{"id":4940,"date":"2023-10-03T10:01:16","date_gmt":"2023-10-03T10:01:16","guid":{"rendered":"https:\/\/mpelembe.net\/?p=4940"},"modified":"2023-10-03T10:01:16","modified_gmt":"2023-10-03T10:01:16","slug":"even-before-deepfakes-tech-was-a-tool-of-abuse-and-control","status":"publish","type":"post","link":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/","title":{"rendered":"Even before deepfakes, tech was a tool of abuse and\u00a0control"},"content":{"rendered":"<p><span><a href=\"https:\/\/theconversation.com\/profiles\/tirion-havard-1308521\">Tirion Havard<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/london-south-bank-university-909\">London South Bank University<\/a><\/em><\/span><\/p>\n<p>Of the many \u201c<a href=\"https:\/\/futureoflife.org\/open-letter\/pause-giant-ai-experiments\/\">profound risks to society and humanity<\/a>\u201d that have tech experts worried about artificial intelligence (AI), the spread of fake images is one that everyday internet users will be familiar with.<\/p>\n<p>Deepfakes \u2013 videos or photographs where someone\u2019s face or body has been digitally altered so that they appear to be doing something they are not \u2013 have already been used to spread <a href=\"https:\/\/www.nytimes.com\/2023\/02\/07\/technology\/artificial-intelligence-training-deepfake.html\">political disinformation<\/a> and <a href=\"https:\/\/www.euronews.com\/next\/2023\/04\/22\/a-lifelong-sentence-the-women-trapped-in-a-deepfake-porn-hell\">fake pornography<\/a>.<\/p>\n<p><!--more--><\/p>\n<p>These images are typically malicious and are used to discredit the subject. When it comes to deepfake pornography, the <a href=\"https:\/\/uclawreview.org\/2023\/08\/02\/deepfakes-the-effect-on-women-and-potential-protections\/#:%7E:text=In%202019%2C%20DeepTrace%2C%20a%20deepfake,of%20those%20involve%20women.%E2%80%9D%2019\">vast majority of victims are women<\/a>. Generative AI \u2013 technology used to create text, images and video \u2013 is <a href=\"https:\/\/penntoday.upenn.edu\/news\/what-deepfake-porn-and-why-it-thriving-age-ai\">already making<\/a> image-based sexual abuse easier to perpetrate. <\/p>\n<p>A new <a href=\"https:\/\/theconversation.com\/online-safety-bill-why-making-the-uk-the-safest-place-to-go-online-is-not-as-easy-as-the-government-claims-214290\">set of laws<\/a> in the UK, will criminalise the sharing of deepfake pornography. But with the attention on AI and deepfakes, we cannot forget how less sophisticated technology can be used as a tool of abuse, with devastating consequences for victims.<\/p>\n<h2>Tech and control<\/h2>\n<p>When I began my research into technology in abusive relationships, deepfakes were just a blip on the horizon. My work focused on the <a href=\"https:\/\/openresearch.lsbu.ac.uk\/item\/8w0v4\">role of smartphones<\/a> in the abuse of women who had fled controlling relationships. I found that perpetrators of domestic abuse were using technology to extend the reach of their power and control over their partners, a modern take on abuse tactics that were used <a href=\"https:\/\/connect.springerpub.com\/content\/book\/978-0-8261-7991-3\">long before<\/a> smartphones were in every pocket.<\/p>\n<p>Mobile phones can be used directly to monitor and control, using GPS tracking or by bombarding a victim with texts, videos and voice calls. One participant in my <a href=\"https:\/\/sussex.figshare.com\/articles\/thesis\/Beyond_proximity_the_covert_role_of_mobile_phones_in_maintaining_power_and_coercive_control_in_the_domestic_abuse_of_women\/23306735\">research in 2019<\/a> explained how her abusive partner used his phone to access social media, sending her offensive pictures via Instagram and persistent and offensive WhatsApp messages. <\/p>\n<p>When she was out with her friends, he would first text, ring and then video call her constantly to check where she was and to see who she was with. When the participant turned off her phone, her then-partner contacted her friends, bombarding them with texts and calls. <\/p>\n<p>This participant felt too embarrassed to make arrangements to meet with her peer group and so stopped going out. Others in similar situations might be excluded from social plans, if friends want to avoid being contacted by their friend\u2019s abuser. Such social isolation is a frequent part of domestic abuse and an important indicator of controlling relationships. <\/p>\n<p>According to the domestic violence charity Refuge,<br \/>\n<a href=\"https:\/\/refuge.org.uk\/news\/72-of-refuge-service-users-identify-experiencing-tech-abuse\/\">more than 72%<\/a> of people who use its services report abuse involving