<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-celi-irtf-hrpc-ipvc-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="ipvc">Intimate Partner Violence Digital Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-celi-irtf-hrpc-ipvc-01"/>
    <author initials="S." surname="Celi" fullname="Sofia Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="J." surname="Guerra" fullname="Juliana Guerra">
      <organization/>
      <address>
        <email>juliana@usuarix.net</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <date year="2023" month="September" day="02"/>
    <area>General</area>
    <workgroup>None</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 132?>

<t>This document aims to inform how Internet protocols and their implementations might better mitigate technical attacks at the user endpoint by describing technology-based practices to perpetrate intimate partner violence (IPV). IPV is a pervasive reality that is not limited to, but can be exacerbated with, the usage of technology. The IPV context enables the attacker to access one, some or all of: devices, local networks, authentication mechanisms, identity information, and accounts. These kinds of technical compromise exist in addition to on-path attacks, both active and passive <xref target="RFC7624"/>. In this document we describe the tactics the IPV attacker uses and what kind of counter-measures can be designed in IETF protocols.</t>
    </abstract>
  </front>
  <middle>
    <?line 136?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Intimate partner violence (IPV) refers to physical, emotional, verbal, sexual, or economic abuse of a person by a current or former intimate partner (henceforth, refered to as the attacker or abuser).<xref target="WHO"/> It is understood that in IPV cases there is an unequal power relationship that enables the abuser to cause harm in romantic or sexual relationships, as well as child or elder abuse, or abuse by any member of a household.</t>
      <t>Digital technologies are central in modern lives and can be used as a way to enable and enhance IPV. Technology-based IPV has impact on the physical, psychological and emotional health of survivors, affecting them not only individually but their social environment [ref].</t>
      <t>There is significant existing work in the field of online gender based violence <xref target="IPVTechBib"/><xref target="CSP"/> and technology-based IPV <xref target="Freed"/> mainly focused on response and resiliency, including digital privacy and safety strategies. Nevertheless, IPV is not considered enough when designing digital technologies, networks, or Internet protocols against threats. Only in rare cases are protocol design or cybersecurity best practices/tactics available <xref target="CETAStrategies"/>.</t>
      <t>The type of abuser that is close and familiar to the victim, "the attacker you know", is neither on- nor off-path, they have complete access to-- perhaps even share-- devices and local networks. They can even coerce their targets.</t>
      <t>This document describes the tactics used in technology-based IPV. It provides recommendations for the design of protocols and implementations to mitigate those tactics. In what follows, we first describe IPV and related terminology, the kind of tactics attackers use, and we end with the recommendations.</t>
      <t>Although the category of tech abuse includes practices such as Child Sexual Abuse Material (CSAM), or digital manipulation of images and videos (deepfakes) to exhibit and slander women <xref target="Witness"/>, those tactics are out of scope in this document, since the attacker is not part of the victim's social environment, i.e. they do not necessarily have access to the victim's local network.</t>
    </section>
    <section anchor="definition-of-technology-based-ipv">
      <name>Definition of technology-based IPV</name>
      <t>Technology enables and enhances IPV attacks with pervasive surveillance, overt monitoring, and coercive access. IPV refers to physical, emotional, verbal, sexual, or economic abuse of a person by a current or former intimate partner. By "partner" we mean anyone with a close relationship with the victim that can exercise abuse in a romantic or sexual relationship, as well as child or elder abuse, or abuse by any member of a household. In cases of IPV, there is an unequal power relationship that enables the attacker to cause harm. <xref target="Dragiewicz2018"/> calls this "digital coercive control" whereby Internet-enabled technology-- through access to local networks, devices and accounts-- becomes a mechanism to exert control, to conduct surveillance, or to aggravate and harass.</t>
