Previous All Posts Next

Digital Stalking: How to Detect Spyware, Stalkerware, and Protect Yourself

Posted: April 1, 2026 to Cybersecurity.

Digital Stalking: How to Detect Spyware, Stalkerware, and Protect Yourself

Digital stalking is the use of technology to monitor, track, harass, or surveil another person without their knowledge or consent. It includes installing spyware or stalkerware on a victim's phone or computer, placing GPS trackers on vehicles or personal belongings, exploiting shared account access, setting up hidden email forwarding rules, and using social media to monitor a victim's location, relationships, and daily activities. Digital stalking is a crime under both state and federal law, and it is a form of abuse that affects an estimated 1.5 million people in the United States each year according to the Bureau of Justice Statistics.

If you suspect someone is tracking your phone, reading your messages, or monitoring your location without your permission, this guide walks you through every method stalkers use, how to detect each one, and what to do when you find evidence of surveillance on your devices. Petronella Technology Group's digital forensics team specializes in stalkerware detection, GPS tracker identification, and evidence preservation for victims of digital stalking.

What Is Stalkerware?

Stalkerware is surveillance software secretly installed on a victim's phone, tablet, or computer that records calls, text messages, emails, social media activity, GPS location, browsing history, photos, and keystrokes, then transmits all of that data to the person who installed it. Unlike legitimate parental monitoring or corporate device management software that operates transparently with the device owner's knowledge, stalkerware is designed specifically to be invisible. It hides its icon from the home screen, disguises itself as a system process, and runs silently in the background.

The stalkerware industry generates hundreds of millions of dollars annually by marketing these products under euphemisms like "parental control," "employee monitoring," or "phone tracking." In reality, research from the Coalition Against Stalkerware shows that the overwhelming majority of stalkerware installations are used for intimate partner surveillance. A 2023 study by Kaspersky detected stalkerware on more than 31,000 unique devices in a single year, and that figure represents only devices running their particular security product.

Commercial Stalkerware Apps

The most widely used stalkerware apps include mSpy, FlexiSpy, Cocospy, Spyic, Hoverwatch, and iKeyMonitor. These products typically cost between $30 and $70 per month and provide the installer with a web dashboard where they can view everything happening on the victim's device in near real time. Capabilities vary by product but commonly include:

  • Call monitoring: Recording phone calls, logging call history, and identifying callers
  • Message interception: Reading SMS, iMessage, WhatsApp, Signal, Telegram, Facebook Messenger, and other messaging apps
  • GPS tracking: Real-time location tracking with movement history and geofencing alerts that notify the stalker when the victim enters or leaves a defined area
  • Keylogging: Recording every keystroke typed on the device, capturing passwords, search queries, and private messages
  • Screen recording: Periodic screenshots or continuous screen recording of everything displayed on the device
  • Camera and microphone access: Remotely activating the device's camera and microphone to capture photos, video, and ambient audio
  • Social media monitoring: Accessing posts, direct messages, and activity across all social platforms installed on the device
  • Browser history: Recording every website visited, search query entered, and bookmark saved

Installing stalkerware on someone's device without their consent is a federal crime under the Computer Fraud and Abuse Act (18 U.S.C. 1030) and violates state wiretapping and electronic surveillance laws in all 50 states. In North Carolina, it is specifically prohibited under N.C.G.S. 14-196.3, which criminalizes the knowing installation of an electronic tracking or monitoring device without consent. Despite this, stalkerware companies continue to operate because they include terms of service disclaimers stating the software should only be used with consent, while marketing it in ways that clearly encourage covert installation.

GPS Trackers: AirTags, Tile, and Dedicated Devices

Physical GPS trackers represent another common method of digital stalking. These small, battery-powered devices can be hidden in a vehicle's wheel well, under the dashboard, inside a bag, or attached to personal belongings using magnetic mounts. Consumer Bluetooth trackers like Apple AirTags, Samsung SmartTags, and Tile devices were designed to help people find lost items, but they have been widely repurposed for stalking. Dedicated GPS trackers with cellular connections, such as those sold by LandAirSea, Optimus, and Bouncie, provide real-time location tracking through a web dashboard or smartphone app without requiring Bluetooth proximity.

