How to deal with online harassment and threats: Difference between revisions
updated links and formatting |
updating links and formatting |
||
Line 1: | Line 1: | ||
Introduction | |||
The information below is taken from the Totem Project's online course on [https://learn.totem-project.org/courses/course-v1:IWMF+IWMF_OH_EN+001/about Know Your Trolls], in 2023. | |||
== Abusers and their tactics == | |||
<p>Watch [https://www.youtube.com/watch?v=RJR466zSUhs this video] to get an understanding of the strategies used and the reason abusers use them.</p> | <p>Watch [https://www.youtube.com/watch?v=RJR466zSUhs this video] to get an understanding of the strategies used and the reason abusers use them.</p> | ||
=== Identifying common tactics === | |||
<div class="vert vert-0" data-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500"> | <div class="vert vert-0" data-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500"> | ||
<div class="xblock xblock-student_view xblock-student_view-html xmodule_display xmodule_HtmlBlock xblock-initialized" data-course-id="course-v1:IWMF+IWMF_OH_EN+001" data-mark-completed-on-view-after-delay="0" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500" data-request-token="f8d8a73aabac11edabc80242ac12000e" data-graded="True" data-has-score="False"> | <div class="xblock xblock-student_view xblock-student_view-html xmodule_display xmodule_HtmlBlock xblock-initialized" data-course-id="course-v1:IWMF+IWMF_OH_EN+001" data-mark-completed-on-view-after-delay="0" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@9cd0d2bf61c84a548d304f1de36d2500" data-request-token="f8d8a73aabac11edabc80242ac12000e" data-graded="True" data-has-score="False"> | ||
<p>Targets need a common language to describe what’s happening to them, to friends, colleagues, editors, and law enforcement. You will learn more about how to define these tactics in the next exercise. You may find that abusers often use a combination of tactics to silence you online. | <p>Targets need a common language to describe what’s happening to them, to friends, colleagues, editors, and law enforcement. You will learn more about how to define these tactics in the next exercise. You may find that abusers often use a combination of tactics to silence you online. Below are some common tactics and their definitions. </p>[[File:Image-common-tactics.png|border]]<h3>More on doxxing</h3> | ||
<p>Doxxing is a tactic used by online abusers as a way to intimidate and threaten journalists. Personal details, including a home address, are posted online with a call to others to use that information to harass and cause harm.</p> | <p>Doxxing is a tactic used by online abusers as a way to intimidate and threaten journalists. Personal details, including a home address, are posted online with a call to others to use that information to harass and cause harm.</p> | ||
<p>This is a common tactic used by the far right as well as by members of certain interest groups, such as pro-life supporters. Having your home address circulated online by trolls means that an online attack has the possibility to turn into a physical threat as people now know where you live. | <p>This is a common tactic used by the far right as well as by members of certain interest groups, such as pro-life supporters. Having your home address circulated online by trolls means that an online attack has the possibility to turn into a physical threat as people now know where you live.</p><p>There are steps you can take to remove and limit access to your personal information on the Internet. This will help to better protect you against doxxing. Learn more about this in the Totem course on [https://learn.totem-project.org/courses/course-v1:Totem+TP_IO_EN+001/about How to protect your identity online].</p></div> | ||
</div> | </div> | ||
== Mental health == | |||
<p>Online harassment and abuse can take its toll on your mental health. There are steps you can take to protect yourself and reduce the impact of the abuse.</p> | <p>Online harassment and abuse can take its toll on your mental health. There are steps you can take to protect yourself and reduce the impact of the abuse.</p> | ||
<ul> | <ul> | ||
Line 17: | Line 22: | ||
<li>Take care of yourself by looking after your body and mind.</li> | <li>Take care of yourself by looking after your body and mind.</li> | ||
</ul> | </ul> | ||
== Ways to fight back == | |||
<h3>Documenting attacks</h3> | <h3>Documenting attacks</h3> | ||
