Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | REVIEW: RadMission 1 eBike

author photo

Is Someone Spying on Your Phone?

by on May 28, 2020
in Phones and Mobile, Cell Phones, Tips & How-Tos, Privacy :: 852 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

[Editor's note 5/28/2020: Since this article was written nine years ago, many new phone hacking methods have been developed and/or discovered. In addition, cell phone operating systems have evolved significantly. We've created a new article to cover those various hacks in our new story: How to Tell if Your Phone Has Been Hacked. Please go there for the latest information. We're keeping this story active for the issues and useful advice contained in the comments.]

You probably know there are plenty of apps you can install on your smartphone to track its location in case it gets lost or stolen. Apple's “Find My iPhone” is one good one and many security apps, such as AVG Mobilation, can track down a phone in seconds.

But what if someone else is tracking you? Is there any chance your boss or spouse could be spying on everything you do on your phone?

It’s easy to do. Spy apps are plentiful and can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call and what photos and videos you shoot. The problem is these apps are difficult to detect and run invisibly in the background.

I decided to track my son and installed an app on his phone called Phone Control by Laucass (free on Google Play). Of course, secretly intercepting electronic communications without the person's knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.

Every day I receive emails that indicate my son’s location as he’s using his phone out in the world. I can click on those links in my email to see via Google Maps where he is (although I very rarely do). I could also set up the app to send me data about everything else he’s doing on his phone, but that’s not something I personally need—or want—to do.

Signs your phone may have been compromised

Someone borrowed or took your phone

I had to have my son’s phone in hand to install Android Phone Control. Once activated, however, there’s no icon in the application launcher. The app shows up with the name “Android System” in the applications manager so it doesn’t look suspicious. If you think someone could do something like this when you’re not paying attention or asleep, secure your phone with a passcode that isn’t easy to guess.

(Editor's Note 9/26/12: To confirm you have the spyware and not a standard Android app by the same name, follow these steps to open the spy app (dial the phone number.)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for more detail on 9 of the most common spyware programs and how to detect them.)

(Editor's Note 12/16/14 (Josh Kirschner): In some of my comments below, I noted the unlikelihood of spying on iPhones that were not jailbroken. However, since many of those comments were made, certain holes were identified in iOS that exploit the iPhone's connection to trusted networks and devices to allow someone with access to the network or device to download significant amounts of personal data. Jailbreaking the iPhone was not required. Fortunately, those holes have been patched in iOS 8. For more information, see: http://www.zdziarski.com/blog/?p=3820]

Your phone is acting weirdly

Taking forever to shut off, lighting up for no reason, suddenly getting much shorter battery life or running hot when you’re not using it may indicate hidden processes are running in the background.

Your data usage skyrockets for no reason

This could be because your phone is checking in with someone else, using GPS and sending them text messages or emails that communicate where you are and what you’re doing.

What to do if you suspect your phone's being monitored

The best thing to do is perform a factory reset, which you can find as an option in your phone’s settings. Know, however, that in doing so you will lose all data stored on your phone, so back it up first.

If you’re using Apple iCloud or Android 4.0, items like your contacts, photos and music are automatically synced and saved in the cloud. But if you have an older phone, you’ll want to make sure to export your contacts before doing a factory reset. There are various ways to do this depending on what phone you’re using and which operating system it’s running. If you’re not sure, get help from your cellular provider; they can make sure to retain your contacts and other important data during a factory reset.

You'll then want to use a strong passcode to prevent unauthorized access to your device. For Android devices, you can also install an app, like AppNotifier (free on Google Play), that will email you when programs are loaded onto your phone.

(Editor's Note 9/26/12: See our updated recommendations for Android antimalware solutions)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for our latest recommendations on how to protect yourself.)

You'll then have to tackle the issue of who's doing the monitoring. Keep in mind that if your device was issued by your company or is authorized to access your company's email and other data services, you may have given your consent as part of your employment contract or when access was data access was granted.



