Tech Made Simple

Hot Topics: CES 2020 | Browse the Web Anonymously | Complete Guide to Facebook Privacy | How to Block Spam Calls

Use It

author photo

Is Someone Spying on Your Phone?

by on March 30, 2012
in Phones and Mobile, Cell Phones, Tips & How-Tos, Privacy :: 771 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

[Editor's note 2/9/17: Since this article was written five years ago, many new phone hacking methods have been developed and/or discovered. We've created a new article to cover those various hacks in our new story: How to Tell if Your Phone Has Been Hacked. Please go there for the latest information. We're keeping this story active for the issues and useful advice contained in the comments.]

You probably know there are plenty of apps you can install on your smartphone to track its location in case it gets lost or stolen. Apple's “Find My iPhone” is one good one and many security apps, such as AVG Mobilation, can track down a phone in seconds.

But what if someone else is tracking you? Is there any chance your boss or spouse could be spying on everything you do on your phone?

It’s easy to do. Spy apps are plentiful and can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call and what photos and videos you shoot. The problem is these apps are difficult to detect and run invisibly in the background.

I decided to track my son and installed an app on his phone called Phone Control by Laucass (free on Google Play). Of course, secretly intercepting electronic communications without the person's knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.

Every day I receive emails that indicate my son’s location as he’s using his phone out in the world. I can click on those links in my email to see via Google Maps where he is (although I very rarely do). I could also set up the app to send me data about everything else he’s doing on his phone, but that’s not something I personally need—or want—to do.

Signs your phone may have been compromised

Someone borrowed or took your phone

I had to have my son’s phone in hand to install Android Phone Control. Once activated, however, there’s no icon in the application launcher. The app shows up with the name “Android System” in the applications manager so it doesn’t look suspicious. If you think someone could do something like this when you’re not paying attention or asleep, secure your phone with a passcode that isn’t easy to guess.

(Editor's Note 9/26/12: To confirm you have the spyware and not a standard Android app by the same name, follow these steps to open the spy app (dial the phone number.)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for more detail on 9 of the most common spyware programs and how to detect them.)

(Editor's Note 12/16/14 (Josh Kirschner): In some of my comments below, I noted the unlikelihood of spying on iPhones that were not jailbroken. However, since many of those comments were made, certain holes were identified in iOS that exploit the iPhone's connection to trusted networks and devices to allow someone with access to the network or device to download significant amounts of personal data. Jailbreaking the iPhone was not required. Fortunately, those holes have been patched in iOS 8. For more information, see:]

Your phone is acting weirdly

Taking forever to shut off, lighting up for no reason, suddenly getting much shorter battery life or running hot when you’re not using it may indicate hidden processes are running in the background.

Your data usage skyrockets for no reason

This could be because your phone is checking in with someone else, using GPS and sending them text messages or emails that communicate where you are and what you’re doing.

What to do if you suspect your phone's being monitored

The best thing to do is perform a factory reset, which you can find as an option in your phone’s settings. Know, however, that in doing so you will lose all data stored on your phone, so back it up first.

If you’re using Apple iCloud or Android 4.0, items like your contacts, photos and music are automatically synced and saved in the cloud. But if you have an older phone, you’ll want to make sure to export your contacts before doing a factory reset. There are various ways to do this depending on what phone you’re using and which operating system it’s running. If you’re not sure, get help from your cellular provider; they can make sure to retain your contacts and other important data during a factory reset.

You'll then want to use a strong passcode to prevent unauthorized access to your device. For Android devices, you can also install an app, like AppNotifier (free on Google Play), that will email you when programs are loaded onto your phone.

(Editor's Note 9/26/12: See our updated recommendations for Android antimalware solutions)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for our latest recommendations on how to protect yourself.)

You'll then have to tackle the issue of who's doing the monitoring. Keep in mind that if your device was issued by your company or is authorized to access your company's email and other data services, you may have given your consent as part of your employment contract or when access was data access was granted.

Discussion loading


Cell Phone Debugging for the Average Person

From Kevin D. Murray on March 30, 2012 :: 9:39 am

I consult on eavesdropping and privacy for business and government clients. Your advice on detecting spyware is very accurate. Thank you for getting the word out.

For those who want a more scientific test (that the average person can simply preform), I created one for my clients and eventually put it into book form, “Is My Cell Phone Bugged?”