<p>It can be important to document the abuse you are receiving online, especially if you feel there is a threat to your life. <strong>You should keep an evidence trail</strong> to show your colleagues, editors or the authorities. This information can also be presented to international organizations who assist journalists, and they may be able to help you with your case.</p> | <p>It can be important to document the abuse you are receiving online, especially if you feel there is a threat to your life. <strong>You should keep an evidence trail</strong> to show your colleagues, editors or the authorities. This information can also be presented to international organizations who assist journalists, and they may be able to help you with your case.</p> | ||
Before you start working on a story, <strong>think about the groups of people who could attack you</strong> online as a result of publishing a story. Take steps to secure your data and your accounts: use strong and unique passwords, and protect yourself against phishing attacks. <h3 class="mb-0 h3"> | * <strong>Keep a spreadsheet with details of the harassment</strong>, including date, time and type of harassment. Include the medium through which the abuse happened, for example, direct message, and also note down the platform. | ||
<p>We have looked at how to document abuse. | * <strong>Take screenshots of the abuse</strong>. Ensure that you include, where possible, the name or handle of the abuser, the date and time, and the full content of the abuse. <strong>It’s important to capture the whole message, the date, the name, and the handle/account name when collecting evidence about your abusers.</strong> This will become important if you decide to contact the authorities or an organization that defends freedom of expression about your case. | ||
* You may wish to <strong>ask someone to help you</strong> do this if the abuse is taking its toll on your mental health. For example, ask a colleague to monitor your social media accounts and enlist their help in taking screenshots of the abuse. | |||
* Before you start working on a story, <strong>think about the groups of people who could attack you</strong> online as a result of publishing a story. Take steps to secure your data and your accounts: use strong and unique passwords, and protect yourself against phishing attacks.<h3 class="mb-0 h3">Blocking, muting, and reporting abuse</h3> | |||
<p>We have looked at how to document abuse. Now let’s look at how to block, mute, and report your abuse.</p>[[File:Image-blocking-muting.png]]<p><strong>Tip:</strong> When you block someone on a social media site it could mean that the content they posted will be deleted. Make sure you have documented the abuse before blocking anyone.</p> | |||
==== Blocking and muting on specific platforms ==== | |||
<p>Learn more about blocking and muting different social media sites by visiting their guides. Below is a list of the most common social media sites.</p> | |||
<blockquote> | <blockquote> | ||
<ul> | <ul> | ||
Line 34: | Line 40: | ||
<li>[https://www.facebook.com/help/1000976436606344 Facebook’s guide to blocking]</li> | <li>[https://www.facebook.com/help/1000976436606344 Facebook’s guide to blocking]</li> | ||
<li>[https://help.instagram.com/426700567389543 Instagram’s guide to blocking] </li> | <li>[https://help.instagram.com/426700567389543 Instagram’s guide to blocking] </li> | ||
<li> | <li>[https://help.snapchat.com/hc/en-us/articles/7012410297364-How-to-Remove-a-Friend-on-Snapchat Snapchat’s guide to blocking] </li> | ||
</ul> | </ul> | ||
</blockquote> | </blockquote> | ||
==== Platforms and reporting harassment ==== | |||
<p>Each platform has different policies around reporting online harassment that makes it challenging and frustrating for those trying to get something done about their online harassment. Know that you are not alone with this. | <p>Each platform has different policies around reporting online harassment that makes it challenging and frustrating for those trying to get something done about their online harassment. Know that you are not alone with this. It can help to keep a record of when you reported the harassment to the platform and what, if any, were the outcomes. You can add this to other evidence that you have collected about your harassers.</p> | ||
<strong>Tip:</strong> Platforms administrators are only likely to take down content if it violates their community guidelines or standards. Before reporting harassment to the platform, make sure you are familiar with their guidelines and what they will and will not remove. Use the guidelines to support your case for removing the content. Below is a list of the most common social media sites: | |||
<ul> | <ul> | ||
