Following, harassing and monitoring

  • Power and Control Wheel: On Technology and Abuse. (Developed by Wesnet and National Network to End Domestic Violence- NNEDV) Link.
    ‘This diagram illustrates some ways abusers might misuse technology in the context of stalking, domestic and sexual violence. Perpetrators might try to misuse any technology if it enables them to monitor, impersonate, control or harm. Examples of technology abusers misuse include phone interceptors, listening devices and bugs; caller ID spoof and unblock; email, text and instant messages; computer and phone spyware and monitoring; fax machines; assistive devices and relay services; location tracking devices (e.g. GPS) and services; cameras and other recording devices; mobile phones and tablets; social networking and media sites, websites and more.’
  • WESNET: The Women’s Services Network, Tech Safety. Link.
    This website provides downloadable handouts and information sheets on a range of technology and domestic and family violence issues including high-tech stalking; online privacy and safety tips and information and information about assistive technology. The site also includes a guide to staying safe on Facebook.
  • Domestic Violence Resource Centre Victoria, Technology Safety Link.
    This website includes information about how technology may be used to perpetrate domestic and family violence and how victims might appropriately plan for their safety.
  • Recording and surveillance.

    Many private individuals now have access to reliable and inconspicuous recording and surveillance devices. In some cases recording private conversations, and maintaining surveillance, may be legally justifiable. Increasingly private individuals seek to have their recordings of other’s private conversations and activities admitted as evidence in legal proceedings in domestic and family violence related cases. Often the recording and surveillance material is collected covertly. Legislative responses to these issues vary across Australia.

    See Groom v Police [2015] SASC 101 for a helpful discussion of these issues in the South Australian context.

    Place Relevant statutes: Applies to:
    ACT Listening Devices Act 1992 (ACT) Listening devices
    NSW Surveillance Devices Act 2007 (NSW) Listening, optical, surveillance and tracking devices
    NT Surveillance Devices Act 2007 (NT) Listening, optical, surveillance and tracking devices
    Qld Invasion of Privacy Act 1971 (Qld) Listening devices
    SA Listening and Surveillance Devices Act 1972 (SA) Listening devices
    Tas Listening Devices Act 1991 (Tas) Listening devices
    Vic Surveillance Devices Act 1999 (Vic) Listening, optical, surveillance and tracking devices
    WA Surveillance Devices Act 1998 (WA) Listening, optical, surveillance and tracking devices
    Smart Safe Technology Abuse and your Safety, Legal Guides Overview, for useful guides.
  • Stark, Evan, ‘Evan Stark, Rutgers University, Author, “Coercive Control”’ (Video Interview published online, 12 January 2012).
    Evan Stark is a professor in the School of Public Affairs and Administration at Rutgers University. He is noted for his expertise in health issues and in legal aspects of domestic violence. His influential book, Coercive Control: How Men Entrap Women in Personal Life, 2007, explains why an expanded view of domestic violence that encompasses coercive control is justified. He asserts that coercive and controlling behaviour is a very common and pernicious form of domestic violence. In this lecture he summaries the core ideas of his book.