Discussion loading

My wife and I have

From Francis on November 29, 2015 :: 3:00 pm

My wife and I have been being stalked for about 3 years now by someone who gets our text msgs, sees call logs and emails etc.  They text and call our phones and friends phones from the same number.  Is there a way to find out who it is? They are using a pinger number or some other fake number website. We have been to the police filed the reports but have been told nothing can be done about it.  Any suggestions.  I have looked and see now spyware on either phone

Reply

worst family, and city in the world

From andria thompson on December 03, 2015 :: 2:33 pm

My family is the worse family anyone can ever have.  My sister and my mother kidnapped my children and they expect ransom money from me and I don’t have it.  I was in California minding my own business when people there started saying some of the same things that my ex co-workers used to harass me about when I was working for that company.  I opened a sexual harassment case against so many of them:  Eric Millner, Anthony Beaucamp, Christy Scoggins, Matt, Brian Parks, Tonya Davy, etc. and now my sister (Antronette Malone) is involved.  For all I know she helped falsify the documents and forge the signatures.  I kept saying things about it via the internet media sights and then they plotted against me and took my children away because they wouldn’t even allow me to access my unemployment account to even be able to apply.  Kelly at the unemployment office lied and said the unemployment office denied my claim and I hadn’t even applied yet.  I have my evidence, but if I present it they will keep my children as ransom and I’m afraid for them.  I don’t want them hurt.  I’ve never had my children away from me for any length of time but due to this.  And you know my stupid mammy even helped and she never even gave me a chance to explain my sides of the story.  I hate them.  they lie all the time and I always find them credible, but no that’s how these tramps are, they always believe someone over me and then waited til I moved to try and help hack my shit.  I say that if the FBI does through your asses in jail along with the rest of them, good, because I don’t understand how you can hate the way you do and then expect me to come back and feel like you have my best interest at heart- you don’t and I never want to see your asses ever again.  If you’re looking for money I don’t have it.  I also called the Amber alert- national line to report my children kidnapped and they wouldn’t even take the case, I guess as usual black children don’t matter.  I guess when have to make room for the Sarahs and the Suzys and Billys and Micheals in this world.  I can’t give you any money, so they I guess will keep my children until I can pay up, what? I don’t know.  This situation is happening in Louisville, Kentucky as we speak.  Please send help if you have the man power to put these hackers to bed and get the FBI on their cases.

Reply

hacked or cloned

From Karen Roush on December 16, 2015 :: 10:32 pm

I recently moved out of an abusive home my husband and son cloned or hacked my phone and tablet so they can watch my every move I’m in danger please help

Reply

Hacker for hire

From Charlene Beckett on December 17, 2015 :: 9:49 pm

Are you in desperate need of hackers for hire? Do you need to keep a watchful eye on your spouse by gaining access to their emails, even constant updates on thier geo-location? As a parent it would help to know what your kids are up to on a daily basis on social networks ( which includes facebook, twitter , instagram, whatsapp, WeChat and others to make sure they’re not getting into trouble or up to anything mischievous? Whatever services you may require legal or illegal, Ranging from Bank Jobs, Flipping cash, Criminal records, DMV,  Taxes, if you are looking to get any hack espionage accomplished . need funds urgently ? need your grades changed ? thorough background check or Just Name it, We can guarantee to get the job done. We’re a group of professional hackers with 25 Years+ experience. Contact .(JavaScript must be enabled to view this email address) or text +1 813 379 2141.. Send an email and you are guaranteed a solution to whatever problem you have Its that easy,Do try us out today.

