SPYWARE: COMPUTER & PHONE MONITORING SOFTWARE
- It enables a person to secretly monitor someone else’s entire computer or smartphone activity.
- It can be installed remotely by sending an email, photo or instant message.
- It runs hidden on a computer or smartphone. It is very difficult to detect and almost impossible to remove. Some secretly reinstall, even when removed.
- It can record and send screenshots (pictures of what’s on the screen), all keystrokes typed, web sites visited, emails sent, instant messages (IM), accounts accessed, passwords typed, and more.
- When you first get a new computer or phone, increase security by enabling firewalls for your computer, network or phone (see settings) and install or run anti-spyware and anti-virus software; set your computer or device to automatically install updates.
- Don’t open any attachments if you don’t know the sender, or you suspect abuse. Instead delete the attachment or have IT staff look at it.
- Trust your instincts. If someone knows too much about your computer or phone activity, your devices may be monitored. Use a “safer” phone or computer (one the perpetrator does not have any access to) for private communications and web browsing.
- Consider changing passwords and creating new accounts on another phone or computer. Do not access those accounts or use those passwords on the monitored computer or phone.
KEYSTROKE LOGGING HARDWARE
- It provides a record of all keystrokes typed on a keyboard.
- Someone needs physical access to the computer to install and later retrieve the device with the data log of all your keystrokes.
- A perpetrator may use it to see the passwords you type and then be able to access your email, credit card or bank accounts, etc.
- Has someone fiddled with, fixed or given you a new part for your computer?
- Look for a small piece that connects the keyboard cord to the computer; it can also be part of an external keyboard, or something installed inside a laptop.
- Change passwords on accounts from another computer and do not access those accounts from the compromised computer. With some services, you can ask to get an alert (e.g. fraud alert) if your password gets changed or your account gets changed.
GLOBAL POSITIONING SYSTEM (GPS) DEVICES
- They are small, easily hidden, and affordable devices that provide the ability to monitor someone’s location.
- Many smartphones and fitness trackers also have GPS devices.
- They might be used to track your location in real-time (as you move) or to map your location history.
- Depending upon the service or application used to access GPS data, the perpetrator may be able to secretly monitor your location via websites or sometimes via their phone. Some devices must be physically retrieved for the perpetrator to review your location data.
- Trust your instincts. If someone seems to know too much or show up in random places, check for hidden GPS devices or other location tracking services. Consider notifying law enforcement.
- A device can be hidden in your belongings or vehicle. Check the trunk, under the hood, inside the bumper and seats. A mechanic or law enforcement can also do a search.
- Safety plan around/before removal of any location tracking device, as it may alert the perpetrator.
- Phones can be a lifeline for women.
- Phones can be hidden inside vehicles as listening devices by using the “silent mode” and “auto answer” features.
- Most phones have GPS chips and location tracking abilities, which can be used to determine someone’s location. Some perpetrators install additional applications on a smartphone to track your application.
- Logs showing phone usage may be monitored on the actual phone, monthly invoices received in the mail or over the Internet via the phone company’s online billing record.
- Joint phone plans with the perpetrator may give that person access to phone features and calling log information.
- If your phone has a Bluetooth device, the perpetrator might try to connect with your phone using the Bluetooth to access information on your phone or intercept your communications.
- For additional privacy and safety, consider getting a separate donated phone from a shelter or purchasing a new phone (e.g. a pay-as-you-go phone).
- Mechanics or law enforcement can check the vehicle to determine if a phone has been hidden somewhere.
- Contact your wireless carrier to add a password or code to account to protect from wrongful access.
- You can change the phone’s location setting to “E911 only” or “911 only” so that the phone company only access your GPS if you dial 911.
- Also check if your phone has any applications installed that separately ask to access and use your real-time location, such as for mapping directions. Settings such as “show all/hidden applications” might unveil some hidden applications. Consider turning off or uninstalling these applications.
- Use phone settings to change your default Bluetooth password, set Bluetooth to hidden, and turn Bluetooth off.
- Always give location information to 911 or your local emergency contact in an emergency.
CALLER ID & SPOOFING
- Reverse directories can provide location based on a phone number.
- Services like Trapcall, can unblock a blocked number without notice.
- Caller ID can be spoofed to falsify the number displayed when you get a call.
- If you call a person using an Internet phone, your blocked number may be displayed.
- Women can contact the phone company and ask that their phone number be blocked to protect privacy. Blocking is supposed to prevent your caller ID from displaying. However, even with a blocked number, sometimes your caller ID will still display. Consider using another phone or outgoing phone number.
- Regularly test the line by calling other phones to ensure it is blocked.
- Use an Internet phone (i.e., Skype) or a pay-as-you-go phone purchased with cash to make calls if you are worried about your number / location being revealed.
- Fax headers include sender’s fax number, which can be used to determine location thru reverse look-up.
- Fax machines often now have hard drives and extensive memory. Consider privacy, confidentiality and confidential issues when deciding what fax machine to use or giving your personal information to programs who will fax your information as part of a referral.
- Electronic faxes (e-fax) are sent through the Internet as email attachments and, like all email, can be intercepted.
