Surveillance Methods As A Defense by Charles E. Corry, Ph.D.

This site is copyrighted, supported, and maintained by the Equal Justice Foundation.


 

| EJF Home | Join the EJF | Comments? | Get EJF newsletter | Newsletters |

|| DV Home | Abstract | Contents | Tables | Index | Bibliography |

 

| Chapter 9 — The Male Perspective |

| Next — You can sue but you can't win (if you are a man) |

| Back — Defensive male actions under current law |


 

NOTE: The Equal Justice Foundation does not endorse or condone unlawful surveillance, civil harassment by use of electronic devices for purposes of annoyance or embarrassment, or the invasion of any citizen's privacy. You would be well advised to become familiar with your local and state laws, or to consult an attorney before employing any surveillance methods such as those outlined here. Personal communications between a husband and wife are generally regarded as privileged and subject to special restrictions.

WARNING: The use of the following or similar methods of surveillance may in some cases increase the level of danger to an individual. The Equal Justice Foundation is not responsible for actions or injuries that might result if surveillance methods described below are used.


 

Contents

Introduction

Audio methods

Telephone monitors

Voice-activated recorders to monitor abuse at home

Portable digital voice and video recorders

Trials, hearings, conferences, mediation, and other meetings

Transcripts from audio recordings

Computer surveillance

Video cameras


 

Dating and one-night stands

 


 

Introduction

Top

Sources for surveillance hardware and software can be found here.

Surveillance technology is both improving and becoming more affordable. There have been massive changes and improvements since this essay was originally written nearly two decades ago and it is impossible for us to stay current on such changes. If you find some new device or technology please let us know by hitting the Comments button. Surveillance hardware and software we are currently aware of is listed here.

While we are well aware of the potential for abuse of surveillance, the level of threat many men, women, and their children face justifies virtually any defense they can mount. That threat is particularly acute when citizens are meeting with child “protective” services or other social workers, police, district attorneys, or court hearings. It is the recommendation of the Equal Justice Foundation that all conversations with public officials be recorded by the citizen. We have seen too many examples of court transcripts altered or the recording considered “inaudible” to have any remaining faith in the court system. Prosecutors and police can legally lie, and CPS case workers lie routinely. Perjury is rarely, if ever prosecuted so assume it won't be. Also, we have heard numerous reports of attorney and victim advocates suborning perjury with no penalty.

A citizens only real defense is to record all contacts, meetings, and hearings!

The methods of surveillance described below can be used equally by men or women but our emphasis here is helping men who are being abused or stalked. Note that in many cases where we know men were the ones being stalked, the legal system has been perverted to the point the woman doing the stalking has successfully charged her victim with the very crimes she committed.

We have been astonished at how frequently men are stalked by women and how difficult that is to prove. In such cases these surveillance methods may be of some use to counter a woman's lies. However, it may be very difficult for you to get the monitors to work in a manner that will provide evidence admissible in court But simply the fact that her actions are being recorded may be sufficient to deter some women. Surveillance is no deterrent to a psychotic of either sex, however.

But be aware that use of such devices may lead to stalking charges against you.

Surveillance methods

Top

There are basically three types of surveillance that can be done at reasonable cost and effort, audio, computer, and video. All descriptions here assume a reasonable degree of technical skill in making computer connections, using a cell phone, installing software, running telephone lines, setting up mechanical devices, and a few basic carpentry skills and tools. You will probably find it useful to Google “surveillance systems reviews” if you are planning to use surveillance methods in your defense. A GPS vehicle tracking system may also be a worthwhile investment if your wife is having an affair. Also, if you suspect infidelity you may want to try out Checkmate's semen detection kit to see if those white, starchy stains in her panties, on her clothes, or elsewhere are what you think they are. Paternity testing consistently shows that ~30% of the time the man being tested is not the biological father of the child(ren) in question so DNA paternity tests are essential if child support is in question.

And don't ignore the fact that she (or he) may be using surveillance methods against you as part-and-parcel of her (or his) stalking. You should regularly sweep any area you occupy for “bugs” such as cameras or microphones. One inexpensive device for doing this is the Bug Scanner, but other, more $ophisticated devices are available. Search the Web under “technical surveillance countermeasures,” “TSCM,” or “electronic debugging.”

