<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-hrpc-ipvc-02" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="ipvc">Intimate Partner Violence Digital Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-hrpc-ipvc-02"/>
    <author initials="S." surname="Celi" fullname="Sofia Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="J." surname="Guerra" fullname="Juliana Guerra">
      <organization/>
      <address>
        <email>juliana@usuarix.net</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <date year="2025" month="November" day="03"/>
    <area>General</area>
    <workgroup>None</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 148?>

<t>This document aims to inform how Internet protocols and their implementations might better mitigate technical attacks at the user endpoint by describing technology-based practices to perpetrate intimate partner violence (IPV). IPV is a pervasive reality that is not limited to, but can be exacerbated with, the usage of technology. The IPV context enables the attacker to access one, some or all of: devices, local networks, authentication mechanisms, identity information, and accounts. These security compromises go beyond active and passive on-path attacks <xref target="RFC7624"/>. With a focus on protocols, the document describes tactics of the IPV attacker and potential counter-measures.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/claucece/draft-celi-ipvc"/>.</t>
    </note>
  </front>
  <middle>
    <?line 152?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Intimate partner violence (IPV) refers to physical, emotional, verbal, sexual, or economic abuse of a person by a current or former intimate partner, hereafter referred to as the abuser or attacker.<xref target="WHO"/> IPV is characterized by an unequal power dynamic that enables the abuser to exert control and harm within romantic or sexual relationships context. While IPV often manifests in these contexts, it also extends to child and elder abuse or abuse perpetrated by any member of a household.</t>
      <t>Digital technologies are central in modern lives and can be used as a way to enable and enhance IPV. Technology-based IPV has profound implications on the physical, psychological and emotional health of survivors, affecting them not only at the individual level but also disrupting their broader social environment [ref].
Furthermore, technology-based IPV can create an immediate potential for offline, real-world harm, as attackers can use these methods to control, locate, or confront their victims in person. This blending of digital abuse and offline harm increases the severity and urgency of the threat faced by victims.</t>
      <t>Unlike traditional "attackers", an abuser in the context of IPV is a close and familiar figure: an "attacker you know." This attacker is neither solely on-path nor off-path; they often have full access to their target's devices and local networks, sharing intimate spaces and information. Moreover, abusers can coerce and manipulate their victims (hereafter, referred to as targets) directly.</t>
      <t>There is significant existing work in the field of online gender-based violence <xref target="IPVTechBib"/><xref target="CSP"/> and technology-based IPV <xref target="Freed"/> mainly focused on response and resiliency, including digital privacy and safety strategies. Nevertheless, even when this literature exists, IPV is not considered enough when designing digital technologies, networks, or Internet protocols, and it is not part of threat-modelling. Protocol design or cybersecurity best practices rarely account for IPV-specific scenarios, as seen in only a few cases <xref target="CETAStrategies"/>. These omissions highlight the need to consider the privacy and security risks involved, as noted in <xref target="RFC6973"/>.</t>
      <t>This document outlines the tactics employed in technology-based IPV and offers recommendations for designing protocols and technologies to mitigate these tactics. It begins with a comprehensive overview of IPV and related terminology, followed by an exploration of the specific tactics used by abusers, culminating in actionable recommendations for the digital design community.</t>
      <t>Although the category of technology-abuse includes practices such as Child Sexual Abuse Material (CSAM), or digital manipulation of images and videos (deepfakes) to exhibit and slander women <xref target="Witness"/>, those tactics are out of scope in this document, since the attacker is not part of the victim's close social environment, i.e. they do not necessarily have access to the victim's local network. However, in some occasions, this distinction doesn't always hold.</t>
      <t>The point of this document is to describe technological means by which abuse may be enacted. It is not claiming, and cannot claim, that these means are inherently abusive.</t>
    </section>
    <section anchor="definition-of-technology-based-ipv">
      <name>Definition of technology-based IPV</name>
      <t>Technology-based intimate partner violence (IPV) refers to the use of digital tools and technologies to enable, escalate, and reinforce abusive behaviors. IPV itself encompasses physical, emotional, verbal, sexual, or economic abuse committed by a current or former intimate partner. A "partner" in this context is not limited to romantic or sexual relationships, but can extend to anyone with a close relationship to the victim, including household members involved in child or elder abuse (however, here we will not explictly consider this case). What defines IPV is the inherent unequal power relationship, where the abuser leverages this imbalance to inflict harm and exert control.</t>
