A Domestic Violence Dystopia: Abuse via the Internet of Things and Remedies Under Current Law
Tactics of domestic violence are nothing new. However, as with various other aspects of modern life, technology threatens disruption.
The increasing prevalence of Internet of Things (IoT) devices has given abusers a powerful new tool to expand and magnify the traditional harms of domestic violence, threatening the progress advocates have made in the past thirty years and creating novel dangers for survivors. An IoT device is a “smart,” stand-alone, internet-connected device that can be monitored or controlled from a remote location. They are cheap and increasingly common—the number of IoT-enabled devices in the world is already in the billions and expected to grow quickly. IoT devices allow abusers to overcome geographic and spatial boundaries that would have otherwise prevented them from monitoring, controlling, harassing, and threatening survivors.
Various advocates are finding ways to protect survivors, and the broader public, from these new dangers. In the domestic violence sphere, domestic violence service providers are creating resources for survivors that explain IoT-facilitated abuse and how to better secure their smart devices. In the technology sphere, consumers, businesses, digital experts, and the media are broadcasting the security risks of IoT devices. Unfortunately, significantly fewer outlets describe the legal remedies available for IoT-facilitated abuse.
This Note aims to bridge that gap. It demonstrates that IoT-facilitated abuse is a form of technology-facilitated domestic violence and explores how society can use current laws to address IoT-facilitated abuse. However, it also questions whether the existing remedies are sufficient and offers recommendations for legal and non-legal changes that will better protect survivors of IoT-facilitated abuse and hold perpetrators accountable.
Table of Contents Show
Introduction
U.S. society is becoming increasingly digital. A 2019 study found that 86 percent of Americans use the internet daily.
Much research on technology-facilitated domestic violence concentrates on “conventional” cyber risks such as abuse via social media and phones.
Part I provides background on domestic violence and technology-facilitated abuse. Part II provides a comprehensive definition of the IoT, explains how IoT-facilitated abuse is a form of domestic violence, and explores various ways in which IoT-facilitated abuse presents challenges for survivors
I. Background
This Section describes the characteristics of domestic violence and tech abuse in order to situate IoT-facilitated abuse within both of those broader categories. The characteristics of domestic violence apply to all forms of abuse, including IoT-facilitated abuse. This relationship is critical in evaluating and crafting remedies because the most effective remedies will address IoT-facilitated abuse as part of a system of harm and not as isolated incidents of technology misuse. Although technology has altered and expanded the instruments of domestic violence, perpetrators of IoT-facilitated abuse still use tactics of control, manipulation, harassment, surveillance, and revenge. This Section also describes a few common methods of tech abuse to demonstrate its scope and to provide a point of comparison for Part II’s discussion of the unique implications of IoT-facilitated abuse.
A. Domestic Violence Generally
Domestic violence—also called intimate partner violence, domestic abuse, or relationship abuse—is a “pattern of behaviors used by one partner to maintain power and control over another partner in an intimate relationship.”
One defining aspect of domestic violence is its gender asymmetry.
There are various predictors of physical abuse. First, separations (including attempted separations) can trigger additional violence and “revictimiz[ation].”
The United States has made great progress in combatting domestic violence over the past thirty years.
B. Technology-Facilitated Domestic Violence
There are numerous terms for technology-facilitated domestic violence. For example, some use “cyber-violence.”
Tech abuse has become a common issue for survivors of domestic violence. The term encompasses the various ways in which abusers can manipulate technology to harass and control individuals, including through emotional manipulation and coercive offenses.
Two common tactics of tech abuse are location tracking and cyberstalking. Location tracking devices are widespread and easily manipulated as tools for tech abuse.
In addition to the use of location-tracking devices, cyberstalking is another common form of tech abuse. Cyberstalking is a term for stalking and harassing that occurs in an online environment through the use of the internet, email, or other electronic communication devices.
Technology increases the risk of domestic violence. First, it allows abusers to overcome geographic and spatial boundaries that would have otherwise prevented them from contacting survivors.
Another hazard is psychological, because technology allows abusers to create “a sense of omnipresence” that erodes survivors’ feelings of safety, even after separation.
Further, society’s dependence on technology shows no signs of slowing, which may create greater problems in the future. Andrew King-Ries, for one, has argued that teenagers’ use of technology may undermine our progress in addressing cyberstalking.
II. The Internet of Things and Domestic Violence
A. What is the Internet of Things?
The Internet of Things (IoT) is an umbrella term describing the network of standalone internet-connected devices that individuals can monitor or control from a remote location.
As devices become increasingly connected due to the IoT, consumers and businesses alike have voiced concerns regarding privacy and security issues such as massive data generation that leaves sensitive information vulnerable to hackers and unwanted data collection by technology companies.
B. IoT-Facilitated Abuse as Domestic Violence
There are limited statistics on the frequency of IoT-facilitated abuse, but both empirical research and anecdotal evidence make clear that IoT-facilitated abuse is occurring. Between 2017 and 2018, a group of researchers from University College London conducted a six-month feasibility study into whether IoT devices could be manipulated into instruments of abuse.
In 2018, the New York Times conducted more than thirty interviews with survivors, lawyers, shelter workers, and emergency responders regarding the prevalence of IoT-facilitated abuse.
One of the first documented court cases involving IoT-facilitated abuse occurred in May 2018. In that case, a couple in the United Kingdom had initially installed a smart-home system together so they could access their lighting, heating, and alarm system remotely.
C. Unique Characteristics and Harms of IoT-Facilitated Abuse
IoT-facilitated abuse has unique characteristics that exacerbate other forms of tech abuse and produce new harms. These harms include magnifying the gendered nature of domestic violence; causing jurisdictional, evidentiary, and constitutional confusion; allowing abusers to circumvent geographic boundaries; and creating unique forms of victim-blaming and minimization.
Like domestic violence generally, IoT-facilitated abuse is a gendered offense: most survivors are women and most abusers are men.
The legal implications of IoT-facilitated abuse include jurisdictional, evidentiary, and constitutional issues. First, it can be difficult to determine the jurisdiction in which a survivor can pursue a civil suit against an abuser who misuses technology because cyberspace has no territorial borders.
In addition to jurisdictional issues, it can be difficult to collect evidence of IoT-facilitated abuse.
Finally, any attempts to regulate the decentralized internet must be narrow enough to avoid violating the First Amendment right to freedom of speech. The Supreme Court’s First Amendment jurisprudence generally protects speech, making narrow exceptions for “true threats”
Beyond unique legal implications, IoT-facilitated abuse causes unique harms to survivors. Tech abuse already endangers survivors by blurring geographic and spatial boundaries, allowing abusers to harass from a distance, and deterring survivors from leaving abusive situations because they feel they cannot escape.
In addition to this psychological fear, survivors know that society will not always believe them if they share their experiences and may criticize them instead. IoT-facilitated abuse engenders a distinct form of victim-blaming—a phenomenon that is already highly common. In the popular understanding of domestic violence, an attitude of victim-blaming suggests that the survivor, rather than the perpetrator, bears responsibility for abuse. One myth is that individuals who stay in relationships with abusive partners are either lying about experiencing abuse or responsible for their own abuse by choosing to stay.
The results of victim-blaming in IoT-facilitated abuse cases are emotionally damaging and dangerous. First, telling a survivor of IoT-facilitated abuse that she should not have purchased the technology would be both inaccurate and unhelpful if she was not the one who purchased it. As discussed previously, the abuser could have purchased and installed the IoT devices,
Second, even if the survivor chose to install the networked devices on her own, any advice to simply stop using the devices and “get offline” fails to address the root cause of abuse and can also create more dangers for the survivor.
Related to victim-blaming, IoT-facilitated abuse also leads to a unique form of minimization. “Minimizing, denying, and blaming” and “emotional abuse” are common abusive behaviors found on the Power and Control Wheel.
As advocates continuously stress, abusers may perpetrate abuse with new technology, but it still involves old and common behaviors.
Minimization is not only an abuser’s tactic. Often law enforcement engages in minimization by turning a blind eye to tech abuse—either consciously or not. According to a newsletter for prosecutors, abusers who utilize technology believe they can get away with the abuse because it is hard to prove or because there are no laws against what they are doing.
In addition, although controlling behaviors such as stalking are abusive in and of themselves and strongly linked to future physical violence, the breach of stalking provisions in a restraining order is not taken as seriously as actual physical offenses such as assault.