Unfortunately, just testing for spyware is treating the symptom rather than the disease. There are other steps which must be taken first to successfully retake one’s privacy.

The root of the snooping problem is the snoop; not the spyware, bug or wiretap.

Even if you find spyware and reset the phone, the snoop remains free to spy again; more covertly now they know you are suspicious; and, using a variety of other methods as well.

The key to treating the disease is linking the criminal to the crime, first. This is part of the scientific test procedure.



suggestions please

From Me on May 02, 2012 :: 3:56 am

Kevin you defintely understand, and its a relief for people like me to know there are people like you who see and want to help. My problem is my resources are limited and I am not that tech savey. I suppose thats why they are able to mess with me. How does my phone end up being a speaker when its off. This past year I have bought over 20 burn phones.  I try to not let my number out but they get it? Advice please



same problem i have my phone bugged just about every weekend with out fail and yep :( iv been throug

From dolmio on October 21, 2012 :: 8:51 pm

hey guys…..sooo whats the best solution to people bugging our phones/smartphones…... i see and realized a while ago the best and most approachable way is to find the criminal that done the crime and thats correct, i ant no police/goverment fan but this is pure nonsense with bugging peoples personal devices, iv forgot to mention some of us pay top dollar for out smartphone and tablets and in the end all we want to or should do is get rid off it as there seems to be no easy sollution???? apart from parents with kids thats acceptable to a certain aeo but still i think there needs t… is there a program for iphones and ipads to give them a 0 im infected or a 0 all good?..... iv never seen or heard if such a program i could run on my pcor device to test or all these new modern warfare technology…....chees Damo:D




From Julia on November 18, 2012 :: 5:57 pm



Come On

From Best Phone Arena on December 14, 2014 :: 10:11 pm

Come On



From vibrant77 on July 01, 2012 :: 7:25 pm

I recently discovered I may have been a victim if illegal invasion of privacy by an ex friend who did have access to my phone when I visited their house last year. But, how do I go about prosecuting, and proving they did it?Its easier said than done



want to hear more

From dan mata on April 05, 2015 :: 11:02 am

I’d love to discuss this. Topic with you and hear about your story n how you took care of it and was able to prosciutto’s very sad n well scary that people would even want to do something like’s an invasion of privacy…I just used to think I was going nuts lol but I stuck to my guns n I kno n they kno I kno , but what can I do about it…that’s where u come in ..thank u and I hope to hear from u soon ..




Invasion of privacy and stolen lot of my music that has not been put on my name cause its not finish

From Daniel ibarra on October 22, 2018 :: 3:39 am

Sso it started with a pop up out of nowhere showed and displayed alot of people from youtube not the young adults but experienced music producees movie makers you name it then my screen back to what i was doing i started getting bullied :v the donkey siper.Xd refered to me.ive tried sending facebook messages that i was having issues they used memes so their responds nothing wrong here stated telling family and friends they didnt bother so i said f..everybody and took them on my self. Then that peeson poped out when i was home on my laptop i didnt have it on internet cause my friend gave me reason and i wasnt legit so i was afraid of it connecting and them noticing guilty conscious i guess pop up question you want to start youtube channel thought about it then i said ok show me a license agreement then were gonna send you files to laptop whata f..i never told them i had laptop got the program going but just seemed stupid so i neede 3d glasses tried getting a hold of someone from you tube it was a dead end no connection to anybody who even sent that to me so i make it. Short 2 yrs of this hacking my laptop programs on apps from schools to reddit istagram tweeter i was like the whole of music artist didnt know if some had faked all this by now my head is f..up from all the bull dont know what to beleive i couldnt even beleive the crab they were posting like id i was some d..animal no fuking respect i felt google was playing my ass to jerks.unless they were using fake pages but i dont think cause some one was like guiding me through my phone lije showing me my way around things everytime i made an account couldnt get bacck in make a new ones so here i am gave up fighting them now i just glide with them coming hard with my beats now it was like back when i first started adreline rush when you got that rythem to the now you know aka.Lok od .Icubalanced int. Also text radio dont know what staion but im on rasio everytime i work on my music jerks are getting my training for free.Peace.


Erase the phone!

