• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Elisa Lippincott
    • Mark Nunnikhoven
    • Jon Clay
  • Research
Home   »   Security   »   Another Form of Cyberbullying: Revenge Porn

Another Form of Cyberbullying: Revenge Porn

  • Posted on:December 12, 2013
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

Every day it’s a challenge for me to not get jaded by the constant flow of negative news and accounts of horrific human behavior that I learn about. For my mental health, I need to maintain a balanced outlook on the world and hold strong to a core belief that most people are basically good.

Unfortunately, in this Internet age there are so many new ways for individuals to behave badly and to hear about them. For instance, have you been hearing about a new form of cyberbullying called “revenge porn?” Have you heard any of the victim stories that are necessitating action by our lawmakers?

What’s revenge porn?

When I first heard about revenge porn, my initial response was, “Really? Oh, my God, that’s so slimy.” For those that don’t know, revenge porn is the online posting of embarrassing, racy, or nude photos and videos of an ex-lover or former spouse – without their consent and often with the victim’s name, address, phone numbers, and employment information.

Sadly, cases of revenge porn are becoming more frequent and some brave victims are coming forward, telling their stories, and asking legislators to make it a crime so law enforcement can take action against the perpetrator(s).

A few states in the US, including California, now have laws on the books that make this type of activity a punishable crime. However, proponents say the California law doesn’t go far enough because it doesn’t protect “selfies” (pictures or videos taken by same person in the images) that were originally shared with the perpetrator.

Opponents of the New Laws

On the other hand, the Americans for Civil Liberties Union (ACLU) and Electronic Frontier Foundation think this type of law goes too far. They oppose these and other potential restrictions on the grounds that such laws could be a violation of the First Amendment.

How posting unauthorized naked photographs of someone online can be considered “free speech” is beyond me…but I suppose there is a legitimate fear of  “slippery slope” as any law of this kind can over-reach or be abused.

So What Can You Do to Avoid Becoming a Victim?

No matter what happens in the state or federal legislatures, no one can be fully protected online from this kind of threat because we can be our own worst enemy. “Just don’t do it” is perfect 20/20 hindsight advice that everyone hates.

It’s easy to be critical of someone who takes a nude selfie and shares without fear of the potential consequences. However, I think it would be a great disservice to “blame the victim” for doing a dumb thing that maybe didn’t seem wrong or dangerous at the time.

We’re all human and fallible. We shouldn’t have to pay for some mistakes or indiscretions forever. Perhaps the only thing we can do is consider one victim’s advice, “Think before you press send.”

Some perpetrators claim their ex’s personal pictures got into the public domain after their systems were hacked. This would not have happened if they were running Trend Micro Internet Security.

I work for Trend Micro and the opinions expressed here are my own.

Related posts:

  1. Revenge Porn – Despicable Online Behavior Doesn’t Pay
  2. Form a BYOD Policy Fit for the Future
  3. Crypto-Ransomware Attacks: The New Form of Kidnapping
  4. Celebrity Exposures in the Cloud

Security Intelligence Blog

  • Monero-Mining RETADUP Worm Goes Polymorphic, Gets an AutoHotKey Variant
  • XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing
  • XTRAT and DUNIHI Backdoors Bundled with Adwind in Spam Mails

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • The Role That IT Security Teams Need to Play in Connected Hospitals
Elisa Lippincott (TippingPoint Global Product Marketing)
Elisa Lippincott (TippingPoint Global Product Marketing)
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 16, 2018
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Warnings and WannaCry
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Drupal Latest Platform To Be Hit With Critical Vulnerability
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • Today’s Predictions for Tomorrow’s Internet
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • The Risks of Bio-IoT

Follow Us

Trend Micro in the News

  • Graffiti in the digital world: How hacktivists use defacement
  • The connected workforce: The importance of protecting home and corporate networks
  • NIST Cybersecurity Framework Series Part 5: Recover

Trend Micro Blogs

  • Internet Safety for Kids
  • Countermeasures
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.