If someone is monitoring it without your knowledge, the damage can reach well beyond embarrassment into financial theft, blackmail, or sustained invasion of your privacy.
Phone tapping is not a problem reserved for politicians or executives. According to the U.S. Courts 2024 Wiretap Report, published June 2025, federal and state courts authorized 2,297 wiretaps in 2024, a 9 percent jump from the year prior, and that only accounts for the legally sanctioned ones. Unauthorized surveillance by stalkers, controlling partners, and malicious apps is far harder to count.
This guide covers what phone tapping is, how to spot it, how to check if your phone is tapped using built-in codes, and exactly what to do if something looks wrong. No technical background needed.
What Is Phone Tapping?
Phone tapping, or wiretapping, means someone is secretly intercepting your calls, texts, or device data without your permission. The old version involved a physical tap on a telephone line. Today, it is almost entirely software-based.
Modern spyware gets onto your phone through a bad app download, a phishing link, or, in some cases, a vulnerability that requires no action from you at all. Once it is there, it can quietly relay your calls, messages, location, and photos to whoever planted it.
So, can a cell phone be tapped? Yes. Both Android and iOS are targets. Android is more exposed because it allows app installs from outside official stores. iPhones are harder to crack unless jailbroken. Neither is untouchable.
Phone tapping falls under a broader category of phone hacking, which covers unauthorized device access. The difference matters: tapping is about capturing communications in motion; hacking can also mean accessing stored files, controlling device functions, or setting up longer-term surveillance. Both are serious, and often one enables the other.
How to Know If Someone Is Tracking Your Phone: 13 Warning Signs
Most people asking whether their phone is being monitored are reacting to something that felt off. That instinct is worth following. Here are the 13 most reliable signs, with exactly what to check for each one.
1. Unusual Background Noises During Calls
If you are hearing clicking sounds, faint echoes, muffled static, or a second voice underneath yours during calls, pay attention to how often it happens. Occasional static is normal. If it is consistent, shows up across different calls and locations, and feels like interference rather than a weak signal, that is worth flagging. Check whether the noises occur on specific numbers or all calls, and whether they stop when you move to a different network.
2. Battery Draining Faster Than Usual
Surveillance software runs continuously in the background because it cannot afford to miss activity. That constant operation burns power. If your phone is under a year old and you are suddenly getting significantly less battery life with no change in how you use it, go to Settings > Battery > Battery Usage on Android, or Settings > Battery on iPhone, and look for any app consuming high background power that you do not recognize.
3. Your Phone Feels Warm When Not in Use
A phone that gets warm while you are gaming or streaming is behaving normally. A phone that feels warm while sitting untouched on your desk is not. Spyware transmitting data in the background puts real load on your processor, and that generates heat. If it is happening regularly when your screen is off and no apps are visibly running, check your battery usage data to see what was active.
4. Sudden Spikes in Mobile Data Usage
Surveillance apps need to transmit what they collect, and they use your data to do it. If your monthly usage has jumped without any change in your habits, dig into the breakdown. On Android go to Settings > Network and Internet > Data Usage. On iPhone go to Settings > Cellular and scroll down. Look for any app showing high background data that you cannot account for, especially one you do not remember installing.
5. Sluggish Performance and Slow Shutdown
If your phone has started lagging noticeably when switching apps, or takes an unusually long time to power off, background processes may be the reason. A phone that is actively transmitting data sometimes has to finish that transmission before it can fully shut down, which is what causes that extended delay before the screen goes dark. It looks like a normal performance issue, which is exactly why it tends to go unnoticed.
6. Apps Opening or Closing on Their Own
Apps that launch without you tapping them, or your screen lighting up with no notification, are not normal behavior. Some spyware has to open specific apps to access the camera, microphone, or stored data. If your phone feels like someone else is occasionally navigating it, go to Developer Options on Android and check Running Services for anything unfamiliar. On iPhone, review your recently used apps for anything that should not be active.
7. Your Phone Restarts Unexpectedly
One random reboot is not necessarily a concern. Repeated unexplained restarts, especially when no update was scheduled, can indicate that surveillance software is cycling the device to install new components or clear activity traces. If you notice this pattern alongside other signs on this list, do not write it off as a glitch.
