I am searching for an app that I do not recall downloading and a platform that gives me access to my phone’s camera and microphone. Additionally, other individuals can view my calendar, notes, and emails.
The app also performs basic checks such as verifying if the device is registered to your name and email address and if two-factor authentication is enabled.
Rose MacDonald, founder of Nansen Digital Forensic Services, discusses the digital safety audits offered to victims and survivors of domestic violence. I am interviewing a former police detective and digital forensics expert to gain insight into the experiences of those subjected to this form of abuse and how to reduce the risks involved.
I want to know who has access to my Google or iCloud account, what third-party platforms are linked to my account, and if my emails are being forwarded to another address.
During these audits, McDonald often discovers sophisticated surveillance tools like spyware hidden deep within the phone’s software. However, perpetrators frequently exploit everyday features like shared accounts and location-sharing tools for surveillance, which are commonly used.
“We usually uncover common misconfigurations and compromises in cloud environments. If you have a username and password, you do not need extensive technical knowledge,” she remarks.
The use of technology for “control, abuse, tracking, and intimidation” is prevalent in cases of domestic violence in Australia. A report published in 2020 found that nearly all frontline domestic violence practitioners surveyed had clients who had experienced technology-facilitated stalking or abuse, with women from specific backgrounds being particularly vulnerable.
Advocates have reported receiving threatening messages not only through car trackers and hidden cameras but also via bank transfers and online purchases.
“It can be very insidious. It is challenging to keep track of multiple accounts on various sites and numerous passwords,” says Rosa Graham, lead solicitor at the Women’s Legal Center ACT.
“I thought he was a nice person.”
In my audit with McDonald, we discuss my home Wi-Fi network, its setup, password changes, and call forwarding to other numbers.
We delve into the devices connected to Bluetooth, like smartwatches, and who purchased them to understand potential security risks and access to personal data.
McDonald uses forensic software to identify external devices and suspicious activities, emphasizing the importance of understanding the relationship between devices and the cloud.
Lauren recounts an experience where her partner accessed her phone, emails, and social media accounts to exert control over her.
When conducting the audit, we review the Family Sharing settings on phones to ensure security and privacy are maintained.
In domestic violence situations, a child’s account can inadvertently reveal sensitive information, including location details and app usage.
A study by Griffith University highlights the role of technology in children’s involvement in domestic violence situations, with tracking apps becoming more common among parents and children.
Audits need to be trauma-informed, ensuring that victims and survivors are adequately supported and informed about the specific risks associated with using digital platforms.
Audits need to be trauma-informed
Digital safety audits are not easily accessible, and funding may vary by state. Trained professionals must be aware of the nuances of family violence to provide effective support and guidance.
Providers must maintain standards in domestic violence safety assessments to address the unique risks faced by victims.
Victims and survivors must consult with family violence services before taking any actions that could potentially escalate risks.
Ensuring digital platform safety requires a collaborative effort between individuals, technology providers, and government agencies to mitigate risks effectively.
Lauren is currently working with DV Safe Phone, a group that provides free cell phones to domestic violence victims and survivors.
“Accessing a phone unbeknownst to the abuser can be life-changing for victims,” she emphasizes.
*For privacy reasons, only the first name will be used.
Source: www.theguardian.com