or data, etc. This is for example captured in 18 United States Code Section 1030(a)(7) on “extortion involving computers”.

Denial of service attacks may lead to physical harm of individuals – for example, if fire emergency telephone lines are unable to accept calls or if traffic control systems or hospital services are disabled.

Back to top

ICT-related direct threats or actual violence

Cyberviolence also comprises direct threats of violence or direct physical violence. Computer systems may be used in connection to murder, kidnapping, rape and other acts of sexual violence, or extortion.

Forms of direct violence include interference with medical devices causing injuries or death, or attacks against critical infrastructure by means of computers. “Swatting” is another example.

Back to top

Online sexual exploitation and sexual abuse of children

Children seem to represent a primary group of victims of cyberviolence, in particular with respect to online sexual violence.

While the “online sexual exploitation and sexual abuse of children" are not necessarily new and distinct forms of sexual exploitation and sexual abuse of children, ICTs have increased the accessibility to children by persons looking to sexually abuse and exploit them. ICTs facilitate the sharing of images and videos of the sexual abuse and thus reinforce the long-lasting harmful impact of the abuse of children. ICTs also contribute to making commercial gains from sexual exploitation of children easier. ICTs however do not, in and by themselves, give rise to distinct types of sexual offences against children.

Online sexual exploitation and sexual abuse of children includes the behaviour listed in articles 18 to 23 of the Lanzarote Convention and in article 9 of the Budapest Convention in an online environment or otherwise involving computer systems:

  • Sexual abuse (article 18), that is, “a) engaging in sexual activities with a child who, according to the relevant provisions of national law, has not reached the legal age for sexual activities; or b) engaging in sexual activities with a child where:
    • use is made of coercion, force or threats; or
    • abuse is made of a recognised position of trust, authority or influence over the child, including within the family; or
    • abuse is made of a particularly vulnerable situation of the child, notably because of a mental or physical disability or a situation of dependence.“
  • Child prostitution (article 19), that is, “a) recruiting a child into prostitution or causing a child to participate in prostitution; b) coercing a child into prostitution or profiting from or otherwise exploiting a child for such purposes; or c) having recourse to child prostitution.”
  • Child pornography (article 20), that is, “a) producing child pornography; b) offering or making available child pornography; c) distributing or transmitting child pornography; d) procuring child pornography for oneself or for another person; e) possessing child pornography; f) knowingly obtaining access, through information and communication technologies, to child pornography”. “Child pornography” shall mean any material that visually depicts a child engaged in real or simulated sexually explicit conduct or any depiction of a child’s sexual organs for primarily sexual purposes.
  • Corruption of children (article 22), that is, “the intentional causing, for sexual purposes, of a child who has not reached the age [below which it is prohibited to engage in sexual activities with a child] to witness sexual abuse or sexual activities, even without having to participate”. 
  • Solicitation of children for sexual purposes (article 23) – also called “grooming” – that is, “the intentional proposal, through information and communication technologies, of an adult to meet a child who has not reached the age set [below which it is prohibited to engage in sexual activities with a child] for the purpose of committing any of the offences established in accordance with article 18, paragraph 1.a [engaging in sexual activity with a child], or article 20, paragraph 1.a [producing child pornography], against him or her, where this proposal has been followed by material acts leading to such a meeting”.

Online sexual exploitation and sexual abuse are major forms of cyberviolence targeting children. It should be kept in mind, however, that children are also victims of other types of cyberviolence.

Back to top

ICT-related hate crime

Cyberviolence may be motivated by “a bias against the perceived personal characteristic of the victim or a perceived group membership of the victim. These groups or characteristics include but are not limited to race, ethnicity, religion, sexual orientation or disability.”

It includes conduct that can be criminalised under the Budapest Convention’s Additional Protocol on Xenophobia and Racism (ETS 189).

Hate crime has serious consequences for individuals and societies and may lead to communal violence and the destabilisation of entire societies.

The Group concluded, however, that a full mapping of the issue of hate crime would not be feasible within the mandate and timeframe given by the T-CY.

Back to top