Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | Can an iPhone be Hacked?

Use It

author photo

Is Someone Spying on Your Phone?

by on March 30, 2012
in Phones and Mobile, Cell Phones, Tips & How-Tos, Privacy :: 830 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

[Editor's note 2/9/17: Since this article was written five years ago, many new phone hacking methods have been developed and/or discovered. We've created a new article to cover those various hacks in our new story: How to Tell if Your Phone Has Been Hacked. Please go there for the latest information. We're keeping this story active for the issues and useful advice contained in the comments.]

You probably know there are plenty of apps you can install on your smartphone to track its location in case it gets lost or stolen. Apple's “Find My iPhone” is one good one and many security apps, such as AVG Mobilation, can track down a phone in seconds.

But what if someone else is tracking you? Is there any chance your boss or spouse could be spying on everything you do on your phone?

It’s easy to do. Spy apps are plentiful and can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call and what photos and videos you shoot. The problem is these apps are difficult to detect and run invisibly in the background.

I decided to track my son and installed an app on his phone called Phone Control by Laucass (free on Google Play). Of course, secretly intercepting electronic communications without the person's knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.

Every day I receive emails that indicate my son’s location as he’s using his phone out in the world. I can click on those links in my email to see via Google Maps where he is (although I very rarely do). I could also set up the app to send me data about everything else he’s doing on his phone, but that’s not something I personally need—or want—to do.

Signs your phone may have been compromised

Someone borrowed or took your phone

I had to have my son’s phone in hand to install Android Phone Control. Once activated, however, there’s no icon in the application launcher. The app shows up with the name “Android System” in the applications manager so it doesn’t look suspicious. If you think someone could do something like this when you’re not paying attention or asleep, secure your phone with a passcode that isn’t easy to guess.

(Editor's Note 9/26/12: To confirm you have the spyware and not a standard Android app by the same name, follow these steps to open the spy app (dial the phone number.)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for more detail on 9 of the most common spyware programs and how to detect them.)

(Editor's Note 12/16/14 (Josh Kirschner): In some of my comments below, I noted the unlikelihood of spying on iPhones that were not jailbroken. However, since many of those comments were made, certain holes were identified in iOS that exploit the iPhone's connection to trusted networks and devices to allow someone with access to the network or device to download significant amounts of personal data. Jailbreaking the iPhone was not required. Fortunately, those holes have been patched in iOS 8. For more information, see: http://www.zdziarski.com/blog/?p=3820]

Your phone is acting weirdly

Taking forever to shut off, lighting up for no reason, suddenly getting much shorter battery life or running hot when you’re not using it may indicate hidden processes are running in the background.

Your data usage skyrockets for no reason

This could be because your phone is checking in with someone else, using GPS and sending them text messages or emails that communicate where you are and what you’re doing.

What to do if you suspect your phone's being monitored

The best thing to do is perform a factory reset, which you can find as an option in your phone’s settings. Know, however, that in doing so you will lose all data stored on your phone, so back it up first.

If you’re using Apple iCloud or Android 4.0, items like your contacts, photos and music are automatically synced and saved in the cloud. But if you have an older phone, you’ll want to make sure to export your contacts before doing a factory reset. There are various ways to do this depending on what phone you’re using and which operating system it’s running. If you’re not sure, get help from your cellular provider; they can make sure to retain your contacts and other important data during a factory reset.

You'll then want to use a strong passcode to prevent unauthorized access to your device. For Android devices, you can also install an app, like AppNotifier (free on Google Play), that will email you when programs are loaded onto your phone.

(Editor's Note 9/26/12: See our updated recommendations for Android antimalware solutions)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for our latest recommendations on how to protect yourself.)

You'll then have to tackle the issue of who's doing the monitoring. Keep in mind that if your device was issued by your company or is authorized to access your company's email and other data services, you may have given your consent as part of your employment contract or when access was data access was granted.



