Logo written stop rape now

Technology X CRSV

TECHNOLOGY-FACILITATED CONFLICT-RELATED SEXUAL VIOLENCE (TFCRSV) 


I. What is TFCRSV?

a. Definition

Technology-facilitated conflict-related sexual violence (TFCRSV) is a specific subset of technology-facilitated gender-based violence (GBV), concentrating on the impact of TFGBV within conflict-related sexual violence (CRSV) scenarios.

TFGBV can be defined as “an act of violence perpetrated by one or more individuals that is committed, assisted, aggravated and amplified in part or fully by the use of information and communication technologies (ICTs), (e.g. the Internet, personal computers and smartphones) or digital media, against a person on the basis of their gender” (UNFPA). 

CRSV can be defined as “rape, sexual slavery, forced prostitution, forced pregnancy, forced abortion, enforced sterilization, forced marriage, and any other form of sexual violence of comparable gravity perpetrated against women, men, girls or boys that is directly or indirectly linked to a conflict” (UN Security Council).

Thus, by combining the definitions from TFGBV & CRSV, TFCRSV can be defined as: An act of violence against a person on the basis of their gender, including rape, sexual slavery, forced prostitution, forced pregnancy, forced abortion, enforced sterilisation, forced marriage, and any other form of sexual violence of comparable gravity perpetrated against women, men, girls, boys or persons of diverse gender identity that is directly or indirectly linked to a conflict, perpetrated by one or more individuals that is committed, assisted, aggravated and amplified in part or fully by the use of ICTs or digital media.


b. Root Causes

The root causes of TFCRSV are inherently tied to the same factors driving CRSV and TFGBV, some of which encompass:                                                                               


Root causes of TFCRSV

CRSV TFGBV
  • Patriarchal norms and structures 
  • Gender inequality
  • Gender-discriminatory laws and policies
  • Human rights violations, such as infringements on the rights to freedom of expression, peaceful assembly and association; slavery and forced labour; arbitrary arrest or detention and arbitrary interference with privacy
  • Ideological extremism
  • Gender bias and gender inequality in the design of digital technologies
  • Digital harassment,  particularly targeting women and girls 
  • Pre-existing violence manifested with ICTs 
  • Social and political propaganda targeting specific groups 
 Exacerbating factors of TFCRSV 
  • Political, economic and social inequality
  • Poverty and economic scarcity
  • Extreme poverty or economic crises
  • Climate change and competition for resources
  • Availability of arms
  • Lack of accountability in cyberspace
  • Use of digital surveillance and manipulation to influence behaviour and control populations

c. Who is vulnerable to CRSV?

Although TFCRSV can affect everyone, women, children and persons of diverse sexual orientation and gender identity are disproportionately targeted by such violence (U.S. Department of State) (UN Women). Furthermore, individuals are more likely to experience TFCRSV when facing intersecting forms of discrimination based on disability, religion, caste, ethnicity, race, age, class, and rural or urban residency, that are directly or indirectly linked to conflict (Amnesty International).

Those particularly vulnerable to TFCRSV include:

  • Young women and girls, who are more likely to use tech for learning, accessing information and connecting to peers (UN Women), whereby 58 percent of girls and young women have experienced some form of online harassment (Plan International).
  • Women in public life, human rights defenders, activists, journalists and lawmakers, who face increased rates of violence as a result of their work. (UN Women). UNESCO has reported that 73 percent of women journalists experienced online violence in the course of their professional lives.  (UNESCO). 



 

II. Different Types of TFCRSV/Modalities 

a. Technology-Facilitated Trafficking in Persons

Trafficking in Persons refers to “the recruitment, transportation, transfer, harbouring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation, which includes, at a minimum, the exploitation of the prostitution of others or other forms of sexual exploitation, forced labour or services, slavery or practices similar to slavery, servitude or the removal of organs (OHCHR).

The definition of technology-facilitated trafficking in persons therefore extends to any act of trafficking in person that is perpetrated by one or more individuals, committed, assisted, aggravated and amplified in part or fully by the use of ICTs or digital media.

In conflict and post-conflict settings, ICTs can notably be used to lure vulnerable individuals into situations where they are subsequently trafficked, and/or used to facilitate the trafficking of persons for the purpose of sexual exploitation through online markets.

