Women's Domestic Violence & Homeless Services

 

Technology Safety Planning


The following information was taken from "Safety Planning Around Technology", a guide for survivors of domestic violence or dating violence which was adapted by WESNET with the permission of the Florida Coalition Against Domestic Violence. 

To order this booklet call 1300 252 006, visit www.wesnet.org.au/safetynet or email techsafety@wesnet.org.au

 

What is stalking?

Repeated or unwanted behaviour from an individual that is harassing, intimidating, or threatening.

Stalking is most common in intimate partner relationships. Many times there will be an increase in stalking behaviour after leaving a controlling relationship. Stalking is common during periods of separation and often increases in intensity and frequency. Ex-partner stalkers are more persistent and dangerous than stranger stalkers.

 

What is cyberstalking?

Cyberstalking is similar to traditional forms of stalking in that it incorporates persistent behaviours that instil apprehension and fear. However, with the advent of new technologies, traditional stalking has taken on entirely new forms through mediums such as email and the internet. Thus, it becomes cyberstalking.

  • Take all threats seriously whether they are verbal or text.
  • Limit communication with the stalker and restrict responses to messages, calls and social networking posts to those required by court order (e.g Family Court).
  • Keep a separate email account for communication regarding legal matters such as child residency and contact, and other communication with the stalker.
  • Use passwords on all devices. Keep them secret and change them often. 
  • If your computer has a webcam learn how it works and how to turn it off. These devices can be accessed remotely. Use tape to cover the lens when you are not using the camera.
  • Use internet-based phone services like google voice or skype to create a new phone number for texting or phone calls.
  • Use a safer computer such as a public computer of a trusted family member or friend to access your email or use the internet.

 

Safety strategies for phone technology

  • Lock your keypad with a password
  • Turn off Bluetooth on your phone so calls cannot be intercepted. Set your phone to hidden as your phone can be hijacked and your data can be stolen via Bluetooth technology.
  • Beware of Caller ID spoofing for phone calls and text messages. Caller ID spoofing is a service allowing a caller to change the caller ID display on a recipients phone to any number. **Always confirm the sender of a text message
  • Talk to your children about the above information (if age appropriate). Check your children's phones, change passwords if necessary or you may need to take the phone until it is safe for them to have it back.
  • If a parenting plan is in place, talk to your child/ren about how and when the other parent is allowed to communicate with them. If the child/ren receives unallowable, harassing or threatening messages or calls, instruct them to save the messages or call history.
  • Do not use apps that tell your friends where you are or check you in.
  • Disable the location services in any camera apps and your mobile settings.
  • Buy a cheap mobile to make private calls and pre-program any emergency numbers you may need including your trusted friends' number, police, 1800 respect – domestic violence help service, Link2Homee (accommodation help line) and other 24hr referral services. 

If you are receiving harassing calls, texts or voice messages, this can serve as evidence in court.

 

Step 1

Save all harassing or threatening text or voice messages on the phone

Step 2

Do not turn off the device. Switch to flight mode to preserve the call and the text evidence on the device. No calls or texts messages will be transmitted to or from the device. Note: This will not protect or prevent incoming voicemail messages while it is this mode.

Step 3

Take the device to the police or to your lawyer to have evidence documented in a format admissible in court. 

The police may:

  • Take a photo of the call history, text message or message
  • Transcribe voice mail messages or
  • Use forensic devices and software to document and analyse the data on the device.

 

Additional strategies

Print call history (sometimes called recents) and text logs from your mobile phone provider's website or request a copy from customer service. Note the Australian mobile phone carriers only have to hold call data for 60days.

 

Are you being tracked?

Many tools exist for tracking a person's location. If you think you are being followed or tracked, trust your instincts. Look for patterns in stalking behaviour.

 

GPS technology

 

Does the stalker find you in places you have taken your car?

Ask the police or trusted mechanic to search the car for a GPS tracking device.
Check your car for objects that may have a GPS tracking unit attached or installed such as a mobile phone, computer, dog collar or watch with GPS capability.

 

Does the stalker find you in places you have taken your mobile?

Adjust your mobiles GPS or location setting. Turn off location applications and GPS capability features.
GPS chips can be hidden in nearly anything and tracked using computer software or phone applications.

 

Does the stalker find you via GEOTAGGING?

Geotagging is marking media files such as video, photos or social networking updates with a location. Certain formats such as JPEG allow for geographical data to be embedded within the image and then read by picture viewers. Allowing the exact location of where a picture was taken to be saved with the photograph. The pics you post to Flickr can be mapped using this technology. 

TURN OFF FEATURES on your mobile and digital cameras that “geotag” your media files, like pics and social networking posts with a date and location.

 

Social Networking

  • Stalkers sometimes use social networking sites such as Facebook, Twitter, LinkedIn, Google+, Foursquare, Flickr, Instagram and Pinterest, to impersonate, stalk and harass victims. Using safety measures may help reduce risk. 
  • Communicate via private or instant message rather than publicly through Twitter feed or your Facebook wall.
  • Revisit privacy settings weekly or monthly as these features are updated regularly
  • Adjust privacy and location settings via the website and on your mobile apps.
  • After linking social networking profiles such as Foursquare and Twitter, revisit your privacy settings on each website.
  • Customise your settings to best fit your social networking usage.
  • Save all threats and harassment and submit to the police and your legal adviser.
  • You may deactivate your Facebook account temporarily without deleting your data. This strategy prevents users from viewing your information, tagging you in posts or pictures, and sending you a private or instant message.

If you are harassed, impersonated or threatened online, it is essential to keep all records of these activities. This documentation can serve as evidence in court (which may be needed later on if the violence escalates or it may assist you in family court matters relating to your children).

 

Questions to ask before "friending" someone:

 

Do I know this person's true identity? 

If not, consider ignoring or declining the friendship request. 

It could be a friend of the perpetrator. He may have told them a story that is false and are trying to get information from you to pass on to him. If they are a true friend of yours they will understand if you decline and the need to keep safe!

 

Does this person have a relationship with the person stalking or abusing me? 

If so, consider declining or limiting the friendship request. The stalker may be able to access your information or whereabouts through this person. 

 

For location applications like Foursquare, does this person need to know my location? 

If not, consider declining the friendship request.