<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-hrpc-ipvc-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="ipvc">Intimate Partner Violence Digital Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-hrpc-ipvc-latest"/>
    <author initials="S." surname="Celi" fullname="Sofia Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="J." surname="Guerra" fullname="Juliana Guerra">
      <organization/>
      <address>
        <email>juliana@usuarix.net</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <date year="2023" month="October" day="18"/>
    <area>General</area>
    <workgroup>None</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 132?>

<t>This document aims to inform how Internet protocols and their implementations might better mitigate technical attacks at the user endpoint by describing technology-based practices to perpetrate intimate partner violence (IPV). IPV is a pervasive reality that is not limited to, but can be exacerbated with, the usage of technology. The IPV context enables the attacker to access one, some or all of: devices, local networks, authentication mechanisms, identity information, and accounts. These kinds of technical compromise exist in addition to on-path attacks, both active and passive <xref target="RFC7624"/>. In this document we describe the tactics the IPV attacker uses and what kind of counter-measures can be designed in IETF protocols.</t>
    </abstract>
  </front>
  <middle>
    <?line 136?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Intimate partner violence (IPV) refers to physical, emotional, verbal, sexual, or economic abuse of a person by a current or former intimate partner (henceforth, refered to as the attacker or abuser).<xref target="WHO"/> It is understood that in IPV cases there is an unequal power relationship that enables the abuser to cause harm in romantic or sexual relationships, as well as child or elder abuse, or abuse by any member of a household.</t>
      <t>Digital technologies are central in modern lives and can be used as a way to enable and enhance IPV. Technology-based IPV has impact on the physical, psychological and emotional health of survivors, affecting them not only individually but their social environment [ref].</t>
      <t>There is significant existing work in the field of online gender based violence <xref target="IPVTechBib"/><xref target="CSP"/> and technology-based IPV <xref target="Freed"/> mainly focused on response and resiliency, including digital privacy and safety strategies. Nevertheless, IPV is not considered enough when designing digital technologies, networks, or Internet protocols against threats. Only in rare cases are protocol design or cybersecurity best practices/tactics available <xref target="CETAStrategies"/>.</t>
      <t>The type of abuser that is close and familiar to the victim, "the attacker you know", is neither on- nor off-path, they have complete access to-- perhaps even share-- devices and local networks. They can even coerce their targets.</t>
      <t>This document describes the tactics used in technology-based IPV. It provides recommendations for the design of protocols and implementations to mitigate those tactics. In what follows, we first describe IPV and related terminology, the kind of tactics attackers use, and we end with the recommendations.</t>
      <t>Although the category of tech abuse includes practices such as Child Sexual Abuse Material (CSAM), or digital manipulation of images and videos (deepfakes) to exhibit and slander women <xref target="Witness"/>, those tactics are out of scope in this document, since the attacker is not part of the victim's social environment, i.e. they do not necessarily have access to the victim's local network.</t>
    </section>
    <section anchor="definition-of-technology-based-ipv">
      <name>Definition of technology-based IPV</name>
      <t>Technology enables and enhances IPV attacks with pervasive surveillance, overt monitoring, and coercive access. IPV refers to physical, emotional, verbal, sexual, or economic abuse of a person by a current or former intimate partner. By "partner" we mean anyone with a close relationship with the victim that can exercise abuse in a romantic or sexual relationship, as well as child or elder abuse, or abuse by any member of a household. In cases of IPV, there is an unequal power relationship that enables the attacker to cause harm. <xref target="Dragiewicz2018"/> calls this "digital coercive control" whereby Internet-enabled technology-- through access to local networks, devices and accounts-- becomes a mechanism to exert control, to conduct surveillance, or to aggravate and harass.</t>
      <t>Note that while this kind of abuse of technology is excerted to any person (regarless of their gender or sexuality), there is an interesection with gender violence. As noted by <xref target="APCFramework"/>, "women and girls face specific cyber threats in the digital age that are considered forms of gender-based violence as they occur because of their gender, or because they disproportionately affect one gender. While this violence is mediated by digital technology, it is part of the same offline structural violence; but its technological dimension adds elements of search, persistence, replicability and scalability that facilitate the aggressors’ access to their targets and can exacerbate the harm."</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>In the rest of this draft, we will use this terminology:</t>
        <ul spacing="normal">
          <li>
            <t>Attacker: By "attacker" we mean a person, an abuser in an IPV situation that is using
digital tools to enable and enhance abuse. An attacker can also be referred to as "perpetrator".</t>
          </li>
          <li>
            <t>Victim: By "victim" we mean a person who is subject or target of an attack. Notice that we are using
this term only in the temporary context of an attack scenario. We prefer the term "survivor", which recognizes the agency and resistance tactics of those facing IPV, but for the purposes of this document we focus on the fact of being subject of specific technology-based IPV attacks.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="technology-based-ipv-attacks">
      <name>Technology-based IPV attacks</name>
      <t>In order to describe IPV attacks that are enabled or exacerbated by Internet technology, we first describe our assumptions about the attacker and common tactics that can be used. Then, the types of technology-enabled IPV attacks are described.</t>
      <section anchor="the-intimate-attacker">
        <name>The intimate attacker</name>
        <t>The attacker we present in this document is one that either has forceful control of
accounts, devices, and/or authentication information for accessing systems, or uses
public information to exercise control.
