Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | Snapchat Symbol Meaning

author photo

Is Someone Spying on Your Phone?

by on May 28, 2020
in Phones and Mobile, Cell Phones, Tips & How-Tos, Privacy :: 878 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

[Editor's note 5/28/2020: Since this article was written nine years ago, many new phone hacking methods have been developed and/or discovered. In addition, cell phone operating systems have evolved significantly. We've created a new article to cover those various hacks in our new story: How to Tell if Your Phone Has Been Hacked. Please go there for the latest information. We're keeping this story active for the issues and useful advice contained in the comments.]

You probably know there are plenty of apps you can install on your smartphone to track its location in case it gets lost or stolen. Apple's “Find My iPhone” is one good one and many security apps, such as AVG Mobilation, can track down a phone in seconds.

But what if someone else is tracking you? Is there any chance your boss or spouse could be spying on everything you do on your phone?

It’s easy to do. Spy apps are plentiful and can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call and what photos and videos you shoot. The problem is these apps are difficult to detect and run invisibly in the background.

I decided to track my son and installed an app on his phone called Phone Control by Laucass (free on Google Play). Of course, secretly intercepting electronic communications without the person's knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.

Every day I receive emails that indicate my son’s location as he’s using his phone out in the world. I can click on those links in my email to see via Google Maps where he is (although I very rarely do). I could also set up the app to send me data about everything else he’s doing on his phone, but that’s not something I personally need—or want—to do.

Signs your phone may have been compromised

Someone borrowed or took your phone

I had to have my son’s phone in hand to install Android Phone Control. Once activated, however, there’s no icon in the application launcher. The app shows up with the name “Android System” in the applications manager so it doesn’t look suspicious. If you think someone could do something like this when you’re not paying attention or asleep, secure your phone with a passcode that isn’t easy to guess.

(Editor's Note 9/26/12: To confirm you have the spyware and not a standard Android app by the same name, follow these steps to open the spy app (dial the phone number.)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for more detail on 9 of the most common spyware programs and how to detect them.)

(Editor's Note 12/16/14 (Josh Kirschner): In some of my comments below, I noted the unlikelihood of spying on iPhones that were not jailbroken. However, since many of those comments were made, certain holes were identified in iOS that exploit the iPhone's connection to trusted networks and devices to allow someone with access to the network or device to download significant amounts of personal data. Jailbreaking the iPhone was not required. Fortunately, those holes have been patched in iOS 8. For more information, see:]

Your phone is acting weirdly

Taking forever to shut off, lighting up for no reason, suddenly getting much shorter battery life or running hot when you’re not using it may indicate hidden processes are running in the background.

Your data usage skyrockets for no reason

This could be because your phone is checking in with someone else, using GPS and sending them text messages or emails that communicate where you are and what you’re doing.

What to do if you suspect your phone's being monitored

The best thing to do is perform a factory reset, which you can find as an option in your phone’s settings. Know, however, that in doing so you will lose all data stored on your phone, so back it up first.

If you’re using Apple iCloud or Android 4.0, items like your contacts, photos and music are automatically synced and saved in the cloud. But if you have an older phone, you’ll want to make sure to export your contacts before doing a factory reset. There are various ways to do this depending on what phone you’re using and which operating system it’s running. If you’re not sure, get help from your cellular provider; they can make sure to retain your contacts and other important data during a factory reset.

You'll then want to use a strong passcode to prevent unauthorized access to your device. For Android devices, you can also install an app, like AppNotifier (free on Google Play), that will email you when programs are loaded onto your phone.

(Editor's Note 9/26/12: See our updated recommendations for Android antimalware solutions)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for our latest recommendations on how to protect yourself.)

You'll then have to tackle the issue of who's doing the monitoring. Keep in mind that if your device was issued by your company or is authorized to access your company's email and other data services, you may have given your consent as part of your employment contract or when access was data access was granted.

Discussion loading

Cell Phone Debugging

From Carol on March 30, 2012 :: 11:10 am

Can the cheap dollar store cell phones be bugged?  As far as I know they do not have a GPS or WiFi.
Just a note:  You can know who the criminal is but getting the law onto him is another matter entirely—the law will not work for you if you are a woman and it is your ex-husband or soon to be ex who is doing the bugging.  I know this from experience.


