Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | Snapchat Symbol Meaning

author photo

How to Tell if Your Phone Has Been Cloned

by on March 30, 2020
in Tips & How-Tos, Phones and Mobile, Privacy :: 147 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

Our phones are the key to our digital identity, so it’s no wonder that mobiles have become increasingly attractive targets for cybercriminals, who have at their disposal a fair number of ways to hack a smartphone, some of which require more access and technical savvy than others.

Phone cloning – or the copying of the identification credentials a phone uses to connect to cellular networks – is one method that usually requires the perpetrator to have direct access to a device.  That makes it less prevalent than, say, hacking an operating system vulnerability that hasn’t been updated, but the consequences are equal to that of most phone hacks – your personal data is exposed, with potential financial consequences or identity fraud.

What is phone cloning?

It’s worth distinguishing between “cloning” a phone’s data – which spy apps semi-legally offer as a way to spy on the photos, texts and calls of another device – and totally illegal phone cloning, which refers to the copying of a phone’s complete cellular identity and using it in another device.

In cloning a phone’s cellular identity, a criminal would steal the IMEI number (the unique identifier for every mobile device) from the SIM cards, or the ESN or MEID serial numbers. These identifying numbers are then used to reprogram phones or SIM cards with the stolen phone number.          

Then there’s also the emerging threat of SIM hijacking, where hackers who have access to stolen phone numbers call up carriers and impersonate account holders to get a new SIM the hacker controls. This method, which relies on social engineering tactics to find out personal information that carriers use to authenticate customer accounts, differs from the highly technical method for SIM (or phone) cloning, but the end result is the same – to gain control over someone’s phone service.

Once the perpetrator has control of the phone line, they can send messages and make calls that appear to be from that phone number, with the bill footed by the victim. If a cloned phone and the original are near the same broadcast tower, it could even allow the perp to listen in on any calls made by the victim – though that’s probably not the main driver for phone cloning.

The bigger danger is that text messages and calls intended for the rightful owner of the line can also be intercepted – including two-factor authentication codes that allow snoops to get access to critical accounts like email, social media and even banking. (The vulnerability of text messages is one reason why experts recommend other methods of two-factor authentication.)

Phone cloners might also target political figures for surveillance: in February this year, South African state security ministers were reported to have had their cellphones cloned, the crime was detected when several people reported receiving text messages from a minister who hadn’t sent them.

Or, cloned phones might be used to generate revenue, sold to people who aren’t aware they’ve purchased a fraudulent handset with stolen credentials.

How phones get cloned

Most phones have SIM cards whose IMEI numbers are protected by secret codes that prevent over-the-air interception. But if someone is able to remove the SIM card and place it in a SIM reader for a few minutes, they can copy all its identifying credentials to load onto a blank SIM. (This technically includes anyone who might get time alone with your device – but as with phone spying, you’re likely to have an inkling if there’s anyone who might want to do such a thing.)

Researchers have also found a vulnerability in the existing protocol that is used for over-the-air carrier updates. Though rarely used, this flaw could in theory allow hackers to remotely clone a SIM.

Some older phones are more vulnerable to remote attacks. Those running on 2G or 3G CDMA frequencies, which are used only by the Sprint and US Cellular networks (Verizon retired its CDMA network at the end of 2019), broadcast to the operator in a way that would allow special equipment – like a femtocell – to eavesdrop on the connection and intercept handset ESN or MEID serials.

That means older CDMA phones, such as flip phones or 3G-only regular and smartphones, that are locked to either Sprint or US Cellular may be at a slightly elevated risk of remote phone cloning. All that said, however, phone cloning is not as common as it was in the early days of mobile phone use, when the radio frequencies in use were much easier to eavesdrop on.

6 Signs that your phone might have been cloned

If you think your phone might have been cloned, check for these signs which can indicate someone else is using your cellular service, such as:

1. Receiving an unexpected text requesting you to restart your device

This may be the first sign that your phone or SIM has been compromised – restarting your device gives the attacker a window in which your device is off and they can load their phone with your cloned credentials.

2. Calls or texts on your cellphone bill that you don’t recognize

Any outgoing texts and calls made on the cloned device will seem to be coming from your phone number – and land on your bill. Even if you don’t have an itemized bill, international calls will show up here, so keep an eye on your monthly payments and double-check when you pay more than usual.

3. You stop receiving calls and texts

If someone else has control of your phone number, calls and SMSes may be diverted to their cloned device, or your cellular connection stopped entirely. Check this by having a friend or your partner call you to see if the call rings and if it comes through to your phone.

4. You see your device in a different location on Find My Phone

Logging into Find My iPhone or Google’s Find My Device can be a way to check on the integrity of your SIM. If your phone’s on your desk, but on the map appears to be somewhere else, someone else may be using your cell service. (Chances are, phone hackers would disable this setting, however.)

