The Digital Shadow: How Stalking and Coercive Control Have Evolved
- 6 days ago
- 6 min read
Updated: 5 days ago
Safety & Transparency Note: To help readers take practical steps toward security, I have included links to safety products available on Amazon. As an associate, I may earn from qualifying purchases, which helps support my writing. Please remember that technology is a tool, not a replacement for professional support. If you fear for your safety, please reach out to the police or a domestic abuse charity.
This week marks National Stalking Awareness Week, a time dedicated to highlighting the lived experiences of survivors and the changing face of harassment in the UK. As the theme for 2026 focusses on the intersection of technology and control, it is vital to look at how far we have come, and how much more dangerous the ‘shadow’ has become. By revisiting a story from 2008, we can see that while the tools of the stalker have evolved from physical presence to digital surveillance, the core intent remains the same: the total erosion of a victim’s peace and safety.

In 2008, Jessica’s[1] husband sat in the dark behind her lounge door and whispered, ‘It’s that easy. To be here; waiting for you.’ Reflecting on her experience, Jessica wrote:
Mum and I had entered my home, still jointly owned by Simon and me, in total oblivion to the fact that he was there. His car hadn’t been outside; the door had still been locked and despite the dimming daylight there had been no lights on. Although Simon and I still owned the house together, the children and I were living there alone after he had eventually agreed to move out a few months previous.
I still don’t know why, but as I walked down the hallway, I had an overwhelming urge to check inside the lounge. Nothing looked outwardly different, but I felt uneasy.
Cautiously, I pushed the door open and scanned the darkening room.
Everything was fine; I was just being silly. But then, as my eyes finished running the full length of the sofa, I saw him; my husband, sat very calmly, directly behind the now fully opened door.
And that’s when he said those words that chilled me. The words that brought me to my senses and made me realise that I had to make this stop.
Jessica’s experience shows how stalking used to be a labour-intensive crime. It required physical effort and presence; on this occasion her husband had to physically hide, on other occasions he had physically followed her car, and physically hung around her workplace and home, shouting through her letterbox to exert his control.
Fast forward to 2026, and the tools of modern convenience have been weaponised into tools of modern terror. The ‘lounge door’ has been replaced by the ‘cloud’ and the voice that chilled Jessica nearly twenty years ago doesn't need to be in the room anymore to make its presence felt. It is everywhere.
While Jessica had to rely on her intuition to check the lounge, survivors today can use technology to reclaim their sanctuary. Tools like a Home Security Door Lock provide a physical barrier that even a key-holder cannot bypass, while Smart Indoor Cameras can send an instant alert to your phone the moment someone enters a room. For those who fear being followed in public spaces, a Personal Safety Alarm or a GPS Safety Button can act as a digital 'shout for help,' ensuring that a victim is never truly alone in a moment of crisis.
One of Jessica’s fears came from the fact that her husband still technically co-owned their house and had a key. But in 2026 an estranged partner doesn’t need a key. They can ‘haunt’ a home from hundreds of miles away by controlling smart thermostats, light bulbs, and security cameras. They can gaslight victims, plunging them into darkness or watching their every move through ‘nanny cams’ that were originally installed for safety.
And away from the home, Jessica still remembered the panic when her husband jumped into her passenger seat at the children's nursery. But today, an abuser doesn't need to be in the car. Low-cost Bluetooth trackers, hidden in a child’s backpack or a coat lining, provide real-time GPS coordinates to a stalker’s smartphone.
Digital stalking did exist; Jessica’s husband had attempted to access her emails and social media accounts, and this was a precursor to what is now known as ‘Tech Abuse.’ But back then, ‘hacking’ felt like a remote threat. Now, it is a standard tactic of coercive control. Stalkers use Family Sharing features on digital accounts to mirror text messages, view photo galleries, and track ‘Find My...’ locations. This digital tether creates a state of constant presence. Even if a victim like Jessica re-locates - if her digital life is compromised, she is never truly alone.
For those in midlife, the digital shadow is often lengthened by the complexity of 'sandwich generation' responsibilities. This demographic is frequently managing shared digital ecosystems not just with a partner, but with aging parents and teenage children. When an abuser exploits these interconnected accounts, they aren’t just stalking an individual; they are infiltrating the victim’s entire support network. The very tools meant to help a midlife person coordinate a busy household; the shared calendars, location tracking for kids, and smart home access, become the tripwires that an abuser uses to maintain a suffocating grip on their independence.
When Jessica first called the police in 2008, the response was disheartening. The first officers that attended the house said there wasn’t anything they could do; her ex was allowed inside his own property. But the UK has come a long way since then. The introduction of specific stalking laws and the recognition of Coercive Control in legislation have changed the landscape. Police are now trained to look for patterns of behaviour rather than isolated incidents.
However, the worry is that as the law catches up, technology moves faster. The digital footprint of an abuser is often harder to prove to a responding officer than a physical footprint in the garden.
When a person is stalked by someone they once loved, they often carry a heavy weight of embarrassment and self-blame. Jessica recalled how she felt responsible for her husband’s inability to let go, wondering if she hadn't been clear enough that the marriage was over. But the shift from 2008 to 2026 makes one thing very clear: Stalking is not about love; it is about entitlement. Whether they are sitting behind a physical door or watching a location move on a digital map, the intent is the same: to rob the victim of their peace. As we navigate this high-tech world, we must ensure that ‘smart’ devices don't make it easier for abusers to bypass the law.
I am pleased to report that the system worked for Jessica. But 2026 presents a more intricate landscape. Technology has created new avenues for control that simply didn't exist twenty years ago. As we support survivors today, we have to address these digital risks to ensure their privacy is as secure as the locks on their front doors.
A Few Notes on Safety:
Important: If you are reading this and feel you are in immediate danger, please dial 999 (UK) or your local emergency number. You can also contact Refuge’s National Domestic Abuse Helpline at 0808 2000 247.
If you suspect you are being tracked or your accounts are compromised, use a ‘safe’ device (like a computer at a public library or a friend's phone) to search for domestic abuse support services. Many organisations now offer ‘Digital Safety Audits’ to help you reclaim your privacy.
If you are navigating a difficult separation and fear you are being monitored, don't wait for a physical confrontation to take action. Understanding 'Tech Abuse' is the first step toward safety. For practical advice on securing your passwords, devices, and online browsing, I highly recommend reading these Tech Tips For Domestic Violence Survivors.
Stay Connected If you found this article helpful, please consider following this blog on instagram or facebook to stay updated on future stories.
Why not subscribe to the mailing list:
We will alert you whenever a new post is published, so you never miss an update.
Read more Hell of a Midlife articles
[1] Jessica is a pseudonym used to protect the identity of the survivor.




Comments