Spyware and stalkerware have become one of the most serious threats to privacy.
With their help, a third party can:
- read your messages,
- track your location,
- record conversations,
- spy on your screen or camera,
- access photos, files, and call history,
- take over accounts (Google, Apple ID, WhatsApp, Messenger).
As a digital forensics expert and licensed private investigator, I increasingly encounter cases where someone doesn’t even realise they’ve been monitored for months.
That’s why I’ve prepared a practical guide: how to detect spyware on phones and computers, what the symptoms are, and what steps to take to regain security.
What Are Spyware Programs?
Spyware
Software that:
- collects user data,
- monitors activity,
- sends information to the installer.
Often used by people wanting to control a partner, employee, or child, but also by cybercriminals.
Stalkerware
A special category of spyware designed for:
- tracking location,
- reading messages,
- monitoring social media,
- recording microphone/camera.
Most commonly installed in the context of relationships, psychological abuse, or family conflicts.
The Most Common Symptoms That Your Phone or Computer Is Being Spied On
Although spyware is designed to be undetectable, subtle signs often appear that may indicate monitoring:
General Symptoms
- Rapid battery drain – spyware constantly sends data in the background.
- Overheating – the device heats up even when idle.
- Increased data usage – unexpected jumps in mobile data or Wi-Fi consumption.
- Slow performance – delays, freezing, or apps crashing.
Specific Symptoms on Phones
- Unexpected pop-ups or ads – even outside browsers.
- Unknown apps – check settings for unfamiliar applications (often disguised as system tools).
- Deleted or altered messages – messages disappear or are marked as read without your knowledge.
- Strange noises during calls – echoes, clicks, or background noise.
- Location tracking – the device “knows” your location even with GPS off.
Specific Symptoms on Computers
- Unknown processes – high CPU usage by unfamiliar programs (check Task Manager).
- Changed settings – browser extensions, antivirus disabled without reason.
- Remote access – unexpected logins or mouse movements.
- File modifications – files opened or modified without your action.
Behavioural Symptoms
- Someone knows details from your private conversations or locations.
- Unusual account activity (e.g., logins from unknown devices).
- Partner/employer asks questions suggesting access to your data.
Note: These symptoms can also indicate other issues (e.g., old battery, malware). Professional analysis is needed to confirm spyware.
How Does Spyware Get Installed on Devices?
On Phones
- Physical access – someone installs the app while you’re away (e.g., mSpy, FlexiSPY).
- Malicious links/apps – clicking a phishing link or downloading a fake app.
- Jailbreak/Root – bypassing system protections (more common on Android).
- iCloud/Google sync – if someone has your credentials, they can remotely monitor.
On Computers
- Malicious software – infected attachments or downloads.
- Remote access tools – like TeamViewer, installed without knowledge.
- Browser extensions – disguised as useful tools.
Pro Tip: Spyware often hides as system apps (e.g., “System Update” or “Device Health”).
How to Detect Spyware Yourself?
Basic Steps for Phones
- Check app list – go to Settings > Apps, look for unfamiliar ones (e.g., Cocospy, Spyic).
- Monitor permissions – check which apps have access to microphone, camera, location.
- Scan with antivirus – use reputable apps like Malwarebytes or Avast (but they detect only known variants).
- Check battery usage – Settings > Battery, look for apps consuming a lot in the background.
- Monitor data usage – check which apps send the most data.
For Android
- Use ##4636## to check cell info.
- Check for “Unknown Sources” enabled.
For iPhone
- Check for jailbreak (Cydia app).
- Use MVT (Mobile Verification Toolkit) for advanced scans.
Basic Steps for Computers
- Task Manager – check running processes (Ctrl+Shift+Esc on Windows).
- Installed programs – uninstall unfamiliar software.
- Browser extensions – remove suspicious ones.
- Antivirus scan – use ESET, Kaspersky, or Windows Defender.
- Network monitoring – check outgoing connections with Wireshark.
Warning: Amateur detection can alert the spy and lead to evidence deletion.
Professional Detection – Why It’s Worth It?
As a forensics expert, I use advanced methods:
- Device imaging – full copy for offline analysis.
- Timeline reconstruction – when and how spyware was installed.
- Rootkit detection – hidden malware.
- Remote access traces – logs from iCloud, Google, Microsoft.
- Court-admissible report – useful in legal cases (divorce, harassment).
This allows not only detection but also evidence gathering for police or court.
Tools and Methods for Detection
Free Tools
- Malwarebytes – good for basic scans.
- Avast One – detects stalkerware.
- Certo – iPhone-specific.
- Incognito – Android stalkerware scanner.
Advanced Tools (Expert Use)
- Cellebrite UFED – physical extraction.
- Oxygen Forensic – cloud and app analysis.
- MVT/AMNESTY – iOS spyware detection.
Manual Checks
- Unknown accounts – check linked devices in Google/Apple settings.
- Forwarding – check call/SMS forwarding.
- VPN/Proxy – unusual network settings.
Self-Detection vs Expert Analysis
| Method | Effectiveness | Risk |
|---|---|---|
| Free anti-spyware apps | low | false results, missing stalkerware |
| Antivirus | medium | detects only known variants |
| Manual phone check | low | spyware can hide |
| Expert analysis (digital forensics) | high | safest method, possible court opinion |
What to Do If You Suspect You’re Being Spied On?
Do not reset the phone or computer.
You may destroy evidence.Do not change passwords from the suspected device.
Do not install “scanners” from Google Play / App Store.
They often worsen the situation.Contact a specialist.
Most important: confirm if spyware exists before removal.
How Can I Help?
I offer:
- spyware/stalkerware detection,
- phone and computer analysis,
- data recovery,
- timeline reconstruction,
- account takeover verification,
- preparation of technical or court opinion,
- full confidentiality and evidence security.
👉 Service details:
Detecting Spyware Programs »
Summary
Spyware programs are becoming more advanced and harder to detect.
Do not rely on free apps or random tools – in most cases, spyware operates much deeper.
If you have suspicions:
better to check than regret.
Professional analysis allows:
- confirm or rule out spying,
- secure evidence,
- regain security,
- prepare material for a potential case.
If you want to know if your device is being monitored — contact me. I’ll respond the same day.
Get in Touch
Email: biuro@wichran.pl
Phone: +48 515 601 621
Author: Piotr Wichrań – Court-appointed IT forensic expert, IT/OT cybersecurity specialist, licensed private investigator
@Informatyka.Sledcza