Perpetrators will often misuse technology to further abuse and control women and their children. Misuse of technology could include monitoring technology use, including computers or smartphones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of women online.

In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.

The first step is to document everything that is happening. Documentation is important for many reasons:

  • It will give you a record of what is happening, which may be helpful if you want to pursue legal actions.
  • It will also alert you to any escalation in monitoring and control, which may indicate that the danger is increasing as well.
  • It will help you see patterns of the technology-facilitated violence and may help determine how the perpetrator is misusing a particular technology.

 

DOCUMENTATION TIPS

  • Keep a log of all incidents, even if you are not sure that you want to involve the police. Some of the information you might want to include is the date, time, location, officer information (if reported), witnesses (if any), suspected technology involved (e.g., phone, email, etc.) and a brief description of what the perpetrator did.
  • Save everything related to the event or incident. If you receive a threatening note or a threatening message by email, text message, or voice mail, make sure you save it. Take a photo or screenshot of the message. While it may be tempting to delete it, saving it could show patterns to help you determine safety strategies and provide needed evidence.
  • Think about technology that you suspect the perpetrator could be using. In some cases, women have strong suspicions about what technology the perpetrator is using based on the type of abuse, the tactics involved, and what they know about the perpetrator.
  • Think about your safety first. In some cases, when perpetrators know that women are documenting the abuse they might escalate their monitoring, control, or physical violence. You will know best how to assess the situation and what could happen. Trust your instincts and do what is safest for you.
  • Document only relevant information. Keep in mind that this information could potentially be introduced as evidence or inadvertently shared with the perpetrator at a future time. For example, you may not want to document personal photos that aren’t being used as part of the abusive tactic.

 

WHAT TO DOCUMENT


Email

  • Emails contain IP addresses, which could reveal the originating IP address and, therefore, the identity of the sender. Because of that, it’s important not to delete the email and not forward the email to someone else.
  • If you are saving email content by printing or taking screenshots, be sure to also save the email header (often hidden and can be found in the settings), which is where the IP information is stored. Depending on the email platform you are using (Gmail, Outlook, Yahoo! Mail, etc.), how you access the email header will be different.
  • If you’re concerned that the perpetrator could access the account and delete emails, then try to print out or take screen shots of the content, including the headers. Forwarded emails will lose the identifying information needed for evidence.

Text Messages

  • Text messages that are just stored on a phone may be inadvertently deleted or may be automatically deleted if you run out of space. Take a screenshot or picture of the text messages to retain the evidence.
  • Also, take a screenshot of the contact page to show that the harassing messages from the perpetrator are associated with the perpetrator’s phone number.
  • Text message content is kept by the wireless carrier only for a limited time. If you are working with law enforcement, be sure to ask them to send a preservation letter to the phone company as soon as possible, so the phone company knows not to destroy the data.

Social Media/Internet Harassment

  • To keep evidence of harassment on social media, take a screenshot of the harassment/abuse on your computer or device.
  • Some sites offer alternative ways to document activity on the site or on your page. For example, using Facebook’s “Download Your Information” (DYI) feature, you can capture all content and save for later.
  • If working with law enforcement, they could send a letter to the social media or website company and ask them to preserve the account information and to not delete it.
  • You may consider reporting the harassment to the social media or website company. If it violates the site’s terms of service or content guidelines, they may remove the content. However, be sure that you document the abuse first if you want evidence of it.

Harassing Phone Calls

  • You could consider recording your phone conversations to keep evidence of harassing or threatening calls. However, check whether your province or territory allows you to record phone conversations without the informing the other party. Some provinces and territories, like British Columbia, will allow phone conversations to be recorded as long as one party is aware that the conversation is being recorded while other provinces require that both parties are aware.

Phone Number/Caller ID Impersonation

  • Document your call logs by taking a photograph of the Caller ID. Be sure to include the date and time of the calls.
  • Keep your phone records to show the number of the originating call, date, and time.

On a following document there is a technology-facilitated violence log that can help you document what is happening to you.

 

©2019 BC Society of Transition Houses, Technology Safety Project.

Adapted from and in cooperation with the Safety Net Technology Project at the National Network to End Domestic Violence, United States