What do these look like in real life?

This is where theory meets practice. The attack patterns below are not hypothetical; they are the recurring shapes that technology-facilitated abuse takes. Each has a technical method underneath it, but the goal is always the same: reduce your independence, your credibility, and your sense of safety.

Persistence through legitimate access

“I never hacked anything. I already had access.”

This is the most common pattern. The abuser does not break in; they use access that was granted during the relationship and never fully revoked. Shared Apple or Google accounts, family sharing plans, saved browser sessions on a device that passed through their hands, a streaming service with a shared login.

The key feature of this pattern is that nothing looks unusual from the outside. The access appears legitimate because it once was. This makes it difficult to detect, difficult to explain to others, and difficult to act on without understanding what is actually shared.

Recovery-chain hijacking

Control the email. Control everything.

Once someone has access to a primary email address, they can trigger password resets across connected accounts, intercept verification codes, change recovery options to point somewhere else, and lock the original account holder out. The reset emails go to the compromised inbox. The alerts about new logins go to the compromised inbox. By the time anything is noticed, the chain may already have been traversed.

This pattern often begins with a compromise that feels small (a shared account, a forwarding rule, a backup email address that was never changed) and expands outward. The dependency structure of modern accounts means one point of access is rarely just one point of access.

Ambient surveillance

Not constant action. Constant visibility.

Location tracking through shared accounts or installed software. Message previews visible on an unlocked device. Cloud-synced photos uploading automatically. Smart home devices reporting presence and routine. Fitness app routes logged and accessible. This pattern does not require active intrusion; it requires that access was established at some point and was never removed.

The effect is a background awareness of your movements, communications, and state that shapes an abuser’s behaviour without ever being made explicit. They know where you were. They know who you spoke to. They know before you tell them. And you may not be able to identify how.

Narrative manipulation

Control what others believe.

This pattern uses digital tools to shape the account that friends, family, employers, or legal and social systems receive. It includes fabricated screenshots and edited chat logs presented as evidence; AI-generated images, video, or audio attributed to you; fake accounts sending messages in your name; selective disclosure of real content stripped of context; and false reports to employers, schools, social services, or the police.

The pattern exploits the credibility gap between “here is a document” and “I can prove it is false.” Courts, employers, and platforms are not equipped to assess the authenticity of digital evidence reliably. The burden of proof tends to land on the person being targeted.

Abuse shifts from “I say this about you” to “here is apparent proof you did it.”

Escalation via frustration

Push until mistakes happen.

Account lockouts, repeated harassment spikes, and coordinated pressure are used to create a state of anxiety and exhaustion in which security decisions are made poorly. Someone who has just been locked out of their own account for the third time is more likely to reuse a familiar password. Someone who is overwhelmed is less likely to maintain careful separation of accounts and devices.

This pattern is often combined with others: harassment creates pressure, pressure creates errors, errors create new access points. The aim is not a single dramatic intrusion; it is a gradual erosion of the conditions that make security possible.

Stalkerware in practice

Purpose-built stalkerware can track GPS location in real time, record calls, access messages and emails, activate microphones and cameras, and log keystrokes including passwords. It requires brief physical access to install and is designed to be invisible once running.

Commercial stalkerware is marketed as parental control or employee monitoring software, but the products are built for surveillance of adults in domestic settings. DIY equivalents using automation apps or abused “family safety” products achieve similar results.

Location tracking in practice

Beyond phone GPS, location can be tracked through Bluetooth trackers hidden in bags, cars, or clothing; shared account features like Apple Find My or Google Location Sharing; geotags on photos; calendar entries synced across accounts; ride-hailing history; and fitness app routes. The danger is not only being watched but being anticipated. Showing up where you did not announce you were going is not a coincidence when your movements are visible.

AI-generated content in practice

Voice cloning from a few seconds of audio produces synthetic audio that can sound convincing to people who know you. Image generation tools can produce realistic fake photographs. Video synthesis is more technically demanding but available. This content is used for harassment, blackmail, reputational damage, and false evidence in legal contexts.

Even where the content is eventually identified as fabricated, the harm often precedes that identification by a significant margin.

Financial manipulation in practice

Control over shared banking applications, credit cards, and subscriptions is used to monitor spending, block access to money, create hidden debts, or generate fraudulent transactions. Buy-now-pay-later systems can be used in someone else’s name. Financial monitoring and disruption are tools of dependency: the goal is to reduce the economic options available to you, not necessarily to take money outright.

Smart home gaslighting in practice

Remote control of lights, thermostats, locks, and speakers creates an environment that responds unpredictably, where things happen without explanation and are difficult to describe to someone who has not experienced it. The effect is psychological: a persistent sense of unpredictability in a space that should feel safe, and a creeping uncertainty about your own perception of events.

More words

Every one of these patterns is about power and control. The technology is the delivery mechanism. Naming the pattern is not the same as having a solution, but it is the start of one: if you can see it, you can plan around it.

You are not imagining it. You are not overreacting. And there are ways forward.