IoT-facilitated abuse not only causes psychological and emotional abuse, but also may facilitate physical violence. As discussed in Part I, stalking and separation are correlated with physical violence. A 2002 study found that 68 percent of femicide
It is important to recognize the unique implications of IoT-facilitated abuse because they impact the remedies for abuse. Several examples may be instructive. First, no civil or criminal laws currently cover abuse through IoT devices.
III. Remedies Under Current Law & Suggestions for Change
As a result of the unique implications of IoT-facilitated abuse, it is critical to use any and all existing remedies for domestic violence in creative ways, and also to open new avenues for addressing IoT-facilitated abuse more directly.
This Note aims to provide a range of remedies, as it operates under the belief that society must make available multiple types of remedies such that survivors may each make their own informed decisions as to which remedy will be most desirable and effective in their unique situations. Remedies serve different functions: preventing abuse in a relationship, deterring abuse more broadly in society, financially compensating the survivor, punishing the perpetrator, and expressing social condemnation of abuse. Not all remedies will work alongside each other, however. For instance, a survivor who wants to remove the perpetrator’s access to her devices and also to remain in the relationship will seek different remedies compared to a survivor who prefers that a court sentence her abuser. Remedies also depend on which stage of domestic abuse the survivor is experiencing—that is, whether she is in the relationship and cohabitating with the abusive partner, whether she is preparing to contact the police or seek shelter elsewhere, or whether she has already left and is trying to rebuild her life.
This Section cannot and does not purport to cover all possibilities but aims to explain ways to tackle IoT-facilitated abuse in the following areas: the legal conception of domestic violence, civil remedies, criminal remedies, and nonlegal remedies. It will also highlight potential issues and critique the effectiveness of certain remedies. Broadly, there are two major flaws: (1) current laws, which were not created to address the unique implications of IoT-facilitated abuse, are vulnerable to counterarguments and to judicial discretion as to whether the existing body of domestic violence law applies; and (2) contact with the legal system can be expensive, traumatizing, and even dangerous for survivors and their communities. Therefore, there is a strong need for alternatives. The Section ends by discussing four nonlegal remedies: cultural change, digital safety trainings for survivors, community accountability strategies, and safer design.
A. Expanding the Definition of Domestic Violence
Addressing IoT-facilitated abuse necessitates expanding the legal definition of domestic abuse to explicitly include IoT-facilitated abuse. This change is insufficient as a remedy in and of itself, but is a critical first step because any potential remedy within the legal system is necessarily limited or expanded by this definition.
Currently, the legal system insufficiently addresses the issue of tech abuse. There is evidence that the Trump administration hindered progress toward a broad definition of domestic violence. In 2018, the U.S. Department of Justice Office on Violence Against Women revised its definition of domestic violence to only include harms that would constitute a felony or misdemeanor crime.
In a 2015 study on law enforcement responses to domestic violence, the Police Executive Research Forum found that 51 percent of respondent agencies adopted the Obama administration’s definition of domestic violence.
Whether law enforcement officers act upon expanded definitions of domestic violence is not covered in this Section. Evidence of police officers’ minimization of nonphysical abuse and their own perpetration of domestic violence (both discussed later in this Note) suggests that enforcement will be an issue. But as a baseline, all local, state, and federal government definitions of domestic violence must explicitly address IoT devices and IoT-facilitated abuse.
B. Civil Remedies
1. Tort Lawsuits for Damages
Domestic violence causes serious harm. Tort law, especially personal injury law, can dictate how and when survivors are compensated for these harms. One benefit of tort law as a vehicle for obtaining a remedy is the availability of financial recovery. Financial recovery can help survivors with their immediate needs and with their longer-term self-sufficiency and safety.
Some states recognize an independent tort claim for stalking.
A claim for intentional infliction of emotional distress applies when an abuser “intentionally or recklessly causes severe emotional harm” through “extreme and outrageous conduct.”
2. Civil Protection Orders
Another remedy under the civil legal system is the civil protection order, also called a domestic violence restraining order (DVRO). DVROs are binding injunctions that a state court issues to enjoin an individual “from engaging in violent or threatening acts, harassment, contact, communication, or physical proximity to another person.”
In the context of tech abuse more broadly, research has shown that survivors are threatened by the inability to obtain and enforce DVROs. For example, while some states consider cyberstalking a felony if a survivor has a protection order against the perpetrator,
3. Federal Civil Remedy
There is no civil cause of action for domestic violence at the federal level.
The lack of a federal remedy has significant consequences. Given the disparities in state law responses to tech abuse, women in some states will inevitably have less access to remedies compared to women in other states. A federal remedy would preserve or create a minimum civil remedy for women regardless of where they live. And ideally, states would create even broader protections. However, a revival of VAWA’s civil remedy would not be effective because the provision’s primary intent was merely symbolic.
Practically, however, attempts to create a federal civil remedy will likely face an uncompromising federalism challenge by states, under Morrison’s ruling that domestic violence does not substantially affect interstate commerce.
C. Criminal Remedies
Criminal remedies differ from civil remedies because they emphasize the perpetrator’s wrongdoing rather than the survivor’s harm. Some legal scholars argue that criminal remedies are important for this reason. Criminal remedies enlist the force of the state to punish the perpetrator rather than simply compensate the survivor. In addition, criminal remedies may be more effective at conveying social condemnation compared to civil remedies.
Notwithstanding the power of criminal remedies to punish the perpetrator and incapacitate them via imprisonment, carceral solutions to domestic violence can be problematic. In 2000, Angela Davis noted that the legal conception of violence against women as a crime had not decreased domestic violence, but instead contributed to “sequestering” millions of men in America’s expanding prison system.
Many domestic violence service providers and survivors share this hesitation to engage with the criminal justice system. In 2015, a group of researchers from CUNY School of Law, University of Miami School of Law, and the American Civil Liberties Union (ACLU) conducted a field study regarding policing and domestic violence.
This Note embraces the view that survivors of domestic violence must be empowered to utilize whichever solutions they believe will mitigate or eliminate their individual experiences of abuse. As a result, the remainder of this Section describes and analyzes existing criminal laws that may be applied in cases of IoT-facilitated abuse. Recognizing these valid critiques of carceral solutions, however, the Note will discuss nonlegal remedies in Part III.D that address IoT-facilitated abuse without relying on the criminal or civil legal systems.
1. Stalking and Cyberstalking Laws
Stalking laws may provide a critical remedy for many survivors of IoT-facilitated abuse. On the federal level, Congress first passed the Interstate Stalking Punishment and Prevention Act—codified at 18 U.S.C. § 2261A—in 1996.
In addition to the federal stalking statute, stalking is a crime in all fifty states.
Though Shimizu directed her suggestions for change toward cyberstalking laws, they are nonetheless instructive for cases involving IoT-facilitated abuse. First, statutes should not include a physical threat requirement because IoT-facilitated abuse does not require physical harm. Second, statutes should not require that communication be directed at the survivor because stalking someone by using an IoT device is indirect. By not removing this directness requirement for communications, even a statute that covers electronic “communications” would fail to include IoT devices. “Jackie’s Law” in New York provides a potential solution. Seeking to address cyberstalking, Jackie’s Law amended a section of New York’s stalking statute to include GPS tracking within the meaning of “following.”
2. Harassment Laws
If an abuser’s actions do not rise to the level of stalking, a survivor might still be able to turn to criminal harassment laws. Michigan’s Penal Code is a helpful model. In Michigan, harassment includes “repeated or continuing unconsented contact” that causes “a reasonable individual to suffer emotional distress.”
3. Surveillance Laws
Existing laws against surveillance can also provide criminal remedies for survivors of IoT-facilitated abuse. The NNEDV defines electronic surveillance as watching or monitoring a person’s actions or conversations using electronic devices or platforms, without the person’s knowledge or consent.
Electronic surveillance laws include laws against eavesdropping and wiretapping, which could be used against an abuser who employs IoT devices to interfere with the survivor’s private conversations to listen to or record them. Under federal law, it is a crime for a non-party to intercept a conversation unless at least one party in the exchange knowingly consents.
