Just Stalking
  • Home
  • About
    • About Just Stalking
    • Volunteer
    • History/Development
  • "I have a stalker!" Steps
    • Just Quick Steps & Logs
    • Just Six Stages
    • Red Flags & Violence
    • Victim & Stalker Profiles
    • Two-Weeks - Recurrence
    • Stalking-by-Proxy
  • Special Victims Unit
    • Same-Gender
    • Men-Victims/Women Stalker
    • False Victimization (FVS)
    • Military & Vets
    • College
    • Juvenile Stalking
  • Security Tips
    • Personal Security
    • Cyber/Online Tips
    • Residence Security Tips
    • Car/Travel Security Tips
    • Office/Work Security Tips
    • Self-Defense Classes
    • First Aid/CPR
  • MD Victims' Rights & Laws
    • MD & Relevant Laws
    • Victims' Rights/Process
    • Restitution/Compensation
    • Address Confidentiality
    • Criminal Justice Barriers
  • Professional & Workplace
    • Non-Family Violence (NFV)
    • Workplace: Police
    • Professional Victims
    • NFV Recommendations
  • DV/IPV & Intrafamilial
    • Partner Stalking
    • Just Provider Tips
  • Cyberstalking
    • Stalkerware
  • Maryland County Resources
    • Western, Maryland
    • Greater Baltimore, MD
    • Capital Metro, Maryland
    • Eastern Shore, Maryland
    • Southern, Maryland
  • Just Global
    • National
    • International
  • Formal& Informal Resource
    • Mental Health & Stalking
    • Physical Health &Stalking
    • Resilience
    • Bystander Resources
  • Advocacy
    • Advocating for Policies
    • Legislative Goals
  • Contact Us
Just Stalking
  • Home
  • About
    • About Just Stalking
    • Volunteer
    • History/Development
  • "I have a stalker!" Steps
    • Just Quick Steps & Logs
    • Just Six Stages
    • Red Flags & Violence
    • Victim & Stalker Profiles
    • Two-Weeks - Recurrence
    • Stalking-by-Proxy
  • Special Victims Unit
    • Same-Gender
    • Men-Victims/Women Stalker
    • False Victimization (FVS)
    • Military & Vets
    • College
    • Juvenile Stalking
  • Security Tips
    • Personal Security
    • Cyber/Online Tips
    • Residence Security Tips
    • Car/Travel Security Tips
    • Office/Work Security Tips
    • Self-Defense Classes
    • First Aid/CPR
  • MD Victims' Rights & Laws
    • MD & Relevant Laws
    • Victims' Rights/Process
    • Restitution/Compensation
    • Address Confidentiality
    • Criminal Justice Barriers
  • Professional & Workplace
    • Non-Family Violence (NFV)
    • Workplace: Police
    • Professional Victims
    • NFV Recommendations
  • DV/IPV & Intrafamilial
    • Partner Stalking
    • Just Provider Tips
  • Cyberstalking
    • Stalkerware
  • Maryland County Resources
    • Western, Maryland
    • Greater Baltimore, MD
    • Capital Metro, Maryland
    • Eastern Shore, Maryland
    • Southern, Maryland
  • Just Global
    • National
    • International
  • Formal& Informal Resource
    • Mental Health & Stalking
    • Physical Health &Stalking
    • Resilience
    • Bystander Resources
  • Advocacy
    • Advocating for Policies
    • Legislative Goals
  • Contact Us

Stalkerware

What is Stalkerware?

Stalkerware is any app, software program, or device that enables the stalker or proxy to secretly monitor and record activity about you, or those in your circle, through electronic device(s), i.e. phone, computer, etc. 

Caution

Be aware that anything you do on the device with stalkerware installed could be revealed to the person who is monitoring it, if possible use a device that isn’t being monitored. 

See: Online Tips

Stalkerware

What is Spyware aka Stalkerware?

The term ‘stalkerware’ emerged more recently as it draws attention to the invasive, intrusive, and dangerous misuse of these tools. It enables remote monitoring to facilitate surveillance, harassment, abuse, stalking, and/or violence, without the user’s consent. The software may be “hidden” on the device, with no noticable operating changes, or explicit and persistent notification that the stalkerware was installed. It is usually difficult, if not impossible, to detect and remove, making it costly for the victim to address. Stalkers may also utilize others types of device apps and features, such as “Find My Phone” or family locator services. 

Link: Spyware/ Stalkerware Overview

Laws for Cyberstalking

In Maryland, it is illegal to monitor or surveil another person without their permission or a court order, even a family member, utilizing technology or gps systems. Depending on the circumstance and context, installing spyware can violate a number of laws, ranging from stalking or harassment to unauthorized access of a computer, to wiretapping and eavesdropping. For more information on laws related to electronic surveillance, see applicable laws.

See: Stalking

What Can I Do If I Suspect Stalkerware?

If you suspect or find that stalkerware is on your device(s)

  1. Determine if it’s there
  2. Explore options for removing/replacing item,
  3. Document incident(s) on a non-electronic Stalking Logbook
  4. Keep yourself safe 
  5. Ask law enforcement or SA to investigate

Consider other ways that someone could know about the activity on your devices, such as having access to the device itself or online accounts, or through second/third hand information, or physical following. 

