top of page

Coercive Control

The silent abuse

Coercive Control

What is Coercive Control?

Coercive control is a pattern of controlling behaviours -psychological, emotional, financial, sexual, cultural, digital and environmental, and used to dominate, isolate, exploit and micro-manage a partner or ex-partner. It often occurs without visible injuries, but creates an atmosphere of fear, surveillance and dependency, and commonly includes technology-facilitated abuse as part of domestic and family violence.

​

Common tactics

  • Isolation & surveillance: cutting off friends/family, monitoring messages and social media, GPS/Bluetooth trackers, smart-home/IoT spying, controlling transport/phone/car apps.

  • Intimidation & threats: threats of harm, self-harm, deportation, “outing,” pet abuse, property damage, publishing private data (doxxing) or intimate images (image-based abuse/NCII).

  • Degradation & gaslighting: constant criticism, humiliation, denial of events, rewriting history, sleep deprivation, impossible “rules” and micromanagement.

  • Financial abuse (economic control): taking over income, debts in victim’s name, blocking work/study, tracking spending, seizing IDs, coerced debt.

  • Reproductive & sexual coercion: sabotaging contraception, pressure around pregnancy/termination, coerced sex, stealthing.

  • Legal/administrative abuse: vexatious reports, misusing courts/child-contact orders, immigration or tax threats to maintain control (paper abuse).

  • Technology abuse: stalkerware/spyware, account takeovers, abuse of 2FA, Family Sharing/Google Family Link misuse, hidden cameras, AirTag/Tile stalking, deepfakes, impersonation.

  • Post-separation abuse: continued stalking, cyber-harassment, misuse of parenting apps, vehicle telematics tracking, financial sabotage after leaving.

What is Coercive Control?

Identifying Coercive Control

The following is a guide to some of the key behaviours that could indicate you are a victim of Coercive Control.

How to recognise it

Look for repeated, escalating behaviours that reduce autonomy and create fear (not a single argument). Constant check-ins; demands for real-time photos or proof of location.

Behavioural & psychological

Intense love-bombing > rules/punishments; gaslighting; put-downs/humiliation; sleep deprivation; forced routines; threats of self-harm.

Economic/financial control

Seizing income, coerced debt, blocking work/study, tracking spending, restricting transport/phone access.

Social isolation & reputation attacks

Cutting off friends/family; controlling clothes and time; smear campaigns, fake profiles, workplace interference.

Children & co-parenting

Weaponising parenting apps, school portals, Family Sharing/Google Family Link; using kids to gather intel or enforce rules.

How coercive control works (pattern, not incidents)

  1. Rapid bonding & trust (love-bombing, idealisation).

  2. Rule-setting (what you wear, who you see, when you respond).

  3. Surveillance & enforcement (checking phones, location, receipts, “Find My”).

  4. Punishments & intermittent rewards (silent treatment vs apologies/gifts).

  5. Entrapment (fear, dependency, exhaustion, loss of resources/support).

​

Red flags

  • Extreme jealousy; time-tracking; needing photos/proof of location.

  • Pressure to share passwords, biometrics, or authenticator codes.

  • You “walk on eggshells”; rules shift; fear of “consequences.”

  • Unexplained 2FA prompts, account lockouts, new email forwarding rules.

  • Strangulation history, threats with weapons, threats to children/pets (strong lethality markers).

  • After separation: sudden appearance at locations, car-trip logs you didn’t share.

​

Impact on victim-survivors

  • Psychological injury: anxiety, hypervigilance, depression, PTSD-like symptoms.

  • Economic harm: job loss, debt, ruined credit, blocked education.

  • Social isolation: loss of networks, community and professional reputation.

  • Digital trap: round-the-clock monitoring, post-separation abuse via tech.

​

Safety-first steps

  • Prioritise physical safety. If you’re in danger, call 000 (Australia).

  • Preserve evidence: keep a pattern log (dates, behaviours, impacts), screenshots, messages, call logs, tracker IDs, photos of damage, witness details.

  • Digital safety: secure email/cloud first, change passwords, move recovery details, enable app-based 2FA, revoke sessions/tokens, add SIM-swap/port-out PIN; review sharing (Find My/Family Link), social privacy, and smart-home access.

  • Environment checks: consider TSCM sweeps for cameras/bugs/trackers; re-secure Wi-Fi/router, reset car apps and remove paired phones.

  • Specialist support: safety planning, legal advice (including tech-specific conditions in orders), and trauma-informed counselling.

Technology Safe

Services for Coercive Control

TSCM (Technical Surveillance Counter-Measures) sweeps directly disrupt technology-facilitated abuse by finding, proving, and removing covert surveillance—then hardening the environment so it can’t happen again.

TSCM Home
Sweep

Inspection of house that detects and removes hidden cameras, listening devices, and other surveillance threats to ensure your privacy.

TSCM Car
Sweep

​

​

Inspection of a vehicle to detect and remove GPS trackers, hidden microphones, or other surveillance devices.

TSCM Device
Sweep

Inspection of phones, computers, and tablets to detect spyware, stalkerware, or other malicious software.

Coercive Control FAQ

What are examples of coercive control?
Isolation from friends/family, monitoring devices and accounts, financial control, gaslighting, intimidation, sexual/reproductive pressure, legal harassment and post-separation stalking.

​

What evidence helps prove coercive control?
A pattern log plus screenshots, emails, call records, access logs, photos of damage, tracker serials, witness statements and professional reports (e.g., TSCM findings).

