Protect Your Gadget!

Protect Your Gadget
Is your mobile phone being used against you?

Unfortunately, your phone calls and information could potentially be exploited for monitoring, tracking, control, or harassment. Trust your instincts. If you suspect someone else may be controlling your mobile phone, consider the following questions:

What might they know?
General Information: If someone seems to know about your conversations but doesn’t have detailed information on the content or topics discussed—such as what you talked about, wrote, or shared—it’s possible they have access to your call history, billing records, or other account information. Alternatively, this person might have spoken with someone you’ve communicated with.

Message Content:
If someone is aware of the content of your messages, it’s likely they are using another device linked to your account, monitoring your device, or have received your messages from someone you communicated with.

Voice or Video Calls:
If others know the content of your voice or video calls but weren’t physically near you to overhear the conversation, and the person you spoke to hasn’t shared details, it’s possible stalkerware is being used.
Be cautious: anything you do on your mobile phone (even searching for information about stalkerware) may be accessible to others. Learn more about stalkerware using a trusted device.

Does someone who monitors you have access to your phone?
Often, monitoring requires physical access to your phone. Someone who regularly checks who calls or messages you might install stalkerware on your phone to remotely track your activity. Installing such apps takes just seconds—so avoid lending your phone to anyone. Physical access allows them to download apps, change account settings, or alter security features, making your device more vulnerable.

Do others have access to your online cloud (account)?
One method of monitoring your phone is by accessing your mobile provider account or the cloud service linked to your phone (e.g., Google or Apple). If someone else’s name is on your account or if they’ve impersonated you and convinced the mobile provider they are the authorized owner, they could enable features like location sharing, access billing records, view call history, and more.

Is your location known to others?
Phones and apps can share your location. Check your device and app settings to restrict location sharing. Most phones have features that help locate lost devices—this could reveal your location if someone else also has access to your phone or account.