Apple introduced anti-stalking protections for AirTags in 2022, including alerts on iPhones when an unknown AirTag is traveling with the user and an Android app called Tracker Detect. However, these protections have significant limitations. iPhone alerts can take hours to trigger, Tracker Detect requires the Android user to actively open the app and scan, and stalkers have discovered methods to disable AirTag speakers to prevent the audible chirp that is supposed to alert victims to an unknown tracker. Tile and Samsung trackers have even fewer anti-stalking protections built in.

Social Media Monitoring

Not all digital stalking requires installing software or placing physical devices. Stalkers monitor victims through social media by creating fake accounts to follow private profiles, using public check-ins and tagged photos to track location, exploiting Instagram and Snapchat location features, monitoring friend lists and interactions to identify the victim's social circle, and systematically reviewing posts, stories, and comments for information about the victim's daily routine, workplace, and personal relationships.

Email Forwarding Rules and Shared Account Access

One of the most overlooked forms of digital stalking involves email forwarding rules. A stalker who gained access to a victim's email account, even briefly, can set up an automatic forwarding rule that sends a copy of every incoming email to the stalker's own address. The victim continues using their email normally with no visible indication that every message is being duplicated. This method survives password changes unless the victim specifically checks for and deletes the forwarding rule.

Shared account access is similarly insidious. Couples and families often share passwords for streaming services, cloud storage, phone carrier accounts, and shopping sites. After a relationship ends, the former partner may retain access to these accounts and use them to monitor the victim's activity, location, purchases, and communications. Cloud services like iCloud, Google, and Microsoft accounts are particularly dangerous because they can reveal real-time location, photos, browsing history, and device information.

Keyloggers

Keyloggers are software programs or physical hardware devices that record every keystroke entered on a computer or phone. Software keyloggers operate similarly to stalkerware but focus specifically on capturing typed input, including passwords, messages, search queries, and URLs. Hardware keyloggers are small USB devices plugged between the keyboard cable and the computer, recording all keystrokes to internal memory that the stalker retrieves later. Hardware keyloggers are difficult to detect through software scans because they operate at the physical layer and do not appear in the operating system's process list.

Signs That Someone Is Tracking Your Phone

Stalkerware and tracking software are designed to be invisible, but they cannot operate without consuming device resources. The following signs may indicate that spyware is running on your phone or computer.

Battery Drain

Stalkerware runs continuously in the background, recording calls, logging keystrokes, tracking GPS location, and transmitting data to the stalker's server. This constant activity consumes significant battery power. If your phone's battery life has suddenly decreased by 20% or more without a change in your usage habits or a software update, it could indicate hidden software running on the device. Check your battery usage breakdown in Settings to see if any unfamiliar apps or processes are consuming disproportionate power.

Increased Data Usage

Every piece of information stalkerware captures must be transmitted over your cellular or Wi-Fi connection to the stalker's dashboard. Recorded calls, screenshots, photos, and continuous GPS pings generate substantial data traffic. Monitor your data usage in your phone settings and through your carrier's account portal. An unexplained increase of several hundred megabytes or more per month, particularly in background data usage, may indicate data exfiltration by monitoring software.

Phone Runs Hot

The combined processing demands of recording, logging, and transmitting data cause the device's processor to work harder than normal, generating excess heat. If your phone frequently feels warm or hot to the touch even when you are not actively using it, especially when it is sitting idle on a table or charging, a background process may be consuming processor resources.

Unknown Apps or Processes

While stalkerware hides its icon from the home screen, it still appears in the device's full application list or running processes. On Android, stalkerware often disguises itself under generic system-sounding names like "System Service," "Phone Manager," "Sync Service," or "Android System." On iPhone, stalkerware is harder to install but may appear as an unfamiliar configuration profile or VPN entry in Settings.