8. Strange Text Messages You Did Not Send or Receive
Some older spyware uses SMS to receive commands, and those messages can slip through as garbled strings of characters or symbols from unknown numbers. If you receive something like that, do not tap anything in it. Check your sent folder too. Messages you did not send are a clear sign your phone has been compromised and need to be acted on immediately.
9. Notifications Appearing When Your Phone Is Silent
Getting notifications from apps while Do Not Disturb is active, particularly from apps you rarely or never use, can point to unauthorized background activity. Surveillance software sometimes triggers these as a side effect of accessing phone functions. Go through your notification settings and disable access for any app you cannot identify or do not use.
10. Voicemail Box Filling Up or Emptying Without Explanation
Voicemails disappearing without you deleting them, or new ones appearing with no missed call logged, can mean someone has tampered with your call forwarding or account settings. If calls are being rerouted before they reach you, voicemail behavior is often the first place you notice it. Run the USSD codes in the next section to check your forwarding status immediately.
11. Electronic Interference Near Other Devices
When your phone is actively transmitting data, it can cause brief interference in nearby electronics, a buzz from speakers, a flicker on a laptop screen nearby. If this happens regularly when your phone is sitting idle and you are not making calls, note whether it follows any pattern. Consistent interference at predictable intervals is more meaningful than an occasional blip.
12. Browsing Feels Off or Behaves Strangely
If websites that load fine on other devices are behaving differently on your phone, showing unexpected redirects, altered layouts, or slower load times, your mobile browser may have been compromised. Some spyware operates as a proxy, sitting between you and the sites you visit to log credentials as they pass through. Avoid logging into any sensitive account on the affected device until you have investigated further.
13. Unexplained Account Activity
Password reset emails you did not request, login alerts from unknown locations, or unusual transactions tied to your phone number can all trace back to a compromised device. A phone tap often feeds a larger operation, where captured credentials are used to access accounts elsewhere. If you see unexplained activity on any account linked to your phone, treat it as potentially connected rather than a separate coincidence.
Is My Phone Tapped? How to Check Using Codes and Built-in Tools
Noticing symptoms is a starting point. Confirming the problem requires a bit more digging. Here are the practical tools available to you, no technical expertise needed.
USSD Codes for Checking Call Forwarding
One of the ways phone tapping is facilitated is through call forwarding, where your incoming calls are silently rerouted to another number. You can check for this yourself using USSD codes, which are short strings you dial from your phone’s keypad.
These codes vary slightly depending on whether you are on a GSM network like AT&T or T-Mobile, or a CDMA network like Verizon or US Cellular.
- *#21# (GSM) or **21* (CDMA): Shows unconditional call forwarding. If your calls are being forwarded to a number you do not recognize, this will surface it.
- *#62# (GSM): Shows where your calls go when your phone is unreachable. Useful if someone has set up forwarding to catch calls while your phone appears to be off.
- *#61# (GSM): Reveals forwarding settings for unanswered calls, another common route for quiet interception.
- *#002# (GSM) or *72 (CDMA): Checks for conditional call forwarding that only activates in specific circumstances.
- ##002# (GSM): Disables all call forwarding at once. If you find suspicious forwarding and want to stop it immediately, dial this code.
A quick note: these codes tell you about forwarding settings, not about spyware. Finding forwarding enabled to an unfamiliar number is a strong signal, but the absence of forwarding does not mean your phone is clean.
Check App Permissions
Go through your installed apps and look at what each one has permission to access. Any app with access to your microphone, camera, or location without a clear reason for needing it is a potential concern. On Android this is under Settings > Privacy > Permission Manager. On iPhone it is under Settings > Privacy and Security.
If you find apps with broad permissions that you do not remember installing, look them up before deleting them. You may need their names if you decide to report the issue later.
Use Safe Mode to Isolate Third-Party Apps
Booting your Android phone into Safe Mode disables all third-party apps and runs only the system software. If suspicious symptoms like battery drain, overheating, or unexpected behavior stop in Safe Mode, you have strong evidence that a downloaded app is responsible.
