Tech-Enabled Sexual Abuse: A Survivor’s Perspective

By C.Kimberly Toms | March 24, 2025

The intersection of technology and personal safety has emerged as a pressing issue in today’s digital age. While technology offers countless benefits, its misuse can lead to insidious harm, particularly through tech-enabled sexual abuse. This phenomenon represents a growing threat, where perpetrators leverage digital platforms and tools to exploit and control victims. I believe that my personal story, and the stories of other victims, can help people understand how digital abuse affects real lives and why it’s so important to recognize and stop these harmful behaviors.

Tech-enabled sexual abuse is NOT pornography. Informed, capable adults may legally choose to participate in the creation and distribution of consensual pornographic media. But when explicit content is created or shared without the subject’s legal consent, it is abuse. 

– RAINN.org

The Shape of My Tech-Enabled Sexual Abuse

As RAINN emphasizes, and I want to make absolutely clear: tech-enabled sexual abuse is NOT pornography. My own experience reveals how sinister this abuse can be. My offender created explicit content by secretly surveilling me for years, using technology to invade my most private moments without my knowledge. Although I noticed small warning signs in the early months of knowing him, I didn’t fully comprehend the extensive nature of his predatory behavior until months, and even years, later.

Former federal agent found guilty of second-degree sexual assault | WISN 12 ABC | February 15, 2020

David S., my convicted rapist, was a supervisory special agent for the U.S. Department of State who never should have been hired. He was brought into Diplomatic Security through a casual recommendation from his brother, bypassing the standard comprehensive background checks. The State Department failed to uncover his history—multiple women had previously filed police reports against him. This institutional negligence essentially gave him a free pass to continue targeting women, while he simultaneously refined his surveillance techniques.

His tactics were calculated and invasive. David would routinely tap into a victim’s WiFi, secretly observing and recording private moments without consent. I personally witnessed him using his laptop for these violations. He remained unaware that I had seen his methods—until now. Typical of his predatory behavior, he would even call from hundreds of miles away and make eerily specific comments, like telling me he loved the blue dress I was wearing at that moment—a chilling demonstration of his constant surveillance.

His surveillance eventually escalated to violent sexual assault. As he choked me with his hands—pressing his thumb into my windpipe to show how easily he could take my life—he shouted profanities and vicious names while positioning me for his camera. I soon realized with horror that he was “directing” me, arranging my body to capture specific angles for recording. He wanted to document my tears and terror for others to see.

Men like him—driven by obsession, rage, and a dangerous sense of untouchability—don’t simply stop their predatory behavior. Even after I relocated more than 1,300 miles away, I struggled for years to be heard, believed, and protected while he continued his digital and in-person stalking. This trauma drove me into technological withdrawal—I abandoned my smartphone for a basic flip phone for nearly five years. Despite covering my laptop camera, I would still wake in the middle of the night to see its telltale glow seeping around the edges of the tape.

I suspect he watches me still. The question that haunts me is when and how he’ll use the material he directed and downloaded. Considering his history of hiring hackers and sending threatening messages, I can’t help but wonder if my personal “Michael Myers” will suddenly reappear in my life—or worse, in the life of another unsuspecting woman. His probation for the rape ends in June 2026. Only time will tell what happens next.

Unveiling Tech-Enabled Sexual Abuse, Also Called Technology-Facilitated Gender-Based Violence

Understanding the New Age Threat

The advent of modern technology has transformed the nature of threats, giving rise to new forms of exploitation that were inconceivable a few decades ago. Tech-enabled sexual abuse encompasses a range of malicious activities also referred to simply as “digital assault,” such as unauthorized sharing of intimate imagery, cyberstalking, cyberbullying, sextortion, deepfakes, doxxing, blackmail, grooming, and digital harassment. Unlike traditional abuse, this new age menace infiltrates the private lives of victims through their devices, making it difficult to escape or find reprieve.

Perpetrators exploit digital tools like social media, messaging apps, artificial intelligence, and even IoT devices to track, intimidate, and manipulate their victims. These acts not only invade privacy but also lead to a pervasive sense of vulnerability and fear. Furthermore, the anonymity of the internet often emboldens perpetrators, exacerbating the scale and severity of the abuse. It’s crucial to recognize that tech-enabled sexual abuse isn’t just a technological issue but a deeply personal one that requires comprehensive understanding and response.

The Mechanics of Digital Exploitation

Platforms and Tools Used by Perpetrators

Perpetrators of tech-enabled sexual abuse often exploit the very platforms and tools designed to foster communication and connection. Commonly misused are social media sites like Facebook, Instagram, and X, along with messaging apps like WhatsApp and the Messenger app. These platforms are frequently employed for harassment, stalking, and the dissemination of non-consensual intimate material.

