Internet and communications as elements for CIDT and Torture. Initial reflections in an unexplored field

Authors

  • Pau Pérez-Sales
  • Laia Serra ICAB

DOI:

https://doi.org/10.7146/torture.v30i1.120593

Keywords:

ICIT, Internet and Torture

Abstract

The internet was once seen as a new and definitive window to freedom and a world without torture. There is however, another less obvious but perhaps more notorious side: torturous environments can also be created through the internet; a place where individu- als may be targeted for discrimination, coer- cion or control.There is a dearth of academic research and theoretical developments in this very new area of knowledge and this Edito- rial will review and reflect on various aspects, thereby suggesting possible lines of research.

References

Amnesty International. (2018). #ToxicTwitter:Violence

and abuse against women online. https://www.amnestyusa.org/wp-content/uploads/2018/03/Toxic-Twitter.pdf

Anderson, C., & Carnegey, N. (2004). Violent evil and the General Agression Model. In A. G. Miller (Ed.), The social psychology of good and evil. Guilford. New York.

Aronson, J. D., Cole, M., Hauptmann, A., Miller, D., & Samuels, B. (2018). Reconstructing human rights violations using large eyewitness video collections:The case of euromaidan protester deaths. Journal of Human Rights Practice, 10(1), 159–178. https://doi.org/10.1093/jhuman/huy005

Barrera, L., & Rodríguez, C. (2017). La violencia en línea contra las mujeres en México. Informe para la Relatora sobre laViolencia contra las Mujeres MS. Dubravka Simonovic. Internet Es Nuestra. www.internetesnuestra.mx

Basak, R., Sural, S., Ganguly, N., & Ghosh, S. K. (2019). Online Public Shaming on Twitter: Detection, Analysis, and Mitigation. IEEE Transactions on Computational Social Systems, 6(2), 208–220. https://doi.org/10.1109/TCSS.2019.2895734

Bunce, M. (2019). Humanitarian Communication in a Post-Truth World. Journal of Humanitarian Affairs, 1(1), 49–55. https://doi.org/10.7227/jha.007

Carmichael, F., & Pinnell, O. (2019). How fake news from Sudan’s regime backfired. BBC News, pp. 1–10.

Cole, J. (2014). The New Arabs: How the Millennial Generation is Changing the Middle East. Simon & Schuster.

Debord, G. (1995). The Society of the Spectacle. Society, p. 154. https://library.brown.edu/pdfs/1124975246668078.pdf

Dhrodia, A. (2018). Unsocial media: A toxic place for women. IPPR Progressive Review, 24(4), 380–387. https://doi.org/10.1111/newe.12078

Douglas, H., Harris, B. A., & Dragiewicz, M. (2019). Technology-facilitated domestic and family violence:Women’s experiences. British Journal of Criminology, 59(3), 551–570. https://doi.org/10.1093/bjc/azy068

ECHRT. (2019). Mass surveillance (Vol. 8). https:// www.echr.coe.int/Documents/FS_Mass_ surveillance_ENG.pdf

Freedom House. (2017). Manipulating Social Media to Undermine Democracy. https://doi.org/10.1080/00224545.1975.9923293

Gleeson, H. (2014). The prevalence and impact of bullying linked to social media on the mental heath and suicidal behaviour among young people. Dublin. https://assets.gov.ie/25088/59fb1e4948fc43028f931a6c1e0c8790.pdf

Gonzales, A. L., & Hancock, J. T. (2011). Mirror, mirror on my Facebook wall: Effects of exposure to Facebook on self-esteem. Cyberpsychology, Behavior, and Social Networking, 14(1–2), 79–83. https://doi.org/10.1089/cyber.2009.0411

Gray, G. (2019). Disappearing refugees inside the United States. Torture Journal, 29(1), 144–146. https://doi.org/10.7146/torture.v29i1.113206

Harris, B. A., & Woodlock, D. (2019). Digital coercive control: Insights from two landmark domestic violence studies. British Journal of Criminology, 59(3), 530–550. https://doi.org/10.1093/bjc/azy052

Harsin, J., & Harsin, J. (2018). Post-Truth and Critical Communication Studies. In Oxford Research Encyclopedia of Communication. https://doi.org/10.1093/acrefore/9780190228613.013.757

Hodalska, M. (2019). Cyberbullying, Fear and Silence: From Bystanders to Cyber- Samaritans. Perils of the Web: Cyber Security and Internet Safety, (May). https://doi.org/10.1163/9781848885011_004

Hopper, E., & Hidalgo, J. (2006). Invisible_Chains: Psychological coercion of human trafficking victims. Intercultural Human Rights Law Review, 1, 185/209.

HRC. (2018). Report of the Special Rapporteur on violence against women, its causes and consequences on online violence against women and girls from a human rights perspective - A/HRC/38/47.

HRW. (2017). Online and on All Fronts. Russia’s assault on freedom of expression. Human Rights Watch. https://www.hrw.org/sites/default/files/report_pdf/ russiafoe0717_web_2.pdf

IGF. (2015). Best Practice Forum (BPF) on Online Abuse and Gender-Based Violence Against Women. Internet Governance Forum.

John, A., Glendenning, A. C., Marchant, A., Montgomery, P., Stewart, A., Wood, S.,... Hawton, K. (2018). Self-harm, suicidal behaviours, and cyberbullying in children and young people: Systematic review. Journal of Medical Internet Research, 20(4). https://doi.org/10.2196/jmir.9044

Koenig, K. A. (2013). The “Worst”. A Closer Look at Cruel, Inhuman and Degrading Treatment. University of California, Berkeley - School of Law; University of San Francisco. Doctoral Dissertation.

