In an era where smartphones are constant companions, unwanted tracking—whether through location-sharing features, hidden spyware (often called stalkerware), or physical devices like AirTags—has become a serious privacy concern. This can stem from abusive relationships, curiosity gone wrong, or even malicious intent. The good news is that most tracking methods leave detectable traces, and you can often identify and stop them yourself.
This guide outlines clear, actionable steps to uncover if someone is monitoring your movements or activities, focusing on common scenarios in 2026. Start with the simplest checks and escalate as needed. Always prioritize your safety—if this involves potential abuse or stalking, document evidence and contact authorities or support services before confronting anyone.
Recognize the Early Warning Signs
Before diving into technical checks, pay attention to behavioral clues—these are often the strongest indicators:
- Someone (an ex-partner, family member, friend, or acquaintance) repeatedly appears at your location without explanation or comments on places/activities you never shared.
- They display detailed knowledge of your conversations, searches, routes, or exact whereabouts.
- Suspicious reactions occur when you disable location sharing or hide your status.
- You receive unexplained alerts about unknown devices accessing your accounts.
Multiple signs together increase suspicion. Trust your instincts—if something feels off, investigate further.
Check Built-in Location Sharing Features (Quickest Fixes)
Most casual tracking exploits legitimate tools someone gained access to.
On iPhone (iOS):
- Open the Find My app and tap the People tab to view anyone with access to your real-time location. Swipe left on unwanted entries and select “Stop Sharing My Location.”
- Go to Settings > [Your Name] > Find My and verify settings. Check Settings > Privacy & Security > Location Services to revoke “Always” access for suspicious apps.
- Watch for the orange/green dot (mic/camera in use) or arrow (location active) in the status bar when you’re not using those features.
On Android:
- In Google Maps, tap your profile > Location sharing to see and revoke active sharers.
- Navigate to Settings > Location > App location permissions and review apps with “Allow all the time” access.
- Check Settings > Google > Find My Device for linked devices.
- Use the Privacy Dashboard (in Settings > Security & privacy) to monitor recent location, camera, or microphone access.
Immediately revoke any unauthorized sharing.
Identify Signs of Spyware or Stalkerware
Stalkerware runs hidden, transmitting location, messages, calls, photos, and more. Look for these red flags (several together are highly suspicious):
- Battery drains unusually fast, even in standby—constant GPS use is a culprit.
- Phone overheats, runs slowly, crashes, or reboots randomly.
- Data usage spikes without explanation (check monthly stats in Settings).
- Screen lights up, apps open/close, or icons appear unexpectedly in standby.
- Strange noises (clicks, echoes) during calls.
- Unfamiliar apps, icons, or configuration profiles.
- Random mic/camera indicators when idle.
Detection and Removal Steps:
- iPhone: Check Settings > General > VPN & Device Management (or Profiles) for unknown entries—remove them. Review Settings > Privacy & Security > App Privacy Report for odd activity. Update iOS to patch vulnerabilities. Avoid jailbroken devices, as they make infection easier.
- Android: Go to Settings > Apps > See all apps (sort by recent installs) for anything suspicious. Enable and run Google Play Protect scan (Play Store > Profile > Play Protect). Ensure “Unknown sources” or sideloading is disabled if not needed.
- For both: Change passwords (starting with Apple/Google accounts), enable two-factor authentication (2FA), and sign out of all sessions via account security pages (e.g., appleid.apple.com or myaccount.google.com).
- Install trusted security apps (e.g., Malwarebytes, Bitdefender) for scans—though advanced stalkerware may evade basic tools.
If issues persist, perform a factory reset (back up data first, but set up as new to avoid re-infection). For deep-rooted cases, professional forensic help may be required.
Detect Physical Trackers (e.g., AirTags, Tiles)
Modern systems alert you automatically:
- iPhone: Receive “Unknown AirTag Traveling With You” notifications—tap to play a sound or use Precision Finding to locate/remove it.
- Android: Enable Unknown tracker alerts in Settings > Safety & emergency (or use Google’s built-in scanner). Download Apple’s Tracker Detect app from Play Store for manual scans of nearby AirTags.
- Physically inspect bags, vehicles, clothing, or belongings for small devices.
What to Do If You Suspect Serious Surveillance
- Document thoroughly: Screenshots, timestamps, incidents.
- Avoid direct confrontation: It can escalate risks.
- Seek help: Contact police (many regions have cyberstalking laws), domestic violence helplines, or tech safety resources (e.g., techsafety.org or local equivalents). In India, use numbers like 1091 (women) or 181.
- Temporarily use a new phone if needed, avoiding old account links.
Prevention Tips to Stay Ahead
- Disable unnecessary location sharing.
- Review app permissions monthly.
- Use strong, unique passwords + 2FA everywhere.
- Keep your OS and apps updated.
- Avoid sideloading apps or suspicious links.
- Consider a VPN on public Wi-Fi.
In most everyday cases, the “tracker” is someone with prior access to your device or accounts. Revoking that access usually ends it. For advanced threats, professional intervention is key.
Your privacy matters—stay vigilant, act promptly, and reach out for support if safety is at stake.