How to Catch Someone Spying on You: 10 Concrete Signs & What to Do

That gut feeling that someone is watching you isn't always paranoia. In today's world, privacy invasion is a real threat, whether it's a nosy partner, a disgruntled colleague, or a sophisticated cyberstalker. The good news? You're not powerless. Catching someone spying on you is a mix of digital detective work and old-fashioned observation. This guide cuts through the generic advice and gives you the specific, actionable steps that actually work.

Why Would Someone Spy on You?

Before you start looking, understand the motive. It shapes the method. A jealous spouse might install a simple keylogger on a shared laptop. A business competitor could hire a professional to plant a GPS tracker on your car. A landlord with illegal intent might hide a camera in a smoke detector. Knowing the "who" and "why" helps you focus your search. Most personal surveillance isn't Jason Bourne-level; it's cheap, accessible tech used by people you likely know.

The Digital Paper Trail: Signs on Your Devices

This is where most spying happens. Software is invisible, but it leaves traces.

Your Phone is Acting Weird

Battery dying way faster than usual? That's red flag number one. Spyware runs constantly in the background. Your phone feeling warm when you're not even using it is another sign. Listen for odd noises during calls—faint clicks, static, or echoes can indicate call interception, though this is less common now.

Check for unknown apps. On Android, go to Settings > Apps and look for anything unfamiliar. On iPhone, it's harder for apps to hide, but check your Profiles in Settings > General > VPN & Device Management (if it exists). A classic move is installing a "child safety" or "family tracker" app that grants full access.

Data usage is a huge telltale. Go to your cellular settings and see which apps are using massive amounts of data in the background. Spy apps upload your location, messages, and audio to a remote server.

Pro Tip: Don't just do a quick scroll through your apps. I've seen spyware disguised with names like "System Service" or "Google Play updater." Look up any app you don't 100% recognize.

Your Computer Has a Mind of Its Own

The cursor moves on its own. Programs open and close. Your webcam light flickers when you're not using it. These are glaring signs of a Remote Access Trojan (RAT).

Open your Task Manager (Ctrl+Shift+Esc on Windows, Activity Monitor on Mac). Sort by CPU or Memory usage when the computer is idle. Any process using significant resources that you can't identify warrants a Google search. Keyloggers often hide as benign-looking processes.

Check your browser extensions. A malicious extension can see every site you visit and every password you type. Remove anything you didn't intentionally install.

Your Online Accounts Feel Off

You get password reset emails you didn't request. Friends say they got strange messages from your social media accounts. Your sent email folder has messages you didn't write. These mean someone has accessed your accounts.

Always check the login history or active sessions page on services like Gmail, Facebook, and Instagram. It shows the device, location, and IP address of recent logins. If you see a login from a device you don't own or a city you've never been to, that's confirmed unauthorized access. Change your password immediately and enable two-factor authentication (2FA) on everything.

The Physical Clues: Finding Hidden Bugs & Cameras

Let's be real, finding a hidden camera feels like something out of a movie. But the devices are small, cheap, and sold online to anyone.

Where to Look for Hidden Cameras

Cameras need a lens, power, and sometimes a view. Focus on areas where you have private conversations or change clothes.

  • Smoke detectors & alarm clocks: The classic. Check for any unnecessary holes or lenses.
  • Electrical outlets & power strips: Especially ones facing a bed or seating area.
  • Books, DVD cases, or decorative boxes: On a shelf facing the room.
  • Teddy bears or stuffed animals: Eyes can be lenses.
  • Air purifiers or diffusers: Lots of vents to hide behind.
  • Wall hooks, light bulbs, or screw heads: Pinhole cameras are tiny.

The low-tech method still works: turn off the lights and scan the room with your phone's flashlight. Camera lenses are made of glass and will reflect a bright, circular glint back at you. Look for that tiny sparkle.

Listening Devices (Bugs)

These are harder to find. They can be embedded in anything—a picture frame, a USB charger, even a pen left on your desk. They often transmit via radio frequency (RF).

You can buy an RF detector online. They're not foolproof (they pick up Wi-Fi and Bluetooth too), but a strong, unexplained signal coming from, say, your lamp base is suspicious. Listen for faint buzzing or humming from electronic devices that shouldn't make noise. Some bugs have to be physically retrieved, so also look for items that have been moved or seem out of place.

A Common Mistake: People obsess over finding cameras in public bathroom vents but ignore the new USB charger their partner "gifted" them. Physical gifts are a prime vector for spy gear. Be wary of any new electronics given to you by a person you suspect.

Your Action Plan: A Systematic Sweep

Don't run around in a panic. Be methodical. Here’s a step-by-step process.