Strange Sounds During Calls

Some older or lower-quality stalkerware products interfere with call audio, producing clicking sounds, static, faint echoes, or brief moments of silence during phone conversations. While modern stalkerware has largely eliminated these artifacts, audible interference during calls that is consistent and reproducible should not be dismissed.

Accounts Accessed From Unknown Locations

Most email and social media platforms record login activity including device type, location, and IP address. Check Gmail's "Last Account Activity," Facebook's "Where You're Logged In," Instagram's "Login Activity," and similar features on other platforms. Logins from unfamiliar devices, cities, or IP addresses indicate that someone else is accessing your account. Even if the stalker is using your credentials from a device in the same city, the device type (such as a Windows PC when you only use an iPhone) will appear different.

Unexpected Account Activity

Password reset emails you did not request, notification settings that have been changed, two-factor authentication that was disabled without your knowledge, or recovery email addresses and phone numbers you do not recognize all indicate that someone has accessed and modified your account settings. These changes may be the result of a stalker establishing persistent access to your accounts.

How to Check Your Phone for Stalkerware

If you suspect spyware on your phone, follow these steps to check for common indicators. Important: if you are in an abusive situation, read the safety planning section below before removing any software, as the stalker may notice and escalate.

Android Devices

Android phones are the most common target for stalkerware because the operating system allows app installation from sources outside the Google Play Store, known as sideloading.

  1. Check installed apps: Go to Settings > Apps (or Settings > Applications > App Manager). Scroll through the complete list and look for any app you do not recognize. Pay particular attention to apps with generic names like "System Service," "Update Service," "WiFi Service," or "Phone Manager." Tap any suspicious app to see when it was installed and how much battery and data it has consumed
  2. Check device administrator apps: Go to Settings > Security > Device Administrators (path varies by manufacturer). Stalkerware often registers itself as a device administrator to prevent easy removal. Any app listed here that you did not authorize is suspicious
  3. Check unknown sources setting: Go to Settings > Security > Install Unknown Apps. If any app has permission to install apps from unknown sources and you did not enable it, stalkerware may have been sideloaded
  4. Check accessibility services: Go to Settings > Accessibility. Stalkerware frequently abuses Android's accessibility services to read screen content, capture keystrokes, and monitor other apps. If any unfamiliar service is enabled, investigate it
  5. Check Google Play Protect: Open the Google Play Store, tap your profile icon, then "Play Protect." Run a scan. While Play Protect does not catch all stalkerware, it detects many known variants
  6. Check running processes: In Settings > Developer Options > Running Services (you may need to enable Developer Options first), review what processes are currently running. Unfamiliar processes consuming significant memory should be investigated

iPhone (iOS) Devices

iPhones are more resistant to stalkerware than Android devices because Apple restricts app installation to the App Store and does not allow apps to run with the deep system access stalkerware requires. However, iPhones can still be compromised through several vectors.

  1. Check for unknown profiles: Go to Settings > General > VPN & Device Management. If you see any configuration profiles you did not install, they may be granting surveillance access. Enterprise or MDM profiles are particularly concerning if you are not using a company-managed device
  2. Check Screen Time settings: Go to Settings > Screen Time. A stalker with your passcode may have used Screen Time to restrict your ability to install or remove apps, or to monitor your app usage. If Screen Time is enabled and you did not set it up, or if the passcode has been changed, your device may be compromised
  3. Check location sharing: Go to Settings > Privacy & Security > Location Services > Share My Location. Verify who you are sharing your location with through Find My. Also check Find My > People to see who can see your location
  4. Check for jailbreak indicators: Look for apps like Cydia, Sileo, or Zebra on your device. If your iPhone has been jailbroken, the security restrictions that prevent stalkerware installation have been removed. A jailbroken iPhone is as vulnerable as an Android device
  5. Check iCloud connected devices: Go to Settings > [Your Name] and scroll down to see all devices signed into your Apple ID. Remove any device you do not recognize
  6. Check email and calendar accounts: Go to Settings > Mail > Accounts. Verify that no unfamiliar accounts have been added. A stalker can add a mail account that syncs your calendar, contacts, and location data to their device
Think Your Phone Has Spyware? Get a Professional Scan