Cell Phone Debugging for the Average Person

From Kevin D. Murray on March 30, 2012 :: 11:26 am

Hi Carol,

You are correct about obtaining law enforcement assistance. This is why it is imperative that the case be handed to them on a silver platter. It can be difficult, but it can usually be accomplished.

If criminal prosecution isn’t successful, an attorney who is given enough information to work with can advise on the the state and federal civil remedies available.

The goal is to stomp on the snoops toes and show them you mean business. Just initiating a case (with good evidence) usually dissuades all but the mentally ill category snoops.

On the cheap cell phone question. Right again! Only smart phones have the brains to remember and execute spyware. The dumb phones don’t tell tales.



From Brooke McManus on March 19, 2014 :: 1:44 am

I am absolutely thrilled to have randomly came across this site! I previously wrote and in great detail gave an overview of the technical difficulties ive been experiencing since day one with my samsung galaxy s3. It was mentioned to let them hand it to you on a silver platter and you have no idea the patience,calm,and restrain I have to be about this. I didnt at first know what to make of the technical issues I was experiencing with my phone but then I realized ok…,this isnt some freak happenings so I have been doing my homework and reseach and im keeping my mouth shut because they mesed with the wrong chick and im just going to keep letting them all hang themselves! I must admit Im pretty damn good at this P.I. /sherlockholmes extra curricular activity I am involved in.


Id like to know what happened

From Kim Masterson-curci on May 26, 2015 :: 10:30 pm

I get so many emails I would probably miss it if you emailed me.  Maybe you know a way to communicate. Maybe thru facebook but I usually ignore random friend requests.  Im curious to know what happened.  I have some weird stuff too going on a while….like 6 years or more years now.


Ive owned a samsumg 3

From G on June 20, 2019 :: 12:22 am

Belive me i bought a samsung for $600 when they first came out on market and hun let me tell you !!!! THAT PHONE WAS SMARTER THAN ME!!!! IT HAD SOOOO MANY OPTIONS!!!The things it can could do were endless! I thought someone mwas hacking me too but the phone does so much and if you dont understand what your doing and touch a button your cell phone world will b upside down while leaving you with no clue lol


Cell phone security

From Dr. Bill(DrFootball) on March 30, 2012 :: 12:53 pm

Always amazed at the # of responses to this topic! “Obtaining Law enforcement assistance” only works if we assume that were not the target of a police investigation or federal investigation. Lots of folks use their mobile phones to shop, thereby opening themselves up to identity theft….(Speaking as a former U.S. Amy officer with time in “Special Operations”) I’m very careful how and where I shop on-line…everyone has to be…



From Rob Ratliff on January 17, 2021 :: 8:13 pm

the cops wont do shit..there dirty cop buddies are behind alot of It ..If you get disability ssi anything ..they use your phone to stalk you..they pull up to your house at 2am point this cell gun they have and grab all the numbers from that house and they got you….(solution)put a vpn on it and fake gps location pro .you can say your in vegas if you want.they still will listen to all your calls and text a text app and use it instead..they will still get your calls.



From elizabeth on March 31, 2012 :: 11:19 pm

I was given a phone last week to review.  I just read your article, looked at the apps and there it was.  I was stunned.  I did the factory reset.  But since they gave me the phone, could they just reinstall it?  What’s to prevent that from happening again?  Of course, I’m no longer doing anything serious on the phone.  The opposite of what they expect from a reviewer.  Duh.


Looked at your app's?

From Nicholas Delgadillo on March 13, 2017 :: 4:21 am

I just inch quick general question but you said when you were given a phone do you happen to look at the apps and there it was you noticed a spyware app right there and then and you’re wondering if by doing a factory reset on your phone could it just be reinstalled later on I don’t know how to answer that but my question is what app did you notice that caught your attention of being a spyware app what was the app called ?



From mzdf on April 29, 2012 :: 12:37 am

you speak of androids other phones..but you don’t mention iPhones directly how they can be infiltrated,stalked,bugged..and what other apps apply to the iPhone..just wondering since I have an iPhone..and what do I look for..what I can use. I would like to obtain a app for my son’s iPhone, but I won’t want one on my mine by someone else.