This kind of attacker can be technologically savvy or not. We define this
attacker as one of the strongest ones as it can have unlimited access to
systems and devices, whithout investing a lot of financial or computational resources.</t>
        <t>The attacker has some kind of physical access to the victim (or has had it in the past),
and often shares a common social network with them. In some cases, it can be
the legal owner of the devices/accounts a victim uses.</t>
      </section>
      <section anchor="tech-based-ipv-tactics">
        <name>Tech-based IPV tactics</name>
        <t>There are many ways in which digital and networked technology can facilitate an attacker perpetrating IPV.
For an in-depth reading, see <xref target="TBMDGMMDR"/> and <xref target="CDOHPFLDMR"/>.
Here we informally list their main groups:</t>
        <ul spacing="normal">
          <li>
            <t>Ready-made tools: Attackers can use applications or devices
that are solely built to facilitate IPV. These apps are sometimes called "stalkerware" or "spouseware".</t>
          </li>
          <li>
            <t>Dual-use tools: Attackers can use applications, control settings or devices built for beneficial or innocuous
purposes and repurpose them for harm. This is the case, for example, of anti-theft
devices that can be repurposed for stalking.</t>
          </li>
          <li>
            <t>Impersonation attacks: Knowing personal information coupled with access to authentication mechanisms gives an attacker the ability to fully authenticate to services and accounts of the victim, effectively impersonating them. This can be executed to the degree that the victim can no longer successfully authenticate themselves.</t>
          </li>
          <li>
            <t>UI-bound impersonation attacks: Attackers can abuse technology to enhance IPV by abusing the
UI of a specific tool. In this case, attackers become authenticated but adversarial users of a
system. They cannot, however, escalate to root privileges or access other underlying
functionalities of the system. They are bound to whatever system they managed
to authenticate to. We will explore later the ways attackers use to forcibly gain
authentication to a system.</t>
          </li>
          <li>
            <t>Social media and forums: Attackers can learn and share information on how to use
technology to enhance IPV through the usage of these tools. They can also
receive narrative justification to condone their behaviour. They can also
perform cyberstalking, cyberbullying, doxxing with the usage of these tools.</t>
          </li>
          <li>
            <t>Perception of threat: The mere presence of a pervasive threat is a form of control. The perception that technology can be used to enhance IPV
is a tactic of attackers to control victims, take away agency and abuse them. This can lead
to lack of trust in technology, and further isolates the victim from seeking and receiving support.</t>
          </li>
        </ul>
      </section>
      <section anchor="kinds-of-tech-enabled-ipv-attacks">
        <name>Kinds of tech-enabled IPV attacks</name>
        <ul spacing="normal">
          <li>
            <t>Monitoring: One of the most prevalent methods to enhance IPV is the usage of
active monitoring of any online account that the victim has or of any action that the
victim does in the digital world. This includes a variety of behaviors that
feel unwelcomed and intrusive, and can involve threats.
