Phone Stalkerware & Partner Surveillance: Understanding the Threat
Stalkerware, commercial surveillance software marketed for monitoring partners and family members, has become a pervasive tool of intimate partner abuse.
Published February 1, 2026
1 in 10 Americans admit to using stalkerware on a partner
A surprising number of people acknowledge monitoring a current or former partner using surveillance software.
Source: Norton / Harris Poll (2023)
What Is Stalkerware?
Stalkerware refers to commercially available software that allows one person to secretly monitor another person's phone activity. These apps can track location, read text messages and emails, monitor calls, access photos, and even activate the camera and microphone remotely.
Unlike malware designed by hackers, stalkerware is sold openly online. Companies market it as parental monitoring or employee oversight software, but a significant portion of users deploy it against intimate partners without their knowledge or consent.
Over 50,000 stalkerware detections on mobile devices annually
Security companies detect tens of thousands of stalkerware installations on smartphones each year, with the true number likely much higher.
Source: Kaspersky Annual Report (2024)
The Domestic Violence Connection
Stalkerware has become deeply intertwined with intimate partner violence. When technology is involved in domestic abuse, phone monitoring software is the most commonly identified tool.
For survivors, stalkerware creates a feeling of constant surveillance that extends the abuser's control beyond physical proximity. Even after leaving a relationship, victims may not realize their phone is still being monitored, compromising their safety and the safety of those helping them.
Stalkerware is present in 70% of domestic violence cases involving technology
Phone monitoring software is the most common form of technology-facilitated abuse in intimate partner violence.
Source: Coalition Against Stalkerware (2023)
How Stalkerware Gets Installed
Stalkerware typically requires brief physical access to the target device. Common installation scenarios include:
- A partner installs it during a moment when the phone is left unlocked
- Installation during the night while the owner sleeps
- Installation disguised as "setting up" a new phone as a gift
- Exploitation of shared account credentials (Apple ID, Google account) to enable cloud-based monitoring without touching the device
Most stalkerware hides its icon and runs silently in the background, making it invisible to casual inspection.
Most stalkerware is designed to be invisible to the device owner
Commercial stalkerware apps deliberately hide their icons and processes to avoid detection by the person being monitored.
Source: Electronic Frontier Foundation (2024)
Warning Signs of Stalkerware
While sophisticated stalkerware is designed to be invisible, some indicators may suggest your phone is being monitored:
Battery drain: Surveillance software running in the background consumes additional battery power.
Data usage spikes: Stalkerware transmits data to remote servers, which can appear as unexplained data consumption.
Device running hot: Continuous background processes cause the phone to generate more heat.
Behavioral indicators: Someone knowing details about your private conversations, locations, or activities that they shouldn't know.
Account anomalies: Unfamiliar devices logged into your accounts, or password reset notifications you didn't request.
What to Do If You Suspect Stalkerware
If you suspect your phone has stalkerware installed, proceed carefully:
Do not immediately remove it - If you are in a domestic violence situation, suddenly removing stalkerware can alert the abuser and escalate danger. Contact a DV hotline first (1-800-799-7233).
Use a safe device to research and communicate about your situation.
Get a professional phone security check to confirm the presence of stalkerware and document evidence.
Consider a factory reset as a clean solution, but only after evidence is preserved and your safety plan is in place.
Change all passwords from a safe device, enable two-factor authentication, and review which devices are logged into your accounts.
Frequently Asked Questions
Can stalkerware be installed without physical access to my phone?
Most stalkerware requires brief physical access. However, if someone has your Apple ID or Google account credentials, they may be able to monitor your location, messages, and photos through cloud services without installing software directly.
Will a factory reset remove stalkerware?
A factory reset will remove most stalkerware. However, some sophisticated spyware can survive a reset by exploiting firmware-level vulnerabilities. A professional analysis can determine the appropriate remediation approach.
Is using stalkerware a crime?
In most jurisdictions, installing surveillance software on someone else's device without their knowledge is illegal under wiretapping, computer fraud, and anti-stalking statutes. Evidence of stalkerware can support criminal charges and protective orders.
Need Professional Help?
Our counter-surveillance specialists can help assess your situation and provide professional detection services.
Related Articles
GPS tracking devices have become a preferred tool for stalkers. The numbers reveal a disturbing trend that technology companies and law enforcement are struggling to address.
Hidden cameras in vacation rentals are more common than most travelers realize. Here's what the data shows and how to protect yourself.