Tech-Abuse Analysis (T-AA)

Technology-facilitated abuse, commonly referred to as “tech abuse,” occurs when perpetrators of domestic abuse employ technology as a means to harass, stalk, and control victims and survivors. The rise in tech abuse necessitates prompt identification and intervention. The Tech-Abuse Analysis (T-AA) framework is crafted to aid professionals in determining the presence of tech abuse and to offer appropriate guidance. It is imperative to utilize T-AA exclusively when a survivor voices concerns regarding tech abuse or in cases involving stalking and harassment.

The application of professional judgment is essential, and the completion of the Domestic Abuse, Stalking, and Honour-Based Violence (DASH) risk assessment is mandatory. T-AA serves as a supplementary tool to support professionals in these assessments.


Question One: Was [name of abuser(s)] in possession of the home network passwords and responsible for configuring and overseeing the connected devices?

Example: Did the perpetrator get the devices used at home? Are they the account holder? Do they control access to the internet?

Please select your answer below:




Question Two: Did/Do you have any access to the Wi-Fi settings in your home?

Example: This could be the admin password for the network at home, or password to connect other devices.

Please select your answer below:




Question Three: Does [name of abuser(s)] have good knowledge with technology?

Example: Does the perpetrator work within the technology field? Do they regularly use technology, i.e. using phones but not just for calling and messaging? Do they regularly use computers or have an interest in technology?

Please select your answer below:




Question Four: Does the property have any surveillance cameras or smart home security systems that can usually be accessed across other devices, i.e. ring door bells.

Example: Are there any cameras installed throughout the property which could be deem to be used for monitoring and controlling? home security systems, ring door bells, baby monitors, etc.

Please select your answer below:




Question Five: Did/Do you have any shared accounts with the [name of abuser(s)] for online services? Such as Amazon, Netflix, or any type of platform that requires an address?

Example: This could be anything that was shared using online services such as shopping, utilities, entertainment, etc.

Please select your answer below:




Question Six: Do you have any children together, or did/does [name of abuser(s)] have access to any devices of your own children?

Example: If the perpetrator has/had access to the children, did this include access to any devices or have they been gifted any toys recently that raise concerns from the survivor?.

Please select your answer below:




Question Seven: Has there been any evidence of stalking behaviour from the [name of abuser(s)], such as persistent attempts to communicate through texts, calls, or other means? Are there instances where they seem to be aware of your whereabouts without you having informed them? Do they appear to have information about private discussions that you’ve never shared with them?

Example: Base answer both on what survivor states but also what information is known as a professional, i.e. background check reveals previous stalking allegations or offences.

Please select your answer below:



Press F4 to exit privacy mode