Example
Online trafficking and sexual enslavement of Yazidi women and girls by the Islamic State of Iraq and the Levant (ISIL/ISIS) from 2014 onwards 

ISIS fighters held online sex slave auctions using the Telegraph application to circulate photos of captured Yazidi women and girls, with details of their age, marital status, current location and price. Yazidis have called for other social media platforms to be held accountable, including Meta (formerly Facebook), which encompasses Whatsapp, X (formerly twitter) and Youtube (Reuters, 2022). OHCHR (2016),

ICT-facilitated trafficking of Ukrainian refugees for sexual and labour exploitation

Since the start of the conflict in Ukraine, human traffickers have used online platforms to lure refugees with promises of free transport, accommodation, employment or other forms of assistance, for the purpose of sexual and labour exploitation. (UNHCR, 2022 )

See resource section below for more information 


b. “Doxxing” and/or “Trolling” of Women Human Rights Defenders

Doxxing refers to “the publication of private information, such as contact details, on the Internet with malicious intent” (OHCHR).

Trolling refers to “the posting of messages, the uploading of images or videos and the creation of hashtags for the purpose of annoying, provoking or inciting violence against women and girls. Many “trolls” are anonymous and use false accounts to generate hate speech” (OHCHR.)

In conflict and post-conflict situations, doxxing and trolling exacerbate the risks of CRSV. By inciting hate and violence and exposing personal information, these actions allow perpetrators to move from virtual harassment to physical attacks, including sexual violence.

Example
Politically motivated abuse of Myanmar women online

Since the February 1, 2021 coup, Myanmar women have used social media to voice political views, facing increased online abuse and harassment as a result. Myanmar Witness reports that doxxing is the main form of abuse and appears linked to offline violence and arrests targeting women who oppose the military Junta. 

Journalist Rana Ayyub targeted with online violence at the intersection of misogyny and Islamophobia

The award-winning independent journalist has faced virtually unrelenting online threats, harassment and abuse for over a decade. She is called “Jihadi Jane”, an “ISIS sex slave”, a “presstitute” and Twitter mobs have called for her to be gang-raped.” (International Center for Journalists, 2023)

See resource section below for more information 


c. Online Hate Speech in CRSV Settings

Hate speech refers to “any kind of communication in speech, writing or behaviour, that attacks or uses pejorative or discriminatory language with reference to a person or a group on the basis of who they are, in other words, based on their religion, ethnicity, nationality, race, colour, descent, gender or other identity factor. This is often rooted in, and generates intolerance and hatred, and in certain contexts can be demeaning and divisive” (United Nations).The definition of online hate speech therefore extends to any act of hate speech perpetrated by one or more individuals, committed, assisted, aggravated and amplified in part or fully by the use of ICTs or digital media.

In conflict and post-conflict settings, hate speech can, directly or indirectly, lead to or exacerbate instances of sexual violence.

Example
Online hate speech fueling the persecution of  Rohingyas in Myanmar, who are targeted with widespread and systematic CRSV

The Human Rights Council’s fact-finding mission on Myanmar is alarmed by the widespread hate speech, both offline and online, which often incites discrimination, hostility, and violence. Social media, especially Facebook, plays a significant role, as it is a primary source of internet access for many users (OHCHR, 2018).”

Spread of anti-Yezidi rhetoric online

Thousands of Iraqis made inflammatory and hate-mongering statements on social media, such as “ISIS was right about what they did to Yezidis” and “We should kill Yezidis. They are devil-worshippers (Free Yezidi Foundation).”

See resource section below for more information 


d. Other forms of TFGBV that could potentially lead to or exacerbate the harm caused by CRSV 


Cyberbullying

A form of online harassment pertaining to the constant and intentional infliction of damage through digital technologies to undermine the victims’ self-esteem (Digital Violence Terms) (Technology-Facilitated Gender-Based Violence: An Overview).

Resources

Cyber Stalking

Persistent, unwanted and/or threatening surveillance, contact and/or pursuit by technological means. Cyberstalking can turn to offline stalking and vice versa  (Digital Violence Terms) (Technology-Facilitated Gender-Based Violence: An Overview).


Cybermob

A large group of online attackers who threaten, insult and verbally abuse the victims, often in an organised coordinated manner (Digital Violence Terms) (Technology-Facilitated Gender-Based Violence: An Overview).


