Please read our important disclaimers before using this content
Every light turned off simultaneously. The thermostat dropped to 55 degrees. The smart locks engaged, trapping me inside my own home. My phone buzzed with a text from him: "Uncomfortable yet? Imagine how the kids feel when you make their lives difficult."
I was standing in my kitchen in the dark, in the house I'd lived in for eight years, and I had no control over the lights, heat, or even the locks on the doors. He was 30 miles away at his apartment, but he might as well have been standing next to me. He was in control of everything. This is what economic abuse and coercive control look like in the digital age—using shared resources to maintain dominance even after physical separation.
That was the night I learned that our "smart home"—the one we'd built together with the latest technology to make our lives easier—had become his surveillance system and remote control panel for harassment. And I was about to spend the next three months and several thousand dollars ripping every smart device out of my house and starting over.
If you have any smart home technology that you set up with or shared with your ex, I need you to understand something: you don't control your home right now. They do. And what they can do with that access is both creatively cruel and potentially dangerous. 1 The National Network to End Domestic Violence's Safety Net project documents how abusers increasingly weaponize smart home technology as a tool of coercive control.
The Smart Home Surveillance State You Didn't Know You Were Living In
When we talk about "smart home technology," most people think about convenience: adjusting the thermostat from work, getting alerts when someone's at the door, turning on lights remotely, or checking if you remembered to lock up.
But every one of those conveniences creates a surveillance point and control mechanism. Here's what your ex can access if they still have login credentials to your smart home system:
Smart Thermostats (Nest, Ecobee, Honeywell)
What they can do:
- See when you're home or away (based on heating/cooling patterns and motion sensors)
- Control your temperature remotely—make it freezing cold or unbearably hot
- Drive up your utility bills by constantly adjusting temperature
- Create "evidence" that you're providing inadequate living conditions for children
- Monitor your schedule and routines based on temperature adjustment patterns
Real example from a client: Her ex noticed she typically turned down the heat every night at 10:15 PM. One night when she didn't (she'd fallen asleep on the couch), he texted asking if she was "out partying instead of being home with the kids." He'd been monitoring her thermostat for weeks to track her movements.
Smart Locks (August, Schlage, Yale)
What they can do:
- Lock or unlock doors remotely, trapping you inside or locking you out
- See exactly when you come and go
- Grant access to third parties without your knowledge (their friends, flying monkeys, even themselves)
- Receive alerts every time doors open or close
- Create access codes for others that you don't know about
- Lock doors during emergencies or prevent you from locking them for safety
Real example: A mother returned from picking up kids at school to find her front door unlocked and her ex-husband's mother sitting in her living room. His mother had used a door code he'd created remotely that morning. When confronted, he claimed he'd "forgotten" to tell her he'd given his mom access to "check on the kids."
Security Cameras (Ring, Nest, Arlo, Wyze)
What they can do:
- Watch you in real-time inside and outside your home
- Record audio conversations (many cameras have microphones)
- Create clips of interactions with children, romantic partners, or visitors
- Use footage out of context as "evidence" of bad parenting, new relationships, or lifestyle issues
- Share footage with attorneys, flying monkeys, or on social media
- Track who visits your home and when
- Monitor your daily routines and schedule
Real example: A father discovered his ex-wife had been recording audio from their children's bedtime routine for months using a Nest camera she'd claimed to remove. She'd edited together clips of him saying "I'm too tired for this" and "Go to bed now" to make him sound harsh and neglectful, removing the context that he was working third shift and parenting three kids solo during her parenting time.
Voice Assistants (Alexa, Google Home, Siri)
What they can do:
- Listen to conversations (accidentally or "accidentally")
- Access your calendar, shopping lists, and routines
- Control other smart devices
- Record requests that can be taken out of context
- Provide information about what you've been asking or searching for
- Potentially listen in on privileged conversations with your attorney if you're on speakerphone
Real example: An Alexa device in the kitchen caught a mother's frustrated venting session to a friend about how exhausting parenting had become. Her ex accessed the recording through the shared Amazon account and submitted the 90-second clip—without the rest of the conversation where she talked about loving her kids and seeking therapy—as evidence she was "overwhelmed and unable to parent effectively."
