<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-hrpc-ipvc-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="ipvc">Intimate Partner Violence Digital Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-hrpc-ipvc-01"/>
    <author initials="S." surname="Celi" fullname="Sofia Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="J." surname="Guerra" fullname="Juliana Guerra">
      <organization/>
      <address>
        <email>juliana@usuarix.net</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <date year="2024" month="November" day="08"/>
    <area>General</area>
    <workgroup>None</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 148?>

<t>This document aims to inform how Internet protocols and their implementations might better mitigate technical attacks at the user endpoint by describing technology-based practices to perpetrate intimate partner violence (IPV). IPV is a pervasive reality that is not limited to, but can be exacerbated with, the usage of technology. The IPV context enables the attacker to access one, some or all of: devices, local networks, authentication mechanisms, identity information, and accounts. These security compromises go beyond active and passive on-path attacks <xref target="RFC7624"/>. With a focus on protocols, the document describes tactics of the IPV attacker and potential counter-measures.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/claucece/draft-celi-ipvc"/>.</t>
    </note>
  </front>
  <middle>
    <?line 152?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Intimate partner violence (IPV) refers to physical, emotional, verbal, sexual, or economic abuse of a person by a current or former intimate partner, hereafter referred to as the abuser or attacker.<xref target="WHO"/> IPV is characterized by an unequal power dynamic that enables the abuser to exert control and harm within romantic or sexual relationships context. While IPV often manifests in these contexts, it also extends to child and elder abuse or abuse perpetrated by any member of a household.</t>
      <t>Digital technologies are central in modern lives and can be used as a way to enable and enhance IPV. Technology-based IPV has profound implications on the physical, psychological and emotional health of survivors, affecting them not only at the individual level but also disrupting their broader social environment [ref].
Furthermore, technology-based IPV can create an immediate potential for offline, real-world harm, as attackers can use these methods to control, locate, or confront their victims in person. This blending of digital abuse and offline harm increases the severity and urgency of the threat faced by victims.</t>
      <t>There is significant existing work in the field of online gender-based violence <xref target="IPVTechBib"/><xref target="CSP"/> and technology-based IPV <xref target="Freed"/> mainly focused on response and resiliency, including digital privacy and safety strategies. Nevertheless, even when this literature exists, IPV is not considered enough when designing digital technologies, networks, or Internet protocols, and it is not part of threat-modelling. Protocol design or cybersecurity best practices rarely account for IPV-specific scenarios, as seen in only a few cases <xref target="CETAStrategies"/>. These omissions highlight the need to consider the privacy and security risks involved, as noted in <xref target="RFC6973"/>.</t>
      <t>Unlike traditional "attackers", an abuser in the context of IPV is a close and familiar figure: an "attacker you know." This attacker is neither solely on-path nor off-path; they often have full access to their target's devices and local networks, sharing intimate spaces and information. Moreover, abusers can coerce and manipulate their victims (hereafter, referred to as targets) directly.</t>
      <t>This document outlines the tactics employed in technology-based IPV and offers recommendations for designing protocols and technologies to mitigate these tactics. It begins with a comprehensive overview of IPV and related terminology, followed by an exploration of the specific tactics used by abusers, culminating in actionable recommendations for the digital design community</t>
      <t>Although the category of technology-abuse includes practices such as Child Sexual Abuse Material (CSAM), or digital manipulation of images and videos (deepfakes) to exhibit and slander women <xref target="Witness"/>, those tactics are out of scope in this document, since the attacker is not part of the victim's social environment, i.e. they do not necessarily have access to the victim's local network. However, in some ocasions, this distinction doesn’t always hold.</t>
      <t>The point of this document is to describe technological means by which abuse may be enacted. It is not claiming, and cannot claim, that these means are inherently abusive.</t>
    </section>
    <section anchor="definition-of-technology-based-ipv">
      <name>Definition of technology-based IPV</name>
      <t>Technology-based intimate partner violence (IPV) refers to the use of digital tools and technologies to enable, escalate, and reinforce abusive behaviors. IPV itself encompasses physical, emotional, verbal, sexual, or economic abuse committed by a current or former intimate partner. A "partner" in this context is not limited to romantic or sexual relationships, but can extend to anyone with a close relationship to the victim, including household members involved in child or elder abuse. What defines IPV is the inherent unequal power relationship, where the abuser leverages this imbalance to inflict harm and exert control.</t>
