READERS

26 Dec 2012

Therapy and BDSM Lifestyles


Therapy and BDSM Lifestyles

Andrew Robertson
University of Phoenix
Dr. Lori Travis
April 3, 2008

Abstract

There is a long, dark history of the psychiatric community's bias against the BDSM community and their practices. Starting with the DSM-II, Sexual Sadism and Sexual Masochism were classified as paraphilias, most likely due to the historical writings of authors such as Freud and Krafft-Ebing. Oddly enough, for a practice that is so based in research and the scientific method, there is no research to date that proves these activities are harmful to the participant's mental state, or that they are indicative of pathology. Therapist's bias can be very harmful to the mental health of their patients; at best a therapist's negative bias can make clients distrust the therapist and the psychiatric community. In some cases, it can damage their self esteem, and can cause other issues as well. There has been a surge of positive and supportive research in the last several years that has demystified and even supported BDSM as a non-pathological sexuality by psychologists, psychiatrists and medical doctors who identify as kink-friendly or kink-aware.

This article aims to add to that positive information to assist in education to prevent continuing this harmful trend of negative therapist bias towards people who engage in BDSM activities.

Therapy and BDSM Lifestyles

Imagine, if you will, that your therapist might look at you badly because of the way you choose to have sex; especially the foreplay that leads up to it. Suppose they said you would need to stop participating in that kind of sexual activity as a condition of further therapy. Suppose that no matter what the reason was that you decided to go to therapy, your therapist decides to focus on your sexual activities and treat that aspect of your life simply because they believe that the types of sexual activities you participate in is wrong. How would this make you feel?

It is surprising and disturbing just how much a therapist's bias can interfere with their ability to provide effective service to their clients; in some cases this bias can hurt the client. In just the last few decades, homosexuality has been removed as a paraphilia and more often therapists are providing objective and effective therapy for this group, thanks to the efforts of the Division 44 Committee on Lesbian, Gay, and Bisexual Concerns Joint Task Force, who established the Guidelines for Psychotherapy with Lesbian, Gay, and Bisexual Clients (APA, 2000). Sadly, there is another group of people who practice sexual activities that are also not considered normal by societies standards, and therapists tend to have the same bias towards this group that they used to have for the gay and lesbian communities not too long ago: practitioners of  Bondage/Discipline/Dominance/Submission/Sadism/Masochism, also known as BDSM.

Through the course of this paper, we shall strive to educate on what BDSM is and the practices of its participants, the general views on the psychiatric community, the damage that can be done by a therapist's bias and what can be done to help prevent this from being an ongoing problem.

Kinky sexual activity falls under many varied terms and acronyms, including, but not limited to, Sadism and Masochism (SM), Bondage and Discipline (BD), Dominance and Submission (D/s) and Master or Mistress and Slave (M/s). There are many other terms used to describe the kinky acts that people in this community engage in, however, for the purpose of this paper, we will use the term BDSM as an umbrella term.

In his landmark book SM101, Jay Wiseman defined BDSM as the “knowing use of psychological dominance and submission, and/or physical bondage, and/or pain, and/or related practices in a safe, legal, consensual manner in order for the participants to experience erotic arousal and/or personal growth” ( p. 10, 1996). This is an intentionally broad description of what BDSM is to those who participate in kinky sexual or sexually oriented activities. The reason for engaging in these activities varies from person to person, but can include spiritual growth, enhanced sexual arousal and even to bring one closer to one's chosen partner or partners. It is generally agreed upon that most people who engage in BDSM activities do not do so for the pain specifically; rather, they choose to use pain to increase their awareness, their spiritual growth or their sexual arousal, or even just to feel the sensation. These are the same reasons that people considered normal by the standards of society engage in what is generally considered to be normal sexual behaviour, or, as BDSM participants call it, vanilla sex.

Some individuals prefer to engage in what they call scenes, where the BDSM activities are limited to the duration of the scene only. These scenes can be very physically and emotionally gratifying to a large number of people, and normally one individual takes on a dominant role and one or more individual take on a submissive role. These scenes are considered Erotic Power Exchange, or EPE, where one individual has more power over the other for the duration of the exchange. There are, however, a number of individuals interested in long-term scenarios called 24/7, meaning 24 hours a day, seven days a week, where they choose to live their entire life in such a relationship dynamic. These individuals so closely identify with the dynamic of power imbalance that they feel more gratification from a relationship structured entirely around this dynamic. This 24/7 relationship is called Total Power Exchange, or TPE, and one person has more power over the other ongoing, and is not limited to any particular time frame (Dancer, 2006).

