Tech Abuse
Tech Abuse
Tech Abuse
1. Research about the case of Justine Sacco. Write a 300 word summary of the incident
and what you think about the case.
Justine Sacco was a former PR executive who caused a major controversy in 2013 due
to a tweet she posted before boarding a flight from London to South Africa. The tweet
read "Going to Africa. Hope I don't get AIDS. Just kidding. I'm white!" The tweet
sparked widespread outrage and resulted in Sacco losing her job and facing intense
public criticism.
The incident highlights the power and potential consequences of social media and the
importance of being mindful of one's words and actions online. Sacco's tweet was
insensitive, offensive, and perpetuated harmful stereotypes about African people and
the AIDS epidemic. The widespread backlash and public shaming she faced
demonstrate the swift and severe consequences that can result from a single,
thoughtless message posted online.
In my opinion, the incident serves as a cautionary tale about the dangers of online
communication and the need for individuals to exercise caution and empathy when
using social media. It is essential to consider the potential consequences of our words
and actions online, as they have the power to reach a large audience and cause
significant harm. In this case, Sacco's tweet was hurtful and perpetuated harmful
stereotypes, and it is understandable that people would be upset and call for
accountability.
However, the intensity of the public shaming and criticism she faced raises questions
about online justice and the role of social media in shaping public opinion. While it is
important to hold individuals accountable for their actions and words, it is also crucial
to consider the impact of online mobs and public shaming on individuals and the
potential for these actions to perpetuate further harm.
In conclusion, the case of Justine Sacco highlights the importance of being mindful of
our words and actions online and the potential consequences of our actions in the
digital world. It also raises important questions about online justice and the role of
social media in shaping public opinion.
2. What are the various ways in which the abuser can keep a track of person online? List
all the possible ways.
There are several ways in which the government or any other organization can keep track of a
person online:
There are many ways an abuser can misuse technology to harass you. Below, we define some
of these abusive behaviors and describe the criminal laws that might address them. You may
also be eligible for a restraining order in your state if you are a victim of harassment. See
the Restraining Orders page in your state to learn more.
HARASSMENT
Harassment is when someone contacts you or does something to you that makes you feel
annoyed or frightened. Some states require that the abuser contact you repeatedly, but some
laws cover one harassing incident. Also, some states address harassing behavior in their
stalking laws, but other states may also have a separate harassment law. See How does
online harassment differ from online stalking (cyberstalking)? to learn how online
harassment differs from online stalking. To read the specific language of laws that apply to
harassment in your state, go to our Crimes page. Note: Not every state has a crime called
“harassment,” but on WomensLaw.org we list similar crimes found in each state.
THREATS
A threat is when someone has communicated (through words or images) that they plan to
cause you or someone else harm, or that they plan to commit a crime against you or someone
else. Some examples include threats to kill, physically or sexually assault, or kidnap you or
your child. Threats can also include threatening to commit suicide. Many states’ criminal
threat laws don’t specifically talk about the use of technology, they just require that the threat
be communicated in some way (which could include in person, by phone, or using text
messages, email, messaging apps, or social media). Online threats don’t necessarily have to
include words – a picture posted on your Facebook page of the abuser holding a gun could be
considered a threat.
DOXING
Doxing is when someone searches for and publishes your private/identifying information
online in an effort to scare, humiliate, physically harm, or blackmail you (among other
reasons). The information they post could include your name, address, phone number, email
address, photos, finances, or your family members’ names, among other things. An abuser
may already know this information about you or s/he might look for your information online
through search engines or social media sites. Abusers may also get information about you by
hacking into devices or accounts. Sometimes they may even reach out to your friends or
family members pretending to be you or a friend of yours so that they can get more
information about you. The abusive person may publish your personal information online in
an effort to scare, humiliate, physically harm, or blackmail you (among other reasons).
Doxing is a common tactic of online harassers, and an abuser may use the information s/he
learns through doxing to pretend to be you and ask for others to harass or assault you. See
our Impersonation page to learn more about this form of abuse. There may not be a law in
your state that specifically identifies doxing as a crime, but this behavior may fall under your
state’s stalking, harassment, or criminal threat laws.