5. You get a message from your carrier saying your SIM has been updated

If your credentials have been activated on a new device, your network provider will probably send a message confirming your details have been updated – a major red flag if you haven’t done anything. This can also be the point at which you find your device no longer has cellular service. 

6. You’re mysteriously locked out of your accounts

You might even find someone has commandeered your email accounts and social media handles – as in a spat of Instagram hacks based on stolen phone numbers (in these cases, however, the SIMs were hijacked by attackers who had gleaned enough personal information online to fool carriers into switching over the SIM cards). Either way, someone having control over your phone service means they can do things like trigger a forgotten password, receive a two-factor authentication code to the phone number they now have access to, then change the password and access any account they know your login name for.

If the worst has happened and your phone has been cloned, you need to call your cellular provider. They should be able to detect and block the cloned device, because each handset has a unique radio fingerprint independent of that serial number that originally belonged to you.

Can you prevent phone cloning?

You can help protect your phone from this type of cloning by observing the same cybersecurity practices that keeps your online life safe:

  • Check that carrier texts are coming from legitimate numbers – for example, do they show up in the same message thread as previous carrier texts?
  • Train a skeptical eye on any text that requests you do something – are they worded in the way you would expect? What do Google search results have to say about the sender’s number?
  • Finally, treat your phone’s IMEI, ESN or MEID number like any other password - never send it to anyone or give it to any website you don’t trust.

Cloning isn’t the only way your phone can be compromised. If you have concerns about the security of your device, read our story on how to tell if your phone has been hacked.

[Image credit: phone hacking concept via BigStockPhoto]

Natasha Stokes has been a technology writer for more than 7 years covering consumer tech issues, digital privacy and cybersecurity. As the features editor at TOP10VPN, she covered online censorship and surveillance that impact the lives of people around the world. Her work has also appeared on BBC Worldwide, CNN, Time and Travel+Leisure.


Discussion loading

Cloned

From Kammi Kothmann on April 08, 2020 :: 3:58 am

Im pretty sure my phone is cloned. i receive messages sometimes the day after they were sent. Voicemails i get later than they were made. i think i know who is doing it and im fixing to get a protective order put on them.

Reply

Probably not cloning

From Josh Kirschner on April 08, 2020 :: 12:23 pm

Delayed text messages and voicemails are not uncommon, and are usually due to issues on the carrier end. It’s much more likely that that is what’s happening to you versus phone cloning, which is very rare, only can be done with old devices, and wouldn’t necessarily result in delayed messages.

Reply

Clone

From Marva Jane Theus on November 13, 2020 :: 5:41 am

My phone screen flashes when I go to certain pictures and certain text conversation…. My account is locked up and disable cause of the wrong passwords… It freezes and quite often pics and files are suddenly no longer in my phone

Reply

Same problems ! The ex and the new

From Angelica on November 23, 2020 :: 7:05 am

I’m sorry , I feel you . I am experiencing the same things . I have test and am milk her to gain access to my phone . Smh ! I know it’s my husband ... playing willing games . Uses my SIM card ! Cloned my phone ! Getting ready to validate this with an old time FEDeral friend and I’ll go from there . I’ll let you know the results ...

My phone definitely cloned

From Josie Gomez on August 05, 2021 :: 5:12 am

Aside from them changing my recovery number on Facebook making it impossible for me to verify its my account and it’s going to be deleted tomorrow if I can’t access it, I found 2 logins with the same phone. One has the picture of my phone, but the other was a different style phone but listed as an LG ThinQ like mine. Files have been deleted, modified or created. Then all my files, pictures and apps I found in a folder in my laptop. Then files that have sensitive information from clients with their banking, Passports, etc which I had put them all on a removable disk, where all on my laptop. These are 2015 files and my laptop is from 2019. It’s been going on every single day and I don’t know what to do.

Hacked??

From Butwhylil on October 22, 2022 :: 1:42 am

Give been experiencing the same problem for a few years now.my phones says t mobile not responding or my passwords are never working. I took it to metro in Memphis but they just said download an virus app. I fear in in danger and the people that murdered my family is the people around i fear my husband is being controlled by a family off cops that are trieng to set us up so we can’t testify these are the people that hurt us when I was little. Help me please.[personal information redacted]
Please we may be on catilina island or Cj tn