Therapist's bias has often caused therapists to treat patients improperly and for problems that the patient truly does not have. Nichols writes, “Unfortunately, the prevailing psychiatric view of BDSM remains a negative one: These sexual practices are usually considered paraphilia, i.e., de facto  evidence “of pathology”(Nichols, p. 281, 2006). Further, Nichols writes that:

“Certain “paraphilic” preferences are statistically abnormal but pathologically “neutral”; i.e., no more inherently healthy or unhealthy than mainstream sexual practices. Psychiatry has a rather shameful history of collusion with institutions of political power to marginalize certain subgroups of the population, particularly women and sexual minorities. Most psychological theories are unconsciously biased towards the preservation of prevalent social mores. Therefore, it is particularly critical, when evaluating behaviour that has controversial social meaning, to base judgments of pathology strictly on factual evidence. At this time, the data do [SIC] not exist to support the idea that BDSM activities are, by themselves, evidence of psychopathology, nor that their practitioners are more likely to be psychologically disturbed than the rest of the population” (Nichols, p. 282, 2006)
Sexual Sadism and Sexual Masochism were first listed in the American Psychological Association's Diagnostic and Statistical Manual Revision Two, or DSM-II, as sexually deviant behaviours and were classified as paraphilias in 1968. This listing may have been due to historical psychological literature of authors Freud and Krafft-Ebing. In the DSM-II, these paraphilias were given provisional categories of Sadistic Personality Disorder and Masochistic or Self-Defeating Personality Disorder. Although the definitions of these have changed throughout the revisions of the DSM, which is currently in Revision Four, this historical negative outlook has seriously biased much of the psychiatric community of past and present (Kolmes, Stock, & Moser, 2006). In the DSM-IV, these have been declassified as paraphilias unless the practice thereof interferes with one's ability to function in normal society. Unfortunately, the damage has been done, and BDSM practitioners have been persecuted in much the same ways that homosexuals used to be, and to some extent still are. Until the majority of the psychiatric community accepts BDSM as a non-paraphilia, this will continue.

As with most issues in our society, there is no easy solution to changing prevailing negative views in the psychiatric community about people who engage in BDSM activities. Education is going to be an important factor in changing these views, and is essential in creating a large network safe psychological environments where BDSM practitioners will not feel embarrassed to discuss their sexuality or lifestyle with their therapist. There has been a surge of positive and supportive research in the last several years that has demystified and even supported BDSM as a non-pathological sexuality by psychologists, psychiatrists and medical doctors who identify as kink-friendly or kink-aware.

Consequently, there is a long road ahead of BDSM practitioners before they will be accepted as a sexual minority rather than as sexual deviants with psychological issues. A therapist's bias against BDSM can damage their client's outlook on their self esteem as well as their willingness to acquire further psychiatric care from that or any other therapist. BDSM is used by participants for mutual gratification and often for spiritual growth using emotionally and sexually charged themes and activities to do so, and there is no research to prove that these activities are harmful to the participant's mental state. Alas, it all boils down to knowledge and tolerance; therapists need to educate themselves on what occurs in a BDSM setting and relationship and practice tolerance of other peoples sexual tendencies regardless of their own personal beliefs. Fortunately, the number of kink-aware and kink-friendly psychologists and psychiatrists is growing, and they are slowly expanding on education to the psychiatric community at large.

References

American Psychological Association (2000). Guidelines for psychotherapy with lesbian, gay, and bisexual clients. American Psychologist. 55(12) 1440-1451. Retrieved April 7, 2008, from http://search.ebscohost.com/login.aspx?direct=true&db=pdh&AN=amp-55-12- 1440&site=ehost-live

Dancer, P., Kleinplatz, P., & Moser, C. (2006). 24/7 SM Slavery. Journal of Homosexuality, 50(2/3), 81-101. Retrieved April 2, 2008, from http://search.ebscohost.com/login.aspx? direct=true&db=aph&AN=21269114&site=ehost-live Kolmes, K., Stock, W., & Moser, C. (2006). 