You may also want, or need to hire a private investigator, depending on the circumstances of your case, but the cost will typically be much higher than the methods listed here. However, a private detective can usually do things it would be illegal for you to do in these cases and they have methods and means usually unavailable to private citizens.

For all three methods it is essential that the time and date be an integral part of the recordings. And the time/date stamp on your records must be tied to a standard in a demonstrable fashion if you are to have any chance of getting the record admitted in court. Note that modern cell phones do this automatically.

Timeline

Top

You must also keep a timeline, i.e., a written journal noting the date, time, and location of all notable events as many things will happen that won't be caught by the surveillance equipment. The most effective way to keep a timeline is usually with a spreadsheet but a notebook or 3x5 index cards work as well.

But don't leave your journal laying around anywhere where she can find it!

While it is a felony to destroy evidence, if your intimate partner, or stalker, can get her hands on the recordings she is very likely to destroy them and the instruments without penalty. Thus, it is essential that the records be stored somewhere she does not have access to such as a safe deposit box, a drawer at work, a friend's house, etc. Anywhere that is dry, relatively dust free, and not subject to extremes of temperature can be used to keep your recordings. That means your car trunk or glove box, or attic are not good places, but your garage or workshop might be.

However, a number of men have written us who kept such information at home. The woman then obtained a restraining order barring him from his home and that prevented him from retrieving the evidence. So any location a woman might be able to bar you from returning to is not a good place to keep your surveillance records and timeline.


 

NOTE: The Equal Justice Foundation does not endorse or recommend any of the products listed or condone their use for illicit or immoral purposes. Links are provided solely to provide a starting point for men and women who are seeking to defend themselves from abusive partners or stalkers and to document illegal actions. Other products and methods may be more suitable in an individual case than those described here.

WARNING: The use of the following or similar methods of surveillance may in some cases increase the level of danger to an individual. The Equal Justice Foundation is not responsible for actions or injuries that might result if surveillance methods described below are used.


 

Audio methods

Top

Sources for surveillance hardware and software can be found here.

Common surveillance instruments that are widely available for audio recording include cell phones, telephone recorders, portable microcassettes, portable digital recorders, and voice-activated recorders. Note that if you are recording directly on, or transferring recordings to an older computer you may need to upgrade to a larger capacity hard drive, typically at a cost of ~$200 for parts and labor. But all modern computers, i.e., post-2005, include multigigabyte drives and storage is seldom a problem anymore. USB flash drives that hold as much as a terrabyte of data are now commonly available as well. Such flash drives are also very convenient to make backups that one can easily carry on your person as well so that nothing need be left on your computer.

Telephone monitors

Top

It is fundamental in all domestic violence and abuse, as well as stalking situations to have caller identification on any phones you use. And check the name and number before picking up the phone. Or use voice screening with an answering machine for all calls and many phone services now provide provisions for blocking calls from selected numbers. There is no excuse for not practicing self defense!

Cell phones

By 2018 the use of cell phones became ubiquitous. A bad joke is that cell phones were invented for women to report restraining order violations with. So it is very likely that your nemesis has one. However, that can work in your favor as well as against you.

For one thing, virtually all cell phone companies track the location of the cell phone whenever it is turned on. Generally they can locate the phone to within 300 m (1,000 feet) or less anytime and newer phones have GPS location devices implanted for emergency location. They also keep such location records for periods of a few months to a few years and will produce such records under court order. Thus, if she claims you were at her house (or some other point) in violation of a restraining order it is often possible to use the records from your cell phone to show that at the time and date she claims you were at her house that you were, in fact, somewhere far away. Of course, she may “borrow” your cell phone without your knowledge, then later return it unbeknownst to you, thus using this method against you.

Conversely, if you are being stalked you might be able to use her cell phone records to prove she was in fact outside your apartment at the time death threats were made. However, it is critical that you notify the cell phone vendor in a timely fashion that you are seeking location records for a specific period and phone number so that they don't destroy the records before you can obtain a court order. In such situations a private investigator can often be a major asset as well.