Reply

I am not able to

From Manu on December 20, 2015 :: 10:32 am

I am not able to change my iCloud password or my email address to which verifying questions hints are send…what should I do ??i need my privacy please help

Reply

been hacked by my ex

From David pledger on December 20, 2015 :: 10:50 pm

How do I stop her from being able to read all my stuff and she goes and rubs it in my face she can see all my email and all my bank information and I don’t no how to make it so she can’t do this she says all u got to have is someone telephone number and u can do whatever u want to me this needs to stop can anyone please help me

Reply

There's more to it than that

From Josh Kirschner on December 21, 2015 :: 3:20 pm

As I’ve said in past posts, I have yet to see any way of hacking a cell phone with just a phone number. That said, if you know someone’s number, it makes it easier to gain access to their accounts via social engineering means (i.e., tricking you into giving it up). Here is one example explained: http://thehackernews.com/2015/06/how-to-hack-email-account.html.

The best advice is to follow our tips for what to do when your email has beens hacked to ensure your ex doesn’t have access to your accounts: https://www.techlicious.com/tip/what-to-do-when-your-email-gets-hacked/.

Reply

What is this. ..

From Lora on December 22, 2015 :: 8:41 am

Hi,hopefully you can offer some insight.recently purchased a Samsung galaxy mobile from Walmart.com, prepaid no contact service.  I always check app permissions,  but these apps are pre-installed and can’t be uninstalled, they restart after I force stop them too. The calculator app has ALL permissions granted, andinfo says .secretcodeIME. also lots of strange unknown apps, (silentlogging, run sysscope, tcpdumpservice) are these all normal?

Reply

I have pre-installed apps on

From Anonymous on December 22, 2015 :: 8:49 am

I have pre-installed apps on my Samsung galaxy device im concerned about,  mainly the calculator app that has all permissions allowed and info says android.secretcodeIME..can’t uninstall. Is this normal?  Other odd apps too. (Tcpdumpservice, silent logging, mirror) what are these, they sound malicious

Reply

Hello can anyone tell me

From James on January 03, 2016 :: 4:39 am

Hello can anyone tell me how I can tell if my wife is looking at my Web searches I am on a plan with her with att and have a galaxy tab4

Reply

Abusiness ex

From V on January 16, 2016 :: 7:47 am

Hi,

I recently got rid of a tech nerd boyfriend who was rather abusive and controlling, he was very knowledgeable about phones and what not, esp androids. I have a note 4 and believe he as installed a Spyware on it while I was asleep. Please help, I am lightweight afraid for my safety.

Reply

Government can turn your phone remotely and you spy

From zeybaharsyah on January 23, 2016 :: 5:37 pm

http://womenneedtoknow.com In a recent interview that NBC had with Edward Snowden came out some interesting facts about mobile phones. Even when it’s off, you are not safe from the spying practices of governments.

We are gradually all be aware that telephone calls are monitored and that the content of e-mail and social media activities are widely collected by government agencies.
Most probably still be in the illusion that as long as you do not use your cell phone may happen much. Nothing could be further from the truth, according to Edward Snowden.
The US government has the ability to activate a mobile phone remotely and secretly turn on the microphone and the camera of the device.
It’s not just the US intelligence that can do this, but also the Russian, Chinese and any other service in the world that has access to a decent budget to purchase the necessary technical hardware and software.
Once you turn on your phone it is ‘them’. They can listen through the microphone on the camera and can take pictures of you and see what you’re doing via the built-in camera in the phone.
Now it’s not that they do this standard at all. It is based on suspicions they have with certain people, but they can do it on your phone if they so wished.
It goes a step further. If you think you’re safe with your phone does not turn on, forget it. According to Edward Snowden, they can even turn on a cell phone turned off. Just as apps on your phone and you can turn history into Google to search.
The only thing they have not remotely can replace the battery if you took it out of your device. That is the only sure method if you want to make sure you can not be spied on via your mobile phone.
Meanwhile, Edward Snowden is still stuck in Russia and he refuted accusations that he meanwhile, the Russians would work. “I have no relationship with the Russian government. I’ve never met the Russian president. I get no money from the Russian government. But, what really matters is that I am not a spy. “
“It was never my intention to end in Russia.” The reason he never has flown to Cuba to continue from there goes to South America because the US for this flight canceled his passport.
He says he would like to return to his homeland because he misses his family and friends and even, believe it or not, his old job.
John Kerry, the lying American Foreign Minister, this week proclaimed prankster of the week. He called Snowden last week a fugitive and called him to be a guy and come back to America, because he said, “If he cares so much for America and believes in America, he must also have confidence in the US justice system. ”