      <t>Note that while this kind of abuse of technology is excerted to any person (regarless of their gender or sexuality), there is an interesection with gender violence. As noted by <xref target="APCFramework"/>, "women and girls face specific cyber threats in the digital age that are considered forms of gender-based violence as they occur because of their gender, or because they disproportionately affect one gender. While this violence is mediated by digital technology, it is part of the same offline structural violence; but its technological dimension adds elements of search, persistence, replicability and scalability that facilitate the aggressors’ access to their targets and can exacerbate the harm."</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>In the rest of this draft, we will use this terminology:</t>
        <ul spacing="normal">
          <li>Attacker: By "attacker" we mean a person, an abuser in an IPV situation that is using
digital tools to enable and enhance abuse. An attacker can also be referred to as "perpetrator".</li>
          <li>Victim: By "victim" we mean a person who is subject or target of an attack. Notice that we are using
this term only in the temporary context of an attack scenario. We prefer the term "survivor", which recognizes the agency and resistance tactics of those facing IPV, but for the purposes of this document we focus on the fact of being subject of specific technology-based IPV attacks.</li>
        </ul>
      </section>
    </section>
    <section anchor="technology-based-ipv-attacks">
      <name>Technology-based IPV attacks</name>
      <t>In order to describe IPV attacks that are enabled or exacerbated by Internet technology, we first describe our assumptions about the attacker and common tactics that can be used. Then, the types of technology-enabled IPV attacks are described.</t>
      <section anchor="the-intimate-attacker">
        <name>The intimate attacker</name>
        <t>The attacker we present in this document is one that either has forceful control of
accounts, devices, and/or authentication information for accessing systems, or uses
public information to exercise control.
This kind of attacker can be technologically savvy or not. We define this
attacker as one of the strongest ones as it can have unlimited access to
systems and devices, whithout investing a lot of financial or computational resources.</t>
        <t>The attacker has some kind of physical access to the victim (or has had it in the past),
and often shares a common social network with them. In some cases, it can be
the legal owner of the devices/accounts a victim uses.</t>
      </section>
      <section anchor="tech-based-ipv-tactics">
        <name>Tech-based IPV tactics</name>
        <t>There are many ways in which digital and networked technology can facilitate an attacker perpetrating IPV.
For an in-depth reading, see <xref target="TBMDGMMDR"/> and <xref target="CDOHPFLDMR"/>.
Here we informally list their main groups:</t>
        <ul spacing="normal">
          <li>Ready-made tools: Attackers can use applications or devices
that are solely built to facilitate IPV. These apps are sometimes called "stalkerware" or "spouseware".</li>
          <li>Dual-use tools: Attackers can use applications, control settings or devices built for beneficial or innocuous
purposes and repurpose them for harm. This is the case, for example, of anti-theft
devices that can be repurposed for stalking.</li>
          <li>Impersonation attacks: Knowing personal information coupled with access to authentication mechanisms gives an attacker the ability to fully authenticate to services and accounts of the victim, effectively impersonating them. This can be executed to the degree that the victim can no longer successfully authenticate themselves.</li>
          <li>UI-bound impersonation attacks: Attackers can abuse technology to enhance IPV by abusing the
UI of a specific tool. In this case, attackers become authenticated but adversarial users of a
system. They cannot, however, escalate to root privileges or access other underlying
functionalities of the system. They are bound to whatever system they managed
to authenticate to. We will explore later the ways attackers use to forcibly gain
authentication to a system.</li>
          <li>Social media and forums: Attackers can learn and share information on how to use
technology to enhance IPV through the usage of these tools. They can also
receive narrative justification to condone their behaviour. They can also
perform cyberstalking, cyberbullying, doxxing with the usage of these tools.</li>
          <li>Perception of threat: The mere presence of a pervasive threat is a form of control. The perception that technology can be used to enhance IPV
is a tactic of attackers to control victims, take away agency and abuse them. This can lead
to lack of trust in technology, and further isolates the victim from seeking and receiving support.</li>
        </ul>
      </section>
      <section anchor="kinds-of-tech-enabled-ipv-attacks">
        <name>Kinds of tech-enabled IPV attacks</name>
        <ul spacing="normal">
          <li>
            <t>Monitoring: One of the most prevalent methods to enhance IPV is the usage of
active monitoring of any online account that the victim has or of any action that the
victim does in the digital world. This includes a variety of behaviors that
feel unwelcomed and intrusive, and can involve threats.