Also, many cell phones now come with a technology called Bluetooth, a way to transmit pictures and other digital information between cell phones and similar devices, e.g., personal desktop assistants (PDAs), over short distances (10-100 meters). In order to do this, the cell phones can be set to emit a signal everywhere they go (Bluetooth is turned on). If you are being stalked by someone you know has a Bluetooth-enabled device, you can install BluTracker software on your Bluetooth-compatible device, usually your cell phone, that detects the nearby presence of the stalker if their device has Bluetooth turned on. It alerts you whenever a specified Bluetooth-enabled device comes within range.

If you're being stalked, BluTracker could be a lifesaver. Your phone can alert you that the stalker has come within range. For men targeted with restraining orders by women intent on framing them for violating the order, this could also help keep them out of jail now that violation of a protection order has become a favored tactic of redfems for destroying men.

Call tracing

If you are receiving harassing phone calls on a landline it may be useful to use call tracing. To do so, immediately after hanging up from the call, lift the receiver and press *57 (or 1157 on a rotary phone) before any other calls are made, or anyone else calls you. Follow the recorded instructions to take action appropriate to your situation. In Colorado after you initiate the call trace you should then call (800) 582-0655 to verify the phone company was able to trace the call.

Typically, a $1 fee is charged for each attempted trace whether successful or not. The phone company or police will take deterrent action only if three calls from the same number are identified, but you will not be given the name or telephone number of the person who called you.

If you feel you are in immediate danger you should next contact the police if the call trace was successful.

As presently constituted this is a pretty useless service but should not be ignored as it does sometimes work. However, if the harasser or stalker has any intelligence at all they will call from a pay phone, use different telephones, or use a phone card or burner cell phone to make the call, thus defeating the call trace. Also, since it is very difficult for you to find out the number of the phone that made the call, you can't relate it to telephone numbers of her and her friends.

At present cell phones operating through the major carriers all provide caller ID that identifies the caller., or at least whose cell (mobile) phone is being used to make the call. However, anyone wishing to avoid that, i.e., your stalker, can easily obtain a prepaid, untraceable burner phone. Also, if you are trying to hide for any reason, you should only and exclusively use a disposable cell phone that is changed regularly.

Last call return

If you didn't answer the phone it may sometimes be helpful to use last call return rather than call tracing to try and get the phone number of whoever is calling you. To use last call return with a landline, after they attempt to call you, with pen and paper in hand, lift the phone receiver and dial *69. If useful, the phone number of the last caller will be given. Don't redial the number, however, or you could violate a restraining order, or be accused of telephone harassment yourself.

Of course modern cell phones have these features built in so use them!

Don't talk to or even inadvertently call (butt dial) anyone who has a restraining order against you

Time after time we hear stories of women taking out restraining orders against a man, then calling him, or having the kids call him as in most states the restraining order does not apply to her. When he talks to her, or to his kids, she reports him for violating the restraining order, he goes to jail, and typically she need not even present any evidence of the call. Again, the male must prove his innocence.

Voice-activated recorders

It is a basic requirement to have a voice-activated recorder on your telephone, both landline and cell phones, with the longest possible recording time. Check to make sure it is working before you need it and when you need it. And remember to check the recorder daily to be sure it is operating and has room to record the next message.

Digital recorders are strongly preferable to analog, or tape devices, in today's market. Be sure the digital recorder has a USB connection and can be downloaded to your computer or a USB flash drive. A copy in your computer can be used to transcribe the conversation into hard copy with products like Dragon Speech Recognition Software and for cleaning up background noise. Also, if it will be necessary to use the recording in court or a hearing, a printed copy will be needed.

Test that functionality before you need it!

Most states do not require notice that you are recording your own private telephone conversations but a check on local laws should be made. Note that any conversation that includes a threat of any kind does not require notice that the statements are being recorded. In some cases it may be advantageous to have the recorder play the beep that indicates the conversation is being recorded as a deterrent even though the law does not require it.

The concept is that recording a phone conversation is not a “wiretap” so long as the person making the recording is not an “unseen listener.” In some states you can record your own conversations (but not between the kids and mom). In other states you must notify the person you are recording. This can be accomplished in a sneaky way by saying something like “I didn't understand (whatever) ...can you clarify it just for the record.” And knowing the conversation is being recorded may help keep you from losing your temper and making a bad situation worse. Also, remember that she may be recording the conversation on her end as well.

