By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
AIModelKitAIModelKitAIModelKit
  • Home
  • News
    NewsShow More
    Sam Altman Targeted Again in Recent Attack: What You Need to Know
    Sam Altman Targeted Again in Recent Attack: What You Need to Know
    4 Min Read
    OpenAI Acquires AI Personal Finance Startup Hiro: What This Means for the Future
    OpenAI Acquires AI Personal Finance Startup Hiro: What This Means for the Future
    5 Min Read
    Microsoft Develops New OpenClaw-like AI Agent: What to Expect
    Microsoft Develops New OpenClaw-like AI Agent: What to Expect
    4 Min Read
    Microsoft Tests OpenClaw-Inspired AI Bots for Enhanced Copilot Functionality
    Microsoft Tests OpenClaw-Inspired AI Bots for Enhanced Copilot Functionality
    4 Min Read
    How Companies Are Expanding AI Adoption While Maintaining Control
    How Companies Are Expanding AI Adoption While Maintaining Control
    6 Min Read
  • Open-Source Models
    Open-Source ModelsShow More
    Pioneering the Future of Computer Use: Expanding Digital Frontiers
    Pioneering the Future of Computer Use: Expanding Digital Frontiers
    5 Min Read
    Protecting Cryptocurrency: How to Responsibly Disclose Quantum Vulnerabilities
    Protecting Cryptocurrency: How to Responsibly Disclose Quantum Vulnerabilities
    4 Min Read
    Boosting AI and XR Prototyping Efficiency with XR Blocks and Gemini
    Boosting AI and XR Prototyping Efficiency with XR Blocks and Gemini
    5 Min Read
    Transforming News Reports into Data Insights with Gemini: A Comprehensive Guide
    Transforming News Reports into Data Insights with Gemini: A Comprehensive Guide
    6 Min Read
    Enhancing Urban Safety: AI-Powered Flash Flood Forecasting Solutions for Cities
    Enhancing Urban Safety: AI-Powered Flash Flood Forecasting Solutions for Cities
    5 Min Read
  • Guides
    GuidesShow More
    Could AI Agents Become Your Next Security Threat?
    Could AI Agents Become Your Next Security Threat?
    6 Min Read
    Master Python Continuous Integration and Deployment with GitHub Actions: Take the Real Python Quiz
    Master Python Continuous Integration and Deployment with GitHub Actions: Take the Real Python Quiz
    3 Min Read
    Exploring the Role of Data Generalists: Why Range is More Important than Depth
    Exploring the Role of Data Generalists: Why Range is More Important than Depth
    6 Min Read
    Master Python Protocols: Take the Ultimate Quiz with Real Python
    Master Python Protocols: Take the Ultimate Quiz with Real Python
    4 Min Read
    Mastering Input and Output in Python: Quiz from Real Python
    Mastering Input and Output in Python: Quiz from Real Python
    3 Min Read
  • Tools
    ToolsShow More
    Safetensors Partners with PyTorch Foundation: Strengthening AI Development
    Safetensors Partners with PyTorch Foundation: Strengthening AI Development
    5 Min Read
    High Throughput Computer Use Agent: Understanding 12B for Optimal Performance
    High Throughput Computer Use Agent: Understanding 12B for Optimal Performance
    5 Min Read
    Introducing the First Comprehensive Healthcare Robotics Dataset and Essential Physical AI Models for Advancing Healthcare Robotics
    Introducing the First Comprehensive Healthcare Robotics Dataset and Essential Physical AI Models for Advancing Healthcare Robotics
    6 Min Read
    Creating Native Multimodal Agents with Qwen 3.5 VLM on NVIDIA GPU-Accelerated Endpoints
    Creating Native Multimodal Agents with Qwen 3.5 VLM on NVIDIA GPU-Accelerated Endpoints
    5 Min Read
    Discover SyGra Studio: Your Gateway to Exceptional Creative Solutions
    Discover SyGra Studio: Your Gateway to Exceptional Creative Solutions
    6 Min Read
  • Events
    EventsShow More
    Navigating the ESSER Cliff: Key Reasons Education Company Leaders are Attending the 2026 EdExec Summit
    Navigating the ESSER Cliff: Key Reasons Education Company Leaders are Attending the 2026 EdExec Summit