Smart Lights (Philips Hue, LIFX)
What they can do:
- Monitor when you're home based on which lights are on
- Turn lights on or off remotely to harass or frighten you
- Create patterns that make it appear you're not supervising children properly
- Drive up electric bills
- Disrupt sleep routines for you or children
- Make your home feel unsafe and unstable
Smart Garage Door Openers (MyQ, Chamberlain)
What they can do:
- Open your garage door remotely, creating a security vulnerability
- Track when you come and go
- See how many cars are parked in the garage (are you dating someone?)
- Open the door and send flying monkeys or themselves into your garage space
- Close the door on your car or prevent you from leaving
Smart Appliances (Refrigerators, Ovens, Washers, etc.)
What they can do:
- Monitor your routines and schedule
- See your shopping patterns (smart refrigerators with cameras inside)
- Disable appliances remotely
- Access photos or messages if appliances have screens
- Track energy usage patterns to determine occupancy
Home Security Systems (ADT, SimpliSafe, Vivint)
What they can do:
- Arm or disarm your security system remotely
- See when windows and doors are opened
- Receive alerts about movement in your home
- Access camera footage
- Control who has access codes
- Disable security during vulnerable times
The Psychological Warfare of Remote Home Control
What makes smart home abuse particularly insidious is the combination of surveillance and control. 2 It's not just that your ex can watch you—they can actively manipulate your environment while watching your reaction. This is also directly related to how abusers use your phone and digital devices to track and monitor you—smart home technology is simply one more vector for the same surveillance impulse.
This creates several psychological effects:
Loss of sanctuary: Your home—the place where you're supposed to feel safe after leaving an abusive relationship—becomes an extension of their control. There's nowhere to escape their presence. 3
Hypervigilance: You're constantly monitoring whether devices are functioning normally or being manipulated. Is it cold in here because the heat is broken or because he turned it down? Did the lights just go out or did I forget to pay the electric bill? 4
Gaslighting: They can make things happen and then deny it. "I didn't touch your thermostat. You're being paranoid." Except you're not—they absolutely did. 5
Performance pressure: Knowing you're being watched creates pressure to perform perfect parenting, perfect housekeeping, perfect emotional regulation at all times. This is exhausting and unsustainable. 6
Evidence gathering anxiety: Everything you do or say in your home might be recorded, clipped, edited, and presented out of context in court.
Intimate partner surveillance: If you begin dating again, they can monitor new relationships, see when overnight guests arrive/leave, and potentially record intimate moments. 7
In my case, the worst part wasn't the inconvenience of him turning off my heat or lights. It was the constant awareness that he was watching. That he knew when I was home, when I had friends over, what my routines were, when I went to bed. It felt violating in a way that's hard to describe—like living in a glass house with your abuser on the outside looking in.
Immediate Action Steps: Securing Your Home
If you're currently in a high-conflict separation or divorce and you have smart home technology, here's what to do right now—not tomorrow, not next week, today:
Step 1: Change Every Password Immediately
Priority one:
- WiFi network password
- Router admin password
- Email accounts linked to smart devices
- Smart home hub accounts (Google Home, Alexa, Apple HomeKit)
- Individual device apps (Nest, Ring, etc.)
- Cloud storage accounts
- Utility company accounts if they link to smart devices
Password security:
- Use a password manager (1Password, Bitwarden, LastPass)
- Create completely new passwords—don't reuse or slightly modify old ones
- Use 15+ character passwords with numbers, symbols, upper and lowercase
- Enable two-factor authentication on EVERYTHING
- Use an email address your ex doesn't know for recovery options
Warning: Changing passwords may alert your ex that you've discovered their access. Be prepared for escalation. Have your attorney on notice and consider whether you need a protective order strengthened before you lock them out.
