
Sex Education Class Advising Teenagers About 'Choking' Leads To Furore In UK
A local council in the UK has been caught in the middle of a raging controversy after it showed a sex education PowerPoint presentation to teenagers, talking about choking a partner and how consent was necessary for the said 'sexual' act. According to a report in The Times, the material, funded by Bridgend County Borough Council in south Wales was intended for PSHE (Personal, Social, and Health Education) lessons at secondary schools.
"Consent should also happen every time sexual choking is an option, not just the first time," the presentation provided by Assia, the council's domestic abuse service, stated.
"It is never OK to start choking someone without asking them first and giving them space to say no. Make it clear that they have a right to say no if they don't want to be choked, and their no should be respected and if it's not respected that is sexual assault," it added.
As the controversy snowballed, the council denied that they had funded education which "taught children to consent to damaging sexual behaviour".
"The suggestion that children are being taught to consent to damaging sexual behaviour is simply not true," said a spokesperson.
"All pastoral advice used by local schools is carefully designed to be age-appropriate, and to encourage teenagers who are maturing into young adults to develop healthy, respectful relationships where there is no abuse of any kind."
'Deeply concerning'
While the material was intended as educational, Claire Waxman, London's victims' commissioner, described it as "deeply concerning".
"It is deeply concerning to hear the normalisation of choking and strangulation, which need to be called out as dangerous behaviours. The Domestic Abuse Act has even recognised this, making non-fatal strangulation a specific criminal offence in 2021," said Ms Waxman.
She added that children were being exposed to dangerous content "far too young" and that schools needed to ensure that they were delivering the right information using "reputable organisations and experts".
Michael Conroy, the founder of Men at Work told the publication that teaching choking to impressionable students was not sex education but "advocacy for porn industry".
"Imagine you are a 14-year-old girl and you have told your boyfriend you don't want to be choked but then an authority figure comes into school and tells you it is OK," said Mr Conroy.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


NDTV
20 hours ago
- NDTV
Nicole Daedone: Wellness Firm CEO Guilty Of Forcing Employees Into Sex Acts
Nicole Daedone, the founder and CEO of the controversial sexual wellness brand OneTaste, was convicted on Monday by a New York jury of conspiracy to commit forced labour. Alongside her, Rachel Cherwitz, the former head of sales and Daedone's close aide, was also found guilty. Jurors sided with prosecutors who alleged that Daedone and Cherwitz manipulated vulnerable members and employees into unpaid labour and forced sexual acts under the guise of "healing" and "empowerment." Brooklyn US Attorney Joseph Nocella Jr called the duo "grifters who preyed on vulnerable victims, by making empty promises of sexual empowerment and wellness only to manipulate them into performing labour and services" for their benefit. OneTaste, started in San Francisco in 2004, claimed to be a sexual wellness brand offering expensive retreats and courses. But prosecutors said it was actually run like a cult, where people were forced to work without pay and take part in sexual acts. Who Is Nicole Daedone? Nicole Daedone was born in Los Gatos, California. She was raised by a single mother. She graduated in 1994 with a bachelor's degree in gender communications and semantics from San Francisco State University. After college, she opened an art gallery, worked as a waitress, and briefly as a stripper and escort, she told The Times. She studied yoga and Zen meditation. She lived for two years at 'The Welcomed Consensus', a group known for its focus on "gourmet sex." In 2004, Nicole Daedone co-founded OneTaste in San Francisco along with Robert Kandell. OneTaste offered expensive sexual wellness retreats and classes based on a practice called "Orgasmic Meditation", which the company trademarked. In 2012, she published her first book, Slow Sex, comparing mindful sexuality to the Slow Food movement. She later published The Eros Sutras, a multi-volume series that lays out her beliefs on sex, relationships, and justice. In 2002, Nicole Daedone co-founded Unconditional Freedom, a nonprofit that helps inmates through meditation and writing programmes. In 2015, OneTaste paid $325,000 to settle a labour dispute with a former employee, raising early red flags. In 2018, a Bloomberg expose revealed deeper allegations of abuse and misconduct. That same year, the FBI began investigating the company for sex trafficking, prostitution, and labour violations. By the end of 2018, OneTaste shut down all in-person classes and US offices. In June 2023, Nicole Daedone was indicted for forced labour conspiracy. Her trial began in May, and she was found guilty on June 10. She faces up to 20 years in prison, with sentencing set for September 26. Nicole Daedone was featured in the 2022 Netflix documentary Orgasm Inc: The Story of OneTaste.