Discussion loading

Cell Phone Debugging for the Average Person

From Kevin D. Murray on March 30, 2012 :: 10:39 am

I consult on eavesdropping and privacy for business and government clients. Your advice on detecting spyware is very accurate. Thank you for getting the word out.

For those who want a more scientific test (that the average person can simply preform), I created one for my clients and eventually put it into book form, “Is My Cell Phone Bugged?”

Unfortunately, just testing for spyware is treating the symptom rather than the disease. There are other steps which must be taken first to successfully retake one’s privacy.

The root of the snooping problem is the snoop; not the spyware, bug or wiretap.

Even if you find spyware and reset the phone, the snoop remains free to spy again; more covertly now they know you are suspicious; and, using a variety of other methods as well.

The key to treating the disease is linking the criminal to the crime, first. This is part of the scientific test procedure.

Reply

suggestions please

From Me on May 02, 2012 :: 4:56 am

Kevin you defintely understand, and its a relief for people like me to know there are people like you who see and want to help. My problem is my resources are limited and I am not that tech savey. I suppose thats why they are able to mess with me. How does my phone end up being a speaker when its off. This past year I have bought over 20 burn phones.  I try to not let my number out but they get it? Advice please

Reply

same problem i have my phone bugged just about every weekend with out fail and yep :( iv been throug

From dolmio on October 21, 2012 :: 9:51 pm

hey guys…..sooo whats the best solution to people bugging our phones/smartphones…... i see and realized a while ago the best and most approachable way is to find the criminal that done the crime and thats correct, i ant no police/goverment fan but this is pure nonsense with bugging peoples personal devices, iv forgot to mention some of us pay top dollar for out smartphone and tablets and in the end all we want to or should do is get rid off it as there seems to be no easy sollution???? apart from parents with kids thats acceptable to a certain aeo but still i think there needs t… is there a program for iphones and ipads to give them a 0 im infected or a 0 all good?..... iv never seen or heard if such a program i could run on my pcor device to test or all these new modern warfare technology…....chees Damo:D

Reply

What??

From Julia on November 18, 2012 :: 6:57 pm

What??

Come On

From Best Phone Arena on December 14, 2014 :: 11:11 pm

Come On

If people weren't so shad.

From Purplefoxs on May 11, 2020 :: 3:32 am

If people weren’t so shad. Or not doing anything wrong u shouldn’t have to worry about burnner phones or hide secret apps

Reply

Harassment

From Kelly on March 01, 2021 :: 2:04 pm

That is NOT always true.  Sometimes there are certain circumstances like stalking or just not want someone to know your every move.

spy

From Rob Ratliff on January 17, 2021 :: 4:48 pm

they pull up in front of your house and grab your new number out of the air .or they wait till you start talking to a number you call all the time cause they have there number to….you need 2 simple apps.fake gps location pro and pia vpn..if you only use fake location when you send a text it will tell where your at….turn off nearby device scanning as well…they have an app to turn off mic also.

Reply

How?

From vibrant77 on July 01, 2012 :: 8:25 pm

I recently discovered I may have been a victim if illegal invasion of privacy by an ex friend who did have access to my phone when I visited their house last year. But, how do I go about prosecuting, and proving they did it?Its easier said than done

Reply

want to hear more

From dan mata on April 05, 2015 :: 12:02 pm

I’d love to discuss this. Topic with you and hear about your story n how you took care of it and was able to prosciutto ..it’s very sad n well scary that people would even want to do something like that..it’s an invasion of privacy…I just used to think I was going nuts lol but I stuck to my guns n I kno n they kno I kno , but what can I do about it…that’s where u come in ..thank u and I hope to hear from u soon ..

