Skip to main content

Forget Your Team: Your Online Violence Toward Girls and Women Is What Can Kiss My Ass

Forget Your Team: Your Online Violence Toward Girls and Women Is What Can Kiss My Ass


The "Pass the Mic" series showcases unique voices, perspectives and ideas. This op-ed was written by Ashley Judd, an actress and advocate for women's rights.
During a conference championship game on Sunday, I posted a comment to Twitter that some found unsportsmanlike. I didn't much care for three players bleeding on the court, and I tweeted that the opponent was "playing dirty & can kiss my team's free throw making a—." The volume of hatred that exploded at me in response was staggering.
I routinely cope with tweets that sexualize, objectify, insult, degrade and even physically threaten me. I have already — recently, in fact — looked into what is legally actionable in light of such abuse, and have supplied Twitter with scores of reports about the horrifying content on its platform. But this particular tsunami of gender-based violence and misogyny flooding my Twitter feed was overwhelming.
Tweets rolled in, calling me a cunt, a whore or a bitch, or telling me to suck a two-inch dick. Some even threatened rape, or "anal anal anal."
I deleted my original tweet after the game, before all hell broke loose, to make amends for any genuine offense I may have committed by describing play as "dirty." (Of course, other people, including my uncle who is a chaplain, also expressed fear that the athletes would be hurt badly. But my uncle wasn't told he was a smelly pussy. He wasn't spared because of his profession; being a male sports fan is his immunity from abuse.)
I love March Madness so much that even now, what I really want to talk about is how Sunday's strategy did not, in fact, work. I really want to talk about a deeply distressing dream I recently had that UConn beat us in the finals, in which we scored a scant 49 points, not to mention the oddity of why my awful dream featured UConn and not Wisconsin.
Instead, I must, as a woman who was once a girl, as someone who uses the Internet, as a citizen of the world, address personally, spiritually, publicly and even legally, the ripe dangers that invariably accompany being a woman and having an opinion about sports or, frankly, anything else.
What happened to me is the devastating social norm experienced by millions of girls and women on the Internet. Online harassers use the slightest excuse (or no excuse at all) to dismember our personhood. My tweet was simply the convenient delivery system for a rage toward women that lurks perpetually. I know this experience is universal, though I'll describe specifically what happened to me.
I read in vivid language the various ways, humiliating and violent, in which my genitals, vaginal and anal, should be violated, shamed, exploited and dominated. Either the writer was going to do these things to me, or they were what I deserved. My intellect was insulted: I was called stupid, an idiot. My age, appearance and body were attacked. Even my family was thrown into the mix: Someone wrote that my "grandmother is creepy."
As I began on Twitter to identify and push back against this toxicity and abuse, I faced the standard bashing anyone (girl or boy, woman or man) experiences when objecting to and taking action against misogyny. For example:
And last: "I watched Simon Birch. Lousy movie, but I got to see Ashley Judd die."
The themes are predictable: I brought it on myself. I deserved it. I'm whiny. I'm no fun. I can't take a joke. There are more serious issues in the world. The Internet space isn't real, and doesn't deserve validity and attention as a place where people are abused and suffer. Grow thicker skin, sweetheart. I'm famous. It's part of my job description.
The themes embedded in this particular incident reflect the universal ways we talk about girls and women. When they are violated, we ask, why was she wearing that? What was she doing in that neighborhood? What time was it? Had she been drinking?
Luckily, others have have helped identify and dismantle the twisted logic of this entire incident:
I'll close with sharing why I had, before this past Sunday, already begun to research what legal actions to take against gender-based violence on Twitter.
I am a survivor of sexual assault, rape and incest. I am greatly blessed that in 2006, other thriving survivors introduced me to recovery. I seized it. My own willingness, partnered with a simple kit of tools, has empowered me to take the essential odyssey from undefended and vulnerable victim to empowered survivor. Today, nine years into my recovery, I can go farther and say my "story" is not "my story." It is something a Higher Power (spirituality, for me, has been vital in this healing) uses to allow me the grace and privilege of helping others who are still hurting, and perhaps to offer a piece of education, awareness and action to our world.
The summer of 1984 was tough for me. I experienced two rapes by an adult and systematic molestation from another adult, who also had another man in the room watching (I now understand this was to ensure he had a witness, in order to undermine me in the event I tried to report the incident). I have done purgative, cathartic work on those particular acts of violence. The nature of recovering from trauma is that it can be ongoing, with deeper levels of healing and freedom coming with indefatigable persistence to keep chipping away at it.
This January, I read three different things that freshly triggered an additional, very specific memory from age 15 — an attempted oral rape by yet another adult man. First, the Vanderbilt rape case conviction was announced, in which certain details mirrored my own experiences, especially the non-intervening bystanders (who, thankfully, in the Vanderbilt case, were charged with violent crime). Second, I read the Justice for Victims of Sex Trafficking legislation that passed the House of Representatives. Third, I re-read the Department of Justice's legal definition of rape and some of the absurd debates about it. Although I regularly engage with these kinds of issues, after reading these three particular materials, it became very clear that I needed to address my attempted oral rape; the time had arrived for that terrifying moment to be treated as a stand-alone piece of violence from which I was being given the opportunity to heal on a deeper level.
This is one of the many reasons why I believe profound dedication to self-care is essential to feminist social justice work. I knew exactly where to go and what to do. My mentor was available. We immediately scheduled experiential therapy; I thus did not have to go to the sexual assault center for triage. But let me tell you: I am exactly like every other survivor, and the sexual assault centers of our country are for me, just as they are for all of us.
Supported by friends and a brilliant psychologist, my therapy was astonishing, as all such healing work is. I felt like I had the chance to finally speak, fight and grieve, and be consoled and comforted. But then, on literally the very next day, I received a disturbing tweet with a close-up photograph of my face behind text that read, "I can't wait to cum all over your face and in your mouth."
The timing was canny, and I knew it was a crime. It was time to call the police, and to say to the Twittersphere, no more.
I've spent valuable March Madness time writing this. I have six to 11 seed upsets to pick and opponents to scout. So for now, I am handing it back over to those of you who are unafraid to speak out against abuse like I have faced, and those of you who are righteous allies and intervening bystanders. You're on it. Keep at it — on the Internet, at home, at work and in your hearts, where the courage to tackle this may fundamentally lie. We have much to discuss, and much action to take. Join me.

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER
Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to uglyduckblog@gmail.com if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from  onhax.net idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC



Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…