The monitoring is "active" in that is a permanent action that the victim can be
aware of or not, and that the abuser might want to make them aware or not. It can
include:
            </t>
            <ul spacing="normal">
              <li>
                <t>Monitoring e-mail, chat-based or social media communications, or browsing information
(history, cookies or more) either directly on the victim's device or through
specialised applications.</t>
              </li>
              <li>
                <t>Monitoring location and whereabouts by looking at the metadata of communication,
by using location-help applications, or by using specialized applications.</t>
              </li>
              <li>
                <t>Monitoring any data sent over the network by mounting DNS attacks or other specialised
attacks.</t>
              </li>
              <li>
                <t>Monitoring any information found on the UI by looking at devices screens while the
victim is using them.</t>
              </li>
              <li>
                <t>Using the Internet to seek public or private information to compile a
victim's personal information for use in harassment.</t>
              </li>
            </ul>
            <t>
In this type of attack, we see these dimensions:  </t>
            <ul spacing="normal">
              <li>
                <t>Monitoring of the content of communications either at the application layer
or other layers.</t>
              </li>
              <li>
                <t>Monitoring of the UI content of application tools.</t>
              </li>
              <li>
                <t>Monitoring of location information.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Compromise of accounts: An attacker may demand access to the victim's accounts to continuously monitor, control or restrict their online communications and activities. In contrast to the previous point, rather than using "publicly available" tools the perpetrator demands access to tools and contents in order to reduce the "life space" or "space for action" that the victim-survivor may have to perform activities that do not involve the attacker. Once an attacker has access to an online account, they can use that to:
            </t>
            <ul spacing="normal">
              <li>
                <t>Delete data, which can be communication data, documents and more (any information s
stored in the device).</t>
              </li>
              <li>
                <t>Have access to contacts such as friends, family or colleagues.</t>
              </li>
              <li>
                <t>Have access to communications, audio-video content, and any associated metadata.</t>
              </li>
              <li>
                <t>Lock out or change the authentication mechanisms that grant access to the account.</t>
              </li>
              <li>
                <t>Impersonate by using the victim's online identity to send false/forged messages to
others or to purchase goods and services.</t>
              </li>
              <li>
                <t>Impersonate by using the victim's online identity to publicly post information
that can be private or fake.</t>
              </li>
              <li>
                <t>Impersonate by using the victim's online or legal identity to sign victims up for services.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Compromise of devices: This attack is similar to the above, but the attacker
demands access to the victim's devices. The goal is the same as the above but the
result is more impactful as it restricts access to accounts that are accessed
through the device. It can also prevent any connection to the Internet.
Once an attacker has access to the device, they can use it to:
            </t>
            <ul spacing="normal">
              <li>
                <t>Phisically prevent the use of the device (the device can be used, for example,
to call police services, which is restricted with this attack).</t>
              </li>
              <li>
                <t>Access contacts and data (media or messages) stored in it.</t>
              </li>
              <li>
                <t>Access to accounts and authentication mechanisms for other accounts (saved passwords or
authenticator apps -2-factor authentication-, for example).</t>
              </li>
              <li>
                <t>Perform impersonation.</t>
              </li>
              <li>
                <t>Perform denial of access to the device, networks or the Internet in general.</t>
              </li>
              <li>
                <t>Destroy the device itself and any information stored in it.</t>
              </li>
              <li>
                <t>Impersonate by using the victim's online identity, as accessed through the device,
to publicly post information that can be private or fake.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Exposing of private information or media: This attack builds on top of other attacks.
Once an attacker has access to an account or device, they can use this access to gather
private information or private media stored in it. This can later be used for
threatening, extortion, doxing (posting private information), and more.
It can also be used to gather information regarding bank accounts, tax information and more.</t>
          </li>
          <li>
            <t>Denial of access: This attack can be built on top of other attacks. It can consist
of denying access to a device, but also denying access to the Internet in general
by destroying routers (or network devices), changing Wi-Fi passwords or network
settings. The goal is to disallow access to services, or contact with family and friends.