      <t>In technology-based IPV, the attacker exploits various forms of digital technology to perpetrate abuse, often through pervasive surveillance, overt monitoring, coercive access to devices or accounts, and manipulation of digital communications. This is known as "digital coercive control" <xref target="Dragiewicz2018"/>, which is a form of abuse where access to personal technology, such as smartphones, social media, or local networks, becomes a means for the abuser to assert control, engage in stalking, or inflict psychological harassment. Internet-enabled technologies amplify the abuser's ability to conduct continuous surveillance or escalate harm remotely, reinforcing the unequal power dynamic present in IPV situations.</t>
      <t>While technology-facilitated abuse can affect anyone, it is crucial to recognize its intersection with gender-based violence. As noted by <xref target="APCFramework"/>, "women and girls face specific cyber threats in the digital age that are considered forms of gender-based violence as they occur because of their gender, or because they disproportionately affect one gender." This intersection arises because digital abuse is embedded in the same offline structural violence that perpetuates gender inequality, but the technological dimension introduces new elements: searchability, persistence, replicability, and scalability. These features allow abusers to more easily track their targets, replicate abusive content, and escalate harassment across platforms, magnifying the harm inflicted.</t>
      <t>Furthermore, the unique aspects of technology-based IPV—such as the ability to monitor in real-time, manipulate social media, or restrict access to digital resources—can severely limit a victim's autonomy and mobility. This creates a new layer of control that extends beyond traditional physical spaces into the digital realm, making it harder for victims to escape the abuse, as the attacker often has constant or even remote access to the victim's digital life.</t>
      <t>Ultimately, technology-based IPV is not just an extension of traditional abuse; it is an evolving form of violence that capitalizes on the pervasive and intimate nature of digital technology to create a form of control that is difficult to detect and even harder to escape. Addressing this issue requires a deep understanding of both the technical tools used by abusers and the social dynamics at play, including the broader structural inequalities that enable such abuse.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>In the rest of this draft, we will use this terminology:</t>
        <t>Attacker: A person who, in the context of intimate partner violence (IPV), uses digital tools to exert control, monitor, or harm another individual with the aim of enabling or enhancing abuse. The term "attacker" is used interchangeably with "perpetrator."
* Victim: By "victim" we mean a person who is subject or target of an attack. Notice that we are using
  this term only in the temporary context of an attack scenario. We prefer the term "survivor", which recognizes the agency and resistance tactics of those facing IPV, but for the purposes of this document we focus on the fact of being subject of specific technology-based IPV attacks.</t>
      </section>
    </section>
    <section anchor="technology-based-ipv-attacks">
      <name>Technology-based IPV attacks</name>
      <t>In this section, we describe IPV attacks that are enabled or exacerbated by Internet technology. First, we outline our assumptions about this type of attacker and common tactics they may use. Then, we describe the types of technology-enabled IPV attacks.</t>
      <section anchor="the-tech-asisted-ipv-attacker">
        <name>The tech-asisted IPV attacker</name>
        <t>The attacker we focus on in this document is someone who either forcefully controls accounts, devices, and/or authentication information used to access systems, or leverages publicly available information to exert this control. This attacker may or may not be technologically skilled (it might be "technology savvy" or not). From a threat model perspective, this attacker is one of the strongest ones as it can use their abilities to gain unlimited access to systems and devices without needing significant financial or computational resources.</t>
        <t>The attacker typically has (or has had) physical access to the victim and often shares a common social network with them. In some cases, the attacker may legally own the devices or accounts the victim uses, further complicating the victim's ability to maintain control.</t>
        <t>The attacker is not implied to have infinite computing power or unrestricted access to external systems (e.g., companies' infrastructure). Rather, the focus is on their ability to gain unlimited access to the victim's personal devices and accounts due to their proximity, control, or manipulation of the victim's authentication mechanisms and personal data, communications, and digital assets..</t>
      </section>
      <section anchor="tech-based-ipv-tactics">
        <name>Tech-based IPV tactics</name>
        <t>There are many ways in which digital and networked technology can facilitate an attacker perpetrating IPV.
For an in-depth reading, see <xref target="TBMDGMMDR"/> and <xref target="CDOHPFLDMR"/>.