Documenting/Broadcasting Sexual Violence

The recording and sometimes dissemination of sexual assault images resulting in an additional form of sexual violence against the victim/survivor. (Digital Violence Terms) (Technology-Facilitated Gender-Based Violence: An Overview)


Image-Based Abuse

Private sexual images that have been created and/or distributed, often by ex-partners, without the consent of the person featured in them; a practice colloquially known as “revenge porn”. It also includes threats to create or share these images  (Digital Violence Terms) (Technology-Facilitated Gender-Based Violence: An Overview).


Online Impersonation

Creating a fake profile and assuming someone’s identity for nefarious purposes, including destroying someone’s reputation or threatening their safety (Digital Violence Terms) (Technology-Facilitated Gender-Based Violence: An Overview).


Sextortion

A type of electronic blackmail pertaining to the demand for money, sex/sex acts, or additional explicit images in exchange for not exposing intimate images or private information (Digital Violence Terms) (Technology-Facilitated Gender-Based Violence: An Overview).


Synetic Media

Also known as “Shallowfake” and “Deepfake”,  a manipulated image or video, often done with editing software and Artificial Intelligence; attaching one person’s face with another person’s body, making it appear as though people are engaging in sexual activity they never engaged in (Digital Violence Terms) (Technology-Facilitated Gender-Based Violence: An Overview)



III. Relevant UN Frameworks and Resolutions 

The UN has developed various frameworks and resolutions addressing issues related to online violence and digital development: 


  • Our Common Agenda Policy Brief 11 UN 2.0 (2023) embodies the Secretary-General’s vision of a revitalised United Nations family driven by a progressive culture and emphasises the importance of building digital capacity, transforming an organisation’s technologies, skills and processes towards digitally enabled solutions that improve connectivity, service delivery, stakeholder collaboration, engagement and decision-making. 

  • United Nations Security Council Resolution 2713 (2023) raises concerns about terrorist groups’ strategic use of ICTs, including the Internet and social media and urges Member States to collaborate with the Government of the Federal Republic of Somalia (GFRS) to prevent Al-Shabaab’s exploitation of social media for criminal activities. It encourages the GFRS to develop a communication strategy and outreach mechanism to counter Al-Shabaab’s narratives through audio-visual and social media platforms.

  • United Nations Security Council Resolution 2686 (2023) expresses deep concern at instances of violence fuelled by hate speech, misinformation and disinformation, including through social media platforms.

  • United Nations General Assembly Resolution 77/150 (2022) emphasises the importance of implementing science, technology, and innovation strategies that specifically promote the empowerment of women and girls and reduce the gender digital divide. This resolution underlines the need for capacity-development policies and sustainable support at national and local levels to enhance the impact of initiatives such as the International Girls in ICT Day and the Equals Partnership that aim to promote the equal participation of women and girls in the digital age.

  • United Nations General Assembly Resolution 76/189 (2022) stresses the importance of ICTs in international sustainable development.

  • United Nations General Assembly Resolution 76/186 (2022) recognises the potential of the Internet and other ICTs in preventing and combating trafficking in persons and aiding victims. It emphasises the need for enhanced law enforcement cooperation to address challenges arising from the rapid development of these technologies, while expressing concern over the misuse of the Internet and ICTs by traffickers to facilitate human trafficking.

  • Roadmap for Digital Cooperation (2020) outlines a comprehensive framework for advancing global digital cooperation. It highlights the need for universal digital connectivity, digital public goods, inclusion, human rights, and trust and security to harness technology for sustainable development and address the digital divide.

  • The  Framework for Science, Technology and Innovation Policy Reviews (2019) plays a pivotal role in enhancing the technological and innovation capacities of developing countries through its Science, Technology and Innovation Policy (STIP) Review programme. The latter evaluates national science, technology and innovation (STI) systems, refines policies, and integrates STI into national development strategies and international cooperation plans, aligning with the 2030 Agenda for Sustainable Development.

  • United Nations Field Technology Framework (2018) outlines the strategic vision for advancing ICT in support of UN field operations from 2018 to 2023 by delivering ICT solutions that are rapid, effective, efficient, and responsible, and integrating these core principles into all ICT planning and operations throughout the Framework’s duration.

  • The UN Secretary-General’s Strategy on New Technologies (2018) aims to define how the UN system will assist in leveraging new technologies to achieve the 2030 Sustainable Development Agenda and to ensure they are in harmony with the principles of the UN Charter, the Universal Declaration of Human Rights, and International Laws.