Step 2: Audit Every Smart Device
Go room by room and identify every connected device:
Make a list including:
- Device type and brand
- Who set it up originally
- What account it's linked to
- Whether it has camera, microphone, or both
- Whether you actually need it
- Replacement cost if you remove it
Look for:
- Obvious devices (Nest thermostat, Ring doorbell, Alexa speakers)
- Hidden cameras in smoke detectors, clocks, picture frames, electrical outlets
- Smart TVs with cameras and microphones
- Baby monitors
- Fitness equipment with cameras (Peloton, Mirror)
- Tablets or iPads mounted on walls
- Smart switches and outlets
Don't forget:
- Car GPS systems or OBD-II port trackers
- Children's tablets or devices that can be remotely monitored
- Smart watches or fitness trackers that share location
- Home routers that log internet activity
Step 3: Factory Reset or Remove Every Device
You have two options for each device:
Option A: Factory reset and reconfigure (if you want to keep it)
- Perform a complete factory reset following manufacturer instructions
- Remove the device from all existing accounts before resetting
- Set up on a NEW account with a NEW email your ex doesn't have access to
- Change the WiFi network name and password before reconnecting devices
- Update all security settings to maximum privacy
- Document the reset process with photos and dates
Option B: Remove entirely (safest option)
- Document that the device was there (photos, video)
- Remove and power down completely
- Store in a secure location or return to ex via attorney if it's "their" device
- Replace with non-smart alternatives or nothing
- Keep receipts for any replacement devices purchased
My recommendation: For any device with a camera or microphone, Option B is safer. A $50 programmable thermostat without internet connectivity is better than a Nest your ex might still have backdoor access to.
Step 4: Change Your WiFi Network Completely
Don't just change the password—change everything:
- Change network name (SSID): Don't reuse any part of the old name
- Change password: Long, complex, unique
- Change router admin password: Often still set to default "admin/admin"
- Enable WPA3 encryption if your router supports it (or WPA2 at minimum)
- Disable WPS (WiFi Protected Setup—it's a security vulnerability)
- Hide network SSID so it doesn't broadcast publicly
- Create guest network for any devices you're not 100% sure about
- Check connected devices list and remove anything you don't recognize
- Update router firmware to patch security vulnerabilities
- Consider getting a new router entirely if your ex set up the existing one
Step 5: Check for Hidden Cameras and Recording Devices
Physical inspection:
- Look for tiny holes in smoke detectors, clocks, picture frames, outlets
- Check for devices plugged in that you don't recognize
- Inspect USB chargers (some contain cameras)
- Look for unusual objects positioned to face beds, changing areas, or where you have private conversations
Technical detection:
- Use your phone camera to scan for infrared lights (many cameras use IR for night vision—it shows up as a purple glow through your phone camera)
- Download an RF detector app to find wireless signals
- Consider purchasing a camera detector device ($30-$150)
- In high-risk situations, hire a technical surveillance countermeasures (TSCM) professional
Common hiding places:
- Smoke detectors and carbon monoxide detectors
- Electrical outlets (especially those that seem newer or are in odd places)
- Picture frames facing the bed or bathroom
- Clocks on nightstands
- Stuffed animals or books on shelves
- Air purifiers or fans
- Phone chargers
- Pens or USB drives
Step 6: Document Everything
Before you change or remove anything:
Create a record:
- Photograph every device in place
- Video walkthrough of your home showing all smart devices
- Screenshot account settings showing shared access
- Save emails or texts where your ex referenced knowing things they could only know through surveillance
- Print out access logs if available (Nest, Ring, etc. often show who accessed the account when)
- Document instances of remote manipulation (texts about "being uncomfortable" right after heat went off, etc.)
Why this matters:
- Evidence of surveillance and control for protective orders or custody modifications
- Proof that you took reasonable steps to secure your privacy
- Defense against claims that you "damaged" marital property by removing devices
- Record of what existed when you separated (important for property division)
Step 7: Notify Your Attorney
Tell your attorney immediately if you discover:
- Your ex has been accessing cameras or devices
- Evidence of surveillance or remote control
- Recordings that might be used against you
- Anything that makes you feel unsafe
Your attorney needs to know in order to:
- Advise on protective orders
- Object to admission of illegally obtained recordings
- File motions to prevent continued surveillance
- Use the surveillance as evidence of controlling behavior
- Advise on property division implications of removing devices
Replacement Options: Going Low-Tech or Secure-Smart
After you've removed compromised smart devices, you need to decide what to replace them with:
Option 1: Go Completely Non-Smart (Safest)
Thermostats: $20-$75 programmable thermostat (no WiFi) Locks: Traditional deadbolts with new keys Lighting: Regular switches and timers Security: Traditional monitored alarm system OR no system Cameras: None, or store locally on an SD card without cloud access
Pros: Zero risk of remote access or hacking Cons: Less convenience, no remote access for legitimate purposes
Option 2: Secure Smart Devices (Moderate Risk)
If you want smart home convenience, use devices that:
Prioritize privacy:
- Local storage only (no cloud)
- End-to-end encryption
- Excellent security reputation
- No microphones if you only need cameras
- Ability to physically disable cameras/microphones
Best practices:
- Only connect to your new, secure WiFi network
- Use accounts with new email addresses
- Enable every available security feature
- Turn off features you don't need
- Regularly review access logs
- Update firmware promptly
- Use guest network for smart devices separate from computers/phones
Option 3: Professional Installation with Security Protocols
Hire professionals who:
- Understand domestic violence and high-conflict situations
- Use enterprise-grade security
- Can configure systems that only you can access
- Provide documentation of security measures
- Are willing to testify to security if needed in court
Cost: More expensive upfront, but may be worth it for peace of mind and legal protection.
