Essentially Soulful

Invisible Control: How Technology Enables Domestic Violence

DeeAnna Nagel

In this eye-opening episode of Essentially Soulful, Betty and co-host Dr. DeeAnna Merz Nagel uncover the hidden world of digital abuse—where everyday technology becomes a tool of control. From keylogging and GPS tracking to social media surveillance and smart-home manipulation, DeeAnna explains how abusers exploit digital platforms to maintain power long after physical separation.

Listeners will learn how to recognize digital red flags, understand “invisible persistence,” and take practical steps toward digital and emotional safety. DeeAnna also shares vital guidance for helping professionals—therapists, coaches, and advocates—on how to support survivors without compromising online safety.

Key Topics:

  • The rise of digital surveillance in domestic violence
  • Technology audits and safety planning
  • Digital anxiety and its psychological toll
  • Safe use of devices, social media, and communication platforms
  • Professional ethics in digital support work

Resources Mentioned:

Closing Note:
Technology can harm, but it can also heal. Learn how to use it as a lifeline instead of a weapon.

Essential Soul Care® Academy

https://deeannamerznagel.com/essential-soul-care-academy/


SPEAKER_01:

Welcome to Essentially Soulful. I'm Betty. Today we're exploring a critical but often overlooked aspect of domestic violence, how the technology we use every day can become a hidden threat. Joining me is co-host Deanna Nagel, with years of experience teaching therapists, coaches, and advocates how to offer domestic violence support. Welcome, Deanna.

SPEAKER_00:

Thank you, Betty. This is such an important topic that affects so many people, often in ways they don't even realize.

SPEAKER_01:

You know, when we think about domestic violence, we often picture physical threats. But you've mentioned that technology has created new forms of control. Could you elaborate on that?

SPEAKER_00:

Sure. The digital world has created what can be called an invisible persistence in abuse. Think about it. Our phones, our laptops, our social media accounts, these are tools we use to connect with others, but in the wrong hands, they become sophisticated instruments of surveillance and control. That's quite concerning.

SPEAKER_01:

What are some common ways this digital abuse manifests?

SPEAKER_00:

One of the most prevalent methods is through keylogging software. It's marketed as parental control software, but abusers can use it to monitor every keystroke their victim makes. Passwords, messages, emails, everything.

SPEAKER_01:

That sounds incredibly invasive. How would someone even know if they're being monitored this way?

SPEAKER_00:

That's part of what makes it so dangerous. It's often completely invisible. Sometimes the only sign might be that the abuser seems to know things they shouldn't, like private conversations or plans being made.

SPEAKER_01:

That's particularly troubling because these are devices we rely on daily. Beyond keylogging, what other technological threats should people be aware of?

SPEAKER_00:

GPS tracking is another major concern. Many people don't realize that their location can be tracked not just through their phone's GPS, but through apps, photos they post, even their car's navigation system.

SPEAKER_01:

Right, and I imagine social media plays a role here too.

SPEAKER_00:

Oh yes. Social media can be a goldmine of information for abusers. Even something as simple as a friend tagging you at a location or posting a photo with you in the background can compromise safety. And then there's the aspect of using social media for harassment or monitoring.

SPEAKER_01:

This raises an important question. How do we balance staying connected in today's digital world while maintaining safety?

SPEAKER_00:

That's really the central challenge. I often tell people that digital safety buttons or quick exit features are like a temporary shield, not an invisibility cloak. They're helpful but not foolproof. Could you explain what you mean by that analogy? Sure. Take browser history, for instance. Even if someone uses a quick exit feature on a domestic violence support website, there might still be traces in their browser history, cache data, or even in their internet service provider's logs.

SPEAKER_01:

That's why I've heard some professionals recommend using public computers, like at libraries?

SPEAKER_00:

Yes, but even that needs to be approached carefully. Public computers can have their own risks. Keyloggers can be physically installed, and public Wi-Fi isn't always secure. We typically recommend a three-month safety window where we don't offer online services if someone has recently experienced victimization.

SPEAKER_01:

Three months seems like a long time when someone's seeking help. What's the reasoning behind that recommendation?

SPEAKER_00:

That window allows time for proper safety planning. During the initial separation period, surveillance is often at its most intense. Rushing into online services during this critical period can put people at increased risk.

SPEAKER_01:

So, what alternatives do you recommend during this high-risk period?

SPEAKER_00:

In-person services are crucial during this time. Local organizations provide secure physical spaces for support. It's also when we help people conduct thorough technology audits, checking devices for tracking software, reviewing privacy settings, and sometimes even replacing compromised devices entirely.

SPEAKER_01:

You mentioned technology audits. Could you walk us through what that process looks like?

