TFGBV Taxonomy
Perpetrator:

Personal connection

Last Updated 6/12/25
Definition: An individual who personally knows (either shallowly or intimately) the person they are targeting
Abuse Types:
Intimate image abuse (IIA) Cyberstalking Account access control Internet of things (IoT) abuse Deceptive synthetic media Doxxing Online harassment Online impersonation Sexual extortion Voyeuristic recording
Targets:
Private individual Public figure
Perpetrator Intents:
Compliance Aggrandizement Punitive intent Sexual gratification

Synonyms

Known perpetrator, intimate partner perpetrator, acquaintance perpetrator

Description

Personal connection perpetrators are individuals who have or previously had a personal relationship with the victim. This category includes current or former intimate partners, parents, children, acquaintances, friends, online encounters, colleagues, or others who have some form of existing relationship with their target.

This category represents a significant portion of TFGBV cases - research shows that in Australia, one in three experiences of technology-facilitated abuse are perpetrated by a current or former intimate partner (Powell et al. 2022). The Cyber Civil Rights Initiative found that 57% of revenge porn victims reported their material was posted by an ex-boyfriend, 6% by an ex-girlfriend, 23% by an ex-friend, 7% by a friend, and 7% by a family member (Franks, 2016).

In one study, "30% of men who received intimate images believed that it granted them ownership" (Kaspersky, 2024).

Personal connection perpetrators often leverage their existing knowledge of the target's personal information, social networks, and vulnerabilities to maximize harm. They may also exploit shared access to devices, accounts, or living spaces that legitimate relationships provide. Personal connections employ "technology-facilitated coercive control" as an extension of domestic and family violence, using their intimate knowledge of the victim to cause targeted harm and access shared or private devices without consent (Douglas, 2019).

Subtypes

  • Current or former intimate partners: Intimate partner abuse often requires specialized response protocols and faster escalation due to higher risk of physical harm escalation (Powell et al., 2022)
  • Colleagues: Workplace harassment may need different reporting flows that consider professional relationships and power dynamics
  • Family members:
    • Parent/guardian cases involve complex legal considerations around legitimate monitoring versus abuse.
    • Family abuse may show different technological patterns, leveraging shared devices and accounts.

Skill level

Low to medium - Personal connection perpetrators range widely in technical ability. Many employ readily available commercial technologies that require minimal technical knowledge (e.g., monitoring apps), while others with higher technical skills may utilize more sophisticated methods. They rely more on intimate knowledge of their target and social engineering than advanced technical skills.

Mitigation strategies

  • Default to highest privacy settings - Limit information exposure to reduce ammunition for abuse
  • Real-time prompts for reconsideration - Intervene when users attempt to share intimate content

References

  • Australian eSafety Commissioner. (2023). Technology-facilitated abuse: family, domestic and sexual violence. https://www.esafety.gov.au/sites/default/files/2023-10/Technology-facilitated-abuse-family-domestic-sexual-violence-literature-scan.pdf
  • Franks, M. A. (2021). Drafting an effective “revenge porn” law: a guide for legislators. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2468823
  • Kaspersky. (2024). The Naked Truth - How intimate image sharing is reshaping our world. https://media.kasperskydaily.com/wp-content/uploads/sites/86/2024/07/15164921/The-Naked-Truth-Kaspersky.pdf
  • Powell, A., Flynn, A., & Hindes, S. (2022, December). Technology-facilitated abuse: National survey of Australian adults’ experiences. ANROWS - Australia’s National Research Organisation for Women’s Safety. https://www.anrows.org.au/publication/technology-facilitated-abuse-national-survey-of-australian-adults-experiences/
Is something missing, or could it be better?
About This SiteGet InvolvedContactCopyrightPrivacy
Loading...