From Stacy on April 08, 2015 :: 8:34 am

I guess the optimal solution for you would be to hard-reset your phone. This will definitely erase all spyware from it, and cut this dataa-transferring channel down. Moreover, you won’t have to argue with potential hacker.



hard reset isnt enough

From Ayyub on May 24, 2015 :: 10:15 am

You can do a hard reset but most havks are done by email or by sending an encrypted text or mms message usually with a pic. So if you do a reset and then sign back into your phone with the same email then youre hacked again and backing up data on to a cloud app or agent will also get your phone hacked again because iyou are backing up everything even the virus so once you restore you phone you restored the virus. 9 times out of ten the person hacking you is some one you know. There is no security software that is 100% accurate its all bogus and a way just to take your money plus most security apps do the hacking because of all the permissions you give them so they can so call check to see if you are hacked. Its an industry people. They get paid to fix what they themselves have sabotaged. Businesses now sucker the people into buying junk a damaged goods. Then you pay them to fix it. Its all scandalous business. Android has yet to fix its security holes and its been almost 20 years that they’ve known about their weak security. These companies create shit like cloud and bluetooth and so called smart share all of which consits of you having to save personal data and images and other information on outside servers which who ever controls that server has access to. No one is too be trusted no matter what the promise is.  Man is easily corrupted and I trust no living human. Because anyone can be corrupt or can get corrupt with the right offering.


Yea, but I've re-set another

From ted on December 27, 2015 :: 7:07 am

Yea, but I’ve re-set another phone and lost everything. Backing up didn’t help. I couldn’t retrieve. I need to find a good block instead.


Questions about cloud and I'm getting information that's actually important

From Karen L Aubuchon on October 07, 2019 :: 6:43 am

Almost 5 or 6 years ago I went to AT&t many times and nobody can find a problem but my phone kept searching and searching and finally one lady got a hold of my phone and told me that died phone was definitely the problem and I needed to erase everything so we did I kept having the same problems I wasn’t getting my clients calls they weren’t getting mine so forth everything was going downhill for me along with fraud insurance that didn’t get process correctly so forth I contacted someone about the fraud it didn’t get anywhere here in my state… Since the contact things have happened around here and I’m receiving things in my cloud that are nothing I would know about and there is it’s information that could be important to me or is important to me including things that I would not think that they would even know about but it’s actually information that I would need so maybe it’s not always so bad if your phone is being spied on so I’d like to know information on how to find out where your stuff is coming from that gets on your cloud if you are not the one that’s putting it in there I hadn’t even signed up for cloud and I got all this information. I don’t know what to do with it so I need some help . Thanks


Same Problem here

From Khan89 on November 25, 2016 :: 2:35 pm

I am also undergoing the same problem and it is pretty traumatic and soul breaking that people know my personal stuff and I cant do shit about that.


If there's a few security

From Trinidy Johnson on June 29, 2018 :: 7:31 pm

If there’s a few security holes in the operating system that’s fine as long as they keep it open source Network…. iOS is closed source and you hear about iPhones and iPads getting hacked all the time…. but yes in the majority of the cases the same people who give you the virus are the ones that turn around and sell you the antivirus…..sounds like a good rackit



From Caren on August 13, 2012 :: 9:09 pm

I need help. ok, so heres how the story goes. One day a man came to my door and claims my husband of 20 years is seeing his girlfriend. I looked on his cell bill and he was getting alot of blocked calls. This also happened while I was in the truck with him and he would not answer.So I secretly placed a block on his cell and now no more blocked calls can come thru. The very next day he began calling this number 931-315-9988. I tried to search this number but nothing. about ten times a day he dials this number.I tried to call it but I cannot get thru. I have had about four other people try, they cannot get thru. But My husband continues to call this number daily. Can you call a number but it be blocked to all other phones? Could he be spying on me? Could it be a calling card? What is this crazy number that only he can call?



You should....

From Lucy on October 14, 2012 :: 12:09 pm

Why don’t you track your husband using GPS on his phone?. This way you would have tangible proof of what’s going on?. Because at this point there is only what that man at your doorstep said. I also suggest check his credit cards statements, bank accounts, receipts. That ougth to give you a clue of what’s goin on?.  I truly hope is something else for your own good.



HELP From Caren on August 13, 2012 :: 9:09 pm

From Me on November 17, 2012 :: 11:57 pm

Hello Caren. Blocked calls are exactly that. You can manage blocked calls. You can also White list a number. meaning you can Block all calls except who you want. In the age of digital options are only a click away. I get telemarketer calls all hours of the night and day. I put them in a Telemarketers Contact. then I click Block ALL calls for these numbers. This is an option of Android not iPhone. There are apps to do this. however, You can create a contact called BLOCKED. It’s the name of someone, not the actual Caller ID.