Investigating Bias in Psychotherapy with BDSM Clients. Journal of Homosexuality, 50(2/3), 301-324. Retrieved April 2, 2008, from http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=21269624&site= ehost-live

Nichols, M. (2006). Psychotherapeutic Issues with Kinky Clients: Clinical Problems, Yours and
Theirs. Journal of Homosexuality, 50(2/3), 281-300. Retrieved April 2, 2008, from http:// search.ebscohost.com/login.aspx?direct=true&db=aph&AN=21269620&site=ehost-live

Wiseman, J. (1996). SM 101. San Francisco: Greenery Press.




25 Dec 2012

10 Questions & Answers about BDSM

This summary is not available. Please click here to view the post.

Detecting the Fakes in an Online World of Femdom



Every day I am confronted by friends, acquaintances and those recommended to seek Me out with questions regarding a person (or people) that they feel may be perpetrating a scam against them. I don't mean the common E-Mail scams (such as “Viagra Cheep” or “Lose 40 pounds by Summer”) but the much more insidious scam involving the creation of one or more fake personalities. The scammer then uses the pseudo-persona's to deceive, hurt or abuse their victim or victims.

Because the internet offers so many easy ways to hide, to become someone fake, or to even impersonate a whole group of people, it is often very difficult for those that are not “Net Savvy” to detect and defend themselves against such scams. The purpose of this page will be to help those needing general info .. or just wanting a little more knowledge .. to recognize the common scams before they can become dangerous or injurious.

Common Techniques

Before we can get into how to recognize a scam, we should review the most common tricks that scammers use. We will explain what makes a person “Real” and how scammers use the various Internet programs to appear real.

Email Accounts

The popular “Portal Sites” (such as Yahoo, MSN, Google, etc.) all offer free or low-cost E-Mail accounts these days. In recent years they have all taken steps to prevent automated systems (such as those used by Spammers) from signing up for these accounts. However they do allow a single person to create multiple accounts with no trouble. This is a common “exploit” (or trick) used by the fakes. They will create one or more fake E-Mail accounts and then flesh them out with personal details to make it appear that each account belongs to a separate person. Fortunately for us, the big-name E-Mail services store information in every message sent that can help us narrow down the real sender and detect when one person is sending out E-Mail under multiple different names. A little further down, I will show how to find and use that information.

Chat Names

We all use various Internet Chat programs (or “Instant Messengers”) these days. Fakes will routinely use the various bogus E-Mail accounts they've created to create companion Chat Names (or “handles”). While it is possible to have multiple handles on any one computer, it is generally not possible to log in to more than one at a time. This is important to remember since it requires a faker to log out of one handle before logging in to another.

However, since the faker can run many different chat programs at once (and most of us do have more than one program installed), they will sometimes have different handles for each type of chat program. This is also important to note. Because most of us do have handles for many different chat programs, someone that only has one program installed and refuses to (or claims to not be able to) install another chat program may be suspicious.

Chat Profiles and Pictures

Most (if not all) of the common programs allow the user to fill out information about themselves. This information is called the “Profile”. Most fakes will take extra care to put real sounding info in the Profile as a way to lend credibility to their fictitious persona. But the problem is they can't use a “real photo”, so they will borrow one from the Internet or leave it blank. Be extra cautious of anyone who uses a “commercial grade” photo in their profile. While it does not necessarily mean they are a fake, if the photo isn't a real person (usually taken with a webcam or digital cam) then your level of caution should be a bit higher.

Also make note of their geographic location in the profile. If not listed there (and it often isn't for basic 'net security reasons) then be sure to find that out during your conversations with them. Fakes that create more than one persona will often scatter them around the world or the country … and that bit of fabrication will help you “out” them a little later on.

Pictures Sent Via E-Mail or IM

Fakers will often need to (or want to) send pictures of “themselves” in order to prove their existence and reality. However, as with Profiles, they must find a source for the pictures they send out. Fortunately for us, most commercial sources (and many picture sites) will “watermark” or put digital information into their pictures that indicate the true source. Fakers can't easily remove this information and thus it will be visible to you after you receive the picture. All you need to know is how to look at it and what it means.

