Policy brief: Tech Abuse
Smart, Internet-connected devices present new risks for victims of domestic violence and abuse.
Tech Abuse – Smart, Internet-connected devices present new risks for victims of domestic violence & abuse
Download the Tech Abuse policy brief [PDF]
Wearable devices
Could allow perpetrators to track and monitor movements and other behavioural patterns drawing on GPS signals and other collected data.
Phones
Could provide perpetrator an access point to control various IoT devices.
Laptops and tablets
Accounts between devices are linked and could allow perpetrators to change and review IoT devices’ settings via an Internet browser.
Remote control of heating, lighting and blinds
Could be used to coerce and intimidate victims by switching systems on or off from afar.
Audio recording
Could facilitate remote monitoring and stalking.
Voice control
May enable perpetrators to contact the victim as well as trace and review a person’s history of commands and purchases.
Router
Connects all smart home devices to the Internet.
Security cameras and TVs
Could facilitate remote monitoring and online stalking; video recording could facilitate image-based abuse (such as revenge porn).
Smart security
Could provide access to doors through voice activation, apps, or electronic key codes.
The growing risk of tech abuse
The Internet of Things (IoT) is a term used to refer to ‘smart’ Internet-connected devices that can share data with each other, creating a ‘network’ of devices. Going beyond laptops, phones and tablets, IoT includes smart watches, and internet-enabled household appliances such as smart fridges, TVs and locks. By 2020, some 25 billion devices will be connected to the Internet with studies estimating that this number will rise to 125 billion in 2030.
IoT devices are ‘smart’ because of how they collect and send data, analyse this data, and take action, potentially without direct human intervention. For instance, IoT-enabled heating can be controlled remotely through your voice, smartphone, or another Internet-connected device, instead of with a physical switch.
When IoT devices are connected to the Internet they can communicate and share instructions with each other. This can result in privacy, security, and safety risks, because devices assume all users trust each other. An abuser can potentially misuse IoT devices’ features to monitor and control a victim. In the future, more of these devices will be part of the public and private spaces.
Recommendations
- Internet security legislation must be ‘future-proofed’ against the expected growth in the number of Internet-connected home devices.
- Capacity to deal with the threat of tech-abuse needs to be available at the front line. This requires training for front-line staff and access to technical expertise, for example via a dedicated hotline. Police forces also need to be better equipped to deal with this form of abuse.
- The risk of tech abuse must be incorporated into risk assessment and safety planning processes.
- More data is needed to understand the scale of the problem and to monitor changes over time. Police and frontline staff need to change their reporting patterns to achieve this.
Funder
London VAWG Consortium, Privacy International, and the PETRAS IoT Research Hub.
Lead researcher
Dr Leonie Tanczer (UCL STEaPP)
Output type
Policy brief
PIU lead
Florence Greatrix
Last updated: Tuesday, April 6, 2021