I’ve been having same issues for yrs

From STONY 1 on February 15, 2023 :: 10:35 am

So come to find out ex was the main culprit she was the one I trusted she send out my bids (Roofing Contracts) out for me she had access to phone’s account as authorized person and emails, for business, when problems arose with getting locked out, of email , password to phone locked, phones stop ringing
Certain thing my phone was doing as setting being changed, of course not all at once over the yrs, so I’d
Ask her for her help she take of coarse, eventually telling me I was crazy and don’t know how use phones, that I was on drugs! Went in for months finally learned to live with when we split up yr or so later it got worse, clients getting personal info and pictures ,calls redirected ,child custody confirmation from me without knowledge it got worse, since I was in her words and of coarse people getting who knows what that completely compromised my relationship with my son , clients friends family so I did start self medicatiing not point I was out of control but isolated my business I built 28 yrs ,she took down in 2 yrs I’m still dealing with this issue ids accounts , my son I haven’t seen I almost 3 yrs ( I raised him she took him 4 now 7yrs )  I’m currently in stage of people now talking behind my back people that look d up to me is and awful feeling anyway lost everything about ready get a tent live ion the street but still trying to get it together and not let all involved realize it’s morally wrong
To join in on something they only are going on by hear say eventually I’ve become techie but not like school thought AT&T -Tmoble Apple F.B.I. All pending form nearly 8 months but it’s difficult when all income is now survival when I hate to say ( never want or wanted ) recognition but saved most everyone that needed help clothing, shoes , food , etc. anyways if you read this thank you wasn’t my intention to carry on but just want let those out there that your not alone when I’m todays world anyone can buy an app to destroy Simone (apps) like this have been around 2007 but I could only image those that did go crazy , lost there houses , family And their life I know one is hung I’ll fight for the little people and pass something almost to a MEGANS LAW BEFORE I
DIIE
From California soon lL.A underpass
Good luck and phones isn’t compromised it’s the account/acts if you feel something wrong go with it!

Not true

From Chad Vandine on February 14, 2021 :: 12:44 am

My Aristo 5 was cloned onto an ihpone 11 somehow and was being used with roaming charges in Africa!

Reply

Hack Attack

From Dora on June 01, 2021 :: 12:55 pm

Im confused. Why would you say only older phones cam be cloned? I had to send my phone in for repair. I was told by the 1st repair guy it was a cloned imei he believed. Is that not true?

Reply

Newer phones can't be remotely cloned

From Josh Kirschner on June 01, 2021 :: 7:47 pm

What we said was only older phones can be “remotely cloned”. It’s possible if someone has physical access to your phone that they may be able to clone the SIM on newer devices. I would be curious to know how the repair guy determined your phone had been closed.

What about if you get

From Kelly on August 05, 2021 :: 8:02 am

What about if you get random messages that your FaceTime is being used on another phone. And that your device has been signed in on another device. How do I stop this!?

Reply

Sounds like an Apple ID issue

From Josh Kirschner on August 05, 2021 :: 6:56 pm

If you are getting a message saying your FaceTime is being used on another device, that sounds like your Apple ID may be compromised. Did you recently set up an Apple Watch or Mac with your Apple ID? If not, you should immediately change your Apple ID credentials. And always make sure you have two-factor authentication set up for your Apple ID to protect it.

God keep this grace on them

From Chinaman on February 26, 2022 :: 2:52 pm

The problem is the real stand-up men are dieting down. This hackers and our government are the worst. Those are thiefs with a license. Alto of us have records but this cowards are used to get away if every crime. Can’t even call my jefita without this pieces of shit, nosing my call. Sorry for my honesty in ur comment.
At
CHINAMAN

Reply

You will be ok...we all need each other

From Jane Lockyer on September 01, 2022 :: 11:40 am

We have so much untapped power…..we DO WIN,WE DO SEE THE REASONS,WE WILL UNDERSTAND….WE WILL BE SHOWN EXACTLY WHY WE WERE CHOSEN FOR SUCH HEINOUS CRIMES..WE POSSESS POWER…THEY ARE TRYING TO DISTRACT US…THAT IS ALL!!!! THIS WORLD IS SO TEMPORARY AND I PROMISE YOU,YOU WILL RELISH EVERY MOMENT OF SWEET RIGHTEOUSNESS WHEN JESUS GIVES US OF THE STOREHOUSE….WE ONLY KNOW IS HEAVEN…AHAAAA….WE KNOW SO LITTLE NOW…BUT WHEN HE COMES TO TAKE US HIME,OUR EYES OF UNDERSTANDING WILL BE OVERJOYED AND RESTORED…I CANNOT SAY MUCH HERE…I HATE WHAT TECHNOLOGY HAS DONE TO ME AND MY BEAUTIFUL FAMILY….THE WORLD…ITS TOO LATE FOR THE WORLD….HAVE YOU NOT READ THE HOLY SCRIPTURES???? GOD WINS THE VICTORY BECAUSE IF BEAUTIFUL JESUS….HE TELLS YOU SO….PLEASE TRUST AND TURN TO THE ONLY INTELLIGENCE I EVER WANT TO KNOW ABOUT…ONE GOD,ONE FAITH,ONE BAPTISM…..I LOVE YOU PEOPLE….FEAR NOT!! NOT EVER!!! PLEASE CALL OR WRITE ME…XXX

Bit too defensive

From You know on September 01, 2022 :: 11:43 am

You are giving out no vibes of goodness….only excuses as to why U think it can’t be cloning….you are evil…you do it in large numbers…you are one of the cloning cunts yourself

Reply

Cloned and more!!