Telephone recordings can be of very high value because experience has shown that women who make false DV or child abuse claims often make statements on the phone admitting that it is a con job. They frequently do this as a way to interfere with parenting time, or to blackmail you into giving her money or something else she wants. Having her recorded statements is then of tremendous value, and can often be used in visitation interference, custody, and property settlement cases too. When recording such calls, if possible, you should turn off the radio, TV, air conditioner, and minimize any other sources of background noise.

Recorders for your landline telephone and cell phone are widely available at a reasonable cost. Digital recording devices are strongly preferred as they are more accurate, generally have more sensitive microphones, have no tape to jam, stretch or break, automatically time/date stamp each recording, and generally have more recording time. However, you may want to add flashcard memory and an external battery pack to extend the recording time even more. You should get an audio recorder that can be played back in an ordinary tape drive if analog (an example of how long this problem has been going on), cell phone, or MP3 player with USB port for digital, so the recording can be taken to a remote location for playback or downloaded to your computer for transcription.

A recorder that notes the time and date of each recording is essential and you will need to label any recordings you keep. But be sure in advance that the timestamp on the recording is accurate. You will also need spare tapes if using an analog device, or flashcards for digital.

Be sure to duplicate critical recordings and store the copy in a secure remote location such as your office, parent's house, bank deposit box, etc., that you are certain your abuser does not have access to. One good way to make copies would be to use the CD/DVD burner most computers come with today to make a CD or DVD that can be stored for up to ten years without degradation. USB flash drives work as well but the shelf life of many magnetic recordings is just two to four years, although flash drives will work after 10 years if properly stored.

If there is no restraining order in place, and for any reason you must call your abuser, before you dial state the date, time, the phone number, who you are calling and the name of a witness (if available and always a good idea) to the call for the recorder. Also consider calling a friend or your parents and keep them on the phone while you interact with her (you may need special phone services for such conference calls and such witnesses may constitute an “unseen listener” in some jurisdictions unless you give her notification of their presence). If she is aware that there are other witnesses it will seriously dampen any attempts at misusing the laws. End the call by stating the time after you break the connection but before you hang up. Also record the date and time of the call in a journal together with the name(s) of any witness(es).

With products such as Sound Snooper you can record your phone conversations directly on to your computer and with products like Dragon Speech Recognition Software you can transcribe such recordings directly to a word processing program. A sworn transcription may be a requirement to get such recordings admitted in court.

Voice-activated recorders to monitor abuse at home

Top

The use of video and audio recorders isn't limited to recording telephone conversations. They are often of great value in recording events around the home if she is still living with you, or her boyfriend comes over when you are at work.

Voice- or sound-activated recorders come in a variety of sizes, styles, and prices. You may need a model that allows multiple microphones or cameras, depending on the layout and volume of the area to be monitored. Microphones and cameras should also be as small as possible. Another alternative, but more expensive and harder to maintain, is to use multiple recording devices in separate locations.

The installation of the recorder(s) should be in an unobtrusive location, yet sufficiently accessible to make it easy to download to your computer if the digital recorder is portable. Depending on location, you might be able to record directly to your computer using voice recording software and a sound card.

The longest possible recording times with supplemental flashcard memories should be used with digital recording devices. The recorder should also be playable on other common drives or devices such as your computer. You will need to test that feature prior to purchasing and installing the system.

Another use for voice-activated recorders is to catch someone breaking into your home or car repeatedly, which may occur with stalkers. These people are often emotionally disturbed and, believing they are alone, will frequently talk to themselves (and to the hidden recorder).

Again, these recorders should be downloadable directly to your computer for editing, filtering, and transcription if needed.

Recording in the home

The recorder may use batteries or house power and the choice probably depends on where you need to locate the device. Again, the location should be unobtrusive but sufficiently accessible that there is no problem downloading the recordings and changing any batteries. And don't forget to take, or transmit backups of the recordings to a safe location after you take them off the recorder.

Microphone(s) must also be far enough away from noise sources, e.g., air conditioning, furnaces, dishwashers, radios, televisions, etc., that those devices don't activate the recorder every time they turn on or off. Ten hours of TV noise, or the AC switching on and off, are not of much value.