A systematic review revealed that such abuse often occurs in private through personal messaging apps, underscoring the need for victims to be vigilant about their digital privacy. Additionally, GPS tracking and email hacking are tactics used to monitor and control victims, adding another layer of complexity to their plight. Phone calls and SMS messages are also frequently abused, allowing perpetrators to maintain contact and apply pressure through persistent communication.

The misuse extends to online platforms where perpetrators anonymously share intimate content, which further exacerbates the trauma experienced by victims. Horrifyingly, I discovered my offender enjoyed using adult-oriented platforms on which users “broadcast” live streams of sexual activity. I believe this is likely one arena for which my rape was filmed, if not aired as it happened. A comprehensive understanding of these tools can empower individuals to recognize the signs of abuse and protect themselves against such violations.

Technology as a Double-Edged Sword

Technology stands as both an enabler and mitigator of tech-enabled sexual abuse, embodying the paradox of the digital age. On one hand, it provides abusers with tools to harass, monitor, and manipulate victims in ways that are difficult to trace or combat. On the other hand, technology also offers survivors avenues for empowerment, protection, and recovery.

The dark side of technology includes the anonymity it affords perpetrators, allowing them to hide behind screens and maintain control from a distance. Features such as location tracking, social media connectivity, and access to private communications are often manipulated to invade a victim’s privacy.

Conversely, technology can also be harnessed to empower survivors. Tools like two-factor authentication, privacy settings, and end-to-end encryption enhance digital security and control. In addition, technology facilitates access to support networks, online communities, and information about legal rights, helping survivors to seek assistance and build resilience.

Ultimately, the intersection of technology with personal safety necessitates vigilance, prevention efforts, and informed usage of digital tools. Equipping individuals with knowledge about the dual potential of technology is essential in turning it from a source of vulnerability into a shield against abuse.

Protection and Empowerment

Crafting a Personal Digital Safety Plan

Creating a personal digital safety plan is crucial for safeguarding oneself against tech-enabled sexual abuse. This involves adopting proactive measures to enhance security and privacy across digital platforms and devices. Here are actionable steps to consider when developing a comprehensive digital safety plan:

  • Use strong, unique passwords and enable two-factor authentication for all accounts
  • Set a passcode for every device and consistently log out of accounts after use
  • Avoid storing passwords in browsers to reduce vulnerability to breaches
  • Limit the amount of personal information shared online, including photos and locations
  • Refrain from sharing explicit or private content, even with trusted contacts
  • Regularly review and adjust privacy settings on social media to control who accesses your information
  • Disable geolocation and check-in features to prevent tracking
  • Cover your webcam when not in use and exercise caution when using public Wi-Fi for sensitive activities
  • Be wary of suspicious messages or links that could contain malware
  • Utilize platform tools to block and report any abusive behaviors encountered online. Familiarize yourself with how each platform handles reporting to ensure a swift response to unwanted contact.

Additionally, consider a deeper assessment of potential digital threats by taking the following precautions:

  • Change usernames and passwords regularly, particularly if you suspect any compromise in security
  • Monitor which accounts and devices are accessible by others, making conscious decisions about shared access
  • Use a “safer” device, borrowing a friend’s phone or using a public computer if you suspect your device is compromised
  • Document incidents of abuse by taking screenshots or creating detailed logs of events
  • Regularly check device settings to discern if unauthorized accounts or backup processes are enabled

Ultimately, devising a personal digital safety plan is a proactive measure to reduce the risk of being targeted. While no plan can guarantee complete online safety, these steps collectively help mitigate vulnerability and empower individuals to take control of their digital environment.

Legal Frameworks and Support Systems

Jurisdictions worldwide are gradually evolving to address the complexities of tech-enabled sexual abuse, developing legal frameworks that provide protection and recourse for victims. Understanding these laws is crucial for both prevention and pursuit of justice.

Legal Protections: Countries have established various laws to combat digital abuse, such as the Criminal Justice and Courts Act 2015 in the UK, which criminalizes the non-consensual sharing of private sexual photographs and films, commonly known as “revenge porn.” Similarly, the United States has varying state laws addressing cyber abuse, with some states enacting specific statutes against cyberstalking and online harassment. Individuals need to be familiar with their local regulations, as legal definitions and protections can differ significantly.

Support Systems: Numerous support systems have been created to assist victims. Many countries offer hotlines, counseling services, and legal aid specifically geared towards survivors of tech-enabled abuse. Organizations like the Cyber Civil Rights Initiative provide resources and assistance to victims of online abuse, offering guidance on legal rights and the steps necessary for content removal and privacy protection. RAINN, long the leading U.S. organization focused on advocacy, support, policy change and justice for victims of sexual assault and abuse, is quickly becoming a foremost expert in tech-enabled sexual abuse.