From G on June 19, 2019 :: 11:14 pm

This would probably be the one time that I would believe a stranger



Icloud issues

From Caliallye on April 29, 2015 :: 11:05 pm

We discovered that all son #2 had to do is borrow the phone and ask to play a game or download an ap that he had purchases on his mom’s phone. Once signed into the ap store in his name, the icloud changed as well. The phone was set to bavk up automatically.
All his mother had to do was download the phone backup from the son’s icloud, to which ahe had access, to play havoc with phones, bank accounts, facebook, etc.
Is there a way to keep someone from signing into another itunes account while using your phone?



Signing into iTunes with a

From Suzanne Kantra on April 30, 2015 :: 10:55 am

Signing into iTunes with a different Apple ID shouldn’t change the Apple ID associated with the device’s iCloud account (see this documenation from Apple And, when you sign out of an icloud account on a device, all of the documents and data that were stored with the original iCloud account are deleted from the device. So I’m guessing something else is going on here. Do you have a Family account ( that includes your son’s Apple ID? That would provide access to a lot of shared info.


Thank you

From Melissa Woods on February 07, 2017 :: 12:56 pm

So how do you recognize whom is doing and in control of the family settings cause I’m exhausted from this and the amount of money is outrageous it’s makes me sick


Spyware on Cellphones

From Gia Salvatore on October 04, 2016 :: 8:02 pm

No one needs access to your cellphone just like your home computer.

I’ve looked up surveillance cases in my state of Texas. And visited with an owner of a spyware store.

You can pay $300 for a kit.
You download it. And send the person a text or email.

Once they’ve responded the hook from the spyware takes permanent hold of your IPS.

Dirty lawyers get away with this stating its in protection of the child



Spyware on cell phones

From Nan on January 30, 2017 :: 12:14 pm

Gia Salvatore,
Can you elaborate on how dirty lawyers spy on cell phones with hidden apps and can they use this to talk to judges behind closed doors to win a case?

Curious, because I’ve been hacked by my ex and his wife who is an IT web developer and it guru. I’m not tech savvy and been dealing with a master Narcissist who knows how to fool and charm even his own lawyer.

Need help proving the hacks. Or I’ll never be free of his control.. his fixed on controlling me even after remarriage.. he uses new wife to do it. Trust me I’m not crazy, just exhausted from the invasions and no proof.



Thank God I'm not the only one.

From Rich on July 09, 2019 :: 11:51 pm

Amazing that someone is going thru same as I. This woman has stalked me and tracked me and all else. After 8 years with a narcissist crazy compulsive liar,cheater, ect, my sick ex takes off with some other myserable idiot( who has no clue what they’re in for) used her victim stories to get her IT trained co-workers to help her and helped make me realize that their are some pitiful sick soulless filth in this world that are so sick and so full of drama they waste their personal time stalking people. How sad. It used to piss me off so much,but I found one way to get a little payback. I thought it was over but I’m seeing things again that gives away clues that it’s her even though she found someone and disappeared 2 years ago. Sadly, they say sick warped people like her and other narcist never loved you, it was all their sick little warped fantasy world, but they always will think they owned you and you are three possession. Long story short, I know exactly what your talking about. Couldn’t even sit on the toilet without having to tape the cameras over so her sickness wouldn’t be taking pictures. God help that woman. I’ve seen tablets do some amazing things that even a policeman said he was an IT guy previous and it wasn’t pssible. What wasn’t possible was him telling the truth coz he was no computer expert and seemed to know less than I who knows very little. And the IT pros are learning more everyday. God help us all when the robot Sylvia or whatever is synced with every other PC and phone and robot in the world, and yes, they are mass producing robots in china, so that means soon they will be like cars. Everywhere, except cars can’t repair themselves.I really never think about crap like that but maybe it’s time to start.


Spyware options

From Nicholas Delgadillo on March 13, 2017 :: 3:13 am

Hi there you had mentioned in one of your previous statements that you had visited a spyware store a surveillance store and you can pay for a kit for $300 and which would you would send your target text or an email in a soon as they answered it it would it would attach itself permanently to the right To their IPS!  Well well can I ask what some of those App Store kits would be colder where can I find an option list of all those kind of things that I can choose from or can you give me some suggestions on what side so I can look up to find these I’m curious and looking into this myself at this time



spying all the way and noone did a thing!!!!!!!