      <t>In technology-based IPV, the attacker exploits various forms of digital technology to perpetrate abuse, often through pervasive surveillance, overt monitoring, coercive access to devices or accounts, and manipulation of digital communications. This is known as "digital coercive control" <xref target="Dragiewicz2018"/>, which is a form of abuse where access to personal technology, such as smartphones, social media, or local networks, becomes a means for the abuser to assert control, engage in stalking, or inflict psychological harassment. Internet-enabled technologies amplify the abuser's ability to conduct continuous surveillance or escalate harm remotely, reinforcing the unequal power dynamic present in IPV situations.</t>
      <t>While technology-facilitated abuse can affect anyone, it is crucial to recognize its intersection with gender-based violence. As noted by <xref target="APCFramework"/>, "women and girls face specific cyber threats in the digital age that are considered forms of gender-based violence as they occur because of their gender, or because they disproportionately affect one gender." This intersection arises because digital abuse is embedded in the same offline structural violence that perpetuates gender inequality, but the technological dimension introduces new elements: searchability, persistence, replicability, and scalability. These features allow abusers to more easily track their targets, replicate abusive content, and escalate harassment across platforms, magnifying the harm inflicted.</t>
      <t>Furthermore, the unique aspects of technology-based IPV—such as the ability to monitor in real-time, manipulate social media, or restrict access to digital resources—can severely limit a victim's autonomy and mobility. This creates a new layer of control that extends beyond traditional physical spaces into the digital realm, making it harder for victims to escape the abuse, as the abuser often has constant or even remote access to the victim’s digital life.</t>
      <t>Ultimately, technology-based IPV is not just an extension of traditional abuse; it is an evolving form of violence that capitalizes on the pervasive and intimate nature of digital technology to create a form of control that is difficult to detect and even harder to escape. Addressing this issue requires a deep understanding of both the technical tools used by abusers and the social dynamics at play, including the broader structural inequalities that enable such abuse.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>In the rest of this draft, we will use this terminology:</t>
        <ul spacing="normal">
          <li>
            <t>Attacker: By "attacker" we mean a person, an abuser in an IPV situation that is using
digital tools to enable and enhance abuse. An attacker can also be referred to as "perpetrator".</t>
          </li>
          <li>
            <t>Victim: By "victim" we mean a person who is subject or target of an attack. Notice that we are using
this term only in the temporary context of an attack scenario. We prefer the term "survivor", which recognizes the agency and resistance tactics of those facing IPV, but for the purposes of this document we focus on the fact of being subject of specific technology-based IPV attacks.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="technology-based-ipv-attacks">
      <name>Technology-based IPV attacks</name>
      <t>In this section, we describe IPV attacks that are enabled or exacerbated by Internet technology. First, we outline our assumptions about this type of attacker and common tactics they may use. Then, we describe the types of technology-enabled IPV attacks.</t>
      <section anchor="the-tech-asisted-ipv-attacker">
        <name>The tech-asisted IPV attacker</name>
        <t>The attacker we focus on in this document is someone who either forcefully controls accounts, devices, and/or authentication information used to access systems, or leverages publicly available information to exert this control. This attacker may or may not be technologically skilled (it might be "technology savvy" or not). From a threat model perspective, this attacker is one of the strongest ones as it can use their abilities to gain unlimited access to systems and devices without needing significant financial or computational resources.</t>
        <t>The attacker typically has (or has had) physical access to the victim and often shares a common social network with them. In some cases, the attacker may legally own the devices or accounts the victim uses, further complicating the victim’s ability to maintain control.</t>
        <t>The attacker is not implied to have infinite computing power or unrestricted access to external systems (e.g., companies infrastructure). Rather, the focus is on their ability to gain unlimited access to the victim's personal devices and accounts due to their proximity, control, or manipulation of the victim's authentication mechanisms and personal data.</t>
      </section>
      <section anchor="tech-based-ipv-tactics">
        <name>Tech-based IPV tactics</name>
        <t>There are many ways in which digital and networked technology can facilitate an attacker perpetrating IPV.
For an in-depth reading, see <xref target="TBMDGMMDR"/> and <xref target="CDOHPFLDMR"/>.