From Paula on October 02, 2022 :: 7:56 am

About two months ago my iphone started to do all kinds of things on its own and I kept getting security alertrs from my accts, etc etc… I reached out to anyone I could possibly think that could be a help or lead me to it… Well needless to say I got nowhere, mostly because everything required to go online and I could not do that with my devices, my husbands, I even went to family’s houses, libraries… This all sounded bizarre and I knew it was happening but nobody else did , I guess I can understand.. well here I am two months Into it and now my identity is exposed, I have bought 5 going on 6 cell phones in less than 2 months, and I have 3 smart tvs and they are all not working correctly and have installed software on them and I have no idea what to do or where to turn..  my phone keeps turning on sharing,, like location sharing, photo sharing, web activity share, and all kinds of weird permissions that I never even seen. Can someone please let me know what this is and how to stop it

Reply

Stay strong in faith because trying to keep hope alive is brutal

From Victim of the same crime on December 14, 2022 :: 9:43 pm

In my case and I am not at the liberty to say too much but I know that my husband is at the heart of all of the stress that I have been through and I am 32 phones in and I literally have not spoken to my aunt because I don’t want everyone to know what her life is like and I am not at liberty to speak freely about it all but I know that the person that I have been very good to and very loyal to has been living an extraordinary life with the woman I found out that he has been lying for 17years because they’ve been together for the entire time and he’s abandoned me at funerals to make it all the way back home to be in my home with her and she doesn’t feel bad about anything and I have to go through this because he wants to know what I have been able to find out. The truth always comes out and you will find out who’s doing that to you and don’t worry about the why’s because if you figured it out you would be just like the person that feels like you should be terrorized and it’s just not right for anyone to have that much control over anyone especially when they don’t even care about them at all because they don’t have any moral standards for themselves and their perfect for each other. Stay aware and try not to let it consume you because it’s not your fault. Renée

My husband has everything on my phone

From Nancy on May 20, 2020 :: 2:17 am

I dont understand how he can get into everything it doesn’t matter how many times I change my passwords he can still see everything.  I don’t have anything to hide I just hate him creating things in his mind then attacking me for no reason how do I remove his access?

Reply

There's an easy explanation

From Rikki Lyn Fruen on June 23, 2020 :: 7:21 pm

Hi, Nancy. In my previous life, I had a similar situation. My now ex actually knew everything that I ever did on my computer and both verbally and physically abused me for it. It didn’t matter how many times I changed passwords, he always had access even when I was living over two hours away from him. I found later that he had at least a key stroke logger on my computer. He may have had other things going on as well, but that was the biggest problem for me. Got rid of the husband and the computer and I’ve never had another issue from him on that.
Several years later, my sister was going through a similar issue with her husband, only technology had advanced and he was able to log everything, key stroke and all, that went over their home network (think major computer geek). She got out of that, by calling me one day from the coffee shop on the corner and asking me to set up a new email account for her. She never accessed it or did anything referring to it while on the home network. For all I know, she may not have even used devices that touched it. She used that account to start remaking her digital life.
There are plenty of ways for him to know all of that stuff. You may want to consider what his motives are. You may not have anything to hide, but he is suspicious of something for some reason.

Reply

Cloned phone

From Paul Reynolds on June 28, 2020 :: 8:46 am

I have an idea who is doing this to my phone he is abroad
I have seen him take full control of my parters up address
How can I stop this I have delayed messages and texts from random people

Reply

You just changed my life

From El matto on November 02, 2020 :: 8:41 pm

You just changed my life with that idea. I have a cyber bully from a past job…long story that I just can’t seem to escape, no matter what I do. But having someone else do it for me is an amazing idea.

Reply

Don’t blame yourself

From Amy on December 11, 2020 :: 11:46 pm

Hi Nancy
Fascinating information from Rikki and helpful as I too believe my husband is accessing and even intercepting my messages and texts. He’s worked in the communications field for years and I believe that once he figured out how to do this he became addicted to it and can’t stop now. The idea of not being able to know what I’m doing at any given time is unbearable for him. I have never done anything and he has never claimed to have caught me doing anything but he also refuses to admit that he monitors my activity. I would and have gladly shared my emails, texts and social media with him prior to my figuring out what he was doing but now the total invasion of privacy and his constant denials coupled with his accusations of my mental instability has driven a wedge between us and I no longer want to share this information with him. It has eroded our 30+ year marriage and I’m at a loss. Does anyone know how to prove that your computer and or phone are being monitored? His technical expertise far outweighs mine.  Of course all of his stuff is locked down and protected. It’s ridiculous but I’m becoming numb to the situation : ( Good luck, girls. It is comforting to know I’m not alone or crazy!