Michigan law provides a useful blueprint for another criminal surveillance law that states should enact to protect survivors of IoT-facilitated abuse. In Michigan, it is a crime to “[i]nstall, place, or use in any private place, without the consent of the person or persons entitled to privacy in that place, any device for observing, recording, transmitting, photographing, or eavesdropping upon the sounds or events in that place.”
Finally, IoT-facilitated abuse likely falls under surveillance laws if the abuser uses IoT devices with cameras—e.g., security cameras, video doorbells, or smart home systems powered by mounted iPads—to capture intimate images, video, or audio recordings of the survivor. Furthermore, if the captured images or videos are intimate in nature and the abuser then disseminates them without the survivor’s knowledge and permission, the conduct constitutes revenge porn and additional laws apply. “Revenge porn” is a frequently used (and somewhat misleading) term that refers to the sharing of explicit or sexual images or videos without the consent of the person in the image.
Forty-six states, the District of Columbia, and Guam currently have laws against distribution of revenge porn, but they all take different approaches.
D. Non-Legal Remedies
The legal system alone is not sufficient to address domestic violence. For example, a DVRO that requires an abuser to stop contacting the survivor, including via IoT devices, will only prevent the abuse for a limited time. Eventually, the DVRO will expire and the survivor will have to either return to the court system to renew the order or face the abuser’s resuming contact. However, relying on the legal system can be re-traumatizing because the survivor must recite the facts of her abuse and prove to the court that she deserves continuing protection.
Some authors even argue that the legal system is not the right place for women to turn to for help. Leigh Goodmark has explained that current laws improperly demand physical violence before taking abuse seriously, strip survivors of agency due to “mandatory arrest” policies, and deprive them of dignity by doubting their judgment and parenting ability.
Finally, even where the legal system may be effective, it is only available after the survivor has already been harmed—it does not have the power to preemptively keep survivors safe. With these criticisms in mind, the following Section will explore four non-legal remedies: cultural change, digital safety training, community accountability strategies, and safer design. These remedies differ from the previous remedies discussed in this Note because they do not rely on civil or criminal laws and they have the potential to stop harm before it occurs.
1. Cultural Change
To mitigate IoT-facilitated abuse, the most important starting point is not in the civil, criminal, or family law system, but with cultural change. Cultural change can seem abstract and is admittedly difficult to achieve in the short term. However, cultural attitudes are critical because they affect whether survivors will come forward about their abuse in the first place; whether players in the civil and criminal legal systems will be willing to apply or expand existing laws to protect those survivors; and whether community members will take the allegations of abuse seriously enough to offer support.
Part II.C described implications of the IoT for domestic violence, including a form of victim-blaming that tells survivors that they are responsible because they failed to stop using their smart devices, and a form of minimization that discounts the psychological trauma caused by nonphysical violence such as IoT-facilitated abuse. To combat victim-blaming and minimization, it is important to expand the social understanding of what domestic violence looks like.
A sign of positive change is that it is no longer radical to view domestic violence as “coercive control.” Even the federal government of the United States recognized this definition, at least, prior to the Trump administration’s revision.
Beyond updates to the Wheel, advocates who interact with survivors must be explicit and insistent in stating that tech abuse and IoT-facilitated abuse constitute domestic violence. This will encourage survivors to recognize abusive situations and reduce third-party attempts to minimize the survivor’s experiences. First, survivors of nonphysical abuse may not recognize that they are experiencing domestic violence. This is especially true for young people because they tend to accept a certain level of privacy invasion as a tradeoff for their constantly connected lives.
Moreover, this cultural change can begin in personal networks. For example, a technology specialist at NNEDV’s Safety Net Project (the “Project”) suggested a “survivor-driven and empowering” approach to interacting with survivors.
Technology can be a “powerful weapon of control” for abusive partners, and abusers can “turn someone’s technological world against them” through access to the survivor’s electronic devices.
2. Digital Safety Training
Technology can provide benefits to survivors, including communication with friends and family, convenience in daily life, and access to support. Thus, the goal must be to ensure that survivors know how to safely use technology, not to ask them to disconnect from technology. For this reason, digital literacy and safety training can be a critical avenue for preventing or decreasing IoT-facilitated abuse.
The NNEDV created the Project in the late 1990s, which educates survivors, advocates, and other professionals working with survivors on how technology impacts the safety, privacy, accessibility, and civil rights of survivors.
Finally, the Family Justice Center may be an additional location for digital safety training. Currently, Family Justice Centers across the country co-locate multiple organizations as a “one stop shop” providing services to survivors of interpersonal violence including intimate partner violence, sexual assault, child abuse, elder or dependent adult abuse, and human trafficking.
However, advocates could reimagine a Family Justice Center model that opposes both interpersonal violence and state violence—one that continues to partner with agencies such as community advocates, shelters, and employment services, but excludes law enforcement personnel. In designing what I will call a “violence-free Family Justice Center,” advocates should collaborate with privacy and technology specialists such as the advocates from the Project. For example, a new technology-clinic model is currently operating in New York City Family Justice Centers.
3. Community Accountability and Transformative Justice
As mentioned in Part II.C, many police departments are currently ill-equipped to investigate tech abuse. The seemingly straightforward solution would be to increase funding for law enforcement so they can properly handle cybercrimes. However, there is growing evidence that police officers have not succeeded in stopping domestic violence. In fact, they have contributed greatly to it.
In Police Wife: The Secret Epidemic of Police Domestic Violence, the author notes that 40 percent of U.S. police officers admitted to being violent with their spouse or children.
Given these statistics, it is critical to find alternatives. In fact, advocates and organizers have been working for decades to imagine ways that community resources can be shifted away from policing and imprisonment toward community efforts to mitigate domestic violence. The concepts of transformative justice and community accountability are critical to these efforts. Transformative justice is an approach to harm that seeks safety and accountability within and by communities.
Numerous organizations have applied community-based models to their work. For example, two advocates created a Community Accountability for Survivors of Sexual Violence Toolkit in 2014 as part of the Shifting From Carceral to Transformative Justice Feminisms Conference at DePaul University; they also facilitated a workshop on the same topic at the National Sexual Assault Conference in 2012.
These community-based responses can likely incorporate interventions for IoT-facilitated abuse. For example, the Creative Interventions toolkit suggests being openminded regarding potential allies and what roles those allies could play;
Giving more money to police departments in hopes that they investigate cybercrimes and tech abuse necessarily involves funding the broader prison industrial complex, which already receives more than eighty billion dollars annually.
4. Collaborations for Safer Design
In order to address the intersection between technology and domestic violence, it is also important to look beyond the traditional sphere of domestic violence work. Specifically, designers of IoT devices and platforms must collaborate with (or at the very least, consult) advocates working against domestic violence.
The NNEDV already works with companies such as Facebook, Twitter, and Google to improve built-in privacy protections.
Companies that make IoT devices clearly presuppose that users in a household trust each other not to misuse the device’s smart features as a tool of domestic violence. So that they do not become accomplices to abusers, designers of IoT devices must consider the implications of their products on survivors, collaborate with anti-violence advocates to improve protections, and create user guides that address the risks of shared device ecosystems.
Conclusion
Tactics of domestic violence are nothing new. Staff at the Domestic Abuse Intervention Project began documenting common abusive behaviors in 1984,
There are three significant barriers to survivor safety in cases of IoT-facilitated abuse. The first is the rigid societal belief that nonphysical abuse is not true harm. This prevents survivors from seeking help for fear that society will not believe them and affects the willingness of actors in the legal system to act for the survivor’s benefit. The second is the legal system’s consistent lag behind technological innovation. This manifests not only in the total lack of recognition of IoT-facilitated abuse in current laws, but also in the outdated requirements for direct contact or physical surveillance that actively preempt legal claims based on IoT-facilitated abuse. The third barrier is society’s unawareness of the paradox of relying on state violence via the criminal justice system to prevent interpersonal violence. This has resulted in increasing numbers of criminal statutes and harsher arrest policies but has failed to address the root causes of domestic violence and lost sight of the most important goal: preventing domestic violence before it occurs.
By surveying potential remedies within and beyond the legal system, this Note sheds light on potential ways for society and the legal system to better protect survivors of IoT-facilitated abuse and hold their perpetrators accountable.
DOI: https://doi.org/10.15779/Z38XW47X1J.