Below, we informally categorize the main tactics attackers use:</t>
        <ul spacing="normal">
          <li>
            <t>Ready-made tools: Attackers can use applications or devices
that are solely built to facilitate IPV. These types of technology are sometimes referred to as "stalkerware" or "spouseware".</t>
          </li>
          <li>
            <t>Dual-use tools: Attackers can repurpose applications, settings or devices built for beneficial or innocuous
purposes to cause harm. This is the case, for example, of anti-theft devices that can be repurposed for stalking, or to location-tracking tools. The latter is subject to its own considerations <xref target="DULT"/>.</t>
          </li>
          <li>
            <t>Impersonation attacks: Knowing personal information coupled with access to authentication mechanisms gives an attacker the ability to fully authenticate to services and accounts of the victim, effectively impersonating them. This can be executed to the degree that the victim can no longer successfully authenticate themselves to their services or accounts.</t>
          </li>
          <li>
            <t>UI-bound impersonation attacks: Attackers can abuse technology to enhance IPV by abusing the
User Interface (UI) of a specific tool. In this case, attackers become authenticated but adversarial users of a
system. They cannot, however, escalate to root privileges or access other underlying
functionalities of the system. They are bound to the UI of whatever system they managed
to authenticate to. We will explore later the ways attackers use to forcibly gain
authentication to a system.</t>
          </li>
          <li>
            <t>Social media and forums: Attackers can learn and share information on how to use
technology to enhance IPV through the usage of these platforms. These spaces may also provide narrative justifications for abusive behavior and facilitate cyberstalking, cyberbullying, and doxxing.</t>
          </li>
          <li>
            <t>Perception of Threat and Vulnerability: The awareness of a pervasive threat can act as a powerful form of control. Attackers often leverage the perception that technology could be used for IPV as a means of manipulating victims, eroding their sense of safety and agency. This can extend to perceptions of vulnerability within the victim's network or system: the mere suspicion of a vulnerability could compound feelings of insecurity. Research on user perceptions of technology trustworthiness, especially within messaging apps (see <xref target="UPMSG"/>), indicates that perceived threats and vulnerabilities in communication channels can discourage users from trusting or seeking help through these technologies. Such dynamics can further isolate victims and create additional barriers to receiving support.</t>
          </li>
        </ul>
      </section>
      <section anchor="kinds-of-tech-enabled-ipv-attacks">
        <name>Kinds of tech-enabled IPV attacks</name>
        <t>The attacks we list and are discussed in this document exploit the tight integration between personal technology and everyday life, leveraging access to accounts, devices, authentication mechanisms, and personal or sensitive information. The examples below illustrate, but are not limited to, common categories of tech-enabled IPV.
Each represents a distinct vector through which an attacker can extend coercive control, surveillance, or isolation, often combining multiple tactics at once.</t>
        <ul spacing="normal">
          <li>
            <t>Monitoring: A prevalent tactic to facilitate IPV is the active, intrusive monitoring of the victim's online activities and accounts. This ongoing surveillance can encompass a range of behaviors that feel invasive, often involving threats or intimidation. The "active" nature of this monitoring means it may be apparent to the victim or entirely hidden, depending on the abuser's intent. Forms of monitoring include:
            </t>
            <ul spacing="normal">
              <li>
                <t>Monitoring of communication, which can be e-mail-based, chat-based or social media communications, or browsing information
(history, cookies or more) either directly on the victim's device or through
specialised applications.</t>
              </li>
              <li>
                <t>Monitoring location and whereabouts by looking at the metadata of communication,
by using location-help applications, or by using specialized applications.</t>
              </li>
              <li>
                <t>Monitoring any data sent over the network by mounting DNS attacks or other specialised
attacks.</t>
              </li>
              <li>
                <t>Monitoring any information found on the UI by looking at devices screens while the
victim is using them.</t>
              </li>
              <li>
                <t>Data gathering by using the Internet to seek public or private information to compile a
victim's personal information for use in harassment.</t>
              </li>
              <li>
                <t>Monitoring security cameras or systems for home security</t>
              </li>
            </ul>
            <t>
In this type of attack, we see these dimensions:  </t>
            <ul spacing="normal">
              <li>
                <t>Monitoring of communication content at various layers, including the application layer (e.g., chat or email content) and network layers (e.g., packet inspection or traffic analysis).</t>
              </li>
              <li>
                <t>Monitoring of the UI content of application tools.</t>
              </li>
              <li>
                <t>Monitoring of location information.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Compromise of accounts: An attacker may demand access to the victim's accounts to continuously monitor, control, manipulate or restrict their digital communications and activities. Unlike passive monitoring with publicly available tools, the attacker demands access to tools and contents in order to reduce the "life space" or "space for action" that the victim has for independent activities.
