How to know if your phone is tapped: 11 warning signs
The idea of someone secretly listening in on phone calls or tracking activity without permission is unsettling. Phone tapping is often associated with law enforcement investigations but if something feels off about a device and the way it is working, these warning signs might indicate a breach of your privacy.
1. Strange sounds during calls
Hearing clicking, static, or faint voices in the background of calls could suggest interference from wiretapping or spyware. Occasional static might be due to a weak signal or network issues, but persistent noises that weren’t there before should be treated as a red flag. Some forms of surveillance tech can even introduce subtle echoes or small delays in conversation.
2. A hot or quickly draining battery
There are lots of apps that may drain a phone’s battery, but a device that suddenly overheats or drains its battery much faster than usual could have spyware running in the background. Surveillance apps continuously send data, causing increased power consumption. While older batteries degrade naturally, a rapid change in battery life could mean the phone is being used for more than just personal communication.
3. Unusual phone activity when not in use
Does your phone seem to have a mind of its own? If it is doing things like restarting unexpectedly or setting off alerts, or even just lighting up when you don’t expect it, these can all be concerns.
Spyware or hacking attempts could force a phone to execute commands remotely. Malicious software can also trigger strange pop-ups or cause apps to open without user input. Any of these signs need to be explored further.
4. Trouble shutting down
When shutting down takes longer than usual or the device freezes before turning off, it could be a sign that the phone is transmitting data before shutting down. Surveillance apps sometimes try to complete background tasks or maintain access before the phone fully powers down.
5. Websites look different
Spyware and tracking software can modify how websites appear. This is particularly obvious on login pages and those where data is transmitted. If websites seem off with things like incorrect logos or weird pop-ups then malicious software might be intercepting data. It is always best to err on the side of caution.
6. You receive unusual texts
Receiving random text messages with strange characters or symbols could mean a spyware app is using SMS commands. Some spyware tools communicate with external servers using coded text messages that aren’t meant to be understood by the user.
7. Cameras and microphones turn on randomly
This is a big fear for many people. If the camera light turns on or microphone indicators appear without reason, unauthorized software could be accessing these features. A phone that suddenly starts recording audio or video without input could be compromised.
8. Increased data usage
Spyware or tracking software sends data to third parties and this is often happening without the user realizing it. An unexpected spike in mobile data usage might indicate that a device is secretly transmitting information. Checking data logs can help identify apps responsible for high usage.
9. Hidden or suspicious apps
Malicious software often disguises itself as an ordinary app. If an unfamiliar app appears on the phone or an email app requests unnecessary permissions, it could be a sign of spyware. Checking app permissions and installation history can help identify anything suspicious.
10. Status icons appearing unexpectedly
Some phones display icons when features like the camera or location services are in use. If these indicators appear when an app isn’t open, it might mean a background process is accessing sensitive information.
This feature is useful for detecting unauthorized surveillance, but there can sometimes be innocent explanations (such as if you have allowed an app to access your location).
11. Poor device performance
Spyware is like any other software – it uses CPU power and bandwidth. This can cause devices to lag or overheat. If a phone suddenly feels sluggish and freezes then background apps might be to blame. This doesn’t always mean that it is because of being tapped, but it is possible.
How to check if your phone is tapped or tracked
Suspecting surveillance is one thing, but confirming it requires further investigation. Here are some ways to check whether a phone has been compromised.
Check for call forwarding
Phone tapping sometimes involves call forwarding, where incoming calls are silently redirected to another number. Dialing MMI codes like *#62# or checking call settings can reveal whether calls are being diverted. If call forwarding is detected, you can disable it – instructions below.
Check for spyware or malware
Reviewing installed apps can help detect unauthorized software. Security apps or antivirus programs can scan for known spyware and alert you if there is anything untoward on your device. If the phone has been jailbroken or rooted without permission then this can increase the risk of surveillance tools being installed.
A recent form of malware called SparkCat managed to infiltrate phones via apps available on the App Store and Google Play Store. These apps were downloaded hundreds of thousands of times and managed to steal data in the form of important information that could be used to access crypto accounts.
Monitor app permissions
It can be annoying when apps constantly ask for permissions. Sometimes people just allow them for convenience but knowing which apps have access to functions like the microphone and location is crucial. Apps should only have permissions relevant to their function. If a shopping app or calculator suddenly requests microphone access, it’s a cause for concern.
Check tracking indicators on iPhone
Apple’s iOS displays a green dot when the camera is active and an orange dot when the microphone is in use. The location services arrow appears when an app is tracking movement. These privacy indicators help identify potential surveillance and apps that may be accessing these features unnecessarily.
Check tracking indicators on Android
Android’s Privacy Dashboard logs apps that access the camera, microphone, and location. Reviewing this log can reveal suspicious activity and show which apps have recently used these features.
How to stop call forwarding
If call forwarding is detected and you don’t know why it is active, then that is a cause for concern. It’s possible to disable call forwarding using the phone’s settings which can add an extra level of security.
Disabling call forwarding on iPhone
- Open Settings.
- Go to Phone > Call Forwarding.
- If enabled, toggle it off.
Disabling call forwarding on Android
- Open the Phone app.
- Tap the menu (three dots) and select Settings.