Legal Considerations and Evidence
Smart home surveillance intersects with several legal issues:
Wiretapping and Recording Laws
Federal law: The Electronic Communications Privacy Act (18 U.S.C. 2511) prohibits intercepting communications without consent. 8 State laws: Vary significantly—some require two-party consent for audio recording. The Reporters Committee for Freedom of the Press maintains a state-by-state guide to recording laws.
Key questions:
- Is audio recording without consent in your home illegal in your state?
- Can recordings obtained through marital property (jointly purchased cameras) be used even if you didn't consent?
- Do court orders address electronic surveillance?
Strategy: Have your attorney file for explicit orders:
- Prohibiting surveillance of your home
- Requiring removal of all recording devices
- Barring remote access to shared devices
- Preventing use of any recordings obtained without consent
Privacy Expectations in Marital Home
Courts are split on whether you have a privacy expectation in a home that's still marital property:
Some courts hold:
- Jointly owned cameras in joint property don't violate privacy
- Each spouse has equal right to access devices they purchased together
Other courts hold:
- Physical separation creates privacy expectations even in marital home
- Remote surveillance after separation is a form of stalking or harassment
- One party's safety concerns outweigh other party's property rights
Strategy: Work with your attorney to establish:
- Protective orders specifically addressing electronic surveillance
- Property division that clearly allocates all smart devices to one party
- Court orders allowing you to remove and disable devices despite marital property status
Using Surveillance Evidence to Your Advantage
While being surveilled is violating, evidence of your ex's surveillance behavior can help your case:
Surveillance shows:
- Obsessive monitoring and inability to let go
- Controlling behavior that likely extended to marriage and children
- Willingness to violate your privacy and boundaries
- Use of technology to harass and intimidate
- Poor judgment about appropriate behavior
Judges often respond negatively to:
- Remote control of ex's home environment
- Monitoring ex's intimate relationships
- Watching ex through cameras after separation
- Using recordings out of context
Present it as: "Your Honor, he continues to control every aspect of my life and home, even after physical separation. He remotely turns off heat when my children are home. He monitors who I have over as visitors. He uses edited recordings from cameras I didn't know were still active to make me look like a bad parent. This is the same controlling behavior he exhibited throughout our marriage."
Special Considerations for Children's Safety
If your children have access to smart devices in your home:
Tablets and Phones
Risks:
- Your ex might have parental monitoring apps installed
- Could be recording audio or video
- May have access to camera or microphone remotely
- Can see location, messages, browsing history
Solutions:
- Factory reset any devices your ex gave to kids or set up
- Set up fresh on your own accounts
- Use parental controls YOU control
- Regularly check for monitoring apps
- Consider providing different devices for your home vs. their other parent's home
Voice Assistants in Kids' Rooms
Don't:
- Have Alexa, Google Home, or Siri devices in children's bedrooms
- Allow voice assistants in areas where private conversations happen
- Link kids' accounts to shared family accounts ex has access to
Do:
- Disable purchasing and calling features if you keep voice assistants
- Review voice history regularly
- Use manual controls instead of voice when possible
- Teach kids what these devices can and cannot hear
Smart Toys and Devices
Be aware:
- Internet-connected toys can be hacked or monitored
- Some "learning" tablets report data back to manufacturers or accounts
- GPS-enabled watches designed for child safety can be used for surveillance
Evaluate:
- Does this toy/device need internet access to function?