The monitoring is "active" in that is a permanent action that the victim can be
aware of or not, and that the abuser might want to make them aware or not. It can
include:
            </t>
            <ul spacing="normal">
              <li>Monitoring e-mail, chat-based or social media communications, or browsing information
(history, cookies or more) either directly on the victim's device or through
specialised applications.</li>
              <li>Monitoring location and whereabouts by looking at the metadata of communication,
by using location-help applications, or by using specialized applications.</li>
              <li>Monitoring any data sent over the network by mounting DNS attacks or other specialised
attacks.</li>
              <li>Monitoring any information found on the UI by looking at devices screens while the
victim is using them.</li>
              <li>Using the Internet to seek public or private information to compile a
victim's personal information for use in harassment.</li>
            </ul>
            <t>
In this type of attack, we see these dimensions:  </t>
            <ul spacing="normal">
              <li>Monitoring of the content of communications either at the application layer
or other layers.</li>
              <li>Monitoring of the UI content of application tools.</li>
              <li>Monitoring of location information.</li>
            </ul>
          </li>
          <li>
            <t>Compromise of accounts: An attacker may demand access to the victim's accounts to continuously monitor, control or restrict their online communications and activities. In contrast to the previous point, rather than using "publicly available" tools the perpetrator demands access to tools and contents in order to reduce the "life space" or "space for action" that the victim-survivor may have to perform activities that do not involve the attacker. Once an attacker has access to an online account, they can use that to:
            </t>
            <ul spacing="normal">
              <li>Delete data, which can be communication data, documents and more (any information s
stored in the device).</li>
              <li>Have access to contacts such as friends, family or colleagues.</li>
              <li>Have access to communications, audio-video content, and any associated metadata.</li>
              <li>Lock out or change the authentication mechanisms that grant access to the account.</li>
              <li>Impersonate by using the victim's online identity to send false/forged messages to
others or to purchase goods and services.</li>
              <li>Impersonate by using the victim's online identity to publicly post information
that can be private or fake.</li>
              <li>Impersonate by using the victim's online or legal identity to sign victims up for services.</li>
            </ul>
          </li>
          <li>
            <t>Compromise of devices: This attack is similar to the above, but the attacker
demands access to the victim's devices. The goal is the same as the above but the
result is more impactful as it restricts access to accounts that are accessed
through the device. It can also prevent any connection to the Internet.
Once an attacker has access to the device, they can use it to:
            </t>
            <ul spacing="normal">
              <li>Phisically prevent the use of the device (the device can be used, for example,
to call police services, which is restricted with this attack).</li>
              <li>Access contacts and data (media or messages) stored in it.</li>
              <li>Access to accounts and authentication mechanisms for other accounts (saved passwords or
authenticator apps -2-factor authentication-, for example).</li>
              <li>Perform impersonation.</li>
              <li>Perform denial of access to the device, networks or the Internet in general.</li>
              <li>Destroy the device itself and any information stored in it.</li>
              <li>Impersonate by using the victim's online identity, as accessed through the device,
to publicly post information that can be private or fake.</li>
            </ul>
          </li>
          <li>Exposing of private information or media: This attack builds on top of other attacks.
Once an attacker has access to an account or device, they can use this access to gather
private information or private media stored in it. This can later be used for
threatening, extortion, doxing (posting private information), and more.
It can also be used to gather information regarding bank accounts, tax information and more.</li>
          <li>Denial of access: This attack can be built on top of other attacks. It can consist
of denying access to a device, but also denying access to the Internet in general
by destroying routers (or network devices), changing Wi-Fi passwords or network
settings. The goal is to disallow access to services, or contact with family and friends.
