Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
This framework is under active development. View full limitations & methodology.
| ID | Name | Description | |
| SAFE-T-0145 | Child Custody Tech Abuse | Using location sharing requirements, court-ordered communication apps, parenting coordination platforms, or children's devices to extend surveillance, control, and abuse beyond separation. Exploits legitimate co-parenting technology to maintain perpetrator's access to and control over victim's life through the children. | |
| SAFE-T-0144 | Emergency Service Manipulation | Filing false police reports, fabricating evidence for protective orders, making false welfare check requests, or otherwise weaponizing emergency and legal services against victim. Uses digital tools to create false evidence, coordinate false reports, or manipulate authorities into taking action against victim. | |
| SAFE-T-0141 | IoT Device Weaponization | Using smart home devices to create fear, disorientation, or physical discomfort. Includes randomly triggering alarms, playing sounds through speakers, turning lights on/off, changing temperature extremes, activating cameras, or other manipulations of the smart home environment designed to terrorize victim. | |
| SAFE-T-0164 | Legal System Abuse / Litigation Abuse | Using repeated court applications, vexatious claims, subpoenas, discovery requests, or procedural motions as financial and psychological weapons. Filing and withdrawing AVOs, repeated custody variations, dragging out property settlements, issuing subpoenas to employers or therapists. Each action costs the victim money and emotional energy. The lega... | |
| SAFE-T-0136 | Location-Based Assault | Using GPS tracking, location sharing, or other surveillance techniques to determine victim's real-time location and then physically approaching or assaulting them. Technology enables perpetrator to find victim at any location, negating traditional safety measures like staying with friends or varying routines. | |
| SAFE-T-0142 | Medical Device Interference | Tampering with victim's connected medical devices, health monitoring equipment, or health data. May include altering medication reminder settings, manipulating health data to affect treatment decisions, disabling monitoring devices, or interfering with telehealth appointments. Creates direct physical health risks. | |
| SAFE-T-0138 | Movement Interception | Using location tracking data to intercept victim during travel, at appointments, or at known destinations. Perpetrator uses real-time or predicted location information to position themselves along victim's route or at their destination. Creates a sense of inescapable surveillance and control. | |
| SAFE-T-0137 | Safe Location Disclosure | Revealing the location of victim's shelter, safe house, refuge, or hidden address to the perpetrator or others. May involve sharing information publicly, telling mutual contacts, or using technology to discover and disclose the protected location, directly endangering victim's physical safety. | |
| SAFE-T-0139 | Smart Lock Manipulation | Remotely locking victim inside or outside of their residence, changing access codes, or manipulating smart lock systems to control victim's physical movement and access to shelter. May also include granting access to others or monitoring entry/exit patterns. | |
| SAFE-T-0143 | Stalking Coordination | Using technology to plan, coordinate, and execute physical stalking of victim. Includes using location data to track patterns, mapping victim's routine, coordinating with others to maintain surveillance, and using digital tools to avoid detection. Technology amplifies traditional stalking by providing real-time intelligence. | |
| SAFE-T-0140 | Vehicle Sabotage | Remotely disabling, manipulating, or monitoring victim's connected vehicle. Modern connected cars may be remotely controlled through manufacturer apps, including locking/unlocking, starting/stopping engine, tracking location, and in some cases controlling speed or braking. May also include disabling vehicle through telematics systems. | |