How to deal with online harassment and threats: Difference between revisions

From TCU Wiki
Kristin1 (talk | contribs)
correcting formatting
Kristin1 (talk | contribs)
updated links and formatting
Line 1: Line 1:
<h1>Abusers and their tactics</h1>
<h1>Abusers and their tactics</h1>
<p>Watch this video to get an understanding of the strategies used and the reason abusers use them: <a href="https://www.youtube.com/watch?v=RJR466zSUhs" target="_blank" rel="noopener">https://www.youtube.com/watch?v=RJR466zSUhs</a></p>
<p>Watch [https://www.youtube.com/watch?v=RJR466zSUhs this video] to get an understanding of the strategies used and the reason abusers use them.</p>
<h3>Identifying common tactics</h3>
<h3>Identifying common tactics</h3>
<div class="vert vert-0" data-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500">
<div class="vert vert-0" data-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500">
     <div class="xblock xblock-student_view xblock-student_view-html xmodule_display xmodule_HtmlBlock xblock-initialized" data-course-id="course-v1:IWMF+IWMF_OH_EN+001" data-mark-completed-on-view-after-delay="0" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500" data-request-token="f8d8a73aabac11edabc80242ac12000e" data-graded="True" data-has-score="False">
     <div class="xblock xblock-student_view xblock-student_view-html xmodule_display xmodule_HtmlBlock xblock-initialized" data-course-id="course-v1:IWMF+IWMF_OH_EN+001" data-mark-completed-on-view-after-delay="0" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500" data-request-token="f8d8a73aabac11edabc80242ac12000e" data-graded="True" data-has-score="False">
         <p>Targets need a common language to describe what&rsquo;s happening to them, to friends, colleagues, editors, and law enforcement. You will learn more about how to define these tactics in the next exercise. You may find that abusers often use a combination of tactics to silence you online.</p>
         <p>Targets need a common language to describe what&rsquo;s happening to them, to friends, colleagues, editors, and law enforcement. You will learn more about how to define these tactics in the next exercise. You may find that abusers often use a combination of tactics to silence you online.</p>
         <p><strong>Below are some common tactics and their definitions</strong>. Take a minute to read them through.</p>[[File:Image-common-tactics.png|border]]<h3>More on doxxing</h3>
         <p>Below are some common tactics and their definitions. Take a minute to read them through.</p>[[File:Image-common-tactics.png|border]]<h3>More on doxxing</h3>
         <p>Doxxing is a tactic used by online abusers as a way to intimidate and threaten journalists. Personal details, including a home address, are posted online with a call to others to use that information to harass and cause harm.</p>
         <p>Doxxing is a tactic used by online abusers as a way to intimidate and threaten journalists. Personal details, including a home address, are posted online with a call to others to use that information to harass and cause harm.</p>
         <p>This is a common tactic used by the far right as well as by members of certain interest groups, such as pro-life supporters. Having your home address circulated online by trolls means that an online attack has the possibility to turn into a physical threat as people now know where you live.</p>
         <p>This is a common tactic used by the far right as well as by members of certain interest groups, such as pro-life supporters. Having your home address circulated online by trolls means that an online attack has the possibility to turn into a physical threat as people now know where you live.</p><p><strong>Protecting against doxxing</strong></p><p>There are steps you can take to remove and limit access to your personal information on the Internet. This will help to better protect you against doxxing. Learn more about this in the Totem course on [https://learn.totem-project.org/courses/course-v1:Totem+TP_IO_EN+001/about How to protect your identity online].</p></div>
        <section style="border: 2px; border-style: solid; border-color: #66cc99; padding: 1em;"><strong>Protecting against doxxing</strong>
            <p>There are steps you can take to remove and limit access to your personal information on the Internet. This will help to better protect you against doxxing. Learn more about this in the Totem course on <a class="inline_disabled" href="https://learn.totem-project.org/courses/course-v1:Totem+TP_IO_EN+001/about" target="_blank" rel="noopener">Public and Personal Persona</a>.</p>
        </section>
    </div>
</div>
</div>
<p><strong>Mental health</strong></p>
<p><strong>Mental health</strong></p>
Line 25: Line 21:
<p>It can be important to document the abuse you are receiving online, especially if you feel there is a threat to your life. <strong>You should keep an evidence trail</strong> to show your colleagues, editors or the authorities. This information can also be presented to international organizations who assist journalists, and they may be able to help you with your case.</p>
<p>It can be important to document the abuse you are receiving online, especially if you feel there is a threat to your life. <strong>You should keep an evidence trail</strong> to show your colleagues, editors or the authorities. This information can also be presented to international organizations who assist journalists, and they may be able to help you with your case.</p>
<p><strong>Keep a spreadsheet with details of the harassment</strong>, including date, time and type of harassment. Include the medium through which the abuse happened, for example, direct message, and also note down the platform.</p>
<p><strong>Keep a spreadsheet with details of the harassment</strong>, including date, time and type of harassment. Include the medium through which the abuse happened, for example, direct message, and also note down the platform.</p>
<p><strong>Take screenshots of the abuse</strong>. Ensure that you include, where possible, the name or handle of the abuser, the date and time, and the full content of the abuse. <strong>It&rsquo;s important to capture the whole message, the date, the name, and the handle/account name when collecting evidence about your abusers.</strong> This will become important if you decide to contact the authorities or an organization that defends freedom of expression about your case.&nbsp;</p>
<p><strong>Take screenshots of the abuse</strong>. Ensure that you include, where possible, the name or handle of the abuser, the date and time, and the full content of the abuse. <strong>It&rsquo;s important to capture the whole message, the date, the name, and the handle/account name when collecting evidence about your abusers.</strong> This will become important if you decide to contact the authorities or an organization that defends freedom of expression about your case.</p>
<p>You may wish to <strong>ask someone to help you</strong> do this if the abuse is taking its toll on your mental health. For example, ask a colleague to monitor your social media accounts and enlist their help in taking screenshots of the abuse.</p>
<p>You may wish to <strong>ask someone to help you</strong> do this if the abuse is taking its toll on your mental health. For example, ask a colleague to monitor your social media accounts and enlist their help in taking screenshots of the abuse.</p>
<section style="border: 2px; border-style: solid; border-color: #66cc99; padding: 1em;"><strong>Documenting an attack</strong>
<strong>Documenting an attack</strong>
    <p><br />Before you start working on a story, <strong>think about the groups of people who could attack you</strong> online as a result of publishing a story. Take steps to secure your data and your accounts.</p>
 