<li> | <li>[https://transparency.fb.com/policies/community-standards/bullying-harassment/ Facebook’s Community Standards on bullying and harassment]</li> | ||
<li> | <li>[https://help.twitter.com/en/rules-and-policies/x-rules Twitter Rules]</li> | ||
</ul | </ul><strong>If you are a freelance journalist or HRD</strong> working without the support of a media outlet or if you are not supported by your workplace, then you should consider reaching out to other women journalists to create a support network. You should ask them to: <blockquote> | ||
<blockquote> | |||
<ul> | <ul> | ||
<li>Help report abuse on the platforms</li> | <li>Help report abuse on the platforms</li> | ||
<li>Help document the abuse</li> | <li>Help document the abuse</li> | ||
<li>Monitor your social media and/or email accounts</li> | <li>Monitor your social media and/or email accounts</li> | ||
<li>Make a public statement of solidarity | <li>Make a public statement of solidarity [TIP: Focus on condemning the behavior, not the abusers]</li> | ||
<li>Rally a supportive community</li> | <li>Rally a supportive community</li> | ||
<li>Provide emotional support</li> | <li>Provide emotional support</li> | ||
</ul> | </ul> | ||
</blockquote> | </blockquote> | ||
<h2>More information and resources</h2> | |||
<h2>More information</h2> | |||
<div class="vert-mod"> | <div class="vert-mod"> | ||
<div class="vert vert-0" data-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@a35867c5835f4885971c3dd08cfaca85"> | <div class="vert vert-0" data-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@a35867c5835f4885971c3dd08cfaca85"> | ||
<div class="xblock xblock-student_view xblock-student_view-html xmodule_display xmodule_HtmlBlock xblock-initialized" data-course-id="course-v1:IWMF+IWMF_OH_EN+001" data-mark-completed-on-view-after-delay="0" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@a35867c5835f4885971c3dd08cfaca85" data-request-token="ed565fb2abaf11edabc80242ac12000e" data-graded="False" data-has-score="False"> | <div class="xblock xblock-student_view xblock-student_view-html xmodule_display xmodule_HtmlBlock xblock-initialized" data-course-id="course-v1:IWMF+IWMF_OH_EN+001" data-mark-completed-on-view-after-delay="0" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:IWMF+IWMF_OH_EN+001+type@html+block@a35867c5835f4885971c3dd08cfaca85" data-request-token="ed565fb2abaf11edabc80242ac12000e" data-graded="False" data-has-score="False"> | ||
<p>Check out some <strong>additional resources, videos, and articles</strong> below. | <p>Check out some <strong>additional resources, videos, and articles</strong> below. </p> | ||
<h3>Practice</h3> | <h3>Practice</h3>[https://open.nytimes.com/how-to-dox-yourself-on-the-internet-d2892b4c5954 How to Dox yourself on the Internet] by the New York Times | ||
[https://cpj.org/2019/09/digital-safety-remove-personal-data-internet/ Remove Personal Data from the Internet] by the Committee to Protect Journalists (CPJ) | |||
[https://onlineharassmentfieldmanual.pen.org/best-practices-for-employers/ Online Harassment Field Manual: Steps for Safeguarding Employees] by PEN America | |||
<a href="https://onlinesos.org/resources/action-center/mob-harassment" target="_blank" rel="noopener">Steps for Dealing with Mob Harassmen</a>t by Online SOS | |||
Blocking and Muting on Different Social Media Sites: | |||
<a href="https://gijn.org/digital-security/" target="_blank" rel="noopener">Digital Security Tips and Links to Organisations who can Assist</a> by the Global Investigative Journalism Network<h3>Learn</h3> | |||
<blockquote> | <blockquote> | ||
<blockquote> | <blockquote> | ||
Line 111: | Line 85: | ||
</ul> | </ul> | ||
</blockquote> | </blockquote> | ||
</blockquote> | </blockquote>[https://www.onlinesos.org/ OnlineSOS] is a non-profit organization connecting people with information and tools to take action in the face of online harassment <h3>Watch</h3> | ||
<blockquote> | <blockquote> | ||
<blockquote> | <blockquote> |
Revision as of 15:01, 8 February 2024
Introduction
The information below is taken from the Totem Project's online course on Know Your Trolls, in 2023.
Abusers and their tactics
Watch this video to get an understanding of the strategies used and the reason abusers use them.
Identifying common tactics
Targets need a common language to describe what’s happening to them, to friends, colleagues, editors, and law enforcement. You will learn more about how to define these tactics in the next exercise. You may find that abusers often use a combination of tactics to silence you online. Below are some common tactics and their definitions.