Reply

Whoa

From Kalika on January 30, 2021 :: 2:11 pm

Amy I feel like u just plucked my life experiences straight from my head. So. Annoying. Funny thing is, I will win. Longevity baby:-) yeah I’ve literally seen my partner do it and it’s all the sudden a question of eyesite? I’m. Ok. I hallucinated the entire time?! I’m not one to be quiet about it but yes it does become rather ridiculous n I hate going over worthless things

You're not crazy

From Jim on February 03, 2021 :: 11:59 pm

The longer it goes on the more credible you become. I’m going through that with my youngest brother and his girlfriend. Addicted to hacking me. They almost got me. But I told my story to the cops.  The shear length and scope andnumber of incidents and your honesty could sway a judge to search his phone. If that happens , forget it he’s done . Its extremely traumatic.  Good luck

Me too

From Maligant’s ex on February 10, 2021 :: 4:50 am

To all you lovely women being targeted by malignant mofos who have an inexplicable desire to know everything about you at all times:
The only creatures capable of dedicating that much time to hacking and/or monitoring your devices are those with clinical narcissism. The reason they are capable of this? That part of our minds that is dedicated to love, self-reflection and processing emotions, a large part if you ask me, is defunct in their brains so that energy is spent on this shit, and what a sad, sad existence that its. They have different patterns and methods, but one thing they have in common? An unrelenting drive to mess with you, no matter what you do, until such time that you cut them off completely. My point is, and I trust that most of you already know this, is get educated on narcissism so you can escape this bullshirt and get your real life back.

Amy

From Jim on May 13, 2021 :: 9:33 am

I doubt you’ll read this but simply buy a phone that is paid for 100% by yourself. Also keep your phone that has been compromised. Use the compromised phone for all your random internet browsing done at home, such as being on facebook, or whatever. Now the noncompromised phone should be kept secret. Use number forwarding services that use VOIP numbers so he is not aware of the actual phone number(that way he cant even guess what service this phone is, among other benefits of not using your actual number…no more spam calls either! lol) Now, you might consider buying a tote bag for it that is a Faraday cage, theyre often marketed as being RFID proof. You need to never allow the non-compromised phone from accessing your home network as that can be an entry point for over the air type deliveries of spyware packages so leave the phone off, & in the bag while at home, just use the compromised phone but when youre out & about, away from him/home networks then you can take the phone out of the signal blocking bag. It sounds crazy but the whole topic is insane already. You have to be vigilant. If you keep this phone entirely secured from him by remaining vigilant about it then you can decide if you want to bring the compromised phone with you or leave it at home. Either way, If there is no way he can access the “secret” phone then he will understand that you know what is being done, and regardless of his lies that you will not allow yourself to be abused by his lack of respect for privacy. He will look to see where youre at? but all he has access to is the dummy phone that you leave at home or whatever. Its possible then that he might try other ways of tracking you, such as tracking your car instead of your secret phone….But if it gets to that point then you already know that this guy is nuts & you need to leave him(You should already know this by him trying to look at your private device in the first place.)
My advice is not too specific but it is not that difficult, it just requires sticking to a few rules that never allow the opportunity for it to happen. My advice is not legal advice, It is merely a suggestion of a hypothetical alternative.

My situation to a t!

From Rachel on September 11, 2021 :: 5:21 am

My husband a retired communications engineer has complete control of my phone. I have no sim cards. He has accessed my knformation so thorough several of my financial accounts are compromised & I can’t fix them. There’s nothing U can do. I believe my calls are redirected to a bogus customer service desk. It’s so frustrating. I don’t know what to do. I can’t trust anyone it seems.

Damn same thing

From No name for my ex hired hacker on March 26, 2022 :: 12:58 am

My computers and 6 or 7 phones I bought was hacked started April 5,2021. Every day is hell and it’s not getting any better and I do not see much of a good outcome because the building I live in has people I believer are monitoring what I text and what web sites I go to even monitor my cable tv and when I reach out to people they really think I lost my kind and I have not. I had conversation with someone on my vp and then someone says I not say that. Or when I text someone and later someone will come up to me and ask why I said that. I believe the people doing it want me alone and have not one friend to vent with or a shoulder to cry on when it gets real bad much of the time. So no your not alone and your not crazy. They have very very serious trust issues that make them do that to you and me and everyone else that has this happen even with the lies the hacker will say just to boost their own skill when it’s all based on trust and believe other instead of trusting your mate.

