To be doing feminist work everyday, to live like a feminist, you have to take women’s lives seriously. It doesn’t mean that you have to think that every woman is an angel or every woman is politically astute — that is not what feminists believe. They believe that you have got to take all kinds of women seriously or you’ll never understand women’s relationships to men, men’s relationships to each other, or men’s relationships to different forms of activism and to governments. Taking women seriously is hard to do because it means you have to listen to women whom most people don’t think of as experts or don’t think of as politically aware, including women who seem to be very domestically confined. That’s been the biggest revelation to me in becoming a feminist — to take all kinds of women seriously so I can understand the world better.
—Cynthia Enloe, defining feminism (bolding added)
Take women’s lives seriously: it is simultaneously that simple and that complicated to be a feminist.
This is true:
The right dress can make a career. The wrong one can make headlines. But a scandalous dress can do both.
But so is this:
Interviewer: Okay. Which designers do you prefer?
Hillary Clinton: What designers of clothes?
Hillary Clinton: Would you ever ask a man that question?
Interviewer: Probably not. Probably not.
Where do I settle?
I see a clear distinction between the fashion of powerful women and when fashion makes women powerful. These notions are by no means mutually exclusive, but they are absolutely not the same thing. But generally speaking, I find moments that fashion augments women’s power far more interesting than what powerful women happen to be wearing.
My favourite of the NYMag slideshow, btw? Josephine Baker.
“Since I personified the savage on stage, I tried to be as civilized as possible in daily life.” —Josephine Baker
By donning a skirt of rubber bananas at Paris’s Folies Bergère, the American-born black cabaret sensation Josephine Baker — whom reviewers at the time described as “savage” and “primitive” — exploited colonial fantasies of racial and sexual difference and claimed her body’s power as her own.
In my lifetime alone ICTs have absolutely transformed every aspect of how we live and work. This includes gender-based violence, particularly violence against women (VAW). Check this thought experiment:
To understand the role of ICTs in abuse, imagine an incident of technology related violence in the 1980s.
We can think through an incident where a man records and distributes intimate sexual photographs of a female without authorisation. The abuser would most likely take still photographs only given that video cameras were costly at the time.
There is also little chance that he would have been able to record such pictures without knowledge of the victim/survivor. If he did not know how to process film, pictures would have been processed by a photo shop or lab. Wide distribution would also not be easy without personal connections to, or bribing people in local or national newspapers, magazines or TV channels to reprint or screen the images. A less public option would have been to mail photos via the national postal service. However this would have been costly in time and money. This clearly points to the number of factors which affect how VAW can manifest in the digital age.
–Katerina Fialova & Flavia Fascendini, “Voices from digital spaces: Technology related violence against women,” p. 26
Digital technology has seamlessly embedded itself as part of contemporary violence against women. If your repertoire of types of VAW doesn’t include the behaviors on this list, you are out of date:
- Mobile text message/incoming calls monitoring: “In Uganda in December 2008, within two weeks, there were two reports of men who murdered their wives after accusing the women of receiving love SMSs.”
- Intimate photos and video blackmail: “In many cases around the world, husbands or partners use intimate video clips or photographs of their women partners to blackmail, dominate and control them. This often results in women being trapped in violent relationships.”
- Mobile phone tracking: “The mobile phone network can be used to locate phone users. In many countries, mobile service providers offer tracking services to clients. In addition smart phones have an automatic geo-tagging function enabled by GPS locator technology. This means that information sent by a mobile phone user can reveal her exact location.”
- Email account control: ” In Democratic Republic of Congo men commonly set up email accounts for women and keep their password details.”
- Persistent mobile calls from strangers: “An APC survey in Pakistan in 2009 revealed that one in ten women received harassing and threatening calls and messages from strangers on their mobile phones.”
- Manipulating photographic images: “This form of online harassment involves the distortion of real photographic images of women into pornographic ones which are posted online. They are usually accompanied by personal data such as a personal telephone number.”
- Unauthorised use of personal videos/images/photographs: “In [the] Philippines (sic), the circulation of illicit recordings of private and intimate activities, such as sex-videos, via mobile phones and the internet is strikingly high.”
- Use of the internet to recruit victims of fake online offers: ” In Colombia and Argentina a study found that a small percentage of missing girls had been contacted by unknown people via chat or Facebook before disappearing.
- Violation of passwords
- Listening to and recording mobile phone conversations
- Keeping track of web-browsing
- Fraudulent postings and advertisements: “In the USA, a woman was raped by a stranger who said he was answering her Craigslist advert. The survivor’s ex-partner had posted an advertisement in her name stating that she was looking for a man to fulfil her rape fantasy. In this case, the ex-boyfriend and the man who raped her were both charged with sexual assault.”
- Impersonating someone in instant messaging applications
But obviously the Internet and mobile phones don’t just bring more doom and gloom. ICTs, while altering and magnifying certain types of VAW, are also offer new ways of increasing access to protection for women, e.g.:
- “The Public Ministry of Peru for instance, uses the internet to publish the names and photographs of men who have been prosecuted and sentenced for VAW.”
- “In Costa Rica, Radio FIRE (Feminist Interactive Radio Endeavour), the first web-based radio, spreads awareness on women’s rights.”
- “In Brazil the Special Secretariat for Women’s Policies, which has ministerial rank, has created an online assistance network on their website to help victims/survivors of VAW.”
A burgeoning but immensely important area in gender-based violence, especially given that most countries have yet to establish a political/legal framing that intertwines ICTs and VAW. Well done to Fialova and Fascendi for starting the thinking.