See: Stalking Logbook

Very quickly and very effectively... using online clues... [they] figured out who all of my siblings were and what their jobs were...[T]hat made me quite scared that they were going to go after my family.


Posetti & Shabbir, 2022, n.p.

Online Tips

Safety first

Consider how your safety might be affected if you identify or remove stalkerware. Address this in your safety-plan. DV stalkers in particular, may escalate their abusive behavior when stalkerware is removed.

If you suspect stalkerware, what you do on your phone could be seen by the other person. For calls or online activity where you want more privacy, use a phone or other device that isn’t being monitored, or an encrypted app. 

Documenting the Stalkerware

Document all incidence(s) of cyber-stalking in using the "Stalking Log" However, police or a forensics expert can look for evidence.

Link: Evidence Collection Series: Mobile Spyware

How Do I Find Out if Stalkerware Is on My Computer?

Stalkerware will not necessarily have noticeable operating changes. You, however, may be able to notice changes in the stalker's behavior, patterns, or knowledge, indicating they have installed stalkerware. Hardware devices may be found in areas such as, between the computer and the keyboard cord, or  keyboards or mice can be replaced. Devices are usually installed inside the laptop, through the access panel.

Link:Spyware and Stalkerware: Computer Surveillance & Safety for Survivor

Removing Stalkerware

A full factory reset can usually remove the stalkerware. However, reinstalling apps or files from a backup can re-load it onto the device. You could also create a new iCloud/Google account for your device, in addition, so you’re starting over. The safest option is to replace the hard drive or get a new computer.

Replace your current phone. If you are able/safe, you could replace your phone, or set up a second phone. Here are a few options:

  • Purchase a new phone, and consider switching carriers and getting a new phone number. If possible note in your account that you are the only authorized account holder or set up notifications if changes are made to your account. 
  • Purchase a pay-as-you-go phone (called a "burner" phone) with cash.
  • Depending on your income or circumstances, you may qualify for discounts on phones or service. LifeLine offers a discount for individuals who qualify as low-income.
  • A trusted person might be able to give you a phone. Wipe the phone’s memory and do a “factory reset” to remove all of their information.

Important: Don’t connect the new phone to any old accounts, especially cloud accounts like Google or iCloud, and don’t use your old number. Don’t move data from your old phone to the new phone using a memory card, SIM card, your cloud account, or backups. Doing so could reinstall stalkerware. 

Link: Lifeline Support for Affordable Communications

Use devices that aren’t being monitored

If your computer has stalkerware all activity including online chat, emails, and web searches, can be revealed to the cyberstalker. If you can, use a safer computer or device – one the person has not had physical or remote access to. It is recommended that DV/IPV victims look for help or information on computers in:

  • a public library
  • community center
  • a friend’s device. 

Update accounts

Stalkerware may have given the stalker access to your login information, consider resetting your passwords on a different device. Once the account(s) are reset, do not log-in again using the monitored device(s). Consider changing passwords for sensitive accounts i.e. online banks, social media accounts, etc. 

Link: Are You Guarding Your Galaxy from Cyberthreats?

Location Trackers & GPS

Location tracking devices can be as small as a quarter and hidden in clothes, bags, cars, or gifts. Check for hidden trackers in your belongings & vehicle. 

  • Car: check in the trunk, under the hood, inside the bumper, and under and between the seats. Ask a trusted mechanic or law enforcement for assistance.
  • Belongings: Check out of place items. For gifts that are non-electronic (such as a toy), look for any electronic parts that shouldn’t be part of the toy.

Link: Survivor’s Guide to Location Tracking

Just More Resources

Link: Basil's Cyber Marathonlink: EndTabLink: Coalition against stalkerwareLink: OnlineSOSLink: Equality Labslink: Apple Sued by Women Over ‘Dangerous’ AirTag Stalking by Exes
quick exit

Copyright © 2024 Just Stalking - All Rights Reserved.

Just Stalking: Resources, Inc. is a nonprofit, tax-exempt 501(c)(3) organization (EIN: 93-4264447).

Disclaimer: We are NOT a legal, mental health, medical, victims' advocate provider(s). We are NOT certified educators, financial experts, security specialists, or self-defense experts. While some of our staff may have training, background, or experience in legal, mental health, medical, victims' advocacy, education, financial, security, or self-defense fields pertaining to Maryland, none of our staff is currently, licensed, or certified specialists in the aforementioned fields. WE ARE NOT PROVIDING ADVICE, IN SUCH FIELDS. OUR GOAL IS TO DIRECT VICTIMS TO APPLICABLE PROVIDERS, PROVIDE FEEDBACK BASED ON PERSONAL EXPERIENCES, USING RELEVANT EVIDENCE-BASED RESEARCH & PRACTICES. WE WILL DO OUR BEST TO PROVIDE RESOURCES FOR ALL AFOREMENTIONED TIPS. IF YOU ARE IN DISTRESS PLEASE CALL 911.

Powered by

Safety Tips

  • Your cyber-use can be monitored.
  • If you feel unsafe, contact 9-1-1.
  • "Quick Exits" appear at the bottom of each page.
  • We use cookies to analyze website traffic.
  • Email with any questions! 

Accept

Safety Check

Quick Exit