Computer security researchers aim to prevent tech abuse

hack attack
Credit: Pixabay/CC0 Public Domain

Researchers at Cornell Tech have created a new approach to helping survivors of domestic abuse stop assailants from hacking into their devices and social media to surveil, harass and hurt them.

The model focuses on "continuity of care," so clients experience a seamless relationship with one volunteer tech consultant over time, similar to a health care setting. It matches survivors with consultants who understand their needs and establish trust, offers survivors multiple ways to safely communicate with consultants, and securely stores their tech abuse history and concerns.

"Personal data management in tech abuse is a complex thing that can't always be 'solved' in a single half-hour visit," said Emily Tseng, a doctoral student and lead author on a paper about the model. "Most of the approaches that exist in tech support are limited by a one-size-fits-all protocol more akin to an emergency room than a primary care provider."

Tseng will present the paper "Care Infrastructure for Digital Security in Intimate Partner Violence" in April at the ACM CHI Conference on Human Factors in Computing Systems in New Orleans.

Tseng and her colleagues at Cornell Tech's Clinic to End Tech Abuse developed the new approach in partnership with New York City's Mayor's Office to End Domestic and Gender-Based Violence. Their research draws on eight months of data, as well as interviews with volunteer technology consultants and experts on intimate partner violence (IPV).

"This work provides an honest look at both the benefits and burdens of running a volunteer technology consultant service for IPV survivors, as well as the challenges that arise as we work to safely provide computer security advice as care," said co-author Nicola Dell, associate professor at Cornell Tech's Jacobs Technion-Cornell Institute. "Our hope is that our experiences will be valuable for others who are interested in helping at-risk communities experiencing computer insecurity."

Survivors can experience many forms of gender-based violence, including technology facilitated abuse, said Cecile Noel, commissioner of the Mayor's Office to End Domestic and Gender-Based Violence. "Cornell Tech's groundbreaking program not only helps survivors experiencing technology abuse but is also working to better understand how people misuse technology so that we can create better protections for survivors," Noel said. "We are proud of the critical role our longstanding partner Cornell Tech plays in improving the lives of survivors."

Tech abuse often exists within a larger web of harm, Tseng said. "In an ideal world, the people on the "Geek Squad' would be able to treat tech abuse with the sensitivity of a social worker."

Assailants can abuse their victims through tech including , also known as stalkerware, and through inappropriate use of location-tracking features in phones and other devices. They harass their former partners on , such as by posting private photos and posing as their victims to alienate family and friends. Abusers can also hack into email accounts and change recovery emails and phone numbers to their own, potentially devastating their victims' careers.

In previous models, counselors remained anonymous, impacting their ability to build trust with survivors. Short, one-time appointments were not long enough to address clients' needs. And appointments took place at a specific time; survivors who could not leave their homes or find a safe, private place to take a call were unable to access services and couldn't reach counselors at other times. It can be frustrating and even re-traumatizing for survivors to share their stories with new consultants at each appointment, Tseng said.

One of the team's larger goals is to offer survivors more peace of mind and feelings of empowerment—that they have the tools to handle future challenges. "With technology, there are so many ways to remain entangled with your abuser even after you've physically and romantically left the relationship," Tseng said.

One tricky element is determining how much support is realistic. While a one-time "urgent care" visit is probably insufficient, prolonged engagement would be unsustainable for consultants and the clinic as a whole. "In several cases, consultants ended up working with clients over many appointments stretching on for weeks or months," Tseng said.

As a next step, she wants to explore additional ways to evaluate ongoing security-care relations from the perspective of , particularly people from marginalized communities.

Dell co-created the Clinic to End Tech Abuse with Thomas Ristenpart, associate professor at Cornell Tech; both Dell and Ristenpart are also affiliated with the Cornell Ann S. Bowers College of Computing and Information Science.


Explore further

New tools to detect digital domestic abuse

More information: The paper is available as a PDF at emtseng.me/assets/Tseng-2022-C … ital-Privacy-IPV.pdf
Provided by Cornell University
Citation: Computer security researchers aim to prevent tech abuse (2022, February 24) retrieved 27 June 2022 from https://techxplore.com/news/2022-02-aim-tech-abuse.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
4 shares

Feedback to editors