If the Faker sends a picture file as an attachment to an E-Mail, you should also keep the E-Mail for use in determining the real origin. The information stored in the “Headers” can be compared with those in E-Mails from other people to determine if they are indeed from separate computers and regions, or in fact from the same one.

Internet “Connections” During a Chat

Most chat programs will create a “connection” between the two computers engaged in a chat. While the connection may be only temporary and exist just when the chat starts, certain types of chat activities (such as sending files or viewing a webcam) can establish a connection that lasts much longer. On computers running Window 2000 and Windows XP, there are programs you can use to list all the connections, both the “IP Address” (similar to a street address) and the “Port” (similar to an apartment number). While the program and function you are using controls the Port, the IP Address can help you determine the other person's general location, or at least let you determine if it is the same as another persona in the Faker's “community”.

The Nitty-Gritty Techno Babble Stuff

Now that we have a general idea of what sort of things can expose a faker, it's time to get into the dirty details of how to get the information we need. Primarily the data comes from a few different sources and types:

1.IP Address - The unique address (or location) on the Internet assigned to every computer.
2.E-Mail Headers - The digital fingerprint of every computer that an E-Mail passed thru on its way to you, and the fingerprint of the true sender.
3.Digital Signatures or Watermarks - The digital numbers stored inside a picture or document file that indicates its true source.
The following will discuss some simple ways to find the information you need, how to interpret it (or websites that can interpret it for you) and other details you might like to know about what it all means.

IP Address - Where Are You Really?

Every computer that talks on the Internet has a unique address called its “IP Address”. Different Internet Service Providers (or ISPs) have blocks of addresses that they use for their customers. Often times the IP Address can even identify a general location too. A Faker that has more than one bogus persona may remember to log into the right account, but they seldom if ever can change their IP Address too. Thus the IP Address can be compared between two “people” to see if they are in fact the same person (or at least using the same computer). Some programs (such as IRC chat sites and programs) convert the IP Address into a unique “Ident”; thus while you may not know the exact IP Address, you can at least be sure that two people with the same Ident are in fact using the same computer.

Techno-Geek Note: Some ISPs (such as AOL dial-up) use “connection farms” that totally obscure the origination IP Address. However, since Fakers often do not disconnect and reconnect when switching persona, you can usually find the same IP Address from two of their persona. Techno-Geek Note 2: The more savvy will notice that there are cases where the same IP Address will be shown for two different computers. The most common reason for this is home-based networks where a “Router” is used. However, if the same IP Address shows up for two people who claim to be miles or continents apart, it's a safe bet they are fakes and liars.

Turning an IP Address Into a Location

Finding the real location of an IP Address is not such a simple thing. While there are special databases that convert an IP Address to an Internet Name and vice versa (the so-called “DNS” process), there isn't an “official” database to find the location of a specific IP Address. However there are a few companies that have created their own databases … and they even provide access to them over the Internet. Some of them even provide free access to their database (but on a limited basis though). One of the databases that I use periodically is from a company called www.IP2Location.com . When you open the website you will see a list of the services and products they offer along the left-hand edge.

Near the bottom of that list is a section called “Free Resources”. Their main page also includes a “Live Product Demo” section on the upper right-hand side as shown to the left.

Note that “your” IP Address is automatically filled in for you when you open their website. You can highlight the entry and replace it with any IP Address you desire, then press the “Find Location” button to view the location information they have on file. When I clicked the button, the results I received are shown here:

IP Address Country Region City Latitude/Longitude ZIP Code Time Zone *deleted for site safety* AUSTRALIA Victoria Melbourne 35.283-149.217 - *edited*

Net SpeedISP Domain

CCADIALPOOLS2-CCCONNECT.NET.AU
it shows that I live in Australia, that my Internet Service Provider (ISP) is CCADIALPOOLS2-CCCONNECT.NET.AU and that my Time Zone is +10 hours GMT (“Greenwich Mean Time”; the universal home base of Internet Time services).I have deleted some of my details for site safety. Right here is all the information you need to determine approximately where I live. If I had been telling you that I actually lived in Minnesota USA (for example), this one test would prove to you that I'm lying thru my teeth. Clearly I am not in Minnesota, USA, I live in Victoria, Australia. (Or at least I am connected to the Internet from Australia. But since most fakes are cheapskates and freeloaders too, it's a safe bet they are not making tons of long distance calls to other states or countries just to disguise their real location.)