technology. <\/p>\n<p>Mobile phones are a gateway to other gadgets, via the \u201cinternet of things\u201d \u2013 devices that are web-connected and able to exchange data. These tools can also be weaponised by abusers. For example, using mobile phones to <a href=\"https:\/\/www.psychologytoday.com\/gb\/blog\/legal-matters\/201907\/gaslighting-in-the-age-smart-home-technology\">change temperature settings<\/a> on a household thermostat, creating extremes from one hour to the next. <\/p>\n<p>Confused by this, people seek explanations from their partner only to be told that this must be a figment of their imagination. <a href=\"https:\/\/theconversation.com\/gaslighting-from-partners-to-politicians-how-to-avoid-becoming-a-victim-121828\">Gaslighting techniques<\/a> such as this make victims question their own sanity which undermines their confidence in their own judgment. <\/p>\n<h2>A modern panopticon<\/h2>\n<p>With the click of a button, mobile phones allow for unprecedented surveillance of others. In the pocket of a perpetrator, they can be used to keep tabs on current and former partners any time, any place and \u2013 signal permitting \u2013 anywhere. This gives perpetrators a <a href=\"https:\/\/openresearch.lsbu.ac.uk\/item\/8w0v4\">power of omnipotence<\/a>, leaving victims believing that they are being watched even when they are not.<\/p>\n<p>This brings to mind the work of the 18th-century philosopher Jeremy Bentham, who introduced the concept of the \u201cpanopticon\u201d. Bentham proposed a \u201cperfect\u201d prison system, where a guard tower sits in the centre, surrounded by individual cells. <\/p>\n<p>Isolated from one another, prisoners would see only the tower \u2013 a constant reminder that they are permanently watched, even though they cannot see the guard within it. Bentham believed such a structure would result in the prisoners\u2019 self-surveillance until eventually no locks or bars were needed.<\/p>\n<figure class=\"align-center \">\n            <img decoding=\"async\" alt=\"The interior of an empty panopticon prison, a circular, concrete room with a guard tower in the centre and dozens of cells with sunlight shining through\" data-src=\"https:\/\/images.theconversation.com\/files\/548853\/original\/file-20230918-161679-jublh5.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" data-srcset=\"https:\/\/images.theconversation.com\/files\/548853\/original\/file-20230918-161679-jublh5.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=402&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/548853\/original\/file-20230918-161679-jublh5.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=402&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/548853\/original\/file-20230918-161679-jublh5.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=402&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/548853\/original\/file-20230918-161679-jublh5.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=505&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/548853\/original\/file-20230918-161679-jublh5.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=505&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/548853\/original\/file-20230918-161679-jublh5.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=505&amp;fit=crop&amp;dpr=3 2262w\" data-sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\"><figcaption>\n              <span class=\"caption\">A panopticon design inside the \u2018Presidio modelo\u2019, a model prison built in Cuba, now a museum.<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Presidio-modelo2.JPG\">Friman\/Wikimedia Commons<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<p><a href=\"https:\/\/openresearch.lsbu.ac.uk\/item\/924y1\">My most recent research<\/a> shows that mobile phones have created similar dynamics within abusive relationships. Phones take the role of the tower, and perpetrators the guards within it. <\/p>\n<p>In this modern panopticon, victims can be out and about, visible to strangers, friends and family. Yet because of the presence of the phone, they feel they are still being watched and controlled by their abusive partners. <\/p>\n<p>As one participant put it: \u201cYou feel there\u2019s no freedom even when you\u2019re out. You feel like you are locked up somewhere, you don\u2019t have freedom, someone is controlling you.