Daniel

Reply

Invasion of privacy and stolen lot of my music that has not been put on my name cause its not finish

From Daniel ibarra on October 22, 2018 :: 4:39 am

Sso it started with a pop up out of nowhere showed and displayed alot of people from youtube not the young adults but experienced music producees movie makers you name it then my screen back to what i was doing i started getting bullied :v the donkey siper.Xd refered to me.ive tried sending facebook messages that i was having issues they used memes so their responds nothing wrong here stated telling family and friends they didnt bother so i said f..everybody and took them on my self. Then that peeson poped out when i was home on my laptop i didnt have it on internet cause my friend gave me reason and i wasnt legit so i was afraid of it connecting and them noticing guilty conscious i guess pop up question you want to start youtube channel thought about it then i said ok show me a license agreement then were gonna send you files to laptop whata f..i never told them i had laptop got the program going but just seemed stupid so i neede 3d glasses tried getting a hold of someone from you tube it was a dead end no connection to anybody who even sent that to me so i make it. Short 2 yrs of this hacking my laptop programs on apps from schools to reddit istagram tweeter i was like the whole f..world of music artist didnt know if some had faked all this by now my head is f..up from all the bull dont know what to beleive i couldnt even beleive the crab they were posting like id i was some d..animal no fuking respect i felt google was playing my ass to jerks.unless they were using fake pages but i dont think cause some one was like guiding me through my phone lije showing me my way around things everytime i made an account couldnt get bacck in make a new ones so here i am gave up fighting them now i just glide with them coming hard with my beats now it was like back when i first started adreline rush when you got that rythem to the flow.so now you know aka.Lok od .Icubalanced int. Also text radio dont know what staion but im on rasio everytime i work on my music jerks are getting my training for free.Peace.

Erase the phone!

From Stacy on April 08, 2015 :: 9:34 am

I guess the optimal solution for you would be to hard-reset your phone. This will definitely erase all spyware from it, and cut this dataa-transferring channel down. Moreover, you won’t have to argue with potential hacker.

Reply

hard reset isnt enough

From Ayyub on May 24, 2015 :: 11:15 am

You can do a hard reset but most havks are done by email or by sending an encrypted text or mms message usually with a pic. So if you do a reset and then sign back into your phone with the same email then youre hacked again and backing up data on to a cloud app or agent will also get your phone hacked again because iyou are backing up everything even the virus so once you restore you phone you restored the virus. 9 times out of ten the person hacking you is some one you know. There is no security software that is 100% accurate its all bogus and a way just to take your money plus most security apps do the hacking because of all the permissions you give them so they can so call check to see if you are hacked. Its an industry people. They get paid to fix what they themselves have sabotaged. Businesses now sucker the people into buying junk a damaged goods. Then you pay them to fix it. Its all scandalous business. Android has yet to fix its security holes and its been almost 20 years that they’ve known about their weak security. These companies create shit like cloud and bluetooth and so called smart share all of which consits of you having to save personal data and images and other information on outside servers which who ever controls that server has access to. No one is too be trusted no matter what the promise is.  Man is easily corrupted and I trust no living human. Because anyone can be corrupt or can get corrupt with the right offering.

Yea, but I've re-set another

From ted on December 27, 2015 :: 8:07 am

Yea, but I’ve re-set another phone and lost everything. Backing up didn’t help. I couldn’t retrieve. I need to find a good block instead.

Questions about cloud and I'm getting information that's actually important

From Karen L Aubuchon on October 07, 2019 :: 7:43 am

Almost 5 or 6 years ago I went to AT&t many times and nobody can find a problem but my phone kept searching and searching and finally one lady got a hold of my phone and told me that died phone was definitely the problem and I needed to erase everything so we did I kept having the same problems I wasn’t getting my clients calls they weren’t getting mine so forth everything was going downhill for me along with fraud insurance that didn’t get process correctly so forth I contacted someone about the fraud it didn’t get anywhere here in my state… Since the contact things have happened around here and I’m receiving things in my cloud that are nothing I would know about and there is it’s information that could be important to me or is important to me including things that I would not think that they would even know about but it’s actually information that I would need so maybe it’s not always so bad if your phone is being spied on so I’d like to know information on how to find out where your stuff is coming from that gets on your cloud if you are not the one that’s putting it in there I hadn’t even signed up for cloud and I got all this information. I don’t know what to do with it so I need some help . Thanks

Same Problem here

From Khan89 on November 25, 2016 :: 3:35 pm

I am also undergoing the same problem and it is pretty traumatic and soul breaking that people know my personal stuff and I cant do shit about that.

