Tech Made Simple

Hot Topics: How to Fix Bluetooth Problems | Quell Pain Relief Review | Browse the Web Anonymously | Complete Guide to Facebook Privacy

Use It

author photo

Is Someone Spying on Your Phone?

by on March 30, 2012
in Phones and Mobile, Cell Phones, Tips & How-Tos, Privacy :: 700 comments

[Editor's note 2/9/17: Since this article was written five years ago, many new phone hacking methods have been developed and/or discovered. We've created a new article to cover those various hacks in our new story: How to Tell if Your Phone Has Been Hacked. Please go there for the latest information. We're keeping this story active for the issues and useful advice contained in the comments.]

You probably know there are plenty of apps you can install on your smartphone to track its location in case it gets lost or stolen. Apple's “Find My iPhone” is one good one and many security apps, such as AVG Mobilation, can track down a phone in seconds.

But what if someone else is tracking you? Is there any chance your boss or spouse could be spying on everything you do on your phone?

It’s easy to do. Spy apps are plentiful and can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call and what photos and videos you shoot. The problem is these apps are difficult to detect and run invisibly in the background.

I decided to track my son and installed an app on his phone called Phone Control by Laucass (free on Google Play). Of course, secretly intercepting electronic communications without the person's knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.

Every day I receive emails that indicate my son’s location as he’s using his phone out in the world. I can click on those links in my email to see via Google Maps where he is (although I very rarely do). I could also set up the app to send me data about everything else he’s doing on his phone, but that’s not something I personally need—or want—to do.

Signs your phone may have been compromised

Someone borrowed or took your phone

I had to have my son’s phone in hand to install Android Phone Control. Once activated, however, there’s no icon in the application launcher. The app shows up with the name “Android System” in the applications manager so it doesn’t look suspicious. If you think someone could do something like this when you’re not paying attention or asleep, secure your phone with a passcode that isn’t easy to guess.

(Editor's Note 9/26/12: To confirm you have the spyware and not a standard Android app by the same name, follow these steps to open the spy app (dial the phone number.)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for more detail on 9 of the most common spyware programs and how to detect them.)

(Editor's Note 12/16/14 (Josh Kirschner): In some of my comments below, I noted the unlikelihood of spying on iPhones that were not jailbroken. However, since many of those comments were made, certain holes were identified in iOS that exploit the iPhone's connection to trusted networks and devices to allow someone with access to the network or device to download significant amounts of personal data. Jailbreaking the iPhone was not required. Fortunately, those holes have been patched in iOS 8. For more information, see: http://www.zdziarski.com/blog/?p=3820]

Your phone is acting weirdly

Taking forever to shut off, lighting up for no reason, suddenly getting much shorter battery life or running hot when you’re not using it may indicate hidden processes are running in the background.

Your data usage skyrockets for no reason

This could be because your phone is checking in with someone else, using GPS and sending them text messages or emails that communicate where you are and what you’re doing.

What to do if you suspect your phone's being monitored

The best thing to do is perform a factory reset, which you can find as an option in your phone’s settings. Know, however, that in doing so you will lose all data stored on your phone, so back it up first.

If you’re using Apple iCloud or Android 4.0, items like your contacts, photos and music are automatically synced and saved in the cloud. But if you have an older phone, you’ll want to make sure to export your contacts before doing a factory reset. There are various ways to do this depending on what phone you’re using and which operating system it’s running. If you’re not sure, get help from your cellular provider; they can make sure to retain your contacts and other important data during a factory reset.

You'll then want to use a strong passcode to prevent unauthorized access to your device. For Android devices, you can also install an app, like AppNotifier (free on Google Play), that will email you when programs are loaded onto your phone.

(Editor's Note 9/26/12: See our updated recommendations for Android antimalware solutions)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for our latest recommendations on how to protect yourself.)

You'll then have to tackle the issue of who's doing the monitoring. Keep in mind that if your device was issued by your company or is authorized to access your company's email and other data services, you may have given your consent as part of your employment contract or when access was data access was granted.



Discussion loading

gravatar

Prevent text message surveillance

From Jake on July 10, 2013 :: 6:17 pm

If you’re concerned about your text messaging privacy, you can use an encrypted messaging app, here’s the one I use for example: http://www.reviewsuniverse.com/send-secure/

Reply

gravatar

Help!

From Alayna on July 22, 2013 :: 10:58 am

Hi Josh…I found this article & comments very helpful & alarming. I recently got a restraining order against someone I didn’t even date due to harassment/etc. I changed my number before that. I know he continues to stalk me on every social media site, but I keep my privacy & am aware he does this & also keep tabs on his to see if he is breaking the restraining order. I do not know him to be a computer genius or anything, but he has decent knowledge about jailbreaking iphones, iphone apps that give you alternative #s to call/text (he has many) and he also would tell me about how he’d hack his ex’s facebook with false password setups etc. I wouldnt put it past this kid to do anything honestly and I’ve been living in fear.

