Spyware & Stalkerware Detection • Mobile Device Forensics • Phone Analysis
Do you suspect that someone is spying on your phone, reading your messages,
or knowing too much about your private conversations and whereabouts?
This may indicate the presence of spyware or stalkerware installed on your device
—or access gained through compromised accounts.
I offer professional spyware and stalkerware detection on:
- Android / iPhone devices,
- selected computers,
- accounts (Google, Apple ID, email, messaging apps).
I work as a digital forensics expert and licensed investigator,
not as an “antivirus installer”.
All examinations are performed using forensic methodology,
not a single “magic scanner”.
What exactly can be detected?
During the examination I can identify, among others:
- stalkerware – apps used to monitor a partner or family member,
- spyware – software that collects activity from the system and apps,
- tools for remote screen/microphone access,
- apps pretending to be parental control tools but used for surveillance,
- hidden apps with broad permissions (SMS, microphone, location),
- suspicious call/SMS forwarding rules (MMI/USSD),
- traces of phone cloning attempts or account takeover (Google, Apple ID, messaging apps),
- unusual logins suggesting unauthorized access,
- other forms of covert monitoring or intrusion.
Where technically possible, the analysis can be extended to a full forensic device examination
including recovery of messages, activity timeline, and more
(see: Mobile Device Examination »).
Typical symptoms — when you should request an analysis
Clients often report that:
- someone knows details of conversations never written down,
- a partner/ex‑partner knows your location and meetings,
- the phone behaves strangely (overheating, battery drain, screen wakes up),
- unknown apps appear and disappear,
- suspicious SMS links or notifications appear,
- someone claims: “I know what you wrote on Messenger / WhatsApp.”
These are signals, not proof — but they justify a professional forensic check.
How spyware detection works
1. Initial interview & risk assessment
We briefly discuss your situation, symptoms, devices and accounts at risk.
2. Instructions to preserve evidence
You receive specific guidance on what NOT to do,
to avoid destroying valuable traces (no resets, no random apps).
3. Technical analysis of device and accounts
Depending on the case:
- review of installed apps and background services,
- analysis of app permissions (camera, mic, location, SMS),
- inspection of system logs (within possible forensic scope),
- review of call/SMS forwarding rules,
- analysis of account access logs (Google, Apple ID, email, messaging).
4. Spyware / stalkerware / surveillance detection
This includes both commercial stalkerware and
“DIY” setups (hidden apps, misused parental controls, access accounts).
5. Report + recommendations
You receive:
- a clear statement whether compromise was detected,
- identified risks and vulnerabilities,
- specific recommendations: what to remove, change or secure
(passwords, 2FA, accounts, device replacement if needed).
If required, the process can be extended to prepare
forensic‑grade evidence for legal use.
Spyware detection vs “antivirus apps”
Many clients start with:
- a free antivirus,
- “anti‑spyware” apps from ads,
- random scanners from Google Play.
Problems:
- some spyware/stalkerware is designed to bypass antivirus scans,
- many scanners do not detect apps with valid certificates,
- “cleaning/optimization tools” may erase traces of compromise.
Professional spyware detection requires:
- behavioural and permission analysis,
- working with artifacts, logs and accounts,
- the ability to prepare evidence that stands in court,
not a single “SCAN” button.
When phone analysis is not enough
Sometimes the key lies not in the device, but in:
- cloud accounts (Google, Apple ID, email, messaging),
- login history and access tokens,
- unauthorized sessions on other devices,
- mailbox/email forwarding rules.
In such cases, the service includes both device analysis
and full account security verification.
Pricing
The cost depends on:
- number of devices and accounts,
- type of suspected compromise (common stalkerware vs advanced intrusion),
- whether you need a security screening or a forensic expert opinion.
Examples:
- Security screening (1 device): from €120
- Extended spyware/stalkerware analysis + report: from €250
- Forensic technical opinion for legal cases: from €380
Each case begins with a brief, confidential consultation.
Why choose my service instead of an “app from the internet”?
- I do forensic analysis, not app‑based scanning.
- As a digital forensics expert witness, I consider the evidence value.
- I help not only detect the problem, but also:
- preserve evidence,
- prepare for lawyer or police consultation,
- build a future security plan (devices, accounts, habits).
- Full confidentiality and discretion are guaranteed.
Combined service — spyware detection + full device examination
If you also need:
- message recovery,
- reconstruction of the timeline of events,
- evidence for court proceedings,
I can extend the service to a full forensic examination:
👉 /en/services/smartphone-analysis/
FAQ
How do I know if someone is spying on my phone?
Behavior often reveals it — someone knows too much about your movements or conversations. Strange notifications, overheating, rapid battery drain or unknown apps are signals. Only a proper forensic analysis can confirm whether compromise occurred.Will a standard antivirus detect spyware/stalkerware?
Not always. Many stalkerware tools are designed to avoid antivirus detection. Proper detection requires log, permission and behaviour analysis.Can detected spyware be used as evidence in court?
Yes — but only if it is properly preserved and documented. I perform examinations according to forensic standards and can prepare a report suitable for legal proceedings.Do I need to leave my phone for several days?
It depends on the case. Basic checks can be done within a day; more complex cases require more time. We establish this upfront.Can I keep using the device after spyware removal?
Sometimes yes — sometimes no. If compromise was deep, replacing the device is the safest option. The decision is made after full analysis.Contact
📞 Phone: +48 515 601 621
✉️ E-mail: biuro@wichran.pl
If you suspect surveillance or unauthorized access — contact me.
I will tell you what can be checked and how to do it without destroying evidence.