You're 99.9% likely fine

From Rukkuz on June 24, 2016 :: 4:44 am

Iphones are more safe from this kind of malware due to the fact that they cannot install apps from outside of the itunes store, unless the phone’s jailbroken :D



From apksecurity on March 05, 2017 :: 7:13 am

Yes. But if Iphones are jailbroken, then there is a great possibility of being hacked. One must confirm whether his iPhone is jailbroken or not.


You gotta catch em

From Me on May 02, 2012 :: 4:50 am

It’s really a problem for some people, speaking personally. It takes 1 psycho to damage you life. You correct when it comes to reporting to the police, they look at you as if you were the crazy 1. Spending money you don’t have changing numbers is not the way to stop it.  You gota catch the person doing it. The only way is to figure out who and beat them at their own game.  Any suggestions please let me know, these people need to stop. With all the apps and tech their has to be something. Something that doesn’t cost.  People who do stuff like that should not be allowed to have the privledge of having a cell phone or computer for 2 to 3 years.


Cell Phone Debugging

From Carol on May 02, 2012 :: 12:15 pm

We found out how the shady ex kept finding a cell phone number, Day Care.  This particular couple has a child in day care and they were giving the phone number to the daddy. Everytime momma would change her phone and number, she would give it to day care (naturally) and daddy would ask for it and recieved it.  That has been stopped. 
It’s odd though, the law has to have a subpeona to tap your phone but some crazy person, such as the ex that I mentioned, can get the same information easily.  Something is wrong there.


No. The law NO LONGER

From Dlori on September 10, 2012 :: 11:54 am

No. The law NO LONGER needs a subpoena to tap your phone, your computer, find out what you read at the library, etc. We have no 4th Amendment rights anymore. For those who think the patriot act no longer exists or that it only applies to “Terrorists”, think again. Do your research.


Hes right

From Samyaza grigori on May 05, 2018 :: 8:09 pm

ANYand EVERY 1 from a governmental standpoint considers any individual who goes against the status quo to be a theeat any an every1 is now the target of a gorge Orwellian 1984 type of thoufht process

All the government or other agencies have to have is a “suspicion” an. Boom. I mean lookvat the see somthing say somthing initiatives,using peoples paranoias an racial bias to profile a “terrorist” or a “threat” simply by telling people if they look like there doing bad they are.Seen on tons of billboards it first statmrted happening in new york an d.c on bus an train lines the see somthing suspicious tell some1. And that’s where the the bias in people’s paranoia comes into play cuz you know you see somebody that has a turbine in your you know specifically may be racist because of 9/11 so now they’re being watched by the police or the government agency all because you’re paranoid ass said they’re a f****** terrorist and it couldn’t probably be further from the truth or just going to mosque you moron or to blow up a children’s school but you know you don’t know you can’t govern thoughts you can’t tell people you can’t have that thought or you know it’s 1984 get up on your new speak



From Rob Ratliff on January 17, 2021 :: 4:55 pm



A real problem nowadays

From Peter on June 03, 2012 :: 3:39 pm

Cellphone spying is a real problem nowadays. Today I found an Android App, which scans the device, detects the well-known spywares and also shows warnings when there are any apps that have suspicious permissions. The last one is really nice if you have any modified app with undetectable package name. Check the:

Anyone knows something like that for iPhones ?


7 phones ruined

From Joyce Dowling on June 17, 2012 :: 7:49 pm

My sister has been a victim of cell phone hacking. We know the man lives in India she met him on a chat line. No one can seem to stop him. The minute a phone enters her house he attacks it. We tried TMobile IPhone and 3 prepaid phones.One was not even in her name.
We can not figure out how he is doing this,he has never been in this country.
He takes over the phones and even seems to use them with battery out. We tried special bags purchased on internet to block cell phone signals.
She just wants a phone to keep in her car for an emergency. This maniac is stopping her.
Does anyone have any suggestions. We tried the police even US Cybercrime unit.


Can you provide more details

From Suzanne Kantra on June 18, 2012 :: 7:45 am

Can you provide more details on how he “attacks” the phones? What is happening that makes you think he has access and how do you know it is this guy in India who is doing it? I suspect something else is going on.


