Deepfakes.
Revenge porn.
Sextortion.
No matter what you call it, tech-enabled sexual abuse is harmful and unethical—and it should be a crime in every state.
What Is Tech-Enabled Sexual Abuse?
Tech-enabled sexual abuse is NOT pornography. Informed, capable adults may legally choose to participate in the creation and distribution of consensual pornographic media. But when explicit content is created or shared without the subject’s legal consent, it is abuse.
TERMS FOR TECH-ENABLED SEXUAL ABUSE
Perpetrators use a variety of manipulative and abusive methods to groom, coerce, and abuse individuals online. Because technology progresses so quickly, not all of these behaviors are illegal (yet)—but they are all harmful.
- Catfishing: Pretending to be someone else online to deceive someone into entering a relationship or sharing intimate content.
- Child sexual abuse material (CSAM): Any image, video, or content that depicts the sexual exploitation of minors. CSAM (pronounced “SEE-sam”) includes both real imagery and AI-generated or manipulated imagery. Children cannot consent to sexual acts, so creating or sharing CSAM is always illegal.
- Cyberbullying and cyberstalking: Threatening, harassing, or tracking someone online without their permission.
- Deepfakes:* AI-generated and AI-manipulated photos, videos, or audio that depict someone in explicit or compromising situations without their consent.
- Hacking: Stealing private images or information by breaking into personal accounts or devices.
- Image-based sexual assault (IBSA): Sexually explicit visual content that’s created or shared without the subject’s consent.
- Non-consensual intimate imagery (NCII): Sexually explicit visual content that’s created or shared without the subject’s consent.
- Revenge porn: Sharing real intimate photos or videos without the subject’s consent, often as retaliation or blackmail. Despite the term, "revenge porn" is NOT pornography. It is abuse.
- Sextortion: Using threats to distribute intimate content to coerce victims into sharing more photos or videos, money, or personal favors.
His surveillance of me started the day we met. He copied down my license plate and started watching me through my devices that same day. He hacked into my Wi-Fi and would spy on me through my computer. It was shocking to learn how much surveillance he had done.
– C. Kimberly Toms, survivor
*WHERE DID THE TERM "DEEPFAKES" COME FROM?
In 2017, a Reddit user called @deepfake shared an advanced face-swapping technology in a /deepfakes subreddit, enabling online predators to create thousands of non-consensual explicit videos targeting women. For this reason, most experts prefer not to use this term when describing AI-generated or AI-manipulated image-based abuse.
The Impacts of Tech-Enabled Sexual Abuse
Every time someone distributes or duplicates nonconsensual material, they perpetuate the abuse.
- Tech-enabled sexual abuse causes lasting emotional and social harm. Survivors are often stigmatized, blamed, and retraumatized every time the content is shared or viewed.
- Tech-enabled sexual abuse robs individuals of control over their image, voice, and personal boundaries. It is a violation of your rights, dignity, and safety.
- CSAM (tech-enabled sexual abuse against children) causes severe, long-term harm to children who are exploited and retraumatized every time the material is shared or viewed.
- CSAM anonymizes and normalizes pedophilia, child abuse, and trafficking.
Because I’ve experienced tech-enabled sexual abuse, being on camera for my work is a terrifying experience. When you’re in a virtual meeting, you’re opening up your Wi-Fi, opening up your camera, and letting all the guards down.
– C. Kimberly Toms, survivor
The Role of Consent
Consent is the foundation of all healthy interactions, including online interactions. Without consent, sharing intimate content (real or manipulated) is sexual abuse.
You cannot give consent if you are:
- Underage
- Intoxicated or incapacitated
- Asleep or unconscious
- Under intimidation, threat, or unequal power dynamics
Remember: Consent can be withdrawn at any time. Even if you shared something willingly, that doesn’t mean someone else has the right to share, manipulate, or use it against you.
I recently watched the reunion episode of a reality dating show where a woman was crying as she shared that her match had filmed them in bed together without her knowledge. I was stunned, thinking, ‘That's a sexual assault, and they're just talking about it on TV like it’s no big deal.'
