I had to sweep a house because of a tech savvy abusive ex and to make sure he’s completely cut off everything... and boy it was an interesting experience.
-
Show this thread
-
I really wish I could share more details but I’ll leave you with these in case it’s helpful: - Think about when you can’t trust none of the electronic devices in your house. None. - You might have to unscrew the power outlets to check for cameras, mics, etc.
13 replies 244 retweets 2,924 likesShow this thread -
- You might need to check where every cable goes in the house. There are some creepy ass shit you can find if the person owned the house and lived in it for a long while. - You might need to reinstall the firmware of *every* connected device, and maybe throw away some stuff.
7 replies 158 retweets 2,531 likesShow this thread -
- Then you’d have to go through all the online accounts. Bills, banks, etc. And perhaps the most important part is to remain calm and positive especially because you have to work with the survivor(s) to go through some of the most triggering details.
4 replies 137 retweets 2,677 likesShow this thread -
- Think about every packet of traffic as it travels across the house. You are working in an environment that has been architected by a psycho stalker you’re trying to cut off. They *always* have plan B/C/D to regain access. - Don’t underestimate their motives and capabilities.
7 replies 164 retweets 2,554 likesShow this thread -
- I recommend throwing in a firewall like
@pfsense. You can build it yourself or order it online. Block all the incoming traffic. Make sure everything is set to automatic updates. - Simplify the setup as much as you can. I can’t stress this enough.5 replies 128 retweets 2,314 likesShow this thread -
- And most importantly, document everything in simple language and explain how the survivor(s) can unplug everything if they feel unsafe. It’s not your job or place to decide whether that feeling is rational.
6 replies 135 retweets 2,843 likesShow this thread -
Your documentation should be clear enough for a non-technical user to to read and follow while having a panic attack. Remember that’s probably the most important time it’s gonna be used. Write an “incident response protocol”-like guide with clear short steps for emergencies.
5 replies 172 retweets 2,971 likesShow this thread -
And have in mind... every situation is unique. Listen carefully and pay attention to all the details. I hope this is useful. I try to do my best and answer questions as much as I can over here or via DM.
8 replies 74 retweets 2,007 likesShow this thread -
We’re setting Kandoo up to help vulnerable people and similar situations. Tune in at
@kandoo_tech for more details. And reach out if you need help. Just be patient with us as we’re a very tiny and new nonprofit org :)47 replies 213 retweets 2,762 likesShow this thread
But in the above case: did you find anything? And if so, was it legally actionable? Or was this more a list of things you want people to consider in general?
-
-
Replying to @Plinz @kandoo_tech
Due to the nature of our work, unfortunately we can’t share details about the cases we handle.
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.