It can also take the form of disrupting digital communications by flooding a
victim's communication tool with unwanted messages or by sending a virus program.</t>
          </li>
          <li>
            <t>Threats: This attack can be considered as a dimension of the previous attack as it can result
on a denial of access attack. It consists on sending e-mail, chat-based messages
or social media messages that threatens, insults, or harasses a victim.</t>
          </li>
          <li>
            <t>Harrassing: Harrassment can be anonymous, but a victim often knows from whom harrassment
 messages/actions come from; but, due to its anonymity, it is unable to hold
 atackers accountable. The systems we have in place often need that harrassment
 content is permanently available so that an investigation takes place. This
 enhances the abuse a victim is suffering. This type of attack appears in different dimensions:
            </t>
            <ul spacing="normal">
              <li>
                <t>On-going harassment with the goal of intimidation, humiliation and monitoring.</t>
              </li>
              <li>
                <t>Harrassment that appears after a victim has [disconnected] to continue coercion. When the abuser no longer has any physical control over the victim they can start to stalk them.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="means-of-attacking">
        <name>Means of attacking</name>
        <t>The above attacks can be carried out in different ways. We list here the most
common ones:</t>
        <ul spacing="normal">
          <li>
            <t>Installation of spyware or spoofing: This form of attack consists of installing
unwanted tools into a device in order to gain access to accounts or for active
monitoring. It can also take the form of remote access by remotely "hacking"
security questions, passwords or any authentication mechanism. Most of the
time, these tools are installed without the victim's knowledge.</t>
          </li>
          <li>
            <t>Coercion and control: This form of attack consists of using coercion and control
(which can be physical, emotional or psychological) to gain access to devices,
network devices, accounts or digital information. It often takes the form of
forcing victims to reveal passwords or account/devices authentication mechanisms.</t>
          </li>
          <li>
            <t>Shared network plans between family/relationship members: Often times, an
attacker is the legal "owner" of a device (owning children's devices, for example)
or accounts (a bank account, for example),
or they have access to accounts/devices as they are part of a shared family
plan. This enables an attacker to carry out the previously mentioned attacks
without the knowledge of the victim and without the need for installation of
tools.</t>
          </li>
          <li>
            <t>Monitoring: This means of attack consists of the abuse of social media and any public
information found on digital tools from the victim that has been shared through them. It also involves installing
tools for active monitoring on devices or using "benign" applications in
a dual-use manner (applications, such as the "track my phone" one).</t>
          </li>
          <li>
            <t>Exposure: This means of attack consists of the abuse of social media to enhance
harassment. It consists of using social media to post harmful content to humiliate,
to harass family or friends, for doxxing or to non-consensually share
intimate/private media.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="specific-abused-technology">
      <name>Specific abused technology</name>
      <t>In the research of the ways attackers use technology to enhance IPV, we see this
specific technology being abused:</t>
      <ul spacing="normal">
        <li>
          <t>Passwords and authentication mechanisms: all authentication mechanisms can be
used to enhance IPV as they are the single point of failure used by attackers
to get access to the account and/or devices (and, once they have access to those, they
can get further access to other accounts or devices). Attackers can use
specialised tools (to be installed in devices) to record authentication
mechanisms, they can coerce victims in order to get access to devices, and more.
They can also mount these attacks against fingerprints and biometric authentication
mechanisms, 2-factor authentication devices/applications and more.</t>
        </li>
        <li>
          <t>Media and private information: attackers can use the access to accounts/devices
to gain access to media and private information. This media can later be
used to bribe a victim, to humiliate them (by publicly posting it), to
enhance harassment and more.</t>
        </li>
        <li>
          <t>Recovery of account mechanisms: as with authentication mechanisms, attackers
can use 2-factor authentication devices, accounts and/or applications to get access to other
accounts or profiles</t>
        </li>
        <li>
          <t>Lack of blocking mechanisms and abuse of anonymous mechanisms: Often times
attackers carry out abuse by:
          </t>
          <ul spacing="normal">
            <li>
              <t>Contacting through fake numbers</t>
            </li>
            <li>
              <t>Contacting through fake accounts</t>
            </li>
            <li>
              <t>Sending messages to applications that have a "open" chanel for receiving any
message.</t>
            </li>
            <li>
              <t>Abusing of read-recipes to enhance control.</t>
            </li>
            <li>
              <t>Abusing the lack of blocking mechanisms.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="recommendations">
      <name>Recommendations</name>
      <t>We list here some recommendations to protocol designers to mitigate technology-enabled IPV:</t>
      <ul spacing="normal">
        <li>
          <t>Build proper authentication systems: authentication mechanisms should provide:
          </t>
          <ul spacing="normal">
            <li>
              <t>A non-deletable and non-modifiable list of who has access to accounts/devices:
a list of recognised devices and a list of active sessions.</t>
            </li>
            <li>
              <t>A way to recover access to an account and to change authentication
mechanisms.</t>
            </li>
            <li>
              <t>Provide mechanisms to revoke access.</t>
            </li>
            <li>
              <t>Send clear notifications for:
              </t>
              <ul spacing="normal">
                <li>
                  <t>when new devices are used to access an account,</t>
                </li>
                <li>
                  <t>when there is attempt to access an account,</t>
                </li>
                <li>
                  <t>when any change has been made to an account.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Provide mechanisms to approve access attempts to accounts (when, for example,
a new device is trying to access an account).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Storage and sharing of media: media should be stored/posted in such a way that:
          </t>
          <ul spacing="normal">
            <li>
              <t>It can be taken down at the request of a victim if it consists of
private media posted without consent.</t>
            </li>
            <li>
              <t>Provide good and private mechanisms for reporting the posting of
non-consented media.</t>
            </li>
            <li>
              <t>Provide a way to destroy media once a device is in the hands of an attacker.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Social media: social media can be a way for attackers to enhance monitoring.