To enter Safe Mode on most Android devices: press and hold the power button, then press and hold the Power Off option until the Safe Mode prompt appears. Tap OK. Your phone restarts with all third-party apps suspended.
iPhones do not have an equivalent Safe Mode for non-jailbroken devices, but you can manually review all installed apps and check for anything unfamiliar.
Run a Security Scan
On Android, Google Play Protect scans your installed apps for known malicious behavior. Open the Play Store, tap your profile icon, select Play Protect, and run a scan. On iPhone there is no direct equivalent, but staying current on iOS updates and reviewing installed apps regularly covers a lot of ground.
Dedicated mobile security apps from established brands can provide a deeper scan. Be selective about which security app you download, since lesser-known apps are ironically a common delivery method for spyware.
Review Background App Refresh and Data Usage
On iPhone, go to Settings > General > Background App Refresh and disable it for any apps that have no reason to run in the background. On Android, check running services through Developer Options: Settings > About Phone, tap Build Number seven times to unlock developer mode, then go to Developer Options > Running Services.
If you see processes running that you cannot trace to a known app, that is worth flagging before you do anything else.
How to Stop Phone Tapping: Steps to Take Right Now
If the signs are pointing toward a compromised device, here is how to act quickly and systematically. Speed matters. Every minute a surveillance app remains active is another minute your data is being collected.
Step 1: Enable Airplane Mode Immediately
Switching to Airplane Mode cuts off all wireless connections instantly, including cellular, Wi-Fi, and Bluetooth. This stops any active data transmission from surveillance software in real time. It is a temporary measure but an effective first response while you work on the deeper fix.
Step 2: Disable Call Forwarding
If you found unauthorized call forwarding when running the USSD codes above, disable it immediately. On GSM networks, dial ##002# to clear all forwarding settings at once. On CDMA networks, contact your carrier directly. You can also log into your carrier account online and check call settings from there.
Step 3: Uninstall Suspicious Apps
After identifying a problematic app in Safe Mode, uninstall it once you are back in normal mode. Do not just disable it, remove it entirely. On Android this is under Settings > Apps. On iPhone, press and hold the app icon and select Remove App.
Step 4: Update Your Operating System and All Apps
Many spyware infections exploit known vulnerabilities in outdated software. Updating your OS and apps closes those gaps. This will not remove existing spyware, but it prevents many common delivery routes from working again.
Step 5: Change Passwords From a Different Device
Before changing passwords on the compromised phone, switch to a different device and change the passwords for your most sensitive accounts: email, banking, social media, and any account linked to your phone number. If the surveillance software has been capturing keystrokes, changing passwords on the same device may hand those new credentials straight back to whoever is monitoring you.
Step 6: Consider a Factory Reset
A factory reset wipes your phone back to its original state, removing virtually all third-party apps including most spyware. Back up your photos and important files first, but be selective: do not restore from a backup made while the device was compromised, as the infection may return with it.
On Android: Settings > About Phone > Factory Reset > Erase All Data. On iPhone: Settings > General > Transfer or Reset iPhone > Erase All Content and Settings.
One caveat: if your phone was rooted or jailbroken before the infection, some advanced malware can embed itself in the firmware and survive a factory reset. In that case, professional help is the next step.
Step 7: Contact Your Carrier
Your mobile carrier can check for unusual account activity, unauthorized SIM changes, or suspicious call forwarding set up at the network level. This is especially important if you suspect someone has cloned your SIM or compromised your account through social engineering.
Step 8: Report It
If you have strong evidence of illegal surveillance, report it. In the United States you can file with the Cybersecurity and Infrastructure Security Agency (CISA) or your local law enforcement. If a business is involved, the FTC is another avenue. Reporting matters because it helps investigators build cases.
How to Protect Your Phone from Being Tapped in the Future
Once you have dealt with an active problem, or even if you just want to make sure one never becomes a problem, these habits make a real difference.
Keep Your Software Updated
Software updates patch the vulnerabilities that spyware relies on. Delaying updates, especially on Android, significantly raises your exposure. Make it a habit to install them as soon as they are available.