    6 Min Read
    Exploring National Robotics Week: Key Physical AI Research Breakthroughs and Essential Resources
    Exploring National Robotics Week: Key Physical AI Research Breakthroughs and Essential Resources
    5 Min Read
    Developing a Comprehensive Four-Part Professional Development Series on AI Education
    Developing a Comprehensive Four-Part Professional Development Series on AI Education
    6 Min Read
    NVIDIA and Thinking Machines Lab Forge Strategic Gigawatt-Scale Partnership for Long-Term Innovation
    NVIDIA and Thinking Machines Lab Forge Strategic Gigawatt-Scale Partnership for Long-Term Innovation
    5 Min Read
    ABB Robotics Utilizes NVIDIA Omniverse for Scalable Industrial-Grade Physical AI Solutions
    ABB Robotics Utilizes NVIDIA Omniverse for Scalable Industrial-Grade Physical AI Solutions
    5 Min Read
  • Ethics
    EthicsShow More
    Meta Faces Warning: Facial Recognition Glasses Could Empower Sexual Predators
    Meta Faces Warning: Facial Recognition Glasses Could Empower Sexual Predators
    5 Min Read
    How Increased Job Commodification Makes Your Role More Susceptible to AI: Insights from Online Freelancing
    How Increased Job Commodification Makes Your Role More Susceptible to AI: Insights from Online Freelancing
    6 Min Read
    Exclusive Jeff VanderMeer Story & Unreleased AI Models: The Download You Can’t Miss
    Exclusive Jeff VanderMeer Story & Unreleased AI Models: The Download You Can’t Miss
    5 Min Read
    Exploring Psychological Learning Paradigms: Their Impact on Shaping and Constraining Artificial Intelligence
    Exploring Psychological Learning Paradigms: Their Impact on Shaping and Constraining Artificial Intelligence
    4 Min Read
    Anthropic Faces Supply Chain Risk Limbo Amid Conflicting Legal Rulings
    Anthropic Faces Supply Chain Risk Limbo Amid Conflicting Legal Rulings
    6 Min Read
  • Comparisons
    ComparisonsShow More
    Enhancing Mission-Critical Small Language Models through Multi-Model Synthetic Training: Insights from Research 2509.13047
    Enhancing Mission-Critical Small Language Models through Multi-Model Synthetic Training: Insights from Research 2509.13047
    4 Min Read
    Google Launches Gemma 4: Emphasizing Local-First, On-Device AI Inference for Enhanced Performance
    Google Launches Gemma 4: Emphasizing Local-First, On-Device AI Inference for Enhanced Performance
    5 Min Read
    Overcoming Limitations of Discrete Neuronal Attribution in Neuroscience
    Overcoming Limitations of Discrete Neuronal Attribution in Neuroscience
    5 Min Read
    Optimizing Bandwidth for Cooperative Multi-Agent Reinforcement Learning: Variational Message Encoding Techniques
    Optimizing Bandwidth for Cooperative Multi-Agent Reinforcement Learning: Variational Message Encoding Techniques
    4 Min Read
    Anthropic Unveils Claude Mythos Preview Featuring Advanced Cybersecurity Features, Access Restricted for Public
    Anthropic Unveils Claude Mythos Preview Featuring Advanced Cybersecurity Features, Access Restricted for Public
    6 Min Read
Search
  • Privacy Policy
  • Terms of Service
  • Contact Us
  • FAQ / Help Center
  • Advertise With Us
  • Latest News
  • Model Comparisons
  • Tutorials & Guides
  • Open-Source Tools
  • Community Events
© 2025 AI Model Kit. All Rights Reserved.
Reading: Combatting Technology in Intimate Partner Violence: Strategies for Defense
Share
Notification Show More
Font ResizerAa
AIModelKitAIModelKit
Font ResizerAa
  • 🏠
  • 🚀
  • 📰
  • 💡
  • 📚
  • ⭐
Search
  • Home
  • News
  • Models
  • Guides
  • Tools
  • Ethics
  • Events
  • Comparisons
Follow US
  • Latest News
  • Model Comparisons
  • Tutorials & Guides
  • Open-Source Tools
  • Community Events
© 2025 AI Model Kit. All Rights Reserved.
AIModelKit > News > Combatting Technology in Intimate Partner Violence: Strategies for Defense
News

