WHAT IS MOBILE SPYWARE?
Mobile spyware is software or an app that can be installed onto a smartphone that will allow someone else to remotely monitor activities on the phone. (Note: mobile spyware is slightly different from computer spyware. Read our Spyware and Safety handout for more on computer spyware.)
Depending on the type of spyware installed, in most cases, the spyware will monitor:
If the phone has been jailbroken[1] (iPhone) or rooted[2] (Android), spyware software can monitor more, including:
Once the software or app is installed, the perpetrator can monitor all the above activity via an online website.
HOW DO I IDENTIFY IF MOBILE SPYWARE HAS BEEN INSTALLED?
It is difficult to identify whether spyware has been installed, since most spyware products operate in “stealth” mode so it cannot be detected on the phone. The best way to identify whether spyware has been installed is for a forensic examination of the phone to be completed, often by police.
If it is not possible to get the police to do a forensic examination or if she does not want to involve the police, some clues that spyware might have been installed include the following.
All of the commercially-available spyware products requires someone to download the software and run the installation. This can be the perpetrator or someone who is installing the product on behalf of the perpetrator. It is generally difficult for the user to accidently install the software since this is an active process. The installation process generally requires 15-20 minutes to install.
Another clue that perhaps spyware might be installed is if the perpetrator knows more than they should and that knowledge encompasses the activities listed above that spyware monitors. Because spyware monitors a wide range of activity, the assumption is that perpetrator will know all of that information.
In some cases, because spyware is running on the phone, you may notice increased battery usage or data usage. If the phone has been jailbroken or rooted, the phone is less secure, which could result in faulty type behaviour on the phone, such as the phone shutting down or consistent dropped calls.
For further security, it is best that backups or SD cards from the previous version of the phone not be installed on to the new phone.
Also think about whether the perpetrator may have access to your accounts, such as the iCloud or Google account, email, your phone bills, or other social media app that might be tracking your location. Having access to those accounts could also give the abusive person similar knowledge to spyware.
©2019 BC Society of Transition Houses, Technology Safety Project.
Adapted from and in cooperation with the WESNET Safety Net Australia project at the Women’s Services Network, Australia
[1] Jailbreaking a mobile device context, is the use of an exploit to remove manufacturer or carrier restrictions from a device such as an iPhone or iPad. (https://whatis.techtarget.com/definition/jailbreaking)
[2] Rooting is the process of allowing users of smartphones, tablets and other devices running the Android mobile operating system to attain privileged control (known as root access) over various Android subsystems.
©2019 BC Society of Transition Houses, Technology Safety Project.
Suite 325, 119 W. Pender St. Vancouver BC V6B 1S5
T: 604.669.6943 or 1.800.661.1040
F: 604.682.6962
E: info@bcsth.ca
Website developed by Affinity Bridge.
If you think someone is monitoring your devices, visit this webpage from a computer, tablet or smartphone that isn’t being monitored.
EXIT NOW from this website and delete it from your browser history.