Internet and communications as elements for CIDT and Torture. Initial reflections in an unexplored field


  • Pau Pérez-Sales
  • Laia Serra ICAB



ICIT, Internet and Torture


The internet was once seen as a new and definitive window to freedom and a world without torture. There is however, another less obvious but perhaps more notorious side: torturous environments can also be created through the internet; a place where individu- als may be targeted for discrimination, coer- cion or control.There is a dearth of academic research and theoretical developments in this very new area of knowledge and this Edito- rial will review and reflect on various aspects, thereby suggesting possible lines of research.


Amnesty International. (2018). #ToxicTwitter:Violence

and abuse against women online.

Anderson, C., & Carnegey, N. (2004). Violent evil and the General Agression Model. In A. G. Miller (Ed.), The social psychology of good and evil. Guilford. New York.

Aronson, J. D., Cole, M., Hauptmann, A., Miller, D., & Samuels, B. (2018). Reconstructing human rights violations using large eyewitness video collections:The case of euromaidan protester deaths. Journal of Human Rights Practice, 10(1), 159–178.

Barrera, L., & Rodríguez, C. (2017). La violencia en línea contra las mujeres en México. Informe para la Relatora sobre laViolencia contra las Mujeres MS. Dubravka Simonovic. Internet Es Nuestra.

Basak, R., Sural, S., Ganguly, N., & Ghosh, S. K. (2019). Online Public Shaming on Twitter: Detection, Analysis, and Mitigation. IEEE Transactions on Computational Social Systems, 6(2), 208–220.

Bunce, M. (2019). Humanitarian Communication in a Post-Truth World. Journal of Humanitarian Affairs, 1(1), 49–55.

Carmichael, F., & Pinnell, O. (2019). How fake news from Sudan’s regime backfired. BBC News, pp. 1–10.

Cole, J. (2014). The New Arabs: How the Millennial Generation is Changing the Middle East. Simon & Schuster.

Debord, G. (1995). The Society of the Spectacle. Society, p. 154.

Dhrodia, A. (2018). Unsocial media: A toxic place for women. IPPR Progressive Review, 24(4), 380–387.

Douglas, H., Harris, B. A., & Dragiewicz, M. (2019). Technology-facilitated domestic and family violence:Women’s experiences. British Journal of Criminology, 59(3), 551–570.

ECHRT. (2019). Mass surveillance (Vol. 8). https:// surveillance_ENG.pdf

Freedom House. (2017). Manipulating Social Media to Undermine Democracy.

Gleeson, H. (2014). The prevalence and impact of bullying linked to social media on the mental heath and suicidal behaviour among young people. Dublin.

Gonzales, A. L., & Hancock, J. T. (2011). Mirror, mirror on my Facebook wall: Effects of exposure to Facebook on self-esteem. Cyberpsychology, Behavior, and Social Networking, 14(1–2), 79–83.

Gray, G. (2019). Disappearing refugees inside the United States. Torture Journal, 29(1), 144–146.

Harris, B. A., & Woodlock, D. (2019). Digital coercive control: Insights from two landmark domestic violence studies. British Journal of Criminology, 59(3), 530–550.

Harsin, J., & Harsin, J. (2018). Post-Truth and Critical Communication Studies. In Oxford Research Encyclopedia of Communication.

Hodalska, M. (2019). Cyberbullying, Fear and Silence: From Bystanders to Cyber- Samaritans. Perils of the Web: Cyber Security and Internet Safety, (May).

Hopper, E., & Hidalgo, J. (2006). Invisible_Chains: Psychological coercion of human trafficking victims. Intercultural Human Rights Law Review, 1, 185/209.

HRC. (2018). Report of the Special Rapporteur on violence against women, its causes and consequences on online violence against women and girls from a human rights perspective - A/HRC/38/47.

HRW. (2017). Online and on All Fronts. Russia’s assault on freedom of expression. Human Rights Watch. russiafoe0717_web_2.pdf

IGF. (2015). Best Practice Forum (BPF) on Online Abuse and Gender-Based Violence Against Women. Internet Governance Forum.

John, A., Glendenning, A. C., Marchant, A., Montgomery, P., Stewart, A., Wood, S.,... Hawton, K. (2018). Self-harm, suicidal behaviours, and cyberbullying in children and young people: Systematic review. Journal of Medical Internet Research, 20(4).

Koenig, K. A. (2013). The “Worst”. A Closer Look at Cruel, Inhuman and Degrading Treatment. University of California, Berkeley - School of Law; University of San Francisco. Doctoral Dissertation.

