Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
⚠
If you think there's a monitoring app on your phone, don't remove it straight away. The person who installed it may be alerted and could become dangerous. Get advice from a specialist service first.
Hidden Monitoring Apps
Someone installs a hidden app on your phone or computer that secretly tracks your location, reads your messages, and monitors your calls — without anything visible on screen.
What You Might Notice
Your phone battery is draining much faster than usual
Monitoring apps run constantly in the background, which uses a lot of battery power.
You're using more mobile data than expected
The app sends your information to the other person, which uses data — even when you're not actively using your phone.
Your phone feels warm even when you're not using it
Background monitoring processes generate heat.
The other person seems to know things they shouldn't
They mention details from your private messages, know where you've been, or reference conversations they weren't part of.
You notice unfamiliar apps or settings on your device
Look for apps you don't recognise, or device administrator settings you didn't set up.
What You Can Do
Use a stalkerware detection app to check your phone
Apps like those recommended by the Coalition Against Stalkerware can scan for known monitoring software.
Running a scan is generally safe — the monitoring person typically can't see that you've installed a detection app.
Keep your phone locked with a PIN or biometric
Use a strong passcode that the other person doesn't know. Avoid patterns that are easy to watch and copy.
Consider getting a separate safe phone
A prepaid phone the other person doesn't know about can be used for sensitive calls and messages.
Keep it hidden and don't connect it to any accounts the other person knows about.
Keep your phone's software up to date
Updates fix security holes that monitoring apps exploit.
Get a professional to examine your device
A digital forensic specialist can find hidden monitoring software and preserve evidence.
Ask a support service for referrals — don't search for this on a monitored device.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Installing hidden monitoring software on victim's device to track location, messages, calls, photos, and keystrokes. Stalkerware (also called spouseware or creepware) is commercially available software marketed for 'parental monitoring' or 'employee tracking' but frequently used for intimate partner surveillance. These apps typically hide their presence, run silently in the background, and transmit data to the perpetrator.
Anti-Stalkerware Scanning Deploy anti-stalkerware detection tools to identify monitoring applications. Scan for apps with excessive permissions including location, microphone, camera, and message access.
SAFE-M-0002
Device Access Controls Implement strong device authentication. Disable installation from unknown sources. Maintain physical control of devices.
SAFE-M-0003
Safe Device Acquisition Obtain a separate device for sensitive communications if stalkerware is suspected. Removing stalkerware may alert the monitoring party.
SAFE-M-0004
Operating System Hardening Maintain current OS versions. Security updates frequently patch vulnerabilities exploited by stalkerware.
SAFE-M-0005
Forensic Device Audit Engage professional forensic analysis to identify monitoring software and preserve evidence.
Detection Indicators
ID
Detection Indicator
SAFE-D-0001
Anomalous Battery Consumption Device battery depletes faster than baseline due to continuous background data transmission.
SAFE-D-0002
Unexplained Data Usage Increased mobile data consumption without corresponding user activity. Monitor per-app data usage for unknown processes.
SAFE-D-0003
Device Temperature Anomalies Device runs hot during idle periods indicating background process activity.
SAFE-D-0004
Information Leakage Indicators Adversary demonstrates knowledge of private communications, locations, or activities accessible only through device monitoring.
SAFE-D-0005
Unknown Applications or Profiles Presence of unrecognised apps, device administrator privileges, or configuration profiles.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.