Reply

If there's a few security

From Trinidy Johnson on June 29, 2018 :: 8:31 pm

If there’s a few security holes in the operating system that’s fine as long as they keep it open source Network…. iOS is closed source and you hear about iPhones and iPads getting hacked all the time…. but yes in the majority of the cases the same people who give you the virus are the ones that turn around and sell you the antivirus…..sounds like a good rackit

It’s definitely not a random person!

From Amanda on February 19, 2020 :: 11:16 pm

It’s someone you know most likely bf or gf friend or neighbor and last but not least a family member very close and they sick is what they are plain out sickness n they can sleep evry night while you know n they know you know but one day something is coming to them I assure you it’s called KARMA or some sickness they die with…. but know you the one they want to know everything about give them sorry fks sumthn to talk about, I do! Keep shining lmao bec you so important they just got to know when you eat shit n sleep! Oh and they have to know about your SEX life bec they ain’t got one haha

Reply

HELP

From Caren on August 13, 2012 :: 10:09 pm

I need help. ok, so heres how the story goes. One day a man came to my door and claims my husband of 20 years is seeing his girlfriend. I looked on his cell bill and he was getting alot of blocked calls. This also happened while I was in the truck with him and he would not answer.So I secretly placed a block on his cell and now no more blocked calls can come thru. The very next day he began calling this number 931-315-9988. I tried to search this number but nothing. about ten times a day he dials this number.I tried to call it but I cannot get thru. I have had about four other people try, they cannot get thru. But My husband continues to call this number daily. Can you call a number but it be blocked to all other phones? Could he be spying on me? Could it be a calling card? What is this crazy number that only he can call?

Reply

You should....

From Lucy on October 14, 2012 :: 1:09 pm

Why don’t you track your husband using GPS on his phone?. This way you would have tangible proof of what’s going on?. Because at this point there is only what that man at your doorstep said. I also suggest check his credit cards statements, bank accounts, receipts. That ougth to give you a clue of what’s goin on?.  I truly hope is something else for your own good.

Reply

HELP From Caren on August 13, 2012 :: 9:09 pm

From Me on November 18, 2012 :: 12:57 am

Hello Caren. Blocked calls are exactly that. You can manage blocked calls. You can also White list a number. meaning you can Block all calls except who you want. In the age of digital options are only a click away. I get telemarketer calls all hours of the night and day. I put them in a Telemarketers Contact. then I click Block ALL calls for these numbers. This is an option of Android not iPhone. There are apps to do this. however, You can create a contact called BLOCKED. It’s the name of someone, not the actual Caller ID.

Reply

The STRANGER

From G on June 20, 2019 :: 12:14 am

This would probably be the one time that I would believe a stranger

Reply

U.S

From Donny on September 13, 2020 :: 1:16 pm

931-315-9988 is a code that the United States government uses now I don’t know how he got this code because it’s like you say no one else can call this number it has to be a special phone you have to have a special Sim and a special hardware to be able to access it what it does is you call this number and he can pretty basically get into any phone that he wants via Bluetooth or a Wi-Fi it has to be one of the two that Bluetooth or Wi-Fi normally direct Wi-Fi but yeah I I’m on federal probation and I do a Google duo and my probation I were talking well afterwards I hung up and I was scrolling through Facebook I smirked a cigarette and I grabbed for a q-tip clean my ear will about 30 minutes later a video pops up on my phone of everything I just did everything good old USA

Reply

Icloud issues

From Caliallye on April 30, 2015 :: 12:05 am

We discovered that all son #2 had to do is borrow the phone and ask to play a game or download an ap that he had purchases on his mom’s phone. Once signed into the ap store in his name, the icloud changed as well. The phone was set to bavk up automatically.
All his mother had to do was download the phone backup from the son’s icloud, to which ahe had access, to play havoc with phones, bank accounts, facebook, etc.
Is there a way to keep someone from signing into another itunes account while using your phone?