I know

From Maryp on June 02, 2022 :: 5:52 am

I’m experiencing the same thing I’ve been going through it now for about 15 years I thought I was crazy actually but now it’s gotten to the point that he just cuts my calls off when he wants to right in the middle of my conversations changes my settings and my phone I would love to stop this and I’m in the same position he’s much more computer savvy than me I literally found out that it’s the router in our house records me while he’s at work and he can monitor it from his phone but he knows my text my messages my phone calls everything I do on my phone he has access to and recently my bank account and it’s still totally denying everything just like he’s innocent I am kind of stuck at the moment or I would just leave but that’s not going to stop him from being in my digital Life I want to stop that so I can totally relate it’s very much of invasion of privacy and I have nothing to hide either but what I do have is my business and what’s he going to do when I go with the information that he’s gathered

Plz Listen..U ARE NOT CRAZY

From Samantha the whistleblower on September 27, 2022 :: 8:39 am

Ok..first off this is gonna sound crazy but I promise u it’s true and I’m living it as we speak. There is a global secret society/coven that has been sending these narcissists after ppl who are lightbringers to this world..ppl who are empathetic and compassionate..and they try to break them and dim their lights or in my case they had me gang stalked, I missed appts..they falsified police reports accusi g me of child neglect..got my daughter taken away..had someone else pose as me at an actual court date and had everyone around me doing g dark psychology, spell work and bullying..they slandered my name and made me second guess everything about myself…until I quite literally almost killed myself..I was supposed to be a blood sacrifice..my own family set me up with these ppl..literally nobody in my life was authentic or real and all had nefarious intentions..take heed ppl..u are not crazy..I swear to God it was divine intervention that saved me from my fate..plz ppl look up return to sender prayers or kali mantra to destroy your enemies on youtube..or Reiki to remove black magic..and ask ur ancestors for help and guidance and wisdom..ask God for help..ask him to illuminate your hidden enemies..I’m not joking..this is real..it will be in the news soon..there are ppl “planted” in the lives of my fellow lightworkers all over the world..but u can bring them to the light and get justice ..just try the prayers and youtube mantras and energy healing..u will start to notice ppl getting confused or tired..even sick all around u..hit with tons of bad luck..as soon as u send black magic back to sender..do the kali mantras and start reading about removing g energetic chords..and keep reading anything that gets ur attention about energy healing or how to deal with black magic. Good luck all of u..I will b sending out healing energy to all my lightworkers..the world needs us..TAKE YOUR POWER BACK..the only way to destroy a narcissist and keep your light from extinguishing..God bless each and every one of u..and don’t let these low vibrational malicious and spiritually bankrupt ppl bother u..we are the ones with the power that’s why they have to do all of this to even try to keep us down. Get educated on energy and protect yourselves! Our light will bring attention to these monsters hiding in the shadows..and we can help save each other so hopefully save the next generation from this horror.

I am dealing with the same

From Love on February 05, 2023 :: 9:13 pm

Hello Amy,

I believe my boyfriend is monitoring my every move on my cellphone. He recently told me a story about his “friend” cloning his wife’s phone and caught her cheating. He one day took my phone for atleast 3/4mins, wouldn’t give it back n didn’t let me see what he was doing. Then all of the sudden, he knows too many things that he shouldn’t. Harmless things, that only I should know though, bc I didn’t tell him.
I have nothing to worry about in the cheating department, but it just sickens me to think that he has that much control and access to everything on my phone, especially since he don’t pay my phone-bill. It’s dreadful to even open my phone up bc it’s not right that he has that access to mine and his phone is locked. Even tho I i literally turn my head when he’s entering his code on his phone. I wouldn’t dare degrade myself to do anything such thing like him. It’s psychotic, disturbing, disgusting and most of all, it’s disrespectful. At the end of the day, he’s most definitely driving himself bananas way more than me being annoyed of this foolishness, to boot this is all a an obsession over what he “thinks”I am doing. I used to get very angry, but I have to kinda feel bad bc he definitely has major insecurities with himself to hindering both of us with his nonsensical behavior.

How to tell if my phone is cloned

From Suzanne Conner on April 25, 2021 :: 7:14 pm

Im a victim of cyberabuse/ stalking etc:  years of suffering.  My sister is a woman freemason, police involved. Whole UK system play a part in there heinous crimes.  Not 1 place to run to, silenced & isolated

Reply

I hear you

From Corina on September 24, 2021 :: 5:54 am

This is exactly what is happening to me and I am shocked by the lack of support from the official bodies. Shocked!

Ways n means to beat the staljer / hacker psyco crim

From Sirius on March 14, 2022 :: 2:50 am

I have been staljed since 2006 by [redacted by moderator]

We always knew it was him but could not prove it.  He calls cops to my house saying its a domestic fight. Has people pull up on me and confront me steal from my yard drive up and blow thhe horn in my drive way. Kill all of my devices hsck into my security system stesl mobey from my accts   all of this happened and more.  When i finally tried to hire a hacker to regain my social media accts after getting 5k from me they told me now for some “Truth”  we are not here to help you we r here to extort from you and you hsve 60 mins to pay up.  Of course I refused.  They said forget filling my stupid reports to law enforceent. They have them snd the fbi in their pockets. This eas a text chat. They actually named their “client”  they told me they were pegadus and that ck is their client. It is litterally in the chat. I copied it. Pasted it.  Sent it to msny many law agencies

U R NOT A VICTIM. THERE IS MUCH U CAN DO. NOT ONLY HAVE THEM PROZECUTED BUT U CAN GET THEM AND KEEP THEM OUT OF YOYR DEVICES

[redacted by moderator] PAID PEGASUS TO STALK AND HARRASD ME WITH TORTIOUS MAL INTENT

KEEP RAISING UR VOICE. THE LAES ARE CHANGING

THERE R WAYS TO SECURE AND REGAIN ONES LIFE. TRUST I FIGHT THIS FIGHT EVERYDAY. THEY R DESPERATE. SECURITY IS CATCHING UP TO THEZE LOSERS AND YES THEY re huge rejects in this world its why they do what they do.  They are worthless!