Copyright © 2021 Madison Lo, J.D. Candidate, 2021, University of California, Berkeley, School of Law; B.A., 2018, The University of Chicago. I am grateful to Professor Nancy K. D. Lemon for her guidance on earlier drafts, and to all my classmates in Professor Lemon’s Domestic Violence Seminar for inspiring me with their empathy and critical viewpoints. I also want to thank the editors of the California Law Review for believing in this piece and providing invaluable feedback. This Note would not be possible without their contributions. ↑
- We Are Soc., Digital in 2019: The United States of America 23 (2019), https://wearesocial.com/us/digital-2019-us [https://perma.cc/ZX4S-S65P]. Preliminary research on Internfet usage during the COVID-19 pandemic reveals that internet traffic has surged up to 70 percent. Mark Beech, COVID-19 Pushes Up Internet Use 70% and Streaming More Than 12%, First Figures Reveal, Forbes (Mar. 25, 2020, 3:49 PM), https://www.forbes.com/sites/markbeech/2020/03/25/covid-19-pushes-up-internet-use-70-streaming-more-than-12-first-figures-reveal [https://perma.cc/6VXK-39UW]. ↑
- Andrew King-Ries, Teens, Technology, and Cyberstalking: The Domestic Violence Wave of the Future?, 20 Tex. J. Women & L. 131, 139 (2011). ↑
- Emily A. Vogels, From Virtual Parties to Ordering Food, How Americans Are Using the Internet During COVID-19, Pew Rsch. Ctr. (Apr. 30, 2020), https://www.pewresearch.org/fact-tank/2020/04/30/from-virtual-parties-to-ordering-food-how-americans-are-using-the-internet-during-covid-19 [https://perma.cc/39Y9-FWEY] (describing how social activities, fitness, ordering meals, and education have moved to the internet). ↑
- Nat’l Network to End Domestic Violence, A Glimpse From the Field: How Abusers Are Misusing Technology 1 (2014), https://static1.squarespace.com/static/51dc541ce4b03ebab8c5c88c/t/54e3d1b6e4b08500fcb455a0/1424216502058/NNEDV_Glimpse+From+the+Field+-+2014.pdf [https://perma.cc/X7KH-ELDC]. ↑
- Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis & Leonie Tanczer, ‘Internet of Things’: How Abuse Is Getting Smarter, 64 Safe – Domestic Abuse Q., 2019, at 22, 24. ↑
- Andrew Meola, What Is the Internet of Things? What IoT Means and How It Works, Bus. Insider (May 10, 2018, 1:06 PM), https://www.businessinsider.com/internet-of-things-definition [https://perma.cc/2ZFT-WANA]. ↑
- In this piece, I refer to people who experience abuse as “survivors.” Advocates and service providers generally prefer the term “survivors” because it conveys more empowerment than the term “victims.” See, e.g., The Survivor’s Handbook, Women’s Aid, https://www.womensaid.org.uk/the-survivors-handbook [https://perma.cc/TXY8-X6BV]; Sexual Assault Kit Initiative (SAKI), RTI International, Victim or Survivor: Terminology from Investigation Through Prosecution, https://sakitta.org/toolkit/docs/Victim-or-Survivor-Terminology-from-Investigation-Through-Prosecution.pdf [https://perma.cc/QW39-TG36]. However, “victim” is useful in legal contexts, and each individual has their own preference. SAKI, supra. Some sources quoted in this piece refer to “victims,” and I do not edit their original language. I also still use “victim-blaming” because it is the formal term. ↑
- Understand Relationship Abuse: Abuse Defined, Nat’l Domestic Violence Hotline, https://www.thehotline.org/is-this-abuse/abuse-defined/ [https://perma.cc/W2J6-9BBF]. This Note relies on the national definition of domestic violence, which does not include family violence such as child abuse, elder abuse, or other non-intimate partner violence. ↑
- See Int’l Ass’n of Chiefs of Police, Intimate Partner Violence Response Policy and Training Guidelines 4 (2017), https://www.theiacp.org/sites/default/files/all/i-j/IACPIntimatePartnerViolenceResponsePolicyandTrainingGuidelines2017.pdf [https://perma.cc/7FGN-D4K2]. ↑
- Phumzile Mlambo-Ngcuka, Violence Against Women and Girls: The Shadow Pandemic, UN Women (Apr. 6, 2020), https://www.unwomen.org/en/news/stories/2020/4/statement-ed-phumzile-violence-against-women-during-pandemic [https://perma.cc/HU4K-DS9F]. ↑
- Int’l Ass’n of Chiefs of Police, supra note 9, at 4. ↑
- Psychologist Evan Stark first penned the concept of coercive control. Evan Stark, Coercive Control: The Entrapment of Women in Personal Life (2007). ↑
- Domestic Abuse Intervention Programs, Power and Control Wheel (2017), https://www.theduluthmodel.org/wp-content/uploads/2017/03/PowerandControl.pdf [https://perma.cc/3JJR-8WZD]. ↑
- Evan Stark & Marianne Hester, Coercive Control: Update and Review, 25 Violence Against Women 81, 83–84 (2019). ↑
- This Note uses gendered pronouns, sometimes referring to abusers as “he” and survivors as “she.” This choice is intended to highlight the frequency of male-perpetrated violence against female survivors. However, domestic violence is committed by and against individuals of all gender identities. ↑
- Molly Dragiewicz & Yvonne Lindgren, The Gendered Nature of Domestic Violence: Statistical Data for Lawyers Considering Equal Protection Analysis, 17 Am. U. J. Gender Soc. Pol’y & L. 229, 256 (2009). ↑
- Id. at 258. ↑
- Id. at 248. For discussion of evidence that IoT-facilitated abuse may be exacerbating the gendered nature of domestic violence, see infra Part II. ↑
- Jane K. Stoever, Enjoining Abuse: The Case for Indefinite Domestic Violence Protection Orders, 67 Vand. L. Rev. 1015, 1025 (2014). ↑
- Brenda Baddam, Note, Technology and Its Danger to Domestic Violence Victims: How Did He Find Me?, 28 Alb. L.J Sci. & Tech. 73, 74 (2017). ↑
- King-Ries, supra note 2, at 136. ↑
- Patricia Tjaden & Nancy Thoennes, Nat’l Inst. of Just., U.S. Dep’t of Just., NCJ 169592, Stalking in America: Findings from the National Violence Against Women Survey 2 (1998), https://www.ncjrs.gov/pdffiles/169592.pdf [https://perma.cc/23AE-XWNR]; see also Stalking/Cyberstalking, Nat’l Network to End Domestic Violence WomensLaw.org, https://www.womenslaw.org/about-abuse/forms-abuse/stalkingcyberstalking [https://perma.cc/M9UD-4Y7X] (explaining that the conduct of stalking may be perpetrated by anyone, but is most often committed by a current or former intimate partner). ↑
- Aily Shimizu, Domestic Violence in the Digital Age: Towards the Creation of a Comprehensive Cyberstalking Statute, 28 Berkeley J. Gender L. & Just. 116, 117 (2013). ↑
- Id. ↑
- Dragiewicz & Lindgren, supra note 16, at 254. ↑
- Baddam, supra note 20, at 74; see also Jacquelyn C. Campbell, Danger Assessment (2019 update), https://www.dangerassessment.org/uploads/DA_NewScoring_2019.pdf [https://perma.cc/BRU9-8SVU] (considering a survivor’s being followed, spied on, or left threatening messages as factors associated with increased risk of homicide). Both the separation-assault phenomenon and the link between stalking and physical assault implicate IoT-facilitated abuse because disconnecting devices is similar to “separation,” and IoT devices can be tools for stalking. See infra Part II. ↑
- King-Ries, supra note 2, at 131. ↑
- Id. at 134–35. ↑
- Id. ↑
- Hadeel Al-Alosi, Cyber-Violence: Digital Abuse in the Context of Domestic Violence, 40 U. New S. Wales L.J. 1573, 1573 (2017). ↑