Re More Information

From Joyce Dowling on June 18, 2012 :: 9:40 am

My sister met this man from India on a chat line. When she realized he was strange she told him she no longer wanted to continue the conversations. He said I will never let you go. It was at that time all the contacts were removed from her phone . It was an Android phone the Apps went missing.She kept getting Text messages from him saying he was never going away. He put some sort of passcode on the phone so she was unable to dial out.
She returned this phone got a new one with a new phone number but he still got in it and placed the same locks on it. He was using the data himself and made 89 dollars worth of international phone calls that T Mobile said they can prove came from her sym card. They say it is impossible to hack their phones. The same thing happened with a verizon Iphone. The phone has never been out of her sight she has no ex husband or old boyfriend that might be doing this.
We even tried 3 different prepaid phones one which we did not even bring in her house I activated it at my hose 20 miles away. She used it 5 miles from home and he got in it.He prevented her from setting up the voice mail changed the pass code and did not allow her to send a text.
I dont know how any of this is possible. In my research I see you can by a program that will do these things but you have to know the persons phone number. We keep changing it. How could he possibly get it so quickly? The police have never heard of this. I reported him via email to Meerut police in India. He texted her and said so you turned me in to the police? I told them come to my house. This of course was impossible as we only know his phone number not his address.


Some of the things you're

From Suzanne Kantra on June 18, 2012 :: 10:55 am

Some of the things you’re describing don’t sound possible. I’m curious whether those international calls were made from India or from your home town (should be easy to tell from your phone statement).

However, if I had to make an educated guess, I would say the problem lies with your devices, not your sister’s. If your PC/email/phone were hacked, someone may be pulling down your sister’s new phone numbers from your address book or emails. That would also explain how this person may have known you emailed the Meerut police and gets access to her new phones so quickly.

I recommend that both you and your sister run Malwarebytes on your computers (download the free version here: and follow these instructions for what to do when you email gets hacked: Also, download a copy of Lookout Security or another mobile security app if you’re using Android (your phone being hacked is probably the least likely scenario, but best to be sure). And to state the obvious, make sure you’re using new passwords for the new phones and DON’T email them to each other.

Let me know what you discover.

Joyce Dowling the way the

From MyDogIsSmarterThanMe on January 11, 2014 :: 7:21 am

Joyce Dowling the way the phone is being “Hacked” is both via the SIM Card ICCID # *and* the IMEI
# Number.

IMEI = International Mobile Equipment Identity and is a unique number given to every single mobile phone

ICCID =A SIM card contains its unique serial number

Unfortunately, what you need to do is *LITERALLY* start over from the very beginning.

Pretend you never had a phone before and throw away the “Hacked One” it’s “dead forever”

The IMEI# on a cell phone is equivalent to your SSN# every single phone has it’s own IMEI#

Also, unfortunately, this number provides further details about you, the owner. There’s sites all over the web,

“Verify the Owner of the IMEI#”

The only “TRUE NEED” for this (to look up) is if you were purchasing a phone off E-Bay,etc. You can use that to see

if it’s really the phone and really the name of the person selling the phone selling to you

If the phone has been reported stolen, you’ll *typically* find here, *HOWEVER* when purchasing a phone off E-Bay,

etc.  to be extra careful. because that IMEI# is unique, will provide you the Manufacturer Information,etc.

You can call the Manufacturer and verify it’s not been reported as stolen. They won’t provide any confidential

information, but they *SHOULD* at least tell you this. (Just tell them how your purchasing-why you’re verifying

To *HAVE* the Number and *NOT* asking for “Personal Info” they should be cooperative. (because unless hacked like

you’ve been, then no one should know this number.

So, that’s your solution. You need both a new Simcard and New Phone (throw the other in the trash)
(as if you try to sell, the new owner will have the same problem—thus not fair).


AS for “Wrong Charges”—what you were told is Horse Manure from some front line Agent that’s trained not to give

away Credits to accounts.

What you need to do is go into the Retail Store. Just tell someone you’ve been told to ask for a Manager regarding your phone being hacked (ie. vs. “May I speak to/who is)—because again, most people are trained not to get a Manager involved unless “Serious issue”—by saying “I was told to ask to speak to a manager because my phone was hacked and need a new one”.

Take with you your Past Bills that have charges that are incorrect.

+++++++THIS IS *VITAL++++++
When speaking with a Manager, consider them your *BEST FRIEND*—-*DO NOT* use this as a person to “Complain to” (EX-don’t say “YOUR COMPANY, this/that person would not do this/that. All those type words put a Manager in a “Defensive Capacity”—anything that sounds like you’re “Challenging” the decisions that have been made in the past. WELL, because S/he’s a Manager (and probably likes their job, it’s just “human nature” to want to defend the actions your company does.