From not a joke and words could not describe on December 08, 2016 :: 9:58 pm

Please someone here help me out please!!!!        I need every tech app spyware and more help from someone who knows spyware its self and can help me because no one will help need someone who can help its the fact that it has been over 3years? please help I need, anyone who knows anything would be great!!!



So ironic!!

From Ulio on April 30, 2017 :: 1:59 am

My girlfriend and I have went through this same situation. I was the one playing with her phone first but never spyware. She on the other hand went all the way with it thus making my life a living hell. These types of things can really destroy a Relationship. Wish now that I never mistrusted her like I did. Doesn’t seem to be getting any better either. Hoping that maybe she will come to see things in a better light.



I want the person responsible

From Quentin on January 05, 2017 :: 3:17 pm

Hi, I like your article. My question is, how do I trace the spyware back to the person or persons doing it? I have spoken with the local DAs office and they’ll file charges if I give them the person on a silver platter. They want facts. I know my son is one of the people doing this to me.



we all want smethg i

From Rose on June 19, 2017 :: 2:49 am

so u want some1 responsable
& I want a million dollars



Wish in one hand the other ur still getiing shit on your hand either way

From Samyaza grigori on May 05, 2018 :: 6:57 pm

Ur not worthy of a milkion dollars or the unicerse would give u what u desire u get what u put out if people have made u loose trust an ur paranoid all ur gonna get manifested in your life are more sittuations like this change ur PRECEPTION change th 🎮


How do I find proof

From Trista on June 20, 2017 :: 3:43 pm

I need a step by step way to find proof of who is doing this.




From alone&scared; on March 25, 2018 :: 4:14 am

Someone is hacking my Windows Lumia phone. They know EVERYTHING I do & EVERYWHERE I go. I have no one I can trust to help me figure out who it is. They mess with my internet and all sorts of things. People would think I were crazy if I told all. They probably know about this too. Oh well.I’m really scared and I need some help.




From Desiree on June 11, 2018 :: 12:21 am

How could I link them to it?



Cell Phone Debugging

From Carol on March 30, 2012 :: 10:10 am

Can the cheap dollar store cell phones be bugged?  As far as I know they do not have a GPS or WiFi.
Just a note:  You can know who the criminal is but getting the law onto him is another matter entirely—the law will not work for you if you are a woman and it is your ex-husband or soon to be ex who is doing the bugging.  I know this from experience.



Cell Phone Debugging for the Average Person

From Kevin D. Murray on March 30, 2012 :: 10:26 am

Hi Carol,

You are correct about obtaining law enforcement assistance. This is why it is imperative that the case be handed to them on a silver platter. It can be difficult, but it can usually be accomplished.

If criminal prosecution isn’t successful, an attorney who is given enough information to work with can advise on the the state and federal civil remedies available.

The goal is to stomp on the snoops toes and show them you mean business. Just initiating a case (with good evidence) usually dissuades all but the mentally ill category snoops.

On the cheap cell phone question. Right again! Only smart phones have the brains to remember and execute spyware. The dumb phones don’t tell tales.




From Brooke McManus on March 19, 2014 :: 12:44 am

I am absolutely thrilled to have randomly came across this site! I previously wrote and in great detail gave an overview of the technical difficulties ive been experiencing since day one with my samsung galaxy s3. It was mentioned to let them hand it to you on a silver platter and you have no idea the patience,calm,and restrain I have to be about this. I didnt at first know what to make of the technical issues I was experiencing with my phone but then I realized ok…,this isnt some freak happenings so I have been doing my homework and reseach and im keeping my mouth shut because they mesed with the wrong chick and im just going to keep letting them all hang themselves! I must admit Im pretty damn good at this P.I. /sherlockholmes extra curricular activity I am involved in.


Id like to know what happened

From Kim Masterson-curci on May 26, 2015 :: 9:30 pm

I get so many emails I would probably miss it if you emailed me.  Maybe you know a way to communicate. Maybe thru facebook but I usually ignore random friend requests.  Im curious to know what happened.  I have some weird stuff too going on a while….like 6 years or more years now.