- Who has access to the accounts or data?
- Can it be used without connectivity?
- Is the convenience worth the privacy risk?
When to Involve Law Enforcement
Contact police if your ex:
- Uses cameras to record you in intimate situations (bathroom, bedroom)
- Shares recordings without your consent (especially intimate ones)
- Makes threats about releasing recordings
- Uses remote control to prevent you from leaving (locking doors during arguments)
- Creates unsafe situations (turning off heat in winter with children home, unlocking doors at night)
- Trespasses using smart lock codes
- Sends others to your home using smart lock access
Potential charges:
- Stalking (monitoring your location and activities)
- Harassment (remote control to frighten or intimidate)
- Wiretapping (audio recording without consent)
- Revenge porn (sharing intimate recordings)
- Trespassing (using smart locks to enter without permission)
- Child endangerment (creating unsafe conditions remotely)
Reality check: Police response to high-tech domestic abuse varies widely. Some departments have cybercrime units familiar with these issues. Others don't take it seriously. 9 Document everything and pursue protective orders through family court even if police are unhelpful.
Reclaiming Your Home and Your Privacy
The process of removing my ex's access to my smart home took three months and cost about $2,800 between new devices, a security professional to sweep for hidden cameras, and upgrading my router and WiFi security. It was worth every penny.
The first night I went to sleep knowing he couldn't see me, hear me, or control my environment was transformative. I didn't realize how much anxiety I'd been carrying—constant low-level stress about being watched and monitored—until it was gone.
You deserve that feeling. You deserve a home that is truly yours, where you're not performing for an invisible audience, where your children can relax without worrying that Dad is listening through the Alexa, where you can have private conversations with your attorney or therapist without wondering if it's being recorded. Reclaiming your sense of safety at home is a key part of the broader work of rebuilding your life after abuse.
This isn't about being paranoid. This is about recognizing that the same person who tried to control you emotionally and psychologically during your relationship will absolutely use technology to maintain that control after you leave.
Your Next Steps
Today:
- Change your WiFi password right now
- Change passwords on any smart home apps or accounts
- Check which devices are currently connected to your WiFi
- Make a list of every smart device in your home
This Week:
- Schedule time to factory reset or remove every smart device
- Do a physical sweep for hidden cameras
- Notify your attorney about surveillance concerns
- Consider whether you need protective order language about electronic surveillance
- Document the current state of smart devices with photos and videos
This Month:
- Replace necessary devices with secure alternatives
- Consider hiring a professional for security sweep if you have specific concerns
- Educate yourself about privacy settings on remaining connected devices
- Review access logs for any accounts you haven't deleted
- Talk to children age-appropriately about device privacy
Ongoing:
- Regularly check devices connected to your WiFi network
- Update passwords quarterly
- Review account access logs for smart devices
- Stay informed about new surveillance technology
- Maintain documentation of any surveillance incidents
If your ex is also using financial control alongside technological surveillance, see our guide to identifying financial abuse red flags during divorce to understand how these tactics work together as a system of coercive control.
NOTE ON HOTLINE NUMBERS: Phone numbers for crisis hotlines, legal aid, and support services are provided as a resource. These numbers are current as of publication but may change. Please verify hotline numbers are still active before relying on them. For the National Domestic Violence Hotline, visit thehotline.org for current contact information.
Resources
Tech Safety and Privacy Tools:
- Safety Net Project - Technology safety resources for domestic violence survivors
- Electronic Frontier Foundation - Digital privacy and security resources
- Consumer Reports - Smart home privacy reviews and security guides
- 1Password - Password manager for secure credential management
Domestic Violence and Legal Support:
- National Domestic Violence Hotline - 1-800-799-7233 (SAFE) for safety planning (24/7)
- Legal Services Corporation - Find free legal aid for domestic violence cases
- WomensLaw.org - State-specific legal information on tech abuse
- Cyber Civil Rights Initiative - Support for technology-facilitated abuse
Crisis Support and Resources:
- 988 Suicide & Crisis Lifeline - Call or text 988 (24/7)
- Crisis Text Line - Text HOME to 741741
- SAMHSA National Helpline - 1-800-662-4357
Remember: Your safety and privacy are worth more than the convenience of a smart thermostat or voice-activated lights. When in doubt, rip it out.