Lageson, S. E., & Maruna, S. (2018). Digital degradation: Stigma management in the internet age. Punishment and Society, 20(1), 113–133. https://doi.org/10.1177/1462474517737050

Lazer, D. M. J., Baum, M. A., Benkler,Y., Berinsky, A. J., Greenhill, K. M., Menczer, F., ... Zittrain, J. L. (2018). The science of fake news. Science, 359(6380), 1094–1096. https://doi.org/10.1126/science.aao2998

Leary, M. R., & Tangney, J. P. (2012). Handbook of Self and Identity. Guilford Press.

Luban, D. (2009). Human Dignity, Humiliation, and Torture. Kennedy Institute of Ethics Journal, 19, 211–230. https://doi.org/10.1353/ken.0.0292

Maier, A. (2011). Torture. How Denying Moral Standing Violates Human Dignity. In E. Kaufmann, P., Kuch, H., Neuhäuser, C., & Webster (Ed.), Humiliation, Degradation, Dehumanization (pp. 101–118). Springer Netherlands.

Manago, A. (2014). Identity Development in the Digital Age:The Case of Social Networking Sites. Oxford Handbooks On-line.

Mijatovic, D. (2018). New Challenges to Freedom of Expression: Countering Online Abuse of Female Journalists. https://www.osce.org/files/f/documents/c/3/220411.pdf

NDI. (2019). Tweets That Chill : Analyzing Online Violence AgainstWomen in Politics. www.ndi.org/ tweets-that-chill

Ortega, R., Elipe, P., Mora-Merchán, J. A., Genta, M. L., Brighi, A., Guarini, A., ... Tippett, N. (2012). The Emotional Impact of Bullying and Cyberbullying on Victims: A European Cross- National Study. Aggressive Behavior, 38(5), 342– 356. https://doi.org/10.1002/ab.21440

Parry, J. T. (2003). What Is Torture, Are We Doing It, and What if We Are. Pitt. Law Review, 64, 237–249.

Perez de Acha, G. (2016). Hacking team malware para la vigilancia en América Latina. Santiago de Chile.

Phillips, E. M. (2011). Pain, Suffering, and Humiliation: The Systemization of Violence in Kidnapping for Ransom. Journal of Aggression, Maltreatment & Trauma, 20(8), 845–869. https://doi.org/10.1080/10926771.2011.626512

Pirlot de Corbion, A., Hosein, G., Nyst, C., Fisher, T., Gerathy, E., Callander, A., & Bouffet, T. (2018). The Humanitarian Metadata Problem: ‘Doing No Harm’ in the Digital Era. (October), 130. Privacy International. https://privacyinternational.org/sites/default/files/2018-12/TheHumanitarianMetadataProblem-DoingNoHarmintheDigitalEra.pdf

Pollmann, A. (2011). Humiliation, Degradation, Dehumanization (P. Kaufmann, H. Kuch, C. Neuhaeuser, & E. Webster, Eds.). https://doi.org/10.1007/978-90-481-9661-6

Privacy International. (2018). Secret Global Surveillance Networks: Intelligence Sharing Between Governments and the Need for Safeguards. (April), 173. https://privacyinternational.org/sites/default/files/201804/Secret%20Global%20 Surveillance%20Networks%20report%20web%20%28200%29.pdf

R3D. (2017). Gobierno espía.Vigilancia sistemática a periodistas y defensores de derechos humanos en Mexico. Mexico. https://r3d.mx/2017/06/19/gobierno-espia/

Richards, J. (2019). Intelligence gathering, issues of accountability, and Snowden. In Terrorism and State Surveillance of Communications. (pp. 19–37). Routledge.

Ruhrmann, H. (2019). Facing the future. Protecting Human Rights in Policy Strategies for Facial Recognition Technology in Law Enforcement.

Rukundo, S. (2018). My President is a Pair of Buttocks’: The limits of online freedom of expression in Uganda. International Journal of Law and Information Technology, 26(3), 252–271. https://doi.org/10.1093/ijlit/eay009

Scarry, E. (1985). The body in Pain. Oxford University Press.

Serra, L. (2018). On-line gender based violence. Pikara - Online Magazine., 2(December), 227– 249. Pikara Magazine. http://lab.pikaramagazine.com/wp-content/uploads/2019/06/VIOLENCIAS_EN.pdf

Sussman, D. (2006). Defining Torture. Case Western Reserve Journal of International Law, 37, 225.

T-CY. (2018). Mapping study on cyberviolence. Council of Europe. www.coe.int/cybercrime

Tufekci, Z. (2014). Social Movements and Governments in the Digital Age: Evaluating a Complex Landscape. Journal of International Affairs, 68(1), 1–18. http://blogs.cuit.columbia.edu/jia/files/2014/12/xvii-18_Tufekci_Article.pdf

Van der Wilk, A. (2018). Cyber violence and hate speech online against women (PE 604.979). https:// www.europarl.europa.eu/RegData/etudes/STUD/2018/604979/IPOL_STU(2018)604979_ EN.pdf

Wilkinson, C. (2014). Putting “Traditional Values” Into Practice: The Rise and Contestation of Anti- Homopropaganda Laws in Russia. Journal of Human Rights, 13(3), 363–379. https://doi.org/10.1080/14754835.2014.919218

Zhao, S. (2005). The Digital Self: Through the Looking Glass of Telecopresent Others. Symbolic Interaction, 28(3), 387–405. https://doi.org/10.1525/si.2005.28.3.387

Downloads

Published

2020-05-26

How to Cite

Pérez-Sales, P., & Serra, L. (2020). Internet and communications as elements for CIDT and Torture. Initial reflections in an unexplored field. Torture Journal, 30(1), 5–22. https://doi.org/10.7146/torture.v30i1.120593