That gut feeling that someone is watching you isn't always paranoia. In today's world, privacy invasion is a real threat, whether it's a nosy partner, a disgruntled colleague, or a sophisticated cyberstalker. The good news? You're not powerless. Catching someone spying on you is a mix of digital detective work and old-fashioned observation. This guide cuts through the generic advice and gives you the specific, actionable steps that actually work.
What You'll Find in This Guide
Why Would Someone Spy on You?
Before you start looking, understand the motive. It shapes the method. A jealous spouse might install a simple keylogger on a shared laptop. A business competitor could hire a professional to plant a GPS tracker on your car. A landlord with illegal intent might hide a camera in a smoke detector. Knowing the "who" and "why" helps you focus your search. Most personal surveillance isn't Jason Bourne-level; it's cheap, accessible tech used by people you likely know.
The Digital Paper Trail: Signs on Your Devices
This is where most spying happens. Software is invisible, but it leaves traces.
Your Phone is Acting Weird
Battery dying way faster than usual? That's red flag number one. Spyware runs constantly in the background. Your phone feeling warm when you're not even using it is another sign. Listen for odd noises during calls—faint clicks, static, or echoes can indicate call interception, though this is less common now.
Check for unknown apps. On Android, go to Settings > Apps and look for anything unfamiliar. On iPhone, it's harder for apps to hide, but check your Profiles in Settings > General > VPN & Device Management (if it exists). A classic move is installing a "child safety" or "family tracker" app that grants full access.
Data usage is a huge telltale. Go to your cellular settings and see which apps are using massive amounts of data in the background. Spy apps upload your location, messages, and audio to a remote server.
Your Computer Has a Mind of Its Own
The cursor moves on its own. Programs open and close. Your webcam light flickers when you're not using it. These are glaring signs of a Remote Access Trojan (RAT).
Open your Task Manager (Ctrl+Shift+Esc on Windows, Activity Monitor on Mac). Sort by CPU or Memory usage when the computer is idle. Any process using significant resources that you can't identify warrants a Google search. Keyloggers often hide as benign-looking processes.
Check your browser extensions. A malicious extension can see every site you visit and every password you type. Remove anything you didn't intentionally install.
Your Online Accounts Feel Off
You get password reset emails you didn't request. Friends say they got strange messages from your social media accounts. Your sent email folder has messages you didn't write. These mean someone has accessed your accounts.
Always check the login history or active sessions page on services like Gmail, Facebook, and Instagram. It shows the device, location, and IP address of recent logins. If you see a login from a device you don't own or a city you've never been to, that's confirmed unauthorized access. Change your password immediately and enable two-factor authentication (2FA) on everything.
The Physical Clues: Finding Hidden Bugs & Cameras
Let's be real, finding a hidden camera feels like something out of a movie. But the devices are small, cheap, and sold online to anyone.
Where to Look for Hidden Cameras
Cameras need a lens, power, and sometimes a view. Focus on areas where you have private conversations or change clothes.
- Smoke detectors & alarm clocks: The classic. Check for any unnecessary holes or lenses.
- Electrical outlets & power strips: Especially ones facing a bed or seating area.
- Books, DVD cases, or decorative boxes: On a shelf facing the room.
- Teddy bears or stuffed animals: Eyes can be lenses.
- Air purifiers or diffusers: Lots of vents to hide behind.
- Wall hooks, light bulbs, or screw heads: Pinhole cameras are tiny.
The low-tech method still works: turn off the lights and scan the room with your phone's flashlight. Camera lenses are made of glass and will reflect a bright, circular glint back at you. Look for that tiny sparkle.
Listening Devices (Bugs)
These are harder to find. They can be embedded in anything—a picture frame, a USB charger, even a pen left on your desk. They often transmit via radio frequency (RF).
You can buy an RF detector online. They're not foolproof (they pick up Wi-Fi and Bluetooth too), but a strong, unexplained signal coming from, say, your lamp base is suspicious. Listen for faint buzzing or humming from electronic devices that shouldn't make noise. Some bugs have to be physically retrieved, so also look for items that have been moved or seem out of place.
Your Action Plan: A Systematic Sweep
Don't run around in a panic. Be methodical. Here’s a step-by-step process.
| Area to Check | What to Look For | Tools You Can Use |
|---|---|---|
| Smartphone | Unknown apps, high background data/battery use, strange text messages with codes. | Built-in data/battery monitors, antivirus apps like Malwarebytes. |
| Laptop/Desktop | Unknown processes in Task Manager, unfamiliar browser extensions, webcam light. | Task Manager, reputable antivirus scan (like Bitdefender), manual extension review. |
| Home/Bedroom | Unexpectedly moved objects, new gifts, glints from lenses, buzzing devices. | Flashlight, RF detector (for advanced search), your own eyes and ears. |
| Car | GPS trackers (magnetic boxes) under chassis, inside wheel wells, under seats. | Physical inspection, professional sweep if seriously concerned. |
| Online Accounts | Unknown logins, changed settings, forwarded emails. | Login history pages, password reset functions to enable 2FA. |
Start with the digital. It's where the evidence is often clearest. Check your account logins, then your phone's data usage, then your computer's processes. The physical sweep should be last, done calmly when you have time.
You Found Something. Now What?
Do not immediately confront the person you suspect. This is crucial. If you alert them, they'll destroy evidence and go deeper underground.
- Document everything. Take photos and videos of the device, its location, any serial numbers. Screenshot strange processes and login alerts.
- Do NOT remove it yet (maybe). If it's a physical bug, leaving it in place can help authorities trace it. If it's software, you need to understand its function before deleting it. A keylogger might be the only way to prove who installed it.
- Secure your communication. Assume your primary devices and accounts are compromised. Use a different, trusted computer (like at a library) or a brand-new burner phone to research and make plans. Create new email accounts for sensitive communication.
- Seek professional and legal advice. Contact a lawyer who specializes in privacy or family law. For serious threats, file a report with your local police. While they may not always have the resources for complex cyber cases, a report creates a paper trail. For corporate espionage, hire a licensed private investigator or cybersecurity firm to conduct a professional Technical Surveillance Counter-Measures (TSCM) sweep. The FBI provides resources on cybercrime and personal security you can reference.
Locking It Down: Prevention is Better Than Cure
Once you're clean, stay clean.
- Passwords & 2FA: Use a password manager (like Bitwarden or 1Password) to create and store unique, complex passwords for every account. Enable 2FA everywhere, using an authenticator app (like Authy or Google Authenticator) instead of SMS if possible.
- Device Hygiene: Keep your OS and apps updated. Don't jailbreak or root your phone unless you know the risks. Be extremely cautious with public Wi-Fi—use a VPN. Cover your webcam with a physical slider.
- Physical Security: Use a PIN or password on your phone, not just a fingerprint. Don't leave your devices unattended. Be mindful of who has physical access to your home or car.
- Trust Your Gut: If a relationship feels controlling or a situation feels wrong, your intuition is a powerful detection tool. Set boundaries around your privacy early.
Your Privacy Questions Answered
I think my partner is tracking my phone. How can I check without them knowing?
Can my landlord legally put a camera inside my rental?
Are those "spy detector" apps on the app store any good?
What's the one thing most people miss when checking for spying?
If I find spyware, should I delete it or keep it as evidence?