Top 4 Tips for Cell Phone Safety

This post was originally written for Military OneSource, a website that provides resources and support for military personnel and their families. The original post can be found here.

According to one study, 89% of service members own a smart phone, and over half report regular social media activity. Our cell phones contain a lot of information about us, so keeping it secure and private from prying eyes is important. Privacy on a smartphone is especially relevant for anyone who may have a spouse or partner who is misusing technology to harass or control them. Here are 4 tips that technology safety experts recommend to keep your device safe and secure.

1.     Lock Down Your Phone

One of the most important things that everyone should do is to put a passcode on their phone. This prevents someone from going through it or installing unwanted apps or malicious software, such as spyware. Most phones allow users to lock their phone with a 4-6-digit code. Pick a code that someone close to you cannot guess and only you know.

Some phones have other passcode lock options, such as a pattern, thumbprint, or facial recognition. Be cautious about allowing others to put into your phone their own thumbprint or facial image. If someone else needed to get into your phone (and you trust them), you can always tell them your 4-6-digit code, and then change it afterwards.

2.     Review Your iCloud & Google Accounts

If you have a smartphone, you likely also have an iCloud (for iPhones) or a Google (for Android) account associated with your phone. These accounts often contain your phone’s back up, and depending on your settings, can also include sensitive information, such as photos, notes, contacts, calendars, and other personal information on your phone.

Unfortunately, these accounts can be accessed not just via the phone but from another phone or computer. This means that anyone who knows the username and password to your iCloud or Google account can log in and see some of the information that’s on your phone. Here are some tips on protecting all that personal data:

  • Make sure that only you know the username and password.

  • Ensure that the email address associated with the account is secure and no one else can access it.

  • Check to see if other devices are connected to your iCloud or Google account and remove those devices if you don’t want it connected.

  • Know what information (photos, contacts, notes, etc.) is backed up to your account. (You can choose what information to back up in the phone’s settings.)

3.     Know the Apps on Your Phone

Millions of apps are downloaded each day. Some of these apps use information from your phone to function (for example, Google Maps needs to know your location to provide directions), while other apps may share information on your phone in more malicious and even dangerous ways.

Here are some steps to increase the privacy and security of your phone.

  • Review the privacy settings on your phone to know what information is being accessed by which apps.

  • Delete apps that you’re not using, especially if they have a lot of permissions to access your data.

  • Deny access request for apps that do not need it. For example, a gaming app that doesn’t involve location doesn’t need your location and shouldn’t require it. 

  • Be cautious and avoid malware and other malicious apps by doing the following:

    • When your phone prompts you for a software update, say yes. These often include security updates to your phone’s operating system.

    • Don’t download apps outside of the official app stores. On Android phones, you can prevent this from accidentally happening by turning off “allow unknown sources” in the security settings. If you have an iPhone, don’t jailbreak the phone so that you can download apps not in the App Store.

    • If you download apps from the Google Play store, turn on Google Play Protect to scan for malicious software before they’re downloaded. 

    • Download anti-spyware and anti-malware tools. 

4.     Choose When to Connect to Wi-Fi & Bluetooth

While most smartphones now ask you to confirm if you want to connect with a Wi-Fi network or a Bluetooth-enabled device the first time, in most cases, if you’ve connected once, it’ll automatically connect again when you’re within range. Unless it’s a secure Wi-Fi network or it’s a Bluetooth device you trust (for example, you own the other Bluetooth device), consider “forgetting” the network or Bluetooth device after you’re done connecting. You can find this option under settings. Choose when to connect your smartphone, but more importantly, choose when NOT to connect.

Help and Resources

If you are concerned about your cell phone privacy and suspect your spouse or partner may have accessed or tampered with your device, help is available. Whether you are looking for help in talking to your partner about “hitting reset” on the use of technology in your relationship to establish healthy boundaries—or want to report domestic abuse or intimate partner violence facilitated through technology—the military community has your back.