- BWJP, Domestic Violence and Technology: New International Research and Resources for Practice, at 3:40–:45, Vimeo (Oct. 9, 2019), https://vimeo.com/365803650 [https://perma.cc/6BS6-KFZ7] (presentation by Molly Dragiewicz and Bridget Harris); see also Molly Dragiewicz, Jean Burgess, Ariadna Matamoros-Fernández, Michael Salter, Nicolas P. Suzor, Delanie Woodlock & Bridget Harris, Technology Facilitated Coercive Control: Domestic Violence and the Competing Roles of Digital Media Platforms, 18 Feminist Media Stud. 609 (2018). ↑
- Bridget A. Harris & Delanie Woodlock, Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies, 59 Brit. J. Criminology 530, 530 (2019). ↑
- See, e.g., Lopez-Neira et al., supra note 5, at 23. ↑
- King-Ries, supra note 2, at 138; Baddam, supra note 20, at 77. ↑
- Lopez-Neira et al., supra note 5, at 23. ↑
- Al-Alosi, supra note 30, at 1585–86, 1590. ↑
- Abuse Goes Digital, Res. Ctr. Newsletter (Res. Ctr. on Domestic Violence: Child Prot. & Custody, Reno, Nev.), Oct. 2019, https://www.rcdvcpc.org/images/blog/201910_-_Technology_Abuse.pdf [https://perma.cc/ZU6C-6XC2]. ↑
- Harris & Woodlock, supra note 32, at 532. ↑
- See, e.g., Reis Thebault, A Woman’s Stalker Used an App that Allowed Him to Stop, Start and Track Her Car, Wash. Post (Nov. 6, 2019, 11:40 PM), https://www.washingtonpost.com/technology/2019/11/06/womans-stalker-used-an-app-that-allowed-him-stop-start-track-her-car/ [https://perma.cc/MFW4-XJVX] (discussing that location-tracking technologies are becoming more common and mentioning a widespread “stalkerware surveillance market” for spyware trackers). ↑
- Baddam, supra note 20, at 78. ↑
- Id. at 80. ↑
- Id. at 82. ↑
- S.2270, 114th Cong. (2015). The first iteration of the bill was introduced in 2014. Location Privacy Protection Act of 2014, S. 2171, 113th Cong. The Vice President of NNEDV, Cindy Southworth, testified at the hearing regarding the importance of location privacy and of transparency for domestic violence survivors. See Location Privacy Protection Act of 2014: Hearing Before the Subcomm. on Privacy, Tech., & the L. of the S. Comm. on the Judiciary, 113th Cong. 24–33 (2014) (statement of Cindy Southworth, Vice President of Development and Innovation, NNEDV). ↑
- Baddam, supra note 20, at 88. ↑
- S.2270 - Location Privacy Protection Act of 2015, Congress.gov https://www.congress.gov/bill/114th-congress/senate-bill/2270 [https://perma.cc/46F5-R67F]. ↑
- Al-Alosi, supra note 30, at 1582; Shimizu, supra note 23, at 117. ↑
- Shannan Catalano, Bureau of Just. Stats., U.S. Department of Just., NCJ 224527, Stalking Victims in the United States – Revised 1 (2012), https://www.bjs.gov/content/pub/pdf/svus_rev.pdf [https://perma.cc/4QFA-DQWR]. ↑
- Baddam, supra note 20, at 83. ↑
- Al-Alosi, supra note 30, at 1578. ↑
- Harris & Woodlock, supra note 32, at 538. ↑
- Al-Alosi, supra note 30, at 1578. ↑
- See id. at 1573; Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart & Nicola Dell, “A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology, 2018 Proc. CHI Conf. on Hum. Factors in Computing Sys., no. 1, at 1, 9. ↑
- King-Ries, supra note 2, at 131. ↑
- Id. at 132. ↑
- Id. at 157. ↑
- Id. at 154. ↑
- Meola, supra note 6. ↑
- Internet of Things (IoT), Nat’l Network to End Domestic Violence, https://www.techsafety.org/iot-evidence [https://perma.cc/4RZ9-YWYW]. ↑
- Id. ↑
- See How Do Smart Switches Work, iDisrupted (Jan. 14, 2019), https://idisrupted.com/how-do-smart-light-switches-work/ [https://perma.cc/YB4K-W52V]. ↑
- Meola, supra note 6. ↑
- See Univ. Coll. London, Tech Abuse (2018), https://www.ucl.ac.uk/steapp/sites/steapp/files/gender-iot-tech-abuse.pdf [https://perma.cc/YJ6L-WMUD]; Lopez-Neira et al., supra note 5, at 22, 23. ↑
- John Naughton, Opinion, The Internet of Things Has Opened Up a New Frontier of Domestic Abuse, Guardian (July 1, 2018, 2:00 AM), https://www.theguardian.com/commentisfree/2018/jul/01/smart-home-devices-internet-of-things-domestic-abuse [https://perma.cc/N5VQ-XLLR]. ↑
- Meola, supra note 6. ↑
- Id. ↑
- Univ. Coll. London, supra note 62; Lopez-Neira et al., supra note 5, at 23. ↑
- Internet of Things (IoT), supra note 58. ↑
- For more information about the project’s plan and outcomes, see Implications of the Internet of Things (IoT) on Victims of Gender-Based Domestic Violence and Abuse, Univ. Coll. London, https://www.ucl.ac.uk/research/domains/collaborative-social-science/social-science-plus/IOT-and-domestic-violence [https://perma.cc/PM2Z-ZZ7W]. ↑
- Heidi Vella, IoT Devices and Smart Domestic Abuse: Who Has the Controls?, E&T Mag. (June 20, 2018), https://eandt.theiet.org/content/articles/2018/06/iot-devices-and-smart-domestic-abuse-who-has-the-controls [https://perma.cc/4AJ9-J28M] ↑
- Id. (quoting Dr. Leonie Tanczer). ↑
- Nellie Bowles, Thermostats, Locks, and Lights: Digital Tools of Domestic Abuse, N.Y. Times (June 23, 2018), https://www.nytimes.com/2018/06/23/technology/smart-home-devices-domestic-abuse.html [https://perma.cc/BWS9-T5S2]. ↑
- Id. ↑
- Lopez-Neira et al., supra note 5, at 25. ↑
- Alex Riley, How Your Smart Home Devices Can Be Turned Against You, BBC Future (May 11, 2020), https://www.bbc.com/future/article/20200511-how-smart-home-devices-are-being-used-for-domestic-abuse [https://perma.cc/8M8K-HE9W]. ↑
- Id. ↑
- Jealous Husband Used Wall-Mounted iPad in his ‘Smart Home’ to Spy on Estranged Wife, Court Hears, Telegraph (May 10, 2018, 3:20 PM), https://www.telegraph.co.uk/news/2018/05/10/smart-home-stalker-jealous-husband-used-wall-mounted-ipad-heating/ [https://perma.cc/LN4A-AG2J]. ↑
- Id. ↑
- Naughton, supra note 63. ↑
- Id. ↑
- See Thebault, supra note 39. ↑
- Freed et al., supra note 52, at 6. ↑
- Shimizu, supra note 23, at 129–30. ↑
- See Meola, supra note 6 (describing how remote-control capabilities are a defining feature of IoT devices). ↑
- Hogue v. Hogue, 224 Cal. Rptr. 3d 651 (2017) (vacating order quashing service on estranged husband who after a history of physical abuse posted a mock suicide video on his wife’s Facebook page, leading her to petition for a restraining order). ↑
- See, e.g., Internet of Things (IoT), supra note 58. ↑
- Id. ↑
- King-Ries, supra note 2, at 142. ↑
- Virginia v. Black, 538 U.S. 343, 359 (2003). ↑
- United States v. Alvarez, 567 U.S. 709, 717 (2012) (citations omitted). ↑
- United States v. Osinger, 753 F.3d 939, 940–42 (9th Cir. 2014). For further discussion of the Interstate Stalking Punishment and Prevention Act, see infra notes 169–171 and accompanying text. ↑
- Id. at 947 (citation omitted). ↑
- See, e.g., id. (text messages and emails); United States v. Petrovic, 701 F.3d 849, 852–56 (8th Cir. 2012) (text messages and a website); United States v. Shrader, No. 1:09–0270, 2010 WL 2179572, at 1 & n.1, 4–5 (S.D. W. Va. Apr. 7, 2010) (magistrate report and recommendation), adopted, 2010 WL 2179570 (S.D. W. Va. May 26, 2010), aff’d, 675 F.3d 300 (4th Cir. 2012) (phone calls). ↑
- Shimizu, supra note 23, at 118; Al-Alosi, supra note 30, at 1578; Harris & Woodlock, supra note 32, at 538. ↑
- Bowles, supra note 71. ↑
- Id. ↑
- Challenging the Myths, Women’s Aid, https://www.womensaid.org.uk/information-support/what-is-domestic-abuse/myths/ [https://perma.cc/M2G7-68AG]; see also Why People Stay, Nat’l Domestic Violence Hotline, https://www.thehotline.org/is-this-abuse/why-do-people-stay-in-abusive-relationships/ [https://perma.cc/K9LX-XBZ9] (discussing how asking survivors “why” they do not leave or “why” they stay implies that they had a real choice between leaving and staying). ↑