NDTV
a day ago
- NDTV
UK Couple Steals Back Their Own Car From Thieves As Police Were Too Busy
Quick Read Summary is AI generated, newsroom reviewed. A couple in the UK recovered their stolen car after police were unable to respond. Their Jaguar E-Pace was stolen from their home in Brook Green, west London. The vehicle had a ghost immobiliser and AirTag locator, aiding in its recovery. A couple in the United Kingdom turned detective and stole back their own car as the police were too busy and failed to act. The Times reported. The couple, Mia Forbes Pirie and Mark Simpson discovered that their Jaguar E-Pace had been stolen earlier this month from their home in Brook Green, west London. The vehicle was installed with a ghost immobiliser fitted, which is a type of immobiliser that uses a unique code to prevent thieves from starting the car. The car also had an AirTag locator. The couple tracked the car to Chiswick, but when they informed the police, they said they were too busy to probe. The police reportedly told them that they were unsure when they would be able to investigate when they spoke to a 999 operator. The car was first reported as missing on June 4, as the AirTag indicated the vehicle was parked outside their home at around 3:20 am (local time). In the next update, the car was in Chiswick at 10.30 am (local time). The couple rushed to that place even in the absence of the police. The car was found on a quiet back street. Its interior and carpets were ripped apart by the thieves as it looked they were trying to access its wiring. "Police seem to have no interest": Pirie In a LinkedIn post, Pirie said that "it was kind of fun stealing back our own car." "But it does make me wonder whether we should have had to do that. And not whether it's normal, but whether it's right that the police seem to have no interest in investigating what is likely to have been a reasonably sophisticated operation involving a flat bed truck... if there are no consequences, what is the incentive for people not to do more of this?" she added. The Metropolitan Police reportedly responded after the couple rescued their car and said it would be in touch, with a forensic team set to arrive this week. Speaking to The Times, Pirie said: "Since we've found it, lots of people have touched the car and the police say that they're going to look underneath the carpets and at the fuse box to see if there are prints there." She further said that "it wouldn't have cost very much for them to tell us not to touch anything. That's the one criticism I have". "The police are under-resourced and it's a shame. But if there aren't any consequences to people stealing cars or a lot of the other crimes where there aren't any consequences, then I don't really see what the deterrent is to stop people from doing it more," she said.


Indian Express
2 days ago
- Indian Express
Russian intelligence says it collects WeChat data: What does that mean?
Russian counterintelligence agents are analyzing data from the popular Chinese messaging and social media app WeChat to monitor people who might be in contact with Chinese spies, according to a Russian intelligence document obtained by The New York Times. The disclosure highlights the rising level of concern about Chinese influence in Russia as the two countries deepen their relationship. As Russia has become isolated from the West over its war in Ukraine, it has become increasingly reliant on Chinese money, companies and technology. But it has also faced what the document describes as increased Chinese espionage efforts. The document indicates that the Russian domestic security agency, known as the FSB, pulls purloined data into an analytical tool known as 'Skopishche' (a Russian word for a mob of people). Information from WeChat is among the data being analyzed, according to the document. The document offers insights into the espionage tactics of two authoritarian governments that are preoccupied with surveillance. According to the document, the system processes detailed data on WeChat users, including account logins, contact lists and message archives, some of which are extracted from phones seized from people of interest to Russia's spy hunters. The tool is used to scrutinize the data trail of 'people using the Chinese messenger WeChat to talk to representatives of the PRC intelligence services,' the document says, using the abbreviation for the People's Republic of China. The exact functionality of the system is unclear. It is described in Russian as an automated data processing system that can be used in 'search activities.' Intelligence agencies typically use such tools to map messenger and social network connections to spot potential spies. The document makes clear that the FSB is particularly interested in WeChat. The Russian security agency asks field officers to send WeChat accounts and logins of interest to the China counterintelligence team, including 'lists of contacts (logins) and archives of chats from WeChat obtained during direct access to the smartphones of targets of interest.' The document says data can be run through another automated system, known as Laretz, a Russian word for a small decorated box, that can check 'more than a thousand electronic indicators simultaneously.' The Times was unable to confirm whether Skopishche had been effective as a counterintelligence tool or how extensively the FSB could intercept data from WeChat. One Western intelligence agency told the Times that the information in the document was consistent with what it knew about 'Russian penetration of Chinese communications.' The FSB and the Chinese Foreign Ministry did not reply to requests for comment. WeChat, owned by the Chinese tech giant Tencent, is one of the most widely used digital platforms in the world, mostly concentrated in China and among Chinese communities. It functions as an all-in-one tool that combines messaging, mobile payments, social networking and government services. The app has over 1.4 billion users globally, according to Tencent financial disclosures. Tencent did not reply to a request for comment. Russian intelligence agencies have worked to penetrate encrypted communication apps like Signal and WhatsApp. The FSB has have long viewed those apps, which are widely used by dissidents, as tools of subversion and foreign influence. In April, President Vladimir Putin of Russia barred government and bank employees from using foreign messaging apps. WeChat is different. By design, it does not use end-to-end encryption to protect user data. That is because the Chinese government exercises strict control over the app and relies on its weak security to monitor and censor speech. Foreign intelligence agencies can exploit that weakness, too. WeChat added some limited encryption features in 2016, according to Mona Wang, a research fellow at the University of Toronto's Citizen Lab. But the security improvements still fall short of the encryption offered by other messaging apps like Signal or WhatsApp. It is unclear why Chinese intelligence officers would use WeChat to communicate with sources, given its lack of end-to-end encryption. But sources or potential recruits may not know they are communicating with spies, who often pose as diplomats and strike up casual conversations at first. WeChat was briefly banned in Russia in 2017, but access was restored after Tencent took steps to comply with laws requiring foreign digital platforms above a certain size to register as 'organizers of information dissemination.' The Times confirmed that WeChat is currently licensed by the government to operate in Russia. That license would require Tencent to store user data on Russian servers and to provide access to security agencies upon request. Russia is separately pursuing a government messaging app of its own, one that has drawn comparisons to WeChat.