I finally relaxed thinking he didn’t have my # and that he’d leave me alone but now am very alarmed. Less than a week ago I answered a blocked call only because I thought it was my friend on her work phone. It was very sketchy & they mumbled for a lot of it and eventually asked if I was a local hospital line. I have good hearing & I know they were just mumbling. It sounded just like this kid & I regretted answering it but nothing else happened. I never answer blocked #s. Now, last night I received a text from a random number asking me a personal question only he would ask me. I texted back who is this etc and even said I was someone else.

Now, this morning, I wake up and my phone is saying I need a PUK code for my SIM card. There is nothing I did to make this happen. My phone is a jailbroken iphone4. What should I do? I am freaked reading about how a 30 second call someone can hack into your SIM, or with a response to a text. Im not sure if this kid has this capability, but after reading all this I have no doubt. Also around the time I got that call he posted online “Shits too easy”.  I don’t know if I should allow it to keep going for now to try to bag him on a violation or just immediately change all my phone info again & reset my phone. Please help with any info on SIM hacking or ways to detect iphone hacking!

Reply

avatar

Some advice

From Josh Kirschner on July 22, 2013 :: 1:59 pm

First of all, I’m not aware of any way to hack a phone through a phone call or simply by responding to a text. If you have a reference for where you saw this, please forward along.

But to tackle the bigger question, why is your iPhone jailbroken? Given your security concerns, the last thing you want to do is leave your phone open for hacking or spyware. You can un-jailbreak by installing the latest iOS update, which you should do ASAP.

Beyond fixing the jailbreak issue, there is no easy way to analyze an iPhone for hacking. Sometimes the hacking app can show up in your device memory usage logs, but this is hit or miss. Best just to update your phone.

Reply

gravatar

RE: Some advice

From Alayna on July 22, 2013 :: 5:12 pm

Well I went and changed my number & sim card as well as updated & restored my phone, getting rid of my jailbreak & updating to 6.1.3. What confused me is how my SIM card got locked overnight, ironically the same night, its never happened before.

When I woke up I was browsing through sites and found similar info to this on a few sites… http://blogs.computerworld.com/cybercrime-and-hacking/22520/750-million-phones-vulnerable-spying-hack-sim-card-tainted-text-get-root

I was only scared because I did answer the blocked call in which he mumbled to intentionally get me to talk/extend the call, which at first I figured was to verify my voice, but the call was around 30 seconds which someone stated is all someone would need. I also am kind of in disbelief as to how thatd work but that article talks about a Java program that can hack your SIM card by accessing your SMS unknowingly. Or that guy claims all he needs is a phone number and he can hack into a phone??

I do not know how this kid could have got my number. I’ve been living in fear & expending a lot of $ and energy into all this. I have good general knowledge about iphone software as far as jailbreaking & honestly have heard that you can have better control of your phone when jailbroken? I at least had more apps & tweaks to track things better….I just wish I could track these numbers to actually get him arrested for breaking the restraining order but it seems near impossible now that cyber stalking is on another level

Reply

avatar

Thanks for that link

From Josh Kirschner on July 22, 2013 :: 5:52 pm

The method being described will only work on older SIMs and certainly doesn’t sound like it’s out in the wild yet, so I think it’s highly unlikely this was used on your phone.

Jailbreaking obviously gives you more control over your iPhone, with the flip-side that others get more control, too. Unless there are specific third-party apps you really need, I don’t think the risk is worth it, especially in your situation.

Many spyware programs can be remotely controlled by text message (once they are already installed).  If it is possible he had access to your phone in the past and installed something, then perhaps he was trying to activate it again and that somehow caused the PUK lock? I’m speculating here, but now that your phone is updated, you should be okay.

gravatar

I dont think thats accurate josh maybe u can review this

From Samyaza grigori on May 05, 2018 :: 6:20 pm

Someone could mock an email or a text message from someone that you trust and there could have a link in it as soon as you press the link s*** starts happening it’s happened to me I don’t have the phone of the pictures to prove it anymore but like I said if we’re going to make a story let’s make it good that’s why I really miss the upload function of the virustotal mobile because you could take links and stuff like that and put them into the app and find out but sadly that ability was taken away in an update but the mobile website who virustotal actually is and not some funny cat that’s the guy who makes the the mobile app it’s not really virustotal some funny cat is the producer of the mobile app it has virustotal in the name and it I guess uses the same search engines but for some weird reason the permissions that I were able to see yesterday and yesterday was Saturday May for Friday May 4th 2018 I was able to see the permissions of the the red letter text viruses that I had I installed the vibrator the thing today there’s no permissions and I can’t upload apks but yeah they took that ability out of the app

Reply

gravatar

basic phone can be hacked or not ?