It can also take the form of disrupting digital communications by flooding a
victim's communication tool with unwanted messages or by sending a virus program.</li>
          <li>Threats: This attack can be considered as a dimension of the previous attack as it can result
on a denial of access attack. It consists on sending e-mail, chat-based messages
or social media messages that threatens, insults, or harasses a victim.</li>
          <li>
            <t>Harrassing: Harrassment can be anonymous, but a victim often knows from whom harrassment
 messages/actions come from; but, due to its anonymity, it is unable to hold
 atackers accountable. The systems we have in place often need that harrassment
 content is permanently available so that an investigation takes place. This
 enhances the abuse a victim is suffering. This type of attack appears in different dimensions:
            </t>
            <ul spacing="normal">
              <li>On-going harassment with the goal of intimidation, humiliation and monitoring.</li>
              <li>Harrassment that appears after a victim has [disconnected] to continue coercion. When the abuser no longer has any physical control over the victim they can start to stalk them.</li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="means-of-attacking">
        <name>Means of attacking</name>
        <t>The above attacks can be carried out in different ways. We list here the most
common ones:</t>
        <ul spacing="normal">
          <li>Installation of spyware or spoofing: This form of attack consists of installing
unwanted tools into a device in order to gain access to accounts or for active
monitoring. It can also take the form of remote access by remotely "hacking"
security questions, passwords or any authentication mechanism. Most of the
time, these tools are installed without the victim's knowledge.</li>
          <li>Coercion and control: This form of attack consists of using coercion and control
(which can be physical, emotional or psychological) to gain access to devices,
network devices, accounts or digital information. It often takes the form of
forcing victims to reveal passwords or account/devices authentication mechanisms.</li>
          <li>Shared network plans between family/relationship members: Often times, an
attacker is the legal "owner" of a device (owning children's devices, for example)
or accounts (a bank account, for example),
or they have access to accounts/devices as they are part of a shared family
plan. This enables an attacker to carry out the previously mentioned attacks
without the knowledge of the victim and without the need for installation of
tools.</li>
          <li>Monitoring: This means of attack consists of the abuse of social media and any public
information found on digital tools from the victim that has been shared through them. It also involves installing
tools for active monitoring on devices or using "benign" applications in
a dual-use manner (applications, such as the "track my phone" one).</li>
          <li>Exposure: This means of attack consists of the abuse of social media to enhance
harassment. It consists of using social media to post harmful content to humiliate,
to harass family or friends, for doxxing or to non-consensually share
intimate/private media.</li>
        </ul>
      </section>
    </section>
    <section anchor="specific-abused-technology">
      <name>Specific abused technology</name>
      <t>In the research of the ways attackers use technology to enhance IPV, we see this
specific technology being abused:</t>
      <ul spacing="normal">
        <li>Passwords and authentication mechanisms: all authentication mechanisms can be
used to enhance IPV as they are the single point of failure used by attackers
to get access to the account and/or devices (and, once they have access to those, they
can get further access to other accounts or devices). Attackers can use
specialised tools (to be installed in devices) to record authentication
mechanisms, they can coerce victims in order to get access to devices, and more.
They can also mount these attacks against fingerprints and biometric authentication
mechanisms, 2-factor authentication devices/applications and more.</li>
        <li>Media and private information: attackers can use the access to accounts/devices
to gain access to media and private information. This media can later be
used to bribe a victim, to humiliate them (by publicly posting it), to
enhance harassment and more.</li>
        <li>Recovery of account mechanisms: as with authentication mechanisms, attackers
can use 2-factor authentication devices, accounts and/or applications to get access to other
accounts or profiles</li>
        <li>
          <t>Lack of blocking mechanisms and abuse of anonymous mechanisms: Often times
attackers carry out abuse by:
          </t>
          <ul spacing="normal">
            <li>Contacting through fake numbers</li>
            <li>Contacting through fake accounts</li>
            <li>Sending messages to applications that have a "open" chanel for receiving any
message.</li>
            <li>Abusing of read-recipes to enhance control.</li>
            <li>Abusing the lack of blocking mechanisms.</li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="recommendations">
      <name>Recommendations</name>
      <t>We list here some recommendations to protocol designers to mitigate technology-enabled IPV:</t>
      <ul spacing="normal">
        <li>
          <t>Build proper authentication systems: authentication mechanisms should provide:
          </t>
          <ul spacing="normal">
            <li>A non-deletable and non-modifiable list of who has access to accounts/devices:
a list of recognised devices and a list of active sessions.</li>
            <li>A way to recover access to an account and to change authentication
mechanisms.</li>
            <li>Provide mechanisms to revoke access.</li>
            <li>
              <t>Send clear notifications for:
              </t>
              <ul spacing="normal">
                <li>when new devices are used to access an account,</li>
                <li>when there is attempt to access an account,</li>
                <li>when any change has been made to an account.</li>
              </ul>
            </li>
            <li>Provide mechanisms to approve access attempts to accounts (when, for example,
a new device is trying to access an account).</li>
          </ul>
        </li>
        <li>
          <t>Storage and sharing of media: media should be stored/posted in such a way that:
          </t>
          <ul spacing="normal">
            <li>It can be taken down at the request of a victim if it consists of
private media posted without consent.</li>
            <li>Provide good and private mechanisms for reporting the posting of
non-consented media.</li>
            <li>Provide a way to destroy media once a device is in the hands of an attacker.</li>
          </ul>
        </li>
        <li>
          <t>Social media: social media can be a way for attackers to enhance monitoring.