Im starting a page on the web

WE FIGHT BACK!

YOU ARE NOT ALONE.  I HAVE HAD ALL THAT DONE TO ME AND MORE SND RECOVERED IT ALL

I WILL NEVER STOP TIL [redacted by moderator] IS ARREZTED AND EXPISED FOR WHO HE REALKY IS

NEVER EVER BOW DOWN OR BREAK FOR THE DARKNESS IN LIFE

THEY ARE PARASITES. THEY NEED YOU TO FEAR AND FEEL HELPLESS. YOU ARE NOT

TIME TO TAKE THESE CRIMIBAL MFRS DOWN.  ITS THEM OR US

MY LIFE MY CHOICES THEY LIZE JUST EVEN THINKUNG THEY CAN DO THIS

SECRET SERVICE HAS THAT CHAT.  TIME FOR REDEMOTION CYBER CRIMINALS HAVE HIT THEIR APEX. GET ON THE OFFENSIVE AND SHOUT TO THE WORLD.  SE R LUSTENING

WE R HERE WITH U AND PLEDGE TO END THE SCURGE OF CYBER CRIMINALS!!

Over 30 years of targeting and I'm 44 now

From Lloyd Hamilton on August 04, 2022 :: 7:57 am

Had 5 vehicles tampered with and destroyed, twice in phsych ward, 4 times made homeless, Arrested countless times, friends and mother lied to, father murdered who was the only one it seems like supported me, my phones are spoofed as well as my laptops which means they have made clones of my devices and can commit a crime and make it look like it was me doing it.  They can do this at any time.  They are still building a case against me and a fake dossier of ANYTHING questionable action I have done in my life.  We all do stuff in our lives we ain’t proud of. But these scum of the earth need to get weeded out and I don’t mean smoking weed I mean ripped from there comfy surroundings, have their shit seized and given to the victims of this henious crime.

Facebook hacked

From Not say on March 26, 2022 :: 1:09 am

To add. My Facebook account was stolen so the hacker can go to my account just to pretend to be me to get people angur and setup the conversation so they trash me. My Facebook account password was changed so I can go into the account to delete it. All the web sites I used to buy products the passwords were changed. They lie to the people that I know just to make me discredited so I become 100% alone and not believed so the lies they tell anyone will be believed easy over the truth. Like I said before. I was put on an digital island where I can text anyone at all without it being said so they can take what’s said and twist it into a lie to make me unbeliever at any cost. I feel your pain. I have been living this way now for almost 1 year now because trust comes hard to some families and they think everyone only wants to hurt them when it’s not true. They only person they are hurting is themselves and the victum(me).

Reply

Trust me they aren't hurting

From Lloyd Hamilton on August 04, 2022 :: 8:10 am

Trust me they aren’t hurting at all they are celebrating and these kind of people look into and study a person’s life before they finally blackmail them.  They blackmail women to have sex with them.  You can’t get out of it so don’t think it is possible I’ve been in it for 30 years.  All I know is it seems to be a pattern…all decent human beings being tortured by devils

Stony1 never give up

From Abruce on February 24, 2023 :: 9:33 pm

To all the people who are going through horrible treatment from usually partners these people don’t love or care for you if they are really doing all this hacking and stalking even one says satanic rituals you need to get away from these people destroy your devices and create a brand new digital identity the people in your life capable of this are dangerous get as far away as you can please I don’t want to see another horror story where it’s too late to help.

Reply

There’s an easy explanation

From Stacy George on September 11, 2022 :: 3:04 am

I am going through the same thing right now. Is there any advice that you can give me right now.

Reply

What hackers are using to hack

From Lloyd hamilton on October 02, 2022 :: 9:04 am

The only tool basically they can use to hack us is a program called KALI LINUX.  Us as TI,‘s need to learn that program SECRETLY without our hacked devices cause these people won’t let us learn if they know we are doing that…it is what is used to hack devices….and it has tools within the program to bust and get actual proof of them hacking you.  Once you learn it and the tools within the program to catch who is hacking you you got them.  But they are using a VPN to do these things which just shows they are in JAPAN when they are really next door but it can still be done from 100’s miles away I think

Look in your permissions in settings

From Chad Vandine on February 14, 2021 :: 12:47 am

If that doesnt work then save anything you want to keep to google doc…drive protos….then just wipe everything. Google will store anything you give em smile just get that spyware removed and put in a security measure to require your fingerprint for any app installation. Yes that includes those off the web as well

Reply

Google

From Mary Mitchell on February 15, 2021 :: 5:49 pm

If they clone your phone wouldn’t they have access to Google Apps?