​

How can I safely leave a coercive-control relationship?
Work with a support service on a safety and digital-safety plan, secure accounts, arrange private communications and transport, and coordinate legal protections; avoid sudden device resets that could escalate risk.

​

Is coercive control always a crime?
It depends on the jurisdiction and context; behaviours may breach multiple laws even if “coercive control” isn’t a standalone offence—get local legal advice.

​

Is coercive control the same as emotional abuse?
They overlap, but coercive control is a pattern designed to dominate and restrict freedom across life domains (social, financial, digital), not just isolated emotional harm.

​

Can coercive control exist without physical violence?
Yes—many cases involve no visible injuries yet include surveillance, threats, financial abuse, and technology-facilitated abuse that create ongoing fear.

​

How does coercive control show up online?
Through account takeover, stalkerware/spyware, doxxing, image-based abuse (NCII), impersonation, and misuse of GPS trackers, smart-home devices, and car apps.

​

What are early red flags of coercive control?
Rushing intimacy, isolating you from supports, making rules about your time/clothes/contacts, demanding passwords, tracking your location, gaslighting, and financial micromanagement.

​

Is love-bombing a sign of coercive control?
Often. Intense affection, gifts and constant contact can flip into monitoring, rules and punishments once dependency is formed.

​

How is financial abuse part of coercive control?
Controlling income, forcing coerced debt, blocking work/study, seizing IDs, and monitoring spending to enforce dependence.

​

How do abusers use children in coercive control?
Misusing parenting apps, school portals and Family Sharing/Google Family Link, making threats about custody, or undermining co-parenting to maintain power.

​

What is post-separation abuse?
Continued stalking, cyber-harassment, image-based abuse, financial sabotage and legal abuse after you leave—often escalated via technology.

​

Can coercive control be accidental?
No. While someone can have poor conflict skills, coercive control is strategic and patterned, aiming to reduce autonomy and enforce compliance.

​

How do I document coercive control for court or police?
Keep a pattern log (dates, behaviours, impacts), screenshots, emails, call logs, tracker serials, photos of damage, witness details, and professional reports (e.g., TSCM findings).

​

What legal protections exist?
Depending on jurisdiction: intervention orders / AVOs / IVOs, tech-specific conditions (no tracking/contact, device surrender), and offences for stalking, surveillance, threats—seek local legal advice.

 

Can coercive control affect my job or visa?

Yes—economic abuse and legal/administrative abuse can jeopardise employment, housing, credit and immigration status; ask a specialist service for tailored support.

​

How do I safety-plan around technology?
Secure email/cloud/telco first, move recovery info, use app-based 2FA, revoke sessions/tokens, audit sharing (Find My/Family Link), tighten social privacy, reset Wi-Fi/IoT, and consider a TSCM sweep.

​

Does a VPN stop coercive control online?
No. A VPN doesn’t fix account takeover, spyware, GPS tracking or smart-home abuse; it’s one tool, not a solution.

​

What if my partner works in IT/cybersecurity?
Assume higher capability: prioritise account triage, separate devices/identities, rotate credentials, add SIM-swap/port-out PIN, and get specialist digital-safety help.

​

Are tracking devices like AirTags illegal to use on someone?
Non-consensual tracking can breach stalking and surveillance laws; preserve evidence (device ID, timestamps) and seek police/legal advice.

​

How is gaslighting used in coercive control?
Denying events, rewriting history, and undermining your memory to erode confidence and increase dependence.

​

What’s the difference between boundaries and coercive control?
Healthy boundaries are mutual and respect autonomy; coercive control imposes unilateral rules with monitoring and punishments.

​

How can workplaces support victim-survivors?
Confidential contacts, safety flags (visitor alerts), protected contact details, flexible leave, and tech-safety policies for email, calendars and shared drives.

​

How do I help a friend I’m worried about?
Believe them, avoid blaming, help record incidents, share support services, and discuss safety and digital-safety plans—don’t pressure them to leave before it’s safe.

​

How can I reduce data exposure that fuels coercive control?
Use a password manager, unique passwords, 2FA, limit data sharing, lock down social media, and opt-out from data-broker/people-finder sites.

​

Where can I get confidential support in Australia?
Contact 1800RESPECT (1800 737 732) for 24/7 counselling and referrals; call 000 in an emergency.

Technology Safe

Counter Surveillance

Sweeps to detect and remove hidden cameras, listening devices, GPS trackers, and digital spyware used for unauthorized monitoring. Our expert services ensure your home, vehicle, and personal technology remain secure, protecting your privacy and peace of mind.

Technology Safe

Property Safety

Thorough evaluation of your home, business, or facility to identify potential security risks, vulnerabilities, and safety hazards. Our expert team provides tailored recommendations to enhance overall safety, prevent unauthorized access, and ensure a secure environment for occupants and assets.

Are you from a Support Service

or Organisation?

Technology Safe assist Domestic Violence, Family Violence and

other support services across Australia.

Technology Safe

Free Same Day Metro Delivery

Order by 11am AEST

Education and
Training Sessions

Complementary for our referral partners

Technology Safe are licensed, insured and exceed regulatory compliance.

Everyone in our team has Working with Children's Check.

Technology Safe

Online Store
and Wearables

Technology products that keep you safe 

Technology Safe

Help Centre
and FAQ

Complementary for our referral partners

bottom of page