From nadeem on July 30, 2013 :: 10:46 am

i dont know how this number appeared on my call details 8747747*7174*44444 , 47474441 , 44
i doubt someone is tracking my call , though i have a basic phone .
but the thing which created doubt was that on 44 the time duration was 35 minutes 12 sec ? how is it possible .
i am not tech savvy , please help me .

Reply

avatar

Sounds like pocket dialing

From Josh Kirschner on July 31, 2013 :: 12:38 am

While getting spyware on a basic phone isn’t impossible, it’s usually not nearly as easy as with a smartphone. And the numbers you listed look more like pocket dialing than spying. The reason for the long call was most likely that you dialed some number that never hung up on your phone, causing it to remain connected.

Reply

gravatar

iphone4 hacking

From mike on August 05, 2013 :: 3:21 pm

Hi there as any one been hack with a wired noise on the line when taking some one from iphone then block iphone calling then stop internet working on iphone as well as laptop on hotspot ive rung my service and the police and no clue about internet crime so if any one out there as solve this problem please let me know regards mike.

Reply

gravatar

Did that fix it??

From Hailey on August 27, 2013 :: 9:41 pm

A while ago my brother updated my Facebook from his phone and I didn’t think much of it until I realized right now that he can read my texts and brought up something I haven’t told anyone, except to my friend through texts.

And he did say something about getting into my phone before. I’m like 99% sure he did the spy crap that was stated in this article.

I decided to do a factory reset thing, and disabled every single running app. Would that make sure he won’t be able to get back in my phone?

Reply

gravatar

response to Hailey

From holly on August 28, 2013 :: 12:20 am

Change your Facebook password. Until you change the password is changed, your brother can still can access your facebook from his phone if he saved your username and password when he updated the software.

Reply

gravatar

phone hack question

From guest on October 03, 2013 :: 1:42 pm

Hello,

I’m concerned that a verizon flip phone I had in 2007/2008, and eventually a verizon htc android phone in 2009/2010 and both were hacked by the same person. this person wouldn’t have had physical access to the phones. my questions are:
1. How could they have been remotely hacked?
2. if the smartphone was remotely hacked, could the hacker read emails via my gmail app, once they were “in” the smartphone? or would they only be able to intercept voice calls and texts?
3. I still have both phones; would it be possible to find out if there was ever malware/spyware on the phones, and, if so, to what account was my data sent or stored?

thanks

Reply

avatar

Unlikely

From Josh Kirschner on October 03, 2013 :: 2:30 pm

It’s extremely unlikely that someone could remotely install spyware on your phone. I know of no generally available application that would allow you to do that. And the spyware available for Android requires your phone to be rooted in order to access Gmail (again, something that would require physical access).

It is possible to check your old phone for spyware by installing one of our recommended antispyware apps on it. You can see our recommendations and get further guidance here: https://www.techlicious.com/review/mobile-security-apps-perform-dismally-against-spyware/.

Remember that people can also spy on you if they uncover your login information for your gmail account or your phone carrier’s web portal. So if you suspect someone has access to your personal information, resetting you login details to use a new, strong password should be one the first steps you take.

Reply

gravatar

cell detective software

From robert on October 19, 2013 :: 11:31 am

Cell Detective claims to be able to monitor any cell phone without ever touching or downloading any software to the target cell phone.  How is this possible and how does own know that their phone has been compromised and what does one do to prevent this since no programs have been downloaded to their phone?

Reply

avatar

People claim all sorts of stuff

From Josh Kirschner on October 19, 2013 :: 11:57 pm

Reply

gravatar

There are ways you overlook!?

From D.J. Mapes on August 05, 2016 :: 1:26 am

Pardon my impertinance but if you own a programmable scanner and can be within 5 miles of target cell phone then you can indeed listen to conversations, it does require a considerable amount of patience and stockpiled junk food but this is still used under certain circumstances by P.I.‘s and I’m aware of a corrupt CHP officer who used this tech to track drug dealers. Ashamed to admit it but I used it to clarify my Fiancee was cheating, she never gave the ring back which had belonged to my Grandmother! Just saying is all!

Reply

avatar

That's not correct

From Josh Kirschner on August 05, 2016 :: 1:49 pm

Modern cell phones use encrypted digital signals that cannot simply be intercepted by a scanner. Unless that person is using a really, really old phone on a really, really old network, your conversation will remain private.

There are a couple exceptions to this. First, law enforcement agencies have a device called Stingray that mimics a cellphone tower, tricking a target cell phone into connecting to it. Once connected to the Stingray device, conversations can be monitored. However, these devices are very expensive (hundreds of thousands of dollars) and not available on the open market. Plus, you need to be in very close proximity to the target phone to have it connect.

