Digital Abuse Wiki#

Android iPhone

What this wiki is for#

This wiki is for the general public of all ages with no technical backgrounds who want to secure their devices or who feel like they might be experiencing digital stalking or abuse. See understanding digital abuse section for more information.

Who it’s meant to help#

This wiki is meant to help anyone who wants to secure their mobile device by guiding them through the process of understanding

  1. what sensitive information your devices can collect,
  2. how to control that information,
  3. and good practices for securing your device to prevent outsider access to sensitive information like your accounts, location information, or financial apps.

While this does not apply to everyone, digital abuse is a real thing, and there are many warning signs this wiki aims to address. Many applications can be used in an unintended way, and can allow another person to access information about your device that you may not intend them to.

In more extreme cases, such as spyware on your device, this guide hopes to address these risks. See understanding digital abuse for more information.

When to Stop and Get Help#

If you are in real physical danger, call law enforcement.

If it becomes unsafe for you to view this page, press the Escape key twice or click the “Exit Site” button at the top-left corner of this page. This will close the tab and bring you to the Google Search page.

If you feel otherwise unsafe or need to make a safety plan, please visit thehotline.org to find resources in your area.

Please see the resources in the banner at the top of this page for more ways to get help.

This is not legal advice, nor advice on how to conduct forensic analysis. Only follow the steps in this wiki if it is safe to do so and will not put you at risk.

  • Important safety note: Only follow these steps if it is safe to do so and will not put you at risk

  • How to get help

    • How Safe Passage can assist
    • Links to external trusted resources (NNEDV, Safety Net Project, etc.)

If you are impacted by any kind of relationship, visit thehotline.org. You can call their helpline on (800) 799-7233.

If you are in an abusive relationship, visit safepass.org. You can call their helpline on (413) 586-5066. Safe Passage’s Domestic Violence Program is a confidential resource that provides free 24/7 phone crisis intervention, counseling, safety planning, support groups, advocacy, shelter, outreach and legal advice and counsel on Probate and Family Court matters for survivors of domestic violence.


Understanding Digital Abuse#

What is digital stalking / tech-facilitated abuse?#

The use of technology (by a partner, stalker, or abuser) to monitor, harass, threaten, or coerce a victim. The internet and social media are commonly used in these cases as they provide a wide variety of resources for communicating with and collecting information about a person.

Common tactics used by abusers#

  • Harassment - unwanted and repeated contact with the victim through digital means, such as texts, calls, direct messages, and emails
  • Intimate Partner Surveillance (IPS) - intentional monitoring of an intimate partner with or without their knowledge. Abusers may use location-tracking apps, spyware, or even social media posts to stalk the victim’s location
  • Account Lockouts - when an abuser restricts victim from accessing their own financial or social media accounts to isolate the victim
  • Image-Based Sexual Abuse (IBSA) - the non-consensual creation and distribution of private images
  • Sextortion (similar to IBSA) - when an abuser threatens to distribute private or explicit images if the victim doesn’t comply with their demands

How abusers may access devices or accounts#

  • Known Passwords
    • If an abuser may have seen or known a password for an account held by the victim, that password may be used or may already have been used to access the account. Any passwords that might have been known should be considered compromised.
  • Shared Access
    • Any victim owned account that has been signed into on a device owned by an abuser is likely still accessible on that device. Linked devices must be unlinked in the account’s settings or the password must be changed in order for the devices to lose access.
  • IoT Devices
    • IoT devices (like some security cameras, health trackers, home assistants etc.) are connected to the internet and are often accessible over the internet. An abuser with access to an account that can monitor or control an IoT device may be able to use them to facilitate stalking.

Myths and misconceptions (e.g., “advanced hacking” vs common access methods)#

  • Abusers use advanced hacking techniques to break into devices.
    • They do not, but will instead use straightforward and easy methods to gain access. These typically include using known passwords or accounts that are already signed in. Gaining access to someone’s account without knowing the password is not something that the average tech-proficient person is capable of.
    • Abusers may use tracking apps, public information lookups, or social media to assist in stalking or harassment but they are not able to gain access to an account using some mysterious hacking technique that nothing can be done about.
  • For a person being digitally abused, law enforcement is the only solution.
    • Accessing non-profits and organizations such as the National Domestic Violence hotline can be reached to create a personal and internet safety plan. Civil legal action such as restraining orders are another option.
  • Digital abuse is less serious than “in-person” abuse
    • Digital abuse is not an entirely separate form of abuse, both may be incorporated alongside each other to facilitate an abusive relationship.
    • In the modern day, so much of a person’s life exists online (finances, work, contacts, communications, ect.), which makes the internet a very real space with high potential for abuse.
  • Survivors should “go offline” to protect themselves
    • Many forms of tech abuse could persist when offline ex. Abusers could utilize banking apps to track spending activity. Furthermore, going offline can cause a victim to lose access to important support networks.

About This Project#

We are the UMass Cybersecurity Club, a student group at the University of Massachusetts Amherst. This wiki is created and maintained by the UMass Cybersecurity Club with the aim to spread awareness of digital abuse and how to protect oneself from its dangers with good security practices.

Do note that this is not legal advice, nor advice on how to conduct forensic analysis. Only follow the steps in this wiki if it is safe to do so and will not put you at risk, and utilize any of the resources in the banner if you feel that you are in any danger.

If you have any questions, suggestions on this wiki, or simply want to contact us, email us at umasscybersec@gmail.com.

If you are in immediate physical danger, call 911!