Collaborative Approaches: The fight against tech-enabled abuse often involves collaboration between technology companies, law enforcement, and advocacy groups. Platforms are increasingly implementing reporting tools and policies to address harmful content and protect users, while law enforcement agencies are receiving specialized training to better understand and investigate technology-facilitated crimes. Advocacy groups also play a critical role, raising awareness and lobbying for stronger legislation to protect victims.

For victims seeking redress, understanding the framework and offerings of these support systems is vital. Access to accurate information can empower individuals to make informed decisions about their next steps, from pursuing legal action for offender accountability to accessing emotional support.

Real-Life Impacts

Emotional and Psychological Consequences

Victim-survivors of tech-enabled sexual abuse often endure profound emotional and psychological consequences that can significantly affect their well-being. These impacts are both immediate and long-lasting, manifesting in diverse forms and intensities.

Short-Term Impacts: Many victims experience acute emotional responses such as anger, stress, anxiety, and fear. The shock of discovering one’s privacy has been invaded induces a state of disbelief and confusion. This immediate turmoil can lead to feelings of insecurity and a pervasive sense of vulnerability, making it challenging for individuals to trust others or engage effectively in their personal and professional lives.

Long-Term Impacts: The lingering effects can be even more debilitating, leading to prolonged emotional distress. Studies have documented that some survivors develop chronic conditions such as post-traumatic stress disorder (PTSD), depression, and a continual state of hypervigilance. The trauma can engender feelings of shame, isolation, and hopelessness, adversely affecting social interactions and diminishing the quality of life.

Victims might also struggle with lowered self-esteem and self-blame, erroneously attributing responsibility for the abuse to themselves. This can hinder their ability to seek out help or assert personal boundaries. Such psychological scars emphasize the importance of accessible support structures and mental health resources tailored to address the unique challenges of tech-enabled abuse.

Understanding the psychological ramifications is critical not only for providing effective support but also for developing interventions that help survivors regain their sense of control and rebuild their lives. Mental health professionals, peer support groups, and therapeutic interventions can play a pivotal role in this recovery process.

Societal Reactions and Stigmatization

Societal reactions to tech-enabled sexual abuse often compound the distress experienced by victims, highlighting a widespread struggle with stigmatization and victim-blaming. Despite increasing awareness, societal attitudes can still reflect deep-seated biases that place undue burden on survivors.

Stigmatization: Victims frequently encounter stigmatization, with misconceptions about digital privacy and the dynamics of online abuse contributing to harmful judgments. Many face questions about their behavior or decisions leading up to the abuse, rather than the actions of the perpetrator. Such reactions can lead to feelings of shame and reluctance to share their experiences or seek help.

Impact on Relationships: The societal tendency to downplay or misunderstand tech-enabled abuse affects victims’ relationships with family, friends, and colleagues. Victims may encounter skepticism or minimization of their experiences, which can lead to isolation and a breakdown of support networks essential for recovery.

Cultural Barriers: In certain cultures, issues of honor and reputation further complicate the victim’s ability to speak out. Social norms rooted in patriarchal values oftentimes prioritize family reputation over individual well-being, pressuring victims to remain silent to avoid bringing perceived shame upon themselves or their families.

Creating impactful change requires collective effort—from policymakers who can institute protective laws, to media platforms highlighting survivor stories, to community initiatives that emphasize empathy and support.

Overcoming Barriers to Help-Seeking after Digital Assault

Importance of Awareness and Education

Awareness and education play a pivotal role in preventing and addressing tech-enabled sexual abuse, as they equip individuals and communities with the tools to recognize, respond to, and prevent abuse.

Understanding Risks: Comprehensive education programs help individuals understand the risks associated with digital interactions and identify signs of potential abuse. By fostering an awareness of how perpetrators exploit technology, people can preemptively take steps to protect themselves and others.

Promoting Digital Literacy: Digital literacy education offers critical insights into safe online behaviors, such as using strong passwords, managing privacy settings, and recognizing phishing attempts or malicious software. By enhancing digital literacy, individuals become more adept at safeguarding their personal information online.

Empowering Bystanders: Education also empowers bystanders to recognize and intervene appropriately when they witness tech-enabled abuse. Training programs that teach how to support victims and report abuse can significantly amplify community efforts to combat such incidents.

Cultivating Empathy and Challenging Norms: Awareness initiatives that foster empathy encourage more compassionate societal reactions and reduce stigmatization and victim-blaming. By challenging harmful societal norms and promoting positive digital interactions, education shapes cultures that respect digital rights and personal boundaries.