CYBERBULLYING
Cyberbullying is unwanted and often aggressive behavior targeted at a specific person that
takes place through the use of technology devices and electronic communication methods. A
cyberbully may use a phone to repeatedly send offensive, insulting, hurtful or threatening text
messages to you, or may use social media to post rumors or share personal information about
you. Not all states have cyberbullying laws, and many of the states that do have them specify
that they only apply to students or minors (since “bullying” typically takes place among
children and teens). Additionally, not all states criminalize cyberbullying but instead may
require that schools have policies in place to address all forms of bullying among students. If
you are experiencing cyberbullying and your state doesn’t have a cyberbullying law, it’s
possible that the abuser’s behavior is prohibited under your
state’s stalking or harassment laws (additionally, even if your state does have a
cyberbullying law, your state’s stalking or harassment laws may also protect you).
If you’re a student experiencing online abuse by someone who you are or were dating and
your state’s domestic abuse, stalking, or harassment laws don’t cover the specific abuse
you’re experiencing, you may want to see if your state has a cyberbullying law that could
apply. For example, if an abuser is sharing an intimate image of you without your consent
and your state doesn’t have a sexting or nonconsensual image sharing law, you can check
to see if your state has a cyberbullying law or policy that bans the behavior.
You can find cyberbullying laws on the Cyberbullying Research Center’s website and
at stopbullying.gov.
CYBER FLASHING
Cyber flashing, or cyberflashing, is when someone sends you an unwanted naked or sexual
photo or video online or by text message. Most often, this could be when someone sends an
unwanted picture of genitals or exposes himself/herself over live video. Cyber flashing can be
done by someone you know or by a stranger. It can happen in lots of different situations - for
example:
Cyber flashing can be considered a form of online abuse and sexual harassment. A few states
have specific laws that make cyber flashing a crime or a reason to sue the abuser for money.
Other states are starting to pass laws like this.
If you are the victim of online harassment, it is generally a good idea to keep track of any
contact a harasser has with you. You can find more information about documenting
technology abuse on our Documenting/Saving Evidence page. You may also be able to
change the settings of your online profiles to prohibit an abuser from using certain
threatening phrases or words. You can learn more about these protections on Safety Net’s
Tech Safety blog. You can also find legal resources in your state on our Finding a
Lawyer page.
3. What is the process of deleting your location history or web activity history in gmail?
List the process
Go to Google's My Account page: Log in to your Google account and navigate to the "My
Account" page (myaccount.google).
Choose "Data & Personalization": Scroll down to the "Data & Personalization" section and
click on the link.
Select "Web & App Activity": On the next page, click on "Web & App Activity" to access
your activity history.
Delete activity data: You can delete your location and web activity history by clicking on the
"Manage Activity" button and then selecting the data you want to delete. You can also choose
to delete all of your activity data at once.
Confirm deletion: After selecting the data you want to delete, click on the "Delete" button to
confirm your action.
Wait for deletion to complete: The deletion process may take a few minutes to complete,
depending on the amount of data being deleted.
It's important to note that deleting your location and web activity history in Gmail only
removes this information from Google's servers. It may still be accessible to other entities,
such as internet service providers or government organizations, if they have obtained it
through other means. Additionally, some apps or websites may still retain your activity data,
even after it has been deleted from Google's servers.
4. What is the process of enhancing your privacy in Facebook? list all the steps.
Azealia Banks
The 212 rapper was dropped from her UK booking agency and axed from her headline slot at
grime and hip-hop festival Born & Bred following racist and homophobic tweets to Zayn
Malik.
Her Twitter account was also blocked after the string of aggressive tweets aimed at the
Pillowtalk singer.
The row started when Banks claimed Malik had copied her work for his new video, Like I
Would.
Banks also posted a string of derogatory comments about the UK rap scene, saying that
British rappers "never have swag" and British rap music was a "disgrace" to the genre.
The US rapper later apologised for using homophobic language in a Facebook post saying:
"Words hurt. And while I may be immune to every word and be thicker skinned than most, it
doesn't mean that I get to go around treating people with the same toughness that made my
skin so thick.
"Because, that IS how people get thick skin... by being subjected to name
calling/belittlement/abuse and it's not fair."
PewDiePie
The Swedish YouTube star used the N-word in one of his videos in January 2017 and was
accused of anti-Semitism later in the same month.