- Barriers include financial dependency, fear or shame, cultural and language barriers, children, and more. Id. ↑
- Harris & Woodlock, supra note 32, at 539. ↑
- See Naughton, supra note 63 (stating that men purchase and install the majority of IoT devices). ↑
- See Why People Stay, supra note 96. ↑
- Harris & Woodlock, supra note 32, at 540. ↑
- Id. ↑
- Id. ↑
- Baddam, supra note 20, at 80–81. ↑
- Harris & Woodlock, supra note 32, at 540. ↑
- Domestic Abuse Intervention Programs, supra note 13. ↑
- Id. ↑
- See What is Gaslighting?, Nat’l Domestic Violence Hotline (May 19, 2014), https://www.thehotline.org/2014/05/29/what-is-gaslighting/ [https://perma.cc/K6XC-PHG7]. The term comes from a 1938 play called Gas Light in which a husband attempts to drive his wife crazy by dimming the lights in their home and then denying that the light changed when his wife points it out. Id. The play was adapted into a movie starring Charles Boyer and Ingrid Bergman. Gaslight (Metro-Goldwyn-Mayer 1944). ↑
- What is Gaslighting?, supra note 108. ↑
- See Thebault, supra note 39 (“What we know, what we’ve always known, is that abusers and perpetrators will use any tactic and tool they can access in order to perpetrate harassment and abuse. . . . These are modern forms of old tactics and behaviors.” (quoting Erica Olsen, director of NNEDV’s Safety Net Project)). ↑
- Harris & Woodlock, supra note 32, at 539. ↑
- Jane Anderson & Kaofeng Lee, The Internet & Intimate Partner Violence: Technology Changes, Abuse Doesn’t, Strategies (AEquitas, Washington, D.C.), Jan. 2017, at 1, 4, https://aequitasresource.org/wp-content/uploads/2018/09/The-Internet-and-Intimate-Partner-Violence-Technology-Changes-Abuse-Does-Not-Issue16.pdf [https://perma.cc/D94J-TB2W]. ↑
- Id. ↑
- See Bowles, supra note 71. Many of the women from The New York Times investigation came “from wealthy enclaves where [smart] technology has taken off.” Id. It is likely that, when the law requires physical abuse, wealthy abusers who have greater access to technology may escape accountability for controlling, monitoring, and harassing survivors while less wealthy abusers cannot. ↑
- Al-Alosi, supra note 30, at 1593. ↑
- Harris & Woodlock, supra note 32, at 541. ↑
- The World Health Organization (WHO) defines “femicide” as “the murder of a woman” because she is a woman. World Health Organization, Understanding and Addressing Violence Against Women: Femicide 1 (2012), https://apps.who.int/iris/bitstream/handle/10665/77421/WHO_RHR_12.38_eng.pdf [https://perma.cc/6QUW-52KH]. The definition is broad and includes both intimate femicide and non-intimate femicide, but the WHO notes that a large proportion of femicides are committed by current or former partners from violent relationships. Id. ↑
- Phillip J. Resnick, Stalking Risk Assessment, in Stalking 61, 71 (Debra A. Pinals ed., 2007). ↑
- Id. ↑
- M. Dragiewicz, Austl. Commc’ns Consumer Action Network, Technology and Domestic Violence: Australian Survivors’ Experiences (2019), https://accan.org.au/Domestic%20Violence%20and%20Communications%20Technology%20survivor%20exp%20infographic%2020190801.pdf [https://perma.cc/9LHR-8J9V]. ↑
- See Bowles, supra note 71. This escalation likely occurs because abusers can tell when a device is uninstalled and will feel a loss of control over their victim, and exerting control is their goal in misusing the devices in the first place. Thus, as discussed in Part III, it might be safer for survivors to learn how to safely use such devices and to avail themselves of legal remedies informed by tech abuse, rather than to be asked to disconnect from technology. ↑
- See Stoever, supra note 19, and related discussion on the “separation assault” phenomenon. ↑
- For a discussion of various civil and criminal laws that could be relevant in the context of IoT-facilitated abuse, but that do not explicitly mention IoT devices, see Parts III.B, III.C. IoT device law has slowly started to develop in the area of privacy and cybersecurity, with California being the first state to enact such legislation. Act of Sept. 28, 2018, ch. 860, 2018 Cal. Stat. 5573 (codified at Cal Civ. Code § 1798.91.04–.06 (West 2020)) (requiring manufacturers to equip “connected devices” with certain security features). However, no IoT law currently exists that governs misuse by abusers. ↑
- Charlotte Webb, What Happens When the Internet of Things Becomes an Accomplice in Domestic Abuse?, Adobe XD Ideas (May 27, 2020), https://xd.adobe.com/ideas/perspectives/social-impact/internet-accomplice-domestic-abuse/ [https://perma.cc/AQ56-4G46] (describing three typical stages of domestic abuse). ↑
- Off. on Violence Against Women, Domestic Violence, U.S. Dep’t of Just., https://www.justice.gov/ovw/domestic-violence [https://perma.cc/SN65-KWY5]. ↑
- Off. on Violence Against Women, Domestic Violence, U.S. Dep’t of Just., https://web.archive.org/web/20180409111243/https:/www.justice.gov/ovw/domestic-violence. ↑
- Police Improve Response to Domestic Violence, but Abuse Often Remains the ‘Hidden Crime,’ Subject to Debate (Police Exec. Rsch. F., Washington, D.C.), Jan./Feb. 2015, at 1, 2, https://www.policeforum.org/assets/docs/Subject_to_Debate/Debate2015/debate_2015_janfeb.pdf [https://perma.cc/YZY5-FNZH]. ↑
- Int’l Ass’n of Chiefs of Police, supra note 9, at 8. ↑
- Id. ↑
- Anderson & Lee, supra note 112, at 8. ↑
- Id. at 1. ↑
- Camille Carey, Domestic Violence Torts: Righting a Civil Wrong, 62 Kan. L. Rev. 695, 696 (2014). ↑
- Id. ↑
- Id. ↑
- Shimizu, supra note 23, at 128. ↑
- Act of Sept. 29, 1993, ch. 582, 1993 Cal. Stat. 2879, § 1 (codified as amended at Cal. Civ. Code § 1708.7 (West 2020)). ↑
- Act of Sept. 25, 1998, ch. 825, 1998 Cal. Stat. 5160, § 2. ↑
- Act of Sept. 30, 2014, ch. 853, 2014 Cal. Stat. 5598, § 1. ↑
- Cal. Civ. Code § 1708.7(a)(1). ↑
- Id. § 1708.7(b)(6). ↑
- Carey, supra note 132, at 702. ↑
- Merle H. Weiner, Domestic Violence and the Per Se Standard of Outrage, 54 Md. L. Rev. 183, 188 (1995). ↑
- Id. at 211, 221. ↑
- See Carey, supra note 132, at 724 (discussing how spousal immunity is applied to intentional torts in some states that retained the doctrine). ↑
- Stoever, supra note 19, at 1019. ↑
- Id. Note that if a victim’s state has no specific restraining order for stalking or she does not qualify for a DVRO, she still may be able to get one from a criminal court if the stalker is arrested and charged. Stalking/Cyberstalking, supra note 22. ↑
- Shimizu, supra note 23, at 121. ↑
- Id. ↑
- Stoever, supra note 19, at 1018. ↑
- In Ohio and Washington, cyberstalking becomes a felony if the perpetrator is subject to a protection order, and in Washington, the victim does not even have to be the individual protected under the order. See Ohio Rev. Code Ann. § 2903.211(B)(2)(g) (West 2020); Wash. Rev. Code Ann. § 9.61.260(3)(a) (2020). ↑
- See, e.g., Md. Code Ann., Fam. Law § 4-506(d) (West 2020) (permitting relief from harassment but not mentioning stalking or cyberstalking at all). ↑
- Al-Alosi, supra note 30, at 1587. ↑
- Id. at 1593. ↑