Consumer antivirus apps miss many stalkerware variants. Petronella's digital forensics team uses specialized tools to detect hidden spyware, stalkerware, and unauthorized monitoring on your phone, tablet, or computer. Every assessment is confidential. Request a confidential device scan or call 919-348-4912.

How to Check Your Computer for Spyware

Computers are vulnerable to both software-based spyware and physical keyloggers. The following checks cover the most common surveillance methods targeting desktops and laptops.

Check Startup Programs

On Windows, open Task Manager (Ctrl+Shift+Esc), click the Startup tab, and review every program listed. Disable and research anything you do not recognize. Pay attention to programs with generic names, missing publisher information, or high impact ratings. On macOS, go to System Settings > General > Login Items and check both login items and background items. Spyware typically configures itself to launch at startup so it begins monitoring as soon as the computer is turned on.

Check Browser Extensions

Malicious browser extensions can monitor your browsing activity, capture form data including passwords, redirect searches, and record your screen. In Chrome, go to chrome://extensions. In Firefox, go to about:addons. In Edge, go to edge://extensions. Review every installed extension. Remove any extension you did not install yourself or do not recognize. Some stalkerware installs browser extensions that appear legitimate but forward browsing data to the stalker.

Check Email Forwarding Rules

This is one of the most critical checks and one that most people overlook. In Gmail, go to Settings > Forwarding and POP/IMAP and verify that no forwarding address is configured that you did not set up. Also check Settings > Filters and Blocked Addresses for any filter rules that forward or redirect specific emails. In Outlook, go to Settings > Mail > Forwarding and check for active forwarding rules. Also check Settings > Mail > Rules for any rules that copy or redirect messages. A single forwarding rule can give a stalker access to every email you receive, including password reset links, financial statements, and private communications.

Run an Anti-Malware Scan

Run a full system scan with a reputable anti-malware tool. Malwarebytes, Bitdefender, and Norton all detect many known stalkerware and spyware variants. Run the scan in Safe Mode if possible (on Windows: hold Shift while clicking Restart, then boot into Safe Mode with Networking), as some spyware actively evades detection during normal operation. Note that consumer anti-malware tools do not detect all stalkerware, particularly custom or recently updated variants. If your scan is clean but symptoms persist, a professional forensic examination may be necessary.

Check for Physical Keyloggers

Inspect the USB ports on your desktop computer, particularly the port where your keyboard is connected. A hardware keylogger is a small device (typically 1 to 2 inches long) that plugs between the keyboard cable and the computer. It records every keystroke to internal memory. Check the back of the computer where cables connect, and look for any USB devices you did not install. Laptops are generally not vulnerable to hardware keyloggers unless someone has attached a device to an external keyboard or USB port.

How to Detect GPS Trackers on Your Vehicle

GPS trackers hidden on vehicles allow stalkers to monitor a victim's movements in real time. These devices are small, often magnetic, and can be attached to a vehicle in seconds.

