Jump to content
  • Sign Up
×
×
  • Create New...

Is your smartphone being tracked? Here’s how to tell | Domestic violence


Recommended Posts

  • Diamond Member

This is the hidden content, please

Is your smartphone being tracked? Here’s how to tell | Domestic *********

We’re looking for apps I don’t remember downloading, and which platforms can access my smartphone’s camera or microphone; who else can see my calendar, my notes, my emails.

We also check the basics: whether my device is actually registered to my name and email address, and whether I have two-factor authentication turned on.

Rose MacDonald, cofounder of Nansen Digital Forensic Services, is walking me through the digital safety audit she provides to victim-survivors of family *********. I’m talking to the former police detective and digital forensics specialist so that I can better understand the experience of people who are subject to this kind of ****** – and how they can minimise the risks.

We examine who might be able to access my

This is the hidden content, please
or iCloud accounts. What third-party platforms are connected to the account, and whether my emails are being forwarded to another address.

Sometimes when MacDonald does these audits she finds hi-tech surveillance tools – spyware, for example, which buries itself deep in your phone’s software. But this kind of technology costs money and much more often, she says, perpetrators take advantage of the opportunities for surveillance offered by everyday features: the shared accounts or location sharing tools that reveal more than we realise.

“What we find more typically is misconfiguration of normal settings … and breaches of the cloud environment. If they’ve got a username and password to something, you don’t really need a lot of technical knowledge,” she says.

The use of technology to “control, ******, track and intimidate” is a common feature of family ********* in Australia.

This is the hidden content, please
in 2020 found that almost all of the 442 frontline DV practitioners surveyed had had clients “who had experienced technology-facilitated stalking and ******”, with particular risks for women with disabilities or those who are from Aboriginal, Torres Strait Islander or non-English speaking backgrounds.

Advocates have told Guardian Australia about trackers in cars and secret cameras, but also messages of intimidation sent via bank transfers and even online shopping purchases.

“It can be really insidious [and] really difficult, if you think about how many accounts you have on different sites, how many passwords,” says Rosa Grahame, principal solicitor of the family law practice at Women’s Legal Centre ACT.

‘I thought he was being a nice guy’

In my audit, MacDonald and I talk about my wifi network at home and who set it up; whether the password has been changed. Do I know what it is? We check whether my calls are being forwarded to another number.

We look at my Bluetooth connected devices. If I had a smartwatch, for example, this is where we might have a discussion about who bought it – was it me or someone else? “We start thinking about [whether] the perpetrator of ********* got access to the account [and] the health data, which might show your location,” MacDonald says.

In my audit, we talk about my wifi network at home and who set it up; whether the password has been changed. Photograph: Carly Earl/The Guardian

As she runs forensic software that looks for traces of foreign devices and suspicious activity, MacDonald says the audits are also about education. She wants people to leave understanding the relationship between their device and the cloud.

“I explain to them … if a perpetrator got into this environment … they can access your Gmail, they can access maps, they can access your documents,” she says.

These scenarios are familiar to Lauren*, whose partner subjected her to years of what she now sees as coercive control. “I thought he was being a nice guy when he bought me a brand new phone and set it up on his business account,” she said. “But it was really so that he had access to all my text messages and who I’m calling.”

He also set up her email, she says, and was able to get into her

This is the hidden content, please
account. Later, he would confront her over innocuous messages. “It’s a campaign for dominance and control over someone,” Lauren says.

During the audit, we scroll through my phone’s family sharing settings. MacDonald tells me that if I log in from a new location to a shared account for a streaming platform, for example, a prompt might be sent to the original account – giving me away.

Ultimately, in a family ********* situation, it could be a child’s account that reveals my movements and location – even the app that sends

This is the hidden content, please
. One trend Grahame from the Women’s Legal Centre has observed is perpetrators giving children items to enable GPS monitoring, such as a smart watch. In another case, a man
This is the hidden content, please
in his daughter’s toy frog.

Criminologist Molly Dragiewicz of Griffith University has researched

This is the hidden content, please
in technology ****** via everything from mobile phones and GPS tracking to gaming devices and social media. She says some forms of surveillance-like tracking apps have been normalised between parents and children.

“The same exact technologies can be used for good or to do harm depending on the context of the relationship,” she says. “It’s not about specific technologies. It’s about the context in which they’re used.”

Audits need to be trauma-informed

Digital safety audits like the one I undertook with MacDonald are not easily accessible, and funding can vary by state. In Victoria, programs such as the Personal Safety Initiative can help facilitate access to safety audits among other security steps. But if a victim-survivor uses a private service, the cost can run to hundreds of dollars.

Another concern raised by several advocates is the lack of vetting of those in the private security space – as well as whether they are properly trauma-informed and aware of the specific risks related to family *********.

Diarmaid Harkin, a senior lecturer in criminology at Deakin University, has researched

This is the hidden content, please
offered for technology-facilitated ******. He says any claims about technology that can “detect” spyware needs to be deeply scrutinised, as the sector is rapidly evolving and there will always be limitations.

“Those [tech safety] audits themselves need to be audited,” Harkin says. “Is the advice appropriate from a technical perspective, but also is it appropriate in the context of domestic *********?

MacDonald also believes the security industry needs better standardisation when it comes to family ********* safety assessments, to ensure risks aren’t being missed. She says she’s seen some providers do a “factory reset” on phones, for example, erasing important evidence that might be needed in court.

It might also simply be unsafe for the victim-survivor to disconnect the perpetrator from their devices without first consulting family ********* services or police, she says. “If we find a compromise, then we have a discussion around the best way to manage it. If I was to cut that access off without any further safety planning, that could escalate behaviour.”

Even as the government pushes digital platforms to design for safety first, we can’t promise victim-survivors absolute security, Dr Dragiewicz says. Spyware is constantly evolving, but also the technology we need to function every day – to work, communicate and pay bills – creates risks. It’s not realistic to simply ask people to disconnect, she says.

“A lot of the responsibility for taking care of tech safety is offloaded on to the victim. We’re not actually addressing or interrupting the behaviour of the abusers,” she says.

Lauren now works with a group called DV Safe Phone, which provides free mobile phones to victim-survivors of family *********.

“Certainly, when someone’s after power and control, they know how much everyone relies on our phones now,” she says.

“To be able to have access to a phone that they don’t know about … it can really be life-changing.”

* First name only for privacy reasons.



This is the hidden content, please

#smartphone #tracked #Heres #Domestic #*********

This is the hidden content, please

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.