Second, older cordless phones (not cellular) phones transmit analog signals that are very easy to intercept. Perhaps this is what happened in the case you are referring to? Though again, you would need to be in very close proximity to the cordless phone to intercept it.

gravatar

Texts not visible to me but are sent

From Stephen on November 02, 2013 :: 8:37 am

Hi I am using a nokia lumia wp8 and I suspect my sister in law is spying on me,  last week my phone wouldn’t show my texts MSG even though they were being sent and any received, I could part read on the notification screen but when I press open they are not in the text messages so I cannot see what they have said.
Its only when I sent a specific text msg calling her out,  my phone is working again.
You see the sim was her sisters and her dad had also used it but now I have it, she could easily impersonate the billing holder as she is her sister, but I just want to know if the missing texts is a sign I was spied on?

Reply

Some apps...

From Tomas Kosek on December 21, 2013 :: 6:40 am

Hey guys, there are assholes, who will plant this aplication in system - factory reset will not delete it, so if your smartphone acts weird after factory reset, backup all, download your Android version on your PC, move it on SDcard, then on your phone make Factory reser AND FORMAT /SYSTEM and install the android on your SDcard again… but now, without the spying aplication (For example: Cyberius is security aplication what can be moved to the system, so it will be still there after factory reset. But people can use Cyberius to spy on you too. It tooks 5min to install it on your phone ) You better lock your phone with passcode wink

Reply

avatar

Do you have a link?

From Josh Kirschner on December 21, 2013 :: 12:58 pm

Hi Tomas,

Do you have a link for more information on Cyberius? I can’t find anything on it and I’m curious to see how (and if) it avoids deletion on factory reset.

Thanks,
Josh

Reply

Yes I do :P

From Tomas Kosek on January 14, 2014 :: 8:32 am

Sorry, my fault. It’s called Cerberus :D
https://play.google.com/store/apps/details?id=com.lsdroid.cerberus&hl=cs
If you have rooted phone, you can put this app in /system - it will be still there after full wipe or factory reset
Sorry for very slow response..
-Tom

Reply

avatar

That is scary

From Josh Kirschner on January 31, 2014 :: 3:59 pm

Tom, Thanks for bringing Cerberus to my attention. It is definitely the scariest app I’m aware of that’s currently available in Google Play. Worse, I tested numerous antimawlare apps against it - McAfee, Norton, Lookout, Avast, ESET, Kaspersky, Trend Micro - and they all failed. Only TrustGo and AVG appropriatly flagged it as a serious risk.

I’m following up with the security vendors to determine why they’re continuing to miss such obvious risks.

gravatar

yeah but the assholes look over your shoulder

From kitty on March 29, 2014 :: 1:53 pm

and you don’t notice them eye balling your passcode to get into your phone.  I hate F@*ked up people.  There’s so many scams going today it’s just too much to ever think you’re ahead of this prey on people game with their privacy and personal info.  Some do it cuz they have no life.  others because they have no life, love 3 hots & a cot & just enough skill to steal & fraud others usually people they cling onto and call friend…., then theres cops that get a hard on for you and you aren’t even the right guy.  Then theres everyone else…google big time plus….your local home improvement store that tracks how long you shop.  you can run but you can’t hide.  every traffic light where i live has a camera on it to watch the traffic flow they say…right?  can’t even take cops on a wild chase through a town anymore n get away with it.  not that i would.  not my thing.  I can log into a site that shows me cameras on 101 freeway and I can tell who my friend is bringing to my house cuz I’ll see her car driving down to my house.

Reply

gravatar

To Tomas re: Cyberious

From Jackie on November 29, 2015 :: 4:44 pm

How can I know if Cyberius is on my phone?  It’s Android Samsung Core Prime.

Reply

gravatar

Avoid getting Spied by these settings

From Jack on December 23, 2013 :: 6:26 am

Just disable location services to off…
No one can hack your phone..If its on..Then anyone can and its easy and even kids can…
I know this blog is old but its going to help many who doesn’t know.
In iphone its under settings—> privacy—> Location services.
Not sure about android setting to disable location service.
Please set your location service to off.. the hacker only gets through your phone if its on.

Hope that helps.. Please let me know if you need any other help.

Reply

gravatar

frequent locations

From kitty on March 29, 2014 :: 1:38 pm

not too many people know about the logging of where people go most.  you gotta dig a little for this.  i can’t find it in iPad just iPhone running latest software iOS 7.1   it’s in settings under privacy under location services> scroll to very bottom and it’s there under system services> scroll once in system services and it’s at bottom of that page.  it will tell you where you go most times you’re away from home.  if that scares you then TURN IT OFF.  It is very accurate.

Reply

gravatar

Avoid getting your contacts details spied..

From Jack on December 23, 2013 :: 6:33 am

Just adding to my last post..
Under the same setting location in iPhone you will find contact just below location service.

Check which app is using your contact details..JUst block them in using your contact details, never allow them to use your contact details..