They should:
          </t>
          <ul spacing="normal">
            <li>Provide proper blocking systems that are not limited to an individual account.</li>
            <li>Provide mechanisms by which only "accepted" people are able to send messages
to an account.</li>
          </ul>
        </li>
        <li>Browser history or searching information/metadata should be deleted by default.</li>
        <li>End-to-end encryption must be the default for any messaging in order to prevent network monitoring.</li>
        <li>Consider local attackers when designing sensitive applications.</li>
        <li>Engineer plausible deniability for sensitive applications.</li>
        <li>Build detection tools and improve logging and analytics for user agents and devices with IPV in mind.</li>
      </ul>
      <t>It is important to note that IPV should not be mistaken to be a privacy issue alone. Furthermore any tech-based solutions and interventions that only address privacy can be used by attackers, helping them to cloak their attacks from the victim and other means of detection. Power is imbalanced in IPV and technology entrenches power.<xref target="Citron"/></t>
    </section>
    <section anchor="resources">
      <name>Resources</name>
      <ul spacing="normal">
        <li>Cornell Tech's Clinic to End Tech Abuse https://www.ceta.tech.cornell.edu/</li>
        <li>List of domestic violence hotlines around the world https://en.wikipedia.org/wiki/List_of_domestic_violence_hotlines</li>
        <li>Procedures and tools for clinical computer security https://www.usenix.org/conference/usenixsecurity19/presentation/havron</li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="B. Schneier" initials="B." surname="Schneier"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="B. Trammell" initials="B." surname="Trammell"/>
          <author fullname="C. Huitema" initials="C." surname="Huitema"/>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="NCAV" target="https://ncadv.org/learn-more/statistics">
        <front>
          <title>National Statistics Domestic Violence</title>
          <author initials="N. C. A. D. V." surname="Abuse" fullname="National Coalition Against Domestic Violence Abuse">
            <organization/>
          </author>
          <date year="2022" month="September" day="06"/>
        </front>
      </reference>
      <reference anchor="Dragiewicz2018" target="https://www.tandfonline.com/doi/abs/10.1080/14680777.2018.1447341">
        <front>
          <title>Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms</title>
          <author initials="M." surname="Dragiewicz" fullname="Molly Dragiewicz">
            <organization/>
          </author>
          <author initials="J." surname="Burgess" fullname="Jean Burgess">
            <organization/>
          </author>
          <author initials="A." surname="Matamoros-Fernández" fullname="Ariadna Matamoros-Fernández">
            <organization/>
          </author>
          <author initials="M." surname="Salter" fullname="Michael Salter">
            <organization/>
          </author>
          <author initials="N. P." surname="Suzor" fullname="Nicolas P. Suzor">
            <organization/>
          </author>
          <author initials="D." surname="Woodlock" fullname="Delanie Woodlock">
            <organization/>
          </author>
          <author initials="B." surname="Harris" fullname="Bridget Harris">
            <organization/>
          </author>
          <date year="2022" month="September" day="06"/>
        </front>
      </reference>
      <reference anchor="WHO" target="https://apps.who.int/iris/bitstream/handle/10665/77432/WHO_RHR_12.36_eng.pdf">
        <front>
          <title>Understanding and Addressing Violence Against Women: Intimate Partner Violence</title>
          <author initials="W. H." surname="Organization" fullname="World Health Organization">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Freed" target="https://doi.org/10.1145/3134681">
        <front>
          <title>Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders</title>
          <author initials="D." surname="Freed" fullname="Diana Freed">
            <organization/>
          </author>
          <author initials="J." surname="Palmer" fullname="Jackeline Palmer">
            <organization/>
          </author>
          <author initials="D." surname="Minchala" fullname="Diana Minchala">
            <organization/>
          </author>
