Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
Someone bombards you with constant messages, calls, voicemails, or contact attempts — dozens or hundreds a day — to overwhelm, exhaust, or frighten you.
What You Might Notice
Overwhelming volume of messages, calls, or notifications
Dozens or hundreds of messages across multiple platforms.
Contact continues despite you asking them to stop
Clear requests to stop are ignored.
The content cycles between hostile, loving, and desperate
The tone swings wildly — threats, then apologies, then anger again.
What You Can Do
Block across all platforms but save evidence first
Screenshot the volume of messages before blocking. You may need this for legal proceedings.
Enable 'Do Not Disturb' or silence unknown callers
Reduce the immediate impact while preserving evidence in the background.
Document the pattern
Keep a log of dates, times, number of contacts, and platforms used.
Report to police
Persistent unwanted contact can constitute stalking. File a report.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Repeatedly contacting victim despite clear requests to stop, across one or multiple communication platforms. Volume and persistence are used to exhaust, intimidate, and demonstrate that the victim cannot escape the perpetrator's reach. May include hundreds of messages, calls, or contact attempts per day.
Contact Documentation Maintain log of all unwanted contact with dates, times, platforms, and content.
SAFE-M-0065
Block and Filter Strategy Block adversary on all platforms. Configure email filters to archive messages for evidence.
SAFE-M-0066
Carrier Harassment Report Contact phone carrier to report harassment and implement call blocking.
Detection Indicators
ID
Detection Indicator
SAFE-D-0059
High Volume Contact Unreasonable number of contact attempts across channels.
SAFE-D-0060
Multi-Platform Contact Pattern Simultaneous contact attempts across multiple platforms.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.