More on doxxing
Doxxing is a tactic used by online abusers as a way to intimidate and threaten journalists. Personal details, including a home address, are posted online with a call to others to use that information to harass and cause harm.
This is a common tactic used by the far right as well as by members of certain interest groups, such as pro-life supporters. Having your home address circulated online by trolls means that an online attack has the possibility to turn into a physical threat as people now know where you live.
There are steps you can take to remove and limit access to your personal information on the Internet. This will help to better protect you against doxxing. Learn more about this in the Totem course on How to protect your identity online.
Mental health
Online harassment and abuse can take its toll on your mental health. There are steps you can take to protect yourself and reduce the impact of the abuse.
- Ask a colleague or friend to monitor your accounts so you do not have to be exposed to the abuse
- Do not engage with trolls as this can make the situation worse.
- Speak with your editor or colleagues about the abuse and make them aware of the situation.
- Take care of yourself by looking after your body and mind.
Ways to fight back
Documenting attacks
It can be important to document the abuse you are receiving online, especially if you feel there is a threat to your life. You should keep an evidence trail to show your colleagues, editors or the authorities. This information can also be presented to international organizations who assist journalists, and they may be able to help you with your case.
- Keep a spreadsheet with details of the harassment, including date, time and type of harassment. Include the medium through which the abuse happened, for example, direct message, and also note down the platform.
- Take screenshots of the abuse. Ensure that you include, where possible, the name or handle of the abuser, the date and time, and the full content of the abuse. It’s important to capture the whole message, the date, the name, and the handle/account name when collecting evidence about your abusers. This will become important if you decide to contact the authorities or an organization that defends freedom of expression about your case.
- You may wish to ask someone to help you do this if the abuse is taking its toll on your mental health. For example, ask a colleague to monitor your social media accounts and enlist their help in taking screenshots of the abuse.
- Before you start working on a story, think about the groups of people who could attack you online as a result of publishing a story. Take steps to secure your data and your accounts: use strong and unique passwords, and protect yourself against phishing attacks.
Blocking, muting, and reporting abuse
We have looked at how to document abuse. Now let’s look at how to block, mute, and report your abuse.
Tip: When you block someone on a social media site it could mean that the content they posted will be deleted. Make sure you have documented the abuse before blocking anyone.
Blocking and muting on specific platforms
Learn more about blocking and muting different social media sites by visiting their guides. Below is a list of the most common social media sites.
Platforms and reporting harassment
Each platform has different policies around reporting online harassment that makes it challenging and frustrating for those trying to get something done about their online harassment. Know that you are not alone with this. It can help to keep a record of when you reported the harassment to the platform and what, if any, were the outcomes. You can add this to other evidence that you have collected about your harassers.
Tip: Platforms administrators are only likely to take down content if it violates their community guidelines or standards. Before reporting harassment to the platform, make sure you are familiar with their guidelines and what they will and will not remove. Use the guidelines to support your case for removing the content. Below is a list of the most common social media sites:
If you are a freelance journalist or HRD working without the support of a media outlet or if you are not supported by your workplace, then you should consider reaching out to other women journalists to create a support network. You should ask them to:
- Help report abuse on the platforms
- Help document the abuse
- Monitor your social media and/or email accounts
- Make a public statement of solidarity [TIP: Focus on condemning the behavior, not the abusers]
- Rally a supportive community
- Provide emotional support
More information and resources
Check out some additional resources, videos, and articles below.
