If you're worried that a stalker, hacker, employer, parent, or even the police is monitoring your phone calls, you've come to the right place. Whether you're using a smartphone or a landline at home or work, there are many ways someone could be listening to your calls. This wikiHow article, with help from technology specialists Brandon Phipps and Aydin Yildiz, will teach you how to check if your phone is tapped, what to do if it is, and simple steps you can take to get the situation under control. We'll also provide tips for keeping your phone safe from spyware and bugging.
How to Check If Your Phone is Tapped
Technology specialist Brandon Phipps explains that if unknown apps are running, your phone lights up a lot and signals on and off, or you see random pop-ups, your phone may be compromised. Also watch for high data and battery use, the camera or mic turning on randomly, and unfamiliar admin profiles in your settings.
Steps
How do I know if my cell phone is tapped?
-
The battery gets hot or drains frequently. If your phone is infected with spyware that's monitoring your calls or tracking your activity, it could cause your battery to drain much faster than usual or feel hot to the touch. [1] X Trustworthy Source Federal Trade Commission Website with up-to-date information for consumers from the Federal Trade Commisson Go to source
- To see which apps are using the most battery power, head to Settings > Battery (on both Android and iPhone). [2] X Research source
- Battery issues don't always indicate a phone tap—regular apps, as well as battery age, can also affect battery performance .
-
You're using way more data. Phone-tapping apps may send large recordings and/or logs to the spy using your mobile data plan. If you're suddenly running low on mobile data even though your usage hasn't changed, someone else might be using your data through a tap.
- More modern spyware can upload large amounts of data from your phone without being traced.
- To check your data usage on an iPhone, open Settings and tap Cellular or Mobile .
- To check data usage on an Android, open Settings and go to Network & Internet (or Connections > Data usage (or select your SIM) > Mobile data usage . [3] X Research source
Advertisement -
Your phone lights up randomly or otherwise misbehaves. Phipps explains that if your phone lights up, signals on and off at certain points, or random icons pop up, your phone may be compromised. [4] X Expert Source Brandon Phipps
Technology Specialist Expert Interview Your phone may also shut down or start up randomly, or even install apps without you doing anything. If any of these things are happening on your phone, someone could be controlling it remotely, which could also mean they are listening to your calls. -
There are suddenly lots of ads or pop-ups. If you're seeing annoying pop-ups and spammy ads, especially while you're not actively browsing the web, malware (particularly adware) could be the culprit. Be wary of messages encouraging you to follow links you've never heard of, as well as pop-up warnings that claim you have to pay money to remove a virus.EXPERT TIPTechnology SpecialistBrandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions.
Detect spyware using a malware detector like Malwarebytes. On Samsung and other Android devices, I run the Malwarebytes app manually to make sure there's nothing strange running. You can also keep Malwarebytes running proactively so it will keep an eye on the filesystems.
-
You see apps you don't recognize. Although a lot of stalking and tracking apps can be hidden from the home screen and app list, some might just be installed with unassuming names. Yildiz recommends consistently checking to see what programs are running on your phone. "You need to check your settings to make sure there aren't any apps you don't recognize running or monitoring your location," he advises. [5] X Expert Source Aydin Yildiz
Tech Expert Expert Interview You can see a list of all installed apps on both Android and iPhone in Settings > Apps . [6] X Research source- For example, if you see an app called SyncManager, it usually means that someone has installed FlexiSpy (a commercial phone tapping app) on your phone. [7] X Research source
- Pegasus, the military-grade phone tapping software that was in the news for tracking journalists, was installed remotely on iPhones and Androids without installing any software at all. [8] X Research source If you're being tapped by the government and they are using powerful software like this, there will be no indication that your phone is tapped.
-
Your camera or microphone turns on at random. If your camera or microphone is active and you didn't open an app that uses one or both, someone could be watching and/or listening. The signs that your camera or microphone is active are a bit different depending on your phone: [9] X Research source
- If you're using an iPhone, a green dot at the top of the screen indicates that your camera is actively recording. If your microphone is active, you'll see an orange dot.
