Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
Someone convinces friends, family, neighbours, or mutual contacts to report back on your activities, either openly or without you knowing.
What You Might Notice
Information you only shared with specific people gets back to the other person
Things you told a friend in confidence are known to someone who shouldn't know.
Mutual contacts ask unusually detailed questions
People start asking where you're going, who you're seeing, or what your plans are — more than feels natural.
You notice people watching or checking on you
Neighbours, work colleagues, or acquaintances seem to be tracking your comings and goings.
What You Can Do
Be thoughtful about what you share and with whom
Consider which contacts might pass information to the other person, even without bad intent.
Create an inner circle of trusted people
Identify a small number of people you trust completely and keep sensitive information within that circle.
Have a conversation with people you suspect are reporting back
Sometimes people don't realise they're being used. A calm conversation may help.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Enlisting friends, family members, mutual contacts, or acquaintances (sometimes called 'flying monkeys') to monitor and report on victim's activities, location, companions, and emotional state. May involve deliberately maintaining relationships with victim's contacts for intelligence gathering purposes.
Information Compartmentalisation Limit sensitive information shared with contacts who maintain relationship with adversary.
SAFE-M-0031
Network Trust Assessment Identify which contacts may relay information to adversary based on information leakage patterns.
SAFE-M-0032
Canary Information Testing Share unique details with specific contacts to identify information relay sources.
Detection Indicators
ID
Detection Indicator
SAFE-D-0029
Source-Specific Information Leakage Adversary gains knowledge of information shared only with specific individuals.
SAFE-D-0030
Unusual Contact Questioning Contacts ask unusually specific questions about location, plans, or relationships.
SAFE-D-0031
Recruitment Attempt Reports Trusted contacts report adversary has requested information about target.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.