\u201d<\/p>\n<p>Survivors of abuse continue to monitor themselves even when the perpetrators are not there. They act in ways that they believe will please (or at least not anger) their abusers. <\/p>\n<p>This behaviour is often viewed by others as strange, and too readily dismissed as paranoia, anxiety or more serious mental health issues. The focus becomes about the victim\u2019s behaviour and ignores the cause \u2013 abusive or criminal behaviour by their partner. <\/p>\n<p>As technology becomes more sophisticated, the tools and strategies available to abusers will continue to evolve. This will extend perpetrators\u2019 reach and present new opportunities for surveillance, gaslighting and abuse. <\/p>\n<p>Until tech companies consider the experiences of domestic abuse survivors and build safety mechanisms into the design of their products, abuse will continue to remain <a href=\"https:\/\/www.google.co.uk\/books\/edition\/Coercive_Control\/8h0TDAAAQBAJ?hl=en&amp;gbpv=0\">hidden in plain sight<\/a>.<\/p>\n<hr>\n<p><em>If you are concerned about safety and abuse related to technology, please <a href=\"https:\/\/refugetechsafety.org\">visit this advice page<\/a> from Refuge, the UK\u2019s largest domestic abuse charity.<\/em><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding=\"async\" data-src=\"https:\/\/counter.theconversation.com\/content\/211795\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" style=\"--smush-placeholder-width: 1px; --smush-placeholder-aspect-ratio: 1\/1;border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important\" referrerpolicy=\"no-referrer-when-downgrade\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><span><a href=\"https:\/\/theconversation.com\/profiles\/tirion-havard-1308521\">Tirion Havard<\/a>, Associate Professor of Social Work, <em><a href=\"https:\/\/theconversation.com\/institutions\/london-south-bank-university-909\">London South Bank University<\/a><\/em><\/span><\/p>\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control-211795\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tirion Havard, London South Bank University Of the many \u201cprofound risks to society and humanity\u201d that have tech experts worried about artificial intelligence (AI),<a class=\"moretag\" href=\"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":4941,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"googlesitekit_rrm_CAowu7GVCw:productID":"","_crdt_document":"","activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[3],"tags":[1169,10650,722,5904,5723,4288,10649,10654,10652,1875,10651,1272,10655,723],"class_list":["post-4940","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-abuse","tag-abusive-power-and-control","tag-creative-commons","tag-crimes","tag-cuba","tag-deepfake","tag-domestic-violence","tag-jeremy-bentham","tag-london-south-bank-university","tag-mobile-phone","tag-panopticon","tag-sexual-abuse","tag-tirion-havard","tag-united-kingdom"],"featured_image_src":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/10\/file-20230918-23-ds1krb-1024x683.jpg","blog_images":{"medium":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/10\/file-20230918-23-ds1krb-300x200.jpg","large":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/10\/file-20230918-23-ds1krb-1024x683.jpg"},"ams_acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Even before deepfakes, tech was a tool of abuse and\u00a0control - Mpelembe Network<\/title>\n<meta name=\"description\" content=\"Mobile phones have extended the reach and control of abusive partners.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Even before deepfakes, tech was a tool of abuse and\u00a0control - Mpelembe Network\" \/>\n<meta property=\"og:description\" content=\"Mobile phones have extended the reach and control of abusive partners.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Mpelembe Network\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-03T10:01:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/10\/file-20230918-23-ds1krb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\"},\"headline\":\"Even before deepfakes, tech was a tool of abuse and\u00a0control\",\"datePublished\":\"2023-10-03T10:01:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/\"},\"wordCount\":968,\"image\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/file-20230918-23-ds1krb.jpg\",\"keywords\":[\"Abuse\",\"Abusive power and control\",\"Creative Commons\",\"Crimes\",\"Cuba\",\"Deepfake\",\"Domestic violence\",\"Jeremy Bentham\",\"London South Bank University\",\"Mobile phone\",\"Panopticon\",\"Sexual abuse\",\"Tirion Havard\",\"United Kingdom\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/\",\"name\":\"Even before deepfakes, tech was a tool of abuse and\u00a0control - Mpelembe Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/file-20230918-23-ds1krb.jpg\",\"datePublished\":\"2023-10-03T10:01:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\"},\"description\":\"Mobile phones have extended the reach and control of abusive partners.