Safety First Preparing To Leave
Technological self-defense guide for victims of IPV
-
17 934
-
Reading time : 5 min
Technological violence now affects the vast majority of victims of intimate partner violence. This article proposes concrete ways to better detect it and to defend against it before leaving, at the time of separation and after.
The challenge with the diversification of connected technologies in this context is that it becomes more difficult to cut off contact, even after physically distancing oneself from an abuser.
Signs of technological abuse
- Social media posts are made in the victim's name without their knowledge;
- Presence of unknown devices connected to online accounts;
- New messages are marked as "read;
- Files or applications appear or disappear from devices;
- The partner has information that is not available elsewhere;
- The partner seems to know things that have not been mentioned to them (where one has been, who one has seen, who one has talked to, what was bought, the content of private messages, who one is meeting up with, etc.);
- Having the sensation of being physically followed offline, in real time;
- Device batteries drain faster than usual;
- Applications use an unreasonable amount of data or memory;
- A device's camera icon appears when the camera is not in use;
- Etc.
*The absence of signs does not mean that technological violence is absent, since it is often extremely subtle and leaves few traces. That's why it's a good idea to put protection strategies in place, whether or not any clues are present.
Technological self-defense tips: During the relationship
When in a relationship with someone who uses IPV, short-term safety must be the number one priority. Any action that might signal to a violent partner that a victim suspects that a device is being monitored (changing passwords, disabling geolocation functions or removing a monitoring application or device, for example) must therefore be avoided.
- Always act as if your partner actually has access to your devices and accounts;
- Avoid using devices to which the partner has access for information retrieval, documentation or any action relating to the violent situation;
- Use "anonymous" or "private" mode, on a browser that is not connected to any account (Google or other);
- Visually inspect electronic devices and make sure that every wire or device (usb or other) is original or self-purchased;
- Check for unknown devices connected to your online accounts;
- Avoid bringing home any device, cell phone or computer provided by a place of work, in order to preserve its integrity and to be able to continue using it for empowerment purposes;
- Create a secret e-mail account on a device to which the abuser does not have access, and use only this e-mail for any communication related to the violent situation (with resources, loved ones, etc.);
- Obtain the necessary materials to create a barrier that renders certain "locatable" objects harmless and can be used when needed : a large roll of aluminum foil and a container (like a Tupperware) with a rubber seal on the lid. You can also buy a pouch identified as a "Faraday bag".
- Meet with interveners in neutral locations rather than in IPV resources (at the CLSC, for example), and prepare realistic pretexts for being in this location.
Technological self-defense tips: When leaving a violent partner
To be on the safe side, we suggest these steps be followed after leaving he home, but before arriving at a safe place or shelter, to keep its location confidential, ideally in a police station parking lot or in a public place to get help in case of danger.
- If part of a family sharing plan on mobile devices, delete the partner's account (if one is responsible for the account) or remove your account and those of your children from the family sharing plan (if one is not responsible for the account). If it's impossible to do this on a device (as is often the case if it belongs to a child), remove its battery (or discharge it completely) and avoid using it until the issue has been resolved;
- Disable the tracking functions on each device that can be tracked : cell phones, smartwatches, computers, tablets, iPods, electronic games, connected toys, etc. If necessary, remove the battery from the devices (or discharge them completely) to temporarily neutralize these functions;
- Visually inspect the car and belongings for GPS devices or other locatable items such as AirTag, Tile, AirPods or other devices;
- Use an application that detects Apple-tracked devices or Tile chips, to receive an alert if a device that doesn't belong to you moves with you;
- If a GPS, AirTag, Tile or other device is located, remove its battery to deactivate it, or wrap the item in aluminum foil (3 layers) and put it in a plastic container with a sealant on the lid to neutralize it.
Technological self-defense tips: After reaching safety
Before modifying anything, it's important to document any evidence of devices being compromised (keep screenshots, photos, locatable items, have a witness, etc.), as this could be a criminal offence that you may want to prove in court .
- Before you start, install anti-virus software and scan for viruses, spyware and malware to eliminate them from your devices and those of your children;
- Remove applications or programs that allow shared access to a device, such as Teamviewer and Anydesk;
- Restore default device settings, after backing up your data;
- Make sure you know the function of every application or program that remains on your device, and eliminate any unknown applications or suspicious files;
- Select the two-factor identification mode for all accounts you wish to keep (social networks, bank or credit card accounts, work-related accounts, certain e-mail accounts, etc.);
- Find out if unknown devices or those belonging to your partner are connected to your accounts, so that you can eject them (you can search for "connection activity" with the account name on the web to find out how);
- Change passwords, use a password manager or device (such as a Yubikey) to increase online account security;
- Close any accounts that you don't use on a regular basis (apps, online accounts like Uber, Amazon, etc.) and re-open new ones as needed;
- If you think that certain devices or services are still compromised, you can have them checked by your employer's IT department, in an electronics store, or with the provider of a service (e.g. cellular service);
- If necessary, to gather evidence and eliminate all risks, you can have your devices professionally appraised. This can be a fairly costly process, but can make it easier to lodge a criminal complaint, for unauthorized use of a computer or harassment, for example.
This article was written with the support of Lab 2038 and Co-Savoir, two non-profit organizations involved in research and intervention at the intersection of digital safety. and intimate partner violence.
Read more
-
Understanding technological violence
-
17 825
-
Reading time : 6 min
-
-
How can I delete my Internet browsing history?
-
How can I surf the Internet anonymously and confidentially?
-
How can I manage my passwords safely?
-
How do I know if an AirTag is nearby on Apple?
-
How do I know if an AirTag is nearby on Android?
-
How do I know if a Tile chip or other Tile partner device is nearby?
-
How to find a hidden camera?
-
Technology Safety and Privacy Toolkit
-
Preserving Digital Evidence Toolkit
Bien que la violence conjugale touche majoritairement des femmes, elle peut aussi toucher les hommes et les personnes issues de la diversité sexuelle et de genre. Les services de SOS violence conjugale sont offerts à toutes les personnes touchées par la problématique.
Questions ?
Need to talk ?
We are here for you.
Next SOS-Info