What kind of harm can this cause?

These are the outcomes: the reasons all of this matters.

Once access is established and tools are in place, what follows is not random. It is often deliberate, strategic, and highly personal. The aim is rarely just to “spy.” It is to undermine your autonomy, your relationships, your finances, and your sense of what is real.

Surveillance

Not the distant, satellite-dish kind. This is intimate.

Monitoring your private messages, call logs, and emails. Watching your location history and physical movements. Checking your browsing activity and app usage. Observing patterns: when you sleep, who you talk to, where you go on a Thursday.

The surveillance itself is often less important than its effect. When you suspect you are being watched, you begin to self-censor, second-guess your choices, and avoid the people and services that might help you. The watcher does not need to act on what they see. The knowledge that someone might be watching is often enough.

Control

Surveillance feeds control. Once your movements, needs, and fears are visible, they can be acted on.

Blocking access to shared bank accounts or financial services. Deleting job applications or professional communications. Locking you out of your own devices or accounts. Using smart home systems to regulate your environment without your consent. Applying pressure through what appears to be concern about your routine, your spending, or your contacts.

Control is most effective when it is exercised quietly. Obvious coercion leaves evidence. Ambient control, “I’m just worried about you,” does not.

Isolation

One of the oldest tactics in coercive control, updated for digital contexts.

Deleting contacts or blocking numbers on your device without your knowledge. Sending messages in your name that offend or confuse your support network. Creating social media drama that gradually pushes people away. Monitoring your communication so closely that you stop reaching out. Accessing group chats or direct messages to sow confusion or false information.

The goal is to remove the people who might support you, believe you, or help you leave. By the time the isolation is complete, it can feel like it happened through a series of ordinary events rather than through deliberate action.

Reputation harm

False accusations posted online or sent privately. Doctored screenshots. Private messages or images shared without consent, or in misleading contexts. Reports made to employers, schools, or professional bodies. Fake accounts created in your name to cause trouble with your network.

Reputation harm works because it places the burden of correction on the person being targeted. Proving that something did not happen, or that content is fabricated, is far harder than creating the content in the first place. AI tools have made this significantly worse: synthetic audio and images that were previously difficult to produce are now accessible to anyone with a smartphone.

Entrapment

The use of institutional and legal systems as weapons.

Fabricated or selectively edited evidence submitted in legal proceedings, custody disputes, or complaints to social services. Repeated legal action designed to drain time, money, and energy rather than to win a specific case. False reports to the police designed to create a record or to trigger a response.

This is particularly difficult to counter because the institutions receiving false information are not equipped to verify digital evidence reliably. The system can be used against you while appearing to function normally.

Financial control

Digital access enables financial control that can be difficult to detect and harder to trace.

Monitoring of spending through shared banking apps. Blocking access to accounts or transferring money to create dependency. Generating debt in your name through shared credit or buy-now-pay-later systems. Sabotaging employment through reputation damage or direct interference with a workplace. Financial manipulation does not always look like theft; it often looks like management, assistance, or concern.

Financial independence and digital independence are increasingly the same thing. Restricting one restricts the other.

Cross-platform persistence

Abuse does not stay in one place. When contact is blocked on one channel, it moves to another: from messaging to email, from email to social media, from social media to mutual contacts, colleagues, or professional networks. Physical separation does not create digital separation.

Safety that depends on blocking one account on one platform is incomplete. It requires thinking about the whole ecosystem: every channel, every shared contact, every place where your identity or information is accessible.

A word on this section

These threats are not technical problems with technical solutions. They are human ones, shaped to look like coincidences, glitches, and misunderstandings. Naming them is the first step toward addressing them.

You are not imagining it. You are not overreacting. And understanding what is happening is not the same as accepting it.