Below, we informally categorize the main tactics attackers use:</t>
        <ul spacing="normal">
          <li>
            <t>Ready-made tools: Attackers can use applications or devices
that are solely built to facilitate IPV. These types of technology are sometimes referred to as "stalkerware" or "spouseware".</t>
          </li>
          <li>
            <t>Dual-use tools: Attackers can repurpose applications, settings or devices built for beneficial or innocuous
purposes to cause harm. This is the case, for example, of anti-theft devices that can be repurposed for stalking, or to location-tracking tools. The latter is subject to its own considerations <xref target="DULT"/>.</t>
          </li>
          <li>
            <t>Impersonation attacks: Knowing personal information coupled with access to authentication mechanisms gives an attacker the ability to fully authenticate to services and accounts of the victim, effectively impersonating them. This can be executed to the degree that the victim can no longer successfully authenticate themselves to their services or accounts.</t>
          </li>
          <li>
            <t>UI-bound impersonation attacks: Attackers can abuse technology to enhance IPV by abusing the
User Interface (UI) of a specific tool. In this case, attackers become authenticated but adversarial users of a
system. They cannot, however, escalate to root privileges or access other underlying
functionalities of the system. They are bound to the UI of whatever system they managed
to authenticate to. We will explore later the ways attackers use to forcibly gain
authentication to a system.</t>
          </li>
          <li>
            <t>Social media and forums: Attackers can learn and share information on how to use
technology to enhance IPV through the usage of these platforms. These spaces may also provide narrative justifications for abusive behavior and facilitate cyberstalking, cyberbullying, and doxxing.</t>
          </li>
          <li>
            <t>Perception of Threat and Vulnerability: The awareness of a pervasive threat can act as a powerful form of control. Attackers often leverage the perception that technology could be used for IPV as a means of manipulating victims, eroding their sense of safety and agency. This can extend to perceptions of vulnerability within the victim's network or system: the mere suspicion of a vulnerability could compound feelings of insecurity. Research on user perceptions of technology trustworthiness, especially within messaging apps (see <xref target="UPMSG"/>), indicates that perceived threats and vulnerabilities in communication channels can discourage users from trusting or seeking help through these technologies. Such dynamics can further isolate victims and create additional barriers to receiving support.</t>
          </li>
        </ul>
      </section>
      <section anchor="kinds-of-tech-enabled-ipv-attacks">
        <name>Kinds of tech-enabled IPV attacks</name>
        <ul spacing="normal">
          <li>
            <t>Monitoring: A prevalent tactic to facilitate IPV is the active, intrusive monitoring of the victim’s online activities and accounts. This ongoing surveillance can encompass a range of behaviors that feel invasive, often involving threats or intimidation. The "active" nature of this monitoring means it may be apparent to the victim or entirely hidden, depending on the abuser's intent. Forms of monitoring include:
            </t>
            <ul spacing="normal">
              <li>
                <t>Monitoring of communication, which can be e-mail-based, chat-based or social media communications, or browsing information
(history, cookies or more) either directly on the victim's device or through
specialised applications.</t>
              </li>
              <li>
                <t>Monitoring location and whereabouts by looking at the metadata of communication,
by using location-help applications, or by using specialized applications.</t>
              </li>
              <li>
                <t>Monitoring any data sent over the network by mounting DNS attacks or other specialised
attacks.</t>
              </li>
              <li>
                <t>Monitoring any information found on the UI by looking at devices screens while the
victim is using them.</t>
              </li>
              <li>
                <t>Data gathering by using the Internet to seek public or private information to compile a
victim's personal information for use in harassment.</t>
              </li>
              <li>
                <t>Monitoring security cameras or systems for home security</t>
              </li>
            </ul>
            <t>
In this type of attack, we see these dimensions:  </t>
            <ul spacing="normal">
              <li>
                <t>Monitoring of communication content at various layers, including the application layer (e.g., chat or email content) and network layers (e.g., packet inspection or traffic analysis).</t>
              </li>
              <li>
                <t>Monitoring of the UI content of application tools.</t>
              </li>
              <li>
                <t>Monitoring of location information.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Compromise of accounts: An attacker may demand access to the victim's accounts to continuously monitor, control, manipulate or restrict their digital communications and activities. Unlike passive monitoring with publicly available tools, the attacker demands access to tools and contents in order to reduce the "life space" or "space for action" that the victim has for independent activities.