Combatting Technology in Intimate Partner Violence: Strategies for Defense

aimodelkit
Last updated: June 19, 2025 8:25 am
aimodelkit
Share
Combatting Technology in Intimate Partner Violence: Strategies for Defense
SHARE

As technology continues to evolve, so too do the methods by which abusers exploit these advancements. Acknowledging that the advocacy community was lagging behind in understanding tech, Erin Southworth established the National Network to End Domestic Violence’s Safety Net Project in 2000. The aim was clear: to provide comprehensive training on leveraging technology to assist victims and hold abusers accountable. Today, the project’s online resources include toolkits offering critical guidance, such as creating robust passwords and formulating security questions that could safeguard sensitive information. As director Audace Garnett aptly notes, “When you’re in a relationship with someone, they may know your mother’s maiden name.”

Big Tech Safeguards

In an effort to extend her reach, Southworth has also served as an advisor to major tech companies, guiding them on enhancing user safety for those who have experienced intimate partner violence. In 2020, she took on the role of head of women’s safety at Facebook (now Meta), significantly drawn to its proactive measures against intimate image abuse. Notably, the platform introduced one of the first “sextortion” policies back in 2012. Today, she focuses on a technological approach known as “reactive hashing,” which assigns unique “digital fingerprints” to nonconsensual images. This system streamlines the reporting process for survivors: reporting one instance effectively prevents all duplicates from circulating.

Another facet of concern is “cyberflashing,” a technology-enabled behavior where individuals share unsolicited explicit photos. Meta has countered this issue on Instagram by restricting accounts from sending images unless they follow one another. However, critics argue that Meta’s approach appears more reactive than proactive. Despite the company’s stance of removing content that breaches bullying or violence policies, their recent policy changes have allowed greater freedoms for abusive speech. As reported by CNN, users are now allowed to refer to women as “household objects” and share transphobic or homophobic comments that were previously prohibited.

The duality of technology presents a unique challenge: tools designed for good can just as easily facilitate harm. A tracking feature that could be useful for an individual monitoring a stalker might pose a significant risk for someone being pursued. When questioned about preventative measures that tech companies should adopt to mitigate technology-assisted abuse, experts often express frustration. For instance, abusers have exploited parental controls designed for safeguarding children to monitor adults. While essential for child safety, tech companies face a dilemma; they can’t simply eliminate these features without serious consequences.

Audace Garnett emphasizes the importance of embedding safety considerations into product design from the outset. However, she notes this is hard to implement for many longstanding products. Interestingly, some computer scientists point to Apple as a leader in the field of security measures. Their closed ecosystem effectively blocks many unauthorized third-party applications and friction can alert users when their privacy is compromised. Yet, even these measures cannot guarantee foolproof security.

Over the past ten years, leading US tech companies such as Google, Meta, Airbnb, Apple, and Amazon have assembled safety advisory boards to tackle the issues surrounding digital abuse. Their strategies vary widely. For example, at Uber, board members have provided insight into potential “blind spots,” influencing the creation of customizable safety tools. A significant outcome is Uber’s PIN verification feature, ensuring riders must provide a unique code before their trip begins, effectively promoting safer interactions.