- Also, because e-faxes get sent via a 3rd party and are temporarily stored on a 3rd party Internet server, there are different confidentiality and security risks.
- Cover sheet can request that the header be removed before forwarding.
- If it’s legal, consider changing the outgoing fax number displayed to a different number on a case by case basis for safety or privacy reasons.
- Never send personally identifying or sensitive information in an E-Fax.
- Make sure you know who is receiving the fax. Call ahead. Some fax machines require the receiver to type in a password to see the fax.
- Because cordless phones transmit your conversation wirelessly between the base unit and phones, they can more easily be intercepted by scanners, baby monitors, & other cordless phones.
- If you do not unplug the base unit, the phone may continue to broadcast for the duration of a call, even after you switch to a corded phone, allowing for the possibility of continued interception.
- Switch to a corded phone before exchanging sensitive information.
- Unplug a cordless phone from the power source, even after the corded phone has been turned off or hung up to ensure that the current call’s conversation won’t still be broadcast and overheard.
- Best practice is to limit information discussed or not use cordless phones for confidential communications with women.
- A communication tool for people who are Deaf or hard-of-hearing that connects to a phone line.
- Can be misused to impersonate someone.
- All TTYs provide some history of the entire conversation. The history and transcripts of TTY calls might be recorded on paper or electronically. The perpetrator might monitor this information or misuse it; in some cases, a woman might be able to introduce a transcript of a threatening TTY conversation as evidence.
- Create a code word or phrase to ensure the identity of the person on other end and to avoid impersonation.
- Regularly clear TTY history unless a cleared history would increase risk.
- Best Practice: Organizations should clear their TTY memory, avoid printing transcripts, and shred all printed transcripts of TTY calls, unless the woman explicitly requests that one printed transcript be kept for safety or evidence reasons.
- A free service where a third party (operator) facilitates a conversation for a person who is Deaf, hard-of-hearing, or has a speech disability.
- Users may access relay services via a video phone, web cam, computer, TTY or other device. They might use a phone line, Internet or cable connection.
- Can be used to impersonate someone.
- Relay conversations and devices may be monitored.
- Establish secret code words or phrases to ensure identity of person.
- If possible, use a “safer” TTY, device, or computer to access relay (one the perpetrator hasn’t had access to).
- Be aware that relay conversations might be secretly recorded by the perpetrator using spyware or video recording.
- When possible, meet in person to discuss sensitive information.
- Best practice: Relay services are not a substitute for providing interpreters. Organizations should always offer an in person certified sign language interpreter. Additionally, agencies can contract with Video Remote Interpreter (VRI) services. These are not video relay services but use similar technologies; an agency would need to have a high-speed connection and video phone or web camera. An organization can contract with a VRI provider to be on call remotely 24X7 in case a woman arrives and needs an interpreter quickly.
- It is like a postcard and is not a private form of communication.
- Can be monitored and intercepted in a variety of ways, many times without your knowledge. Perpetrators can intercept and monitor email using spyware or by getting your password; they might change your email settings so they can get secretly forwarded or secretly copied (designated as bcc) on every email you send or receive from that account.
- Avoid using email for sensitive or personal information.
- If you think your email is being monitored, consider creating an additional new email account on a safer computer. Never access the new accounts on a monitored computer (see above).
- When setting up a new email account, don’t use any identifying information.
- Avoid passwords that others can guess.
- If you receive threats by email, save the electronic copies. Keep the emails in the system, but also consider forwarding a copy to another email account. You can also print copies of the email; see if the print version can display the full email header.
- Consider reporting email threats or hacked accounts to law enforcement. These are crimes and the police can use email header information to help trace emails to the original sender.
- Affordable, accessible, and easy to install, cameras come hidden in various items (clocks, plants, etc.).
- Can be wired into your house or transmit wirelessly.
- Can be very difficult to detect.
- Can create image files that include time, date and location data.
- Perpetrators can install camera surveillance and monitor all your activity remotely over the Internet.
- Trust your instincts. If the perpetrator knows something that can only be seen, a camera may be being used.
- Camera detectors can help to find wireless cameras that are giving off a signal, but will not detect a wired camera.
- Law enforcement may help to search for hidden cameras.
PERSONAL INFORMATION & THE INTERNET
- All kinds of public and private organizations, agencies, services and businesses collect and share information about people. These can include government and nongovernmental organizations, community groups, schools and online sites such as social networking, gaming or job sites. Search engines index the web and create virtual card catalogs. Some search deep into online databases and compile extensive profiles on people.
- Identifying information may be online without women’s’ knowledge.
- Perpetrators use the Internet to find information about women including the location and contact information of women. They also use online spaces to defame, target and damage the reputation of the woman.
- Do searches on yourself to see what information is available.
- Be cautious and creative when providing personal information: only provide information that you feel is critical and safe for things like store discount cards.
- Ask schools, employers, courts and government services about Internet publications. Request that your information and photos not be posted in public directories or online. In court systems, ask up front how your court records can be sealed and not posted online for safety reasons.
- If you have a Peace Bond or Family Protection order, providing that can expedite these requests.
©2019 BC Society of Transition Houses, Technology Safety Project.
Adapted from and in cooperation with the Safety Net Technology Project at the National Network to End Domestic Violence, United States