The impact of image exploitation on a person can be very significant and can be influenced by their willingness to communicate and confide in others, their sense of helplessness, the perceived impacts to them and others, and the seriousness others take in assisting with their response.
The process of detecting if an image has been exploited can at times be quite difficult. Reverse Images search programs (e.g. tineye.com) can be used to search the web for duplications of an image. Other instances of image exploitation can be more direct, particularly if a perpetrator engages direct with an individual with a view to leveraging their situation for some form of ransom or other benefit.
Something to be mindful of:
Online data storage services are targeted by criminals and compromises are a common occurrence. Eg. Dropbox experienced a breach in 2016 resulting in thousands of user’s accounts and photographs made public to hackers.
Here’s a number of practical measures to consider in reducing the risk of image exploitation:
IDCARE have a number of Social Media Security Fact Sheets to help you detect, prevent and respond to problems you may have. Please see the below Fact sheets on;
Disclaimer © 2018 Copyright Identity Care Australia & New Zealand Ltd. While every effort has been made to ensure the accuracy of the information in this FACT SHEET, IDCARE disclaims any liability to any person in respect to any actions performed or not performed as a result of the contents of the alert or any accompanying data provided. Note our service is free to the community and our Counsellors will never ask you to provide your personal information and credentials if we make contact with you.
ACORN or the Police? Which one to report the compromise of personal information?view fact sheet
This is exploitation of the online environment to harass, intimidate or threaten someone.view fact sheet
A data breach is the unauthorised disclosure or loss of personally identifiable information.view fact sheet