Different types of aggressors are identified on the Internet. Although their profiles may vary according to the motives and forms in which the aggression is manifested, they have in common the discourses and behaviors used for online attacks. (Hiperderecho, 2019).

The particularity of technology lies in its borderless nature, its technical infrastructures and actors, as well as its physical absence and anonymity; these elements little known to traditional actors make it difficult to translate virtual violence as an extension of physical violence.

One of the common elements between digital violence and physical violence are the types of aggressors. Violence is mostly perpetrated by people close to the victim: partners or ex-partners, or belonging to the immediate circle such as family members, co-workers or friends, and to a lesser extent by strangers (anonymous).

On the other hand, physical violence can also include virtual violence. In cases of domestic violence, where women are subjected to physical harm and sexual violence, it can also include digital violence, such as insulting, threatening or violent text messages, phone calls or e-mails. (García & Sequera, 2021).

How do we identify aggressors?

Anonymous profiles:

Those profiles that are commonly considered "fake" but are actually profiles without identification. This implies that the assaulted person may have some kind of link with the attacker, but it is not possible to identify him/her because he/she operates anonymously.

Profiles of organized groups:

Profiles that operate jointly to carry out systematic online attacks. Their purposes for attacking may vary according to their motives (political, social or religious, and others).

Known profiles:

People known to the victims both in the family and sexual environment (partner or ex-partner), who use technology to monitor, threaten, control and discredit them. We also include in this category those people who are part of the victim's environment and who use technology to harass the victim for sexual purposes.

Strategic litigation

Find out more about the cases of digital gender violence that TEDIC has accompanied.

<
>