Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
Someone closely monitors your social media accounts — tracking your posts, checking who you interact with, and using your activity to keep tabs on your life.
What You Might Notice
The other person comments on things you posted but didn't tell them about
They reference photos, check-ins, or interactions they saw on your social media.
You notice unfamiliar accounts following you or viewing your stories
They may have created fake accounts to watch you even after being blocked.
Friends mention the other person asking about your posts
They may be monitoring through mutual contacts.
What You Can Do
Tighten your privacy settings on every platform
Set profiles to private. Review who can see your posts, stories, friends list, and tagged photos.
Review and clean up your followers and connections
Remove accounts you don't recognise or that seem suspicious.
Stop posting real-time locations or future plans
Share holiday photos after you're home. Don't tag your current location.
Turn off tagging or require approval for tags
This prevents friends from accidentally revealing your location through their posts.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Systematic observation of victim's public and semi-public social media activity, connections, check-ins, likes, comments, and tagged posts. May include creating fake accounts to follow private profiles, monitoring friends' posts for references to victim, or using social media analytics tools to track patterns of activity and connections.
Privacy Configuration Hardening Configure maximum privacy settings on all social media platforms. Restrict visibility of posts, connections, and activity.
SAFE-M-0014
Connection Audit Review all followers and connections for adversary-controlled accounts. Remove suspicious connections.
SAFE-M-0015
Information Disclosure Controls Avoid posting real-time locations, routines, or future plans. Delay posting until after events conclude.
SAFE-M-0016
Tag and Mention Restrictions Disable or require approval for tags and mentions to prevent third-party location disclosure.
Detection Indicators
ID
Detection Indicator
SAFE-D-0013
Non-Public Activity Knowledge Adversary references social media activity that should not be visible given current privacy settings.
SAFE-D-0014
Suspicious Account Patterns New follower accounts created recently with minimal activity or connections to adversary's network.
SAFE-D-0015
Third-Party Monitoring Reports Contacts report adversary has shown them target's social media content or asked about online activity.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.