Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
Important: Always consider your physical safety first.
This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances particularly if the person causing harm could notice changes to your devices or accounts.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Exploiting legitimately shared accounts or location sharing services (Find My Friends, Google location sharing, family phone plans) to monitor victim beyond the scope of original consent. Often occurs in relationships where sharing was mutual but continues after separation, or where the perpetrator coerces ongoing access under the guise of reasonable family coordination.
Location Sharing Audit Review all location sharing configurations across devices and services. Disable unauthorised sharing.
SAFE-M-0011
Account Separation Migrate to individual accounts for services previously shared. Use new credentials unknown to adversary.
SAFE-M-0012
Carrier Account Review Assess family phone plan features that expose location or usage data. Plan migration to individual account.
Detection Indicators
ID
Detection Indicator
SAFE-D-0010
Shared Account Data References Adversary references location, purchases, or activities visible through shared account access.
SAFE-D-0011
Active Location Sharing Discovery Audit reveals location sharing enabled with adversary's account.
SAFE-D-0012
Unknown Devices on Shared Accounts Unrecognised devices listed in shared account trusted device lists.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.