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/file-20230918-23-ds1krb.jpg\",\"contentUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/file-20230918-23-ds1krb.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mpelembe.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Even before deepfakes, tech was a tool of abuse and\u00a0control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#website\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/\",\"name\":\"Mpelembe Network\",\"description\":\"Collaboration Platform\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mpelembe.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/mpelembe.net\"],\"url\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Even before deepfakes, tech was a tool of abuse and\u00a0control - Mpelembe Network","description":"Mobile phones have extended the reach and control of abusive partners.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/","og_locale":"en_US","og_type":"article","og_title":"Even before deepfakes, tech was a tool of abuse and\u00a0control - Mpelembe Network","og_description":"Mobile phones have extended the reach and control of abusive partners.","og_url":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/","og_site_name":"Mpelembe Network","article_published_time":"2023-10-03T10:01:16+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/10\/file-20230918-23-ds1krb.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/#article","isPartOf":{"@id":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/"},"author":{"name":"admin","@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608"},"headline":"Even before deepfakes, tech was a tool of abuse and\u00a0control","datePublished":"2023-10-03T10:01:16+00:00","mainEntityOfPage":{"@id":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/"},"wordCount":968,"image":{"@id":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/#primaryimage"},"thumbnailUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/10\/file-20230918-23-ds1krb.jpg","keywords":["Abuse","Abusive power and control","Creative Commons","Crimes","Cuba","Deepfake","Domestic violence","Jeremy Bentham","London South Bank University","Mobile phone","Panopticon","Sexual abuse","Tirion Havard","United Kingdom"],"articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/","url":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/","name":"Even before deepfakes, tech was a tool of abuse and\u00a0control - Mpelembe Network","isPartOf":{"@id":"https:\/\/mpelembe.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/#primaryimage"},"image":{"@id":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/#primaryimage"},"thumbnailUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/10\/file-20230918-23-ds1krb.jpg","datePublished":"2023-10-03T10:01:16+00:00","author":{"@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608"},"description":"Mobile phones have extended the reach and control of abusive partners.","breadcrumb":{"@id":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/#primaryimage","url":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/10\/file-20230918-23-ds1krb.jpg","contentUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/10\/file-20230918-23-ds1krb.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/mpelembe.net\/index.php\/even-before-deepfakes-tech-was-a-tool-of-abuse-and-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mpelembe.net\/"},{"@type":"ListItem","position":2,"name":"Even before deepfakes, tech was a tool of abuse and\u00a0control"}]},{"@type":"WebSite","@id":"https:\/\/mpelembe.net\/#website","url":"https:\/\/mpelembe.net\/","name":"Mpelembe Network","description":"Collaboration Platform","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mpelembe.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/mpelembe.net"],"url":"https:\/\/mpelembe.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/4940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/comments?post=4940"}],"version-history":[{"count":1,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/4940\/revisions"}],"predecessor-version":[{"id":4942,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/4940\/revisions\/4942"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/media\/4941"}],"wp:attachment":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/media?parent=4940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/categories?post=4940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/tags?post=4940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}