Techno-Geek Note: As can be seen from the example above, the actual physical address of an IP Address does not absolutely pin down a house address. You cannot use an IP Address to find someone's house, workplace or other highly accurate location. The best you can do is narrow it down to a region of the country or world. So if you're concerned that your IP Address will lead stalkers to your house, don't be. Bad guys can no more find your home address from your IP Address than you can.

Let's do another example test. Suppose we find the IP Address of 207.46.248.67 for someone that we often chat with. (The IP Address is actually that of a Microsoft E-Mail server, but this is just an example.) After you do your first “Find Location”, the page where the results are shown will include an entry box and some brief instructions on how to perform another test (as shown below).

The results I received for our test IP Address are shown here:

IP Address Country Region City Latitude/ Longitude ZIP CodeTime Zone 207.46.248.67 UNITED STATES WASHINGTON REDMOND 47.6738 -122.089 98052 edited due to publish time

So now we have a handy (and free) tool to help us locate the real location of someone, once we have their IP Address.

Finding a Location from E-Mail Headers

One of the best resources provided by IP2Location is a tool that uses their database and some nifty programming to analyze the headers of an E-Mail message. this service is free and easy to access; simply click the “IP2Location™ Email Header Tracer (Free)” button. At the top of the page you will see some brief instructions on what to do as well as links to specific instructions on how to find the E-Mail Headers for some of the more common E-Mail services

I use Microsoft normally, but I also use Yahoo and gmaill as well. Just remember that the techniques you will use to find the E-Mail Headers depend on YOUR E-Mail service and not those of the person that sent you the message.

There are a lot of cryptic computer details included in the headers, but you needn't worry; the IP2Location tool will figure out which of the header lines it needs and ignore all the rest.

Very Important Note: The last entry is of no significance to you; it shows the E-Mail server that you use and will almost always be the same. It does not show any useful information about the sender. Only the first entry shown above contains that information.

In the case of the email, I just last checked there is only one E-Mail Server “fingerprint” in the message headers. This is because Spammers often send their crap directly to your E-Mail server in hopes that their real location won't be visible. Of course, they are stupid because such tricks not only uncover their true IP Address, but also identifies the E-Mail message as “bulk”; a trait easily identifiable by Spam scanner and protection programs.

Picture and Image Files

One of the common problems that fakes encounter is the need to put a face on the “people” they create. Since they obviously cannot use their own pictures, they will often “mine” the Internet looking for pictures that they can use. Sometimes you can spot the fakes just by the pictures they provide; for example if the people or places don't match from picture to picture. However sometimes you have to dig a bit deeper.

Techno-Geek Note: You should NEVER accept files of ANY kind from someone you don't know unless you are very well protected by good antivirus software and you know how to use it properly. IMPORTANT WARNING: Always, always, ALWAYS check the full name of the file you've received. A lot of evil wicked people will send you a file claiming it is a picture when in fact it is a program that can harm your computer (or worse yet, allow them to spy on your computer). Before opening ANY file you received, scan it with a good antivirus program first and then double-check the file name by right-clicking on the file and choosing “Properties”. If you see a lot of spaces in the name, usually followed by ”.EXE” or ”.COM”, then delete the file and immediately cease communication with the sender.

Techno-Tools for digging deeper

Many times you will have to look “inside” a file to find out its true source. Two of the better of these free file viewers is called “V” and is available from www.FileViewer.com the other is www.Irfanview.com If you don't have one of these programs and feel they might be too difficult for you to operate, then by all means find someone you can trust that is able to help you dig some.

EXIF Data - The Extended Information Details

Most digital cameras and many of the picture editing programs available today will add additional details to any image file they create. This information, called the Extended Information (or EXIF data) is stored in the data bytes of the image file itself. Using a file viewer (such as “V”) you can easily find this data and possibly learn a bit more about how the picture originated and when it was taken.

You can see the name of the manufacturer and the model number of the camera itself When you receive a number of pictures from a faker and they claim they are all taken using their own camera, compare the EXIF data from each image file to make sure they really do all come from the same camera. If they don't match, or if some have the EXIF block and some don't, be prepared to ask more detailed questions and listen closely to the answers.