Reply

If you believe your phone

From jim on May 13, 2021 :: 9:50 am

If you believe your phone has been cloned then you can never trust that phone, phone number, simcard, or any backups ever again. If you use a shared wifi/lan network, log into a “friends” wifi/lan network, or if they have physical access to your phone(this applies to any situation, I myself am a deep sleeper, and my phone has been manipulated simply by using my finger to unlock it.) Which reminds me, turn off the setting that shows PIN/password characters briefly right after being typed, if they arent able to catch a glimpse then a couple times of watching over your shoulder will allow them to see the characters even if theyre just there for a split second, Or imagine if they somehow simply caught you typing the password on video, any playback would allow that password to be easily seen. This might not be obvious to some but to the type that want to snoop? Its the first thing theyll try. I digress, if your phone has ever been on a shared network, or left unattended, there is a possibility it has been compromised. You dont need to buy 50 new phones 50 times a year but you need to stick to some rules about keeping your stuff secure. Make sure you put a SIM pin on so that every time the phone is restarted, you must put the SIM lock pin in as well as the screen lock. OFten the spying apps require rebooting, which the lock on start SIM lock will help prevent. Dont let your kids play on your phones. Dont share accounts/devices if you have split custody, etc. Its really simply stuff but its a hundred different little rules. A RFID faraday cage tote bag might be something to consider(its wise to use those these days if you want to limit your data being spread anyhow, retail stores for example, connect to your device & harvest data that they consider “non-identifiable.”) Just be smart. Or just get rid of smart phones.

I'm going through the same thing

From Anntoinette Mabery on April 14, 2022 :: 9:50 pm

My husband also can tell me every text call or pictures that me and my best friend takes and that drives me crazy. I need help. What can I do to stop this?

Reply

Advice

From Lloyd Hamilton on August 04, 2022 :: 8:07 am

Get rid of your devices and then run, leave everything behind and run.  You need someone else to help you out of this and find you a place.  Use someone else’s phone but plan out without your device how your gonna do it.  Don’t take any electronic device with you or your screwed.  Your car has a tracker on it

Reply

Please don't fear....love life,love God..

From Jane Lockyer on September 01, 2022 :: 11:26 am

Please don’t let them win by succumbing to their tactics….they want us to feel completely alone,hated,controlled,stupid,etc….MY SWEET FRIEND,IT IS THE OPPOSITE…THESE PEOPLE ARE SO JEALOUS OF OUR ABILITY TO ENDURE…JUST BREATHE….GOD IS WORKING WITH THE OPPOSITE ....KEEP YOUR PEACE…THE WITCHES CANT HAVE IT!!!!!

Yup

From Samantha on October 02, 2022 :: 9:13 am

Get far away from the creeps doing this to you.  They are setting you up for a stay at the mental hospital.  They won’t stop ever it’s a sick addiction.  Run from them.  Leave the devices.  They are probably cheating or doing something underhanded to you behind your back also otherwise why would they be doing all this.  I got microwave radiation in my head and eyes last time the gangstalking went OVERT on me

Same issue

From Jen Jen on June 28, 2022 :: 7:28 pm

How do I verify phone sim serial IP address and erase All Data from All apps from multiple devices? I’m tired of Google not being able to verify I am who I say I am and refusing to let me change my password and delete my duplicated history. Everyone I go to an app or a site my history doubles the application like someone is riding with me but not right beside me. I think this is my ex too. Even though he’s always claimed to be ignorant of smart phones. Please help. There are county officials after my family and I’m not sure who or what to trust because i am ignorant to the application process and privacy settings. My finances are at stake as well.

Reply

It cost less than $15 USD to have a cell phones calls forwarded

From Greg M on January 25, 2023 :: 5:31 am

That’s calls, sms, everything for less than $15. There are companies that claim you must prove ownership before they provide this service so many just check the box stating they are the owner of the phone and in a spouses case that may be true. But there are at least two companies I know of. I won’t mention names because I am not sending customers.

Reply

Get a hobby

From Urname on May 29, 2020 :: 5:10 am

I have a very good understanding of revenge and I must say that going and teaming up with hackers is cowardly, if getting revenge means that much to you why not get it by letting karma come along, on its own!!! Who to say that person who you want revenge on won’t just snap. Clearly they already did something to you to get you to the point of cloning there phone so who’s to say that person already didn’t or doesn’t have a conscience and won’t hurt someone????

Reply

Read More Comments: 1 2 3

Leave a Comment Here

Love getting helpful tech tips? Subscribe to our free newsletter!

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.