What are connected devices and how are they used?
“Connected devices,” also known as smart devices, are physical objects that can connect with other systems via the internet or a data network. This lets you control them remotely through apps or a web browser. They may be programmed to turn on and off at certain pre-set times or they may be voice-controlled to complete activities on command. Some examples of connected devices include:
- location tracker accessories, such as AirTags and Tiles;
- smart speakers, such as the Amazon Echo;
- connected cars;
- thermostats;
- smart electrical outlets with lights or other devices plugged into them;
- entertainment systems, such as a stereo, TV, etc.;
- security cameras and motion detectors;
- smoke detectors;
- video doorbells;
- smart locks;
- smart appliances, such as a refrigerator, vacuum, etc.;
- “nanny cameras;”
- pet feeders, pet cameras, pet toys, and pet trackers; and
- smart toys.
You can use connected devices to help you in your daily life to do things like:
- control devices in your home remotely, such as the television, air conditioning, heating system, or the alarm system;
- install a security camera feature at your home that you can monitor remotely;
- use devices that allow you to control your car’s GPS device, locking mechanism, sound system, or allow you to start your car remotely; or
- use fitness watches to connect to a network to monitor your own movement and goals.
How might an abuser misuse connected devices?
An abuser could misuse connected devices, also known as smart devices, to monitor, harass, isolate, or otherwise harm you. An abuser could hack into these systems with a device connected to the network in order to control your devices or access your personal information. An abuser who uses your tech to track your actions may do so secretly or out in the open as a way to control your behavior by:
- taking pictures or video of you;
- keeping logs of your activity like those from a fitness tracker or your car’s GPS. These could reveal if you left the home to seek court protection, for example;
- eavesdropping on you; and
- gaining access to your email or other accounts linked to the smart devices.
An abuser could specifically misuse connected devices that you use to control your home by:
- turning lights and appliances on or off in your home;
- adjusting the temperature to uncomfortable levels;
- playing unwanted music or adjusting the volume;
- triggering home invasion and smoke alarms; and
- locking or unlocking doors.
Abusers can misuse features of connected cars, too, by controlling features remotely, such as heated seats, emergency braking, or remote steering technology. If an abuser with access to these features figures out how to control the speed or brakes of your car, this could put you in serious danger.
Note: Without access to your passwords, gaining control over your smart devices may require more tech savvy than most people have. However, other information could be easier for a non-tech-savvy abuser to access. When devices are connected through a data network or the internet, for example, an abuser may be able to log into that system to get information about how those devices were used. This information could include when you come and go from your home or where you drive your car.
What effects could an abuser’s misuse of tech have on a victim of abuse?
The misuse of technology described in How might an abuser misuse connected devices? can affect each individual victim differently. Some common effects of this sort of abusive behavior are that it could make you feel uncomfortable, scared, helpless, confused, or unstable.
An abuser could misuse this tech specifically to isolate you from others by threatening visitors and blocking physical access. For example, an abuser could remotely control the smart locks on your home to limit your ability to leave or return when you want to. A video doorbell could be used to monitor who comes to the door or harass your visitors remotely. In combination with a smart lock, a video doorbell could be used to prevent people from entering your home.
What laws protect me from abuse using connected devices?
Laws that apply to electronic surveillance could apply if the abuser is using connected devices to watch (surveil) you or otherwise abuse you.
If the abuser is… |
These laws may apply… |
---|---|
|
|
|
|
|
|
What can I do to protect my safety if I use connected devices?
For safer use of connected devices, it can be helpful to know:
- exactly how your devices connect to one another;
- what information is available remotely; and
- what security and privacy features exist for your tech.
With this information, if a device begins operating in a way that you know you are not controlling, you may want to disconnect that device or remove it from the network. If you do not know how, try reading the device’s manual or speaking to tech support. NNEDV’s Safety Net Project’s Survivor Toolkit has resources that could help.
If you think a device is being misused, you can begin to document the incidents. A technology abuse log is one way to do this. These logs can be helpful in showing patterns and deciding next steps. They could be useful in building a legal case if you decide to pursue one.
In terms of protecting your physical safety, each survivor’s situation and risks are different. There isn’t one “right” way to protect yourself. If an abusive person is monitoring your devices and accounts, making changes to them may alert the abuser to the fact that you discovered this unauthorized access. In some situations, it could even erase evidence of the unauthorized access. Prioritize safety and trust your instincts.
It can help to make a safety plan with a domestic violence advocate. If you are already working with an advocate who does not have specialized knowledge of tech misuse, the advocate can ask for help from NNEDV’s Safety Net Project.