    <p>For guidance, take these free online Totem courses: <a href="https://learn.totem-project.org/courses/course-v1:Totem+TP_SP_001+course/about" target="_blank" rel="noopener">Secure Passwords</a> and <a href="https://learn.totem-project.org/courses/course-v1:Totem+TP_PM_001+course/about" target="_blank" rel="noopener">Phishing Attacks.</a></p>
Before you start working on a story, <strong>think about the groups of people who could attack you</strong> online as a result of publishing a story. Take steps to secure your data and your accounts: use strong and unique passwords, and protect yourself against phishing attacks. <h3 class="mb-0 h3">Why blocking, muting, and reporting?</h3>
</section>
<p>We have looked at how to document abuse. <strong>Now let&rsquo;s look at how to block, mute, and report your abuse</strong>.</p>[[File:Image-blocking-muting.png]]<p><strong>Tip:</strong> When you block someone on a social media site it could mean that the content they posted will be deleted. Make sure you have documented the abuse before blocking anyone.</p>
<h3 class="mb-0 h3">Why blocking, muting, and reporting?</h3>
<strong>Blocking and Muting</strong>
<p>We have looked at how to document abuse. <strong>Now let&rsquo;s look at how to block, mute, and report your abuse</strong>.</p>
<p><img src="https://learn.totem-project.org/assets/courseware/v1/08c7ec48bc89eff1c205132bfc35d8e6/asset-v1:IWMF+IWMF_OH_EN+001+type@asset+block/infographic_two_IF_v1.png" width="90%" /></p>
<p><strong>Tip:</strong> When you block someone on a social media site it could mean that the content they posted will be deleted. Make sure you have documented the abuse before blocking anyone.</p>
<section style="border: 2px; border-style: solid; border-color: #66cc99; padding: 1em;"><strong>Blocking and Muting</strong>
     <p>Learn more about blocking and muting different social media sites by visiting their guides. Below is a list of the most common social media sites.</p>
     <p>Learn more about blocking and muting different social media sites by visiting their guides. Below is a list of the most common social media sites.</p>
     <blockquote>
     <blockquote>
         <ul>
         <ul>
             <li>Twitter&rsquo;s guide to <a href="https://help.twitter.com/en/using-twitter#blocking-and-muting" target="_blank" rel="noopener">blocking and muting</a></li>
             <li>[https://help.twitter.com/en/using-x#blocking-and-muting Twitter&rsquo;s guide to blocking and muting]</li>
             <li>Facebook&rsquo;s guide to <a href="https://www.facebook.com/help/1000976436606344" target="_blank" rel="noopener">blocking</a></li>
             <li>[https://www.facebook.com/help/1000976436606344 Facebook&rsquo;s guide to blocking]</li>
             <li>Instagram&rsquo;s guide to <a href="https://help.instagram.com/426700567389543" target="_blank" rel="noopener">blocking </a></li>
             <li>[https://help.instagram.com/426700567389543 Instagram&rsquo;s guide to blocking] </li>
             <li>Snapchat&rsquo;s guide to&nbsp;<a href="https://support.snapchat.com/en-US/article/remove-block-friends" target="_blank" rel="noopener">blocking </a></li>
             <li>Snapchat&rsquo;s guide to&nbsp;<a href="https://support.snapchat.com/en-US/article/remove-block-friends" target="_blank" rel="noopener">blocking </a></li>
         </ul>
         </ul>

Revision as of 14:27, 8 February 2024

Abusers and their tactics

Watch this video to get an understanding of the strategies used and the reason abusers use them.