Practice
How to Dox yourself on the Internet by the New York TimesRemove Personal Data from the Internet by the Committee to Protect Journalists (CPJ)
Online Harassment Field Manual: Steps for Safeguarding Employees by PEN America
<a href="https://onlinesos.org/resources/action-center/mob-harassment" target="_blank" rel="noopener">Steps for Dealing with Mob Harassmen</a>t by Online SOS
Blocking and Muting on Different Social Media Sites:
<a href="https://gijn.org/digital-security/" target="_blank" rel="noopener">Digital Security Tips and Links to Organisations who can Assist</a> by the Global Investigative Journalism NetworkLearn
OnlineSOS is a non-profit organization connecting people with information and tools to take action in the face of online harassment
- <a href="https://advocacyassembly.org/en/courses/34/#/chapter/1/lesson/1" target="_blank" rel="noopener">Recognising and Responding to Online Gender-Based Violence</a> by Association for Progressive Communications (APC)
- <a href="https://newsrooms-ontheline.ipi.media/tutorials_category/legal-remedies-on-addressing-online-harassment/" target="_blank" rel="noopener">Legal Remedies to Address Online harassment</a> by International Press Institute (IPI)
- <a href="https://dartcenter.org/blog/2017/12/online-harassment-don%E2%80%99t-starve-trolls-control-them" target="_blank" rel="noopener">How to Manage Trolls and your Mental Health</a> by the Dart Centre
- <a href="https://onlineharassmentfieldmanual.pen.org/best-practices-for-allies-and-witnesses/" target="_blank" rel="noopener">Tips for Allies and Witnesses</a> by PEN America
Watch
- <a href="https://www.youtube.com/watch?v=_KHEkR5yb9A" target="_blank" rel="noopener">The Problem with “Don’t Feed the Trolls”</a> by Steph Guthrie, TEDxToronto
- <a href="https://feministfrequency.com/2015/04/28/women-in-the-world-online-harassment-panel/" target="_blank" rel="noopener">Stop the Trolls: Women Fight Online Harassment Panel</a> by Feminist Frequency
- <a href="https://feministfrequency.com/video/anita-sarkeesian-speaking-at-xoxo-conference/" target="_blank" rel="noopener">Anita Sarkeesian, Feminist Frequency</a> at XOXO Festival
- <a href="https://newsrooms-ontheline.ipi.media/tutorials/block-3-basic-countermeasures-for-journalist-to-cope-with-online-harassment/" target="_blank" rel="noopener">Basic Countermeasures for Journalists to Cope with Online Harassment</a> by IPI and the Dart Centre
Read
- Course Handouts:
- <a href="https://learn.totem-project.org/asset-v1:IWMF+IWMF_OH_EN+001+type@asset+block@IWMF-Totem_Infographic_AbuserStrategies.pdf" target="_blank" rel="noopener">Infographic on abuser Strategies</a> [PDF]
- <a href="https://learn.totem-project.org/asset-v1:IWMF+IWMF_OH_EN+001+type@asset+block@IWMF-Totem_Infographic_BlockingMuting.pdf" target="_blank" rel="noopener">Infographic on Muting and Blocking</a> [PDF]
- <a href="https://learn.totem-project.org/asset-v1:IWMF+IWMF_OH_EN+001+type@asset+block@IWMF-Totem_Infographic_StudyAbusers.pdf" target="_blank" rel="noopener">Infographic on Studying abusers</a> [PDF]
- <a href="https://www.iwmf.org/wp-content/uploads/2018/09/Attacks-and-Harassment.pdf" target="_blank" rel="noopener">Attacks and Harassment</a> by the International Women’s Media Foundation (IWMF)
- <a href="https://onlineharassmentfieldmanual.pen.org" target="_blank" rel="noopener">Online Harassment Field Manual</a> by Pen America
- <a href="https://www.takebackthetech.net" target="_blank" rel="noopener">Take Back the Tech</a> website
- <a href="https://rorypecktrust.org/freelance-resources/digital-security/social-media-trolling-and-doxxing/" target="_blank" rel="noopener">Social Media: Trolling and Doxxing</a> by the Rory Peck Trust
- <a href="https://dartcenter.org/resources/dealing-hate-campaigns-toolkit-journalists" target="_blank" rel="noopener">Dealing with Hate Campaigns: Toolkit for Journalists</a> by the Dart Center
- <a href="https://onlinesafety.feministfrequency.com/en/" target="_blank" rel="noopener">Speak Up and Stay Safer ® : A Guide to Protecting Yourself From Online Harassment</a> by Feminist Frequency
- <a href="https://unesdoc.unesco.org/ark:/48223/pf0000371524" target="_blank" rel="noopener">Reporting on Violence Against Women and Girls: A Handbook for Journalists</a>, by the UNESCO