Tech Safety for Domestic Violence Survivors








Domestic violence is a serious problem across the world. It occurs in various cultures and affects people across society, at all levels of economic status. It does not discriminate – domestic violence can happen to anyone. Any attempt by one party to dominate and control the other in an intimidate relationship or marriage is domestic violence. At its core, domestic violence is all about gaining and maintaining control over the other person.

The Power of Technology

Technology can be a powerful tool when it comes to exerting tyrannical control over others. Today’s technology makes it easier for abusive partners to harass and intimidate their victims, online and offline. A new form of domestic abuse that sees perpetrators use internet-connected devices to hurt and harass their spouses or partners inside their homes is emerging. This disturbing trend lets abusive partners continue the emotional and psychological abuse even after the victim has left the abuser.

Modern technology can help perpetrators of domestic violence terrorize and control their victims — but it can also help them break free. In this article, we’ll be looking at how victims of domestic abuse can protect themselves from technology-related coercive control and abuse. You’ll learn how technology can be used against you and, in turn, take back control and take measures to protect yourself. Read on to learn more.

Securing Your Devices Against Surveillance

As convenient as it is to have access to a computer or a phone, these devices be potential stalking avenues if they are not secured. Perpetrators of tech-based domestic violence are increasingly turning to devices such as smartphones and computers to harass their victims even after they're out of their lives. Stalking via smartphones has become much more advanced than just serial calling or sending threatening text messages. There are smartphone apps and features — such as iPhone’s ‘Find My Friends’ — that allows people to see the whereabouts of other iPhone users.

The U.S. Federal Trade Commission (FTC), in 2016, issued a warning on the potential use of smartphones by stalkers. A potential stalker who has access to your devices could install spyware or a surveillance app onto your smartphone. Stalkers can not only track your location but pick up anything that their victims type into their devices including passwords, text conversations, and anything else they can use against you. So, what can you do to make sure that you are protected against this type of surveillance?

Be Vigilant

There’s no sure-fire way to know if someone is using your devices against you or if they’ve tampered with your smartphone or computer. However, if you are in suspicion that someone has tampered with your devices, look for missing screws, loose parts, and scratches in unusual areas. Make sure that you set up your phone yourself to ensure that is not ‘bugged.’ Stalkers can root your device, install spyware or surveillance apps, giving the abuser access to your location at all times.

Reset Your Phone

Smartphones have a reset feature that allows users to restore factory settings on their devices. Use this feature to restore your device to factory settings if you are not sure whether someone has installed a spyware or surveillance apps onto your device. Resetting your smartphone restores it to a reasonable state of integrity. From here, you can install antivirus and antispyware software to prevent someone from ‘bugging’ your device.

Set Up a Passcode

One of the things you should do after you’ve reset your phone is set up a strong passcode to prevent unauthorized access. Make sure you create a unique password that’s hard to guess — at least six digits — and enable on-device encryption. Avoid using other less secure authentication methods such as face scanning or fingerprint scanning as stalkers can easily get around these and gain access to your device without your knowledge. For online accounts such as email, banking, and social media, make sure that you’ve activated two-factor authentication.

Secure Important Information

Abusers will use any available means to make their victims’ lives difficult and maintain control over their lives. This includes stealing important documents and records such as passports, visas, credit cards, medical records, birth certificates, marriage certificates, immigration papers, etc. We need these documents to work, drive, leave the country, among other things. Without them, life can become very difficult. Scan, photograph, and make copies of these documents and upload them to the cloud. Sign up for services such as Dropbox where you can store and access important files anytime.

Be Careful with Social Media Sites and Apps

Restoring your device to factory settings, setting up a passcode, and securing your data allows you to trust your device and keep abusive partners from stalking you and making your life difficult. However, that’s not enough. You also need to exercise caution on social media sites and apps so that they are not used against you. Social media websites and applications are very powerful tools for cyber-stalkers. If an app is connected to the device’s GPS, you may be, without your knowledge, tagging your location when you post.

Go to your device privacy settings and toggle the location services for certain apps on and off, you can even disable location services altogether. Don’t forget to look at your in-app location settings and make sure that you exclude any location-specific details in your online activities. Seemingly harmless actions such as tagging yourself at a location on Twitter, Facebook, or Instagram can be dangerous when you have a stalker. Also, try to avoid posting pictures with recognizable backgrounds if you are under suspicion that someone is stalking you.







Comments

My thoughts

How To Become A Better Partner in Your Relationship

6 Ways to Revive Your Fizzling Relationship

3 Types of Couples

6 Signs you're the Selfish Partner

How the Smartphone is Gradually Ruining your Relationship

Sixteen Round

Tips: Effective Ways to Improve Communication in Relationship