As a result, Disney announced in February 2017 they would cut cut ties with PewDiePie -
real name Felix Kjellberg - who at the time was the world's highest-paid YouTuber.
He was also dropped from the Google Preferred advertising programme, and his YouTube
Red series was cancelled.
The Swede later apologised for using the racial slur during a video live stream, saying he was
an "idiot", but defended himself against claims of anti-Semitism, saying the comments had
been taken out of context.
7. List top tools available online for spying on phones and computer systems.
mSpy
mSpy is another one in the great lists of phone spying apps. What really separates it from
others on the list is the fact that it is primarily used as a parental monitoring app.
It is a feature-rich platform and contains capabilities like cell phone monitoring, location
tracking, multimedia file monitoring, online activity tracking, etc. It allows remotely
controlling apps and programs on a planted device.
Features:
Social Media Monitoring including Facebook, Instagram, Snapchat, etc.
Recovering of deleted messages,
Remote blocking of websites/apps/contacts, etc.
It has a screen recorder.
Verdict: mSpy is a great tool and offers all the features required for parental control. It lets
you monitor every keystroke & tap and social media chats & shared pictures. It provides all
these monitoring features without being detected.
SpyBubble
SpyBubble is a very easy spying app to use and is an even easier spying application to install
on the device you want to monitor. It is a cloud-based application that deploys all of the
features that one has come to expect from cell phone spy apps of this nature.
The device works spectacularly well on stealth mode. So the user of the phone isn’t even
aware as their calls, messages, location, and online activity are tracked and reported to you
remotely. The app can also activate a smart phone’s camera and take pictures without the
concerned person noticing.
All the recorded information is sent and can be accessed from a secure web- based account.
Cocospy
Cocospy is a cross-compatible phone spying app that is easy to install and use. It can be set
up and installed within 5 minutes and works in complete stealth mode, thus not allowing the
phone user to be aware of its presence on the device. The app can be used to monitor almost
everything happening on the target device in real-time via a comprehensive dashboard.
You can check call logs, track sent and received SMSs, and monitor online browser history
without a hassle. The app also allows you to track a person’s real-time location either via
SIM card or through GPS technology.
Features:
Geofence Alerts
Call Tracker
Social Media Spy
Track Browser History
Stealth Mode
Verdict: Cocospy’s simple installation and easy-to-navigate spying dashboard have earned it
high praise from several users worldwide. No smartphone activity can remain hidden with
this app installed and running discreetly in the background. The app works fine on both iOS
and Android phones, without the need to jailbreak or root any devices.
uMobix
uMobix is the only app that grants full access to a person’s Instagram and Facebook accounts.
Users can enter anyone’s Facebook and Instagram, click on any button there, which means
managing accounts, adjusting settings, adding friends, or deleting followers.
uMobix is the only app that works perfectly well on both iOS and Android. It means you can
install it without any hurdles on the way and monitor it with no bugs occurred.
uMobix doesn’t require you to jailbreak iOS devices, unlike many other competitors. You
just provide iCloud iD and password and start monitoring as soon as the backup is performed.
The app provides absolutely innovative features, like online status indicator (track when the
user is online), real-time reporting for Androids, Youtube monitoring, app activity tracking,
etc.
All in all, uMobix offers the most value for its price, being among the most affordable
spy apps on the market today
8. List recent cases of use of fake images or deepfakes impacting people in real life.
9. Which country has witnessed most deaths due to selfies? List 5 incidents.
incidents
Rio de Janeiro: Selfies, which have become a global sensation in the last decade or so, have
remarkably killed five times more people than shark attacks.
And the death toll has crept up incrementally each year as smartphones become more
sophisticated and selfie-sticks increase the range at which people can snap themselves,
prompting them to take bigger risks for the perfect shot.
Between October 2011 and November 2017, at least 259 people died taking selfies around
the globe, according to India's Journal of Family Medicine and Primary Care, compared to
just 50 people killed by sharks in the same period.
India Has Maximum Selfie Deaths Globally. 159 Have Died So Far
India has set up "no selfie" zones -- 16 of them in the city of Mumbai alone.
(Representational image)
Rio de Janeiro: Selfies, which have become a global sensation in the last decade or so, have
remarkably killed five times more people than shark attacks.