It has helped many .. it may help you as well..

Reply

gravatar

I know I'm not crazy

From kymykat on December 28, 2013 :: 3:39 am

I will admit to being Just dumb n in love with a complete charming pyscopath.  where do I begin?  My house is now bugged by my EX and his friends.  Criminals.  I just pieced together some things.  Still some things need more info to prove.  But he has hacked my iphone5s, my email accounts.  He knows all of my personal info and even has a new lil criminal chick who looks just like me down to the hair style.  And they come into my house and my neighbors just think it’s me with him.  I just heard about this from neighbor who said “Hey how come you didn’t go out of town last weekend?”  But I did go out of town.  And I haven’t seen or been with EX in two weeks.  He shouldn’t be around.  I did reset of my iphone5 2 weeks ago and changed passwords and apple ID.  And it just started happening again.  My phone acting weird.  a lot of data used when I know my phones not in use.  I bought a volt electric/gas powered car that has onstar on it and he got his hands on it one night before our break up and he was able to program it so he knew where my car is at.  the key (one of two keys) came up missing after my last night with him.  The other day the car was on when I went outside to get in it.  He can do that from his phone after hacking my account with onstar.  My computer shows remote activity in logs messages.  I am going to take in to apple store.  Him and his friends have nothing better to do than to spy on people….even use their personal info for their own gain.  My most recent case of ID fraud I can’t yet prove but I’m sure it’s him.  My phone is used as a listening device for him.  Even my home phone as well.  My home alarm him and his friends messed with til it’s no good n I don’t use it any longer.  I need solid proof though of credit fraud.  I need people who have answers.  Any ideas on what to do?

Reply

gravatar

sorry about my typos n misspelled words.

From kymykat on December 28, 2013 :: 3:42 am

i forgot to go back n do spell check.  I have to run. forgive me!!!!!  LOL please.

Reply

gravatar

Roommates had TOTAL access to my AT&T Galaxy S4.

From Levi on January 07, 2014 :: 1:57 pm

I live with three other dudes. One of them is very “techy” with smart phones. He can root an android phone in his sleep and has written for small tech websites on the past. He helped me root and (unsucessfully) install a version of Cyanogenmod on my phone. His S4 was from Verizon so the rooting process was a little bit different. I couldn’t get the nightly updates because my root instalation was a bit wonky, so I was using old firmware for quite a while.

This roommate of mine has told me about using spy techniques on other people’s phone before. He said he’d only do it to someone he hated.

I fully believe my roommates had compete access to my SMS, microphones, cameras, and Web browsing history. I was using another roommate’s wifi almost all the time.

I could hear them laughing and reacting to what ever I was texting my girlfriend as I was typing it. I would type a whole message, hear them reading it out loud though the wall, then delete it and wrote something else completely. I would scroll up through the convo and hear them reading out loud and talking about what my girlfriend and I were discussing.

I would cover up my phone and set it down on the ground and would hear them react to what I was doing. As soon as I open the door to my room, I would see my techy roommate’s door slam, then I would talk to my other roommates (who were AWFUL Liars.)

I since factory reset my phone, so I’m on Samsung’s stock Touchwiz 4.3 Android now. I want to prove that this was happening and press charges and ruin their lives. I know they were all in on it.

Reply

avatar

I think you're out of luck

From Josh Kirschner on January 14, 2014 :: 2:22 am

It’s very hard to get police interested in these types of crimes because they’re very difficult to prove. Even if they found spyware on your phone, how would they know who put it there?

In any case, since you’ve factory reset the phone, whatever spyware was on there is likely gone now. Perhaps before the phone was reset you could have contacted an attorney and tried to work out a “sting” that would have proven they had access to the information on your device. But sounds like a lot of work in the hopes of proving your roomates are jerks.

Reply

gravatar

sim card

From brad on July 31, 2015 :: 7:11 am

Will replacing sim card stop any hacking / bugging ?

Reply

avatar

No

From Josh Kirschner on July 31, 2015 :: 9:28 am

The spying apps we’ve used operate independently of the SIM card. Unless it is the SIM card itself which has been cloned (far rarer these days), changing the SIM card will have no impact.

gravatar

cell detective Information *DOES* exist

From MyDogIsSmarterThanMe on January 11, 2014 :: 7:23 am

I have my Masters in Information Security.

Robert, Josh Kirschner, unfortunately there *IS* scam software out there—I don’t know this one.

However YES it is possible to spy on your phone without physical access to it and *NO* I’m not going to say how. It is of course *ILLEGAL* in the United States.

The only I’m POSITIVE OF (which Ironically is the most “dangerous” and “Intrusive” is to find your precise location if you have GPS/or Phone turned on).