You're taking back your home. You're taking back control. And every device you remove is one less way your ex can intrude on the life you're building without them.
References
- Brown, A., Harkin, D., & Tanczer, L. M. (2025). Safeguarding the "Internet of Things" for victim-survivors of domestic and family violence: Anticipating exploitative use and encouraging safety-by-design. Trauma, Violence, & Abuse. https://doi.org/10.1177/10778012231222486 ↩
- Douglas, H., & Harris, B. A. (2022). Technology-facilitated domestic abuse: An under-recognised safeguarding issue? The British Journal of Social Work, 54(1), 419–439. https://doi.org/10.1093/bjsw/bcad078 ↩
- Leitão, R., Adams, A., Fiadeiro, P. T., & Dunn, S. (2019). Anticipating smart home security and privacy threats with survivors of intimate partner abuse. In Proceedings of the 2019 on Designing Interactive Systems Conference (pp. 1239–1251). ACM. https://doi.org/10.1145/3322276.3322366 ↩
- Havard, B., & Lefèvre, J. (2020). Beyond the power and control wheel: How abusive men manipulate mobile phone technologies to facilitate coercive control. Journal of Gender-Based Violence, 4(2), 223–239. https://doi.org/10.1332/239868820X15776152630890 ↩
- Bates, E. A., Kaye, L. K., Pennington, C. R., & Hamlin, I. (2021). Exploring technology-facilitated abuse: Prevalence, nature, and responses among survivors. Cyberpsychology, Behavior, and Social Networking, 24(3), 165–172. https://doi.org/10.1089/cyber.2020.0255 ↩
- Finn, J. (2004). A survey of online harassment of American women. Journal of Technology in Human Services, 22(3), 31–44. https://doi.org/10.1300/J017v22n03_03 ↩
- Sorochinski, M., Spiniello, C., & Goodman-Brown, T. (2021). The impact of stalking and its predictors: Characterizing the needs of stalking victims. Journal of Family Violence, 36(4), 429–438. https://pubmed.ncbi.nlm.nih.gov/34123329/ ↩
- Campbell, J. C., Glass, N., Sharps, P. W., Laughon, K., & Bloom, T. (2007). Intimate partner violence and physical health consequences. Archives of Internal Medicine, 167(10), 1067–1074. https://doi.org/10.1001/archinte.167.10.1067 ↩
- Jasinski, J. L. (2001). Trauma symptoms associated with sexual and/or physical intimate partner violence. Violence & Victims, 16(1), 3–16. https://pubmed.ncbi.nlm.nih.gov/11281221/ ↩
- Ostermeyer, B., Klem, R., Harmon, M., Kemp, A., & Forde, D. R. (2024). Technology-facilitated abuse in intimate relationships: A scoping review. Trauma, Violence, & Abuse, 25(1), 359–383. https://doi.org/10.1177/15248380231214261 ↩
Recommended Reading
Books our editorial team recommends for deeper understanding

5 Types of People Who Can Ruin Your Life
Bill Eddy
Identifies five high-conflict personality types and teaches how to spot warning signs.

The High-Conflict Custody Battle
Amy J. L. Baker, PhD & J. Michael Bone, PhD
Expert legal and psychological guide to defending against false accusations in custody.

BIFF: Quick Responses to High-Conflict People
Bill Eddy, LCSW Esq.
Brief, Informative, Friendly, and Firm responses for dealing with high-conflict people.

Splitting: Protecting Yourself While Divorcing Someone with Borderline or Narcissistic Personality Disorder
Bill Eddy & Randi Kreger
Updated edition covering domestic violence, alienation, false allegations in high-conflict divorce.
As an Amazon Associate, Clarity House Press earns from qualifying purchases. Your price is never affected.
Found this helpful?
Share it with someone who might need it.
Tags
About the Author
Clarity House Press
Editorial Team
The editorial team at Clarity House Press curates and publishes evidence-based content on narcissistic abuse recovery, high-conflict divorce, and healing. Our content is informed by research, survivor experiences, and established trauma-informed approaches.
View all posts by Clarity House Press →Published by Clarity House Press Editorial Team