Reply

Signing into iTunes with a

From Suzanne Kantra on April 30, 2015 :: 11:55 am

Signing into iTunes with a different Apple ID shouldn’t change the Apple ID associated with the device’s iCloud account (see this documenation from Apple https://support.apple.com/en-us/HT204053). And, when you sign out of an icloud account on a device, all of the documents and data that were stored with the original iCloud account are deleted from the device. So I’m guessing something else is going on here. Do you have a Family account (https://www.apple.com/icloud/family-sharing/) that includes your son’s Apple ID? That would provide access to a lot of shared info.

Reply

Thank you

From Melissa Woods on February 07, 2017 :: 1:56 pm

So how do you recognize whom is doing and in control of the family settings cause I’m exhausted from this and the amount of money is outrageous it’s makes me sick

Spyware on Cellphones

From Gia Salvatore on October 04, 2016 :: 9:02 pm

No one needs access to your cellphone just like your home computer.

I’ve looked up surveillance cases in my state of Texas. And visited with an owner of a spyware store.

You can pay $300 for a kit.
You download it. And send the person a text or email.

Once they’ve responded the hook from the spyware takes permanent hold of your IPS.

Dirty lawyers get away with this stating its in protection of the child

Reply

Spyware on cell phones

From Nan on January 30, 2017 :: 1:14 pm

Gia Salvatore,
Can you elaborate on how dirty lawyers spy on cell phones with hidden apps and can they use this to talk to judges behind closed doors to win a case?

Curious, because I’ve been hacked by my ex and his wife who is an IT web developer and it guru. I’m not tech savvy and been dealing with a master Narcissist who knows how to fool and charm even his own lawyer.

Need help proving the hacks. Or I’ll never be free of his control.. his fixed on controlling me even after remarriage.. he uses new wife to do it. Trust me I’m not crazy, just exhausted from the invasions and no proof.

Reply

Thank God I'm not the only one.

From Rich on July 10, 2019 :: 12:51 am

Amazing that someone is going thru same as I. This woman has stalked me and tracked me and all else. After 8 years with a narcissist crazy compulsive liar,cheater, ect, my sick ex takes off with some other myserable idiot( who has no clue what they’re in for) used her victim stories to get her IT trained co-workers to help her and helped make me realize that their are some pitiful sick soulless filth in this world that are so sick and so full of drama they waste their personal time stalking people. How sad. It used to piss me off so much,but I found one way to get a little payback. I thought it was over but I’m seeing things again that gives away clues that it’s her even though she found someone and disappeared 2 years ago. Sadly, they say sick warped people like her and other narcist never loved you, it was all their sick little warped fantasy world, but they always will think they owned you and you are three possession. Long story short, I know exactly what your talking about. Couldn’t even sit on the toilet without having to tape the cameras over so her sickness wouldn’t be taking pictures. God help that woman. I’ve seen tablets do some amazing things that even a policeman said he was an IT guy previous and it wasn’t pssible. What wasn’t possible was him telling the truth coz he was no computer expert and seemed to know less than I who knows very little. And the IT pros are learning more everyday. God help us all when the robot Sylvia or whatever is synced with every other PC and phone and robot in the world, and yes, they are mass producing robots in china, so that means soon they will be like cars. Everywhere, except cars can’t repair themselves.I really never think about crap like that but maybe it’s time to start.