After the recording system is installed you must test it to be sure it picks up voices and sounds in the area you want to cover.

Obviously, if your intimate partner is assaulting you verbally or physically, you need to remember to move to a location where her words will be picked up by the microphone(s). Whenever possible you should turn off the radio, TV, and minimize any other sources of background noise when an argument begins if that can be done without arousing her suspicions.

If she makes any statements about filing false claims be especially sure to keep and date the record. Also write up a short “dated” note regarding what is on the recording and the key phrases. If she is outrageous during any conversation you should keep the recording to show a history of unreasonable behavior on her part. Of course, at all times while recording you must be the model of sane behavior.

If she calls the police, play the recording for them and insist they arrest her for creating the disturbance, and perhaps for making false statements regarding a crime that never happened. While her arrest may be unlikely, at least it makes it much less likely the cops will arrest you.

If you know she intends to call the police you might want to show her the recorder (from a safe distance), and let her know that the police won't be fooled. This will annoy her to no end but she will be on notice that she can't so easily get away with playing the false DV or child abuse card on you. However, we have instances where the woman has grabbed the tape recorder from out of the hands of the police and destroyed the tape while the police watched the felony in progress. Therefore, it is best to keep the recorder in your hands as it is less likely the police will stand idly by if she physically attacks you in their presence.

Trials, hearings, conferences, mediation, and other meetings

Top

Always record any police interviews or contacts, hearings, trials, conferences, depositions, mediation, attorney conferences, consultations with court-appointed “experts,” or other meetings you attend or are involved in with her, any witnesses, or other interested parties in your case.

If told you cannot record the proceedings do it anyway without telling the officials using an unobtrusive recorder like the pens now available with included digital video and audio recorder. In our experience recording is always permitted under the law but many officials will try to bully you into not keeping a record. They may claim they are already recording the proceedings, e.g., in court, but I have heard and documented far too many instances where the recorders were, in fact, turned off, the recording erased, edited, or “inaudible.”

It has become so common for court tapes and transcripts to be missing or altered that it should be assumed they have been. Thus, it is essential for you to have your own, independent recordings of any proceedings with which to verify the accuracy of the “official” records and transcriptions. This is a sad, but accurate commentary on the level to which our “justice” system has descended. You must be prepared to defend yourself against the court who, in conjunction with the judge's cronies, will often prove to be your worst enemy. And too often we have heard of a client's attorney turning against them as well!

Be sure, make your own recording!

For making recordings in a courtroom, depending on your location, there may be a form you must file prior to the trial or hearing without which you are at the mercy of the courts permission as to whether you are allowed to record. So check on this and file the form if required!

Courts are generally much more restrictive about making video recordings or photographing any parts of the proceedings. If you plan on making videos or taking photographs in the courtroom be certain to get permission in advance. However, even if denied permission it should still be possible to record surreptitiously.

Have plenty of spare batteries and blank tapes if you use a tape recorder (not recommended). For digital recorders it may be necessary to install additional flashcard memory and rig an auxiliary battery pack for the extended recording time often needed in court. Also, remember to download the recording to your computer or other storage device every evening so the previous record isn't lost. And then make sure you have an offsite backup of any recording or notes.

Transcripts from audio recordings

Top

There is now software available that transcribes voice to a word processing program. Dragon Speech Recognition Software is one of the leading products in this area currently. That makes it quite reasonable to make your own transcripts on your computer though you will have to use the audio recording to review each and every sentence for accuracy and content. However, it is unlikely you can use transcripts of a court hearing you make yourself if filing an appeal, and you will still have to pay for an official transcript. But we have heard and seen so many altered “official” transcripts that we strongly recommend you record all hearings with courts and other officials and print out your own copies for comparison.


 

Video cameras

Top

Sources for surveillance hardware and software can be found here.

Unobtrusive video monitors are available for as low as $70-$80 that work in both daylight and darkness. Cameras hidden in such things as doorbells, working wall clocks, radios, plants, motion detectors, etc. are available from PalmVid. Wireless versions of these cameras are also available as well as ones that can be worn on the body. Other types of monitors are available as well, depending on what you are trying to record. For example, a stalker who comes in the night will require different cameras, e.g., infrared wireless cameras in the yard, than cameras for recording an intimate partner who is assaulting you in your home. Most video cameras now include a microphone or a sound monitor as well.