Reply

help

From sarah on January 30, 2016 :: 11:08 pm

okay so i got this text message from some random number sending me a phone tracker app link, but i never clicked the link, and i asked who it was, and how did they get my number… and ever since then my phone has been acting weird like someone is watching it, is that possible? even tho i didnt click the link.

Reply

how to track down a tracker

From carly on March 12, 2016 :: 7:43 pm

I need help… I am almost certain with the three months of research I have done, that I am being tracked/monitored on my cell phone. Unfortunately I can not get a new one, but really just want to know how I can track down and prove who the culprit is!!!
Yes I have reset it… but they have access due to the fact that he is my boyfriend. I do not want to set off any alarms till I have that one piece of undeniable proof. I am so close but just need to know exactly how I can trace it back to his phone or laptop. I think it has something to do with using a USB to connect one another via our shared WiFi network…. but… again…. thats why I’m here!!! Please help!!! I have become savvy enough to dig deeper than the regular person…. just not enough to catch him/ red handed.

Reply

Hi, I have a question.

From Christie on March 18, 2016 :: 5:38 pm

Hi, I have a question. I bought a flip phone and I pay month to month with Wind. I read in one of your earlier comments that someone could hack your phone if they find out your phone carrier’s web portal. Where is that information located? Would it be in the papers they give you after you purchase your phone, concerning your plan? And is it possible for my flip phone (on a month to month plan) to be hacked? Thank you very much in advance.

Reply

IMED the info on the box your phone came in

From Kim on June 28, 2016 :: 1:08 pm

We buy new phones and we think nothing of the package it came in. We toss it in the closet, a drawer the trash whatever. But there’s some valuable info there right in the box.  With the info on box and then knowing it’s a sprint or Verizon phone whichever they go online and can see who you call and even your messages and with the IMED they can clone your phone. For me it was that I texted more than talked on phone and my minutes on voice calls were very high. Also keep track of your data.  You’ll notice a lot of data use not yours.  You can go into setting and set your phone to not down load any third party apps. Also set your phone to not have apps working in the background. There’s an app that lets you take a picture of anyone trying to get into your phone.  Oh you can also go into settings and look at your web site your phones visited. There’s clues in that. Also see what’s used the most of your battery up.  Then WALK INTO THE CELL PHONE STORE AND TALK DIRECTLY TO THE MANAGER OF THE STORE AND TELL THEM YOU WANT A DIFFERENT phone!!  Virus and malware comes in emails and texts and bad websites. I got one from an email from my bank that wasn’t my bank. Looked just like it was from my bank. I had to get a brand new phone. Just be careful who you accept email and text messages from.  It’s creepy what technology can do these days. If you can imagine it then it’s out there.

Reply

Can he hack both my whatsapp and Imo account?

From Bernice Atefa on March 20, 2016 :: 8:32 am

My boyfriend is hacking my whatsapp account and he sees all that I do. I told him I also want to hack him so that i can also see what he does but he said I can’t hack him even if he showed how he did it because am in another country. My problem is, can he also hack my IMO account with what ever hackingtool he is using to hack my whatsapp? If he is indeed hacking my IMO, den how can I secure the account?

Reply

Sim Card

From shelly on March 20, 2016 :: 3:46 pm

my ex told me he had to use the upgrade on my phone so he could get a new one. he also said he had to use my sim card number, which the sim card is in my phone. is this possible, and if so, what information from my phone does he have access to with my sc number. also, i had a voice mail on my phone but could not retrieve it because it kept saying i was entering the wrong pin

Reply

Help!