Thus be VERY POSITIVE, MAKE SURE TO USE *POSITIVE WORDS*—-not kidding, even if you have to write a script and “Practice”—-because if you mess that up, then you’ll have to go to regional VP where you WILL MOST DEFINITELY have to be “Professional” or they’ll toss you to the curb.

Tell him/her I think I know my Problem. My phone was hacked, I’ve done research on the web, I need to have this phone completely turned off/disabled/as well as the SIM Card and get all new equipment.

He/She hears that—-MORE THAN WILLING TO HELP (You’re buying something)
THE REASON—you don’t have to go into what you’ve done in the past, they’ll say what’s your account info, pull up in the CPU and “Know”/“see” you’ve done stuff in the past.

*AGAIN* be sure to tell them (based on the Internet Research) you think (because you downloaded a Rogue App) the person was able to obtain your IMEI and ICCID numbers.

Again, by using that terminology, s/he can then say I bet she’s correct.

Then, when they start with a phone *BEFORE YOU PURCHASE*, *THEN* mention, also need to discuss with you the charges made by the person that hacked your phone/getting yhour credit.


Complaining/Getting “your way” is the art of “Finesse”. If the Store Manager cannot help. I will then show you how to get District and Regional V.P. Information—which *WILL* get you what you need but an ENTIRELY DIFFERENT WAY TO HANDLE



From James on January 02, 2015 :: 3:45 am

Hes using your wifi. Once any of those devices connect to the wifi,he gets in. Replace your wifi router. Its the home network he has access to. That my idea.

To Joyce Dowline

From Vic on August 17, 2015 :: 11:49 am

Reset your home wifi and change the wifi password.
Try this, might help.


Cyberstalking IS A CRIME!!!

From Yvette on December 14, 2019 :: 2:47 am

This ladies blog is so true.  I’ve been reading these for over an hour and I can so related to most..  having for every movement tracked your every call recorded to eavesdropped upon .  Extremely harassing.  Every mobile device has been attached, my WiFi, and my television carrier can’t get into my site because of this cyberstalking.  Please do me a favor and stop rehashing something we all know is going on; WHAT WE Need is Solutions to have this stopped.  No one should be able to bring this much grief, lack of privacy and unnecessary inflicted paranoia.  Please
Make some serious recommendations for company’s ego provide antispying and anti-cyberstalking help for victims to many Women and children and men get hurt because of this unwanted behavior.


Simple Solution

From Kevin D. Murray on June 18, 2012 :: 9:21 am

“She just wants a phone to keep in her car for an emergency.” If this is the case, just have her discontinue her cell phone service. The phone will continue to be able to dial 911 at no charge, she will cut off the harasser, and save money. Just remember to recharge the phone once in a while.


Some one is bugging my smart phone!

From Gred on January 13, 2019 :: 8:49 am

Does she know who it is? How long have they been bugging her phone?


7 phones ruined

From Carol on June 18, 2012 :: 9:55 am

One solution, stop using phones for awhile.  Soon the creeper will get tired of keeping an eye on her, and if she doesn’t have a phone there’s nothing to spy on.  Give it a long time, say six months to a year, then try again.  The creeper will have moved on by then.


Some one is bugging my smart phone!

From Paul on January 11, 2019 :: 8:31 pm

How about if you need your phone? How are you going to use it if you shut it off for a year?


How is this possible?

From Joyce Dowling on June 18, 2012 :: 8:43 pm

My sister drove to another town to pick up a track phone from our Mother. It was left to her(my Mom)as part of a good friends estate.  My sister turned it on.After she had it on a few minutes the bars appeared that signaled he was in phone.By the time she drove 35 minutes home she could not reset the phone. The information in phone was changed. she had not entered her name or phone number on that phone.Is there a way that someone can physically track her?
I have run the malware scan on my PC when her IPhone said malware a month ago. I was loaded. It took a computer tech 1hour to clean it out, I now have protection. I run a scan every other day.
My sister does not own a computer that is why she had a smart phone.
I had blocked all her cell numbers from my phone so he could not call them as he had tried a couple times.
It is so bizarre but it seems all she has to do is tiuch a phone and suddenly this nut has access.