Only Install Apps From Official Sources
The vast majority of mobile spyware reaches devices through apps installed from outside the Google Play Store or Apple App Store. Stick to official sources, and even then check the developer name, permissions being requested, and user reviews before installing anything unfamiliar.
Be Careful With Physical Access to Your Phone
Stalkerware and some surveillance apps require brief physical access to install. If someone has had unsupervised access to your device, especially after a relationship breakdown or in a difficult workplace situation, factor that into your threat assessment. Keep your phone locked with a strong PIN or biometric, and do not leave it unattended with people you do not trust.
Avoid Public Wi-Fi Without Protection
On an open network, your traffic is visible to anyone else on that network. A VPN encrypts your connection, making it impossible for anyone on the same network to intercept your data. A good VPN uses military-grade encryption to keep your traffic private regardless of the network you are on, which matters most when you are working from coffee shops, airports, or hotels.
Your encrypted VPN tunnel means even if someone is monitoring the network, they see only scrambled noise. Not your browsing, not your messages, not your credentials.
Turn Off Location Services for Apps That Do Not Need It
Many apps request location access they have no functional reason to have. Go through your location permissions regularly and cut off access for anything that does not genuinely need it. On both Android and iPhone you can set location access to “While Using” rather than always-on for apps where some access makes sense.
Use End-to-End Encrypted Messaging
Standard SMS is not encrypted, which means anyone with access to your network or carrier infrastructure can read your messages. Apps like Signal encrypt messages end-to-end so only the intended recipient can read them. For anything sensitive, this distinction matters.
Enable Two-Factor Authentication
Two-factor authentication adds a second layer so that even if someone captures your password, they cannot log in without the second factor. Use an authenticator app rather than SMS-based 2FA when possible, since SMS codes can be intercepted if your SIM has been compromised.
Phone Tapping vs. Other Forms of Surveillance: Knowing the Difference
Phone tapping is one specific type of surveillance, but it sits within a broader landscape of ways people can monitor your digital life. Understanding how they differ helps you know what you are dealing with and what response makes sense.
Phone Tapping vs. Spyware
Phone tapping traditionally refers to intercepting communications in transit. Spyware is broader: it can log keystrokes, take screenshots, access stored files, activate your camera, and transmit everything it collects to a remote server. In practice today, most phone tapping is accomplished through spyware.
Phone Tapping vs. SIM Swapping
SIM swapping is a different attack where a criminal convinces your carrier to transfer your phone number to a SIM card they control. Once they have your number, they receive your calls and SMS messages, which is enough to bypass SMS-based 2FA on most accounts. The victim’s phone typically loses service entirely when a SIM swap happens, which is the clearest warning sign.
Phone Tapping vs. Network-Level Surveillance
Some surveillance happens at the carrier level rather than on your device at all. Law enforcement wiretaps authorized by a court typically work this way. The carrier mirrors your call data without anything happening on your physical phone. This type of monitoring is extremely difficult to detect from the user’s side, and it is legal when properly authorized.
Phone Tapping vs. IMSI Catchers (Stingrays)
IMSI catchers are devices that mimic cell towers to trick nearby phones into connecting to them. They can capture call data, text messages, and location information from every device in range. Law enforcement agencies use them, but concerns about illegal use have grown as smaller versions have become more widely available. If you are near one, your device gives you no indication.
Common Myths About Phone Tapping
There is a lot of misinformation on this topic, and some of it leads people in the wrong direction. A few things worth clearing up:
Myth: Dialing *#21# Will Tell You If Your Phone Is Tapped
That code shows call forwarding settings and nothing else. It cannot detect spyware, network-level monitoring, or message interception. It is useful for one specific thing and should not be treated as a comprehensive check.
Myth: iPhones Cannot Be Tapped
iPhones are harder to compromise than Android phones, but not immune. Jailbroken iPhones are significantly more vulnerable. Even non-jailbroken devices have been successfully targeted by sophisticated spyware like Pegasus, which exploited zero-click vulnerabilities requiring no user action whatsoever.
Myth: Only Important People Get Tapped
Surveillance is not reserved for politicians and executives. Controlling partners use stalkerware on ordinary phones every day. Hackers cast wide nets for financial credentials. Cybercriminals use spyware to gather what they need for identity theft. If your phone contains valuable data, it is a potential target.
