article

How Abusers Use Social Media Against Survivors

Online tactics to be aware of.

digital abuse
This information is for education only. It is not legal, medical, or emergency advice.
Digital Abuse

Impersonation and Monitoring in Abusive Relationships

What Are Impersonation and Monitoring?

In harmful or abusive relationships, technology can be used to control, frighten, or isolate someone. Two common tactics are impersonation and monitoring.

You may want to consider whether these patterns feel familiar in your situation. Noticing them does not mean you are to blame. It can simply help you name what is happening.

Impersonation: Pretending to Be You

Impersonation is when someone uses your identity without permission, especially online. They may pretend to be you to damage your reputation, gain information, or control who you talk to.

Examples of Impersonation

Why Abusers Use Impersonation

Possible Impacts of Impersonation

If you are worried that challenging impersonation directly could increase risk, you may want to focus first on documenting what is happening and learning about safer ways to adjust your accounts.

Monitoring: Watching, Tracking, and Checking Up

Monitoring is when someone repeatedly watches what you are doing, often without your full consent, and uses that information to control or intimidate you.

Examples of Digital Monitoring

Examples of Offline Monitoring

How Monitoring Can Feel

When Is Monitoring or Impersonation Abusive?

Some people share passwords or locations voluntarily in healthy relationships. The difference is in choice, respect, and safety.

Behaviors may be abusive when one or more of these is true:

Warning Signs You Might Be Impersonated

Warning Signs You Might Be Monitored

If you suspect your device is monitored, making sudden changes (like turning off location or changing passwords) can sometimes increase tension. You may want to think about possible reactions before changing anything.

Your Rights Around Privacy and Identity

Specific laws vary by place, but in many areas you may have rights that include:

For some people, contacting a legal aid organization, victim service agency, or trusted advocate can help clarify which laws may apply in your area.

Safer-Planning Around Impersonation and Monitoring

Everyone’s situation is different. You may decide to take some steps now, some later, or none at all. You remain the expert on what feels survivable and safest in your circumstances.

Possible Steps if You Suspect Impersonation

Possible Steps if You Suspect Monitoring

You can explore additional support options through resources listed at DV.Support, which collects information from a range of specialist services.

Supporting Someone Experiencing Impersonation or Monitoring

If someone tells you they are being impersonated or monitored, you may help simply by believing them and respecting their choices.

Emotional and Practical Considerations

Impersonation and monitoring can create constant stress and a feeling of being watched. This can affect sleep, concentration, work, school, and relationships.

You may want to consider:

Feeling unsettled or on edge in response to these behaviors is a common reaction. It does not mean you are “overreacting.” Many people find that getting language for what is happening is a first step toward making informed decisions.

Recommended Articles