We often think of sexual harassment, sexual abuse and domestic violence as interactions that happen in-person, but technology has made it easier for abusers to cause harm without any face-to-face contact. This threat, known as technology-facilitated abuse, is increasingly prevalent and poses serious risks to victims and to the integrity of our military readiness.
In today’s highly connected world, the digital tools we rely on daily — laptops, mobile phones, smart watches, apps, GPS and automated home devices—can become weapons in the hands of those with ill intentions.
“Technology has expanded the reach and methods of abuse, allowing perpetrators to control, monitor and harm victims remotely,” said Special Agent Matthew J. Haywood, Chief of the Family and Sexual Violence Division at the Army Criminal Investigation Division in Quantico, Virginia.
Technology-facilitated abuse is defined as a range of behaviors in which digital technologies are used to bring about both online and offline interpersonal violence. An internet connection and a device can give abusers the ability to stalk, harass or manipulate victims, even from a distance. Through social media, messaging apps, hidden cameras, smart home devices or GPS trackers, perpetrators can maintain control over a victim’s movements, relationships and mental state without ever raising a hand.
As stated by the National Domestic Violence Hotline, technology-facilitated abuse includes online harassment, cyberstalking and the use of digital services to intimidate, bully or maintain control over someone. From sextortion, by which abusers threaten to release intimate images unless demands are met, to intimate-partner surveillance via spyware or GPS tracking, to image-based sexual exploitation (also referred to as revenge porn), these are not minor concerns or private matters. These actions are criminal, and in the tight-knit culture of military life, the effects can be even more devastating.
Victims may feel pressured to remain silent out of fear of retaliation, career consequences or loss of social support within their unit or installation community.
“Technology-facilitated abuse undermines unit cohesion, morale and mission readiness. It’s incompatible with our values,” said Haywood.
For those who may not realize they’re experiencing tech-based abuse, it can begin subtly—like a partner asking to check your phone or insisting on knowing your location at all times.
"This form of abuse often escalates, eroding the sufferer’s confidence, independence and access to social support systems," said Haywood.
Members of the Army community should familiarize themselves with resources like the Power and Control Wheel, which outlines common abuse tactics, including those that aren’t physical but are still damaging.
Soldiers and their Family members should stay vigilant and look out for the following signs that their technology may be misused or that someone they care about may be a victim of technology-facilitated abuse:
- Being approached online by unknown individuals who quickly steer the conversation toward sexually explicit topics or request intimate images.
- Finding unknown tracking devices or suspicious apps on phones, laptops or vehicles.
- Being pressured into giving up passwords or access to personal devices or accounts.
- Having social media monitored or controlled by a partner.
- Sudden changes in emotional health—withdrawal, anxiety or fear without a clear reason.
“These tactics make it increasingly difficult for victims to find privacy or peace of mind. And in the military context, these concerns are compounded by the implications for one’s career, clearance and community,” Haywood said.
Abusers who use technology to intimidate, control or harass others can and should be held accountable. Under the Uniform Code of Military Justice, offenders may face charges for:
Stalking. Stalking is repeated unwanted behavior that includes attention, contact, harassment or other conduct toward a specific person. Stalking can be committed in person, by following the victim or by monitoring and harassing the victim electronically.
Extortion. The use of force, threats or intimidation to instill fear in the targeted individual that something harmful will happen if they do not comply with the extortionist’s demands. This scheme can take various forms, such as threatening violence, revealing harmful information or pressuring someone to act against their will.
Wrongful distribution of intimate images. Sharing sexually graphic or explicit images, including pictures and videos, without the consent of the individual depicted, such as using hidden cameras, hacking digital accounts or recording secretly as well as images obtained with consent, typically in the context of an intimate relationship and with an understanding that the images will remain private. Posting the photos or videos to social media platforms or sending them directly to another person is considered a method of distribution.
In April, Congress passed the TAKE IT DOWN Act, amending federal law to criminalize the nonconsensual publication of intimate images, including AI-generated forgeries or digital replicas. This law gives Army CID Agents greater legal tools to pursue justice for victims.
Penalties for offenders can include court-martial, dishonorable discharge and imprisonment. In addition, as of 2016, retaliation against victims who report abuse is a punishable offense under the UCMJ. Victims of digital abuse are not alone. Dr. Carmen Leggett, Family Advocacy Program specialist, said that technology-facilitated abuse often goes unseen and can have lasting effects on one’s mental health, safety and career.
“Just because the bruises aren’t visible doesn’t mean the damage isn’t real. Digital abuse leaves scars on the mind, the spirit and the sense of safety,” she said.
“It’s not just about phones or computers—it’s about power, control and manipulation.”
If you have experienced technology-facilitated abuse or need help leaving an abusive relationship, contact your nearest FAP office. A domestic abuse advocate can explain reporting options and make referrals for additional support services. The Army provides multiple confidential resources, including:
Sexual Harassment/Assault Response and Prevention
Army CID Cyber Field Office (provides support, counseling and investigative services)
These programs offer victim advocacy, counseling, digital safety planning and investigative support.
“Criminal behavior has no place in our Army,” Haywood said.
CID agents routinely work with units across the Army to educate Soldiers on crimes affecting their installation and can provide tailored training to address specific topics, such as technology-facilitated abuse.
Abuse is never the victim’s fault, but digital literacy can reduce opportunities for exploitation. Preventive strategies include using unique passwords for web accounts, regularly updating apps and devices and scanning devices for unauthorized software or access.
“Awareness is armor. When Soldiers and Families understand the tactics of tech-facilitated abuse, they are better equipped to defend themselves and support others in breaking free,” said Leggett.
Discussing and addressing interpersonal violence, like technology-facilitated abuse, can help keep Army communities safe.
“We encourage every Soldier, spouse, Family member and leader to stay informed of the visible scars of abuse and the invisible ways that harm may be inflicted,” said Leggett.
Your awareness could be the first step toward healing or helping someone exit a dangerous situation. Recognizing the signs, taking reports seriously and knowing where to turn for help can save lives and preserve the integrity of our Army.
If you have experienced technology-facilitated abuse or need help leaving an abusive relationship, contact your nearest FAP office. A domestic abuse advocate can explain reporting options and make referrals for additional support services.
The Army provides multiple confidential resources, including:
Sexual Harassment/Assault Response and Prevention
Army CID Cyber Field Office (provides support, counseling and investigative services)
These programs offer victim advocacy, counseling, digital safety planning and investigative support.
“Criminal behavior has no place in our Army,” Haywood said.
CID agents routinely work with units across the Army to educate Soldiers on crimes affecting their installation and can provide tailored training to address specific topics, such as technology-facilitated abuse.
Abuse is never the victim’s fault, but digital literacy can reduce opportunities for exploitation. Preventive strategies include using unique passwords for web accounts, regularly updating apps and devices and scanning devices for unauthorized software or access.
“Awareness is armor. When Soldiers and Families understand the tactics of tech-facilitated abuse, they are better equipped to defend themselves and support others in breaking free,” said Leggett.
Discussing and addressing interpersonal violence, like technology-facilitated abuse, can help keep Army communities safe.
“We encourage every Soldier, spouse, Family member and leader to stay informed of the visible scars of abuse and the invisible ways that harm may be inflicted,” said Leggett.
Your awareness could be the first step toward healing or helping someone exit a dangerous situation. Recognizing the signs, taking reports seriously and knowing where to turn for help can save lives and preserve the integrity of our Army.
Social Sharing