Tech Safety for Domestic Violence Survivors
Domestic
violence is a serious problem across the world. It occurs in various cultures
and affects people across society, at all levels of economic status. It does
not discriminate – domestic violence can happen to anyone. Any attempt by one
party to dominate and control the other in an intimidate relationship or
marriage is domestic violence. At its core, domestic violence is all about
gaining and maintaining control over the other person.
The Power of Technology
Technology
can be a powerful tool when it comes to exerting tyrannical control over
others. Today’s technology makes it easier for abusive partners to harass and
intimidate their victims, online and offline. A new form of domestic abuse that
sees perpetrators use internet-connected devices to hurt and harass their
spouses or partners inside their homes is emerging. This disturbing trend lets
abusive partners continue the emotional and psychological abuse even after the
victim has left the abuser.
Modern
technology can help perpetrators of domestic violence terrorize and control
their victims — but it can also help them break free. In this article, we’ll be looking
at how victims of domestic abuse can protect themselves from technology-related
coercive control and abuse. You’ll learn how technology can be used against you
and, in turn, take back control and take measures to protect yourself. Read on
to learn more.
Securing Your Devices Against
Surveillance
As
convenient as it is to have access to a computer or a phone, these devices be
potential stalking avenues if they are not secured. Perpetrators of tech-based
domestic violence are increasingly turning to devices such as smartphones and
computers to harass their victims even after they're out of their lives.
Stalking via smartphones has become much more advanced than just serial calling
or sending threatening text messages. There are smartphone apps and features —
such as iPhone’s ‘Find My Friends’ — that allows people to see the whereabouts
of other iPhone users.
The U.S. Federal Trade
Commission (FTC), in 2016, issued a warning on the potential use of
smartphones by stalkers. A potential stalker who has access to your devices
could install spyware or a surveillance app onto your smartphone. Stalkers can
not only track your location but pick up anything that their victims type into
their devices including passwords, text conversations, and anything else they
can use against you. So, what can you do to make sure that you are protected
against this type of surveillance?
Be Vigilant
There’s
no sure-fire way to know if someone is using your devices against you or if
they’ve tampered with your smartphone or computer. However, if you are in
suspicion that someone has tampered with your devices, look for missing screws,
loose parts, and scratches in unusual areas. Make sure that you set up your
phone yourself to ensure that is not ‘bugged.’ Stalkers can root your device,
install spyware or surveillance apps, giving the abuser access to your location
at all times.
Reset Your Phone
Smartphones
have a reset feature that allows users to restore factory settings on their
devices. Use this feature to restore your device to factory settings if you are
not sure whether someone has installed a spyware or surveillance apps onto your
device. Resetting your
smartphone restores it to a reasonable state of integrity. From here,
you can install antivirus and antispyware software to prevent someone from ‘bugging’
your device.
Set Up a Passcode
One
of the things you should do after you’ve reset your phone is set up a strong
passcode to prevent unauthorized access. Make sure you create a unique password
that’s hard to guess — at least six digits — and enable on-device encryption.
Avoid using other less secure authentication methods such as face scanning or
fingerprint scanning as stalkers can easily get around these and gain access to
your device without your knowledge. For online accounts such as email, banking,
and social media, make sure that you’ve activated two-factor authentication.
Secure Important Information
Abusers
will use any available means to make their victims’ lives difficult and
maintain control over their lives. This includes stealing important documents
and records such as passports, visas, credit cards, medical records, birth
certificates, marriage certificates, immigration papers, etc. We need these
documents to work, drive, leave the country, among other things. Without them,
life can become very difficult. Scan, photograph, and make copies of these
documents and upload them to the cloud. Sign up for services such as Dropbox
where you can store and access important files anytime.
Be Careful with Social Media Sites
and Apps
Restoring
your device to factory settings, setting up a passcode, and securing your data
allows you to trust your device and keep abusive partners from stalking you and
making your life difficult. However, that’s not enough. You also need to
exercise caution on social media sites and apps so that they are not used
against you. Social media websites and applications are very powerful tools for
cyber-stalkers. If an app is connected to the device’s GPS, you may be, without
your knowledge, tagging your location when you post.
Go
to your device privacy settings and toggle the location services for certain
apps on and off, you can even disable location services altogether. Don’t
forget to look at your in-app location settings and make sure that you exclude
any location-specific details in your online activities. Seemingly harmless
actions such as tagging yourself at a location on Twitter, Facebook, or
Instagram can be dangerous when you have a stalker. Also, try to avoid posting
pictures with recognizable backgrounds if you are under suspicion that someone
is stalking you.
Comments