How to deal with online harassment and threats: Difference between revisions

From TCU Wiki
Kristin1 (talk | contribs)
updated links and formatting
Kristin1 (talk | contribs)
updating links and formatting
Line 1: Line 1:
<h1>Abusers and their tactics</h1>
Introduction
 
The information below is taken from the Totem Project's online course on [https://learn.totem-project.org/courses/course-v1:IWMF+IWMF_OH_EN+001/about Know Your Trolls], in 2023.
 
== Abusers and their tactics ==
<p>Watch [https://www.youtube.com/watch?v=RJR466zSUhs this video] to get an understanding of the strategies used and the reason abusers use them.</p>
<p>Watch [https://www.youtube.com/watch?v=RJR466zSUhs this video] to get an understanding of the strategies used and the reason abusers use them.</p>
<h3>Identifying common tactics</h3>
 
=== Identifying common tactics ===
<div class="vert vert-0" data-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500">
<div class="vert vert-0" data-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500">
     <div class="xblock xblock-student_view xblock-student_view-html xmodule_display xmodule_HtmlBlock xblock-initialized" data-course-id="course-v1:IWMF+IWMF_OH_EN+001" data-mark-completed-on-view-after-delay="0" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500" data-request-token="f8d8a73aabac11edabc80242ac12000e" data-graded="True" data-has-score="False">
     <div class="xblock xblock-student_view xblock-student_view-html xmodule_display xmodule_HtmlBlock xblock-initialized" data-course-id="course-v1:IWMF+IWMF_OH_EN+001" data-mark-completed-on-view-after-delay="0" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500" data-request-token="f8d8a73aabac11edabc80242ac12000e" data-graded="True" data-has-score="False">
         <p>Targets need a common language to describe what&rsquo;s happening to them, to friends, colleagues, editors, and law enforcement. You will learn more about how to define these tactics in the next exercise. You may find that abusers often use a combination of tactics to silence you online.</p>
         <p>Targets need a common language to describe what&rsquo;s happening to them, to friends, colleagues, editors, and law enforcement. You will learn more about how to define these tactics in the next exercise. You may find that abusers often use a combination of tactics to silence you online. Below are some common tactics and their definitions. </p>[[File:Image-common-tactics.png|border]]<h3>More on doxxing</h3>
        <p>Below are some common tactics and their definitions. Take a minute to read them through.</p>[[File:Image-common-tactics.png|border]]<h3>More on doxxing</h3>
         <p>Doxxing is a tactic used by online abusers as a way to intimidate and threaten journalists. Personal details, including a home address, are posted online with a call to others to use that information to harass and cause harm.</p>
         <p>Doxxing is a tactic used by online abusers as a way to intimidate and threaten journalists. Personal details, including a home address, are posted online with a call to others to use that information to harass and cause harm.</p>
         <p>This is a common tactic used by the far right as well as by members of certain interest groups, such as pro-life supporters. Having your home address circulated online by trolls means that an online attack has the possibility to turn into a physical threat as people now know where you live.</p><p><strong>Protecting against doxxing</strong></p><p>There are steps you can take to remove and limit access to your personal information on the Internet. This will help to better protect you against doxxing. Learn more about this in the Totem course on [https://learn.totem-project.org/courses/course-v1:Totem+TP_IO_EN+001/about How to protect your identity online].</p></div>
         <p>This is a common tactic used by the far right as well as by members of certain interest groups, such as pro-life supporters. Having your home address circulated online by trolls means that an online attack has the possibility to turn into a physical threat as people now know where you live.</p><p>There are steps you can take to remove and limit access to your personal information on the Internet. This will help to better protect you against doxxing. Learn more about this in the Totem course on [https://learn.totem-project.org/courses/course-v1:Totem+TP_IO_EN+001/about How to protect your identity online].</p></div>
</div>
</div>
<p><strong>Mental health</strong></p>
 
== Mental health ==
<p>Online harassment and abuse can take its toll on your mental health. There are steps you can take to protect yourself and reduce the impact of the abuse.</p>
<p>Online harassment and abuse can take its toll on your mental health. There are steps you can take to protect yourself and reduce the impact of the abuse.</p>
<ul>
<ul>
Line 17: Line 22:
     <li>Take care of yourself by looking after your body and mind.</li>
     <li>Take care of yourself by looking after your body and mind.</li>
</ul>
</ul>
<h1>Ways to fight back</h1>
 