Once access is obtained, an attacker can:  </t>
            <ul spacing="normal">
              <li>
                <t>Delete data, which can be communication data, documents and more (essentially, any data
stored in the account).</t>
              </li>
              <li>
                <t>Gain access to contacts such as friends, family or colleagues.</t>
              </li>
              <li>
                <t>Gain access to communications, audio-video content, and any associated metadata.</t>
              </li>
              <li>
                <t>Modify or manipulate any communications, audio-video content, and any associated metadata.</t>
              </li>
              <li>
                <t>Lock out or change the authentication mechanisms that grant access to the account.</t>
              </li>
              <li>
                <t>Impersonate the victim by using the victim's online identity to send false/forged messages to
others or to purchase goods and services.</t>
              </li>
              <li>
                <t>Impersonate the victim by using the victim's online identity to publicly post information
that can be private or fake, impacting their reputation and sense of security.</t>
              </li>
              <li>
                <t>Impersonate the victim by using the victim's online or legal identity to sign victims up for services.</t>
              </li>
              <li>
                <t>Exposing private information or media by distributing intimate or private data (which could have been acquired via coercive tactics).</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Compromise of devices: This attack is similar to the above, but the attacker
demands access to the victim's devices. The goal is the same as the above but the
result is more impactful, as it restricts access and gives access to accounts that are accessed
through the device. It can also prevent the victim from having any connection to the Internet.
Once an attacker has access to the device, they can use it to:
            </t>
            <ul spacing="normal">
              <li>
                <t>Physically prevent the use of the abilities given by the device (the device can be used, for example,
to call police services, which is restricted with this attack).</t>
              </li>
              <li>
                <t>Access contacts and data (media or messages) stored in it.</t>
              </li>
              <li>
                <t>Access to accounts and authentication mechanisms for other accounts (saved passwords or
authenticator apps -2-factor authentication-, for example).</t>
              </li>
              <li>
                <t>Perform impersonation.</t>
              </li>
              <li>
                <t>Perform denial of access to the device, networks or the Internet in general.</t>
              </li>
              <li>
                <t>Destroy the device itself and any information stored in it.</t>
              </li>
              <li>
                <t>Impersonate by using the victim's online identity, as accessed through the device,
to publicly post information that can be private or fake.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Exposing Private Information or Media: This attack often builds on other the forms of attack.
Once an attacker gains access to an account or device, they can harvest sensitive data,
including personal and/or private media, messages, and private documents. This stolen
information can then be used to threaten, extort, or humiliate the victim. For example,
intimate images may be used for blackmail, or private details such as bank account and tax
information may be exploited. The attacker may also engage in doxxing by publicly sharing
private details to damage the victim’s reputation or relationships.</t>
          </li>
          <li>
            <t>Denial of Access: This attack can also be built upon previous ones, and its objective is to
block the victim's access to essential services. It can include physical measures such as
destroying routers or network devices, changing Wi-Fi passwords, or modifying network settings.
This prevents the victim from connecting to the Internet or accessing online services.
Denial of access may also target financial abuse, such as restricting the victim's access to
online banking or digital wallets, making it difficult or impossible for them to manage their finances.
Denial of access can also extend to digital communication disruptions, such as flooding the
victim’s communication platforms with unwanted messages or deploying viruses to compromise
their devices. The goal is to isolate the victim, severing their connection to the outside world,
including family, friends, and support networks.</t>
          </li>
          <li>
            <t>Threats: Often intertwined with denial of access, threats involve sending harassing or abusive
messages via email, chat, or social media. These messages may include insults, intimidation,
or direct threats of harm. The purpose is to instill fear, destabilize the victim's emotional
state, and force compliance, either by causing distress or pushing the victim toward further
harmful actions. Threats can escalate into more severe attacks, including denial of access or
exposure of private information.</t>
          </li>
          <li>
            <t>Harassment: Harassment can be anonymous, but in many cases, the victim knows the identity of the
attacker. However, due to the anonymity of certain platforms, the victim may struggle to hold the
perpetrator accountable. The systems in place often require that harassing content be permanently
available for investigation, but this can, in turn, prolong the victim's exposure to the abuse.
