Digital localisation and surveillance

Stalking has changed significantly, as digital media has developed and has in fact become an evident phenomenon. Some perpetrators use spy apps ("spyware", "stalkerware") for stalking. However, there are also "normal" apps and features in smartphones and other devices that can be misused by stalkers.

If you suspect spyware is being used against you, make sure you use a secure device when searching for information, for example a friend's computer.

Spy apps

Some spy apps can listen in on phone calls and forward chat logs, images, locations and much more from one smartphone to another person. They are often concealed on the infected device. Spyware can also be used to spy on computers or tablets.

Spyware that is hidden on devices only rarely has a wide range of functions. 
To intercept data, stalkers often use apps with location features, stolen passwords, secret logins to the Cloud, sharing via family functions or planting trackers.

To install a spy app, the perpetrator usually needs access to the unlocked device. Spy programmes can also be sent by email or text message, just like criminals do in the case of "phishing". If the email, a link in it or the email attachment is opened, the spyware will automatically be installed.

Secretly installing spy apps and spying on data constitute a criminal offence.

In violent, controlling partnerships, a person may also be coaxed into agreeing to having them installed. But even in a partnership, not everything has to be disclosed. Nobody is allowed to force you to install such programmes on your mobile phone or computer.

Everyone has a right to privacy. Even in relationships, nobody has the right to know and control everything.

 

A counsellor can help you scan for spyware and secure your devices: Find a counselling center.

How can spyware be recognised?

If a spy app has been installed on your smartphone, it could be that battery power will drop, and a lot of data volume is used. However, you might also not notice anything at all.

If a spy programme has been installed on your computer or smartphone, this does not necessarily have any evident effects. In general, you should try to notice whether the person controlling you knows things you have actually only told other people via Messenger or email, or that result from documents stored on your device or in your Cloud.

Make a note of whether stalking has started or intensified after someone installed a new programme or new hardware, such as a keyboard or mouse, on your devices.

If an ex-partner is the perpetrator, any gifts such as smartphones, tablets or such everyday objects given to you or your joint children, can also be misused for surveillance and control purposes.