Creating a Culture of Safety: Ultimately, awareness and education are vital to creating a culture of safety and respect both online and offline. Campaigns that highlight the ethical use of technology and promote digital citizenship contribute significantly to this environment, fostering mutual respect and understanding among users.

Collective efforts from educational institutions, governments, and advocacy groups provide the foundation for such initiatives. By integrating digital safety into curriculums and public campaigns, we can cultivate informed communities that prioritize safety, empathy, and the well-being of all individuals.

Survivor Resources and Communities

Survivors of tech-enabled sexual abuse have access to a variety of resources and communities designed to provide support, guidance, and empowerment. These resources are crucial for recovery, offering both practical assistance and emotional support.

Online Support Groups: Virtual communities and support groups offer a safe space where survivors can share their experiences, exchange advice, and find solidarity with others who have faced similar challenges. These platforms often function 24/7, providing accessibility for individuals in different time zones or with varying schedules.

Resource Guides: Numerous organizations offer comprehensive resource guides that include information on legal rights, safety planning, and steps to take following an incident of tech-enabled abuse. These guides are designed to empower survivors with knowledge and tools for navigating their recovery journey.

Helplines and Counseling: Crisis helplines provide immediate emotional support and can also direct survivors to local services, such as counseling or legal assistance. Professional counseling services, often available through nonprofit organizations, help survivors process their experiences and build coping strategies in a confidential setting.

Legal Aid Organizations: Legal aid organizations focus on providing survivors with guidance on navigating the legal system. These organizations supply information on how to report abuse, secure restraining orders, and pursue legal action against perpetrators.

Workshops and Training Sessions: Many nonprofits and advocacy groups offer workshops and training sessions aimed at educating survivors about digital literacy and personal safety measures. These sessions empower individuals by enhancing their understanding of technology and equipping them with skills to mitigate future risks.

The availability of these resources forms a vital support network for survivors, addressing the multifaceted challenges they face and promoting healing and empowerment. Engaging with these communities can help survivors regain confidence, find validation, and connect with those who understand their struggles.

My Journey Back to a Connected Life

Discovering that my abuser used ordinary technology to spy on me crushed my sense of safety. As his surveillance intensified, simply using my phone or computer triggered overwhelming anxiety. His attacks left me with severe PTSD, and the digital aspect of my trauma proved among the most difficult to heal from, even with extensive therapy.

The irony was brutal: as a Digital Marketing expert who had built my career on technology, I now lived in fear of it. I had to severely restrict my client work to only those I deeply trusted, creating an invisible professional life to protect myself. I avoided social media entirely after discovering that even my closest friends unknowingly created pathways for my abuser to access my information. Picture the absurdity of trying to work as a digital marketer using only a flip phone in 2018—hiding my capabilities just to survive.

My journey back to digital freedom came in small, cautious steps. I changed passwords constantly, stayed off social platforms, and for a time, even used a fake name online. The constant fear of digital ambush followed me everywhere, showing how quickly technology can transform from a connection tool to a weapon. Finally, after my offender’s conviction in 2020, I made a decision: I deserved my life back. I purchased new devices, carefully rebuilt my online presence, and quietly reclaimed my career.

Through determination and support, I’ve regained control over my digital life, but I remain forever changed. My experience reveals the shadowy side of our connected world—a reality many survivors face silently. By sharing my story, I hope to expose these hidden dangers and emphasize how urgently we need better awareness, support systems, and protective measures against tech-enabled abuse.

Read another version of this article on C.KT’s Medium profile or LinkedIn.

FAQs

What is the tech-enabled sexual abuse or digital assault meaning?

Tech-enabled sexual abuse involves the use of technology to exploit, harass, or control someone without their consent. This can include unauthorized sharing of intimate images, digital stalking, harassment through messaging apps, and the creation of fake identities online to deceive or manipulate. It encompasses any digital act that invades privacy and causes harm to an individual.

How can individuals protect themselves online?

Individuals can protect themselves online by using strong, unique passwords and enabling two-factor authentication for all accounts. Regularly review and adjust privacy settings on social media, and limit the sharing of personal information. Cover webcams when not in use and be cautious of suspicious links or emails. Regularly update software and security settings to defend against vulnerabilities.

What support is available for survivors of this type of harassment and abuse?

Survivors can access various supports including online support groups, crisis helplines, and professional counseling services. Legal aid organizations provide guidance on legal rights and help with taking action against perpetrators. Resource guides from nonprofits offer information on safety planning and recovery steps, while workshops and training sessions empower survivors with digital literacy and self-protection skills. If you or someone you love is experiencing tech-enabled sexual abuse, reach out to the RAINN hotline at 800.656.HOPE.