Spyware options

From Nicholas Delgadillo on March 13, 2017 :: 4:13 am

Hi there you had mentioned in one of your previous statements that you had visited a spyware store a surveillance store and you can pay for a kit for $300 and which would you would send your target text or an email in a soon as they answered it it would it would attach itself permanently to the right To their IPS!  Well well can I ask what some of those App Store kits would be colder where can I find an option list of all those kind of things that I can choose from or can you give me some suggestions on what side so I can look up to find these I’m curious and looking into this myself at this time

Reply

spying all the way and noone did a thing!!!!!!!

From not a joke and words could not describe on December 08, 2016 :: 10:58 pm

Please someone here help me out please!!!!        I need every tech app spyware and more help from someone who knows spyware its self and can help me because no one will help need someone who can help its the fact that it has been over 3years? please help I need, anyone who knows anything would be great!!!

Reply

So ironic!!

From Ulio on April 30, 2017 :: 2:59 am

My girlfriend and I have went through this same situation. I was the one playing with her phone first but never spyware. She on the other hand went all the way with it thus making my life a living hell. These types of things can really destroy a Relationship. Wish now that I never mistrusted her like I did. Doesn’t seem to be getting any better either. Hoping that maybe she will come to see things in a better light.

Reply

I want the person responsible

From Quentin on January 05, 2017 :: 4:17 pm

Hi, I like your article. My question is, how do I trace the spyware back to the person or persons doing it? I have spoken with the local DAs office and they’ll file charges if I give them the person on a silver platter. They want facts. I know my son is one of the people doing this to me.

Reply

we all want smethg i

From Rose on June 19, 2017 :: 3:49 am

so u want some1 responsable
& I want a million dollars

Reply

Wish in one hand an....in the other ur still getiing shit on your hand either way

From Samyaza grigori on May 05, 2018 :: 7:57 pm

Ur not worthy of a milkion dollars or the unicerse would give u what u desire u get what u put out if people have made u loose trust an ur paranoid all ur gonna get manifested in your life are more sittuations like this change ur PRECEPTION change th 🎮

How do I find proof

From Trista on June 20, 2017 :: 4:43 pm

I need a step by step way to find proof of who is doing this.

Reply

K

From Donny on September 13, 2020 :: 1:22 pm

Good luck with that I’ve been going through it myself I got a girl that Spooks my phone number she called me 23 times one night and I messaged her and she says can’t pick up a phone I said you can’t message well the 24th time she called I picked up she hung up on me and didn’t call back and that’s when my dad went sky high and her name was even on my weather app so yeah there’s not much you can really do just don’t worry about it if you if you’re not breaking the law or doing anything you know I’m going to worry about they watch me all the time I ain’t got nothing to hide

Reply

i AM TIRED SICK AND TIRED MY HEALTH IS SUFFERING AS WELL I KNOW THAT MY FAMILY MEMBER IS SPYING ON M

From Joette Freire Morales on March 26, 2021 :: 9:25 pm

PLEASE ANYONE WITH SUGGESTIONS ON HOW TO FIND OUT FIX IT AND PROVE WHO IT IS… PLEASE

Reply

PLEASE HELP

From alone&scared; on March 25, 2018 :: 5:14 am

Someone is hacking my Windows Lumia phone. They know EVERYTHING I do & EVERYWHERE I go. I have no one I can trust to help me figure out who it is. They mess with my internet and all sorts of things. People would think I were crazy if I told all. They probably know about this too. Oh well.I’m really scared and I need some help.

Reply

You're not crazy and I KNOW IT...

From Marguerite Harper on March 16, 2021 :: 9:25 am

I’m in the same position…I can’t get ANYONE TO HELP!! Have you had any luck? Of so HOW/WHAT can I do

Reply

How

From Desiree on June 11, 2018 :: 1:21 am

Hi
How could I link them to it?

Reply

PLEASE HELP

From Shane on January 16, 2021 :: 10:13 pm

I have a really bad feeling I’m being gang stalked and I can’t tell anyone until I have proof. What can i do to find out what or who is accessing my phone Samsung a10e.. android 9.. I saw something about linux.. what should I do. Please help

Reply

Help Please!!