== Ways to fight back ==
<h3>Documenting attacks</h3>
<h3>Documenting attacks</h3>
<p>It can be important to document the abuse you are receiving online, especially if you feel there is a threat to your life. <strong>You should keep an evidence trail</strong> to show your colleagues, editors or the authorities. This information can also be presented to international organizations who assist journalists, and they may be able to help you with your case.</p>
<p>It can be important to document the abuse you are receiving online, especially if you feel there is a threat to your life. <strong>You should keep an evidence trail</strong> to show your colleagues, editors or the authorities. This information can also be presented to international organizations who assist journalists, and they may be able to help you with your case.</p>
<p><strong>Keep a spreadsheet with details of the harassment</strong>, including date, time and type of harassment. Include the medium through which the abuse happened, for example, direct message, and also note down the platform.</p>
<p><strong>Take screenshots of the abuse</strong>. Ensure that you include, where possible, the name or handle of the abuser, the date and time, and the full content of the abuse. <strong>It&rsquo;s important to capture the whole message, the date, the name, and the handle/account name when collecting evidence about your abusers.</strong> This will become important if you decide to contact the authorities or an organization that defends freedom of expression about your case.</p>
<p>You may wish to <strong>ask someone to help you</strong> do this if the abuse is taking its toll on your mental health. For example, ask a colleague to monitor your social media accounts and enlist their help in taking screenshots of the abuse.</p>
<strong>Documenting an attack</strong>


Before you start working on a story, <strong>think about the groups of people who could attack you</strong> online as a result of publishing a story. Take steps to secure your data and your accounts: use strong and unique passwords, and protect yourself against phishing attacks. <h3 class="mb-0 h3">Why blocking, muting, and reporting?</h3>
* <strong>Keep a spreadsheet with details of the harassment</strong>, including date, time and type of harassment. Include the medium through which the abuse happened, for example, direct message, and also note down the platform.
<p>We have looked at how to document abuse. <strong>Now let&rsquo;s look at how to block, mute, and report your abuse</strong>.</p>[[File:Image-blocking-muting.png]]<p><strong>Tip:</strong> When you block someone on a social media site it could mean that the content they posted will be deleted. Make sure you have documented the abuse before blocking anyone.</p>
* <strong>Take screenshots of the abuse</strong>. Ensure that you include, where possible, the name or handle of the abuser, the date and time, and the full content of the abuse. <strong>It&rsquo;s important to capture the whole message, the date, the name, and the handle/account name when collecting evidence about your abusers.</strong> This will become important if you decide to contact the authorities or an organization that defends freedom of expression about your case.
<strong>Blocking and Muting</strong>
* You may wish to <strong>ask someone to help you</strong> do this if the abuse is taking its toll on your mental health. For example, ask a colleague to monitor your social media accounts and enlist their help in taking screenshots of the abuse.
    <p>Learn more about blocking and muting different social media sites by visiting their guides. Below is a list of the most common social media sites.</p>
* Before you start working on a story, <strong>think about the groups of people who could attack you</strong> online as a result of publishing a story. Take steps to secure your data and your accounts: use strong and unique passwords, and protect yourself against phishing attacks.<h3 class="mb-0 h3">Blocking, muting, and reporting abuse</h3>
<p>We have looked at how to document abuse. Now let&rsquo;s look at how to block, mute, and report your abuse.</p>[[File:Image-blocking-muting.png]]<p><strong>Tip:</strong> When you block someone on a social media site it could mean that the content they posted will be deleted. Make sure you have documented the abuse before blocking anyone.</p>
 
==== Blocking and muting on specific platforms ====
<p>Learn more about blocking and muting different social media sites by visiting their guides. Below is a list of the most common social media sites.</p>
     <blockquote>
     <blockquote>
         <ul>
         <ul>
Line 34: Line 40:
             <li>[https://www.facebook.com/help/1000976436606344 Facebook&rsquo;s guide to blocking]</li>
             <li>[https://www.facebook.com/help/1000976436606344 Facebook&rsquo;s guide to blocking]</li>
             <li>[https://help.instagram.com/426700567389543 Instagram&rsquo;s guide to blocking] </li>
             <li>[https://help.instagram.com/426700567389543 Instagram&rsquo;s guide to blocking] </li>
             <li>Snapchat&rsquo;s guide to&nbsp;<a href="https://support.snapchat.com/en-US/article/remove-block-friends" target="_blank" rel="noopener">blocking </a></li>
             <li>[https://help.snapchat.com/hc/en-us/articles/7012410297364-How-to-Remove-a-Friend-on-Snapchat Snapchat&rsquo;s guide to blocking] </li>
         </ul>
         </ul>
     </blockquote>
     </blockquote>
</section>
 