Apple’s strategy has included thorough guidance, encapsulated in a comprehensive “Personal Safety User Guide.” This guide includes a section titled “I want to escape or am considering leaving a relationship that doesn’t feel safe,” offering information on blocking unwanted contacts, gathering evidence, and steps for alerting users of unwanted tracking.

Unfortunately, determined and creative abusers often find ways to circumvent these safeguards. Elizabeth, who prefers to remain anonymous, recently discovered an AirTag secretly placed by her ex-partner in a wheel well of her car. Wrapped in duct tape to muffle sound, the device exemplifies how some individuals are willing to exploit technology for nefarious purposes. In response to growing reports of unwanted tracking via AirTags, Apple has implemented features allowing users to locate an unwelcome device by sound – but as Elizabeth points out, no protection is foolproof when faced with malicious intent.

Laws Play Catch-Up

As tech companies grapple with preventing technology-facilitated abuse, law enforcement’s responses can vary significantly. Lisa Fontes, a psychologist and expert in coercive control, highlights troubling encounters she has observed. One victim reported police dismissing her case, stating, “You shouldn’t have given him the picture.” In other instances, individuals have approached law enforcement regarding hidden “nanny cams” placed by their abusers, only to be told, “You can’t prove he bought it” or “there’s nothing we can do.” This inconsistency in the judicial response highlights an urgent need for the legal system to catch up with the realities of technology-enabled abuse and better support those affected.

Inspired by: Source

Contents
  • Big Tech Safeguards
  • Laws Play Catch-Up
Meta Secures Partnerships with Three Nuclear Firms for Over 6 GW of Clean Energy Production
How Capital One is Leveraging Agentic AI to Boost Auto Sales Efficiency
Exploring the Possibility of a Secure AI Assistant: Is It Achievable?
Amazon Develops New Alexa Phone: What You Need to Know
OpenAI Acquires Xcode Coding Assistant Team Behind Alex for Enhanced Development Solutions

Sign Up For Daily Newsletter

Get AI news first! Join our newsletter for fresh updates on open-source models.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Previous Article Enhancing Ontology Versioning Through Effective Ontology Matching Techniques Enhancing Ontology Versioning Through Effective Ontology Matching Techniques
Next Article Achieving Rapid Convergence in High-Order ODE Solvers for Diffusion Probabilistic Models: A Study Achieving Rapid Convergence in High-Order ODE Solvers for Diffusion Probabilistic Models: A Study

Stay Connected

XFollow
PinterestPin
TelegramFollow
LinkedInFollow

							banner							
							banner
Explore Top AI Tools Instantly
Discover, compare, and choose the best AI tools in one place. Easy search, real-time updates, and expert-picked solutions.
Browse AI Tools

Latest News

Could AI Agents Become Your Next Security Threat?
Could AI Agents Become Your Next Security Threat?
Guides
Sam Altman Targeted Again in Recent Attack: What You Need to Know
Sam Altman Targeted Again in Recent Attack: What You Need to Know
News
Enhancing Mission-Critical Small Language Models through Multi-Model Synthetic Training: Insights from Research 2509.13047
Enhancing Mission-Critical Small Language Models through Multi-Model Synthetic Training: Insights from Research 2509.13047
Comparisons
OpenAI Acquires AI Personal Finance Startup Hiro: What This Means for the Future
OpenAI Acquires AI Personal Finance Startup Hiro: What This Means for the Future
News
//

Leading global tech insights for 20M+ innovators

Quick Link

  • Latest News
  • Model Comparisons
  • Tutorials & Guides
  • Open-Source Tools
  • Community Events

Support

  • Privacy Policy
  • Terms of Service
  • Contact Us
  • FAQ / Help Center
  • Advertise With Us

Sign Up for Our Newsletter

Get AI news first! Join our newsletter for fresh updates on open-source models.

AIModelKitAIModelKit
Follow US
© 2025 AI Model Kit. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?