Physical Inspection

Conduct a systematic visual and tactile inspection of your vehicle. Focus on these areas:

  • Wheel wells: Run your hand along the inside of each wheel well, feeling for any magnetic or adhesive-mounted device. GPS trackers are frequently hidden here because the area is accessible without opening the vehicle
  • Undercarriage: Using a flashlight and mirror (or phone camera), inspect the underside of the vehicle, particularly the frame rails, behind the bumpers, and near the exhaust system
  • OBD-II port: Check the diagnostic port, usually located under the dashboard near the steering column. Some GPS trackers plug directly into the OBD-II port, which provides both power and vehicle data
  • Under the dashboard: Look for any device that does not appear to be factory equipment. Focus on wiring that looks added or modified
  • Trunk and spare tire compartment: Check inside the trunk lining and spare tire area for any hidden devices
  • Behind bumpers: Both front and rear bumper covers can be pulled slightly to inspect the cavity behind them

Bluetooth Scanner for AirTags and Tile

Apple AirTags, Samsung SmartTags, and Tile trackers communicate over Bluetooth Low Energy (BLE). Use the following tools to detect them:

  • iPhone: If an unknown AirTag is traveling with you, your iPhone should eventually alert you. Open the Find My app and check the Items tab for any unfamiliar items. Note that alerts can take several hours to trigger
  • Android: Download Apple's Tracker Detect app from the Google Play Store. Open it and run a scan. It will identify any AirTags in your vicinity that are separated from their owner
  • Generic BLE scanner: Apps like BLE Scanner (iOS) or nRF Connect (Android) show all active Bluetooth devices nearby. Look for devices broadcasting Apple, Tile, or Samsung tracker identifiers. Scan while parked in a location away from other people's devices to reduce false positives

RF Detector

Dedicated GPS trackers that use cellular connections to transmit location data emit radio frequency (RF) signals. An RF detector or bug sweeper (available for $50 to $200 from electronics retailers) can identify active transmitters hidden in your vehicle. To use an RF detector, park in a quiet area away from cell towers and other electronic devices, turn off your own phone and any known Bluetooth devices, slowly sweep the detector over and around the entire vehicle, and investigate any area where the detector indicates a signal. Professional-grade RF detection equipment used by forensic investigators is more sensitive and can identify specific types of transmitters.

What to Do When You Find Stalkerware: Safety First

Finding spyware on your phone or a GPS tracker on your car is alarming. Your first instinct may be to delete the software or rip out the tracker immediately. Do not do this without safety planning first. This is the most important section of this guide.

Why You Should Not Remove Stalkerware Immediately

If the person stalking you is an intimate partner, former partner, or someone with a history of controlling or violent behavior, removing the surveillance tool can be dangerous. The stalker is likely monitoring the software's status and will know immediately when it stops sending data. This loss of control can trigger escalation, including confrontation, threats, physical violence, or attempts to reinstall the surveillance by force.

Research from the National Network to End Domestic Violence (NNEDV) Safety Net project consistently shows that the most dangerous time for domestic violence victims is when they take steps to leave or assert independence. Removing stalkerware signals to the abuser that the victim knows about the surveillance and is taking action, which the abuser may interpret as the victim preparing to leave. For this reason, safety planning must come before any technical action.

Document the Evidence

Before removing or disabling anything, document what you have found. Take screenshots of suspicious apps, processes, and settings. Photograph GPS trackers in place, showing their location on the vehicle. Record the make, model, and any identifying numbers on physical devices. Note the date and time you discovered the surveillance. This documentation serves as evidence for law enforcement, protective order applications, and any future legal proceedings.

Contact Domestic Violence Resources

If the stalker is a current or former intimate partner, contact a domestic violence advocate before taking technical action. Advocates are trained in technology-facilitated abuse and can help you develop a safety plan that accounts for the specific risks of your situation.

  • National Domestic Violence Hotline: 1-800-799-7233 (call) or text START to 88788
  • NNEDV Safety Net Project: techsafety.org (technology safety resources)
  • InterAct of Wake County (Raleigh-Durham): 919-828-3005 (24-hour crisis line)

File a Police Report

Contact your local police department and file a formal report. Bring your documentation, screenshots, and photographs. Reference the specific laws being violated: N.C.G.S. 14-196.3 for electronic monitoring without consent, and 18 U.S.C. 1030 (Computer Fraud and Abuse Act) for unauthorized access to your devices. Request the case number and the name of the assigned officer. A police report creates an official record that supports protective order applications and criminal prosecution.

