entertainment systems (stereo, TV, etc.).smart electrical outlets (with lights or other devices plugged into them).Some examples of connected devices that allow you to use cyber-surveillance include: Then, an abuser may misuse these devices and the systems that control them to monitor, harass, threaten, or harm you.Ĭyber-surveillance can be used in a variety of helpful ways, and you may choose to use cyber-surveillance to monitor and control your own property or add certain conveniences to your life. An abuser could use his/her computer (or other device that is connected to the Internet, such as a phone or tablet) to hack into your devices. However, cyber-surveillance also allows connected devices to play a role in how people and places are monitored. These devices and systems offer tools you can use to increase your own safety and convenience. Devices may be connected through a home network, the Internet and WiFi, Bluetooth, or other means. For example, you may have a television connected to the Internet that you can control from an app on your cell phone or tablet or appliances like coffee machines can be connected to a network and controlled remotely with another device (such as your computer or phone). Devices used for cyber-surveillance are generally connected to each other and to a device or app that can control them.
![decipher textmessage trust decipher textmessage trust](https://deciphertools.com/images/screenshots/decipher-textmessage-win-2x.png)
This type of connected technology has also been called the “Internet of Things” (IoT). Cyber-surveillance is when a person uses “smart” or “connected” devices that communicate through a data network to monitor people or places.