From Marie on April 06, 2016 :: 12:15 pm

So I recently had someone text me and tell me to call this number: 714 707 3260 to get a verification code for them and text the code to them. I thought I was helping at the time so i did because this person said it was through their work company. After doing so, however, I looked up the website and I am now concerned that someone could get personal information from me. Any suggestions?

Reply

Yes, that could be a real problem

From Josh Kirschner on May 04, 2016 :: 9:19 am

The number seems to be from an account verification service that “may” be used by LinkedIn, Microsoft and others for two factor identification of account changes. However, no one should be texting you to ask you for this code. If you haven’t already, I would suggest changing your login info for your email, Facebook and other main social accounts. And follow these steps for what to do when your email has been hacked, just in case: https://www.techlicious.com/tip/what-to-do-when-your-email-gets-hacked/

Reply

TI'm in the same position

From Kelly Babela on April 08, 2016 :: 1:24 pm

TI’m in the same position chick the other day in front of my house I picked up my boyfriend’s phone call on his Bluetooth that he was having with some other woman now he wasn’t even on his phone he didn’t have in his hand I don’t see any earpiece and I don’t know how he’s doing it but I know now for a fact I’m not crazy and he is doing it so if you have any suggestions on how I could figure this one out I’ll try to help you with yours

Reply

the other day someone pulled

From Kelly Babela on April 08, 2016 :: 1:26 pm

the other day someone pulled up in front of my house and it picked up my boyfriend’s phone call with their Bluetooth he was having someone else..no he didn’t have his phone or an earpiece so I don’t know how he was doing it maybe you might have a suggestion

Reply

scared

From chai on April 20, 2016 :: 2:00 am

My family gave me a cell phone. I was aware they may be tracking me but now I am afraid they can listen to my calls. I have said some incriminating things.

Reply

Hey does the laucass get erased when factory reset?

From Vanessa on June 01, 2016 :: 7:00 pm

So I’m just wondering, does the app like attach itself to your email or the hard drive on your phone? Can it really be 100% removed by a factory reset? I’ve been thinking my phone is spied on and I’ve factory reset it but I still feel like my messages are read, and my Google Search is being spied on too.how do I remove it or any other spy app 100%never to return unless they have my phone again?

Reply

Cloned?

From Babygirl on June 17, 2016 :: 7:06 pm

I know my phone has been compromised. To what extent, idk. The evidence of “something” is overwhelming! My first question is what about my sim card? Micro chip? Phone number? Will rooting the phone fix the issue(s)? AND MORE IMPORTANTLY!!! Can I catch the SOB(S)?!...

Reply

Scared!!!

From Marie on June 23, 2016 :: 6:51 am

English isn’t my first language, and I’m sorry for mistakes.
Lately, I’ve experienced many strange things on my Mac and my phone as well. According to the login history on my Mac, it looks like someone has been using it without my permission 4 times in the past 3 months. I don’t know how they did it because my Mac is always in my bedroom, and I never use it elsewhere at my college (I’m 20 btw). That’s why I wonder if someone could be spying on my Mac. The webcam has turned on by itself twice, and my colleagues know things I only have mentioned on the internet and on my phone during conversations. My phone makes weird noises when I’m not using it, and sometimes I hear beeping sound when I make a call.
I don’t dare to tell anyone about this because I fear others think I’m insane. What should I do?

Reply

Have you followed our recommendations above?

From Josh Kirschner on June 23, 2016 :: 9:54 am

The first thing to do is check if your iPhone is jailbroken using a security app like Lookout Security? If your phone isn’t jailbroken, it’s highly unlikely someone is using it to spy on you.

For your Mac, have you run a malware check? If so, what program did you use? You can find our recommended Mac security products here: https://www.techlicious.com/guide/best-free-paid-mac-security-software/.

Reply

Yes

From Marie on June 25, 2016 :: 11:35 am

Hi! I’ve tried to scan my Mac using Avast and Malwarebytes, but they can’t detect anything suspicious. Is it possible to monitor a computer via the internet? Thanks in advance!

