Your safety matters. If you are in immediate danger, call 911 or your local emergency services. View all help resources β†’

Digital Safety & Surveillance

How to recognize technology-facilitated abuse and protect your digital privacy

Important
Critical Warning: If you believe someone is monitoring your devices, do not search for help on those devices. Use a library computer, a trusted friend's phone, or contact a helpline by calling from a different phone. Clearing your history may alert a tech-savvy person that you're aware of monitoring.

What Is Technology-Facilitated Abuse?

Technology-facilitated abuse uses digital tools to control, monitor, harass, or intimidate someone. Research indicates that 97% of domestic violence programs report their clients experience technology-facilitated abuse. This form of abuse is often invisible and can make victims feel like they're "going crazy" when their privacy is violated in ways they can't see or prove.

Technology abuse includes:

  • Surveillance: Tracking location, reading messages, monitoring activities
  • Harassment: Constant texts/calls, threats via digital means, impersonation
  • Control: Restricting device access, controlling accounts, changing passwords
  • Exposure: Threatening to share private images/information
  • Financial: Monitoring spending, blocking access to accounts

Common Monitoring Methods

πŸ“± Spyware Apps

Apps like mSpy, FlexiSpy, or "parental control" software can read texts, emails, calls, location, and moreβ€”often invisibly.

Signs: Battery drains fast, phone runs hot, unexpected data usage, phone acts slow

πŸ“ Location Sharing

Find My iPhone, Find My Device, Life360, or shared Google accounts can reveal your location constantly.

Signs: Partner always knows where you are, questions arise immediately when you're somewhere unexpected

πŸ”‘ Account Access

Having your passwords, logged into your cloud backup, or recovery access to your accounts.

Signs: Messages shown as "read" when you haven't read them, mentioned info you didn't share

🏠 Smart Home Devices

Doorbell cameras, smart locks, thermostats, speakers, or cameras can all be used for surveillance and control.

Signs: Partner references who visited, doors lock/unlock remotely, devices behave unexpectedly

πŸš— Vehicle Tracking

Hidden GPS trackers (small magnetic devices), car's built-in GPS, or connected car apps.

Signs: Partner knows your exact routes, appears unexpectedly where you are

πŸ’³ Financial Monitoring

Joint accounts, monitoring apps, transaction alerts, or access to your individual accounts.

Signs: Questioned about every purchase, accused based on spending location/time

Warning Signs of Digital Monitoring

Consider whether your partner:

  • Knows details about conversations you had when they weren't present
  • References information from your private emails or texts
  • Always seems to know exactly where you've been
  • Shows up unexpectedly at locations you didn't tell them about
  • Asks about people in your contacts or recent calls
  • Accuses you based on things they shouldn't know
  • Insists on knowing all your passwords "for trust"
  • Requires location sharing "so they don't worry"
  • Gets angry when your phone is out of their sight
  • Has installed "family" or "security" apps on your phone
  • Set up your accounts or devices for you
Important
Trust Your Instincts: If it feels like someone knows too much, they probably do. You're not paranoidβ€”technology-facilitated abuse is common and designed to be hard to detect.

Assessing Your Device

Before making changes, understand what might be monitored. Be careful: Removing monitoring apps or changing passwords can alert the person and may escalate the situation. Consider your safety before taking action.

πŸ“± On iPhone

  1. Installed Apps: Settings β†’ General β†’ iPhone Storage (look for unfamiliar apps)
  2. Family Sharing: Settings β†’ [Your Name] β†’ Family Sharing
  3. Location Sharing: Settings β†’ Privacy β†’ Location Services β†’ Share My Location
  4. Find My: Settings β†’ [Your Name] β†’ Find My
  5. Screen Time: Settings β†’ Screen Time (can be used to monitor/restrict)
  6. Profile: Settings β†’ General β†’ VPN & Device Management (look for profiles)

πŸ“± On Android

  1. Apps: Settings β†’ Apps β†’ See All Apps (look for unfamiliar apps)
  2. Device Admin: Settings β†’ Security β†’ Device Admin Apps
  3. Location: Settings β†’ Location β†’ Location Sharing
  4. Google Account: Check who's logged into your Google account (can see location history)
  5. Accessibility: Settings β†’ Accessibility (spyware often requires these permissions)

Creating a Safety Plan Before Acting

If you discover monitoring, don't immediately remove it. First:

  1. Assess your safety: Will removing monitoring escalate danger?
  2. Document evidence: Screenshot anything that shows monitoring (store securely)
  3. Get support: Contact a domestic violence advocate who can help you plan
  4. Create a safe device: If possible, get an unmonitored phone before making changes
  5. Plan your actions: Have a support system in place before confronting or removing
Important
The National Domestic Violence Hotline (1-800-799-7233) has trained advocates who can help you navigate technology safety. They will not pressure you to leave and will support whatever decision you make.