– C. Kimberly Toms, survivor
Keeping Kids Safer from Tech-Enabled Sexual Abuse
Online platforms, encrypted messaging apps, and anonymous forums contribute to the widespread availability of CSAM—and even advanced detection efforts are struggling to keep up.
There is no way to guarantee your child’s safety, but there are steps parents, guardians, and caregivers can take to help kids stay safer online.
- Have open conversations. Talk to your children about online risks in age-appropriate ways. Encourage them to come to you if they feel unsafe or pressured online.
- Monitor online activity. Use parental controls, review privacy settings, and keep devices in shared spaces.
[My daughter] won’t have access to the internet or social media for a long time. That won’t eliminate risk entirely—AI and digital exploitation are widespread—but it’s a non-negotiable safety step for me as a parent.
– Samantha, survivor
- Educate kids about consent. Teach children about the importance of boundaries and that they should never feel pressured to share photos or personal information.
- Promote healthy skepticism. Warn children about interacting with strangers online and caution them about anyone asking for photos or videos, even people they know.
- Stay informed. Keep up with the latest online trends, apps, and tools predators may use. Knowledge empowers you to take proactive steps.
Keeping Yourself Safer from Tech-Enabled Sexual Abuse
Nothing you do can guarantee your online safety, but there are steps you can take to reduce your risk of being targeted.
1. Secure Your Devices & Accounts
- Use strong, unique passwords and two-factor authentication
- Set a passcode for all devices
- Log out of accounts when you’re finished
- Avoid saving passwords in browsers
2. Be Cautious with Your Content
- Limit what personal information or photos you post online
- Avoid sharing explicit, intimate, or private content—even with people you know
3. Improve Your Social Media Privacy
- Adjust the platform’s privacy settings to control who can see your content
- Turn off geolocation tagging and check-in features
- Google yourself periodically to see what personal information is publicly available
- Regularly review your social media privacy settings
4. Protect Your Webcam & Device Camera
- Cover your webcam or phone camera when not in use
- Avoid public Wi-Fi for personal activities
- Be cautious about opening unknown messages, links, or downloads
5. Block & Report Abusive Content
- Use the reporting and blocking features on social platforms
- Take screenshots of abusive content as evidence before reporting it
People have to earn trust. Don't go home with somebody you've only dated two or three times. They could have cameras hidden in the bookshelf; they could have home security cameras running. People can record intimate moments without you ever knowing, so you must keep your guard up.
– C. Kimberly Toms, survivor
What To Do After Tech-Enabled Sexual Abuse
If you or someone you know is targeted online, you deserve support. These steps can help you regain your sense of control and security:
- Save the evidence. Abusive online content is inherently upsetting. Your gut reaction may be to try to delete or hide the content. Instead, do your best to preserve evidence of the abuse by saving, printing, or taking screenshots of the abusive material. Try to capture dates, time stamps, and as much identifying information about the perpetrator as possible.
- Immediately report CSAM. If you suspect a minor is being abused—that's anyone under 18 years old—report it immediately to the CyberTipline at the National Center for Missing & Exploited Children (NCMEC). Reporting helps to identify, rescue, and protect victims of CSAM; reporting also enables law enforcement to identify perpetrators and bring them to justice.
- Notify the website, app, or software owner. If the abuse occurred on a public website or social media channel, you can report the content to the site's administrator or host. Look for a “report” button near the chat window.
- Talk with an attorney. A lawyer can help you understand whether a crime has occurred and if a criminal or civil case is possible. Ask if you can use the evidence you collected to gain an order of protection that covers social media and other digital platforms.
Contacting Law Enforcement
Less than 3% of perpetrators are ever convicted and imprisoned for sex-based crimes, but that does not mean you shouldn’t report to the police. Reporting can help law enforcement track a crime’s prevalence and alert them to an offender’s presence in their jurisdiction.