Myth: A Completely Clean Phone Proves You Were Never Monitored
If a factory reset was performed or someone removed the software, there may be no trace left. Absence of evidence is not evidence of absence. If something felt wrong, document what you noticed before cleaning the device and consider reporting it regardless.
What to Do If Your Phone Is Tapped by Law Enforcement
If law enforcement has a court-authorized warrant to monitor your communications, they work at the carrier level. Your phone shows none of the behavioral signs associated with spyware. The monitoring is seamless and you have no technical way to detect or stop it.
If you believe you are under legal surveillance and feel it is unjustified, your recourse is legal rather than technical. Consult an attorney. They can request information about any warrants through proper legal channels. Attempting to interfere with a lawful investigation would only make your situation worse.
Unauthorized surveillance by law enforcement conducted without a warrant is illegal and actionable. If you believe this has happened, document everything and speak with a civil liberties attorney or contact the ACLU for guidance.
How a VPN Fits Into Your Phone Privacy Strategy
A VPN is not a magic shield against all forms of phone surveillance. It will not remove spyware already on your device, and it will not stop a phone tap that operates at the carrier or network level. But it does close real and meaningful gaps.
When you connect through VPN, your internet traffic is encrypted between your device and the VPN server. Anyone monitoring your Wi-Fi or mobile data connection sees only encrypted noise, not what you are actually sending or receiving. This matters any time you are on a network you do not fully control, which in practice is most of the time you are outside your home.
It also masks your IP address, keeping your physical location out of the hands of websites, apps, and anyone tracking your internet footprint. Combined with the other habits in this guide, a reliable VPN is a meaningful part of a complete privacy strategy, one layer among several, but a dependable one.
Conclusion
Phone tapping is a real concern, and you do not need to be paranoid to take it seriously. Your phone carries your private life, and the people who want access to it are not always sophisticated state actors. Sometimes they are people you know. Sometimes they are opportunistic hackers. Sometimes they are apps you installed without reading the fine print.
The good news is that most surveillance software leaves traces. It drains your battery. It generates heat. It consumes data. It makes your phone behave in ways that are noticeable once you know what to look for. Knowing what to look for puts you ahead of the problem.
Stay updated. Review your permissions regularly. Use encryption where it counts. And if something feels wrong about your phone, trust that instinct enough to investigate.
Frequently Asked Questions
Can a cell phone be tapped without touching it?
Yes. Modern spyware can be delivered remotely through phishing links, malicious apps, or unpatched software vulnerabilities. In some cases, sophisticated exploits can install software with no action required from the phone’s owner at all.
How do I know if someone is tracking my phone’s location?
Check your location permission settings and look for apps with always-on access that have no clear reason to need it. Unusual battery drain and unexplained data spikes can also point to location data being sent in the background. Some security apps log which apps accessed your location and when.
Will a factory reset remove spyware?
In most cases, yes. A factory reset removes all third-party apps and data, which typically eliminates surveillance software. The exception is rooted or jailbroken phones, where some advanced malware can embed in the firmware and survive a reset. Those cases require professional help.
Is my phone being monitored by my employer?
If your phone is company-issued, there is a reasonable chance Mobile Device Management software is installed, giving your employer some visibility into the device. This is generally disclosed in employment agreements. If the phone is personal, any monitoring without explicit written policy would likely be unauthorized. Using a VPN for work-related traffic on a personal device keeps your professional and personal activity separated.
What are the first signs that my phone might be tapped?
The most common early signs are faster-than-usual battery drain, the phone running warm when idle, and strange sounds during calls. A sudden unexplained spike in data usage is another early indicator. None of these alone confirm a tap, but two or three happening together, particularly if they appeared suddenly, are worth investigating.
How do I untap my phone?
Start by checking call forwarding with USSD codes and disabling any unauthorized forwarding. Review installed apps and permissions, run a security scan, and update your operating system. If symptoms continue, use Safe Mode to identify the problematic app and uninstall it. For serious cases, a factory reset is the most thorough option. Afterward, change all passwords from a clean device and enable two-factor authentication on key accounts.
Table of Contents