Just so you know I’m not saying this to be a “Boogey Man”, if you simply Google List of Cell Phone towers (then your City name)

There’s 1000’s and 1000’s of sites out there that list EXACT GEODATA where cell phone Towers are.

THESE ARE *VERY LEGAL* AND HAVE *VERY VALID* reasons to exist. *YOU* can use to see if you are in a “Dead Zone” or low coverage for the area you live in by provider,etc.

Programmers making Software can use it to determine if it’s your phone/the cell,etc. To look through Error Logs. etc.

The reason these ILLEGAL (tracking sites) can’t be shut down is they are not American Made sites.

I have a previous post pending moderation, however, to let you know *NEVER EVER EVER* give someone your IEMI# for your phone or ICCID#
IEMI# is like a SSN# it unique (in the *WORLD* to you and *THAT PHONE* (or whoever registered that phone)

To give you an IDEA, IEMI# is 14-Digits
The ICCIDI# is 20-Digits

Of course all of those digits have “Meaning”
It reveals the phone model/make/carrier/who you are,etc.

ALSO—-THOSE SITES ARE ALL OVER THE WEB—-I WOULD FIRMLY SUGGEST TO *NOT* put yours into the site to “verify” what it shows, 95% plus chance the site could be harvesting Data (for nefarious or otherwise reasons).

The *ONLY* time you want to use a site like that (You’ll see in my other post) is if purchasing a used phone over the web. It reveals if the Phone has been reported stolen,etc. AS well.

**

But, to answer your question. Yes, it’s possible. Not all the phone data is out there, I’ve not even tried the site as don’t want to get myself in trouble.

I will tell you simply having your phone number, allows a nefarious person, to “mine” the right places for what I’ve said above.
Think about it, we live in a world of *EVERYTHING* AND i DO MEAN *EVERYTHING* IS IN A DATABASE SOMEWHERE.
***********************************
Here is just but *ONE* person was able to create (using Statistical Modeling—wityout your “true personal” data).

From the *MIT TECHNOLOGY REVIEW*
http://www.technologyreview.com/news/514351/has-big-data-made-anonymity-impossible/

TAKE VERY SPEICIAL NOTE—-THE VERY LOW AMOUNT OF PHONES THEY HAD TO TRACK THE “BIG DATA” CAME IN LOOKING AT EVERY SINGLE DATA POINT BY SECOND WHERE THEY WERE

They can tell with an *ABOVE 80-PERCENT ACCURACY*—80-WEEKS IN ADVANCE Where you will be. ORWELLIAN HUH?


QUOTE: showed they could predict a person’s approximate location up to 80 weeks into the future, at an accuracy of above 80 percent. To get there, the pair mined what they described as a “massive data set” collecting 32,000 days of GPS readings taken from 307 people and 396 vehicles.

***
Thus one *VERY EASY* front line protection *NEVER* give out your “Personal Phone Number” to someone who does not need it.

There’s plenty of services out there. My apology, I only have “Brand Names”——I’m neither supporting them (or associated with them) but so you can Google for it for you to decide.

Apps like “BURNER” are for VERY TEMPORARY (2-3-4 month reasons), you’re buying/selling something on Craigslist,etc.

I know they have other apps like this. But look for “Burn Number”/Temporary N Umber”—things like that

Another solution is Google Voice. THIS is something more “Permanent”. I use this if someone needs a “Work Number” or someone I know I’ll follow up with, but don’t want to use my private number.

Or “Masked Phone Numbers” (other key words)
only downfall to these is that once you give it out too much, then you might get calls you don’t want. Google Voice type app (and Burner type app) both allow Texting,etc.

Google Voice, if you don’t want them calling you again, you can “Block” the number and it will give them the “Number Disconnected”  (also cool is you can create a different Inbound V.M. based on each friend)

Finally make sure whatever App you use, gives you the *CHOICE* when you make an outbound call (like I use with Google Voice app) would you like to use GV number or your number….pick accordingly.

**  Stay cautious with personal info and it will be your best protection (above any app,etc.)

Reply

avatar

Thanks for your comments

From Josh Kirschner on January 14, 2014 :: 2:17 am

Cell phone tower data is public, but it’s a big leap to go from there to getting access to and actually tracking the individual phone data from those towers. I also haven’t found a way for an individual to track a phone location via it’s IMEI. And, after considerable research, I have yet to verify and spyware that can be installed without physical access to a device (except location trackers, such as iCloud or Android device manager, which simply require user account access).

If you’re uncomfortable providing more information in the comments, please email me at josh at techlicious dot com with more info.

Reply

gravatar

Blank Mms as a install tool?

From Hottyjules on April 27, 2016 :: 7:18 pm

So is it possible for authorities to send a blank mms from a recovered phone to clone the persons phone that received the message?  If that happens, would you need to get a new Sim card? A new phone? A new account?

Reply

gravatar

Help!

