Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
This framework is under active development. View full limitations & methodology.
| ID | Name | Description | |
| SAFE-T-0079 | Calendar/Schedule Surveillance | Accessing victim's calendar applications, booking systems, medical appointment portals, or work schedules to track movements and anticipate whereabouts. May exploit shared family calendars, compromised account access, or work systems to build a detailed picture of victim's routine. | |
| SAFE-T-0161 | Child Device Monitoring Abuse | Using parental monitoring on children's devices to surveil an ex-partner's activities, location, and communications through the child. The child's device becomes a surveillance tool against the other parent. Distinct from Child Custody Tech Abuse (SAFE-T-0145) where the child is the target — here the child is the vector. | |
| SAFE-T-0076 | Communication Interception | Accessing victim's emails, text messages, voicemails, and other communications through compromised accounts, email forwarding rules, message mirroring, or linked devices. Perpetrator reads, copies, or monitors communications without victim's knowledge, gaining intelligence about victim's plans, support network, and emotional state. | |
| SAFE-T-0081 | Fitness/Health Tracker Surveillance | Monitoring victim through health and fitness applications, wearable trackers, period tracking apps, sleep monitors, or medical portals. These platforms often contain highly sensitive data about location, physical activity, health conditions, reproductive status, and daily routines. | |
| SAFE-T-0078 | Network Traffic Monitoring | Monitoring victim's internet activity through router administrative access, DNS logs, or network monitoring tools. Perpetrator can see websites visited, search queries, app usage patterns, and connected devices. May install network-level monitoring tools or exploit existing router features. | |
| SAFE-T-0073 | Physical Tracker Planting | Placing GPS tracking devices such as AirTags, Tile trackers, or vehicle GPS units in victim's belongings, vehicle, or on their person without consent. These commercially available devices are inexpensive, small, and designed for long battery life, making covert placement easy. Perpetrators use them to monitor victim's movements, identify frequented... | |
| SAFE-T-0074 | Shared Account Surveillance | Exploiting legitimately shared accounts or location sharing services (Find My Friends, Google location sharing, family phone plans) to monitor victim beyond the scope of original consent. Often occurs in relationships where sharing was mutual but continues after separation, or where the perpetrator coerces ongoing access under the guise of reasonab... | |
| SAFE-T-0077 | Smart Home Surveillance | Using shared smart home devices including cameras, video doorbells, baby monitors, voice assistants, and other IoT devices to monitor victim's presence, activities, conversations, and visitors. Often exploits devices installed during cohabitation where perpetrator retains administrative access after separation. | |
| SAFE-T-0075 | Social Media Monitoring | Systematic observation of victim's public and semi-public social media activity, connections, check-ins, likes, comments, and tagged posts. May include creating fake accounts to follow private profiles, monitoring friends' posts for references to victim, or using social media analytics tools to track patterns of activity and connections. | |
| SAFE-T-0072 | Stalkerware Installation | Installing hidden monitoring software on victim's device to track location, messages, calls, photos, and keystrokes. Stalkerware (also called spouseware or creepware) is commercially available software marketed for 'parental monitoring' or 'employee tracking' but frequently used for intimate partner surveillance. These apps typically hide their pre... | |
| SAFE-T-0080 | Third-Party Monitoring Recruitment | Enlisting friends, family members, mutual contacts, or acquaintances (sometimes called 'flying monkeys') to monitor and report on victim's activities, location, companions, and emotional state. May involve deliberately maintaining relationships with victim's contacts for intelligence gathering purposes. | |