Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
Someone studies your social media activity to decide whether and how to approach you. Public posts, check-ins, relationship status, and even the tone of your captions can be used to assess vulnerability.
What You Might Notice
A stranger follows you and immediately starts engaging with all your content
Liking old posts, commenting on everything, sharing your stories — creating a sense of connection quickly.
They seem to share all your interests and values
This mirroring is a common manipulation technique — they've read your profile and are reflecting it back.
What You Can Do
Set your accounts to private
Limit who can see your posts, stories, and personal information.
Be cautious about what you share publicly
Location check-ins, relationship updates, and emotional posts can all be used to assess your vulnerability.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Identifying targets via Instagram, TikTok, Snapchat, Facebook based on public posts, follower counts, content themes, geographic indicators, or visible vulnerability. Both child and adult targeting occurs through social media.
Mitigations for this technique are under development. If you have suggestions on how to improve this content, please submit a pattern.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.