Authored By: Réseau des Femmes Leaders pour le Développement – Women Leaders Network for Develoment (RFLD) – Regional Ghana Office
Advocacy Lead: Mrs. Diana Ama Opoku
We at the Réseau des Femmes Leaders pour le Développement (RFLD) are deeply disturbed by reports circulating on social media regarding a foreign national allegedly recording intimate encounters with women in Accra without their knowledge or consent. This incident is not merely a tabloid scandal; it is a manifestation of a systemic crisis where digital tools are weaponized to enforce patriarchal control. It represents a violation of the most fundamental human right: dignity.
This report serves as an urgent intervention. It rewrites the narrative from one of victim-blaming to one of legal empowerment and technical defense. Drawing from the RFLD Digital Safety Compendium and our 2025 monitoring data across 55 African countries, we provide a definitive analysis of the Ghanaian legal framework—including the Cybersecurity Act, 2020 (Act 1038) and the 2025 Amendment Bill—and offer a tactical safety toolkit for women navigating the digital sphere.
The recording of someone in private, intimate situations without their explicit consent is a form of sexual violence. Sharing such recordings constitutes Image-Based Sexual Abuse (IBSA). These acts devastate lives, damage reputations, and cause lasting psychological trauma. Contrary to public misconception, the Ghanaian legal system provides robust mechanisms to prosecute these offenses.
1.1 Constitutional Protections
The foundation of digital rights in Ghana is Article 18(2) of the 1992 Constitution, which guarantees every person the right to privacy. It states that “no person shall be subjected to interference with the privacy of his home, property, correspondence or communication except in accordance with law”. This constitutional provision elevates the non-consensual recording of intimacy from a social infraction to a violation of the supreme law of the land.
1.2 The Cybersecurity Act, 2020 (Act 1038)
Act 1038 is the primary legislative weapon against digital offenses. It explicitly criminalizes the distribution of intimate images, stripping away the defense of “implied consent.”
Section 67 (Non-Consensual Sharing of Intimate Images): It is a criminal offence to intentionally distribute or cause another person to distribute an intimate image or visual recording of another identifiable person without their consent. This applies particularly where there was a “reasonable expectation of privacy”—meaning that even if an image was taken consensually within a relationship, distributing it without consent is a crime.
Penalty: Summary conviction to a term of imprisonment of 1 to 3 years.
Intent: The law requires an intent to cause “serious emotional distress,” which is defined to include humiliation, indignity, and shock.
Section 68 (Sextortion and Threats):
The Act criminalizes the threat to distribute such images. This is critical for cases of sextortion, where perpetrators use the fear of release to blackmail victims for money or further sexual acts.
Penalty: Imprisonment of 1 to 3 years.
Section 69 (Production Orders): To combat anonymity, this section allows law enforcement to obtain court orders compelling service providers to release subscriber information, enabling the identification of perpetrators hiding behind fake profiles.
1.3 The 2025 Legal Evolution: The Cybersecurity (Amendment) Bill
In response to the evolving nature of digital threats, the Cybersecurity (Amendment) Bill, 2025 has introduced stricter penalties and broader definitions, signaling the state’s hardened stance against TFGBV.
Section 67A (Cyberbullying & Deception): The amendment explicitly penalizes “tricking” a person into revealing embarrassing information and then sharing it. It also targets the distribution of “offensive photos” intended to humiliate, with enhanced penalties of 3 to 5 years imprisonment for communication deemed “grossly offensive” or “obscene”.
Section 67B (Cyberstalking): Recognizing that digital harassment often precedes physical violence, the new bill introduces a specific offense for cyberstalking—using the internet to harass, monitor, or cause fear. This carries a severe penalty of 1 to 10 years imprisonment, reflecting the high danger level of such behaviors.
Expanded Enforcement Powers (Section 20B): The amendment confers the powers of a police officer (arrest, search, and seizure) upon authorized officers of the Cyber Security Authority (CSA). This empowers the CSA to act swiftly in securing digital evidence before it can be deleted.
RFLD’s commitment to Pillar 5: Human Rights Protection drives our rigorous monitoring of human rights violations. Our Dònuèsè Data Center, tracking incidents across 55 African countries, reveals a harrowing reality that contextualizes the Accra incident.
2.1 Prevalence and Demographics
Our 2025 report indicates that 67% of women surveyed in the region have experienced at least one form of Technology-Facilitated Gender-Based Violence (TFGBV).
Target Demographic: The abuse is most concentrated among women aged 18–34, a critical demographic for Africa’s economic and political future.
Vectors of Abuse: The primary vectors are Non-Consensual Intimate Images (NCII), Sextortion, and Cyberstalking via tracking devices.
2.2 The Platform Gap
The majority of these violations occur on Facebook, WhatsApp, and X (formerly Twitter). Our analysis shows that platform moderation mechanisms often fail to detect abuse in local West African languages or cultural contexts, leaving victims exposed to prolonged harassment. This “platform impunity” necessitates that women take proactive control of their digital safety
To Young Women Everywhere: Your Safety Matters. Your Privacy is a Right, Not a Privilege.
