Safer communication habits
Reducing digital risks in everyday survivor support
This session helps participants recognise unsafe digital communication practices, introduces safer alternatives, and builds confidence in guiding survivors through common choices—like what to text, where to call from, and how to use their phones without being watched.
Duration: 1.5 hours (ideal for groups with limited time, but can be expanded to 2–2.5 hours with demos and casework)
Learning outcomes
By the end of the workshop, participants will be able to:
- Identify common surveillance risks in calls, texts, and apps
- Understand how abusers monitor communication
- Recommend safer tools and techniques without increasing risk
- Create “situational comms plans” for survivors based on threat level
- Use simple methods to verify secure channels (without sounding paranoid)
Target audience
- Shelter staff
- Support workers
- Outreach volunteers
- Advocates and legal aides
- Survivors in digital safety programmes
Materials needed
- Flipchart, markers
- Phones (dummy or real), laptops for roleplay
- Printed “Comms threat cards”
- Sticky notes, pens
- Optional: demo tools (Signal, Briar, GrapheneOS device, Faraday pouch, PiRogue device)
Structure
Part 1: Digital risk awareness (20 mins)
Topics
How abusers monitor communications:
- Spyware/stalkerware
- Cloud sync and device mirroring
- Shared accounts, family plans
- Physical access (guessing passcodes, reading messages directly)
The myth of “just use WhatsApp”—when it’s not safe
Activity
- “Guess the risk” card sort: Groups sort example comms methods from “safe-ish” to “high risk” (e.g. SMS, Facebook Messenger, Signal, landline, public Wi-Fi call, email, voice notes)
Part 2: Safer tools, safer behaviour (30 mins)
Topics
Principles of safer communication:
- Keep it temporary, anonymous, encrypted, or redundant
- No app is 100% safe; behaviour matters
Tool recommendations:
- Signal (secure, but requires installing on trusted device)
- Briar (offline, Bluetooth-based)
- Phone box or burner SIMs (context-dependent)
- Notes app + verbal code (low-tech workarounds)
Demo
- Signal: how to verify safety numbers
- Burner phone setup: how to separate personal and safe comms
Handout
- “Safe-ish Apps & Tools” table with pros/cons and when to use each
Part 3: Situational comms planning (20 mins)
Activity
“You’re Supporting Jamie” A survivor, Jamie, has reason to suspect her phone is monitored. In pairs, participants:
- Identify her top communication needs (talking to a solicitor, contacting a sibling, checking housing)
- Choose safer options for each
- Map out a one-week comms plan using available tools and locations
Debrief on choices: why this app over that one? What trade-offs were made?
Part 4: Making it stick—Teaching survivors (15 mins)
Topics
- How to explain risks without causing fear or shame
- Checking for understanding (“What would you do if…?”)
- When not to change habits suddenly (abuser may notice)
- Coaching gently: “Here’s a trick I’ve used…”
Roleplay
- Quickfire: You have 2 minutes to explain to a survivor how to contact a lawyer without tipping off their partner. Go.
Wrap-up & Q&A (10 mins)
Recap key behaviours:
- Use safer apps when possible
- Don’t leave traces (or know how to clean up safely)
- Avoid suspicious patterns or “sudden silence”
- Talk about comms before using comms
Share local resources:
- Places with open Wi-Fi
- Shelters with burner devices
- Tech support orgs
Handout
- “Comms Red Flags & Safe Practices” tear-away guide
- Situational planning worksheet survivors can take home (anonymised)
Optional add-ons
- Drop-in tech desk: Let participants bring phones and ask “is this safe?” in private
- App lab: Safe setup of secure messengers on test devices
- Privacy clinic: Show how to remove metadata, hide apps, or change SIMs