Engage Professional Digital Forensics

A professional digital forensics examination accomplishes several things that a victim cannot do alone. Forensic investigators create a forensic image of the device, preserving all evidence in a format that is admissible in court. They identify exactly what stalkerware is installed, when it was installed, what data it has been capturing, and where that data has been sent. They document the findings in a formal report suitable for law enforcement, prosecutors, and judges. And they can testify as expert witnesses in protective order hearings and criminal proceedings.

The forensic examination should happen before the stalkerware is removed. Once software is uninstalled or a device is factory reset, critical evidence about the stalkerware's installation date, configuration, and data exfiltration history is lost. Petronella Technology Group's forensic team works with cybersecurity and legal professionals to build comprehensive cases against digital stalkers.

Safety Planning With Technology

Once you have documented the evidence, filed a police report, and engaged forensic help, the next step is building a technology safety plan that protects you from further surveillance.

New Devices

If your phone has been compromised with stalkerware, the safest option is a new device on a new account. Purchase a new phone from a carrier account the stalker does not know about. Do not restore from a backup of the compromised device, as stalkerware settings or compromised configurations may transfer. Set up the new phone from scratch with new email accounts and new passwords. Keep the compromised device powered on and undisturbed until the forensic examination is complete.

Separate Accounts

Create new email accounts on a provider the stalker would not expect. Use these accounts for all safety planning, legal correspondence, and communications with advocates and law enforcement. Do not link new accounts to old phone numbers or recovery email addresses. Change passwords on every existing account from a device you are confident has not been compromised. Enable two-factor authentication on all accounts using an authenticator app rather than SMS.

VPN for All Devices

A Virtual Private Network (VPN) encrypts all internet traffic leaving your device, preventing network-level monitoring of your online activity. Use a reputable VPN service on all devices, including phones, tablets, and computers. This is particularly important if the stalker had access to your home Wi-Fi network or if you suspect router-level surveillance.

Burner Phone for Safe Communications

In high-risk situations, consider obtaining a prepaid phone that the stalker has no knowledge of. Use this phone exclusively for communications with advocates, attorneys, law enforcement, and trusted contacts involved in your safety plan. Do not connect the burner phone to any accounts, Wi-Fi networks, or services associated with your identity. Pay for the phone and service with cash.

Privacy Hygiene

Disable location services for all apps that do not require them. Turn off Bluetooth and AirDrop when not in use. Review social media privacy settings and restrict who can see your posts, friends list, and tagged photos. Disable location tagging on photos. Google your own name, phone number, and address periodically and request removal from data broker sites. Check your home Wi-Fi router for unfamiliar connected devices, and change the Wi-Fi password and network name.

How Digital Stalking Connects to Broader Cyber Threats

Digital stalking rarely exists in isolation. Understanding how it connects to other forms of technology-facilitated abuse helps victims and advocates identify the full scope of the situation.

Cyber stalking and harassment: Digital stalking often escalates into broader patterns of cyber stalking, including threatening messages, fake accounts, impersonation, and doxxing. For a detailed guide on North Carolina cyber stalking laws, protective orders, and law enforcement options, see our post on cyber stalking in North Carolina.

Sextortion: Stalkers who gain access to a victim's phone or cloud storage through stalkerware may discover intimate images and use them as leverage for extortion. If someone is threatening to distribute intimate images obtained through surveillance, see our guide on sextortion: what to do if you are being blackmailed online.

Identity theft: Stalkerware that captures keystrokes, passwords, and financial account data gives the stalker everything needed to commit identity theft. Victims of digital stalking should monitor their credit reports and consider placing a credit freeze with all three bureaus (Equifax, Experian, TransUnion).