Lageson, S. E., & Maruna, S. (2018). Digital degradation: Stigma management in the internet age. Punishment and Society, 20(1), 113–133.

Lazer, D. M. J., Baum, M. A., Benkler,Y., Berinsky, A. J., Greenhill, K. M., Menczer, F., ... Zittrain, J. L. (2018). The science of fake news. Science, 359(6380), 1094–1096.

Leary, M. R., & Tangney, J. P. (2012). Handbook of Self and Identity. Guilford Press.

Luban, D. (2009). Human Dignity, Humiliation, and Torture. Kennedy Institute of Ethics Journal, 19, 211–230.

Maier, A. (2011). Torture. How Denying Moral Standing Violates Human Dignity. In E. Kaufmann, P., Kuch, H., Neuhäuser, C., & Webster (Ed.), Humiliation, Degradation, Dehumanization (pp. 101–118). Springer Netherlands.

Manago, A. (2014). Identity Development in the Digital Age:The Case of Social Networking Sites. Oxford Handbooks On-line.

Mijatovic, D. (2018). New Challenges to Freedom of Expression: Countering Online Abuse of Female Journalists.

NDI. (2019). Tweets That Chill : Analyzing Online Violence AgainstWomen in Politics. tweets-that-chill

Ortega, R., Elipe, P., Mora-Merchán, J. A., Genta, M. L., Brighi, A., Guarini, A., ... Tippett, N. (2012). The Emotional Impact of Bullying and Cyberbullying on Victims: A European Cross- National Study. Aggressive Behavior, 38(5), 342– 356.

Parry, J. T. (2003). What Is Torture, Are We Doing It, and What if We Are. Pitt. Law Review, 64, 237–249.

Perez de Acha, G. (2016). Hacking team malware para la vigilancia en América Latina. Santiago de Chile.

Phillips, E. M. (2011). Pain, Suffering, and Humiliation: The Systemization of Violence in Kidnapping for Ransom. Journal of Aggression, Maltreatment & Trauma, 20(8), 845–869.

Pirlot de Corbion, A., Hosein, G., Nyst, C., Fisher, T., Gerathy, E., Callander, A., & Bouffet, T. (2018). The Humanitarian Metadata Problem: ‘Doing No Harm’ in the Digital Era. (October), 130. Privacy International.

Pollmann, A. (2011). Humiliation, Degradation, Dehumanization (P. Kaufmann, H. Kuch, C. Neuhaeuser, & E. Webster, Eds.).

Privacy International. (2018). Secret Global Surveillance Networks: Intelligence Sharing Between Governments and the Need for Safeguards. (April), 173. Surveillance%20Networks%20report%20web%20%28200%29.pdf

R3D. (2017). Gobierno espía.Vigilancia sistemática a periodistas y defensores de derechos humanos en Mexico. Mexico.

Richards, J. (2019). Intelligence gathering, issues of accountability, and Snowden. In Terrorism and State Surveillance of Communications. (pp. 19–37). Routledge.

Ruhrmann, H. (2019). Facing the future. Protecting Human Rights in Policy Strategies for Facial Recognition Technology in Law Enforcement.

Rukundo, S. (2018). My President is a Pair of Buttocks’: The limits of online freedom of expression in Uganda. International Journal of Law and Information Technology, 26(3), 252–271.

Scarry, E. (1985). The body in Pain. Oxford University Press.

Serra, L. (2018). On-line gender based violence. Pikara - Online Magazine., 2(December), 227– 249. Pikara Magazine.

Sussman, D. (2006). Defining Torture. Case Western Reserve Journal of International Law, 37, 225.

T-CY. (2018). Mapping study on cyberviolence. Council of Europe.

Tufekci, Z. (2014). Social Movements and Governments in the Digital Age: Evaluating a Complex Landscape. Journal of International Affairs, 68(1), 1–18.

Van der Wilk, A. (2018). Cyber violence and hate speech online against women (PE 604.979). https:// EN.pdf

Wilkinson, C. (2014). Putting “Traditional Values” Into Practice: The Rise and Contestation of Anti- Homopropaganda Laws in Russia. Journal of Human Rights, 13(3), 363–379.

Zhao, S. (2005). The Digital Self: Through the Looking Glass of Telecopresent Others. Symbolic Interaction, 28(3), 387–405.




How to Cite

Pérez-Sales, P., & Serra, L. (2020). Internet and communications as elements for CIDT and Torture. Initial reflections in an unexplored field. Torture Journal, 30(1), 5–22.