Identifying common tactics

Targets need a common language to describe what’s happening to them, to friends, colleagues, editors, and law enforcement. You will learn more about how to define these tactics in the next exercise. You may find that abusers often use a combination of tactics to silence you online.

Below are some common tactics and their definitions. Take a minute to read them through.

More on doxxing

Doxxing is a tactic used by online abusers as a way to intimidate and threaten journalists. Personal details, including a home address, are posted online with a call to others to use that information to harass and cause harm.

This is a common tactic used by the far right as well as by members of certain interest groups, such as pro-life supporters. Having your home address circulated online by trolls means that an online attack has the possibility to turn into a physical threat as people now know where you live.

Protecting against doxxing

There are steps you can take to remove and limit access to your personal information on the Internet. This will help to better protect you against doxxing. Learn more about this in the Totem course on How to protect your identity online.

Mental health

Online harassment and abuse can take its toll on your mental health. There are steps you can take to protect yourself and reduce the impact of the abuse.

  • Ask a colleague or friend to monitor your accounts so you do not have to be exposed to the abuse
  • Do not engage with trolls as this can make the situation worse.
  • Speak with your editor or colleagues about the abuse and make them aware of the situation.
  • Take care of yourself by looking after your body and mind.

Ways to fight back

Documenting attacks

It can be important to document the abuse you are receiving online, especially if you feel there is a threat to your life. You should keep an evidence trail to show your colleagues, editors or the authorities. This information can also be presented to international organizations who assist journalists, and they may be able to help you with your case.

Keep a spreadsheet with details of the harassment, including date, time and type of harassment. Include the medium through which the abuse happened, for example, direct message, and also note down the platform.

Take screenshots of the abuse. Ensure that you include, where possible, the name or handle of the abuser, the date and time, and the full content of the abuse. It’s important to capture the whole message, the date, the name, and the handle/account name when collecting evidence about your abusers. This will become important if you decide to contact the authorities or an organization that defends freedom of expression about your case.

You may wish to ask someone to help you do this if the abuse is taking its toll on your mental health. For example, ask a colleague to monitor your social media accounts and enlist their help in taking screenshots of the abuse.

Documenting an attack

Before you start working on a story, think about the groups of people who could attack you online as a result of publishing a story. Take steps to secure your data and your accounts: use strong and unique passwords, and protect yourself against phishing attacks.

Why blocking, muting, and reporting?

We have looked at how to document abuse. Now let’s look at how to block, mute, and report your abuse.

Tip: When you block someone on a social media site it could mean that the content they posted will be deleted. Make sure you have documented the abuse before blocking anyone.

Blocking and Muting

Learn more about blocking and muting different social media sites by visiting their guides. Below is a list of the most common social media sites.

</section>

Platforms and reporting harassment

Each platform has different policies around reporting online harassment that makes it challenging and frustrating for those trying to get something done about their online harassment. Know that you are not alone with this.

It can help to keep a record of when you reported the harassment to the platform and what, if any, were the outcomes. You can add this to other evidence that you have collected about your harassers.

<section style="border: 2px; border-style: solid; border-color: #66cc99; padding: 1em;">Tip: Platforms administrators are only likely to take down content if it violates their community guidelines or standards. Before reporting harassment to the platform, make sure you are familiar with their guidelines and what they will and will not remove. Use the guidelines to support your case for removing the content. Below is a list of the most common social media sites:

   

</section>

Tip

If you are a freelance journalist or HRD working without the support of a media outlet or if you are not supported by your workplace, then you should consider reaching out to other women journalists to create a support network. You should ask them to: Facebook

  • Help report abuse on the platforms
  • Help document the abuse
  • Monitor your social media and/or email accounts
  • Make a public statement of solidarity  [TIP: Focus on condemning the behavior, not the abusers]
  • Rally a supportive community
  • Provide emotional support


You can also contact organizations that defend freedom of expression and may be able to help and support you.  More resources on this topic can be found in our More About section at the end of the course.

More information

Check out some additional resources, videos, and articles below. Remember to take our evaluation on the next page!

Practice

          • <a href="https://gijn.org/digital-security/" target="_blank" rel="noopener">Digital Security Tips and Links to Organisations who can Assist</a> by the Global Investigative Journalism Network

Learn

Watch

Read