SPEAKER_00:

Of course. Start with the basics. Check phone settings, particularly location services and app permissions. Look for apps that might have been installed without the person's knowledge. But it's not just about finding harmful software. It's about understanding how their everyday technology use might be creating vulnerabilities.

SPEAKER_01:

Can you give us an example of that?

SPEAKER_00:

Sure. Many people don't realize that their cloud storage might be sinking across multiple devices, some of which they may no longer have access to. Or that their smart home devices, thermostats, doorbell cameras, even smart speakers, might be controlled by accounts they don't have sole access to.

SPEAKER_01:

That's fascinating and concerning. It seems like the smart features that make our lives more convenient can also create these unexpected risks.

SPEAKER_00:

Exactly. And what makes this particularly challenging is that these technologies are often deeply embedded in our daily routines. Asking someone to completely disconnect isn't practical or helpful in today's world.

SPEAKER_01:

Speaking of which, I'm curious about the psychological impact of this kind of digital abuse. How does knowing you might be monitored affect someone's mental health?

SPEAKER_00:

The psychological impact is profound. This constant surveillance creates digital anxiety. People begin to second-guess every online interaction, every click, every message. It's like living with an invisible audience watching your every move.

SPEAKER_01:

That must create an enormous amount of stress. How does this digital anxiety manifest in daily life?

SPEAKER_00:

People develop hyper-vigilant behaviors, constantly checking their digital footprints, becoming afraid to use social media, or even basic things like online banking.

SPEAKER_01:

And I imagine this anxiety doesn't just disappear once they're physically safe from their abuser.

SPEAKER_00:

No, it often doesn't. The digital world can make it feel like there's no true escape. Even years later, many survivors struggle with trusting technology or feeling secure online. It's why we emphasize not just physical safety planning, but digital and emotional safety planning as well.

SPEAKER_01:

Could you talk more about what digital and emotional safety planning looks like?

SPEAKER_00:

It's a comprehensive approach, creating new digital boundaries, teaching them about encryption, secure passwords, and privacy settings, but addressing the emotional aspect, helping them rebuild confidence in using technology in a way that feels safe and empowering.

SPEAKER_01:

Are there specific strategies you found particularly effective?

SPEAKER_00:

Start small, maybe setting up a new email account with strong security measures, then gradually progress to more complex digital safety practices. Each successful step helps rebuild confidence.

SPEAKER_01:

That reminds me, what advice do you have for professionals who work with survivors? How can they ensure they're not inadvertently compromising their clients' digital safety?

SPEAKER_00:

This is crucial. Professionals need to understand that even well-intentioned digital communication can put clients at risk. We recommend always assuming that any digital communication might be monitored. Use secure platforms, avoid sending sensitive information electronically, and always discuss safety planning before sharing any digital resources.

SPEAKER_01:

Are there any emerging technologies or trends that particularly concern you?

SPEAKER_00:

The rise of smart home technology is particularly concerning. These devices can be used to exert control over someone's environment remotely, changing temperatures, locking doors, monitoring movements. And now there are reports of increased abuse through cryptocurrency tracking and digital financial control.

SPEAKER_01:

That's a great point about financial control. It seems like digital abuse often intersects with other forms of control?

SPEAKER_00:

Yes. Digital abuse rarely exists in isolation. It's usually part of a larger pattern of control that might include financial abuse, emotional abuse, and physical threats. The digital aspect just makes these other forms of control more pervasive and harder to escape.

SPEAKER_01:

As we wrap up, what's the most important message you'd like our listeners to take away from this conversation?

SPEAKER_00:

The most important thing to remember is that while technology can be used as a weapon, it can also be a lifeline when used safely. Don't let fear of technology isolate you. There are ways to use technology safely, and there are professionals who can help you navigate digital safety.

SPEAKER_01:

Thank you, Deanna, for listeners who might need support. Where can they find reliable help?

SPEAKER_00:

The U.S. National Domestic Violence Hotline is available 24-7, and their website has a quick escape button and doesn't track visitors. Local domestic violence organizations also have trained professionals who understand digital safety. Remember, always use safe computers or devices when reaching out. For professionals, I offer a 10-hour course guiding domestic violence victims, safety concerns, and considerations. I'll place a link to the course and additional domestic violence resources in the show notes.

SPEAKER_01:

This has been such an informative discussion. Thank you for sharing your expertise with us today, Deanna.

SPEAKER_00:

Thank you, Betty. And to anyone listening who might be experiencing digital abuse, you're not alone, and there are people who understand and can help.

SPEAKER_01:

And that wraps up today's episode of Essentially Soulful. Remember to follow us for more important conversations. Stay safe, everyone.