Ive owned a samsumg 3

From G on June 19, 2019 :: 11:22 pm

Belive me i bought a samsung for $600 when they first came out on market and hun let me tell you !!!! THAT PHONE WAS SMARTER THAN ME!!!! IT HAD SOOOO MANY OPTIONS!!!The things it can could do were endless! I thought someone mwas hacking me too but the phone does so much and if you dont understand what your doing and touch a button your cell phone world will b upside down while leaving you with no clue lol



Cell phone security

From Dr. Bill(DrFootball) on March 30, 2012 :: 11:53 am

Always amazed at the # of responses to this topic! “Obtaining Law enforcement assistance” only works if we assume that were not the target of a police investigation or federal investigation. Lots of folks use their mobile phones to shop, thereby opening themselves up to identity theft….(Speaking as a former U.S. Amy officer with time in “Special Operations”) I’m very careful how and where I shop on-line…everyone has to be…




From elizabeth on March 31, 2012 :: 10:19 pm

I was given a phone last week to review.  I just read your article, looked at the apps and there it was.  I was stunned.  I did the factory reset.  But since they gave me the phone, could they just reinstall it?  What’s to prevent that from happening again?  Of course, I’m no longer doing anything serious on the phone.  The opposite of what they expect from a reviewer.  Duh.



Looked at your app's?

From Nicholas Delgadillo on March 13, 2017 :: 3:21 am

I just inch quick general question but you said when you were given a phone do you happen to look at the apps and there it was you noticed a spyware app right there and then and you’re wondering if by doing a factory reset on your phone could it just be reinstalled later on I don’t know how to answer that but my question is what app did you notice that caught your attention of being a spyware app what was the app called ?




From mzdf on April 28, 2012 :: 11:37 pm

you speak of androids other phones..but you don’t mention iPhones directly how they can be infiltrated,stalked,bugged..and what other apps apply to the iPhone..just wondering since I have an iPhone..and what do I look for..what I can use. I would like to obtain a app for my son’s iPhone, but I won’t want one on my mine by someone else.



You're 99.9% likely fine

From Rukkuz on June 24, 2016 :: 3:44 am

Iphones are more safe from this kind of malware due to the fact that they cannot install apps from outside of the itunes store, unless the phone’s jailbroken :D




From apksecurity on March 05, 2017 :: 6:13 am

Yes. But if Iphones are jailbroken, then there is a great possibility of being hacked. One must confirm whether his iPhone is jailbroken or not.



You gotta catch em

From Me on May 02, 2012 :: 3:50 am

It’s really a problem for some people, speaking personally. It takes 1 psycho to damage you life. You correct when it comes to reporting to the police, they look at you as if you were the crazy 1. Spending money you don’t have changing numbers is not the way to stop it.  You gota catch the person doing it. The only way is to figure out who and beat them at their own game.  Any suggestions please let me know, these people need to stop. With all the apps and tech their has to be something. Something that doesn’t cost.  People who do stuff like that should not be allowed to have the privledge of having a cell phone or computer for 2 to 3 years.



Cell Phone Debugging

From Carol on May 02, 2012 :: 11:15 am

We found out how the shady ex kept finding a cell phone number, Day Care.  This particular couple has a child in day care and they were giving the phone number to the daddy. Everytime momma would change her phone and number, she would give it to day care (naturally) and daddy would ask for it and recieved it.  That has been stopped. 
It’s odd though, the law has to have a subpeona to tap your phone but some crazy person, such as the ex that I mentioned, can get the same information easily.  Something is wrong there.



No. The law NO LONGER

From Dlori on September 10, 2012 :: 10:54 am

No. The law NO LONGER needs a subpoena to tap your phone, your computer, find out what you read at the library, etc. We have no 4th Amendment rights anymore. For those who think the patriot act no longer exists or that it only applies to “Terrorists”, think again. Do your research.



Hes right

From Samyaza grigori on May 05, 2018 :: 7:09 pm

ANYand EVERY 1 from a governmental standpoint considers any individual who goes against the status quo to be a theeat any an every1 is now the target of a gorge Orwellian 1984 type of thoufht process

All the government or other agencies have to have is a “suspicion” an. Boom. I mean lookvat the see somthing say somthing initiatives,using peoples paranoias an racial bias to profile a “terrorist” or a “threat” simply by telling people if they look like there doing bad they are.Seen on tons of billboards it first statmrted happening in new york an d.c on bus an train lines the see somthing suspicious tell some1. And that’s where the the bias in people’s paranoia comes into play cuz you know you see somebody that has a turbine in your you know specifically may be racist because of 9/11 so now they’re being watched by the police or the government agency all because you’re paranoid ass said they’re a f****** terrorist and it couldn’t probably be further from the truth or just going to mosque you moron or to blow up a children’s school but you know you don’t know you can’t govern thoughts you can’t tell people you can’t have that thought or you know it’s 1984 get up on your new speak



