Domestic and family violence behaviours that involve a perpetrator following, harassing or monitoring the victim are forms of stalking or surveillance designed to deprive the victim of privacy, autonomy and a sense of safety. These abusive behaviours may occur while the perpetrator and victim are in an intimate relationship, or they may commence or intensify upon separation [Bagshaw 2000].
The perpetrator’s detailed knowledge of the victim’s workplace, family, friends, daily routines, regular hangouts, online activities, inclinations, concerns and fears enables the perpetrator to employ an array of abusive tactics that may be overt and intimidating (for example: letting the victim know they are being watched or overheard) or covert and thus difficult for the victim to anticipate, detect or trace (for example: amassing information about the victim’s movements that can later be used to monitor, threaten or humiliate the victim [Stark 2007]).
Studies indicate that these abusive behaviours may be accompanied by incidents of theft, trespass and property damage, and are compelling risk factors for all other forms of domestic and family violence. Where the perpetrator and victim have children in common, handover occasions may increase the risk of further violence [Mechanic et al 2000] and provide an opportunity to conceal or check tracking and surveillance devices, as well as a wide range of Internet-connected devices such as smart toys. Children may also be co-opted to facilitate abuse, eg. through sharing a parent’s passwords [Dragiewicz et al 2022].
Research [Wesnet 2020] demonstrates a dangerous prevalence of online stalking and online surveillance, which use digital information and associated technologies as tools for the perpetration of domestic and family violence, also known as technology-facilitated abuse, digital abuse or digital coercive control [Harris & Woodlock 2022]. These technologies involve the associated use of social media and online accounts, information communication technologies, computers, tablets, recording equipment, smart phones and other digital devices such as global positioning systems (GPS) or satellite navigators, drones, game consoles, emerging smart, internet-connected systems such as doorbells or cameras. Increasingly, digital systems are recognised as easy, accessible and instantaneous methods by which a perpetrator can control, monitor, humiliate and shame the victim, and make it more difficult for the victim to leave the abusive relationship or seek help.
Technology-facilitated methods are highlighted in the following examples:
Installing an application or spyware on the victim’s digital device that:
Due to the seemingly elusive or ambiguous nature of some of these abusive behaviours, a victim may feel a heightened sense of fear and powerlessness, and yet the victim may be the only means by which the police can gather evidence of the behaviours. A significant barrier for victims of technology-facilitated abuse and stalking may be a perception by police or judicial officers that the behaviours are less serious than physical violence and, as a consequence, there may be a tendency to trivialise the victim’s experience and minimise the harm suffered, leading to inadequate legal responses. It is important in protection order application proceedings where a victim is seeking protection from these forms of abusive behaviours that the conditions of the protection order specifically address the behaviours. Victims cannot be expected to simply ‘go offline’ as essential life dimensions are now mediated through technology e.g., paying taxes, searching and applying for jobs.
In some circumstances, victims may use digital technologies as a safety aid in preventing or escaping domestic and family violence [Dragiewicz et al 2022]. However this may also leave the victim vulnerable to accusations of stalking or surveillance-like behaviour. For example, a victim may record repeated incidents of violence with the intention of proving a pattern of violence. Such behaviour may be lawful [Recording and surveillance]. It is important therefore to distinguish between behaviours that are protective on the part of the victim, and those that constitute violence by a perpetrator. There are resources available that provide information about how to ensure safety when engaging with technology [Using technology safely] [WESNET Tech Safety]. In some cases recording private conversations, and maintaining surveillance, may be legally justifiable [Recording and surveillance]. Increasingly private individuals seek to have their recordings of other’s private conversations and activities admitted as evidence in legal proceedings in domestic and family violence related cases. Often the recording and surveillance material is collected covertly. Legislative responses to these issues vary across Australia [Recording and surveillance].
Following, harassing or monitoring may be one aspect of a complex pattern of behaviours engaged in by perpetrators in order to control another person, sometimes referred to as coercive control.