Is someone checking your browsing? This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly. Learn more about staying safe online

This matrix shows known patterns of technology-facilitated abuse. It is not a complete list — new techniques emerge as technology changes. Click any technique for guidance on what to notice and what you can do.

Need support? 1800RESPECT (1800 737 732) | Emergency: 000 | Limitations & methodology

TFA Matrix

Below are the tactics and techniques representing the SAFE TFA (Technology-Facilitated Abuse) Matrix. This matrix maps the tactics and techniques used in technology-facilitated interpersonal harm.

Surveillance & Tracking Account & Access Compromise Harassment & Intimidation Information Manipulation Isolation & Control Resource & Financial Control Physical Enablement Grooming & Targeted Recruitment Discovery & Preparation
11 techniques 10 techniques 13 techniques 12 techniques 11 techniques 11 techniques 11 techniques 9 techniques 6 techniques