From Kellie on January 23, 2014 :: 9:11 am

Hi techlicious people of our world.
I used to think I was pretty techy until recently and I’m losing my mind. I need help and need it now! I’ve moved in with a boyfriend who I’m CERTAIN is somehow monitoring my computers and now, IPhone *I didn’t have a smart fone when we met) 
  He bought me an Ipod (I was and am newish to ITunes) for my 25th birthday and he got me the certificates to buy songs. I created my apple id w my gmail email and started downloading. One day, I noticed all his songs were on my Ipod. I shrugged it off; mind you, you told me that it did’t come with its own charger just USB ADAPTER and id have 2 charger it via his laptop while we were out of town. I was like, okay, but Wow, Apple can’t shell out an AC/dC outlet? Lame.
  Before I get my iPhone, my computer is hacked. The IT guy said it had to have been done through a jumpdrive and so we got ADT. he saved the computer, it worked but I didnt trust our LAN network so I didn’t go on it. (reason being bc I would use a LAN scan app on my old android phone and it would say there were loopback 127.1.0 somethings on the network and other things.) Then, one day I turned it on—mind you, I push boundaries with my laptop and to be careful w/ it and I FOUND IT UNDER A HUGE 20 GAL STERILITE TUB in AN ATTIC. It didn’t work, it doesn’t work. I bought an HP LAPTOP. iT died 2 days but I returned it.
  We had Roadrunner, when we first ordered it we were paying 30 some bucks, I caught wift of a bill and it was 79.99….idk what we were paying for. Cancelled it and to my IPHONE…
  First day at ATT the man asked for my apple id, I gave it to him. I get home. My phone is NAMED “josh”.  I flipped. Josh said its bc “he paid with it with his credit card.”  Ha. Please. Now his work gave him an iPhone and 2 laptops. When he goes on his comps as a hotspot it will say “Mike’s IPhone” connected” and Kelly’s IPhone connected.  (mines through Ethernet 2???)  Then on the other laptop he has, if he connects via his hotspot it says the infamous, ‘josh’. 

I could go on forever here but I need to know what to do. I rebooted my iPhone, got a new sim card, got a new icloud address. nothing works!!!!!!  How can I Prove whos doing this? (not to mention my passwords are changing daily ) 
after finding it IN HIS closet/attic space under a huge tub barried6 Months I get an IPhone 5. I’m so stressed from this its unbearable.

Reply

gravatar

sucks

From mike koebel on February 13, 2017 :: 1:10 am

i almost just went through theexact same thing ive been investigating my ass off,,its a headache,,but i went through hell because of it

Reply

gravatar

at know the problem is not Spyware and malware

From Infidelity on January 31, 2014 :: 2:20 pm

for me the problem is not this aplications…well..when you install this aplications they say what permissions needed…well…is your responsability why you install..and the second ...I have any aplications in google and I know how work…if you have any app work in bakground and send gmails you can see in gmail sends..the question is “google” “apple” and others and others Big companys they control our information and any person say…nothing..they copy all contacts…numbers phones…and track your position…this is the problem… .(JavaScript must be enabled to view this email address)

Reply

gravatar

Track an Android Phone Without using Internet

From Jence on February 19, 2014 :: 4:34 am

You can easily use Ghostrack for android for tracking anyone from anywhere. Its free and simple but full of useful features. Net connection is not necessary in tracking end to track down any one. Even if you approve once from the other device the person whom you want to track he will not know that you are tracking him so try it once. worthy of downloading

Reply

gravatar

how to do any of these...

From mimi on August 02, 2017 :: 4:07 am

When he has it always password protected, to even get ONTO the phone or computer.?? Anyone know?

Reply

My cousin needs your help!!!

From Sherri Inez Atchison-Wright on February 19, 2014 :: 7:40 am

SHe was in a bad relationship.  SHe left him and he has a drug issue lets just say that he stays up a lot and plays on electronics.  Somehow he kept playing until he figures things out on how to mess with her.  He hacked her facebook, her yahoo, her gmail.  She even receives phone calls from yahoo now about a man trying to change her password on her yahoo since she has fixed it where is supposed to be locked out.  She has changed her cell phone number and some how after four days of him staying up hacking he got it and posted it on is facebook wall for me to see so that way I could let her know that he had her new number.  I am not very tech saavy but I try to help with as much as I can on all of these things.  He is my father in law but we do not speak.  Lately her phone has been acting weird though and he has been sending her messages like who are you talking to at 1:00 in the morning and random things, her phone even though she is on wifi almost all the time has start using almost 2 GB of data in like 20 days and I do not even use that much and we have the same phone I use my phone comstantly.  I am just wondering if you can help us.  I know that he has somehow tracked her phone and he gets messages on when she is using it and where she is.