Once access is obtained, an attacker can:  </t>
            <ul spacing="normal">
              <li>
                <t>Delete data, which can be communication data, documents and more (essentially, any data
stored in the account).</t>
              </li>
              <li>
                <t>Gain access to contacts such as friends, family or colleagues.</t>
              </li>
              <li>
                <t>Gain access to communications, audio-video content, and any associated metadata.</t>
              </li>
              <li>
                <t>Modify or manipulate any communications, audio-video content, and any associated metadata.</t>
              </li>
              <li>
                <t>Lock out or change the authentication mechanisms that grant access to the account.</t>
              </li>
              <li>
                <t>Impersonate the victim by using the victim's online identity to send false/forged messages to
others or to purchase goods and services.</t>
              </li>
              <li>
                <t>Impersonate the victim by using the victim's online identity to publicly post information
that can be private or fake, impacting their reputation and sense of security.</t>
              </li>
              <li>
                <t>Impersonate the victim by using the victim's online or legal identity to sign victims up for services.</t>
              </li>
              <li>
                <t>Exposing private information or media by distributing intimate or private data (which could have been adquired via coercive tactics).</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Compromise of devices: This attack is similar to the above, but the attacker
demands access to the victim's devices. The goal is the same as the above but the
result is more impactful, as it restricts access and gives access to accounts that are accessed
through the device. It can also prevent the victim from having any connection to the Internet.
Once an attacker has access to the device, they can use it to:
            </t>
            <ul spacing="normal">
              <li>
                <t>Phisically prevent the use of the abilities given by the device (the device can be used, for example,
to call police services, which is restricted with this attack).</t>
              </li>
              <li>
                <t>Access contacts and data (media or messages) stored in it.</t>
              </li>
              <li>
                <t>Access to accounts and authentication mechanisms for other accounts (saved passwords or
authenticator apps -2-factor authentication-, for example).</t>
              </li>
              <li>
                <t>Perform impersonation.</t>
              </li>
              <li>
                <t>Perform denial of access to the device, networks or the Internet in general.</t>
              </li>
              <li>
                <t>Destroy the device itself and any information stored in it.</t>
              </li>
              <li>
                <t>Impersonate by using the victim's online identity, as accessed through the device,
to publicly post information that can be private or fake.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Exposing Private Information or Media: This attack often builds on other the forms of attack.
Once an attacker gains access to an account or device, they can harvest sensitive data,
including personal and/or private media, messages, and private documents. This stolen
information can then be used to threaten, extort, or humiliate the victim. For example,
intimate images may be used for blackmail, or private details such as bank account and tax
information may be exploited. The attacker may also engage in doxxing by publicly sharing
private details to damage the victim’s reputation or relationships.</t>
          </li>
          <li>
            <t>Denial of Access: This attack can also be built upon previous ones, and its objective is to
block the victim's access to essential services. It can include physical measures such as
destroying routers or network devices, changing Wi-Fi passwords, or modifying network settings.
This prevents the victim from connecting to the Internet or accessing online services.
Denial of access may also target financial abuse, such as restricting the victim's access to
online banking or digital wallets, making it difficult or impossible for them to manage their finances.
Denial of access can also extend to digital communication disruptions, such as flooding the
victim’s communication platforms with unwanted messages or deploying viruses to compromise
their devices. The goal is to isolate the victim, severing their connection to the outside world,
including family, friends, and support networks.</t>
          </li>
          <li>
            <t>Threats: Often intertwined with denial of access, threats involve sending harassing or abusive
messages via email, chat, or social media. These messages may include insults, intimidation,
or direct threats of harm. The purpose is to instill fear, destabilize the victim's emotional
state, and force compliance, either by causing distress or pushing the victim toward further
harmful actions. Threats can escalate into more severe attacks, including denial of access or
exposure of private information.</t>
          </li>
          <li>
            <t>Harassment: Harassment can be anonymous, but in many cases, the victim knows the identity of the
attacker. However, due to the anonymity of certain platforms, the victim may struggle to hold the
perpetrator accountable. The systems in place often require that harassing content be permanently
available for investigation, but this can, in turn, prolong the victim's exposure to the abuse.
