Digital Stalking: The Risks
This page is designed to give you the information regarding your online safety. It is not designed to scare you or to make you feel that you have to limit how much time you spend on the computer or on your phone. Instead, we want to help you identify risks and work to help you minimise and manage them.
- You can download our digital safety checklist here, but if your computer is shared then please delete this from your downloads folder.
Your Digital Footprint
Every time that we go online, use our mobiles or any other kind of technology we leave behind a digital footprint. This shadow includes details of what sites we visit, who we call or speak to, the location of where we do this, details of your friends and much more.
If someone knows your passwords or usernames the amount of information that is out there for them to access increases greatly. "Private Browsing" or "Incognito" windows can be useful when viewing information online that you do not wish to have stored on your internet history. Pages you view in incognito/private tabs won’t be available in your browser’s history, cookie store, or search history after you’ve closed all of those tabs. Any files you download or bookmarks you create, however, will be kept.
It is important to note that private browsing will not hide your browsing from your employer, your internet service provider, or from any websites you visit.
Computer spyware is a growing trend and becoming more accessible as it is easy and completely legal to buy. Computer spyware is software which allows the person who has installed it to watch what a computer is doing; in some instances this can mean watching it live as you visit websites, read what you type and literally see what you see.
The software is very easy to install and can be done either manually with physical access to your computer or via email attachment that once opened uploads the software without your knowledge.
Until you have run anti-spyware software through your computer you should assume that it has been tampered with and is therefore unsafe.
You can install free anti spyware software for your Windows computer by visiting www.windows.microsoft.com/en-US/windows7/products/features/windows-defender. It is completely free and gives you a step by step guide of how to install the protection software.
If you have an Apple Mac computer you may use the following anti-virus and spyware software http://www.avg.com/gb-en/avg-antivirus-for-mac which is also free and easy to use.
Social Engineering is effectively confidence tricking through technological means. A person can find out things about you by using basic information that they have found either via your digital footprint or via non-safe social networking sites. For example;
Sarah posted on her facebook page “Can’t believe I have been waiting at the doctors for an hour just to get my prescription”. Dan, Sarah’s brother commented on her status “That’s awful! Doctors are terrible round here!” Steven, Sarah’s ex can see that Dan commented on Sarah’s status that she has been to the doctors. Steven then called Dan pretending to be the doctors asking for Sarah’s new number to give her test results. Dan, meaning well, gives it to him.
Social Engineering can also include tricking a person to give out their passwords or bank details.
Mobile Phone Safety
There are a number of ways that mobile phones can be threatened.
Similar to computer spyware, mobile spyware is designed to give access to your phone without having to be in the physical presence of it. It can allow the person who installed the spyware to; listen in to your calls, control the functions of your phone, send copies of all your text messages to the spy’s email account, intercept calls, block calls without you knowing and hide all contact from selected numbers.
You can remove mobile spyware by returning your phone to its original factory setting, which is usually an option under your phone’s settings or options. (Make sure that any app purchases are backed up before you do this otherwise you will lose your saved data.)
This uses local signal masks to locate your phone at any one point. Usually this is only done by mobile phone operators but they are legally able to sell this for the purposes of monitoring children etc.
This is when a phone captures where it is at any one point and attaches this location to an update, an email or a photo. There is also the danger of Google Panoramio and other similar sites. These sites add your photo to Google Maps in the area that they were taken. (For example; if you uploaded a photo which was geotagged to Ramsgate, if you searched Ramsgate in the Google Maps- your photo could come up.)
You can very simply turn of Geotagging and Geolocation by changing your location preferences in your phone’s settings and pressing to disable finding your GPS location.
Social Network Sites (Facebook, Instagram, Twitter)
When moving to a new place, facebook and similar sites can be a good way to keep in touch with your friends and family. The problem is however, that someone who wants to find out information on you and track what you are doing or where you are living will also know this and may look to exploit it. Unless your privacy settings, and all of your friends’ privacy settings and all of their friends’ privacy settings (and so on and so on) are high, then leaks of information will happen.
If you have not disabled Geotagging or Geolocation, every time that you post a status to facebook it will post your location as well. You are able to disable location settings for one app and not for another. Therefore you may still wish to use Google Maps or another app which needs your location, but social media sites will not be able to publish your location.
Instant Messaging Applications (Snapchat, Whatsapp, Kik)
Instant messaging applications often have all privacy settings disabled when you first make an account. This means that your information, profile picture, and name are often available to anyone using that site unless you actively change this. For most applications it is as simple as accessing settings and then selecting privacy and choosing which information you wish to remain private and what you may wish to share.
With Snapchat you can customize who can send you "snaps" and see your "stories" in settings. Set "Who Can Send Me Snaps" to either 'Everyone' or 'My Friends' and "Who Can View My Story" to either 'Everyone,' 'My Friends,' or 'Custom'. By default, only users you add to your friends list can send you Snaps. If a Snapchatter you haven't added as a friend tries to send you a Snap, you'll receive a notification that they added you, but you will not receive the Snap they sent unless you add them to your friends list.
With every instant messaging application it is paramount that you ensure you know who is on your friends list and has access to your information. However with Snapchat it is also important to note that anyone can take a screenshot of a "Snap", or simply use another camera to take a picture of a "Snap" that appears on their screen.
These risks are not exclusive to victims of domestic violence as they are real to any person that uses a mobile phone or the internet. Some of the risks may apply to you more than others, and some might not at all. However, it is better to assume that you are at risk and work to manage and minimise any potential issues to ensure that you can continue to live free from intimidation and harassment.
Technology can also help make you safer
One example of this is the Hollie Guard App turns your smartphone into an advanced personal safety device at the touch of a button. If in danger simply shake your phone to generate an alert, your location, audio and video evidence of the incident will automatically be sent to your emergency contact via text and email. Shake it again and it sends out a high pitched alarm and the flash starts to strobe, in order to attract maximum attention.