Who's Spying On Your Computer?: Spyware, Surveillance, and Safety For Survivors
Who's Spying On Your Computer?: Spyware, Surveillance, and Safety For Survivors
Who's Spying On Your Computer?: Spyware, Surveillance, and Safety For Survivors
SAFETY ALERT: While stalking is an age-old crime, Spyware has made it easier than ever before for
perpetrators to stalk, track, monitor, and harass their victims. Abusers, stalkers and other perpetrators can
now use Spyware to secretly monitor what you do on your computer or handheld device, like a cell phone. If
you suspect you are being stalked or monitored, be aware that:
• Attempting to look for spyware on your computer or handheld/phone could be dangerous since the
abuser could be alerted to your searches immediately
• Use a safer computer or handheld device (one that the stalker does not have remote or physical access
to) to perform Internet searches or send emails that you wouldn’t want an abuser to intercept
• If you want to preserve evidence of Spyware on your computer, contact your local police, a domestic
Simply type, "spy on girlfriend" into any search engine, and instantly see listings and links advertising easy-to-install
computer Spyware programs and devices that can be used to “spy on a lover, girlfriend, boyfriend, partner, husband or
wife and secretly record computer activities to catch a cheating spouse.”
WHAT IS SPYWARE?
Spyware, is a computer software program or hardware device that enables an unauthorized person (such as an
abuser) to secretly monitor and gather information about your computer use.
There are many types of computer software programs and hardware devices that can be installed to monitor your
computer activities. They can be installed on your computer without your knowledge, and the person installing them
doesn’t even need to have physical access to your computer. Whether computer monitoring is legal or illegal depends
on the state you live in, and the context in which it is installed and used. Regardless of the legality, Spyware is
invasive, intrusive, and may put victims in grave danger.
Spyware programs are sometimes marketed as ways to monitor your children or your employees. As an employer, it
is always best to have your employees read and sign a “Technology Use Policy.” This policy should explain allowable
uses of company property, expectations of online behavior, and TELL employees if their computer will be monitored.
Additionally, choose a software package that displays an icon to remind your employees that they’re being monitored.
(* Also - see note to parents at the end of this piece).
There are some similarities and differences between Spyware and its close relatives.. For example:
• Adware: These are hidden marketing programs that deliver advertising to consumers, and might also profile
users’ Internet surfing & shopping habits. Adware is often bundled or hidden in something else a user
downloads. Most average computer users are infected with adware fairly regularly, and common symptoms
include a sluggish system and lots of advertising pop-ups.
• Malware: This is any program that tries to install itself or damage a computer system without the owner’s
consent. Malware includes viruses, worms, spyware and adware.
For more information on adware and malware, see “Protecting Your Computer“ at
www.antispywarecoalition.org/documents/documents/ProtectingYourComputerflyerletter.pdf
Once Spyware is installed, it can run in stealth mode and is difficult to detect or uninstall. If the person who installed it
has physical access to your computer, he or she can use a special key combination that will cause a log-in screen to
pop-up. After entering the password, an options screen will pop up that allows the installer to view all of the computer
activity since their last login, including emails you sent, documents printed, websites visited, and more. Perpetrators
without physical access to your computer can set the spyware to take pictures of the computer screen (screen shots)
every few seconds and have these pictures sent to them over the Internet without a victim’s knowledge.
One example of the types of computer activity that can be easily monitored:
While most spyware is software based (a program that can be installed on your computer), there are also some
hardware-based spyware devices called keystroke loggers. These tiny keylogging devices may appear to be a normal
computer part. However, once the keylogger is plugged into your computer, it can record every key typed, capturing all
passwords, personal identification numbers (PIN), websites visited, and any emails sent onto its small hard drive.
Additionally, there are keyboards with keystroke logging capabilities built-in.
Note: Remember that many handheld devices are mini-computers. There are now spyware programs available for
cell phones and other handheld devices, so that the perpetrator can track every text message sent and every phone
number dialed. (note: phone records can also be obtained by non-spyware methods, such as guessing your account
password and accessing your account on the phone company website, or by viewing your call history stored in the
phone.)
Spyware typically runs in stealth mode using disguised file names so it can be extraordinarily difficult to detect spyware
programs that are already on your computer.
While your computer is being monitored by Spyware there might be no noticeable changes in the way your computer
operates (i.e. your computer won't necessarily slow down or freeze up). Also, like computer viruses, there are
hundreds of Spyware programs. So while some are created by large software companies, other spyware programs are
written by individual “hackers”.
There are a variety of programs marketed as Anti-Spyware detectors that primarily identify Adware and Malware, but
may not discover surveillance Spyware. Additionally, anti-spyware detection programs typically does not detect
hardware, like keystroke loggers.
If you think there may be spyware on your computer, consider the tips below:
Carefully consider computer safety issues before contemplating providing services via the Internet
• Know the facts! 60-80% of computers are infected with viruses, adware, or other malware which can
compromise the safety of both the victim/survivor and your agency’s computers. (www.pewinternet.org)
• Know that you cannot guarantee the safety and/or security of the computer of every person who uses your
services. Provide upfront and complete disclosures to service users about safety, confidentiality and capacity
issues so they can make realistic and informed choices about use.
• Provide information about the technology, confidentiality and security limits of online service provision,
including disparities in access to technology varied internet speeds and internet connection outages.
• Discuss in your organization the potential harm that could come to victims if an abuser is monitoring a victim’s
entire escape plan that the victim shares through online service provision.