- See, e.g., Cal. Fam. Code §§ 6203, 6320(a) (2020) (establishing that courts may enjoin abusive contact made either directly or indirectly, including—with reference to provisions of the California Penal Code—by electronic means); id. § 6203. ↑
- Shimizu, supra note 23, at 127–28. ↑
- See Violent Crime Control and Law Enforcement Act of 1994, Pub. L. No. 103-322, § 40302(c), 108 Stat. 1796, 1941 (codified at 34 U.S.C. § 12361(c)), declared unconstitutional by United States v. Morrison, 529 U.S. 598 (2000). ↑
- 529 U.S. 598, 618 (2000) (holding that gender-motivated crimes of violence were not an economic activity and did not substantially affect interstate commerce). ↑
- Caroline S. Schmidt, Note, What Killed the Violence Against Women Act’s Civil Rights Remedy Before the Supreme Court Did?, 101 Va. L. Rev. 501, 524–26 (2015) (quoting statements from National Organization of Women leader Sally Goldfarb and from then-Senator Joseph R. Biden at a 1990 congressional hearing, and demonstrating that the primary purpose of the civil cause of action was to declare that the government considered violence against women a crime). ↑
- Shimizu, supra note 23, at 128. ↑
- Al-Alosi, supra note 30, at 1603. ↑
- Angela Davis, The Color of Violence Against Women, COLORLINES (Oct. 10, 2000), https://www.colorlines.com/articles/color-violence-against-women [https://perma.cc/77EU-NASP]. ↑
- Id. ↑
- Now known as INCITE! Women, Gender Non-Conforming, and Trans People of Color Against Violence. ↑
- CR10 Publ’ns Collective, Abolition Now! 15–16, 21 (2008) (reproducing a 2001 statement). ↑
- Id. at 15, 21. ↑
- Julie Goldscheid et al., CUNY Sch. of L. et al., Responses from the Field: Sexual Assault, Domestic Violence, and Policing (2015), https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=1075&context=cl_pubs [https://perma.cc/Q4BM-U23D]. ↑
- Id. at 1. ↑
- Id. at 1–2. For further discussion of how police officers minimize the experiences of survivors who report abuse, see supra Part II.B. ↑
- National Defense Authorization Act for Fiscal Year 1997, Pub. L. No. 104-201, § 1069(a), 110 Stat. 2422, 2655 (1996) (codified as amended at 18 U.S.C. § 2261A). ↑
- Violence Against Women Reauthorization Act of 2013, Pub. L. No. 113-4, § 107(b), 127 Stat. 54, 77. ↑
- United States v. Curley, 639 F.3d 50, 58–59 (2d Cir. 2011). ↑
- Baddam, supra note 20, at 85. ↑
- Only Illinois, Louisiana, Michigan, North Carolina, Rhode Island, and Washington had legislation exclusively addressing cyberstalking as of 2007. Naomi Harlin Goodno, Cyberstalking, a New Crime: Evaluating the Effectiveness of Current State and Federal Laws, 72 Mo. L. Rev. 125, 144 (2007). ↑
- See, e.g., Conn. Gen. Stat. § 53a-181 (2019) (maintains a physical pursuit requirement and thus fails to address cyberstalking entirely). ↑
- See, e.g., N.Y. Penal Law § 240.30(a) (McKinney 2020) (covers communications by electronic means but does not include indirect threats or threats through third-party inducement). ↑
- Shimizu, supra note 23, at 120. ↑
- Id. at 120–21. ↑
- See Act of July 23, 2014, ch. 184, 2014 N.Y. Laws 922 (codified at N.Y. Penal Law § 120.45); Press Release, Timothy M. Kennedy, N.Y. State Senate, Governor Cuomo Signs Jackie’s Law, Authored by Senator Kennedy and Assemblywoman Peoples-Stokes, to Crack Down on GPS Stalking and Domestic Violence (July 23, 2014), https://www.nysenate.gov/newsroom/press-releases/timothy-m-kennedy/governor-cuomo-signs-jackies-law-authored-senator-kennedy [https://perma.cc/S5HM-PQGZ]. ↑
- Mich. Comp. Laws Ann. § 750.411h(1)(c) (West 2020). ↑
- Id. § 750.411h(1)(e). ↑
- Abuse Using Technology, Nat’l Network to End Domestic Violence: WomensLaw.org, https://www.womenslaw.org/about-abuse/abuse-using-technology/all [https://perma.cc/7W3C-JA6U]. ↑
- Id. (stating that electronic surveillance laws “could” apply, or “perhaps” may apply—thus implying that they also may not apply). ↑
- 18 U.S.C. § 2511. ↑
- For a fifty-state survey of recording statutes, see JUSTIA, Recording Calls and Conversations (2018), https://www.justia.com/documents/50-state-surveys-recording-calls-and-conversations.pdf [https://perma.cc/LWP9-Z845]. ↑
- See, e.g., Flanagan v. Flanagan, 41 P.3d 575, 576–77 (Cal. 2002) (endorsing the standard that a conversation is confidential if “a party to that conversation has an objectively reasonable expectation that the conversation is not being overheard or recorded”); Malpas v. State, 695 A.2d 588, 595 (Md. Ct. Spec. App. 1997) (endorsing a similar standard). ↑
- Mich. Comp. Laws § 750.539d(1)(a) (2020). ↑
- Restatement (Second) of Torts §§ 652A–652I (1977) (reciting four categories of protected interests: protection from unreasonable intrusion upon one’s seclusion, from appropriation of one’s name or likeness, from unreasonable publicity given to one’s private life, and from publicity which unreasonably places one in a false light before the public). ↑
- Frequently Asked Questions, Cyber Civ. Rts. Initiative, https://www.cybercivilrights.org/faqs/ [https://perma.cc/VY6Q-NS4V] (explaining that the term is misleading because the focus should be on the distribution of the images rather than the motivation of the abuser for revenge, as many other motives can be at play; in tech abuse, the motive could also be to assert power and control). ↑
- For a compilation of the relevant criminal code sections in each state and territory, see 46 States + DC + One Territory Now Have Revenge Porn Laws, Cyber Civ. Rts. Initiative, https://www.cybercivilrights.org/revenge-porn-laws/ [https://perma.cc/EW9E-F9XG]. ↑
- Jillian Roffer, Nonconsensual Pornography: An Old Crime Updates Its Software, 27 Fordham Intell. Prop. Media & Ent. L.J. 935, 938 (2017). New Jersey is a state that revised its existing statute. See, e.g., N.J. Stat. Ann. § 2C:14-9(c) (West 2020) (including revenge porn law in invasion of privacy statute). States that enacted new statutes include California, Florida, and North Carolina. Cal. Penal Code § 647 (West 2020) (California’s “disorderly conduct” statute); Fla. Stat. § 784.049 (2020) (Florida’s “sexual cyberharassment” statute); N.C. Gen. Stat. § 14-190.5A (2019) (North Carolina’s “disclosure of private images” statute). Whereas Louisiana classifies the distribution of revenge porn as a felony, Connecticut treats it as a class A misdemeanor. Compare La. Stat. Ann. § 14:283.2 (West 2020), with Conn. Gen. Stat. § 53a-189c (2019). ↑
- See, e.g., Ariz. Rev. Stat. Ann. § 13-1425 (2020) (requiring intent to harm, harass, intimidate, threaten, or coerce the depicted person); D.C. Code § 22-3052 (2020) (requiring intent to harm the person depicted or to receive financial gain). ↑
- 720 Ill. Comp. Stat. Ann. 5/11-23.5 (2020); see also Barbara Herman, Illinois Passes Revenge Porn Law with Teeth: ‘Other States Should Copy,’ Says Privacy Lawyer, Int’l Bus. Times (Jan. 6, 2015), https://www.ibtimes.com/illinois-passes-revenge-porn-law-teeth-other-states-should-copy-says-privacy-lawyer-1774974 [https://perma.cc/H4EQ-C3CE]. ↑
