Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
Someone may be watching your online activity to target you
Before making contact, some people carefully study social media profiles, dating app activity, or online posts to find someone they think they can manipulate. They look for signs of loneliness, recent heartbreak, financial stress, or trusting nature.
What You Might Notice
A stranger seems to know a lot about you from the start
They reference things from your profile, posts, or comments in a way that feels like they've done research.
Someone contacts you right after you've posted about something difficult
Predators and scammers monitor for vulnerability signals like breakup posts, grief, or financial stress.
The approach feels perfectly tailored to you
They share your exact interests, values, or experiences — it feels like destiny but may be calculated.
What You Can Do
Review what's public on your profiles
Check what strangers can see on your social media, dating profiles, and forum accounts. Consider limiting what's visible.
Be cautious with new contacts who seem to know you well
If someone you've just met seems unusually attuned to your situation, that may be strategic rather than genuine connection.
Talk to your children about online stranger contact
Help young people understand that adults who contact them online may have studied their profiles first.
Frame this as awareness, not fear — the goal is informed caution.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Using social media, dating platforms, forums, or gaming platforms to identify and select potential victims based on vulnerability indicators such as loneliness, recent breakup, financial difficulty, age, or naivety. The perpetrator scouts for targets before making contact, often reviewing profiles, post history, and public information to assess susceptibility.
Mitigations for this technique are under development. If you have suggestions on how to improve this content, please submit a pattern.
Detection Indicators
ID
Detection Indicator
SAFE-D-0001
Anomalous Battery Consumption Device battery depletes faster than baseline due to continuous background data transmission.
SAFE-D-0002
Unexplained Data Usage Increased mobile data consumption without corresponding user activity. Monitor per-app data usage for unknown processes.
SAFE-D-0003
Device Temperature Anomalies Device runs hot during idle periods indicating background process activity.
SAFE-D-0004
Information Leakage Indicators Adversary demonstrates knowledge of private communications, locations, or activities accessible only through device monitoring.
SAFE-D-0005
Unknown Applications or Profiles Presence of unrecognised apps, device administrator privileges, or configuration profiles.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.