Reply

depends what you mean by monitor

From Josh Kirschner on June 27, 2016 :: 12:31 pm

If you there is no malware on your computer, than no one will be able to monitor your computer via the Internet. However, if they had access to your email password, iCloud login, etc., there are a lot of ways to monitor activities that don’t require access to your Mac. It’s also possible if you are using a public WiFi network that people could be monitoring your activity via a network sniffer. They wouldn’t be able to see any information from secure (https) connections, but general browsing and search might be visible.

Keylogger

From Marie on June 27, 2016 :: 3:24 pm

Thanks for your reply! What about a keylogger? Is it possible to install one remotely or via a server on the internet?

Reply

Yes, possible to install remotrely

From Josh Kirschner on June 27, 2016 :: 6:20 pm

Yes, there are a variety of ways to get infected with keylogger malware remotely. However, that most likely would have been picked up in one of your two malware scans. You can try a third scan with another program, like Sophos, if you want to do an additional check.

Reply

Today I decided to scan

From Marie on June 28, 2016 :: 4:05 pm

Today I decided to scan my Mac with Sophos, but it couldn’t detect anything either. Is it possible to create a keylogger that looks like a legitimate file? If yes, would that file be able to hide in the background and be unnoticed during a scan?

Reply

Scans should find it.

From Josh Kirschner on June 29, 2016 :: 10:54 am

Many malware programs are designed to look like legitimate applications. However, antimalware programs are specifically designed to find the software signatures of these programs. So if the keylogger is in the antimalware database, it should be found.

You could always do a complete system reinstall on your Mac, which would remove any malware, but that seems like overkill unless you have strong reason to believe there is actually malware on there. Given you’ve run scans with three different programs, I would doubt that to be the case.

Reply

Weird file

From Marie on July 01, 2016 :: 4:06 pm

I’ve considered doing a complete system restore because I just found a weird file on my Mac, and I took some screenshots of it.

Attached is a screenshot of the ‘mysterious’ file:

http://i65.tinypic.com/x22m2v.png

I’ve never seen such file before, and I don’t know what it is.

Reply

Weird file

From Marie on July 01, 2016 :: 4:16 pm

.....and here’s another screenshot:

http://i67.tinypic.com/2nte1ol.png

What's the name of the file?

From Josh Kirschner on July 05, 2016 :: 10:30 am

It’s hard to tell what that is from your screenshot. Can you tell me the name of the file and what directory it’s in?

iPhone sounds

From Dan Deez on July 03, 2016 :: 4:47 pm

It sounds like the “sound” played after going into **FindMyIphone** 
Your devices are listed and you have 3 options
One of which is to “play a sound” when phone connects to Internet , so each time you turn it on….
you connect and the notification comes through
it gives your phones location too??!!

Reply

XML document

From Marie on July 05, 2016 :: 11:39 am

It is an XML document and it’s located at my archive directory.

Reply

What's the name of the file?

From Josh Kirschner on July 05, 2016 :: 12:43 pm

And is it in your main archive directory or a subdirectory?

Reply

It is in my main

From Marie on July 06, 2016 :: 6:44 am

It is in my main archive directory. The file is called wf.xml

Reply

I have a I phone

From Sturgis Turton on July 05, 2016 :: 2:08 pm

I have a I phone 5 and my fiancé has a galaxy s4 when u go to her contacts and click on my name it has linked Google and Microsoft accounts what does. This mean and I discovered on face book in apps notifications there were friends watcher and friend latitude finder , na mobile vault , blackberry smartphones app, And other things I didn’t put there and they were all set to setting only me can see what does this mean

Reply

TMOBILE Notification that SIM Card Changed

From Ing on July 14, 2016 :: 6:22 am

I recently contacted TMOBILE in order to make some changes to a prepay account.  After they verified the account my call got dropped and a message flashed on my phone (operating system message?) stating my SIM card changed.