<h3>Platforms and reporting harassment</h3>
==== Platforms and reporting harassment ====
<p>Each platform has different policies around reporting online harassment that makes it challenging and frustrating for those trying to get something done about their online harassment. Know that you are not alone with this.</p>
<p>Each platform has different policies around reporting online harassment that makes it challenging and frustrating for those trying to get something done about their online harassment. Know that you are not alone with this. It can help to keep a record of when you reported the harassment to the platform and what, if any, were the outcomes. You can add this to other evidence that you have collected about your harassers.</p>
<p>It can help to keep a record of when you reported the harassment to the platform and what, if any, were the outcomes. You can add this to other evidence that you have collected about your harassers.</p>
<strong>Tip:</strong> Platforms administrators are only likely to take down content if it violates their community guidelines or standards. Before reporting harassment to the platform, make sure you are familiar with their guidelines and what they will and will not remove. Use the guidelines to support your case for removing the content. Below is a list of the most common social media sites:
<section style="border: 2px; border-style: solid; border-color: #66cc99; padding: 1em;"><strong>Tip:</strong> Platforms administrators are only likely to take down content if it violates their community guidelines or standards. Before reporting harassment to the platform, make sure you are familiar with their guidelines and what they will and will not remove. Use the guidelines to support your case for removing the content. Below is a list of the most common social media sites:
     <ul>
     <ul>
         <li>Facebook&rsquo;s Community Standards on <a class="inline_disabled" href="https://transparency.fb.com/policies/community-standards/bullying-harassment/" target="_blank" rel="noopener">bullying and harassment</a></li>
         <li>[https://transparency.fb.com/policies/community-standards/bullying-harassment/ Facebook&rsquo;s Community Standards on bullying and harassment]</li>
         <li><a class="inline_disabled" href="https://help.twitter.com/en/rules-and-policies/twitter-rules" target="_blank" rel="noopener">Twitter Rules</a></li>
         <li>[https://help.twitter.com/en/rules-and-policies/x-rules Twitter Rules]</li>
     </ul>
     </ul><strong>If you are a freelance journalist or HRD</strong> working without the support of a media outlet or if you are not supported by your workplace, then you should consider reaching out to other women journalists to create a support network. You should ask them to: <blockquote>
    <strong><br /></strong>
</section>
<p><strong>Tip</strong><br /><br /><strong>If you are a freelance journalist or HRD</strong> working without the support of a media outlet or if you are not supported by your workplace, then you should consider reaching out to other women journalists to create a support network. You should ask them to: Facebook</p>
<blockquote>
     <ul>
     <ul>
         <li>Help report abuse on the platforms</li>
         <li>Help report abuse on the platforms</li>
         <li>Help document the abuse</li>
         <li>Help document the abuse</li>
         <li>Monitor your social media and/or email accounts</li>
         <li>Monitor your social media and/or email accounts</li>
         <li>Make a public statement of solidarity&nbsp; [TIP: Focus on condemning the behavior, not the abusers]</li>
         <li>Make a public statement of solidarity [TIP: Focus on condemning the behavior, not the abusers]</li>
         <li>Rally a supportive community</li>
         <li>Rally a supportive community</li>
         <li>Provide emotional support</li>
         <li>Provide emotional support</li>
     </ul>
     </ul>
</blockquote>
</blockquote>
<p><br />You can also contact organizations that defend freedom of expression and may be able to help and support you.&nbsp; More resources on this topic can be found in our More About section at the end of the course.</p>
<h2>More information and resources</h2>
<h2>More information</h2>
<div class="vert-mod">
<div class="vert-mod">
     <div class="vert vert-0" data-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@a35867c5835f4885971c3dd08cfaca85">
     <div class="vert vert-0" data-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@a35867c5835f4885971c3dd08cfaca85">
         <div class="xblock xblock-student_view xblock-student_view-html xmodule_display xmodule_HtmlBlock xblock-initialized" data-course-id="course-v1:IWMF+IWMF_OH_EN+001" data-mark-completed-on-view-after-delay="0" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@a35867c5835f4885971c3dd08cfaca85" data-request-token="ed565fb2abaf11edabc80242ac12000e" data-graded="False" data-has-score="False">
         <div class="xblock xblock-student_view xblock-student_view-html xmodule_display xmodule_HtmlBlock xblock-initialized" data-course-id="course-v1:IWMF+IWMF_OH_EN+001" data-mark-completed-on-view-after-delay="0" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@a35867c5835f4885971c3dd08cfaca85" data-request-token="ed565fb2abaf11edabc80242ac12000e" data-graded="False" data-has-score="False">
             <p>Check out some <strong>additional resources, videos, and articles</strong> below. Remember to take our evaluation on the next page!</p>
             <p>Check out some <strong>additional resources, videos, and articles</strong> below. </p>
             <h3>Practice</h3>
             <h3>Practice</h3>[https://open.nytimes.com/how-to-dox-yourself-on-the-internet-d2892b4c5954 How to Dox yourself on the Internet] by the New York Times
            <blockquote>
 
