Tech abuse Perpetrators using technology to control, stalk and isolate victims. This includes constant messaging or keeping a track of what the victim is doing online and keeping a constant track of where the victim is by accessing the victim's phone location online. Sending abuse over social media or pretending to be someone else when messaging the victim.