  • United Nations Security Council Resolution 2396 (2017)  urges Member States to cooperate in preventing the exploitation of technologies, particularly by terrorist organisations,while respecting human rights and adhering to domestic and international law. It highlights the importance of continued voluntary collaboration with the private sector and civil society to create effective counter-terrorism strategies, including developing counter-narratives and innovative technological solutions.

  • United Nations Security Council Resolution 2331 (2016) condemns all acts of trafficking, particularly the sale or trade-in persons undertaken by ISIL, also known as Da’esh, and expresses its intention to consider targeted sanctions for individuals and entities involved in sexual violence in conflict and in trafficking in persons in areas affected by armed conflict. It also highlights concerns about the criminal exploitation of information and communication technologies, especially the Internet, to facilitate human trafficking, including the sale and trade of persons, by certain terrorist organisations.

  • United Nations General Assembly Resolution 70/1 (2015) highlights the importance of the proliferation of ICT, along with global interconnectedness, to potentially significantly enhance human progress, close the digital divide, and foster the development of knowledge societies.

Frameworks and resolutions addressing issues related to CRSV can be found here



IV. Situations Where TFGBV Occurs 

a. Situations of Concern

This section offers examples of TFGBV patterns identified in contexts where CRSV has been listed as a situation of concern in the Secretary-General’s Annual Report(s) on CRSV.


IRAQ

From 2014 onwards, ISIS exploited digital platforms, including online messenger apps, to trade and traffic Yazidi women, girls, and boys, resulting in severe sexual violence, including enslavement, rape, and torture (UN, 2021). Additionally, religious groups used ICTs, such as Facebook and WhatsApp, to spread misinformation and defamation against the Yazidi community, instilling fear of future attacks.  


LIBYA

In Libya, the use of sexual violence to silence journalists, prisoners, migrants and women is prevalent.  In 2023, numerous cases of online hate speech and threats of sexual violence were recorded. One female politician was notably threatened with death and sexualised defamation. Additionally, human rights defenders expressed concerns about their safety due to persistent online threats of sexual violence. In some cases, sexual attacks were recorded and shared online, including one incident where the victim had criticised an armed group on social media.


MYANMAR

In Myanmar, social media, particularly Facebook, has been a powerful tool for spreading hate. ICTs have notably been employed as instruments to advocate for the ethnic cleansing of the Rohingya people,who have been subjected to widespread sexual violence as a result. Social media has  been used to spread gendered narratives portraying Rohingya individuals as threats to Buddhism, accusing women of strategically spreading Islam through high birth rates and men of sexually assaulting and corrupting Buddhist women. 


ISRAEL AND THE OCCUPIED PALESTINIAN TERRITORY 

Social media platforms have exacerbated the spread of online hate and racism against Palestinian and Jewish communities, in particular since the beginning of the conflict in October 2023. Reports have highlighted how messages on X including harmful content incited violence, racism, and hatred against Palestinians and directly contributed to the violence that flared between Israeli settlers and Palestinian villagers in Huwwara. Furthermore, it was reported that the Israeli army took photos of Palestinian female detainees in degrading conditions and uploaded them online. The UN Human Rights Council also indicated that the abduction, violence and humiliation of Israeli women during the attacks of the 7th of October were put on public display by recording the bodies of women or the acts of the crime and publishing it online for propaganda purposes.


UKRAINE

Russia’s invasion of Ukraine in 2022 has exacerbated a pre-existing environment where Ukrainian women are overtly sexualised and objectified. Sex traffickers have exploited messaging apps and social media platforms used by Ukrainian refugees seeking assistance, to lure women into vulnerable situations that ultimately led to their trafficking and exploitation.


YEMEN

Women human rights defenders in Yemen face continuous online violence, including online blackmailing, harassment, threats, and the dissemination of false information aimed at discrediting and silencing their activism and undermining their efforts to advocate for human rights and gender equality.


b. Others 

KENYA

In 2014, Al-Shabaab used social media to share its propaganda, attract recruits and coordinate its followers – all of which can contribute to online radicalisation and CRSV. Additionally, women politicians in Kenya continue to experience online abuse and harassment, impeding progress in boosting women’s political voice, especially during elections. The Interparliamentary Union and the African Parliamentary Union states that at least 42% of women parliamentarians have encountered TFGBV in 2021.