From Kelly cottrilk on March 01, 2021 :: 2:08 pm

I am not tech Savvy & need proof that my phone is hacked to help with a Domestic Violence case.  Please let me know who to contact.

Reply

Cell Phone Debugging

From Carol on March 30, 2012 :: 11:10 am

Can the cheap dollar store cell phones be bugged?  As far as I know they do not have a GPS or WiFi.
Just a note:  You can know who the criminal is but getting the law onto him is another matter entirely—the law will not work for you if you are a woman and it is your ex-husband or soon to be ex who is doing the bugging.  I know this from experience.

Reply

Cell Phone Debugging for the Average Person

From Kevin D. Murray on March 30, 2012 :: 11:26 am

Hi Carol,

You are correct about obtaining law enforcement assistance. This is why it is imperative that the case be handed to them on a silver platter. It can be difficult, but it can usually be accomplished.

If criminal prosecution isn’t successful, an attorney who is given enough information to work with can advise on the the state and federal civil remedies available.

The goal is to stomp on the snoops toes and show them you mean business. Just initiating a case (with good evidence) usually dissuades all but the mentally ill category snoops.

On the cheap cell phone question. Right again! Only smart phones have the brains to remember and execute spyware. The dumb phones don’t tell tales.

Reply

relieved

From Brooke McManus on March 19, 2014 :: 1:44 am

I am absolutely thrilled to have randomly came across this site! I previously wrote and in great detail gave an overview of the technical difficulties ive been experiencing since day one with my samsung galaxy s3. It was mentioned to let them hand it to you on a silver platter and you have no idea the patience,calm,and restrain I have to be about this. I didnt at first know what to make of the technical issues I was experiencing with my phone but then I realized ok…,this isnt some freak happenings so I have been doing my homework and reseach and im keeping my mouth shut because they mesed with the wrong chick and im just going to keep letting them all hang themselves! I must admit Im pretty damn good at this P.I. /sherlockholmes extra curricular activity I am involved in.

Reply

Id like to know what happened

From Kim Masterson-curci on May 26, 2015 :: 10:30 pm

I get so many emails I would probably miss it if you emailed me.  Maybe you know a way to communicate. Maybe thru facebook but I usually ignore random friend requests.  Im curious to know what happened.  I have some weird stuff too going on a while….like 6 years or more years now.

Reply

Ive owned a samsumg 3

From G on June 20, 2019 :: 12:22 am

Belive me i bought a samsung for $600 when they first came out on market and hun let me tell you !!!! THAT PHONE WAS SMARTER THAN ME!!!! IT HAD SOOOO MANY OPTIONS!!!The things it can could do were endless! I thought someone mwas hacking me too but the phone does so much and if you dont understand what your doing and touch a button your cell phone world will b upside down while leaving you with no clue lol

Reply

Cell phone security

From Dr. Bill(DrFootball) on March 30, 2012 :: 12:53 pm

Always amazed at the # of responses to this topic! “Obtaining Law enforcement assistance” only works if we assume that were not the target of a police investigation or federal investigation. Lots of folks use their mobile phones to shop, thereby opening themselves up to identity theft….(Speaking as a former U.S. Amy officer with time in “Special Operations”) I’m very careful how and where I shop on-line…everyone has to be…

Reply

spy

From Rob Ratliff on January 17, 2021 :: 8:13 pm

the cops wont do shit..there dirty cop buddies are behind alot of It ..If you get disability ssi anything ..they use your phone to stalk you..they pull up to your house at 2am point this cell gun they have and grab all the numbers from that house and they got you….(solution)put a vpn on it and fake gps location pro .you can say your in vegas if you want.they still will listen to all your calls and text ...download a text app and use it instead..they will still get your calls.

Reply

Read More Comments: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Newsletter Archive
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.