- Go to Call Forwarding and turn off any active forwarding.
How to reduce the risk of having your phone tapped
Fortunately, there are ways to try and prevent this scenario from ever happening to you. As surveillance techniques become more sophisticated, protecting a phone from potential tapping may involve taking proactive security measures. Some simple steps can make it far more difficult for unauthorized parties to gain access or install spyware.
Keep your phone updated
Regular software updates are essential for keeping a phone secure. Manufacturers frequently release security patches to fix vulnerabilities that hackers or spyware might exploit.
Lots of people update because they want to embrace new functions but failing to update a device also leaves it exposed to known security flaws, making it easier for attackers to install tracking software or intercept communications.
Use secure communication apps
End-to-end encrypted messaging apps provide a layer of protection against interception. Unlike standard SMS, which can be vulnerable to hacking or surveillance, encrypted apps ensure that only the sender and recipient can read messages.
Popular secure messaging services prevent even the app developers from accessing conversations which can make them an essential tool for private communication.
Use a VPN
A Virtual Private Network (VPN) encrypts all internet traffic which makes it harder for hackers and third parties to track online activity. These have been part of mobile and computer security for decades now, and continue to provide a layer of protection.
A VPN masks IP addresses and browsing habits and stops unwanted surveillance. Without encryption on your phone, the data sent (particularly over public Wi-Fi networks) could potentially be intercepted, allowing attackers to collect sensitive information.
Turn off Bluetooth
Leaving Bluetooth enabled allows nearby devices to attempt connections, creating potential security risks and threats. Attackers can use Bluetooth vulnerabilities to gain access to a device or install spyware. Keeping Bluetooth off when not in use minimizes the risk of unauthorized tracking or hacking and there’s no real need to have it on if it is not being used.
Manage app permissions
Many apps request access to data they don’t actually need. Checking and revoking unnecessary permissions reduces the risk of apps secretly collecting information. If an app is asking for more access than required, it could be a sign of hidden spyware.
Delete unused or suspicious apps
Uninstalling apps that are no longer in use or seem suspicious reduces the attack surface of a device. Malicious apps often disguise themselves as harmless software but can run surveillance operations in the background.
Phishing attacks can nudge people to download malicious apps. A regular review of installed applications helps eliminate security threats before they become a problem. Unwanted apps can give hackers control over your device and open you up to denial-of-service attacks.
Clear your cookies and cache
Web browsers store cookies and cached data that can be used to track browsing habits. Spyware or malicious scripts may exploit these files to gather personal information. Cookies store user data such as login details and preferences, as well as tracking information. A cache, on the other hand, stores things like images and scripts to load pages faster in the future.
Clearing your cache and cookies prevents fingerprinting and removes potential tracking mechanisms left behind by compromised websites, but it comes with a trade-off as this means that things like preferences will need to be reset, and you won’t be able to stay logged into sites.
Some websites are now also using “Supercookies” which are a type of tracking cookie that can collect data about internet browsing history and habits. Others also use browser fingerprinting methods which gather hundreds of different data points about users, even without cookies being used. These are both potential privacy concerns for users.
Use a private browser
Standard web browsers collect large amounts of user data through trackers and cookies. A private browser can stop websites from monitoring browsing habits and minimize exposure to data collection and targeted surveillance.
Install Malwarebytes mobile security software
Security apps help detect and block spyware and other malicious software. Malwarebytes mobile security app offers real-time protection and alerts you about any suspicious activity so that you can take action. Investing in a quality security app can give you a peace of mind. Malwarebytes mobile security now includes a AI-powered Scam Guard feature offering you a real-time scam detection so you always recognize suspicious links right away.
What to do if your phone has been tapped
If you are worried that your phone has been tapped or compromised then you’ll need to take immediate action to stop further data leaks. The following steps can help regain control.
Put your phone into airplane mode
Enabling airplane mode instantly disconnects a device from all wireless networks. It can be a quick way to prevent hackers or surveillance software from accessing data in real time. While in airplane mode no messages or internet traffic can be transmitted, cutting off the attacker’s ability to monitor activity.
Reboot your phone in safe mode
Most smartphones allow users to restart in safe mode, disabling all third-party applications. This is an effective way to check if spyware is running in the background. Once in safe mode, reviewing installed apps and uninstalling anything suspicious can help remove hidden tracking software.
Disable location services
Turning off location services stops apps and background processes from tracking real-time movements. Many spyware tools continuously monitor GPS data so disabling location tracking helps prevent surveillance. You can check app-specific location permissions to ensure no unnecessary tracking is occurring.
Perform a factory reset
This would be a last resort, but if spyware or malware is deeply embedded within the system, then performing a factory reset may be the only way to fully remove it. Resetting a phone erases all data and restores the device to its original state, eliminating hidden surveillance tools. However, it’s important to back up important files before performing a reset.
Report the tapping incident
If there is strong evidence that your phone is being tapped illegally, you should report it to law enforcement or cybersecurity experts. Authorities can investigate further and provide guidance on additional security measures to prevent future breaches.
In the United States, crimes can be reported to the Cybersecurity and Infrastructure Security Agency (CISA) and to state police. It is important to report crimes like these to try and prevent others from suffering the same fate.