Check if You Are Under Surveillance

Ever had the feeling you were being watched? If you think you're under surveillance, you're probably experiencing a lot of stress. How can you tell who to trust? With a little awareness, you can probably determine whether or not the threat is real or in your head. See Step 1 below to learn how to spot and lose tails, check if your phone is being monitored, and protect your emails.

Steps

Checking for Tails

  1. Ask yourself why you would be followed. Tailing someone takes time and resources, and most local authorities won't waste time trying to tail average citizens. Private investigators and angry exes are a different matter. Before you start getting paranoid, ask yourself if you actually have anything to fear.
  2. Be aware. The main key to identifying tails is to stay aware of your surroundings at all time. Don't keep your nose stuck in your phone; keep your eyes up and monitoring the world around you. If you're not paying attention, you'll never know if you're being followed.[1]
  3. Avoid looking over your shoulder. When you start acting suspicious, your tail will notice and either drop back or stop in order to try again later. If you feel like you're being followed, keep acting like you don't know.
  4. Slow your pace. This applies to both walking and driving. If you're walking, slow down and look in some store windows or at your phone. Make sure to keep one eye on your surroundings while doing so. If you're driving, move over to the slow lane and drive the speed limit.
  5. Call the police. If you think you are legitimately being followed and that you are in danger, you should call the police immediately. Try to stay in crowded, public areas while you wait for local law enforcement to respond
    • Large crowds can help you identify the person tailing you so that you can give the description to the police.
    • If you call the police and a local undercover is following you, it will usually back off. If it is a state or federal officer tailing you, then they will likely get pulled over by the local police. If it is a private investigator, they may get ticketed and you may be informed as to what was happening.
  6. Avoid panicking. If you think you're being followed, the worst thing you can do is start running or driving erratically. Not only does this alert the people that are following you, but it can put you in danger of an accident.
  7. Change your patterns. Get off at an exit and then get immediately back on the freeway. If you're walking, walk around the block once or twice. This will usually throw off the person tailing you, or at least make them aware that you're aware.
  8. Don't follow the follower. Some people suggest that you tail the person that is tailing you in order to get a better idea of who they are, but this is generally not a good idea and can be very dangerous.

Knowing if Your Phone is Tapped

  1. Understand how spy software works. Spy software is installed on smartphone without the user's knowledge. It can then send back GPS location, phone conversations, text messages and more. It is incredibly unlikely that your phone has spy software installed on it by a malicious party, but these steps will help you make sure.
  2. Check your phone's behavior. Is your phone acting oddly? Is it lighting up when you're not using it, shutting down randomly, or making beeping noises? All phones will act oddly sometimes, but if this behavior is consistent then you may have spy software installed.
  3. Monitor your battery. Many spy programs will increase the drain on your battery. It can be difficult to notice, especially since your phone's battery will naturally become less efficient over time. Look for dramatic shifts in battery life, as these will be more indicative of a program draining it.
  4. Check for background noise during calls. A lot of times, background noise is a natural by-product of low-quality cellular service, but if you consistently hear static, clicking, and beeping noises during conversations they could potentially be signs of recording software. This is because some call recording software acts like a conference call.
  5. Look for strange texts. Many spy programs are controlled remotely via coded texts. When the program is not functioning properly, these texts may appear in your inbox. If you are receiving texts with random collections of letters and numbers, your phone may be infected with spy software.
  6. Check your data usage. Many spy programs, especially cheaper ones, will use your service's data plan to send out the information that it collected. Use a data management app to track what apps are using data and how much they are using. If you are sending out data that you cannot account for, you may have spy software installed.
  7. Check for a jailbreak. If you are using an iPhone, the only way to have spy software installed is if your phone has been jailbroken. Look for the Installer, Cydia, or Icy apps on your Home screens. If you see any of these apps, or apps that were installed from sources other than the Apple App Store, then your phone has been jailbroken and spy software may have been installed.[2]
    • You can easily revert a jailbreak by restoring your iPhone. This will remove all apps that rely on the phone being jailbroken, which means all spy programs will be disabled. See this guide for detailed instructions on restoring your iPhone.
  8. Use misdirection. If you feel like your conversations are being monitored by someone you know, one way to trap them is to deliberately spread misinformation. Call a trusted friend and tell them something believable but false, either about your schedule, your life, or anything else. If you later discover that people you know have come into this information, you'll know that someone was listening in.[3]

Checking for Email and Computer Monitoring

  1. Assume that all workplace computer use is monitored. Most large companies have workplace computer use agreements that allow them to monitor the sites you visit, the emails you send, and the programs you run. Check with your IT department if you want to see the details of the agreement, but assume that nothing you do at work is private.
  2. Check for keyloggers. Keyloggers are programs that capture every keystroke you make on your computer. They can be used to reconstruct emails and steal passwords. Keyloggers run in the background, and don't have icons in the system tray or other obvious signs that they are working.
    • If you are using Windows, press Ctrl+ Shift+Esc to open the Task Manager. Look in the Process or Background Processes section, and make note of any unfamiliar processes. Google anything that is unfamiliar to see if there are keylogging programs installed.
    • If you are using a Mac, open the Activity Monitor. You can find this program in the Utilities subfolder of your Applications folder. Look through all of the active processes and note any that are unfamiliar. Use Google to find out if they are malicious or not.
    • Keylogger processes often take up a lot of resources as they have to track a significant amount of information.
  3. Install your own email tracking software. Programs like ReadNotify embed small, invisible images in your email that allow you to see when the email was opened, where it was opened, how long it was opened for, and if it was forwarded. This can be very useful if you believe that someone is intercepting your messages, as you can track the IP addresses that open the email.[4]
  4. Use encrypted email. If you're really worried about people reading your email who shouldn't be, you can switch to an encrypted email client. Your email will be encrypted, and only recipients that you designate will be able to decode it. It can be a bit of a hassle to set up, but is essential if you are trying to protect highly sensitive information. See Exchange-Encrypted-Emails-in-Windows-Using-GPG4Win-and-Thunderbird for instructions on setting up encrypted email.

Tips

  • The chances of you being under professional surveillance are extremely low, so try to avoid getting to paranoid.
  • Some people will track you behind multiple people or cars, so don't just suspect the people or cars right behind you.

Related Articles

Sources and Citations