Harassment can manifest in various forms and dimensions:
            </t>
            <ul spacing="normal">
              <li>
                <t>Ongoing Harassment: This type of harassment is persistent, with the goal of intimidating,
humiliating, and psychologically tormenting the victim. It often involves repeated messages, threats,
or actions that make the victim feel unsafe or violated.</t>
              </li>
              <li>
                <t>Post-Disconnection Harassment: Once the attacker no longer has physical control over the victim,
they may resort to cyberstalking or continued harassment online. This form of abuse allows the
attacker to maintain control over the victim by stalking their digital presence, often through
social media, messaging platforms, or by monitoring their activities in other ways.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="means-of-attacking">
        <name>Means of attacking</name>
        <t>The attacks described above can be carried out using various methods. Below are some of the most common approaches:</t>
        <ul spacing="normal">
          <li>
            <t>Spyware Installation and Spoofing: This method involves installing malicious software on the victim's device to gain unauthorized access to their accounts or to conduct active monitoring. It may also include spoofing techniques to bypass security measures, such as remotely compromising security questions, passwords, or other authentication methods. These tools are typically installed without the victim's knowledge, giving the attacker covert access to their personal information.</t>
          </li>
          <li>
            <t>Coercion and Control: This form of attack leverages physical, emotional, or psychological manipulation to gain access to a victim's devices, network credentials, or digital information. It often involves forcing the victim to reveal sensitive details, such as passwords, PINs, or authentication mechanisms for their accounts and devices, creating an environment of control and fear.</t>
          </li>
          <li>
            <t>Shared Network Plans and Account Ownership: In some cases, an attacker may be the legal owner of a device (e.g., a parent's control over a child's device) or have access to shared family accounts or network plans. For instance, an abuser may control a joint bank account or device within a shared family plan, allowing them to carry out attacks without the victim's knowledge and without needing to install malicious software.</t>
          </li>
          <li>
            <t>Monitoring: This method involves the exploitation of social media and other publicly available information to track the victim's activities. It may also include the installation of monitoring tools on the victim's devices or the abuse of "benign" applications (e.g., location-tracking apps) in a malicious way. The attacker uses these tools to keep tabs on the victim's movements and interactions, often in secret.</t>
          </li>
          <li>
            <t>Exposure: This method involves the use of social media platforms to amplify harassment. It includes actions such as posting harmful content to embarrass, humiliate, or intimidate the victim, or sharing private information like intimate images without consent. This form of attack may also involve doxxing, where the victim's personal details are shared publicly to cause distress or harm to their relationships and reputation.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="specific-abused-technology">
      <name>Specific abused technology</name>
      <t>Research into how attackers exploit technology to enhance IPV reveals that the following technologies are frequently abused:</t>
      <ul spacing="normal">
        <li>
          <t>Passwords and Authentication Mechanisms: Authentication systems are often the primary point of failure in IPV attacks. Once an attacker gains access to a victim's account or device, they can use that access to compromise additional accounts or devices. Attackers can use specialized tools, often installed surreptitiously on the victim's device, to capture authentication data. They may also coerce victims into revealing passwords or bypassing security features. This includes targeting biometrics (e.g., fingerprints, facial recognition), two-factor authentication (2FA) systems, and other multi-layered security methods.</t>
        </li>
        <li>
          <t>Media and Private Information: Attackers who gain access to devices or accounts can harvest private media and sensitive personal information. This data can then be used to extort the victim, humiliate them (by sharing it publicly), or escalate harassment. Private communications, photos, and other intimate materials are particularly vulnerable to such exploitation, often used as leverage in controlling or threatening the victim.</t>
        </li>
        <li>
          <t>Account Recovery Mechanisms: In addition to direct access to authentication mechanisms, attackers can manipulate account recovery processes to gain unauthorized access to accounts. This includes exploiting weaknesses in 2FA devices, recovery email systems, or password reset tools. By compromising these systems, attackers can gain control over multiple online profiles, furthering their ability to surveil and control the victim.</t>
        </li>
        <li>
          <t>Lack of Blocking Mechanisms and Exploitation of Anonymous Channels: Many platforms and communication tools lack effective blocking or reporting mechanisms, which attackers exploit to continue their abuse. Common tactics include:  </t>
          <ul spacing="normal">
            <li>
              <t>Using fake phone numbers or burner accounts to contact the victim.</t>