They should:
          </t>
          <ul spacing="normal">
            <li>
              <t>Provide proper blocking systems that are not limited to an individual account.</t>
            </li>
            <li>
              <t>Provide mechanisms by which only "accepted" people are able to send messages
to an account.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Browser history or searching information/metadata should be deleted by default.</t>
        </li>
        <li>
          <t>End-to-end encryption must be the default for any messaging in order to prevent network monitoring.</t>
        </li>
        <li>
          <t>Consider local attackers when designing sensitive applications.</t>
        </li>
        <li>
          <t>Engineer plausible deniability for sensitive applications.</t>
        </li>
        <li>
          <t>Build detection tools and improve logging and analytics for user agents and devices with IPV in mind.</t>
        </li>
      </ul>
      <t>It is important to note that IPV should not be mistaken to be a privacy issue alone. Furthermore any tech-based solutions and interventions that only address privacy can be used by attackers, helping them to cloak their attacks from the victim and other means of detection. Power is imbalanced in IPV and technology entrenches power.<xref target="Citron"/></t>
    </section>
    <section anchor="resources">
      <name>Resources</name>
      <ul spacing="normal">
        <li>
          <t>Cornell Tech's Clinic to End Tech Abuse https://www.ceta.tech.cornell.edu/</t>
        </li>
        <li>
          <t>List of domestic violence hotlines around the world https://en.wikipedia.org/wiki/List_of_domestic_violence_hotlines</t>
        </li>
        <li>
          <t>Procedures and tools for clinical computer security https://www.usenix.org/conference/usenixsecurity19/presentation/havron</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="B. Schneier" initials="B." surname="Schneier"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="B. Trammell" initials="B." surname="Trammell"/>
          <author fullname="C. Huitema" initials="C." surname="Huitema"/>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="NCAV" target="https://ncadv.org/learn-more/statistics">
        <front>
          <title>National Statistics Domestic Violence</title>
          <author initials="N. C. A. D. V." surname="Abuse" fullname="National Coalition Against Domestic Violence Abuse">
            <organization/>
          </author>
          <date year="2022" month="September" day="06"/>
        </front>
      </reference>
      <reference anchor="Dragiewicz2018" target="https://www.tandfonline.com/doi/abs/10.1080/14680777.2018.1447341">
        <front>
          <title>Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms</title>
          <author initials="M." surname="Dragiewicz" fullname="Molly Dragiewicz">
            <organization/>
          </author>
          <author initials="J." surname="Burgess" fullname="Jean Burgess">
            <organization/>
          </author>
          <author initials="A." surname="Matamoros-Fernández" fullname="Ariadna Matamoros-Fernández">
            <organization/>
          </author>
          <author initials="M." surname="Salter" fullname="Michael Salter">
            <organization/>
          </author>
          <author initials="N. P." surname="Suzor" fullname="Nicolas P. Suzor">
            <organization/>
          </author>
          <author initials="D." surname="Woodlock" fullname="Delanie Woodlock">
            <organization/>
          </author>
          <author initials="B." surname="Harris" fullname="Bridget Harris">
            <organization/>
          </author>
          <date year="2022" month="September" day="06"/>
        </front>
      </reference>
      <reference anchor="WHO" target="https://apps.who.int/iris/bitstream/handle/10665/77432/WHO_RHR_12.36_eng.pdf">
        <front>
          <title>Understanding and Addressing Violence Against Women: Intimate Partner Violence</title>
          <author initials="W. H." surname="Organization" fullname="World Health Organization">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Freed" target="https://doi.org/10.1145/3134681">
        <front>
          <title>Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders</title>
          <author initials="D." surname="Freed" fullname="Diana Freed">
            <organization/>
          </author>
          <author initials="J." surname="Palmer" fullname="Jackeline Palmer">
            <organization/>
          </author>
          <author initials="D." surname="Minchala" fullname="Diana Minchala">
            <organization/>