                <blockquote>
[https://cpj.org/2019/09/digital-safety-remove-personal-data-internet/ Remove Personal Data from the Internet] by the Committee to Protect Journalists (CPJ)
                    <ul>
 
                        <ul>
[https://onlineharassmentfieldmanual.pen.org/best-practices-for-employers/ Online Harassment Field Manual: Steps for Safeguarding Employees] by PEN America
                            <li><a href="https://open.nytimes.com/how-to-dox-yourself-on-the-internet-d2892b4c5954" target="_blank" rel="noopener">How to Dox yourself on the Internet</a>&nbsp;by the New York Times</li>
 
                            <li><a href="https://cpj.org/2019/09/digital-safety-remove-personal-data-internet.php" target="_blank" rel="noopener">Remove Personal Data from the Internet</a>&nbsp;by the Committee to Protect Journalists (CPJ)</li>
<a href="https://onlinesos.org/resources/action-center/mob-harassment" target="_blank" rel="noopener">Steps for Dealing with Mob Harassmen</a>t by Online SOS
                            <li><a href="https://onlineharassmentfieldmanual.pen.org/best-practices-for-employers/" target="_blank" rel="noopener">Steps for Safeguarding Employees</a>&nbsp;by PEN America</li>
 
                            <li><a href="https://onlinesos.org/resources/action-center/mob-harassment" target="_blank" rel="noopener">Steps for Dealing with Mob Harassmen</a>t by Online SOS</li>
Blocking and Muting on Different Social Media Sites:
                            <li>Blocking and Muting on Different Social Media Sites:
 
                                <ul>
<a href="https://gijn.org/digital-security/" target="_blank" rel="noopener">Digital Security Tips and Links to Organisations who can Assist</a>&nbsp;by the Global Investigative Journalism Network<h3>Learn</h3>
                                    <ul>
                                        <li>Twitter&rsquo;s guide to <a href="https://help.twitter.com/en/using-twitter#blocking-and-muting" target="_blank" rel="noopener">blocking and muting</a></li>
                                        <li>Facebook&rsquo;s guide to <a href="https://www.facebook.com/help/1000976436606344" target="_blank" rel="noopener">blocking</a></li>
                                        <li>Instagram&rsquo;s guide to <a href="https://help.instagram.com/426700567389543" target="_blank" rel="noopener">blocking </a></li>
                                        <li>Snapchat&rsquo;s guide to&nbsp;<a href="https://support.snapchat.com/en-US/article/remove-block-friends" target="_blank" rel="noopener">blocking </a></li>
                                    </ul>
                                </ul>
                            </li>
                        </ul>
                    </ul>
                </blockquote>
            </blockquote>
            <blockquote>
                <ul>
                    <ul>
                        <ul>
                            <ul>
                                <ul>
                                    <li><a href="https://gijn.org/digital-security/" target="_blank" rel="noopener">Digital Security Tips and Links to Organisations who can Assist</a>&nbsp;by the Global Investigative Journalism Network</li>
                                </ul>
                            </ul>
                        </ul>
                    </ul>
                </ul>
            </blockquote>
            <h3>Learn</h3>
             <blockquote>
             <blockquote>
                 <blockquote>
                 <blockquote>
Line 111: Line 85:
                     </ul>
                     </ul>
                 </blockquote>
                 </blockquote>
             </blockquote>
             </blockquote>[https://www.onlinesos.org/ OnlineSOS] is a non-profit organization connecting people with information and tools to take action in the face of online harassment <h3>Watch</h3>
            <h3>Watch</h3>
             <blockquote>
             <blockquote>
                 <blockquote>
                 <blockquote>

Revision as of 15:01, 8 February 2024

Introduction

The information below is taken from the Totem Project's online course on Know Your Trolls, in 2023.

Abusers and their tactics

Watch this video to get an understanding of the strategies used and the reason abusers use them.