          <author initials="K." surname="Levy" fullname="Karen Levy">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Citron" target="https://wwnorton.com/books/9780393882315">
        <front>
          <title>The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age</title>
          <author initials="D. K." surname="Citron" fullname="Danielle Keats Citron">
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="IPVTechBib" target="https://ipvtechbib.randhome.io/">
        <front>
          <title>Selected Research Papers on Technology used in Intimate Partner Violence</title>
          <author initials="E." surname="Maynier" fullname="Etienne Maynier">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CSP" target="https://www.ipvtechresearch.org">
        <front>
          <title>Computer Security and Privacy for Survivors of Intimate Partner Violence</title>
          <author initials="C. to E. T." surname="Abuse" fullname="Clinic to End Tech Abuse">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CETAStrategies" target="https://www.ceta.tech.cornell.edu/resources">
        <front>
          <title>Resources from the Clinic to End Tech Abuse</title>
          <author initials="C. to E. T." surname="Abuse" fullname="Clinic to End Tech Abuse">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="TBMDGMMDR" target="https://arxiv.org/abs/2005.14341">
        <front>
          <title>The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums</title>
          <author initials="E." surname="Tseng" fullname="Emily Tseng">
            <organization/>
          </author>
          <author initials="R." surname="Bellini" fullname="Rosanna Bellini">
            <organization/>
          </author>
          <author initials="N." surname="McDonald" fullname="Nora McDonald">
            <organization/>
          </author>
          <author initials="M." surname="Danos" fullname="Matan Danos">
            <organization/>
          </author>
          <author initials="R." surname="Greenstadt" fullname="Rachel Greenstadt">
            <organization/>
          </author>
          <author initials="D." surname="McCoy" fullname="Damon McCoy">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CDOHPFLDMR" target="https://ieeexplore.ieee.org/document/8418618">
        <front>
          <title>The Spyware Used in Intimate Partner Violence</title>
          <author initials="R." surname="Chatterjee" fullname="Rahul Chatterjee">
            <organization/>
          </author>
          <author initials="P." surname="Doerfler" fullname="Periwinkle Doerfler">
            <organization/>
          </author>
          <author initials="H." surname="Orgad" fullname="Hadas Orgad">
            <organization/>
          </author>
          <author initials="S." surname="Havron" fullname="Sam Havron">
            <organization/>
          </author>
          <author initials="J." surname="Palmer" fullname="Jackeline Palmer">
            <organization/>
          </author>
          <author initials="D." surname="Freed" fullname="Diana Freed">
            <organization/>
          </author>
          <author initials="K." surname="Levy" fullname="Karen Levy">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <author initials="D." surname="McCoy" fullname="Damon McCoy">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <author initials="E." surname="Tseng" fullname="Emily Tseng">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="APCFramework" target="https://www.apc.org/sites/default/files/gender-cybersecurity-policy-litreview.pdf">
        <front>
          <title>A framework for developing gender-reponsive cybersecurity policy</title>
          <author initials="A. for P." surname="Communication" fullname="Association for Progressive Communication">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="Witness" target="https://journals.sagepub.com/doi/10.1177/14648849211060644">
        <front>
          <title>Deepfakes, misinformation and disinformation and authenticity infrastructure responses: Impacts on frontline witnessing, distant witnessing, and civic journalism</title>
          <author initials="S." surname="Gregory" fullname="Sam Gregory">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
    <?line 397?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to:</t>
      <ul spacing="normal">
        <li>Lana Ramjit and Thomas Ristenpart for their insipiring work on this area,
and guidance for this draft.</li>
        <li>Shivan Kaul and Pete Snyder for discussions, guidance and support.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