“If you decide to report the sexual violence you experienced, you have to prepare yourself,” said C. Kimberly Toms, who experienced rape, stalking, and tech-enabled sexual abuse. “You have to go into it knowing it's war.”
Samantha also survived sexual assault and tech-enabled sexual abuse. Now a practicing attorney, she shared, “In my experience, even well-intentioned law enforcement officers often lack the training and expertise to handle these cases properly.”
IMPROVING PREVENTION & RESPONSE EFFORTS
Together, we can improve the response to tech-enabled sexual abuse. Speak out and urge action in these critical areas:
- Support. Tech-enabled abuse causes real harm, and survivors deserve comprehensive support.
- Research. The more we know, the better we can help.
- Legislation. We need laws that allow us to prosecute perpetrators of tech-enabled sexual abuse.
- Prevention. When we know what to look for, we can keep ourselves and others safer from online predators.
“I would like to see a trained law enforcement hotline specializing in TESA," said Samantha. "It's one thing to call a hotline and receive emotional support; it's completely different for a survivor to obtain guidance on how to get abusive content removed.”
Reporting as a Student
If the person making you uncomfortable is another student, teacher, or administrator at your K-12 school, college, or university, consider reporting the behavior to the Title IX officer or a trusted authority figure.
I was just finishing my junior year of college when I was assaulted in 2015. I did finish school—but only by the grace of Title IX and my university’s protection. They really went above and beyond, and it’s the only reason I was able to finish college.
– Samantha, survivor
HOW TITLE IX HELPED SAMANTHA
The Title IX office at Samantha’s university played a critical role in helping her move forward after she experienced sexual violence. The school provided numerous resources, including:
- A victim advocate
- No-cost counseling
- Deadline extensions and additional absences to accommodate case-related appointments
- On-campus housing assistance when the crime resulted in job loss
- An on-campus food pantry to eliminate the risk of encountering the perpetrator off-campus
SAMANTHA RECOMMENDS...
I raised concerns about the non-consensual images and videos being shared by my perpetrator, but the university was more focused on the physical assault itself—because that’s what was clearly outlined in their policies. It would have been incredibly helpful if my advocate had been aware of additional resources for survivors of tech-enabled sexual abuse. Schools should have clear policies and dedicated support systems, including hotlines and staff trained to assist with image removal.
– Samantha, survivor
Reporting Workplace Sexual Harassment
Tech-enabled sexual abuse among co-workers may be considered a form of sexual harassment, which is illegal. Contact your Human Resources Department to report the activity or file a complaint with the FBI.
RAINN’s Recommendations for Lawmakers
RAINN's issue-focused memos provide a comprehensive look at today's most pressing sexual violence issues. Leverage our expert insights to create and advance meaningful legislation that supports survivors of sexual violence and delivers justice to perpetrators.
GET THE MEMO
Everyone Deserves Safety & Control
Tech-enabled sexual abuse is a violation of your rights, dignity, and safety. By taking proactive steps to stay safer online, spreading awareness, and advocating for stronger laws, we can work toward a future where everyone—no matter their age—has control over their digital presence.
It's not your fault. This is nothing you did wrong. You trusted somebody. You're a good human. But bad people take advantage of good people every day.
– C. Kimberly Toms, survivor
Together, we can combat tech-enabled sexual abuse and create a safer Internet for everyone.
SOURCES
- U.S. Department of Homeland Security, Verizon, Transportation Security Administration, JP Morgan Chase & Co., United States Secret Service, Experian, Federal Bureau of Investigation, National Cyber-Forensics & Training Alliance, Melian LLC, & Deloitte & Touche. (2021). Increasing Threat of DeepFake Identities.
- Science & Tech Spotlight: Combating Deepfakes | U.S. GAO. (2024, March 11). Government Accountability Office.
- Deepfake Technology. (n.d.). Organization for Social Media Safety.
- Sensity (formerly Deeptrace), Patrini, G., Cavalli, F., Cullen, L., & Ajder, H. (2019, September). The State of Deepfakes: Landscape, Threats, and Impact.