OSE SecureHub

OSE SecureHub

Remember:

Keep your devices updated and patched

You took the first step. Now we're here to walk with you.

You reached out and we heard you. The information here will help you understand what we do, how we do it, and what you need to know right away. Please review the information that you feel is relevant to you. 

Please note that this information does not replace our services. Rather, this is a reference for you to use as we continue to work together. 

Scope of services

We focus on the safety, security, and technology layer that is all-too-often missing in advocacy solutions. For example, survivors often hear advice saying “just leave” or “call the hotline.” This may be good advice for the situation, but what happens if it’s not yet safe to leave? What if the abuser is monitoring their calls?

Our goal is to help rebuild your digital life and protect your devices and accounts, regain your privacy, protect your physical environment, safely escape and reach critical resources, and stay safe once you’re out. We’re experts in privacy, technology, and security- and we bring decades of experience to helping you stay safe… online, and off.

What we don’t do

Operation Safe Escape:
– Does not provide legal advice. We will help you locate and safely contact appropriate legal resources such as pro-bono lawyers in your area
– Are not medical professionals and unable to give appropriate medical advice
– Does not operate domestic violence shelters / safe house, food banks, or other critical social services. Our practice is to safely connect survivors with the critical services in the appropriate area 

Important

Please let your the team know immediately if any of the following apply: 

  • The abuser doesn’t know your location and it’s important they don’t find it
  • You are concerned about the physical safety of you and/or your children
  • The abuser has threatened to kill you
  • They have ready access to a firearm
  • They have previously strangled or choked you 
  • You have left them or separated within the past year
  • The abuser abuses drugs or alcohol heavily
  • They have ever intentionally hurt you while you were pregnant (if applicable)
  • They have forced you into sexual activity against your will
  • The abuse has escalated in severity or frequency
  • You feel there is a need to escape quickly

This information will help us better focus on your safety and security.

What to expect next

Remember: sometimes it’s a sprint, sometimes it’s a marathon. Sprints are faster, marathons are safer. 

In the next steps, your team is going to work with you to thoroughly understand your situation and risks, evaluate the security-related aspects, and develop a comprehensive security plan that addresses all aspects of your unique circumstances. Although emergencies do happen, the more time you have to plan and prepare, the safer the outcome. 

Your intake specialist (who by now you’ve already heard from) will work with you to figure out what’s going on and what you need to be safe and secure. We know this can sometimes feel a little bit overwhelming- like you’re facing a lot of questions or being asked to provide things that you may have been asked about before. We get it, and try to get to the root of the problem as quickly as possible. This phase is so critically important, so we appreciate your patience as we try to identify all the risks, indicators, and vulnerabilities that we need to deal with. Especially in high-risk situations, making changes without a holistic plan can actually make the situation worse. For example, securing online accounts in the “wrong” order may actually give the abuser a way to get back into the seemingly safe accounts or may alert them and allow them to better cover their tracks. 

Once we have enough information to make an accurate diagnosis, we can move into the remediation and recovery stage. In complex cases, this often means helping establish a highly protected “core” (such as locking down your network and a handful of devices using new accounts), then building on that as devices and accounts are “cleared” or rebuilt. This offers maximum safety and technical security. However, the approach will be based on your circumstances and needs.

If at any point you feel your safety is at risk, please let us know right away so we can focus on safety planning and secure communications. 

Understanding “data points” versus “evidence”

In many cases, you may have a lengthy list of observations and concerns about your accounts or devices which have left you worried about hacking or account security. Examples of some that we hear often include websites not loading, non-specific error messages, visual glitches, battery issues, and more. In some cases, these can be linked to security issues. In other cases, they may have a different cause. Either way, we encourage you to share your observations and concerns with us to help build an overall picture of what’s happening. 

Our specialists are trained to consider these lists and determine if they count as data points or as evidence. 

Data point: A data point are those observations and events that help build a picture of what’s happening, but may not definitively establish a specific cause. This may include errors with multiple potential causes, occurrences that can’t be replicated, and events that did not occur in a controlled or attributable way. 

Evidence: Events, logs, or artifacts that were collected in a controlled and verifiable manner, which can be used to validate a potential compromise or can be attributed to a specific individual. 

The priority is always your safety, but if it’s possible to collect or identify evidence we will assist you in that process. 

Important things to remember

  • Practice ways to get out of your home safely. If you have children, help them practice as well
  • If possible, always have a phone nearby or know how to get to one. If you feel you’re in danger, call 911 or local law enforcement
  • Tell people who you can trust know what’s going on. Make a plan with them so they know when to get help for you. This might include a code word, closing a curtain, posting a certain message on social media, or any other way of sending them a message
  • Know how to access important papers, such as identity and financial documents. Consider whether or not it’s safe to put those documents somewhere safe if the abuser won’t notice their absence 
  • Be aware of the patterns of abuse, if any. Be aware of signs the abuser may become violent so you can assess the situation ahead of time
  • Be aware of where weapons or potential weapons are located. If possible and safe, remove them or make them harder to access during a potentially violent episode
  • Identify the “safe places” in your home, where weapons are not readily available and exits cannot easily be blocked. If the abuser is escalating, try to get to these safe places
  • Establish a code word with your children if they’re old enough to understand when they should leave or get help
  • If violence seems to be escalating, try to remove yourself and your children from possible harm
  • Call emergency services if there is an immediate danger. If speaking is unsafe, keep the line open or use a pretext to seek help. 911 operators are trained to recognize coded calls for help. Many areas also offer a text-to-911 feature

A note on our policies and our position on non-discrimination:

Operation Safe Escape does not discriminate based on race, age, gender or gender expression, sexual orientation, immigration status, religion, or any other characteristic. Our staff is obligated ensure child abuse and neglect is reported, and will assist you in reporting child abuse to the proper authorities. 

If you feel that you’re in immediate danger, call 911 or visit an emergency shelter. Operation Safe Escape is not an emergency or law enforcement service. If you have immediate concerns about your safety, contact emergency services. 

Antimanual

Ask our AI support assistant your questions about our platform, features, and services.

Chatbot Avatar
What can I help you with?