Is someone checking your browsing? This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly. Learn more about staying safe online
Need support? 1800RESPECT (1800 737 732) | Emergency: 000

Physical Enablement

Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.

If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.

This framework is under active development. View full limitations & methodology.

Techniques

Techniques: 11
ID Name Description
SAFE-T-0145 Child Custody Tech Abuse Using location sharing requirements, court-ordered communication apps, parenting coordination platforms, or children's devices to extend surveillance, control, and abuse beyond separation. Exploits legitimate co-parenting technology to maintain perpetrator's access to and control over victim's life through the children.
SAFE-T-0144 Emergency Service Manipulation Filing false police reports, fabricating evidence for protective orders, making false welfare check requests, or otherwise weaponizing emergency and legal services against victim. Uses digital tools to create false evidence, coordinate false reports, or manipulate authorities into taking action against victim.
SAFE-T-0141 IoT Device Weaponization Using smart home devices to create fear, disorientation, or physical discomfort. Includes randomly triggering alarms, playing sounds through speakers, turning lights on/off, changing temperature extremes, activating cameras, or other manipulations of the smart home environment designed to terrorize victim.
SAFE-T-0164 Legal System Abuse / Litigation Abuse Using repeated court applications, vexatious claims, subpoenas, discovery requests, or procedural motions as financial and psychological weapons. Filing and withdrawing AVOs, repeated custody variations, dragging out property settlements, issuing subpoenas to employers or therapists. Each action costs the victim money and emotional energy. The lega...
SAFE-T-0136 Location-Based Assault Using GPS tracking, location sharing, or other surveillance techniques to determine victim's real-time location and then physically approaching or assaulting them. Technology enables perpetrator to find victim at any location, negating traditional safety measures like staying with friends or varying routines.
SAFE-T-0142 Medical Device Interference Tampering with victim's connected medical devices, health monitoring equipment, or health data. May include altering medication reminder settings, manipulating health data to affect treatment decisions, disabling monitoring devices, or interfering with telehealth appointments. Creates direct physical health risks.
SAFE-T-0138 Movement Interception Using location tracking data to intercept victim during travel, at appointments, or at known destinations. Perpetrator uses real-time or predicted location information to position themselves along victim's route or at their destination. Creates a sense of inescapable surveillance and control.
SAFE-T-0137 Safe Location Disclosure Revealing the location of victim's shelter, safe house, refuge, or hidden address to the perpetrator or others. May involve sharing information publicly, telling mutual contacts, or using technology to discover and disclose the protected location, directly endangering victim's physical safety.
SAFE-T-0139 Smart Lock Manipulation Remotely locking victim inside or outside of their residence, changing access codes, or manipulating smart lock systems to control victim's physical movement and access to shelter. May also include granting access to others or monitoring entry/exit patterns.
SAFE-T-0143 Stalking Coordination Using technology to plan, coordinate, and execute physical stalking of victim. Includes using location data to track patterns, mapping victim's routine, coordinating with others to maintain surveillance, and using digital tools to avoid detection. Technology amplifies traditional stalking by providing real-time intelligence.
SAFE-T-0140 Vehicle Sabotage Remotely disabling, manipulating, or monitoring victim's connected vehicle. Modern connected cars may be remotely controlled through manufacturer apps, including locking/unlocking, starting/stopping engine, tracking location, and in some cases controlling speed or braking. May also include disabling vehicle through telematics systems.