In response to the rising threat level, RFLD has operationalized the Digital Safety Compendium. This toolkit moves beyond basic advice to provide advanced, technical strategies for Prevention, Detection, and Response.
3.1 Prevention: Hardening Your Digital Defenses
1. Trust Your Instincts & Establish Boundaries
If something feels off about a situation or person, remove yourself. Your intuition is valid. You have every right to ask that phones and devices be put away and out of reach during intimate moments. A respectful person will understand; a predator will object.
2. Credential Hygiene and 2FA
Two-Factor Authentication (2FA): Enable 2FA on all sensitive accounts (Email, WhatsApp, Banking).
RFLD Tip: Avoid SMS-based 2FA if possible, due to the risk of “SIM Swapping” fraud. Use app-based authenticators like Google Authenticator or Authy.
WhatsApp Security: Go to Settings > Account > Two-step verification and set a PIN. This prevents a perpetrator from stealing your account even if they manage to clone your SIM card.
3.2 Detection: Counter-Surveillance and “Phygital” Safety
The incident in Accra highlights the danger of hidden recording devices. The Compendium recommends the following technical checks for physical spaces (hotels, Airbnbs, private residences).
1. Detecting Hidden Cameras
The Flashlight Sweep: Turn off all lights in the room. Use your phone’s flashlight to slowly sweep the room, checking smoke detectors, clocks, vents, and shower heads. A camera lens involves glass, which will reflect a small blue or purple glint when hit by the light.
Network Scanning: Connect to the Wi-Fi network. Use a free network scanner app like Fing (available on iOS/Android). This app lists all devices connected to the Wi-Fi. Look for devices labeled “IP Camera,” “Cam,” or suspicious generic names. If you see a device you don’t recognize, it could be a camera streaming your activity.
Infrared (IR) Detection: Many spy cameras use Infrared LEDs for night vision. These are invisible to the naked eye but visible to smartphone cameras. Open your phone camera in a dark room and look for faint purple or white lights.
2. Detecting Tracking Devices (AirTags)
iOS Users: Your iPhone will alert you with the message “AirTag Found Moving With You” if an unknown tracker is detected. Tap the alert to play a sound and locate it.
Android Users: Use the “Tracker Detect” app (by Apple, on Play Store) or the built-in Android “Unknown tracker alerts” to scan for AirTags. If you find one, tap it with your phone (NFC) to reveal the serial number—this is evidence for a police report.
3. Mobile Stalkerware
If your battery drains rapidly, data usage spikes, or the phone heats up while idle, you may have spyware installed.
Check Accessibility Services: Go to Settings > Accessibility. Malicious apps often abuse these permissions to read your screen. If you see an unknown app here, it is a major red flag.
Audit Linked Devices: regularly check “Linked Devices” in WhatsApp and “Where you’re logged in” on Facebook/Instagram to ensure no one is remotely reading your messages.
3.3 Response: Documentation and Reporting
If you suspect you have been recorded without consent, or if images are shared:
1. Document Everything
Do Not Delete: Your instinct may be to delete the messages to remove the shame. Do not. You need them for evidence.
Comprehensive Capture: Take screenshots, but also copy the URLs of profiles and posts. Export chat logs.
The Abuse Log: Maintain a chronological diary of the harassment (dates, times, platforms). This establishes a “pattern of conduct” necessary for prosecuting Cyberstalking under Section 67B.
2. Verify Who You Are Meeting
When meeting someone new, share your live location with a trusted friend via WhatsApp or Google Maps.
Meet in public first.
Conduct background checks where possible—check their social media footprint for consistency.
3. Accessing Justice
If you have been affected by this situation or similar violations:
You are NOT alone.
This is NOT your fault.
Help and justice are available.
REPORT TO:
Cyber Security Authority (CSA):
The CSA is the technical lead for taking down malicious content.
Call/SMS: 292
WhatsApp: 050 160 3111
Email: report@csa.gov.gh
Mobile App: CSA GHANA (available on app stores).
Domestic Violence and Victim Support Unit (DOVVSU):
For criminal investigation and survivor support.
Helpline: 055 100 0900
Location: Police Headquarters, Accra (One-Stop Centre available).
Ghana Police Service:
Dial 191 for emergencies.
We are actively monitoring the situation involving the alleged recordings in Accra and will engage with national human rights institutions and regional bodies like the African Commission on Human and Peoples’ Rights (ACHPR) to ensure that violations are addressed and perpetrators are held accountable.
We stand with all survivors of image-based sexual abuse and call on law enforcement to investigate these allegations thoroughly and hold perpetrators accountable to the fullest extent of the law—specifically enforcing the mandatory prison terms outlined in Act 1038 and the 2025 Amendment.
OUR BODIES. OUR CONSENT. OUR DIGNITY. NON-NEGOTIABLE.
#DigitalSafety #ConsentMatters #WomensRights #RFLD #WomenAcrossAfrica #EndGBV #CybersecurityAct #KnowYourRights #HumanRightsProtection



