Harassment can manifest in various forms and dimensions:
            </t>
            <ul spacing="normal">
              <li>
                <t>Ongoing Harassment: This type of harassment is persistent, with the goal of intimidating,
humiliating, and psychologically tormenting the victim. It often involves repeated messages, threats,
or actions that make the victim feel unsafe or violated.</t>
              </li>
              <li>
                <t>Post-Disconnection Harassment: Once the attacker no longer has physical control over the victim,
they may resort to cyberstalking or continued harassment online. This form of abuse allows the
attacker to maintain control over the victim by stalking their digital presence, often through
social media, messaging platforms, or by monitoring their activities in other ways.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="means-of-attacking">
        <name>Means of attacking</name>
        <t>The attacks described above can be carried out using various methods. Below are some of the most common approaches:</t>
        <ul spacing="normal">
          <li>
            <t>Spyware Installation and Spoofing: This method involves installing malicious software on the victim's device to gain unauthorized access to their accounts or to conduct active monitoring. It may also include spoofing techniques to bypass security measures, such as remotely compromising security questions, passwords, or other authentication methods. These tools are typically installed without the victim's knowledge, giving the attacker covert access to their personal information.</t>
          </li>
          <li>
            <t>Coercion and Control: This form of attack leverages physical, emotional, or psychological manipulation to gain access to a victim's devices, network credentials, or digital information. It often involves forcing the victim to reveal sensitive details, such as passwords, PINs, or authentication mechanisms for their accounts and devices, creating an environment of control and fear.</t>
          </li>
          <li>
            <t>Shared Network Plans and Account Ownership: In some cases, an attacker may be the legal owner of a device (e.g., a parent's control over a child's device) or have access to shared family accounts or network plans. For instance, an abuser may control a joint bank account or device within a shared family plan, allowing them to carry out attacks without the victim's knowledge and without needing to install malicious software.</t>
          </li>
          <li>
            <t>Monitoring: This method involves the exploitation of social media and other publicly available information to track the victim's activities. It may also include the installation of monitoring tools on the victim's devices or the abuse of "benign" applications (e.g., location-tracking apps) in a malicious way. The attacker uses these tools to keep tabs on the victim's movements and interactions, often in secret.</t>
          </li>
          <li>
            <t>Exposure: This method involves the use of social media platforms to amplify harassment. It includes actions such as posting harmful content to embarrass, humiliate, or intimidate the victim, or sharing private information like intimate images without consent. This form of attack may also involve doxxing, where the victim's personal details are shared publicly to cause distress or harm to their relationships and reputation.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="specific-abused-technology">
      <name>Specific abused technology</name>
      <t>Research into how attackers exploit technology to enhance IPV reveals that the following technologies are frequently abused:</t>
      <ul spacing="normal">
        <li>
          <t>Passwords and Authentication Mechanisms: Authentication systems are often the primary point of failure in IPV attacks. Once an attacker gains access to a victim's account or device, they can use that access to compromise additional accounts or devices. Attackers can use specialized tools, often installed surreptitiously on the victim's device, to capture authentication data. They may also coerce victims into revealing passwords or bypassing security features. This includes targeting biometrics (e.g., fingerprints, facial recognition), two-factor authentication (2FA) systems, and other multi-layered security methods.</t>
        </li>
        <li>
          <t>Media and Private Information: Attackers who gain access to devices or accounts can harvest private media and sensitive personal information. This data can then be used to extort the victim, humiliate them (by sharing it publicly), or escalate harassment. Private communications, photos, and other intimate materials are particularly vulnerable to such exploitation, often used as leverage in controlling or threatening the victim.</t>
        </li>
        <li>
          <t>Account Recovery Mechanisms: In addition to direct access to authentication mechanisms, attackers can manipulate account recovery processes to gain unauthorized access to accounts. This includes exploiting weaknesses in 2FA devices, recovery email systems, or password reset tools. By compromising these systems, attackers can gain control over multiple online profiles, furthering their ability to surveil and control the victim.</t>
        </li>
        <li>
          <t>Lack of Blocking Mechanisms and Exploitation of Anonymous Channels: Many platforms and communication tools lack effective blocking or reporting mechanisms, which attackers exploit to continue their abuse. Common tactics include:  </t>
          <ul spacing="normal">
            <li>
              <t>Using fake phone numbers or burner accounts to contact the victim.</t>
            </li>
            <li>
