Safety and security strategies
Now that you have identified your vulnerabilities and are prepared to document your abuser, let’s get into security strategies you can begin implementing TODAY to thwart your stalker.
Although everyone’s vulnerabilities will be slightly different, this advice has been written for someone suffering from a moderate degree of stalking.
We’ve also included advice for people at high-risk, cases in which your abuser's skills, resources, connections, or corrupt national policing\/surveillance systems, makes it easier to track you online.
Cross-cutting best practices
Sending information via the internet, either through a computer or through your mobile phone, has the risk of compromising your safety.
Mobile phones and computers store all sorts of data, like your call history, text messages sent and received, documents, calendar, address book information, photos, video clips, and text files.
Furthermore, your social media presence, email, and websites visited reveal further information about you that a stalker could use to their advantage. In the wrong hands, your contacts, movements, preferences and likes could make you very vulnerable.
Therefore, the more technology you use, from apps to devices and everything in between, the more responsible you should be with your data. But don’t fear - the following information will help you take steps to ensure your devices and information are as secure as possible.
Securing your devices
All of the following applies to you, any children you may have, anyone that has stayed in the same house as your abuser, or anyone whose devices are accessible by them.
When possible, keep your devices safe or in your possession at all times to ensure that they do not fall into the wrong hands (i.e. mutual contacts you share with your abuser).
Use complex passcodes that are unlikely to be guessed. Where possible, use two-step verification (see the Reference section at the end of this guide).
Store as little data as possible on your phone.
Remember that no phone is 100% secure. If your abuser can track you, consider leaving your phone at home, or use a disposable phone.
Last updated