We've all heard this one “I just took this for you with my digital camera” This can be very useful statement when someone makes this claim… check are the date and time or are they from days, months or even years ago. Once again, you've caught them in a lie; a good reason to run away as fast as you can.

Copyright Notices in the EXIF Data

Most commercial photography studios and services will also add a Copyright Notice to the EXIF data in their image files. If you see such a notice in any of the images you receive from someone, be sure to ask them why they are distributing copyrighted works under false pretenses. Chances are pretty good they will be the ones to cut off communication … and quickly too.

Chat Handles - The Superman/Clark Kent/ ~wonderwoman/ Diana Prince Conflict

As mentioned earlier, Instant Messenger programs (such as Yahoo, MSN and AIM) allow you to have only one login active at a time. This fact can be especially important when you suspect someone may be using the programs to impersonate two or more people.

Let's assume that you have two of their pseudo-people on your Yahoo. You've probably spoken to both of them at some time or other, but you've never been able to find them both online at the same time. This is because the faker must sign out of one handle and then sign into the other handle in order to chat. Just like no one ever sees Superman and Clark Kent together or at the same time, you will never find both fake people available at the same time either. So how do you use this information? Or better still, what can you do to prove or disprove your suspicions? Simple.

Whenever you are talking to Person A, also open a chat box with Person B and leave them a message that sounds critical or interesting enough to get their attention immediately. It can be especially telling if you use something like “I just found out something really scary about Person A and I need to ask you something right away.” If you don't hear from Person B until after Person A logs out, and then you immediately hear from Person B … well guess what, A=B.

Conclusions

It can be very hurtful to find out you've been deceived by someone. Whether the deceit is in person or on the Internet, the common reaction is to blame yourself in some fashion. However, you must keep in mind that most fakers have honed their skills over many years and many lies. They become expert at what they do and how they do it. Even the best and most paranoid among us has, at one time or other, been duped by a faker. Do not be ashamed. Just take your lumps, learn to be a bit more skeptical, and then get back to living your life in a decent honest way.

If you spot a fake, or if you are suspicious that someone may be “less than honest” about who they really are, do not hesitate to call on other friends and have them help you corner the liar. Because fakes are habitual liars, they will often tell slightly altered versions (or sometimes wildly different versions) of their story to other people. This allows you to compare notes with your friends and hopefully catch the liar red-handed.

And always remember the three basic rules of Internet Chatting:

·Be Cautious and Reasonable - Listen carefully to the stories you hear, take everything with a grain of salt, and try to remain reasonable in your suspicions.
.Never Trust Anyone with Your Money - Never give out money, bank account or credit card information, or any financial details to anyone you cannot touch (and if necessary beat upside the head ).
·Live and Learn - When you find you have been deceived, take your lumps, get on with your life and go into the next experience a little wiser and a little better prepared to protect yourself and your feelings.
Hopefully the above information will help you and others around you stay safe and secure while still having fun and finding happiness in your lives. If you know of someone that could use this information, do not hesitate to pass it along. If at all possible, find a local “computer geek” that you can trust and that can help you understand some of the deeper technical issues you may encounter. And above all else, be ready to forgive. Forgive yourself and forgive others, because carrying anger and spite inside you will never solve any problems.

5 Dec 2012

A scenario...from 'ASH'


It is late afternoon.
I am slowly making my way up the stone stairs to meet the one and only true mistress, Lady Leyla. Just outside the dungeon door, I stop and nervously look around, searching for people who can see me. No-one, good, but in the heart of hearts a bit disappointed. 
The weatherman says it is 2 degrees when I start to take out my jacket. I remove my shoes and socks balancing only on one leg. Now is the dreaded part. Slowly I unbutton my shirt to show a black bra underneath. 
Next I remove my pants to reveal a pair of girlie panties and black stockings. The cold breeze and the excitement is having its effect on me. I am shivering from head to toe. I carefully fold all the clothes and put it on the side. then kneeling in front of the door, in the full present position, I wait for Mistress. it may have been only 5 mins, but felt like an eternity. 
You open the door and look pleased. slowly kicking me on my balls, you order "Come in slut. you have a long day ahead!"

Practice makes perfect

Resulting form the lack of effectiveness in work while wearing shackles, I did promise Mistress to practice more at home when I have time an...