Reply

gravatar

help

From mallory on March 08, 2014 :: 12:13 am

I cant seem to find this app . But is their any other app that can be used to see what someone else is doing in their web browser . Or if someine can send me a link. An if their is a app that i can download to send him a text but when it comes up on their phone it comes up like its someone else that they have in their contacts

Reply

avatar

?

From Josh Kirschner on March 10, 2014 :: 8:29 am

There are plenty of psy apps out there that you can install to spy on someone’s web browsing (we’ve covered them in another article) and there is probably a SMS spoofer, too. But spying on someone’s phone without their knowledge is illegal.

Reply

gravatar

mobile incognito monitoring

From whitney on September 09, 2017 :: 1:02 pm

I’m have trouble finding an app that will monitor mobile private browsing for my childs phone!! I know desktops have extensions for this and ways to completely disable incognito mode altogether and use a different web browser that doesn’t include that feature but I’d like to monitor the private browsing from the factory browser if possible!! Can you help me pleaseeee?????

Reply

gravatar

i have someone who links a trackview acct to my phone

From ben lancaster on November 02, 2017 :: 4:22 pm

its been going on for 2 yrs my wife acts like im doing it but im not and dont have any idea how to stop it dont matter how many times i change my email address or factory reset my phone or even change phones   its happened to a phone that i just got before i even made it to my car how i need it to stop please help

Reply

gravatar

Its called caller id faker.

From Xavier Davis on October 15, 2017 :: 3:09 am

Its called caller id faker.

Reply

gravatar

twilite zone

From Brooke McManus on March 19, 2014 :: 12:17 am

Hello. So, I purchased a brand new out of the box Samsung Galaxy S3 and and I am on a plan with my girlfriend of mine and, our carrier is At&T. With that being said to say I am having technical difficulties with my phone would be an understatement..! I purchased my phone in Dec.15,2013 and Feb.10 2014 I had to get a brand new battery in replacement of the old one I dont know how to explain it besides the juice would get sucked iut if the battery nothing wrong with the charger. Then after its like what isnt my phone doing…my set up constantly switches and changes, ill be unable to call/text still recieve them, apps that I didnt download will show up on my phone, I will go to call someone from my contacts and it will switch and call a completely different person from my contacts,I noticed that a previous old number I used to have was programmed as a contact for me and I sure as hell didnt add it, get this ine…I know people who own the same exact phone as me and every single one of them have made comments about my phone and how its set up is weird and they always ask me whats wrong with your phone and why is it set up like that and my response is like what? Thats the way it was when I bought it, I have even had a friend say and I quote your phone is weird it looks and feels like its a fake phone he too has the same identical phone as I do! I can be talking in the phone and it appears as though like the call was dropped because either party can hear eachother but the time of our call is still going and then there are those times we get disconnected, I can be making important/random type phone calls and and a beeping noise throughoout the duration of my convo, ive had people tell me that they wont talk to me unless I call in another line,it I could keep going but I gave you a good iverview of my issues. In addition, I have made numerous calls to at&t and had techniccal support try and figure this out and nothing! We did at least three master resets, switched out the sim card, and alit of troubleshooting but have not succeeded in coming up with any answers. Help! Honestly I think my phone is being hacked,bugged,tracked but for sure accessed by someone and its driving me nuts for many reasons but mainly because I am the type of person that if something doesnt make sense or I dont understand im going to research until I have an answers! Please get back to me….!

Reply

avatar

Not sure what to make of that

From Josh Kirschner on March 20, 2014 :: 8:11 pm

You’re describing an awful lot of issues. Some could by spyware related, others probably not. And some just don’t make sense (What apps are you seeing that you didn’t download?). So it’s really hard to evaluate what’s going on without actually seeing your phone.

However, it sounds like you’ve already done factory resets. And I assume that you’ve downloaded and run the antimalware apps that we recommended in our story and they found nothing?

Reply

gravatar

he accesses my phone through his phone

From worries on March 19, 2014 :: 8:54 am

Hi,

Someone is accessing my iPhone 4s through his own iPhone.

It’s his phone but lock screen, facebook, gmail everything appearing are MY details. I know he is doing it to me because he did it to someone else before

Please let me know how I can stop this and protect myself.


Thank you

Reply

avatar

Need more details

From Josh Kirschner on March 20, 2014 :: 8:20 pm

Are you saying that you’ve seen his phone and know your accounts are on it? Or you suspect he’s doing it because you think he did it to someone else?

The only way he could have Gmail and Facebook loaded on his phone with your accounts is if he has your account login info (email and password). So the first step would be to change your password for those accounts. You may also want to read our article on what to do when your email gets hacked: https://www.techlicious.com/tip/what-to-do-when-your-email-gets-hacked/. You can also set up “two-factor authentication” to provide more security.

Reply

Read More Comments: 1 2 3 4 5 6 7 8 9 10 11 12 13 14

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Newsletter Archive
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.

site design: Juxtaprose