Stalkerware is any app, software program, or device that enables the stalker or proxy to secretly monitor and record activity about you, or those in your circle, through electronic device(s), i.e. phone, computer, etc.
Be aware that anything you do on the device with stalkerware installed could be revealed to the person who is monitoring it, if possible use a device that isn’t being monitored.
The term ‘stalkerware’ emerged more recently as it draws attention to the invasive, intrusive, and dangerous misuse of these tools. It enables remote monitoring to facilitate surveillance, harassment, abuse, stalking, and/or violence, without the user’s consent. The software may be “hidden” on the device, with no noticable operating changes, or explicit and persistent notification that the stalkerware was installed. It is usually difficult, if not impossible, to detect and remove, making it costly for the victim to address. Stalkers may also utilize others types of device apps and features, such as “Find My Phone” or family locator services.
In Maryland, it is illegal to monitor or surveil another person without their permission or a court order, even a family member, utilizing technology or gps systems. Depending on the circumstance and context, installing spyware can violate a number of laws, ranging from stalking or harassment to unauthorized access of a computer, to wiretapping and eavesdropping. For more information on laws related to electronic surveillance, see applicable laws.
If you suspect or find that stalkerware is on your device(s)
Consider other ways that someone could know about the activity on your devices, such as having access to the device itself or online accounts, or through second/third hand information, or physical following.
Posetti & Shabbir, 2022, n.p.
Consider how your safety might be affected if you identify or remove stalkerware. Address this in your safety-plan. DV stalkers in particular, may escalate their abusive behavior when stalkerware is removed.
If you suspect stalkerware, what you do on your phone could be seen by the other person. For calls or online activity where you want more privacy, use a phone or other device that isn’t being monitored, or an encrypted app.
Document all incidence(s) of cyber-stalking in using the "Stalking Log" However, police or a forensics expert can look for evidence.
Stalkerware will not necessarily have noticeable operating changes. You, however, may be able to notice changes in the stalker's behavior, patterns, or knowledge, indicating they have installed stalkerware. Hardware devices may be found in areas such as, between the computer and the keyboard cord, or keyboards or mice can be replaced. Devices are usually installed inside the laptop, through the access panel.
A full factory reset can usually remove the stalkerware. However, reinstalling apps or files from a backup can re-load it onto the device. You could also create a new iCloud/Google account for your device, in addition, so you’re starting over. The safest option is to replace the hard drive or get a new computer.
Replace your current phone. If you are able/safe, you could replace your phone, or set up a second phone. Here are a few options:
Important: Don’t connect the new phone to any old accounts, especially cloud accounts like Google or iCloud, and don’t use your old number. Don’t move data from your old phone to the new phone using a memory card, SIM card, your cloud account, or backups. Doing so could reinstall stalkerware.
If your computer has stalkerware all activity including online chat, emails, and web searches, can be revealed to the cyberstalker. If you can, use a safer computer or device – one the person has not had physical or remote access to. It is recommended that DV/IPV victims look for help or information on computers in:
Stalkerware may have given the stalker access to your login information, consider resetting your passwords on a different device. Once the account(s) are reset, do not log-in again using the monitored device(s). Consider changing passwords for sensitive accounts i.e. online banks, social media accounts, etc.
Location tracking devices can be as small as a quarter and hidden in clothes, bags, cars, or gifts. Check for hidden trackers in your belongings & vehicle.
Copyright © 2024 Just Stalking - All Rights Reserved.
Just Stalking: Resources, Inc. is a nonprofit, tax-exempt 501(c)(3) organization (EIN: 93-4264447).
Disclaimer: We are NOT a legal, mental health, medical, victims' advocate provider(s). We are NOT certified educators, financial experts, security specialists, or self-defense experts. While some of our staff may have training, background, or experience in legal, mental health, medical, victims' advocacy, education, financial, security, or self-defense fields pertaining to Maryland, none of our staff is currently, licensed, or certified specialists in the aforementioned fields. WE ARE NOT PROVIDING ADVICE, IN SUCH FIELDS. OUR GOAL IS TO DIRECT VICTIMS TO APPLICABLE PROVIDERS, PROVIDE FEEDBACK BASED ON PERSONAL EXPERIENCES, USING RELEVANT EVIDENCE-BASED RESEARCH & PRACTICES. WE WILL DO OUR BEST TO PROVIDE RESOURCES FOR ALL AFOREMENTIONED TIPS. IF YOU ARE IN DISTRESS PLEASE CALL 911.