Technology-Facilitated Violence Safety Planning Tips

 

Technology is often misused by perpetrators of family violence to further abuse and control their victims (for example, to monitor movement or assist in gas lighting). Technological abuse covers a wide range of behaviors (from monitoring text messages to using tracking devices), and is partially influenced by someone’s understanding and use of technology.

If you have concerns about technological violence, start by documenting your experience (click here for sample logs). If you find patterns through documentation, recognize that some things are in and out of your control, but knowing what is happening allows you to make an informed decision.

  • For example, deciding whether you should delete your browser history depending on what you think is best for your situation.

You know your situation the best, the following information should be used to help you make an informed decision. You may need to adjust many things or nothing at all, depending on your circumstances.

+ Cellphone/Laptop/Tablet Safety

PASSWORDS

  • Change passwords for all accounts/devices
  • Use passwords the abuser can’t guess
  • Don’t write down your passwords, but if you have to, save it somewhere safe
    • For example, leave your passwords with a trusted friend
  • You know best, if you don’t think it’s safe to make a change (ex: changing passwords), trust your gut.

DEVICE BUGGING

A covert listening device, more commonly known as a bug or a wire, is used by an abuser for survilence, tracking, or listening to another person. There are also apps or programs people can install on your device to track what you are doing without your knowledge.

  • How do I know if my device been bugged?
    • Your new phone's battery dies faster than usual
    • You notice an unrecognized app on your phone
  • If you don’t want to get a new phone...
    • Bring it to your service provider for help
    • Reset the phone to its factory settings yourself
  • If you get a new phone…
    • Do not transfer the data from your old phone because it could transfer viruses or bugged apps
    • If you have an IPhone, also create a new iCloud account
  • If you think your phone is bugged...
    • Turn off your phone before you go to an agency/court
    • Use someone elses phone/computer (or the library's) to look up resources
    • Install and run virus protection on your devices (if you think it is safe to do so)

INTERNET

  • Consider using Google to see what information comes up when your name is searched
  • If you would like, you could set up a Google Alert (free) for your own name to know when, or if, new information about you is posted by anyone.
    • Go to: www.google.com/alerts/
    • You will see a page where at the top it says “Alerts”
    • There will be a space where you have to enter information. It says “Create an alert about…”
    • Enter the search terms you want the Google Alert to track (separated by commas).
      • For example, if your name was Jillian Fox: Jill Fox, Jillian Fox, Jillian Louise Fox, Jillybean Fox
    • Click on the blue “Show Options”
    • Click on each box and enter the information needed
    • Click the “Create Alert” button
  • Ensure your history, cache and cookies are erased.
    • Sometimes deleted history can trigger violence. Using incognito mode can be used for supports and help, but use your regular browser mode for everything else to avoid looking suspicious.
    • Selectively delete your history

VOICEMAIL

  • Unsure if your abuser has access to voicemail?
    • Go to your service provider if the account is in your name. They can let you know if someone else has been accessing your voicemail.
    • If the account is in the abusers name, sometimes they can log in remotely. In this case, you may need to be careful who you call and who leaves messages on your phone
      • As a solution, you can use a trusted friend/family member's phone, a public phone, or get another phone under your name if possible.

MAKING CALLS

  • Change your phone number(s)
  • Make your number(s) unlisted
  • Consider blocking your number before calling out
    • Dialing *67 before dialing a phone number ensures that your number shows as "unknown"
    • Alternatively, your phone may have a feature for this in settings

+ Email Safety

Creating a New Email Address

  • Consider creating a new email that the person using abusive behaviors is unaware of. You may want to consider not including your first or last name in the email
    • Please note that new email accounts won’t be linked to your old ones. You can have as many accounts as you need.
    • Check to make sure your real name is not displayed. Send yourself an email and check to see if your name is displayed in any way
    • Only give out your new email address to trusted contacts
  • Consider using labels so that emails received from the person using abusive behaviors email are filtered into a specific folder

Using your current email address

  • If you can’t create another email account, consider getting an external hard drives/USB to save documents/emails you don’t want the person using abusive behaviors to see
  • You could also email important documents to a trusted friend/family member
  • You don’t have to use technology if you’re not comfortable, consider saving paper copies of information.