Identifying common tactics

Targets need a common language to describe what’s happening to them, to friends, colleagues, editors, and law enforcement. You will learn more about how to define these tactics in the next exercise. You may find that abusers often use a combination of tactics to silence you online. Below are some common tactics and their definitions.

More on doxxing

Doxxing is a tactic used by online abusers as a way to intimidate and threaten journalists. Personal details, including a home address, are posted online with a call to others to use that information to harass and cause harm.

This is a common tactic used by the far right as well as by members of certain interest groups, such as pro-life supporters. Having your home address circulated online by trolls means that an online attack has the possibility to turn into a physical threat as people now know where you live.

There are steps you can take to remove and limit access to your personal information on the Internet. This will help to better protect you against doxxing. Learn more about this in the Totem course on How to protect your identity online.

Mental health

Online harassment and abuse can take its toll on your mental health. There are steps you can take to protect yourself and reduce the impact of the abuse.

  • Ask a colleague or friend to monitor your accounts so you do not have to be exposed to the abuse
  • Do not engage with trolls as this can make the situation worse.
  • Speak with your editor or colleagues about the abuse and make them aware of the situation.
  • Take care of yourself by looking after your body and mind.

Ways to fight back

Documenting attacks

It can be important to document the abuse you are receiving online, especially if you feel there is a threat to your life. You should keep an evidence trail to show your colleagues, editors or the authorities. This information can also be presented to international organizations who assist journalists, and they may be able to help you with your case.

  • Keep a spreadsheet with details of the harassment, including date, time and type of harassment. Include the medium through which the abuse happened, for example, direct message, and also note down the platform.
  • Take screenshots of the abuse. Ensure that you include, where possible, the name or handle of the abuser, the date and time, and the full content of the abuse. It’s important to capture the whole message, the date, the name, and the handle/account name when collecting evidence about your abusers. This will become important if you decide to contact the authorities or an organization that defends freedom of expression about your case.
  • You may wish to ask someone to help you do this if the abuse is taking its toll on your mental health. For example, ask a colleague to monitor your social media accounts and enlist their help in taking screenshots of the abuse.
  • Before you start working on a story, think about the groups of people who could attack you online as a result of publishing a story. Take steps to secure your data and your accounts: use strong and unique passwords, and protect yourself against phishing attacks.

    Blocking, muting, and reporting abuse

We have looked at how to document abuse. Now let’s look at how to block, mute, and report your abuse.

Tip: When you block someone on a social media site it could mean that the content they posted will be deleted. Make sure you have documented the abuse before blocking anyone.

Blocking and muting on specific platforms

Learn more about blocking and muting different social media sites by visiting their guides. Below is a list of the most common social media sites.

Platforms and reporting harassment

Each platform has different policies around reporting online harassment that makes it challenging and frustrating for those trying to get something done about their online harassment. Know that you are not alone with this. It can help to keep a record of when you reported the harassment to the platform and what, if any, were the outcomes. You can add this to other evidence that you have collected about your harassers.

Tip: Platforms administrators are only likely to take down content if it violates their community guidelines or standards. Before reporting harassment to the platform, make sure you are familiar with their guidelines and what they will and will not remove. Use the guidelines to support your case for removing the content. Below is a list of the most common social media sites:

If you are a freelance journalist or HRD working without the support of a media outlet or if you are not supported by your workplace, then you should consider reaching out to other women journalists to create a support network. You should ask them to:

  • Help report abuse on the platforms
  • Help document the abuse
  • Monitor your social media and/or email accounts
  • Make a public statement of solidarity [TIP: Focus on condemning the behavior, not the abusers]
  • Rally a supportive community
  • Provide emotional support

More information and resources

Check out some additional resources, videos, and articles below.

Practice

How to Dox yourself on the Internet by the New York Times

Remove Personal Data from the Internet by the Committee to Protect Journalists (CPJ)

Online Harassment Field Manual: Steps for Safeguarding Employees by PEN America

<a href="https://onlinesos.org/resources/action-center/mob-harassment" target="_blank" rel="noopener">Steps for Dealing with Mob Harassmen</a>t by Online SOS

Blocking and Muting on Different Social Media Sites:

<a href="https://gijn.org/digital-security/" target="_blank" rel="noopener">Digital Security Tips and Links to Organisations who can Assist</a> by the Global Investigative Journalism Network

Learn

OnlineSOS is a non-profit organization connecting people with information and tools to take action in the face of online harassment

Watch

Read