            </li>
            <li>
              <t>Sending messages via platforms with open channels that do not require mutual consent (e.g., messaging apps with open chat features).</t>
            </li>
            <li>
              <t>Exploiting "read receipts" or similar features to monitor the victim's engagement with their messages, thereby gaining further control.</t>
            </li>
            <li>
              <t>Abusing the absence of robust blocking features to maintain constant contact and harassment.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="recommendations">
      <name>Recommendations</name>
      <t>The following recommendations are tailored for protocol and systems designers to help mitigate technology-enabled IPV, recognizing that IPV often occurs within the broader context of structural violence (which can be gender-based violence). While these attacks are facilitated or exacerbated by technological tools, the recommendations focus on enabling victims to regain control, prevent the abuse of power, and limit attackers' ability to carry out actions that entrench their control.</t>
      <ul spacing="normal">
        <li>
          <t>Build proper authentication systems: Authentication mechanisms should be designed with the following features:
          </t>
          <ul spacing="normal">
            <li>
              <t>Account Access Transparency: Maintain a non-deletable and non-modifiable list of devices with access to accounts and a record of active sessions.</t>
            </li>
            <li>
              <t>Recovery and Revocation: Provide secure ways to recover access to accounts and change authentication mechanisms. Allow easy revocation of access, including when an account or device is compromised.</t>
            </li>
            <li>
              <t>Clear Notifications: Send notifications when:
              </t>
              <ul spacing="normal">
                <li>
                  <t>New devices are used to access an account.</t>
                </li>
                <li>
                  <t>Attempts to access accounts occur.</t>
                </li>
                <li>
                  <t>Changes are made to account details.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Approval Mechanism for Access: Implement a system that allows users to approve or deny access attempts from new devices or locations.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Storage and sharing of media: Media should be handled in a way that allows the victim to retain control:
          </t>
          <ul spacing="normal">
            <li>
              <t>Media Takedown: Ensure that private media posted without consent can be taken down at the victim's request.</t>
            </li>
            <li>
              <t>Dealing with Re-posting: Implement mechanisms to prevent re-posting of previously reported non-consensual media, either by blocking its sharing or by flagging it across platforms and devices.</t>
            </li>
            <li>
              <t>Secure Reporting Mechanisms: Provide private, confidential ways to report non-consensual media, with systems in place to ensure the victim's privacy is protected.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Social Media Platforms: Social media can be a powerful tool for perpetrators, enhancing monitoring and control. Platforms should:
          </t>
          <ul spacing="normal">
            <li>
              <t>Comprehensive Blocking Systems: Provide blocking systems that go beyond individual accounts, potentially linking accounts and devices associated with a blocked user to prevent continued harassment or monitoring.</t>
            </li>
            <li>
              <t>Restricted Messaging: Enable users to set privacy controls that allow only approved contacts to send messages to their accounts.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Browser and Search Data: Browsers and search engines should prioritize privacy and security:
          </t>
          <ul spacing="normal">
            <li>
              <t>Automatic Deletion: Browser history, search information, and related metadata should be deleted by default after each session or within a specified time frame (triggerred by users, for example). This protects users from unwanted surveillance.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>End-to-end encryption must be the default for any messaging in order to prevent network monitoring and ensure that digital communications remain private.</t>
        </li>
        <li>
          <t>Gender Sensitivity in Design:
          </t>
          <ul spacing="normal">
            <li>
              <t>Gender-Informed Design: Designers should adopt a gender-sensitive approach when developing tools and applications. Recognizing the structural inequalities inherent in IPV helps build systems that are supportive of the unique needs of victims.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Local Attackers and Sensitive Applications
          </t>
          <ul spacing="normal">
            <li>
              <t>Security for Local Attackers: When designing sensitive applications, ensure that they are secure against local attackers, including those who may have physical access to the device. Sensitive applications refer to any software or services that handle private or confidential data, such as personal accounts, financial tools, and communication platforms.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Detection Tools and Analytics
          </t>
          <ul spacing="normal">
            <li>
