Tech-Facilitated Abuse
Tech-facilitated domestic abuse refers to the use of digital tools and technologies to control, monitor, intimidate, or harm a partner or family member.
Instead of—or alongside—physical or verbal abuse, perpetrators use devices such as mobile phones, smart home systems, GPS trackers, social media accounts, and spyware to invade someone’s privacy, restrict their freedom, or track their movements.
This can include actions like constantly checking a partner’s location, accessing their messages without permission, using hidden apps to monitor activity, or manipulating smart-home devices to create fear or confusion.
Tech-facilitated abuse extends the reach of domestic abuse into a person’s everyday digital life, making it harder to escape and easier for perpetrators to maintain control, even from a distance.
Because this form of abuse can be difficult to detect, it’s important for people to understand the signs that they may be being monitored and the practical steps they can take to protect themselves.
The following summary - and links to further information - outlines how someone can check whether they are being tracked or stalked through different types of technology, and what actions they can take to reduce risks, secure their devices, and increase their safety.
Internet of Things
Internet of Things are any devices that connect to the internet, i.e. Smart devices. Smart devices can include ring doorbells, cameras, smart locks, ‘Alexas’, smart lightbulbs and even washing machines. Some of these devices can be used by an abuser to stalk/harass/coercively control a victim.
NCSC - Internet of Things/Smart Devices
AirTags & Bluetooth
Bluetooth trackers are gadgets that can be attached to or placed inside property. They can be also be used to find lost items. They can connect via Bluetooth to a device, typically a mobile phone can be tracked by the user. These devices can be used to stalk people by being dropped in bags, hiding in a vehicle or in a pocket. This guidance will show examples of trackers and what they may look like.
NCSC - AirTags & Bluetooth Trackers
Bank Accounts
Joint accounts can allow an abuser to see bank transactions, which can include locations. This guidance explains how it is worth considering opening a separate online bank (i.e. Monzo) rather than a high street bank. It is also worth considering switching to paperless bank statements, as an abuser has no physical copy to access.
Getting Help
Understanding the emergency features on your mobile device, from shortcut keys to using Siri, will assist in immediate danger.
Video Calling
When using video calling, it is important to consider your surroundings whilst on a video call. The background can reveal locations, school uniforms, or paperwork. If an abuser is technically adept, they could determine approximate locations. Consider using a piece of dark tape to cover any camera lens on laptops.
Safeguarding Devices
This guidance will help for how to prevent unauthorised access to a mobile or tablet. Devices should be locked when not in use, whether that is using PIN, password, fingerprint or face recognition. Most apps will use the same security features; however, it is best to use PINS and passwords for apps. Secure folders to keep documents safe and private may be a useful way to store files, as they can be set to be hidden on a device.
App Protection and Settings
Most apps, as well as in built messaging, have notification settings that can be changed. It can be a useful way to keep messages hidden from an abuser. If you have more than one device, consider looking at settings on other devices. Two-step verification will add another layer of protection and can help build evidence that an abuser is committing a Computer Misuse Act offence as well as other offences. Consider clearing a deleted folder/recycle bin to ensure items are fully deleted.
If you are concerned about being tracked, it is worth looking at ‘Find my phone’ settings, on either an iPhone or Android.
NCSC - App Protection and Settings
New and second-hand devices
If you acquire a second-hand device, it is always best to perform a factory reset, as this will remove unwanted apps or information from the device. Ensure back up and/or transfer of important files are completed, and make a note of accounts you access. When setting up a new device, run an antivirus scan and make sure it is routinely running. Once a new device is set up, you can reset your old device.
NCSC - New and Second-hand Devices
Phone numbers and Wi-Fi
Mobile numbers can be hidden by dialling 141 before the phone number, this will make the call appear as No Caller ID. A Wi-Fi network can still be accessed without accessing the home, as signal will likely extend beyond the property. It is worth changing passwords for the Wi-Fi, including the administrator password and SSID. This can be done by service provider if someone is unsure how to do it.
NCSC - Phone Numbers and Wi-Fi
Acknowledgement:
This information has been provided by National Cyber Security Centre (NCSC) and the policing's national Cyber Protect network and provided to DAAWN through the Essex Police Cyber Prevent and Protect Officers.