It's not

From Suzanne Kantra on June 19, 2012 :: 11:00 am

What you’re describing just isn’t possible. I’m not sure if you’re misinterpreting something as normal as cell phone reception bars as a break in attempt or there’s another disconnect between what’s actually happening and your story, but it just isn’t adding up. I suggest your sister bring her phone into the carrier’s store so they can examine it and explain to her what’s going on.



From Me on December 03, 2014 :: 4:19 pm

How is everything not possible according to you? My husband & I are being hacked on our phones by his crazy son.. People have told me many things “aren’t possible”.. well, then how is it happening? Sprint says no one can hack our system.. yeah, of course, cause the white house was just attacked.. but sprint has much better fire walls right?  Was also told someone had to have your phone to install spyware in it.. nope again.. so instead of putting this girl down and telling her that her story isn’t adding up.. try living it!  Nothing makes sense.. but it’s happening.. makes you feel crazy.. then there is people like you.. that make you feel worse, say that they are lying, or making stuff up.. why would she? why would we? Hackers are obviously smart, they can do things most normal people wouldn’t think was even possible.. I wouldn’t until it actually happened to us.. so instead of putting this girl down, either help her, or don’t comment..
by the way.. how do you trace a person who hacked your phone? so we have concrete proof? any ideas on that one?


My administrator at rental apt

From Elaina Hayes on April 10, 2019 :: 9:35 pm

My administrator at rental apt I live has hacked my device. I’ve went through 4 cells in 6 months, thinking I could start fresh but now that I’ve decided shivered this BOLD ACT OF VIOLATING MY PRIVACY , I’m collecting everything I need to prosecute. They’re even accessing my smart TV I’ve gotten for Xmas, private documents & records. I have absolutely nothing thats not being accessed.Police won’t do anything but suggest your unstable. We’re gonna see who’s unstable, and WHOS A FELON.  Good luck to you all. Wcve got to speak up. It’s much to easy for criminals to the law and go unpunished. GELP US OUT HERE GOOGLE???


From scase on May 08, 2015 :: 12:39 am

This is the second time my phone is ben hacked or snooping going on I’m bringing it to police is there a way to prevent it from happening the third time I hard reset it bit I lost subscriptions and accoubts I don’t want to loose that money again any suggestions iwish I could face this thief


think beyond the phone

From Bitch Thickums on June 22, 2015 :: 7:50 am

Option #1 Maybe some creeper planted secret cameras in the sister’s house and is having a ball pretending like he is in india and frequents chatroom, but really he is the landlord or the sick perverted cable guy who is watching all this go down.

Option #2 Maybe your sister has delusional disorder or psychosis and is imagining all this and needs medication.


Some one is bugging my smart phone!

From John on January 13, 2019 :: 9:20 am

Put tape on the cameras! That way they can’t tape you and they won’t see what you’re your house looks like! Your camera on your phone could take a 3D picture of your house so put tape on the camera lens!


From Janet Curtis on January 08, 2018 :: 9:45 pm

We kn ow for sure that our niece is tapping moms cordless! she told US and we said we do not agee tobe recorded! but shes says i dont know how to remove it. like hell she doesnt shes a felon shes on paroll and we said w know the fds are recording our phone but she doesnt even use it for her calls the feds should be tracking her cell phones and the police wont even take it eriously in california and refuse to remove it! other officers said that is illegal and they Could go check on it and where it is and remove it even pres charges on her for doing it. so why cant anyone answer how to untap instead of how to find out who how to tap! geez its so hard to get the right answer who the hell will take this jerk back to jail and fine her and remove this crap shes done to my now isolated 91 yr old mom?


Some one is bugging my smart phone!

From Paul on January 11, 2019 :: 8:21 pm

I don’t know who it is! I would like to get rid of them! They been bugging my phone for over 2 years! They texts words on my g mail messages! There on my phone 24 hours a day every day! How can I stop being rude? They texts stupid things about me or the president. They may be a bunch of Socialist Communist deep State Democrat criminals working for the NSA! They act like a bunch of jerks! And there so stupid they’re not supposed to be letting me know there bugging my phone!



