Safety protocols for victims and advocates
The advice on this page is a draft. We're working out what works for people "on the ground" and "in the shelter". Please help us refine, think, and improve this protocol.
Based on actual help provided over the past two years
In a 5 minute conversation, advocates can generally learn: full name, marital status, likely abusers, sites they use, sites the abuser is using against them, if they have compromising photos, and if they use the same username/password across sites.
Data point: 9 of 12 previous victims were identified correctly after initial conversation through research.
Keep username/password combinations distinct per website. Browser-based plugins for password management work well.
Figure out where images or content is originating. Is it private? Public? Facebook? Twitter? Private conversation in a public space? Did you take a picture with your phone but never uploaded it? (Beware Facebook and Apple auto-upload features)
Ability to do quick forensics to determine "infected or not" for computers and phones - and if so, with what software?
3-5 action items for a victim to do to get them focused on the problem, and not succumb to the effects of the abuse.
"What I've generally found with most shelters and orgs trying to help is all they do is scare the crap out of the victim and make fighting back seem futile. The victim is already dealing with the effects of abuse, meaning they're already scared. Making them more scared doesn't help."