Think it through before you buy the hardware and software. Be sure what you get will do what you want and need when you want it, but don't be ashamed if you find you need a more elaborate surveillance system. The cost for good surveillance equipment is minuscule compared to attorney fees and the nightmare your life will become without physical evidence to support you.

You can record the images on a VCR, DVD, or your computer or cell phone, and many systems can be set to only record when motion or sound is detected. If you are using your computer for the monitor, the requisite software is about $70 for a single camera, or $400 for multicamera recording.

Examples of an effective use of video and sound monitoring of an abusive woman can be found here.

Unless you have a new (2001 or later) computer you will have to upgrade your machine to handle the video images. For video processing on a PC a clock speed of 500 MHz or faster is required. 500 MB of RAM should be considered a minimum. A 100 GB hard drive should be considered a minimal requirement, and the larger the better. Adding another hard drive or USB flash drive will cost less than $200. You will probably also need to add a video capture board (~$200). An automated, large volume backup system, e.g. a DVD or flash drive, or use the Cloud, will also be essential, or a way to transmit to an offsite storage location if you have broadband Internet access. However, that option runs the risk of Cupcake finding the site from your home computer and destroying your files.

No matter what size hard drive you have, video images may fill it fairly quickly. Assume you will have to edit the files and remove the unwanted images at least once a week. Be sure you make a backup of the edited files, e.g., burn them on to a DVD or flash drive, and keep the backup in a remote location she can't get to.

If you have a high-speed Internet connection some software will let you transmit the camera images to a web site or the cloud that can be monitored remotely in real time. However, unless you have the skills to make the site secure, be aware that anyone else on the web may also be able to see the images. Note that computer and phone technology is rapidly changing and much of what is proposed here can now be done with devices like an iPad or iPhone. But our experience is that such devices are rarely remotely backed up so if Cupcake trashes your phone or iPad you may lose all your documentation.

Obviously you need to do the monitoring in a manner that doesn't make her suspicious. Claim it is for security and part of an alarm system, for example. Or put one monitor in the children's bedroom and claim it is for their safety.

After installing the cameras, hardware, and software, test the pickup from different areas in front of the camera(s) and at different light levels. Playback some recorded images to be sure of the quality and that the area you want to cover is being captured. If making a separate audio recording you will also need to test what effects background noise sources, e.g., radio, TV, air conditioner, furnace, etc., have on the recording. If an argument or fight starts try and turn off the radio or TV if possible.

If she does begin assaulting you, and you have video monitors set up, you need to move to a location where the monitors can pick it up. You should also be telling her to stop or to calm down during the recording.

If you manage to get videos or images of her abuse or violence be sure the date and time are also recorded on your video tape or computer and get a copy made and transported to your offsite backup as soon as possible. Very frequently women wait to report they were assaulted until the next day when the man is at work. The wise man using surveillance will have made a copy of the previous nights assault and taken it to work with him so the only copy isn't in the house where he will be forbidden to go when she gets the restraining order. Also, check that the date and time on your machine is accurate. Hackers often play games with the date and time on computers.

Offsite backups are essential!

You won't have a chance to grab the videos or computer files if she is assaulting you and you have to get out. And trashing your computer may well be one of her priorities, so off site backups may be all you have to go to court with. We have stories from a number of men who collected all the evidence but kept it at home. When they were arrested, or a restraining order was issued against them, it was impossible for them to get their evidence.

Monitoring child abuse

If you have children, and are using surveillance monitors, you should set up a monitor of the area where she is likely to punish the children as well. Women who abuse men very frequently also abuse their children. Hospitals have been very successful in monitoring child abuse by mothers (and occasionally men) by setting up surveillance monitors.