Workplace security risks: When an employee's personal device is compromised with stalkerware and that device connects to corporate systems, the stalker may inadvertently or intentionally gain access to business data. Organizations should engage their cybersecurity team when an employee reports being stalked, as the threat may extend to company networks and data.

Need Help With Digital Stalking? Contact Petronella's Forensics Team

Petronella Technology Group provides digital forensics investigation, stalkerware detection, GPS tracker identification, evidence preservation, and expert testimony for digital stalking cases. We work directly with law enforcement and attorneys to build cases that hold stalkers accountable. Contact us for a confidential consultation or call 919-348-4912.

Resources for Digital Stalking Victims

The following organizations provide crisis intervention, technology safety resources, legal advocacy, and counseling for stalking victims. All services listed are free or low-cost.

  • National Domestic Violence Hotline — 24/7 crisis support, safety planning, and referrals. Call 1-800-799-7233 or text START to 88788. Website: thehotline.org
  • NNEDV Safety Net Project — Technology safety resources specifically addressing stalkerware, GPS trackers, and digital safety planning for abuse victims. Website: techsafety.org
  • Coalition Against Stalkerware — Resources for victims, survivors, and advocates dealing with stalkerware and monitoring software. Website: stopstalkerware.org
  • Stalking Prevention, Awareness, and Resource Center (SPARC) — National resource center for stalking information, research, and victim services. Website: stalkingawareness.org
  • InterAct of Wake County (Raleigh-Durham) — Crisis intervention, legal advocacy, and shelter for victims of domestic violence and stalking. 24-hour crisis line: 919-828-3005. Website: interactofwc.org
  • North Carolina Coalition Against Domestic Violence (NCCADV) — Statewide resource connecting victims to local programs, legal aid, and safety planning. Website: nccadv.org
  • FBI Internet Crime Complaint Center (IC3) — Report digital stalking that involves federal crimes at ic3.gov

Key Takeaways

  • Digital stalking is a crime. Installing spyware on someone's device without consent violates the Computer Fraud and Abuse Act (18 U.S.C. 1030) and North Carolina's N.C.G.S. 14-196.3. GPS tracking without consent is also illegal under both state and federal law
  • Stalkerware hides, but it leaves traces. Battery drain, data usage spikes, unknown apps, overheating, and accounts accessed from unfamiliar locations are all indicators of hidden surveillance software
  • Check your phone systematically. On Android, review installed apps, device administrators, accessibility services, and unknown sources settings. On iPhone, check configuration profiles, Screen Time, location sharing, and connected devices
  • Check your computer and email. Review startup programs, browser extensions, email forwarding rules, and physical USB ports for hardware keyloggers
  • Do not remove stalkerware before safety planning. The stalker will know immediately when the software stops reporting. Contact a domestic violence advocate, document the evidence, file a police report, and engage forensic help before taking any technical action
  • Professional forensics preserves evidence for court. A forensic examination identifies exactly what was installed, when it was installed, what data was captured, and where it was sent, all documented in a court-admissible format
  • Build a technology safety plan. New devices, separate accounts, VPN, burner phone for safe communications, and restricted privacy settings create layers of protection against further surveillance
  • Help is available. The National Domestic Violence Hotline (1-800-799-7233), NNEDV Safety Net (techsafety.org), and Coalition Against Stalkerware (stopstalkerware.org) all provide free resources for digital stalking victims

Digital stalking is a serious violation of your privacy, autonomy, and safety. The technology used to stalk you can also be used to catch the stalker. Professional forensic investigation, combined with law enforcement action and legal protection, gives victims the tools to stop the surveillance, preserve the evidence, and hold the person responsible accountable.

If you suspect someone is monitoring your phone, tracking your location, or accessing your accounts without your consent, contact Petronella Technology Group for a confidential consultation. Our digital forensics team specializes in stalkerware detection, GPS tracker identification, account security audits, evidence preservation, and expert testimony for protective order hearings and criminal cases. Call 919-348-4912 or visit our incident response page for immediate assistance.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now