Mark Reinhardt- Boise Idaho
Salon.com has recently issued a piece regarding a young woman who was a victim of Doxxing. This practice involves taking someones image of an intimate nature and spreading it around the internet for the purposes of humiliation.
First and foremost, I am not ok with this practice, and personally believe that men who engage in this behavior are immature children.
That being said, there are common sense pre-cautions that you can take avoid being a victim
1. If you don’t want that image spread, don’t click send on that email.
When you click send on an email, you are giving consent to the other person along with any attachments associated with that email.
2. I will be addressing a tweet that was issued in response to number one.
Hacking is the Digital Equivalent of “Breaking and Entering” and is not an action of consent, it is an action of theft. Which is also an act of agression on part of the person engaging in such activities.Taping over your Smartphone and Web camera’s is the best practice in protecting yourself from the hacking issue involved in such actions.
There are already plenty of laws on the books that address the issue of Hacking, in fact, as Cornell University Law School notes;
U.S. Code › Title 18 › Part I › Chapter 47 › § 1029
18 U.S. Code § 1029 – Fraud and related activity in connection with access devices
(1) knowingly and with intent to defraud produces, uses, or traffics in one or more counterfeit access devices;
(2) knowingly and with intent to defraud traffics in or uses one or more unauthorized access devices during any one-year period, and by such conduct obtains anything of value aggregating $1,000 or more during that period;
(3) knowingly and with intent to defraud possesses fifteen or more devices which are counterfeit or unauthorized access devices;
(4) knowingly, and with intent to defraud, produces, traffics in, has control or custody of, or possesses device-making equipment;
Other examples include Extortion, Blackmail, among others.
Granted, the laws related to unauthorized computer access differs from Country to Country. This is why taking measures to protect yourself is a must.
While I am deeply sorry that this has happened. I am not in favor of new laws regulating the Internet. However, people who are victims can contact ic3.gov.