+ Social Media Safety

Mutual Friends

  • Something to keep in mind when joining online communities (Facebook, Instagram, Twitter, Snapchat, etc.), is considering who can see your information.
    • For example, whenever you post a picture you may be providing information about where you live, who you live with, who you spend time with, etc.
    • Consider who you are currently connected to on social media, and their relationship with the person using abusive behaviors. You may want to consider deleting and/or blocking particular individuals
  • Your abuser could be getting information on you through mutual friends
    • For example, going on your friend's account to find information about you
  • If there are concerns about mutual friends giving away info, block them or limit what info they can see on your profile through your account settings
  • Be wary of friend requests from people that you do not know. People who use abusive behaviors my make fake profiles or ask that their friends monitor your social media

Making Posts

  • Be aware of what you’re posting on the internet/social media
    • For example, don’t post a photo of yourself in front of your house number or tag your location
  • When posting a picture, the geolocation of the photo can be found when the image is posted online. Consider taking screenshots of the photo and post these instead
  • Turn off location tracking on your social media settings

Profiles

  • You may wish to consider deleting your social media and making new accounts under a pseudonym
  • You can make a new profile if you don’t feel safe using your current one
    • Try using your first name and your middle name, a random profile picture, make yourself not searchable (through your settings), make a new email that your can use for your new social media accounts, and make sure you always log off your devices.
  • Check the privacy setting on the social media that you are using, and ensure that you have high security

+ Surveillance Scanning

SIGNS SOMEONE IS TRACKING YOUR LOCATION

  • If you have noticed that the person using abusive behaviors knows things about you or your children that you have not mentioned, if you have the feeling that someone may be listening to your conversations or is monitoring your routines, it may be important to search for surveillance equipment
    • Look in the phone connection box to see if phone wires have been tampered with
    • Check around the outside of the home to see if there are any unusual items plugged into outside outlets
      • Look for unusual items inside the home especially if the person using abusive behaviors has had recent access (For example, new power bars, small cords, etc.)
  • If you share custody of children, be aware of any items that go back and forth between households such as a child’s bag or teddy bear as recording equipment could be hidden inside
  • Your abuser shows up at a place you weren’t expecting to see them
  • The abuser tells you they know where you were

Phone Tracking

  • If you are concerned about the possibility that there has been tracking software or a tracking device placed on your phone, consider purchasing a new phone if possible (especially if the phone was provided by the person using abusive behaviors)
    • Consider whether the person using abusive behavior seemed to know where you had been or what you had been talking about even if they were not there
    • Did you ever notice any apps that you had not downloaded yourself?
    • If your phone is newer, rapid battery consumption can be a sign that the phone is being monitored
    • You could consider resetting the device to factory default settings (after saving what you would like to keep)
    • You could also consider bringing your device into a store and ask for it to be internally and externally checked
    • Consider keeping your location services turned off
  • Check you location settings on your phone and individual apps
  • If you have an Apple ID or “find my phone” function, consider about whether the person using abusive person is associated with this account at all

Vehicle Tracking

  • How to find a tracker on your vehicle: do a sweep of your vehicle or bring car to a mechanic to help look/remove
    • Note that trackers are generally placed under the wheel well

DOORBELL/HOME CAMERAS

  • If it’s safe, try to cover-up or move the camera(s)
    • Depending on your situation, sometimes it’s best to let the abuser feel like they have some sort of control. In this case, you might choose to not adjust the cameras.
  • Please note that if the abuser is the account owner for your security system/cameras, only they can make adjustments to the system.

WHAT TO DO IF YOU KNOW YOUR LOCATION IS BEING TRACKED

  • Going to court or an agency? Consider parking at a strip mall or somewhere close so they don’t know what you’re accessing.
  • Be aware of what your household/doorbell camera parameters are
    • Is there a door without cameras you can leave through instead?
    • If the cameras video your driveway, consider taking the bus or getting a ride.
  • If the only time you have alone if during regular appointments (ex: doctors, hair salon) double up on those appointments to avoid raising suspicion.
    • For example, make a doctors appointment and book a call with your service provider during that time.
  • Book appointments with your service provider where the abuser wouldn’t suspect.
    • For example, things in your daily routine: at the park, grocery store, or walks.
  • There are websites that may help educate you on more ways to keep yourself and your children safe. A few examples of those are:

 If you or someone you know is experiencing family violence facilitated through technology, reach out to The Today Centre.

Our Family Violence Specialists can help with:

  • Comprehensive safety planning for those in relationships, thinking about leaving, or those who have recently left abusive relationships

  • Assessing risk factors for domestic homicide

  • Assessing immediate needs

  • Connecting to resources

  • Education on family violence dynamics and impacts