Area to Check What to Look For Tools You Can Use
Smartphone Unknown apps, high background data/battery use, strange text messages with codes. Built-in data/battery monitors, antivirus apps like Malwarebytes.
Laptop/Desktop Unknown processes in Task Manager, unfamiliar browser extensions, webcam light. Task Manager, reputable antivirus scan (like Bitdefender), manual extension review.
Home/Bedroom Unexpectedly moved objects, new gifts, glints from lenses, buzzing devices. Flashlight, RF detector (for advanced search), your own eyes and ears.
Car GPS trackers (magnetic boxes) under chassis, inside wheel wells, under seats. Physical inspection, professional sweep if seriously concerned.
Online Accounts Unknown logins, changed settings, forwarded emails. Login history pages, password reset functions to enable 2FA.

Start with the digital. It's where the evidence is often clearest. Check your account logins, then your phone's data usage, then your computer's processes. The physical sweep should be last, done calmly when you have time.

You Found Something. Now What?

Do not immediately confront the person you suspect. This is crucial. If you alert them, they'll destroy evidence and go deeper underground.

  1. Document everything. Take photos and videos of the device, its location, any serial numbers. Screenshot strange processes and login alerts.
  2. Do NOT remove it yet (maybe). If it's a physical bug, leaving it in place can help authorities trace it. If it's software, you need to understand its function before deleting it. A keylogger might be the only way to prove who installed it.
  3. Secure your communication. Assume your primary devices and accounts are compromised. Use a different, trusted computer (like at a library) or a brand-new burner phone to research and make plans. Create new email accounts for sensitive communication.
  4. Seek professional and legal advice. Contact a lawyer who specializes in privacy or family law. For serious threats, file a report with your local police. While they may not always have the resources for complex cyber cases, a report creates a paper trail. For corporate espionage, hire a licensed private investigator or cybersecurity firm to conduct a professional Technical Surveillance Counter-Measures (TSCM) sweep. The FBI provides resources on cybercrime and personal security you can reference.

Locking It Down: Prevention is Better Than Cure

Once you're clean, stay clean.

  • Passwords & 2FA: Use a password manager (like Bitwarden or 1Password) to create and store unique, complex passwords for every account. Enable 2FA everywhere, using an authenticator app (like Authy or Google Authenticator) instead of SMS if possible.
  • Device Hygiene: Keep your OS and apps updated. Don't jailbreak or root your phone unless you know the risks. Be extremely cautious with public Wi-Fi—use a VPN. Cover your webcam with a physical slider.
  • Physical Security: Use a PIN or password on your phone, not just a fingerprint. Don't leave your devices unattended. Be mindful of who has physical access to your home or car.
  • Trust Your Gut: If a relationship feels controlling or a situation feels wrong, your intuition is a powerful detection tool. Set boundaries around your privacy early.

Your Privacy Questions Answered

I think my partner is tracking my phone. How can I check without them knowing?

First, check for tracking apps. On iPhones, look in Find My to see if your device is shared. On any phone, check for apps like mSpy, FlexiSPY, or Hoverwatch (they often hide). Review location sharing in Google Maps or Apple's Find My. The most definitive check is to backup your data and perform a factory reset, then set it up as a brand new device (don't restore from the old backup). This will wipe any tracking software. Do this when you have a safe, uninterrupted window of time.

Can my landlord legally put a camera inside my rental?

Almost never in places where you have a reasonable expectation of privacy. This includes bedrooms, bathrooms, and inside the living area. Laws vary by state and country, but generally, cameras in common areas like hallways may be allowed with notice, but never in private spaces. A camera inside a rented home is a serious invasion and likely illegal. Document its location, do not touch it, and contact a tenant's rights attorney or the police immediately. The Electronic Frontier Foundation (EFF) has guides on surveillance and tenant rights.

Are those "spy detector" apps on the app store any good?

Most are garbage. An app claiming to find hidden cameras using your phone's magnetometer is usually marketing hype. The magnetometer isn't sensitive or precise enough. The lens detection apps that use your camera flash are a slightly better concept, but they generate tons of false positives from any reflective surface. For RF detection, you need dedicated hardware. Save your money. The most reliable tools are your own observational skills, a bright flashlight, and professional-grade equipment for a serious threat.

What's the one thing most people miss when checking for spying?

Their own cars. People secure their phones and laptops but forget that a magnetic GPS tracker can be slapped under a bumper or inside a wheel well in 30 seconds. If you're being stalked or have a contentious business situation, give your car a physical inspection every so often, especially before long trips. Run your hand along inner edges and look for any small, boxy device with a magnet on it.

If I find spyware, should I delete it or keep it as evidence?

This is a legal tightrope. From a pure evidence standpoint, keeping it intact is best. But from a security standpoint, it's an active threat. My practical advice: before you do anything, document it thoroughly with photos and screen recordings. Then, consult with a lawyer. If immediate danger is low, they may advise leaving it and monitoring it with a professional. If you need to neutralize the threat immediately, you might remove it but ensure you have preserved the documentation (photos, videos, screenshots) in multiple secure locations. The documentation is your evidence.

Related stories