When I again spoke to TMOBILE they assured me no changes had been made to my account.

Not comfortable with this at all…please comment.

Thank you so much!

Reply

Sounds like T-Mobile

From Josh Kirschner on July 14, 2016 :: 9:44 am

Given the timing, it definitely sounds like something T-Mobile did.

Reply

Name: Cindy ZavalaState: CaliforniaCity: OxnardZipcode:

From nicole kniffen on July 18, 2016 :: 7:18 pm

Name: Cindy Zavala
State: California
City: Oxnard
Zipcode: 93035

Reply

locate who is spying on me

From ronnie on July 22, 2016 :: 5:22 pm

100% positive someone is spying on my phone. how do i find out who?

Reply

How are you 100% positive?

From Josh Kirschner on July 25, 2016 :: 11:04 am

Why do you think it is you phone that is being spied on? If it is, chances are that it is someone who had direct access to the device. But it is very difficult if not impossible to determine who it is without significant law enforcement involvement (which is unlikely to happen).

Reply

Cheating spouse

From Tammy on September 02, 2016 :: 9:36 am

I will be running a clone on another phone and I will get it sent to you so as the target gets new texts or phone calls or whatsapp messages on the phone you get to know how it is and what the message is. I’m gonna install a software on the phone which will allow you access the archive of the deleted messages of the last 6 months as well. I have series of hacks to process, I am a busy person. Get back to me ASAP if you’re ready to do this.

Reply

Parental control husband?

From Mary on December 11, 2016 :: 2:38 pm

Dude is controlling my iPhone

Reply

Been hacked

From Frances on September 04, 2016 :: 2:30 pm

My phone apparently had been hacked. Now I’m trying to see where the hacker is or who it is. They set me up and now my boyfriend thinks I was tracking him. Somehow when I call him it says I’m locating him by “pinging” his phone. Ive never downloaded anything to do that or ever needed or wanted to do that. How does this happen?

Reply

why

From suicidal on September 04, 2016 :: 9:17 pm

Why are these people doing this? Because you all suck at being parents and raised a bunch of animals that have nothing better to do than torment one another.  You want to solve these hacking problems? STOP raising kids to depend on technology make them socialize normally, keep companies from doing business digitally, demand that you want to do business one on one paper and pen and keep the tools that allow people to commit evil no longer an option.  We are allowing our society to become detached and too synthetic , before long the science fiction of people living digitally will be reality, we are getting closer all the time and the benefits don’t outweigh the cons, but because it’s easy to live a fake life online and do things without really living and working we make it easy for people who haven’t developed social skills to thrive and exist comfortably in this new age and sadly it’s too easy to do wrong to others and not feel any negative way about it because you’ve raised your kids to be desensitized to reality, to pain, grief, war, and even love. 
Your life has been hacked, too late to fix it. You can try but your time is better spent living well with what you have, not letting the people have control of your life joy and freedom remaining , do not dwell in misery of it. Fight for your freedom by enjoying life and not living in fear. Prepare and protect yourself from further damage but letting it consume you is giving them the power and provoking them to continue.  Ignore evil don’t give in to it. If you think you can destroy it, try, but don’t make it a choice that consumes your life or some vendetta, it will only antagonize them to do more. And for God sake teach others and the youth right and wrong people, just because technology makes it easy to raise kids without the same interaction doesn’t make it right. Like this pokemon go garbage, just no. Stop. Grow up. Just because everyone’s doing it doesn’t mean you should. Until we tell the world and each other that technology is taking too much control of our lives and let it walk all over us be cause of a few simple comforts it provides, it will only get worse.  If I see a kid walking around playing pokemon or catch them hacking a phone, you better pray it’s not your kid, cause I’m taking their phone and smashing it. You can buy them a walkie talkie, they shouldn’t be too far from you anyway.

Reply

Read More Comments: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.