- On Android 12 or later, you'll see a green icon with a camera and/or microphone at the top-right when one or both are active. If you are using an earlier Android version, you can get the same functionality by installing a free app called Access Dots from the Play Store.
- If you see neither of the above, that does not mean your phone is not recording. Some sophisticated phone-tapping apps are extremely difficult to detect, especially those installed by the government or law enforcement (like Graphite and Pegasus). [10] X Research source
-
You see unfamiliar administrator or manager profiles. Even if you didn't find any strange apps installed, that doesn't mean someone isn't using more sophisticated methods of tapping your smartphone. Both Androids and iPhones allow you to install special profiles that give certain apps admin access they wouldn't normally have, allowing them to monitor the things you do on your phone. [11] X Research source Here's how you can look for shady profiles:
- Android: Open the Settings app and go to Security & privacy options > Device administrators . Any apps that have administrator rights appear here. If you see something you don't recognize, tap it and select DEACTIVATE to delete it.
- iPhone: In the Settings app, go to General > Profiles & Device Management (or just Profiles ) and then tap an app you don't recognize. Tap Delete Profile to remove that app's admin access from your iPhone. [12] X Research source
- Not all device profiles are removable–some require a reinstall of Android or iOS to remove.
How do I know if my landline is tapped?
-
You hear popping, static, humming, or clicking. If you hear a great deal of noise while you're talking on your landline, it could indicate a physical wiretap. But if your phone is tapped using software that intercepts your calls at the carrier level, you likely won't hear anything strange at all. [13] X Research source
- Some bugs and taps use frequencies close to the FM radio band, so if your radio squeals when set to mono and dialed into the far end of the band, an RF bug might be in use.
-
You see a device or wires near your phone or phone jack. Take a look at the phones and phone jacks in your home—do they look like they've been removed and replaced? Any visible wires or devices? Taps may be placed on or near these jacks, so look for anything out of the ordinary.
-
Someone's been messing with your outside phone box. You might not know what a residential phone box should look like inside, but even if you only have a slight idea, open yours and take a look. If the box seems tampered with or if the contents inside have been disturbed, someone might have installed a wiretap.
- The "restricted" side of the box requires a special hex key (Allen wrench) to open. If that side looks to have been tampered with, you might have a problem.
- There should only be one box for your landline number and two cables going to the box. Any additional cables or boxes can be a sign of a wiretap.
-
An RF bug detector detects strong frequencies near your phone. If your phone is tapped with an RF (Radio Frequency) bug, which is one of the most common commercial wiretapping tools, it'll be fairly easy to detect with a wide-range RF bug detector. Most of the RF bugs available fall in the 10 MHz to 8 MHz range, but you'll want an RF detector that can detect up to 24 GHz, just to be sure. [14] X Research source
-
A phone or cable repair person appears on your property. If someone comes to your house claiming to be a repairman or an employee from your telephone carrier, but you have not called and requested someone, it could be a trap. Call your phone company—or whichever utility company they claim to be from—to verify their identity.
- When calling the company, contact them using the phone number you have in your records. Don't call the phone number provided to you by the repair person at the door.
What should I do if my phone is tapped?
-
1Disconnect from the internet and enable airplane mode. Before you take any actions, you'll want to enable airplane mode so you will be disconnected from your mobile phone service, and turn off Wi-Fi. If there's spyware on your phone, this will make it so that it cannot transmit data to the person behind the tap.
-
Reset your smartphone. If someone has installed spyware on your iPhone or Android phone, you can remove it by restoring your phone to its original factory settings . [16] X Research source This won't help if law enforcement is listening in on your calls through your carrier, but it will be valuable if you're the victim of a hacker or stalker.
- Resetting your phone could tip off the person monitoring it. If you're in danger, leave your phone behind and seek in-person help from law enforcement.