              <t>Sending messages via platforms with open channels that do not require mutual consent (e.g., messaging apps with open chat features).</t>
            </li>
            <li>
              <t>Exploiting "read receipts" or similar features to monitor the victim's engagement with their messages, thereby gaining further control.</t>
            </li>
            <li>
              <t>Abusing the absence of robust blocking features to maintain constant contact and harassment.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="recommendations">
      <name>Recommendations</name>
      <t>The following recommendations are tailored for protocol and systems designers to help mitigate technology-enabled IPV, recognizing that IPV often occurs within the broader context of structural violence (which can be gender-based violence). While these attacks are facilitated or exacerbated by technological tools, the recommendations focus on enabling victims to regain control, prevent the abuse of power, and limit attackers' ability to carry out actions that entrench their control.</t>
      <ul spacing="normal">
        <li>
          <t>Build proper authentication systems: Authentication mechanisms should be designed with the following features:
          </t>
          <ul spacing="normal">
            <li>
              <t>Account Access Transparency: Maintain a non-deletable and non-modifiable list of devices with access to accounts and a record of active sessions.</t>
            </li>
            <li>
              <t>Recovery and Revocation: Provide secure ways to recover access to accounts and change authentication mechanisms. Allow easy revocation of access, including when an account or device is compromised.</t>
            </li>
            <li>
              <t>Clear Notifications: Send notifications when:
              </t>
              <ul spacing="normal">
                <li>
                  <t>New devices are used to access an account.</t>
                </li>
                <li>
                  <t>Attempts to access accounts occur.</t>
                </li>
                <li>
                  <t>Changes are made to account details.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Approval Mechanism for Access: Implement a system that allows users to approve or deny access attempts from new devices or locations.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Storage and sharing of media: Media should be handled in a way that allows the victim to retain control:
          </t>
          <ul spacing="normal">
            <li>
              <t>Media Takedown: Ensure that private media posted without consent can be taken down at the victim's request.</t>
            </li>
            <li>
              <t>Dealing with Re-posting: Implement mechanisms to prevent re-posting of previously reported non-consensual media, either by blocking its sharing or by flagging it across platforms and devices.</t>
            </li>
            <li>
              <t>Secure Reporting Mechanisms: Provide private, confidential ways to report non-consensual media, with systems in place to ensure the victim's privacy is protected.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Social Media Platforms: Social media can be a powerful tool for perpetrators, enhancing monitoring and control. Platforms should:
          </t>
          <ul spacing="normal">
            <li>
              <t>Comprehensive Blocking Systems: Provide blocking systems that go beyond individual accounts, potentially linking accounts and devices associated with a blocked user to prevent continued harassment or monitoring.</t>
            </li>
            <li>
              <t>Restricted Messaging: Enable users to set privacy controls that allow only approved contacts to send messages to their accounts.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Browser and Search Data: Browsers and search engines should prioritize privacy and security:
          </t>
          <ul spacing="normal">
            <li>
              <t>Automatic Deletion: Browser history, search information, and related metadata should be deleted by default after each session or within a specified time frame (triggered by users, for example). This protects users from unwanted surveillance.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>End-to-end encryption must be the default for any messaging in order to prevent network monitoring and ensure that digital communications remain private.</t>
        </li>
        <li>
          <t>Gender Sensitivity in Design:
          </t>
          <ul spacing="normal">
            <li>
              <t>Gender-Informed Design: Designers should adopt a gender-sensitive approach when developing tools and applications. Recognizing the structural inequalities inherent in IPV helps build systems that are supportive of the unique needs of victims.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Local Attackers and Sensitive Applications
          </t>
          <ul spacing="normal">
            <li>
              <t>Security for Local Attackers: When designing sensitive applications, ensure that they are secure against local attackers, including those who may have physical access to the device. Sensitive applications refer to any software or services that handle private or confidential data, such as personal accounts, financial tools, and communication platforms.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Detection Tools and Analytics
          </t>
          <ul spacing="normal">
            <li>
              <t>Building Detection Tools: Develop advanced detection tools with IPV-specific algorithms and systems. These tools should focus on identifying patterns of control and abuse, as well as enhancing logging and analytics for detecting unusual or suspicious activity. Consider guidance for building such tools <xref target="UNGUI"/>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Engineer plausible deniability for sensitive applications.</t>
