Close Menu
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Muse Dash, Hyperforma, Tower of Fortune 4, etc.

March 28, 2025

Best Kitchen Gadgets of 2025

March 18, 2025

The best drawing tablets of 2025: Expert tested and recommended

February 13, 2025
Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
Wtf AndroidWtf Android
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet
Wtf AndroidWtf Android
Home » Is your smartphone being tracked? Here’s how to tell | Domestic Violence
Smartphone

Is your smartphone being tracked? Here’s how to tell | Domestic Violence

adminBy adminOctober 30, 2024No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


I’m looking for an app I don’t remember downloading and a platform that allows me to access my phone’s camera and microphone. Other people can see my calendar, notes, and emails.

It also checks basic things like whether the device is actually registered to your name and email address and whether two-factor authentication is turned on.

Rose MacDonald, co-founder of Nansen Digital Forensic Services, walks us through the digital safety audits they provide to victims and survivors of domestic violence. I’m speaking to a former police detective and digital forensics expert to better understand the experiences of people exposed to this type of abuse and how to minimize the risk.

Find out who has access to my Google or iCloud account. What third-party platforms are connected to your account and whether my email is being forwarded to another address.

When McDonald’s conducts these audits, it often finds high-tech surveillance tools, such as spyware, embedded deep within the phone’s software. But this kind of technology is expensive, and perpetrators have to rely on everyday features: the surveillance opportunities provided by shared accounts and location-sharing tools that reveal more than we realize. She says that they are very often used.

“What we most commonly find are common misconfigurations and compromises to cloud environments. Anything that has a username and password doesn’t require much technical knowledge. No,” she says.

The use of technology to “control, abuse, track and intimidate” is a common feature of domestic violence in Australia. A report published in 2020 found that nearly all of the 442 front-line domestic violence practitioners surveyed had clients who had “experienced technology-facilitated stalking or abuse” and that Certain women and Aboriginal and Torres Strait Islander and non-Torres Strait Islander people were found to be particularly at risk. – Must have an English speaking background.

Advocates told Guardian Australia they had been sent threatening messages not only by car trackers and hidden cameras, but also through bank transfers and online purchases.

“That could be really insidious. [and] It’s very difficult when you think about how many accounts there are on different sites and how many passwords there are,” says Rosa Graham, lead lawyer in the family law practice at Women’s Legal Center ACT.

“I thought he was a nice person.”

In my audit, McDonald and I talk about my home Wi-Fi network and who set it up. Whether the password has been changed. Do you know what it is? Check if my calls are being forwarded to another number.

Find out which devices are connected to Bluetooth. For example, if I have a smartwatch, I might have a discussion here about who bought it. Is it me or someone else? “We start thinking about [whether] Perpetrator of violence accessed account [and] It’s health data that could indicate your location,” McDonald says.

In my audit, I talk about my home Wi-Fi network and who set it up. Whether the password has been changed. Photo: Carly Earle/The Guardian

McDonald, who runs forensic software that looks for signs of external devices and suspicious activity, said the audit also has implications for education. She wants people to stop understanding the relationship between their devices and the cloud.

“I explain to them…if a perpetrator gets into this environment…they can access your Gmail, they can access your maps, they can access your documents,” she says.

These scenarios are familiar to Lauren*, whose partner has subjected her to what she now considers coercive control for many years. “When he bought me a new cell phone and set it up as my business account, I thought he was a good guy,” she said. “But it was actually so he could access all my text messages and who I was calling.”

He also was able to set up her email and access her Facebook account, she said. He then became at odds with her over an innocuous message. “This is a campaign to dominate and control someone,” Lauren says.

During the audit, we scroll through the Family Sharing settings on our phones. For example, if you log into a shared account on a streaming platform from a new location, a prompt will be sent to your original account and you may lose your account, according to McDonald’s.

Ultimately, in a domestic violence situation, my child’s account could reveal my movements and location, and even an app that sends updates from daycare. One trend that Graham of the Women’s Legal Center has observed is that perpetrators give children items that enable GPS monitoring, such as smartwatches. In another case, a man attached a tracker to his daughter’s toy frog.

Griffith University criminologist Molly Dragiewicz has studied how children can engage in technological abuse through everything from mobile phones and GPS tracking to gaming consoles and social media. . Tracking apps, like some kind of surveillance, are becoming commonplace among parents and children, she said.

“Depending on the context of the relationship, the very same technology can be used for good or harm,” she says. “This is not about specific technologies; what matters is the context in which they are used.”

Audits need to be trauma-informed

Digital safety audits like the one I conducted with McDonald’s are not easily accessible, and funding may vary by state. In Victoria, programs such as the Personal Safety Initiative help facilitate access to safety audits, among other security measures. However, when victims/survivors use private services, costs can reach hundreds of dollars.

Another concern raised by several advocates was the lack of scrutiny of those in private security spaces, and whether they are properly trauma-informed and aware of the specific risks associated with family violence. It depends on whether you recognize it or not.

Diarmaid Harkin, a senior lecturer in criminology at Deakin University, researched some of the solutions offered to technology-facilitated abuse. He says claims about technology that can “detect” spyware need to be thoroughly scrutinized, as the field is rapidly evolving and there will always be limitations.

“Those [tech safety] The audit itself needs to be audited,” Harkin said. “Is that advice appropriate from a technical point of view? Also, is it appropriate from a domestic violence point of view?”

MacDonald also believes the security industry needs better standardization around domestic violence safety assessments to ensure risks are not overlooked. She says she’s seen some providers “factory reset” phones, erasing important evidence that might be needed in court, for example.

It may also simply not be safe for victims and survivors to disconnect their abusers from their devices without first consulting family violence services or police, she says. “Once a compromise is found, we discuss how best to manage it. If we cut off access without further safety planning, the behavior could escalate.”

Even if governments promote safety-first design of digital platforms, they cannot guarantee absolute safety to victims and survivors, Dr. Dragevich said. Spyware is constantly evolving, but the technology we need to function every day – to work, communicate, and pay our bills – also creates risks. She says it’s not practical to simply ask people to disconnect.

“A lot of the responsibility for managing the safety of technology is placed on the victim. We’re not actually addressing or interfering with the abuser’s actions,” she says.

Lauren is currently working with a group called DV Safe Phone, which provides free cell phones to victims and survivors of domestic violence.

“Certainly when someone is chasing power and control, they know how dependent everyone is on our phones right now,” she says.

“Being able to access a phone that they don’t know about can be really life-changing.”

*For privacy reasons, only the first name will be used.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Samsung plans major overhaul of Galaxy smartphones within 15 years

October 31, 2024

Canalys: Samsung just overtook Apple in the growing smartphone market in Q3

October 31, 2024

Global smartphone shipments to surge 5% in Q3 2024, led by Samsung

October 31, 2024
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Will Google’s new anti-theft feature be a game-changer for Android users?

October 13, 2024

Huawei’s Android replacement HarmonyOS Next launches next week, permanently discontinuing Google’s operating system on existing devices

October 11, 2024

Android 15 lets you turn your phone into a useful smart home dashboard – here’s how

October 11, 2024

Google ordered to open Android app store to competition

October 10, 2024
Top Reviews
Wtf Android
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 wtfandroid. Designed by wtfandroid.

Type above and press Enter to search. Press Esc to cancel.