Safe Communication Options

πŸ“ž Safe Phone

A prepaid phone purchased with cash, registered to a different name or not registered at all. Keep it somewhere your partner won't find it.

πŸ–₯️ Library Computer

Public library computers can be used to access email, research help, or contact services without leaving traces on your devices.

πŸ“§ New Email Account

Create a new email on a safe device. Use a name that doesn't identify you. Don't link it to your phone number.

πŸ‘₯ Trusted Person

Borrow a trusted friend or family member's phone to make calls or access accounts your partner might monitor.

πŸ’¬ Signal App

Encrypted messaging that can be set to auto-delete. However, if your phone has spyware, even encrypted apps may be readable.

Smart Home Safety

Smart home devices pose unique challenges because they may be controlled by whoever set them up:

  • Cameras: Indoor cameras, doorbell cameras, baby monitors can all record and transmit
  • Smart speakers: Can potentially record conversations
  • Smart locks: Can be locked/unlocked remotely
  • Thermostats/lights: Can be used to signal someone is watching

If you're concerned:

  • Cover cameras with tape or a sliding cover
  • Unplug smart speakers when having private conversations
  • Note if devices behave strangely (lights change, locks click)
  • Document unusual device behavior
  • Know that factory resetting devices may require the original owner's credentials

Vehicle Safety

If you suspect a GPS tracker on your vehicle:

  • Check common hiding spots: Under the car (magnetic trackers), in wheel wells, under seats, in the trunk, in the OBD port
  • Connected cars: Many modern vehicles have built-in GPS. Check the car's app and who has access.
  • Professional sweep: Some auto shops or private investigators can scan for trackers
  • Consider timing: If you find and remove a tracker, the person will know you found it

Social Media & Online Presence

If You're Leaving

When preparing to leave a controlling relationship, digital safety becomes critical:

Before You Leave

  • ☐ Get a safe phone if possible
  • ☐ Create new email accounts on safe devices
  • ☐ Change passwords on essential accounts (bank, benefits) from a safe device
  • ☐ Document evidence of monitoring/abuse securely
  • ☐ Make copies of important documents (stored with trusted person)
  • ☐ Contact a DV advocate for a safety plan

After You Leave

  • ☐ Factory reset your old devices (or get new ones)
  • ☐ Remove yourself from Find My/Family Sharing
  • ☐ Change passwords on ALL accounts
  • ☐ Review account recovery options (phone numbers, backup emails)
  • ☐ Enable two-factor authentication everywhere
  • ☐ Review privacy settings on all social media
  • ☐ Check for tracking devices in your car
  • ☐ Be careful about photos showing your new location

For Everyone: Basic Digital Hygiene

Regardless of your situation, these practices help protect your privacy:

πŸ” Strong, Unique Passwords

Different password for each important account. Use a password manager if safe to do so.

πŸ”‘ Two-Factor Authentication

Adds a second step to login. Use an authenticator app rather than SMS when possible.

πŸ“± Keep Devices Updated

Updates often fix security vulnerabilities that spyware exploits.

πŸ”’ Lock Screen

Use a PIN/password your partner can't guess. Don't use fingerprint if they might unlock while you sleep.

πŸ“ Review Location Settings

Know which apps can access your location and when. Turn off what you don't need.

☁️ Understand Cloud Backup

Know what's backed up to the cloud and who has access to those accounts.

Resources for Tech Safety

If This Feels Unsafe…

Trust your instincts. If any part of this information triggered concern about your safety or someone else's, help is available. You don't have to figure this out alone.

Educational Disclaimer

This content is for educational purposes only. It is not therapy, medical advice, legal advice, or a substitute for professional treatment. Always consult qualified professionals for your specific situation.

Get Help