A real problem nowadays

From Peter on June 03, 2012 :: 2:39 pm

Cellphone spying is a real problem nowadays. Today I found an Android App, which scans the device, detects the well-known spywares and also shows warnings when there are any apps that have suspicious permissions. The last one is really nice if you have any modified app with undetectable package name. Check the:

Anyone knows something like that for iPhones ?



7 phones ruined

From Joyce Dowling on June 17, 2012 :: 6:49 pm

My sister has been a victim of cell phone hacking. We know the man lives in India she met him on a chat line. No one can seem to stop him. The minute a phone enters her house he attacks it. We tried TMobile IPhone and 3 prepaid phones.One was not even in her name.
We can not figure out how he is doing this,he has never been in this country.
He takes over the phones and even seems to use them with battery out. We tried special bags purchased on internet to block cell phone signals.
She just wants a phone to keep in her car for an emergency. This maniac is stopping her.
Does anyone have any suggestions. We tried the police even US Cybercrime unit.



Can you provide more details

From Suzanne Kantra on June 18, 2012 :: 6:45 am

Can you provide more details on how he “attacks” the phones? What is happening that makes you think he has access and how do you know it is this guy in India who is doing it? I suspect something else is going on.



Re More Information

From Joyce Dowling on June 18, 2012 :: 8:40 am

My sister met this man from India on a chat line. When she realized he was strange she told him she no longer wanted to continue the conversations. He said I will never let you go. It was at that time all the contacts were removed from her phone . It was an Android phone the Apps went missing.She kept getting Text messages from him saying he was never going away. He put some sort of passcode on the phone so she was unable to dial out.
She returned this phone got a new one with a new phone number but he still got in it and placed the same locks on it. He was using the data himself and made 89 dollars worth of international phone calls that T Mobile said they can prove came from her sym card. They say it is impossible to hack their phones. The same thing happened with a verizon Iphone. The phone has never been out of her sight she has no ex husband or old boyfriend that might be doing this.
We even tried 3 different prepaid phones one which we did not even bring in her house I activated it at my hose 20 miles away. She used it 5 miles from home and he got in it.He prevented her from setting up the voice mail changed the pass code and did not allow her to send a text.
I dont know how any of this is possible. In my research I see you can by a program that will do these things but you have to know the persons phone number. We keep changing it. How could he possibly get it so quickly? The police have never heard of this. I reported him via email to Meerut police in India. He texted her and said so you turned me in to the police? I told them come to my house. This of course was impossible as we only know his phone number not his address.



Some of the things you're

From Suzanne Kantra on June 18, 2012 :: 9:55 am

Some of the things you’re describing don’t sound possible. I’m curious whether those international calls were made from India or from your home town (should be easy to tell from your phone statement).

However, if I had to make an educated guess, I would say the problem lies with your devices, not your sister’s. If your PC/email/phone were hacked, someone may be pulling down your sister’s new phone numbers from your address book or emails. That would also explain how this person may have known you emailed the Meerut police and gets access to her new phones so quickly.

I recommend that both you and your sister run Malwarebytes on your computers (download the free version here: and follow these instructions for what to do when you email gets hacked: Also, download a copy of Lookout Security or another mobile security app if you’re using Android (your phone being hacked is probably the least likely scenario, but best to be sure). And to state the obvious, make sure you’re using new passwords for the new phones and DON’T email them to each other.

Let me know what you discover.


Joyce Dowling the way the

From MyDogIsSmarterThanMe on January 11, 2014 :: 6:21 am

Joyce Dowling the way the phone is being “Hacked” is both via the SIM Card ICCID # *and* the IMEI
# Number.

IMEI = International Mobile Equipment Identity and is a unique number given to every single mobile phone

ICCID =A SIM card contains its unique serial number

Unfortunately, what you need to do is *LITERALLY* start over from the very beginning.