-
Ask your phone carrier for help. If you have a reason to believe your (landline) phone is tapped, you can ask your phone carrier to check using professional equipment. A standard line analysis performed by the phone company will be able to detect most illegal wiretaps, listening devices , low-frequency devices, and phone line splicing.
- If your carrier refuses to help, they could be administering a government request. This may indicate your phone is tapped by the police or another government agency due to an ongoing investigation.
-
Go to the police. If you have evidence that your phone is really tapped, ask the police to check. Most police departments have the equipment needed to test your phone for a bug or a tapping device, but if you do not have decent evidence that your concerns are justified, they might not be willing to use it.
- If you're in the United States and are the victim of domestic violence , contact the National Domestic Violence Hotline on the web or by dialing 1-800-799-SAFE on an untapped line. [17] X Trustworthy Source National Domestic Violence Hotline Organization providing lifesaving tools, support, and resources for victims and survivors of domestic abuse Go to source
-
Get a prepaid (burner) phone. If your phone is tapped, buying a cheap prepaid phone from a store that doesn't require any identification is a great way to protect your privacy. Use this phone to contact authorities, hotlines, or anyone else you need to talk to for added security.
- A prepaid phone does not stop you from being watched by law enforcement agencies.
How to Keep Your Phone from Being Tapped
-
1Never leave your smartphone unattended. If you walk away from your phone, someone could creep up and install spyware or tapping apps when you're not looking. Avoid leaving your phone out of your sight or handing it to other people. [18] X Research source
-
2Only install apps from your device's App Store. "You shouldn't be downloading apps from anywhere except the App Store or Play Store," Yildiz advises. "If you try to install the app yourself outside the app store, you'll have a higher chance of installing spyware." [19] X Expert Source Aydin Yildiz
Tech Expert Expert Interview -
3Use 2-factor authentication. "Turn on two-factor authentication for all of your accounts," stresses Phipps. [20] X Expert Source Brandon Phipps
Technology Specialist Expert Interview 2-factor authentication adds an extra layer of security to your logins, making it more difficult for people to access your accounts even if they wind up getting hold of your password. [21] X Research source -
4Disable biometrics when traveling across borders or checkpoints. Many people advise turning off biometrics (like Face ID and Touch ID) and using a PIN or alphanumeric code instead when traveling through checkpoints where an officer may want to check or take your phone. [22] X Research source This won't work all the time, but it will make it more difficult for someone to access your device. [23] X Research source
- You may also consider bringing a burner phone with you on your travels instead of your regular phone, or performing a factory reset before you travel to start with a fresh slate.
-
5Avoid clicking links in texts and email messages. Many tapping programs, including Pegasus, can be installed using a tactic called "spear-phishing." [24] X Research source You might receive a text or an email message that looks super legit, whether it's from a friend, family member, or a service or utility you subscribe to, that contains a link that looks innocent enough. Then, when you follow the link, the hacker is able to install spyware on your device or trick you into entering your password. If you receive a notification from someone asking you to visit a link, make sure you trust the link. [25] X Research sourceEXPERT TIPTechnology SpecialistBrandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions.
Phishing can also happen over the phone. A person phishing for your login information may call you pretending to be someone you trust and ask you for your password, or convince you to follow a link in a text message.
-
6Use a different strong password for each of your logins. "A common mistake most people make is picking a password that's easy to remember, then using it across the board," Phipps says. Instead of worrying about remembering all your passwords, he recommends using a password generator (like the one in Firefox) that securely creates and stores passwords for you. [26] X Expert Source Brandon Phipps
Technology Specialist Expert Interview- Phipps also notes that password standards have changed over the years. "Don't worry about changing it super often," he says, "the NIST standards changed that recommendation years ago." Instead, he recommends choosing a long passphrase that uses different characters, uppercase and lowercase letters, and other characters required by the site. [27]
X
Expert Source
Brandon Phipps
Technology Specialist Expert Interview - When Phipps says "long passphrase," he really means long –the US government's Cybersecurity and Infrastructure Defense Agency (CISA) recommends 16 characters at a minimum. [28] X Research source
- Phipps also notes that password standards have changed over the years. "Don't worry about changing it super often," he says, "the NIST standards changed that recommendation years ago." Instead, he recommends choosing a long passphrase that uses different characters, uppercase and lowercase letters, and other characters required by the site. [27]
X
Expert Source
Brandon Phipps
Community Q&A
-
QuestionHow can I tell if the police bugged my phone?Community AnswerYou might hear the sound of another line being picked up, or a clicking sound while talking on the phone.