        </li>
        <li>
          <t>Build detection tools and improve logging and analytics for user agents and devices with IPV in mind.</t>
        </li>
        <li>
          <t>Transparent Reporting: IPV-related issues should not be viewed solely as privacy concerns. It’s crucial to address areas such as transparency in reporting mechanisms, identity management, and proper accountability measures in tech systems to counter the misuse of power.</t>
        </li>
      </ul>
      <t>It is important to note that IPV should not be mistaken to be a privacy issue alone. Furthermore any tech-based solutions and interventions that only address privacy can be used by attackers, helping them to cloak their attacks from the victim and other means of detection. Power is imbalanced in IPV and technology entrenches power.<xref target="Citron"/></t>
      <t>It's essential to acknowledge  as well that implementing these recommendations will not fully eliminate IPV due to the broader power imbalances in society. However, these measures can play a critical role in addressing the use of technology to facilitate abuse. Addressing IPV through technology must be viewed as a step toward giving victims the tools to regain control, while simultaneously limiting the means by which abusers can continue their attacks.</t>
    </section>
    <section anchor="resources">
      <name>Resources</name>
      <ul spacing="normal">
        <li>
          <t>Cornell Tech's Clinic to End Tech Abuse https://www.ceta.tech.cornell.edu/</t>
        </li>
        <li>
          <t>List of domestic violence hotlines around the world https://en.wikipedia.org/wiki/List_of_domestic_violence_hotlines</t>
        </li>
        <li>
          <t>Procedures and tools for clinical computer security https://www.usenix.org/conference/usenixsecurity19/presentation/havron</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document itself discusses security threats in the context of IPV. Implementers should note that mitigation mechanisms must balance user safety, usability, and privacy. In particular, features intended to protect users (e.g., encryption, logging, blocking) can also be exploited by abusers if not designed with IPV contexts in mind.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="B. Schneier" initials="B." surname="Schneier"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="B. Trammell" initials="B." surname="Trammell"/>
          <author fullname="C. Huitema" initials="C." surname="Huitema"/>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC6973">
        <front>
          <title>Privacy Considerations for Internet Protocols</title>
          <author fullname="A. Cooper" initials="A." surname="Cooper"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="J. Morris" initials="J." surname="Morris"/>
          <author fullname="M. Hansen" initials="M." surname="Hansen"/>
          <author fullname="R. Smith" initials="R." surname="Smith"/>
          <date month="July" year="2013"/>
          <abstract>
            <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6973"/>
        <seriesInfo name="DOI" value="10.17487/RFC6973"/>
      </reference>
      <reference anchor="NCAV" target="https://ncadv.org/learn-more/statistics">
        <front>
          <title>National Statistics Domestic Violence</title>
          <author initials="N. C. A. D. V." surname="Abuse" fullname="National Coalition Against Domestic Violence Abuse">
            <organization/>
          </author>
          <date year="2022" month="September" day="06"/>
        </front>
      </reference>
      <reference anchor="Dragiewicz2018" target="https://www.tandfonline.com/doi/abs/10.1080/14680777.2018.1447341">
        <front>
          <title>Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms</title>
          <author initials="M." surname="Dragiewicz" fullname="Molly Dragiewicz">
            <organization/>
          </author>
          <author initials="J." surname="Burgess" fullname="Jean Burgess">
            <organization/>
          </author>
          <author initials="A." surname="Matamoros-Fernández" fullname="Ariadna Matamoros-Fernández">
            <organization/>
          </author>
          <author initials="M." surname="Salter" fullname="Michael Salter">
            <organization/>
          </author>
          <author initials="N. P." surname="Suzor" fullname="Nicolas P. Suzor">
            <organization/>
          </author>
          <author initials="D." surname="Woodlock" fullname="Delanie Woodlock">
            <organization/>
          </author>
          <author initials="B." surname="Harris" fullname="Bridget Harris">
            <organization/>
          </author>
          <date year="2022" month="September" day="06"/>
        </front>
      </reference>
      <reference anchor="WHO" target="https://apps.who.int/iris/bitstream/handle/10665/77432/WHO_RHR_12.36_eng.pdf">
        <front>
          <title>Understanding and Addressing Violence Against Women: Intimate Partner Violence</title>
          <author initials="W. H." surname="Organization" fullname="World Health Organization">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Freed" target="https://doi.org/10.1145/3134681">
        <front>
          <title>Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders</title>
          <author initials="D." surname="Freed" fullname="Diana Freed">
            <organization/>
          </author>
          <author initials="J." surname="Palmer" fullname="Jackeline Palmer">
            <organization/>
          </author>
          <author initials="D." surname="Minchala" fullname="Diana Minchala">
            <organization/>
          </author>