From Tania Tracy on May 07, 2019 :: 8:17 am

Take a look at Josh k. and Joyce’s pic’s. They’re basically the same. As is they’re unsupportive attitude to cry’s for help and guidance. Just saying ☠️


This sounds all familiar to what I'm experiencing

From Hackervictimofaloser on December 14, 2013 :: 3:38 am

Every thing you have mentioned is possible cuz it’s happening to me also everything you have mentioned., ! The reason why he is able to keep hacking and tracking you. Cuz no matter what he had hacked all your main friends or etc that you keep in contact the most also. This works like a chain reaction. Once he hacked you, he was able to act like you using your phone number to contact your sister or friends to hack them also. Trust me this is going on with my moms phone also. He would push numbers in when I was on a automated message menu for businesses. Also done it to mine on a few phone when I was talking to a couple different women each time. He also had sent me a text from my friends number portraying to be my friend.  And would intercept my calls when I’m calling out or someone calling in to make the call not go though to the receiving end. But will still ring on the callers end.  So the guy that keeps getting yours or your sister’s new # it’s cuz she didn’t get a new phone and number ether or your friends. I’m dealing with the same thing all cuz this guys GF told me she was single and we had sex that night. And ever since then I’ve been being followed and my computers, iPad, iPhone, android and router been getting hacked into. My iPhones contacts already gotten deleted 3 times so far. And also data’s been missing, phone freezing up and all the other signs as mentioned in many post, from all over the internet and news, OF all the signs of a tracked & hacked victims phone.. And I’m sorry to say this to the OP Suzanne Kantra but I had lookout on it and a security, anti- virus app called trustR and he bypassed both and ever since he hacked it the first time my security, anti-virus app would not scan anymore. They don’t need your phone anymore. It’s possible with just a phone number now. So it ain’t just smartphones , Even a cheaply assurance wireless phones and the others that the states give to people on food stamps or assistance.

But lately I seen up at best-buy that they had a real security and virus software specifically for iPads, iPhones iPods, and iMacs for $80..


I don't know who they are. But it could be the NSA! Yes!

From Mikewhat you want? Who are you? I didn't call you on January 13, 2019 :: 8:46 am

They freeze my phone to!


stealth phone

From holiness1 on May 29, 2015 :: 11:58 am

One can purchase a refurbished Samsung G600 with stealth features on ebay.  One can also purchase an activated, roaming free anonymous SIM card on ebay.  These phones have dynamic IMEI amongst other features and are very secure.  If one has better means, an XCELL stealth phone can be purchased.  Your sister may, simply, be one of millions who are gang-stalked which means that the government is involved.


Go off the grid

From Varesha on March 30, 2017 :: 11:04 am

Hi Joyce,
This actually might be a blessing in disguise. You and your sis go off the grid and live life like back in the 80’s. No wifi, no cellphones, no computers! Those were good days, everyone lived just fine without all this technology. Just get an old fashioned landline to call friends and a message machine. Keep the cell with no service for 911 like someone said if you want. You guys will have a better quality of life and this guy will disappear.



From I.B. Stottlemyer on July 11, 2012 :: 7:16 pm

It happened to me. First if you google or search HACK,ANDROID,BLUETOOTH or HACK,iPHONE,BLUETOOTH you will see if you put your phone on wi-fi long enough for the goofball to get some malware on your phone, it hides in the simcard.  Factory resets don’t work because now he has your MEID, you MAC identifier and the places you go and the sites you hang out on.  Next the bluetooth is barking at your computers in your house.  Most people don’t secure their bluetooth interface and a connection is made slicker than ice on an alaskan bridge.  Now malware is on your laptop or home computer.  You get a brand new phone and the minute you go into your house or office, you are dead again.  It truely blows your mind.  I thought I was loosing mine.  How can I keep rebuilding windows after a low level format of the hard drive or even going to Best Buy and buying a brand new hard drive that is blank and doing an install in the woods on my laptop?  Simple, once the bluetooth phone spreads the virus or malware to your machine it boroughs into the bios chips.  This is where the software is located to start your computer bootstrap process.  Have you ever gone to HP or Toshiba or Lenovo and downloaded the latest bios?  Well if they can write to your read only memory chip so can the bad guys.  It wasn’t until I completely updated the bios chip on the mother board with a new bios did I get rid of the infection.  People this problem looked impossible to solve, but now that I know how it’s done it’s quite ingenious.  Start with researching the cell phone hack, then suspect your blue tooth and go and try to turn it off on your computers in your house.  If not, it is probably too late and your bios has been infected and so your computer keeps spreading the cheer to everyone and anything that will listen to bluetooth.  Bluetooth,very very bad….Secure it folks.  Stop this nonsense now.


