Abuse doesn’t just happen in person. Increasingly, technology is being used by perpetrators as a tool of control and intimidation. Text messages, emails, social media, and even tracking apps are commonly misused in family and domestic violence.

For survivors, this can feel overwhelming and invasive. But there is another side to this story: technology often leaves behind a stronger trail of evidence than face-to-face abuse ever could. That digital footprint can become critical in protecting your safety and strengthening your case in court.

The Growing Problem of Abuse Through Technology

Technology-facilitated abuse is now one of the most common ways perpetrators control and intimidate their partners.

Recent national research shows just how widespread the problem is:

  • One in two Australians (51%) have experienced at least one form of technology-facilitated abuse in their lifetime.

  • One in three (34%) have been monitored or controlled through their devices.

  • One in four (27%) have been harassed online or had intimate images misused.

  • Almost every frontline worker (99.3%) has supported clients impacted by technology-facilitated abuse.

  • Nearly three-quarters of dating app users (72.3%) report experiencing sexual harassment, stalking, or image-based abuse within five years.

These numbers confirm what many survivors already know: this type of abuse is common, under-reported, and devastating.

What Technology-Facilitated Abuse Looks Like

Abuse through technology doesn’t always look the same. Some of the most common forms include:

  • Cyberstalking: constant unwanted messages, impersonation, hacking, GPS tracking, or monitoring through apps.

  • Abuse in dating relationships: threatening, humiliating, or pressuring a partner online or by phone.

  • Sexual violence using technology: harassment, sextortion, blackmail, or recording and sharing sexual activity without consent.

  • Sexual assault arranged online: perpetrators using dating apps or chatrooms to lure victims or incite others to commit assaults.

  • Image-based abuse: intimate images taken or shared without consent, threats to release images, or altered “deepfake” photos.

  • Online sexual harassment: unwanted sexual messages, images, comments, or threats — often via social media or gaming.

  • Coercive control through technology: a pattern of constant monitoring, intimidation, or shaming that creates fear and limits freedom.

Often, these behaviours overlap. What might seem like “just a few texts” is usually part of a broader pattern of control and intimidation.

Why It Matters

This kind of abuse has serious effects:

  • Victim-survivors report constant fear and hypervigilance

  • Daily life and access to support can be restricted by surveillance

  • Anxiety, depression, and PTSD are common impacts

For the courts, these behaviours are important. They don’t just show conflict between partners — they reveal patterns of power and control. That can make a real difference in decisions about parenting arrangements, protection orders, and property division.

A common misconception in family law and domestic violence matters is that it is too difficult to prove who was at the other end of a text message, email, or social media communication. In reality, technology often leaves a stronger trail of evidence than an in-person incident.

The real challenge is knowing how to obtain this evidence properly and how to ensure it can be admitted in court. Below are some practical tips for clients.

Email Evidence

Emails carry hidden information in their headers including the sender’s IP address. Extracting this data is straightforward, although the process differs between providers. A step-by-step guide is available at www.whatismyipaddress.com/find-headers.

Facebook Evidence

Facebook data can be downloaded directly from your account. The download (in PDF format) may include:

  • IP addresses used to log in and out

  • Chat histories and posts

  • Photos (including metadata)

  • Searches and personal details

Deleted content, however, will not appear. Police can also obtain records directly from Facebook where a criminal investigation is underway. More information is available at facebook.com/records.

Google Tools

If you have a copy of an intimate image, you can use Google Image Search to check if it has been published online:

  • Visit images.google.com

  • Click the camera icon

  • Upload the photo to search for matches

If you are concerned about future exposure, you can also set up Google Alerts for your name, phone number, email or address. This will notify you if those details are published online. Content removals can also be requested directly from Google.

Phone Records and Metadata

Smartphones are rich sources of evidence. Options include:

  • Using apps to download text messages, call logs, or chat histories

  • Producing the device itself in court

  • Recovering deleted material with forensic tools

  • Subpoenaing service providers for call and message records

Importantly, photos and files often contain metadata (EXIF data), such as geotags and device details. This can be accessed via tools like exifdata.com.

Carriage service providers may also assist in identifying the source of harassing calls. You also have rights under the Communications Alliance C525:2010 Code to complain about unwelcome or life-threatening communications.

Call Recording – A Caution

In Queensland, it is legal to record a conversation if you are a party to it. This means that if you are being abused over the phone, you may be able to record the call and use it as evidence.

However, laws differ between states. In some jurisdictions, recording private conversations without consent may be allowed if it is done to protect you. Always seek legal advice before making or relying on a recording.

Protecting Yourself: Practical Steps You Can Take

If you are experiencing technology-facilitated abuse, there are immediate steps you can take to protect yourself and strengthen your case:

  • Save everything: Take screenshots of messages, emails, posts, and threats. Include the website link or profile where possible.

  • Back it up securely: Store copies on a USB or in a secure cloud account. Don’t rely only on your phone.

  • Preserve evidence early: Save material before it disappears. Deleted content may sometimes be recovered, but don’t take the risk of waiting.

  • Know your rights: You can complain to your phone provider about threatening calls or texts.

  • Be careful about recording: In Queensland, you can record conversations you’re part of, but get advice before relying on this in court.

  • Do not delete or confront: Don’t erase evidence or challenge the perpetrator without advice — this can make things harder later.

Take Back Control

Technology that is misused to harm you can also be used to protect you. Every text, email, photo and post has the potential to hold perpetrators accountable, safeguard your children, and strengthen your case in court.

At Powell Family Law, we regularly help clients who are experiencing technology-facilitated abuse. We guide you in gathering and preserving electronic evidence safely and using it effectively in your family law or domestic violence matter.

📞 Call us today on 07 3179 6680 or email hello@powellfamilylaw.com.au for confidential advice.