There are hundreds of ways to record everything you do on the computer and on the Internet. If you are in danger, please try to use a safe computer – one that someone abusive does not have direct access, or even remote (hacking) access, to. It might be safer to use a computer in a public library, at a trusted friends house, or at an Internet Café. If you think your activities are being monitored, they probably are.
Abusive people are often controlling and want to know your every move. You don’t need to be a computer programmer or have special skills to monitor someone’s computer activities – anyone can do it and there are many ways to monitor. Computers can provide a lot of information about what you look at on the Internet, the emails you send, and other activities. It is not possible to delete or clear all computer “footprints.” If you think you may be monitored on your home computer, you might consider no home Internet or “safer” Internet surfing.
Example: If you are planning to flee to California, don’t look a classified ads for jobs and apartments, bus tickets, etc. for California on a home computer or any computer the abuser has physical or remote access to. Use a safe computer to research and to make an escape plan.
A phone can be used as a tracking device. If it feels as if a perpetrator always knows where you are, there is a chance that a GPS or tracking device has been installed on your phone. Perpetrators don’t even necessarily need to have your phone in order for them to access all the information in your phone. When in doubt, change phones, or, at least, change phone numbers. For information on this topic, check out The Stalking Resource Center, The Use of Technology to Stalk.