- For example, in California, courts do not require survivors to prove additional abuse but still require them to explain “why [they] are afraid of abuse in the future.” See Cal. Fam. Code § 6345(a) (West 2020); Jud. Counsel of Cal., Form DV-700: Request to Renew Restraining Order (2012), https://www.courts.ca.gov/documents/dv700.pdf [https://perma.cc/RR4P-7T84]. In Oregon, the abuser has the right to request a court hearing to fight a grant of renewal. Or. Rev. Stat. § 107.725(4) (2019). In Texas, the renewal filing must describe what the abuser did to place the survivor in “fear of imminent . . . harm.” Tex. Fam. Code Ann. § 82.0085(a)(2) (West 2020). ↑
- Leigh Goodmark, Law Is the Answer? Do We Know That for Sure?: Questioning the Efficacy of Legal Interventions for Battered Women, 23 St. Louis U. Pub. L. Rev. 7, 28, 30, 35 (2004). Mandatory arrest policies require police responding to a 911 call to make an arrest when they have probable cause to believe a person committed an act of domestic violence. Ctr. for Rsch. on Violence Against Women, Univ. of Ky., Top Ten Things Advocates Need to Know: Question 5: What Is The Impact of Mandatory Arrest Laws on Intimate Partner Violence Victims and Offenders? 1 (2011), https://opsvaw.as.uky.edu/sites/default/files/05_Mandatory_Arrest.pdf [https://perma.cc/8BBZ-K7BE]. They are not allowed to ask the apparent victim whether she wants to press charges or have the apparent perpetrator arrested—this is why advocates argue that the criminal legal system deprives women of agency. See id. at 1–3. Some states do not have laws for primary offenders, which leads to high rates of dual arrests when the police cannot discern who the primary offender is. See David Hirschel, Domestic Violence Cases: What Research Shows About Arrest and Dual Arrest Rates tbl.1 (2008), https://www.ncjrs.gov/pdffiles1/nij/222679.pdf [https://perma.cc/Z6FC-RR7X]. A few states have “preferred arrest” policies, under which arrest is still the preferred response, but officers are not obligated to make an arrest. See id. tbl.2. ↑
- See Davis, supra note 161; CR10 Publ’ns Collective, supra note 164; Goldscheid et al., supra note 166, at 1–2. ↑
- See supra note 125 and accompanying text. ↑
- Domestic Abuse Intervention Programs, supra note 13. ↑
- See supra Part I.B (discussing teens and the challenges posed by their increasing reliance on technology). ↑
- BWJP, supra note 31, at 48:40–50:52 (presentation by Rachel Gibson). ↑
- Elinor Jordan & Sarah Prout Rennie, Supporting Victims of Technology-Facilitated Abuse, Mich. Bar J., July 2019, at 34, 34–35. ↑
- Technology Safety, Nat’l Network to End Domestic Violence, https://nnedv.org/content/technology-safety/ [https://perma.cc/46AZ-PHP3]. ↑
- Id. ↑
- Id. ↑
- BWJP, supra note 31, at 31:02–:16 (presentation by Rachel Gibson). ↑
- Leonie Tanczer, Isabel Lopez-Neira, Trupti Patel, Simon Parkin, &George Danezis, Univ. College London, Gender and IoT (G-IoT) Resource List (2019), https://www.ucl.ac.uk/steapp/sites/steapp/files/g-iot-resource-list.pdf [https://perma.cc/VHF2-GWMD]. ↑
- Id. ↑
- See Jane K. Stoever, Mirandizing Family Justice, 39 Harv. J.L. & Gender 189, 200 (2016); About Family Justice Centers, Fam. Just. Ctr. All., https://www.familyjusticecenter.org/affiliated-centers/family-justice-centers-2/ [https://perma.cc/P77A-W5VE] (last visited July 22, 2020). ↑
- Stoever, supra note 207, at 201. ↑
- Id. at 203. ↑
- Melanie Lefkowitz, New Tools Help Detect Digital Domestic Abuse, Cornell Chron. (Aug. 13, 2019), https://news.cornell.edu/stories/2019/08/new-tools-help-detect-digital-domestic-abuse [https://perma.cc/XB2W-A6NU]. ↑
- Id. ↑
- Alex Roslin, Police Wife: The Secret Epidemic of Police Domestic Violence 6–7 (2015). ↑
- Id. at 92. ↑
- Sarah Cohen, Rebecca R. Ruiz & Sarah Childress, Departments Are Slow to Police Their Own Abusers, N.Y. Times (Nov. 23, 2013), http://www.nytimes.com/projects/2013/police-domestic-abuse/index.html [https://perma.cc/EL3U-49NY]. The authors investigated Florida because the state has one of the most robust open records laws in the United States. Id. ↑
- Nat’l Ctr. on Domestic & Sexual Violence, Power and Control: Police Perpetrated Domestic Violence (2004), http://www.ncdsv.org/images/Police-perpetrateddomviolNOSHADING.pdf [https://perma.cc/H9CN-9TY8]. ↑
- Creative Interventions, Creative Interventions Toolkit: A Practical Guide to Stop Interpersonal Violence S5–S6 (2020), https://www.creative-interventions.org/wp-content/uploads/2020/08/CI-Toolkit-Final-ENTIRE-Aug-2020.pdf [https://perma.cc/T6BR-PJS6]. ↑
- generationFIVE, Toward Transformative Justice: A Liberatory Approach to Child Sexual Abuse and Other Forms of Intimate and Community Violence 5 (2007), http://www.generationfive.org/wp-content/uploads/2013/07/G5_Toward_Transformative_Justice-Document.pdf [https://perma.cc/Z8AE-PR9S]. ↑
- INCITE! Women, Gender Non-Conforming, and Trans People of Color Against Violence, Organizing for Community Accountability (2012), http://www.usprisonculture.com/blog/wp-content/uploads/2012/03/commaccountabilityincite.pdf [https://perma.cc/R6KT-6RYH]. ↑
- Id. ↑
- See Al-Alosi, supra note 30, at 1603. ↑
- Jane Hereth & Chez Rumpf, Community Accountability for Survivors of Sexual Violence Toolkit 1 (2014), https://carceralfeminism.files.wordpress.com/2014/04/cassv-reading-group-toolkit_shifting-from-carceral-to-tj-feminisms_final.pdf [https://perma.cc/DA4P-4J63]. ↑
- See Creative Interventions, supra note 216. ↑
- Organizing Resources for StoryTelling and Interventions, Creative Interventions, http://www.stopviolenceeveryday.org/creative-interventions/ [https://perma.cc/Z2TX-XN25]. ↑
- Creative Interventions, supra note 216, section 4C, at 4, 19. ↑
- Indeed, there is a reported instance where a victim of tech abuse repeatedly took her smartphone to the police to scan it for spyware and was told that nothing was there, then later took it to her employer’s IT department and discovered spyware. Phoebe Braithwaite, Smart Home Tech Is Being Turned into a Tool for Domestic Abuse, Wired (July 22, 2018), https://www.wired.co.uk/article/internet-of-things-smart-home-domestic-abuse [https://perma.cc/69JS-TRKH]. This illustrates that a specialist in a victim’s community can be more equipped to respond to abuse. ↑
- Creative Interventions, supra note 216, section 4F, at 55–57. ↑
- Incarceration, Sent’g Project, https://www.sentencingproject.org/issues/incarceration/ [https://perma.cc/9GPU-5934] (click + sign at bottom of main “ISSUES” box). ↑
- BWJP, supra note 31, at 31:17–32:18 (presentation by Rachel Gibson). ↑
- Al-Alosi, supra note 30, at 1602. The most recent version of the guide, from 2019, is available at https://nnedv.org/wp-content/uploads/2019/07/Library_TH_2018_Privacy_Safety_Facebook_Guide_Survivors_Abuse.pdf [https://perma.cc/S6QU-5PQC]. ↑
- Braithwaite, supra note 225. ↑
- Webb, supra note 124. ↑
- Id. UX stands for “user experience,” and refers to the process of designing products that provide “meaningful and relevant experiences to users,” including via branding, design, usability, and function. User Experience (UX) Design, Interaction Design Found., https://www.interaction-design.org/literature/topics/ux-design [https://perma.cc/6G4T-ZC64]. ↑
- FAQs about the Wheels, Domestic Abuse Intervention Programs, https://www.theduluthmodel.org/wheels/faqs-about-the-wheels/ [https://perma.cc/ZXX9-P2UD]. ↑
- See Stark, supra note 12. ↑
- Thebault, supra note 39. ↑