Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
⚠
Device sabotage can be a precursor to escalation. If your devices are being interfered with, tell someone you trust.
Sabotaging Your Devices
Someone deliberately damages, misconfigures, or interferes with your phone, computer, or other devices to make them unreliable, slow, or unusable.
What You Might Notice
Your devices keep malfunctioning in ways you can't explain
Settings change, apps crash, or the device behaves erratically.
Problems only happen after the other person has had access
The device works fine, then has issues after they've been near it.
Factory resets or data wipes you didn't authorise
Your device has been wiped, losing your contacts, photos, and messages.
What You Can Do
Keep your device physically secure
Don't leave it unattended when the other person could access it.
Back up your data regularly to a secure location
Use cloud backup with an account only you control.
Document the pattern
Keep a log of device issues with dates and whether the other person had access.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Deliberately damaging, corrupting, factory-resetting, or wiping victim's devices or data. May involve physical damage, remote wipe commands, malware installation, or deliberate corruption of important files. Destroys evidence, disrupts victim's ability to communicate, and causes emotional and financial harm.
Data Backup Protocol Maintain regular backups to adversary-inaccessible storage.
SAFE-M-0058
Physical Device Security Maintain physical control of devices. Store evidence in secure cloud storage.
Detection Indicators
ID
Detection Indicator
SAFE-D-0053
Unexplained Data Loss Files, photos, or messages disappearing without user action.
SAFE-D-0054
Device Damage or Reset Devices physically damaged or factory reset during adversary access periods.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.