          </author>
          <author initials="K." surname="Levy" fullname="Karen Levy">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Citron" target="https://wwnorton.com/books/9780393882315">
        <front>
          <title>The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age</title>
          <author initials="D. K." surname="Citron" fullname="Danielle Keats Citron">
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="IPVTechBib" target="https://ipvtechbib.randhome.io/">
        <front>
          <title>Selected Research Papers on Technology used in Intimate Partner Violence</title>
          <author initials="E." surname="Maynier" fullname="Etienne Maynier">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CSP" target="https://www.ipvtechresearch.org">
        <front>
          <title>Computer Security and Privacy for Survivors of Intimate Partner Violence</title>
          <author initials="C. to E. T." surname="Abuse" fullname="Clinic to End Tech Abuse">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CETAStrategies" target="https://www.ceta.tech.cornell.edu/resources">
        <front>
          <title>Resources from the Clinic to End Tech Abuse</title>
          <author initials="C. to E. T." surname="Abuse" fullname="Clinic to End Tech Abuse">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="TBMDGMMDR" target="https://arxiv.org/abs/2005.14341">
        <front>
          <title>The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums</title>
          <author initials="E." surname="Tseng" fullname="Emily Tseng">
            <organization/>
          </author>
          <author initials="R." surname="Bellini" fullname="Rosanna Bellini">
            <organization/>
          </author>
          <author initials="N." surname="McDonald" fullname="Nora McDonald">
            <organization/>
          </author>
          <author initials="M." surname="Danos" fullname="Matan Danos">
            <organization/>
          </author>
          <author initials="R." surname="Greenstadt" fullname="Rachel Greenstadt">
            <organization/>
          </author>
          <author initials="D." surname="McCoy" fullname="Damon McCoy">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CDOHPFLDMR" target="https://ieeexplore.ieee.org/document/8418618">
        <front>
          <title>The Spyware Used in Intimate Partner Violence</title>
          <author initials="R." surname="Chatterjee" fullname="Rahul Chatterjee">
            <organization/>
          </author>
          <author initials="P." surname="Doerfler" fullname="Periwinkle Doerfler">
            <organization/>
          </author>
          <author initials="H." surname="Orgad" fullname="Hadas Orgad">
            <organization/>
          </author>
          <author initials="S." surname="Havron" fullname="Sam Havron">
            <organization/>
          </author>
          <author initials="J." surname="Palmer" fullname="Jackeline Palmer">
            <organization/>
          </author>
          <author initials="D." surname="Freed" fullname="Diana Freed">
            <organization/>
          </author>
          <author initials="K." surname="Levy" fullname="Karen Levy">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <author initials="D." surname="McCoy" fullname="Damon McCoy">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <author initials="E." surname="Tseng" fullname="Emily Tseng">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="APCFramework" target="https://www.apc.org/sites/default/files/gender-cybersecurity-policy-litreview.pdf">
        <front>
          <title>A framework for developing gender-reponsive cybersecurity policy</title>
          <author initials="A. for P." surname="Communication" fullname="Association for Progressive Communication">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="Witness" target="https://journals.sagepub.com/doi/10.1177/14648849211060644">
        <front>
          <title>Deepfakes, misinformation and disinformation and authenticity infrastructure responses: Impacts on frontline witnessing, distant witnessing, and civic journalism</title>
          <author initials="S." surname="Gregory" fullname="Sam Gregory">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
    <?line 397?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to:</t>
      <ul spacing="normal">
        <li>
          <t>Lana Ramjit and Thomas Ristenpart for their insipiring work on this area,
and guidance for this draft.</t>
        </li>
        <li>
          <t>Shivan Kaul and Pete Snyder for discussions, guidance and support.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