          <author initials="K." surname="Levy" fullname="Karen Levy">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Citron" target="https://wwnorton.com/books/9780393882315">
        <front>
          <title>The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age</title>
          <author initials="D. K." surname="Citron" fullname="Danielle Keats Citron">
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="IPVTechBib" target="https://ipvtechbib.randhome.io/">
        <front>
          <title>Selected Research Papers on Technology used in Intimate Partner Violence</title>
          <author initials="E." surname="Maynier" fullname="Etienne Maynier">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CSP" target="https://www.ipvtechresearch.org">
        <front>
          <title>Computer Security and Privacy for Survivors of Intimate Partner Violence</title>
          <author initials="C. to E. T." surname="Abuse" fullname="Clinic to End Tech Abuse">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CETAStrategies" target="https://www.ceta.tech.cornell.edu/resources">
        <front>
          <title>Resources from the Clinic to End Tech Abuse</title>
          <author initials="C. to E. T." surname="Abuse" fullname="Clinic to End Tech Abuse">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="TBMDGMMDR" target="https://arxiv.org/abs/2005.14341">
        <front>
          <title>The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums</title>
          <author initials="E." surname="Tseng" fullname="Emily Tseng">
            <organization/>
          </author>
          <author initials="R." surname="Bellini" fullname="Rosanna Bellini">
            <organization/>
          </author>
          <author initials="N." surname="McDonald" fullname="Nora McDonald">
            <organization/>
          </author>
          <author initials="M." surname="Danos" fullname="Matan Danos">
            <organization/>
          </author>
          <author initials="R." surname="Greenstadt" fullname="Rachel Greenstadt">
            <organization/>
          </author>
          <author initials="D." surname="McCoy" fullname="Damon McCoy">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CDOHPFLDMR" target="https://ieeexplore.ieee.org/document/8418618">
        <front>
          <title>The Spyware Used in Intimate Partner Violence</title>
          <author initials="R." surname="Chatterjee" fullname="Rahul Chatterjee">
            <organization/>
          </author>
          <author initials="P." surname="Doerfler" fullname="Periwinkle Doerfler">
            <organization/>
          </author>
          <author initials="H." surname="Orgad" fullname="Hadas Orgad">
            <organization/>
          </author>
          <author initials="S." surname="Havron" fullname="Sam Havron">
            <organization/>
          </author>
          <author initials="J." surname="Palmer" fullname="Jackeline Palmer">
            <organization/>
          </author>
          <author initials="D." surname="Freed" fullname="Diana Freed">
            <organization/>
          </author>
          <author initials="K." surname="Levy" fullname="Karen Levy">
            <organization/>
          </author>
          <author initials="N." surname="Dell" fullname="Nicola Dell">
            <organization/>
          </author>
          <author initials="D." surname="McCoy" fullname="Damon McCoy">
            <organization/>
          </author>
          <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
            <organization/>
          </author>
          <author initials="E." surname="Tseng" fullname="Emily Tseng">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="APCFramework" target="https://www.apc.org/sites/default/files/gender-cybersecurity-policy-litreview.pdf">
        <front>
          <title>A framework for developing gender-reponsive cybersecurity policy</title>
          <author initials="A. for P." surname="Communication" fullname="Association for Progressive Communication">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="Witness" target="https://journals.sagepub.com/doi/10.1177/14648849211060644">
        <front>
          <title>Deepfakes, misinformation and disinformation and authenticity infrastructure responses: Impacts on frontline witnessing, distant witnessing, and civic journalism</title>
          <author initials="S." surname="Gregory" fullname="Sam Gregory">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="DULT" target="https://datatracker.ietf.org/wg/dult/about/">
        <front>
          <title>Detecting Unwanted Location Trackers</title>
          <author initials="I. D." surname="WG" fullname="IETF DULT WG">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="UPMSG" target="https://www.designtrustworthymessaging.org/">
        <front>
          <title>Unbreakable: Designing for Trustworthiness in Private Messaging</title>
          <author initials="" surname="Unbreakable" fullname="Unbreakable">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="UNGUI" target="https://datatracker.ietf.org/meeting/118/materials/slides-118-hrpc-unfpa-gbv-tech-guidance-00">
        <front>
          <title>Guidance on safe and ethical use of technology to address GBV and HP</title>
          <author initials="U. N. P. F. G. T." surname="Division" fullname="United Nations Population Fund GHRB Technical Division">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
    <?line 401?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to:</t>
      <ul spacing="normal">
        <li>
          <t>Lana Ramjit and Thomas Ristenpart for their inspiring work on this area,
and guidance for this draft.</t>
        </li>
        <li>
          <t>Shivan Kaul and Pete Snyder for discussions, guidance and support.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