-
QuestionCan basic flip phones get bugged?Community AnswerYes, they can. There is a number you can look up to check if your phone is being tapped.
-
QuestionCan someone tap my phone to spy on me visually in my home?Community AnswerYes, once they get into your phone, they can listen to background noises, calls, or anything the phone can pick up soundwise. They can also access the camera and other things too.
Video
Tips
- If you live in an all-party consent state and are being tapped by law enforcement, they are required to notify you once the tap is complete. All-party consent states include: California, Connecticut, Delaware, Florida, Illinois, Maryland, Massachusetts, Michigan, Montana, Nevada, New Hampshire, Pennsylvania, and Washington. [29] X Research sourceThanks
References
- ↑ https://consumer.ftc.gov/articles/stalkerware-what-know
- ↑ https://support.apple.com/en-us/102432
- ↑ https://www.xda-developers.com/how-to-check-internet-data-usage-android/
- ↑ Brandon Phipps. Technology Specialist. Expert Interview
- ↑ Aydin Yildiz. Tech Expert. Expert Interview
- ↑ https://support.google.com/fi/answer/9458407?hl=en
- ↑ https://www.zdnet.com/article/how-to-find-and-remove-spyware-from-your-phone/
- ↑ https://www.washingtonpost.com/investigations/interactive/2021/nso-spyware-pegasus-cellphones/
- ↑ https://support.apple.com/en-us/108331
- ↑ https://www.pbs.org/newshour/show/new-documentary-details-how-governments-use-spyware-to-monitor-citizens-phones
- ↑ https://www.forbes.com/sites/technology/article/how-to-know-if-your-phone-is-hacked/
- ↑ https://support.apple.com/en-us/HT205347
- ↑ https://www.pcmag.com/how-to/how-to-tell-if-your-phone-is-being-tapped-what-to-do
- ↑ https://www.wired.com/story/how-to-sweep-for-bugs/
- ↑ https://www.livescience.com/58207-how-do-wiretaps-work.html
- ↑ https://www.pcmag.com/how-to/how-to-tell-if-your-phone-is-being-tapped-what-to-do
- ↑ https://www.thehotline.org/
- ↑ https://www.wired.com/beyond-the-beyond/2018/10/spearphishing-journalist-smartphones-pegasus/
- ↑ Aydin Yildiz. Tech Expert. Expert Interview
- ↑ Brandon Phipps. Technology Specialist. Expert Interview
- ↑ https://www.microsoft.com/en-us/security/business/security-101/what-is-two-factor-authentication-2fa
- ↑ https://www.wired.com/story/how-to-protect-yourself-from-phone-searches-at-the-us-border/
- ↑ https://www.acludc.org/how-defend-against-police-surveillance-protests/
- ↑ https://www.wired.com/beyond-the-beyond/2018/10/spearphishing-journalist-smartphones-pegasus/
- ↑ https://www.dni.gov/files/NCSC/documents/campaign/Counterintelligence_Tips_Spearphishing.pdf
- ↑ Brandon Phipps. Technology Specialist. Expert Interview
- ↑ Brandon Phipps. Technology Specialist. Expert Interview
- ↑ https://www.cisa.gov/secure-our-world/require-strong-passwords
- ↑ https://www.justia.com/50-state-surveys/recording-phone-calls-and-conversations/
About This Article
Reader Success Stories
- "It was helpful because only a couple of months ago, my landline kept making a tapping noise. My mother & sister kept saying someone is listening into our conversation. Thank you. This has helped. " ..." more