And the death toll has crept up incrementally each year as smartphones become more
sophisticated and selfie-sticks increase the range at which people can snap themselves,
prompting them to take bigger risks for the perfect shot.
Between October 2011 and November 2017, at least 259 people died taking selfies around
the globe, according to India's Journal of Family Medicine and Primary Care, compared to
just 50 people killed by sharks in the same period.
While women take the most selfies, young men, who are more prone to take risks, make up
three quarters of the selfie deaths -- in drownings, crashes, falls or shooting accidents.
India, with a population of more than 1 billion and 800 million cell phones, holds the record
for the number of people dying in the act of photographing themselves, with 159 recorded so
far.
That is more than half of the global total -- and a testament of sorts to the nation's love of
group photos and its youthful population.
India has seen selfie-snapping groups of youths die when they were hit by a train or drowning
when their boat sank at the moment they were clicking the shutter.
The situation has become so dire that India has set up "no selfie" zones -- 16 of them in the
city of Mumbai alone.
The country came in far ahead of Russia (16 deaths), the United States (14) and Pakistan.
In Russia, people have fallen from bridges and high-rise buildings, shot themselves or even
died while handling a land mine. Police issued a guide to "selfies without danger" in 2015.
In the United States, most of those involved in selfie deaths fatally shot themselves while
seeking the perfect pose. A number of people have fallen to their deaths at the Grand Canyon.
Rescue services in Croatia used Twitter to ask tourists to "stop taking stupid and dangerous
selfies" after a Canadian miraculously survived a 75-meter (250-foot) fall in the Plitvice lakes
region.
In January, Taiwanese social media celebrity Gigi Wu -- known as the "Bikini Climber" for
taking selfies on top of mountain peaks dressed in a bikini -- died when she fell into a ravine.
She was 36.
themselves to the floor during a shooting. Facing the mad frenzy of endless selfies, Vienna
has launched a campaign for a digital detox.
The Belvedere Museum has put up a large copy of Gustav Klimt's classic painting "The Kiss"
near the original and added a giant red hashtag, so that visitors can take their selfie next to the
facsimile and actually look at the real work of art.
10. List 5 consequences / risks of sexting.
What is sexting?
Sexting is sharing a sexual message or photo through a phone, email account or social media
site. While sexting can seem like no big deal because it doesn’t carry the risk of pregnancy or
a sexually transmitted infection (STI), it can still have some pretty serious consequences.
Sexting consequences
Sexting can negatively affect your mental health, relationships and future. It can even have
legal consequences.
Before sending an explicit photo, remember that once an image is out there, you can’t get it
back. What if you and the other person break up? What if they share your message or photo
with their friends or social media networks? What if your parents or teachers found out? In
some cases, the image could even end up in the hands of a sexual predator.
Here are some tips to avoid serious consequences from sexting:
Never take photos of yourself you wouldn’t want everyone to see, including your family,
classmates and teachers.
Never forward someone else’s sex-related photos or messages. You could get in serious
trouble, especially if a person involved is under age 18.
Sexting can affect your mental health and relationships
Sexting can have potential emotional consequences like:
Regret
Objectification/victimization
Bullying
Depression
Sadness
Social isolation
Loss of friendships
Loss of respect for yourself
Thinking about or actually hurting yourself or others
Sexting can negatively impact your future
Sexting can also negatively affect your future, such as your:
Employment
College admission
Military admission
Spot on a sports team
Scholarships
Future relationships
Mental health if you have to re-live the consequences of your decision
Employers and colleges often look at candidates’ social media profiles and online presence.
Having nude images or photos of alcohol or drug use could hinder your ability to get a job or
into college one day.
Legal consequences of sexting
If a person involved in sexting is under age 18, it’s considered child pornography. The legal
consequences can vary depending on the state where you live. Some states consider it a
felony to both send and receive the photo (even if you didn’t ask the person to send the
photo). If the person in the image is under 18, you may face legal consequences if you’re the:
Photo taker
Person in the picture
Sender
Receiver
In possession of the photo
Sexting could also put you at risk for placement on the Sex Offender Registry and possible
jail time. Usually, the consequences are harshest for those who request or share the photo.
And even if you’re not breaking the law, your school can punish you and others involved,
even if you’re legal adults.