Portable digital video and voice recorders

Top

It is very helpful to keep a cell phone or other digital recorder in your car or on your person and have it running whenever you are near her, talking with police, or other witnesses. For example, it is suggested that any direct exchange of the kids for visitation be recorded. Or if you meet with your or her attorney, for mediation, etc., it is often extremely valuable to have a recording of such meetings. It may help to wear bulky clothing, such as a sweater, to conceal the recorder although the size of digital recorders continues to decrease. Currently (July 2006) one can obtain a digital recorder that looks like a pen for about $100 that records for 70 hours with a USB connection for downloading to your computer or a CD-ROM.

In several cases we are aware of, men have used to video recording feature found on many cell phones to record their significant others going berserk and attacking them. Such recordings have stopped the police from arresting the man and, occasionally, they arrest the woman instead. It also helps if the man can be heard telling the woman to stop hitting him, especially if the video shows her hitting him.

Motion-activated doorbell cameras might also be a good investment if her boyfriend is coming over while you are at work.

When recording keep away from noise sources if feasible and conversations as short as possible. The whole recording must be transcribed if brought into court. You don't want the conversation to disintegrate into an argument or screaming match, especially if the recording has you screaming back at her. In some situations, however, unique noises, e.g., traffic, may be useful in establishing location on a voice recording.

If nothing happens you can erase the digital record but such recordings also make good tests to find out how well the recorder worked. You must test the recording system and pickup before you ever need it.

Most laptop and many desktop computers now have a video and sound card. With a camera and microphone you can use the computer to record conversations in some situations. But a tiny digital, voice-activated recorder is almost certainly a better choice in almost every situation.


 

Computer surveillance

Top

Sources for surveillance hardware and software can be found here.

More and more often we hear reports of women using computers for illicit purposes. Of course, men have been doing this for sometime and it is not a gender issue. The question is what can a man or a woman do to find out what their intimate partners are up to with their cybersex partners? Be forewarned, you are probably not going to like what you find. But forewarned is forearmed.

While there are a variety of software packages for recording keystrokes and screen captures it is essential that your partner be unaware her computer activities are being monitored. If possible, it is also desirable to have the information emailed to you at a remote location. Note that if you are recording directly on, or transferring recordings to your computer you may need to upgrade to a larger capacity hard drive, typically at a cost of ~$200 for parts and labor, if you are using an older computer. All modern computers have multigigabyte or terrabyte hard drives, or USB flash drives can be plugged in, so this typically isn't a problem today (2019).

The technology and software for computer surveillance is rapidly changing and you should check on the latest advances before purchasing any hardware or software. Such programs as SpyAgent are widely used by industry to monitor computer use by their employees. You may also find these programs useful to monitor what your children, as well as your spouse, have been up to.

Because she may get an ex parte (without notice to you) restraining order against you at any time it would be wise to enable remote access to your computer. There are now many ways and means to remotely connect to your computer. The critical thing is to do so, and test, before you might possibly need it. Such links can also often be used for remote, off-site backups, a critical step in surveillance.

If you have set up your computer to do backups in the Cloud automatically but she now has that computer, you can easily download what are now her backups from the Cloud to another computer providing you have the login user name and password available.

As such programs produce a considerable amount of information you may need to upgrade your computer to handle it. On an older computer a larger hard drive will be required but additional RAM may also be needed to maintain performance. You will also need to review and discard unwanted information, often a time-consuming task, and difficult to accomplish in private if the information resides on your home computer. Be sure and keep offsite backups of your files and email as well. One of the first things Cupcake may do is trash your computer.

You must have a time synchronization utility on your computer, cell phone, camera, as well as any other recording device and use it, which most modern devices do. But check that they do! She will try to lie and say she wasn't there at the time and place recorded, and may even produce witnesses as well. If you can't substantiate that the time and date recorded is accurate your credibility will be destroyed, and you probably won't get the data admitted as evidence.

Lesson one: Secure off site storage of current files is essential and keep backups. where she can't get them.
Lesson two: Y ou will probably need offsite access to your home computer.

Top


 

| EJF Home | Join the EJF | Comments? | Get EJF newsletter | Newsletters |

| DV Home | Abstract | Contents | Tables | Index | Bibliography |

 

| Chapter 9 — The Male Perspective |

| Next — You can sue but you can't win (if you are a man) |

| Back — Defensive male actions under current law |


 

This site is supported and maintained by the Equal Justice Foundation.

Last modified 4/25/24