Possible, but very unlikely

From Josh Kirschner on July 17, 2012 :: 1:56 am

Fortunately, bluetooth hacking is not an issue anymore. All phones and laptops released over the last couple of years have updated bluetooth security that prevents pairing without the consent of the user.

According to security experts at Norton I spoke with, some of things that are described could theoretically happen, but the probability of them happening is extremely low. BIOS viruses generally have to be written to attack a specific hardware configuration, which makes them very inefficient to create and distribute. Not impossible, but also not something the average user should worry about.


my phone is downloading all these wierd apps

From ryan on May 28, 2017 :: 11:34 am

my phone is acting completly bizarre. i cant even text on it and all these apps are popping up on it that i never even put on there and then some how my email got doubled. my internet was wiped out and someone downloaded google plus on it


The NSA Is bugging every bodys phone!

From Paul on January 13, 2019 :: 9:12 am

They have been doing this for 2 years and 6 months to me! This is the 6 phone they did this to me! They turn the phone on and off a switch video movies on me! They make the phone go to other sites! They make the phone real hot very quickly! sometimes they shut the computer off on my phone typewriter and they won’t let me type anything! And it’s got to be the NSA they’re the only ones that can get a phones like that! And it doesn’t act like no virus. It acts like a person is on there, and I could tell they have different personalities! Because each of these jerks do different things on my phone!  I got one jerk that sent me a picture of him in back of there van jerking off to my picture he was looking at in the van! He downloaded it on my phone! In the van has tinted windows and it got a antenna on top of it! It was near my neighborhood, that’s the kind of vans the NSA drives around! But did you know they not supposed to let you know there bugging your phone? But these guys are stupid morons I like to tell there supervisor what they’re doing and get them fired! They’re a bunch of sick homosexual queers! And they think just cuz the Osama made homosexually not against the law they can do these kind of things!


From Susanne Bramblett on January 11, 2019 :: 7:37 pm

My brother has been to prison three times over his young adulthood, and is currently in the county jail. I feel like he is my shadow. He knows everything I do, everything I say and knows everyone I have ever talked to. We have had some problems throughout the years as all siblings do. I feel he goes above and beyond to manipulate the people in his life so that things work out for him the way he would see best. I love my brother, I am just concerned that I could allow that love to interfere with my better judgement and allow him to hurt me or my mom or even my 91 year old grandmother. He always gets what he wants. My grandmother has quite a savings to be left to my mother. She is 91, therefore it is safe to say that she has lived most of her life. She has always been very generous to her children and grandchildren, which includes me. I am becoming fearful that my brother may just be someone I don’t know anymore. He has been away at prison for the most of his adult life. I have recently seen him and had him involved in my life more as an adult than ever. He has been free for four years until his recent return to jail. I cannot help but wonder if prison has changed my little bro into someone I would rather to not know. My mother has recently had a stroke and has lost use of the left side of her body. I have to ask myself if this was due to health reasons or if someone has become money hungry and down right disgusting. I would hate to know that I were wrong and yet I would hate to know that I were right and had allowed him to hurt my mother. More so if there is any truth to any of this, I have to protect my mom and grandmother now as well. I hope this has made some sense to you and that you will have some information for me that could help me. I often feel like i am going crazy. Ok well hope to hear from you soon.


My sons phone is under my email sence he is a child

From Denene Kargel on May 03, 2018 :: 5:54 am

Ok I am first going to say I am very sorry .. I am not very smart about this stuff..  I have a android and my son has this cheap android but very cheap… he loves it. Not much space .. he is 10. Problem he will be at my ex husbands house… his company is trash plan and simple… my child needs a phone that in a Situation he can get help..  I used my gmail account and set up my sons gmail account…. all my stuff shows up on his… I mean my ex couldgrab it and be like wonder what ur moms up to.  And find out. . Help.. I gotta get this fixed….


Read More Comments: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Love getting helpful tech tips? Subscribe to our free newsletter!

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.