Digital Safety Planning: Self-Study
Review the following scenarios and answer the prompts below:

Scenario One: 

Jacob is fairly certain there’s tracking malware installed on his phone. His girlfriend keeps “running into” him while at restaurants or on errands, and she sometimes references things he’s only said in private messages or emails. He’s double-checked his location settings and apps, and things look normal. So as an experiment, he borrows a friend’s phone for the day, and leaves his at home. That night, when she asks him what he’s been up to, he observes she seems surprised and unhappy to learn he had not been at home all day.


Scenario Two: 

After Thiir (they/them) breaks up with their partner, they notice they can’t access several of their streaming services and social media. They had previously logged into those accounts on the partner’s devices, while they were still together. Thiir is devastated to see embarrassing and reputation-damaging posts being made on their social media feeds, pretending to be them. Thiir's partner ignores them when they send messages pleading to delete the posts/restore login access. 


Scenario Three: 

Yelena going through a divorce with her husband, and the “smart” devices they have in the house keep getting turned on—the Apple TV will start blaring at 2am, the front door she locked the night before will get unlocked overnight, Alexa will make to-do tasks randomly that she didn’t ask her to. She missed an important meeting yesterday because Alexa said it was today. She tried signing into the Alexa app, but her login didn’t work. She doesn’t really know what else to do, besides unplug Alexa and the TV. Her husband was the one who set up the “smart” devices, and she has no idea how any of it works.


PRO TIP: To avoid losing your work, type your answers separately, then copy-paste them here.
Required
Incomplete
Scenario 1
(1) Jacob wants to tell his girlfriend his suspicions, and get her to stop. What could he say? What should he do if she denies his accusations and gaslights him? 
(2) If he wants to check for/remove spyware on his phone, what can he do?
 (3) If Jacob’s experiment didn’t work and she doesn’t seem to be tracking him through his phone’s GPS, what could he try next? How could she be accessing his messages, for example?
 (Recommended length: 4+ sentences)
Required
Incomplete
Scenario 2
(1) Is it possible for Thiir to reclaim access to their streaming services and social media accounts? If so, how?
 (2) Let’s assume Thiir gains access to the services and accounts again, or creates new ones. What steps could they take to be proactive about making sure they are secure moving forward?
 (3) As an advocate, what kind of information/resources might you be able to share to help Thiir (or anyone else) from experiencing something like this again?
 (4) How would your response be similar/different if this was someone other than an ex-partner? (Recommended length: 5+ sentences)
Required
Incomplete
Scenario 3
(1) How can you help Yelena identify what data her husband has access to? Which of her logins/accounts seem to be compromised? (Hint: Not just her Amazon account!) (2) How might Yelena go about securing these devices and any financial accounts/email accounts connected to them? (3) Maybe Yelena cannot completely eliminate her husband’s access to the current devices. What are some safety planning suggestion(s) you could offer her in this case? (Recommended length: 4+ sentences)
Discussion