V. Initiatives and Promising Practices

Members of the UN Action Network have been conducting research, implementing country-based programmes, and raising awareness on issues relating to TFGBV in CRSV contexts. These are a few examples: 

UN WOMEN
  • Spotlight Initiative is the UN’s high-impact initiative to end violence against women and girls. It uses technology to improve the safety of women and girls, both on and offline, by providing direct support to survivors; implementing digital laws and policies; raising awareness; improving digital literacy and engaging influencers.
  • The African Girls Can Code Initiative aims to train and empower at least 2000 young girls aged 17-25 across Africa to become proficient computer programmers, creators, and designers. This initiative aims to prepare them for studies and careers in ICT, education and coding sectors.
  • The Oasis Programme: UN Women has created the Oasis empowerment centre to address the urgent needs of Syrian refugee women and girls in the Za’atari and Azraq refugee camps and in impoverished areas of Jordan. The Oasis model aims to enhance humanitarian efforts and resilience-building initiatives in Jordan to better serve the needs of Syrian women refugees and vulnerable Jordanian women. Through interactive workshops and awareness sessions, women engage with human rights, GBV, and protection mechanisms, all aligned with the 16 Days of Activism against Gender-Based Violence campaign.
  • The UNITE to End Violence against Women initiative was launched in 2008 under the leadership of the UN Secretary-General to support civil society, women’s organisations, young people, the private sector, media, and the UN system in joining forces to address the global pandemic of violence against women and girls. The initiative is led by the annual 16 Days of Activism against Gender-Based Violence campaign, which calls for the prevention and elimination of violence against women and girls, as well as other forms of GBV and online GBV.

The UN Secretariat and Other Initiatives and Resources: 
  • Together for Girls is a global public-private partnership dedicated to ending violence against children, with a particular focus on sexual violence against girls. Founded in 2009, the Together for Girls partnership brings together six UN agencies, the governments of the United States and Canada, several private sector organisations, and implementing country governments to prevent and respond to violence against children, as a fundamental step to achieving individual rights and well-being, gender equality, and sustainable development. Together for Girls investigated online child sexual abuse such as: Pledges made in Brussels to step up the global fight against online child sexual abuse and The new face of schooling… and keeping kids safe at home and online.
  • The UN Trust Fund to End Violence against Women (UN Trust Fund) is a global grant-making mechanism dedicated to supporting initiatives aimed at preventing and addressing all forms of violence against women and girls, including online violence.  Established in 1996 by the UN General Assembly and managed by UN Women, the fund provides financial support to civil society organisations, governments, and UN country teams to implement innovative and effective strategies to combat GBV. 
  • The Global Digital Compact highlights the importance of empowering all women and girls, encouraging women’s leadership, mainstreaming gender perspectives and preventing and eliminating SGBV occurring through or amplified by the use of technology.
  • The National Action Plan to Prevent and Respond to Online Child Sexual Exploitation in Cambodia 2021-2025 outlines a comprehensive strategy to combat the issue of online child sexual exploitation. The plan focuses on enhancing legal frameworks, strengthening law enforcement capabilities, increasing public awareness, and providing support services to survivors. Key components include improving national legislation to address online exploitation; training law enforcement and judicial personnel; launching public education campaigns to raise awareness; and establishing support mechanisms for affected children and families. The action plan aims to create a safer online environment for children in Cambodia by fostering multi-sectoral collaboration and ensuring the effective implementation of policies and programs.
  • Communities Care: Transforming Lives and Preventing Violence Programme is a community-driven model aimed at preventing and addressing sexual violence against girls and women in conflict-affected areas. The programme is based on the concept that despite the profound suffering caused by armed conflict, such disruption can also create opportunities for positive changes in social norms, to promote gender equality and reduce GBVtm and discrimination.
  • UN Action Against Sexual Violence in Conflict is a network of 25 UN entities to combat sexual violence in conflict. This initiative aims to enhance coordination and accountability within the UN system, strengthen programming and advocacy efforts, and support national initiatives to prevent sexual violence and address the needs of survivors effectively. The UN Action Network has framed the issue of CRSV in the digital space as a priority in its newly developed 2024-2025 Work plan. 


 

VI. Research and Resources

a. Trafficking in Persons


b. Doxxing and Trolling


c. Online Hate Speech


d. Other Relevant Resources