Domestic Abuse and Stalking Online
IntroductionGet out of here
Computer Misuse Act offenders can be reported through Action Fraud.
If you are experiencing domestic abuse or stalking online, it is important to inform the police or a support service listed on the right hand side of this webpage for your particular area.
To support survivors of domestic abuse, stalking and any other person who feel they could benefit from reducing their online vulnerability, we have created several tips to assist you in improving your online security.
Our first priority is to protect you and your children. If you are a victim of domestic abuse, stalking or know someone who is, and there’s an emergency, call 999.
This guidance is designed to help you understand your options online and signpost you to people that can help you in your local area.
You can access support from your local support services, even if you decide not to report to the police.
If you have been the victim of domestic abuse, stalking or are concerned for someone, you can report this in various ways: in person at your local police station; by calling 101; or online. If you require a translator, we can provide someone initially by phone and later in person.
Evidence of the incident can be vital to support an investigation and this should be captured wherever possible. Keep copies of emails and other communications. A simple way to capture the contents of a computer screen is by pressing the [PrtScr] button. An image of the screen will be placed into the clipboard and can be pasted into a document for preservation. A similar function is available on mobile devices and tablets. OneDrive and Dropbox users can opt to save these screen prints automatically to their online backups or you may wish to print a copy for safekeeping.
Be sure you are storing this evidence safely from any perpetrator.
How police can help straight away
Officers will seek to understand the nature of what is happening. It is important that we work out a safe way of contacting you, please consider how you can be contacted: a safe contact number, a trusted friend, or a secure email account, and a safe time to contact you. There are many ways we can help to deal with the effects of domestic abuse and stalking online, and we will discuss these options with you.
Staying in touch
We will stay in contact with you throughout the investigation. We need to know a safe way to keep in contact with you. Your case will be allocated to an investigator, and you will receive contact and a dedicated phone number, so you can call us directly to find out how your case is going or talk about anything that might be worrying you.
We work alongside many other staff and organisations that we will signpost you to, who will support you and assist with aftercare for you and your family. If you need to attend court for any reason there are also services available to support you through the legal process.
Find Your Nearest Police
If you are not sure which Police service covers your location, please enter your location name (town, village, etc…) or postcode below and press ‘Search’. This will take you to the Police.uk website (in a new window).
Domestic Abuse and Stalking Advice
Are you in an abusive relationship? Have you left an abusive relationship?
- Always consider your safety
- You know the perpetrator and their online knowledge, think how best to use the this guide to your best advantage
- Seek advice
- Is it safe for you to break all contact? Or how can you best protect yourself and maintain safe contact?
Do you think you are being stalked?
- Seek specialist advice – use the links at the side of this document
- Do you know the person?
- Do you know their online skill and knowledge?
- Use this guide to secure yourself online
Stay Safe online – General Advice
If you are victim of domestic abuse or stalking, use your knowledge of your situation to decide how best to manage your safety online. Always do what is safe for you and consider devising your own safety plan. If you would like some assistance on how to create a safety plan, have a look at the supports services on the right hand side of this webpage.
The use of social media platforms has exploded over recent years and it is rare to find anyone without an online presence. Without appropriate safeguards, the nature of social media means that personal information can be accessed by a global audience – including perpetrators of domestic abuse and stalking. Privacy settings have become a key component of most social media platforms and it is vital they are set to the most secure option for your set of circumstances. Care must be taken when sharing information – especially with ‘friends’ that may have been ‘friended’ without knowing anything about them.
Here are a few tips to immediately consider for your social media accounts: –
Advanced users may opt to use a Virtual Machine using ‘Live Mode’, or launch an operating system from a bootable USB or DVD. Running an operating system directly from a USB stick or a DVD doesn’t alter your computer’s configuration in any way, and a simple restart without the USB stick or DVD is all that’s needed to restore your machine to its previous state.
Microsoft and Google account users can opt to have their activities (including Internet browsing history) stored on the cloud. Be careful who your devices are linked with.
Remember, when you have finished your session, it may be worth considering deleting your internet search history so you don’t expose your browsing history or any personal details.
Many accounts use personal questions for password resets – consider changing the answers to these. Remember to store the new data somewhere secure so you can remember them when needed! Perpetrators will often know, or try and guess your passwords from the information they know about you, so following this advice will ensure they cannot access your accounts.
We recognise that removing all access to accounts may escalate risk in certain circumstances – particularly if perpetrators fear they may be losing an element of control. If you think this may apply to you, then the creation of new accounts and passwords may better reflect your personal safety plan.
Software & App Updates
Survivors can be targeted with spyware which may enable a perpetrator to keep tabs on movement and activity. It is therefore equally important to have up-to-date internet security software on all your devices – including your mobile devices. Modern operating systems often have built-in software which should be switched on and operational. Most security software suites include a firewall (for stopping unauthorised access), anti-virus software (to prevent, detect, and remove malware and spyware) and other functions to protect you from malicious e-mails and web sites.
Wi-Fi & Bluetooth
Public or free Wi-Fi may not be secure. Criminals may set up Wi-Fi hotspots to deliberately capture information being transmitted. Avoid using public Wi-Fi for transmitting confidential or financial information. Bear in mind that even if you take care with your browsing and e-mail, apps may be communicating with the Internet and unwittingly transmitting credentials in an insecure form. A VPN (as described above) is the only secure way of using public Wi-Fi.
Survivors with Wi-Fi at home should consider changing the password and ensure it complies with WPA2-PSK security standards. A perpetrator with access to the same Wi-Fi network can intercept transmissions of any device using the network. To reduce this vulnerability, always use websites with a URL starting ‘https://’. This means that communication between the device and the website is encrypted and cannot be viewed if intercepted.
Consider removing (or forgetting) any Wi-Fi or Bluetooth connections that may be associated with the perpetrator to prevent any unexpected connections.
Device & Data Security
Perpetrators may try to gain or maintain personal access to devices – whether it is by using a survivor’s password, or by setting up another account. Protect access to your devices – change passwords as described above and set up new authentication methods (fingerprints / facial recognition) to access them. Remove additional users – particularly if those accounts belong to a perpetrator or their associates. Where you think a device may have been compromised with malware, consider a factory reset to be sure there is nothing on it to cause a problem. Be advised that restoring data from online backups could reinstall malware – so ensure that all restored data is subject to a rigorous anti-virus scan or discarded. In exceptional circumstances, survivors may consider it necessary to replace the device entirely and set up brand new accounts to resume their online activities. Always remove unwanted or unrecognised apps.