Draft Document

The advice on this page is a draft. We're working out what works for people "on the ground" and "in the shelter". Please help us refine, think, and improve this protocol.

Hierarchy of Needs for Victims

Based on actual help provided over the past two years

Basics of Info Compartmentalization

In a 5 minute conversation, advocates can generally learn: full name, marital status, likely abusers, sites they use, sites the abuser is using against them, if they have compromising photos, and if they use the same username/password across sites.

Data point: 9 of 12 previous victims were identified correctly after initial conversation through research.

Better Password Management

Keep username/password combinations distinct per website. Browser-based plugins for password management work well.

Sort Out What Images/Texts Come From Where

Figure out where images or content is originating. Is it private? Public? Facebook? Twitter? Private conversation in a public space? Did you take a picture with your phone but never uploaded it? (Beware Facebook and Apple auto-upload features)

Figure Out If You're Being Stalked by Your Phone

  • If you're unsure, assume the phone is always recording
  • Do not bring the phone to a safe place or use a safe line near the phone
  • The phone is a microphone - it can be enabled remotely and at all times
  • Leave it in the car, at home, at work when seeking help

Record Everything That Seems Odd

  • Facebook, Gmail, etc. all present your last IP address on login - keep track
  • If someone is sending images, look for EXIF data and watermarks
  • Most email systems keep record of local IP/hostname in headers
  • Save text/sms messages, emails, images into a separate "abuse" folder

What Advocates Need

Quick Forensics

Ability to do quick forensics to determine "infected or not" for computers and phones - and if so, with what software?

Action Items

3-5 action items for a victim to do to get them focused on the problem, and not succumb to the effects of the abuse.

"What I've generally found with most shelters and orgs trying to help is all they do is scare the crap out of the victim and make fighting back seem futile. The victim is already dealing with the effects of abuse, meaning they're already scared. Making them more scared doesn't help."

Key Insights

  • Abusers leave a massive data trail as they do their surveillance
  • Their own data (phone, IP addresses, email addresses, Facebook accounts) appears everywhere in a social graph of the victim
  • Law enforcement preservation orders may help keep data around longer for the victim to use/collect
  • Most police departments have an internet-specialist detective - having them talk to technology experts is generally helpful
  • 3-5 concrete action items help victims realize they aren't powerless