              <t>Building Detection Tools: Develop advanced detection tools with IPV-specific algorithms and systems. These tools should focus on identifying patterns of control and abuse, as well as enhancing logging and analytics for detecting unusual or suspicious activity. Consider guidance for building such tools <xref target="UNGUI"/>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Engineer plausible deniability for sensitive applications.</t>
        </li>
        <li>
          <t>Build detection tools and improve logging and analytics for user agents and devices with IPV in mind.</t>
        </li>
        <li>
          <t>Transparent Reporting: IPV-related issues should not be viewed solely as privacy concerns. It’s crucial to address areas such as transparency in reporting mechanisms, identity management, and proper accountability measures in tech systems to counter the misuse of power.</t>
        </li>
      </ul>
      <t>It is important to note that IPV should not be mistaken to be a privacy issue alone. Furthermore any tech-based solutions and interventions that only address privacy can be used by attackers, helping them to cloak their attacks from the victim and other means of detection. Power is imbalanced in IPV and technology entrenches power.<xref target="Citron"/></t>
      <t>It's essential to acknowledge  as well that implementing these recommendations will not fully eliminate IPV due to the broader power imbalances in society. However, these measures can play a critical role in addressing the use of technology to facilitate abuse. Addressing IPV through technology must be viewed as a step toward giving victims the tools to regain control, while simultaneously limiting the means by which abusers can continue their attacks.</t>
    </section>
    <section anchor="resources">
      <name>Resources</name>
      <ul spacing="normal">
        <li>
          <t>Cornell Tech's Clinic to End Tech Abuse https://www.ceta.tech.cornell.edu/</t>
        </li>
        <li>
          <t>List of domestic violence hotlines around the world https://en.wikipedia.org/wiki/List_of_domestic_violence_hotlines</t>
        </li>
        <li>
          <t>Procedures and tools for clinical computer security https://www.usenix.org/conference/usenixsecurity19/presentation/havron</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document is about security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="B. Schneier" initials="B." surname="Schneier"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="B. Trammell" initials="B." surname="Trammell"/>
          <author fullname="C. Huitema" initials="C." surname="Huitema"/>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC6973">
        <front>
          <title>Privacy Considerations for Internet Protocols</title>
          <author fullname="A. Cooper" initials="A." surname="Cooper"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="J. Morris" initials="J." surname="Morris"/>
          <author fullname="M. Hansen" initials="M." surname="Hansen"/>
          <author fullname="R. Smith" initials="R." surname="Smith"/>
          <date month="July" year="2013"/>
          <abstract>
            <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6973"/>
        <seriesInfo name="DOI" value="10.17487/RFC6973"/>
      </reference>
      <reference anchor="NCAV" target="https://ncadv.org/learn-more/statistics">
        <front>
          <title>National Statistics Domestic Violence</title>
          <author initials="N. C. A. D. V." surname="Abuse" fullname="National Coalition Against Domestic Violence Abuse">
            <organization/>
          </author>
          <date year="2022" month="September" day="06"/>
        </front>
      </reference>
      <reference anchor="Dragiewicz2018" target="https://www.tandfonline.com/doi/abs/10.1080/14680777.2018.1447341">
        <front>
          <title>Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms</title>
          <author initials="M." surname="Dragiewicz" fullname="Molly Dragiewicz">
            <organization/>
          </author>
          <author initials="J." surname="Burgess" fullname="Jean Burgess">
            <organization/>
          </author>
          <author initials="A." surname="Matamoros-Fernández" fullname="Ariadna Matamoros-Fernández">
            <organization/>
          </author>
          <author initials="M." surname="Salter" fullname="Michael Salter">
            <organization/>
          </author>
          <author initials="N. P." surname="Suzor" fullname="Nicolas P. Suzor">
            <organization/>
          </author>
          <author initials="D." surname="Woodlock" fullname="Delanie Woodlock">
            <organization/>
          </author>
          <author initials="B." surname="Harris" fullname="Bridget Harris">
            <organization/>
          </author>
          <date year="2022" month="September" day="06"/>
        </front>
      </reference>
      <reference anchor="WHO" target="https://apps.who.int/iris/bitstream/handle/10665/77432/WHO_RHR_12.36_eng.pdf">
        <front>
          <title>Understanding and Addressing Violence Against Women: Intimate Partner Violence</title>
          <author initials="W. H." surname="Organization" fullname="World Health Organization">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Freed" target="https://doi.org/10.1145/3134681">
        <front>
          <title>Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders</title>
          <author initials="D." surname="Freed" fullname="Diana Freed">
            <organization/>
          </author>
          <author initials="J." surname="Palmer" fullname="Jackeline Palmer">
            <organization/>
          </author>