You can:

  • Contact your local Family Advocacy Program (Department of Defense program), and an advocate can work with you to develop healthy boundaries in your relationship, create a technology safety plan or help you document abuse involving your smartphone and other devices.

  • Understand military reporting options. Know how to report domestic abuse in the military and what happens when you do. To learn more about military reporting options, including how to manage your safety, contact a Family Advocacy Program victim advocate.

  • Get help from the civilian community. If you are concerned about your safety and need immediate support, call the National Domestic Violence Hotline at 800-799-7233.

  • Learn more about technology privacy and security. Information for this article was provided by the Safety Net Project of the National Network to End Domestic Violence. To learn more about cell phone safety and location strategies, see this guide.

New Resource - Judicial Toolkit: Resources on Technology Abuse

We are pleased to announce a brand-new toolkit on technology abuse for judges and judicial officers. As technology becomes more pervasive and is misused to stalk, harass, and abuse, it is more important than ever that judges and judicial officers understand how technology is misused in the context of these cases. Within this toolkit are guides, quizzes, and resources, written specifically for judges and judicial officers on navigating digital evidence and understanding technology misuse in the context of domestic violence.

This toolkit also contains resources on how judges can use technology to enhance efficiency in and improve access to the courts, increase accessibility for self-represented litigants, and examine the changing legal landscape as it relates to the rise of cyberviolence cases.

You can access the Judicial toolkit here.

Don’t forget to check out our other toolkit, specifically the Legal Systems toolkit, written for criminal justice professionals, and the Technology Safety and Privacy toolkit for survivors.

© 2019 National Network to End Domestic Violence, Safety Net Project. This toolkit is funded through a grant from the Office for Victims of Crime, Office of Justice Programs, U.S. Department of Justice. Neither the U.S. Department of Justice nor any of its components operate, control, are responsible for, or necessarily endorse, this web site and toolkit (including, without limitation, its content, technical infrastructure, and policies, and any services or tools provided).

Tech Summit 2020 is Coming to the East Coast!

Call for Proposals is Now Open!

Is your organization using technology to work more effectively with survivors? Has your program or community responded in innovative ways to abusers’ misuse of technology? Have you worked creatively to use technology in ways that maximize survivor privacy and safety?

Safety Net is excited to bring Tech Summit 2020 to Washington, DC. We are in search of presenters who will inform, educate and inspire our audience of law enforcement, attorneys, advocates, and counselors. Workshops should provide tools and information to respond to technology abuse, enhance services for survivors of abuse, and hold offenders accountable.

We’re seeking content on topics related to technology, safety, and privacy that will be applicable to professionals working with survivors of domestic violence, sexual assault, stalking, and/or trafficking. Proposals should be survivor-centered and trauma-informed.

This link provides a TED Talk by Kimberle Crenshaw, known for the introduction and development of intersectional theory.

The session content should include innovative strategies and support best practices. Any proposal promoting technology to communicate with or for survivors should be grounded in well thought-out principles around privacy and safety.

We are particularly interested in proposals that focus on the following topics as they relate to technology safety, privacy, and confidentiality:

  • The Digital Divide

  • Online Organizing & Privacy Planning

  • Innovative Practices Using Technology

  • Emerging Technology

  • Data Security for Victim Services Agencies

  • Teens

  • Trafficking Victims

  • Law Enforcement, Courts & Prosecution

Here is a look at our 2019 Program Book.

All workshops will be 60-90 minutes in length. Only relevant and complete submissions will be considered. Submit your proposal for the 2020 Technology Summit.

The deadline for proposal submission is October 4th, 2019. Speakers who have submitted a proposal will be notified of the status of their application toward the end of October or early November.

Please contact safetynet@nnedv.org if you have any questions.

Thank you for the work that you do!

In Peace and Safety,

The Safety Net Team

tech summit 2020.jpg