Pretend you never had a phone before and throw away the “Hacked One” it’s “dead forever”

The IMEI# on a cell phone is equivalent to your SSN# every single phone has it’s own IMEI#

Also, unfortunately, this number provides further details about you, the owner. There’s sites all over the web,

“Verify the Owner of the IMEI#”

The only “TRUE NEED” for this (to look up) is if you were purchasing a phone off E-Bay,etc. You can use that to see

if it’s really the phone and really the name of the person selling the phone selling to you

If the phone has been reported stolen, you’ll *typically* find here, *HOWEVER* when purchasing a phone off E-Bay,

etc.  to be extra careful. because that IMEI# is unique, will provide you the Manufacturer Information,etc.

You can call the Manufacturer and verify it’s not been reported as stolen. They won’t provide any confidential

information, but they *SHOULD* at least tell you this. (Just tell them how your purchasing-why you’re verifying

To *HAVE* the Number and *NOT* asking for “Personal Info” they should be cooperative. (because unless hacked like

you’ve been, then no one should know this number.

So, that’s your solution. You need both a new Simcard and New Phone (throw the other in the trash)
(as if you try to sell, the new owner will have the same problem—thus not fair).


AS for “Wrong Charges”—what you were told is Horse Manure from some front line Agent that’s trained not to give

away Credits to accounts.

What you need to do is go into the Retail Store. Just tell someone you’ve been told to ask for a Manager regarding your phone being hacked (ie. vs. “May I speak to/who is)—because again, most people are trained not to get a Manager involved unless “Serious issue”—by saying “I was told to ask to speak to a manager because my phone was hacked and need a new one”.

Take with you your Past Bills that have charges that are incorrect.

+++++++THIS IS *VITAL++++++
When speaking with a Manager, consider them your *BEST FRIEND*—-*DO NOT* use this as a person to “Complain to” (EX-don’t say “YOUR COMPANY, this/that person would not do this/that. All those type words put a Manager in a “Defensive Capacity”—anything that sounds like you’re “Challenging” the decisions that have been made in the past. WELL, because S/he’s a Manager (and probably likes their job, it’s just “human nature” to want to defend the actions your company does.

Thus be VERY POSITIVE, MAKE SURE TO USE *POSITIVE WORDS*—-not kidding, even if you have to write a script and “Practice”—-because if you mess that up, then you’ll have to go to regional VP where you WILL MOST DEFINITELY have to be “Professional” or they’ll toss you to the curb.

Tell him/her I think I know my Problem. My phone was hacked, I’ve done research on the web, I need to have this phone completely turned off/disabled/as well as the SIM Card and get all new equipment.

He/She hears that—-MORE THAN WILLING TO HELP (You’re buying something)
THE REASON—you don’t have to go into what you’ve done in the past, they’ll say what’s your account info, pull up in the CPU and “Know”/“see” you’ve done stuff in the past.

*AGAIN* be sure to tell them (based on the Internet Research) you think (because you downloaded a Rogue App) the person was able to obtain your IMEI and ICCID numbers.

Again, by using that terminology, s/he can then say I bet she’s correct.

Then, when they start with a phone *BEFORE YOU PURCHASE*, *THEN* mention, also need to discuss with you the charges made by the person that hacked your phone/getting yhour credit.


Complaining/Getting “your way” is the art of “Finesse”. If the Store Manager cannot help. I will then show you how to get District and Regional V.P. Information—which *WILL* get you what you need but an ENTIRELY DIFFERENT WAY TO HANDLE




From James on January 02, 2015 :: 2:45 am

Hes using your wifi. Once any of those devices connect to the wifi,he gets in. Replace your wifi router. Its the home network he has access to. That my idea.


To Joyce Dowline

From Vic on August 17, 2015 :: 10:49 am

Reset your home wifi and change the wifi password.
Try this, might help.



Cyberstalking IS A CRIME!!!

From Yvette on December 14, 2019 :: 1:47 am

This ladies blog is so true.  I’ve been reading these for over an hour and I can so related to most..  having for every movement tracked your every call recorded to eavesdropped upon .  Extremely harassing.  Every mobile device has been attached, my WiFi, and my television carrier can’t get into my site because of this cyberstalking.  Please do me a favor and stop rehashing something we all know is going on; WHAT WE Need is Solutions to have this stopped.  No one should be able to bring this much grief, lack of privacy and unnecessary inflicted paranoia.  Please
Make some serious recommendations for company’s ego provide antispying and anti-cyberstalking help for victims to many Women and children and men get hurt because of this unwanted behavior.


Read More Comments: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Newsletter Archive
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.

site design: Juxtaprose