          <author initials="D." surname="Minchala" fullname="Diana Minchala">
            <organization/>
          </author>
          <author initials="K." surname="Levy" fullname="Karen Levy">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Citron" target="https://wwnorton.com/books/9780393882315">
        <front>
          <title>The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age</title>
          <author initials="D. K." surname="Citron" fullname="Danielle Keats Citron">
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="IPVTechBib" target="https://ipvtechbib.randhome.io/">
        <front>
          <title>Selected Research Papers on Technology used in Intimate Partner Violence</title>
          <author initials="E." surname="Maynier" fullname="Etienne Maynier">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CSP" target="https://www.ipvtechresearch.org">
        <front>
          <title>Computer Security and Privacy for Survivors of Intimate Partner Violence</title>
          <author initials="C. to E. T." surname="Abuse" fullname="Clinic to End Tech Abuse">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CETAStrategies" target="https://www.ceta.tech.cornell.edu/resources">
        <front>
          <title>Resources from the Clinic to End Tech Abuse</title>
          <author initials="C. to E. T." surname="Abuse" fullname="Clinic to End Tech Abuse">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="TBMDGMMDR" target="https://arxiv.org/abs/2005.14341">
        <front>
          <title>The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums</title>
          <author initials="E." surname="Tseng" fullname="Emily Tseng">
            <organization/>
          </author>
          <author initials="R." surname="Bellini" fullname="Rosanna Bellini">
            <organization/>
          </author>
          <author initials="N." surname="McDonald" fullname="Nora McDonald">
            <organization/>
          </author>
          <author initials="M." surname="Danos" fullname="Matan Danos">
            <organization/>
          </author>
          <author initials="R." surname="Greenstadt" fullname="Rachel Greenstadt">
            <organization/>
          </author>
          <author initials="D." surname="McCoy" fullname="Damon McCoy">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CDOHPFLDMR" target="https://ieeexplore.ieee.org/document/8418618">
        <front>
          <title>The Spyware Used in Intimate Partner Violence</title>
          <author initials="R." surname="Chatterjee" fullname="Rahul Chatterjee">
            <organization/>
          </author>
          <author initials="P." surname="Doerfler" fullname="Periwinkle Doerfler">
            <organization/>
          </author>
          <author initials="H." surname="Orgad" fullname="Hadas Orgad">
            <organization/>
          </author>
          <author initials="S." surname="Havron" fullname="Sam Havron">
            <organization/>
          </author>
          <author initials="J." surname="Palmer" fullname="Jackeline Palmer">
            <organization/>
          </author>
          <author initials="D." surname="Freed" fullname="Diana Freed">
            <organization/>
          </author>
          <author initials="K." surname="Levy" fullname="Karen Levy">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <author initials="D." surname="McCoy" fullname="Damon McCoy">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <author initials="E." surname="Tseng" fullname="Emily Tseng">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="APCFramework" target="https://www.apc.org/sites/default/files/gender-cybersecurity-policy-litreview.pdf">
        <front>
          <title>A framework for developing gender-reponsive cybersecurity policy</title>
          <author initials="A. for P." surname="Communication" fullname="Association for Progressive Communication">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="Witness" target="https://journals.sagepub.com/doi/10.1177/14648849211060644">
        <front>
          <title>Deepfakes, misinformation and disinformation and authenticity infrastructure responses: Impacts on frontline witnessing, distant witnessing, and civic journalism</title>
          <author initials="S." surname="Gregory" fullname="Sam Gregory">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="DULT" target="https://datatracker.ietf.org/wg/dult/about/">
        <front>
          <title>Detecting Unwanted Location Trackers</title>
          <author initials="I. D." surname="WG" fullname="IETF DULT WG">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="UPMSG" target="https://www.designtrustworthymessaging.org/">
        <front>
          <title>Unbreakable: Designing for Trustworthiness in Private Messaging</title>
          <author initials="" surname="Unbreakable" fullname="Unbreakable">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="UNGUI" target="https://datatracker.ietf.org/meeting/118/materials/slides-118-hrpc-unfpa-gbv-tech-guidance-00">
        <front>
          <title>Guidance on safe and ethical use of technology to address GBV and HP</title>
          <author initials="U. N. P. F. G. T." surname="Division" fullname="United Nations Population Fund GHRB Technical Division">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
    <?line 399?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to:</t>
      <ul spacing="normal">
        <li>
          <t>Lana Ramjit and Thomas Ristenpart for their insipiring work on this area,
and guidance for this draft.</t>
        </li>
        <li>
          <t>Shivan Kaul and Pete Snyder for discussions, guidance and support.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
