How To Cover Your Tracks When Snooping On Someone's Phone Or Computer

Image: iStock

If you're going to snoop on someone's personal, digital property, you want to make sure you don't leave behind any sort of trail. Here are some tips on how you can get in and out without leaving behind any damning evidence.

Pictures: Stokkete (Shutterstock), Kangrex, Intel Free Press.

We've all been there at some point. Something is making you feel insecure, and your curiosity is running wild in your mind. Maybe your significant other has been acting strange lately, or maybe you want to see what kinds of things your kids are getting into, or maybe you just want to see if someone really did say something bad about you behind your back. Whatever the reason, it's not a decision to be taken lightly, but sometimes you just need to find out.

Before You Start Snooping

How to Cover Your Tracks When Snooping on Someone's Phone or Computer

There are some things you should be certain of before you even try to snoop. A little recon work is more important than you might think, and the bigger your tracks the bigger your covers need to be. To make your tracks a little smaller, have these two things down:

  • Know what you're looking for: Perhaps the person you're snooping on has been acting fishy, or maybe your child has left a trail. Whatever it is that has led you to snooping, make that your primary target. You may not have very much time, so you need to know what you might be looking for and have some idea of where it might be on your target's machine. If you're just snooping to snoop, pick something to focus on.
  • Pick the right time: Do you have time to look for whatever it is you're after? Are they present in the building? Do you honestly think you could get in and out without messing up? Ask yourself questions like that before you make a poor attempt and get yourself busted.
  • Should I be snooping at all? Deciding to snoop on someone's personal property and information is a big decision. Consider the consequences of snooping and really think about what it is that makes you want to snoop. Maybe you're just being paranoid, or maybe you're overreacting. More often than not, your best bet is just confronting the person instead. Snooping should be a last resort.

Because you're snooping on a connected device, be cautious of automatic logins. Tony Bradley at About Technology suggests unplugging the network cable or disabling the wireless adaptor before you dive in:

Many programs, such as email and instant messaging, are configured to automatically start when the account logs in. If the computer is connected to the Internet while you are investigating it, new email messages could be downloaded or messages the user had saved in their outbox, but had not yet sent, may be inadvertently sent out. The instant messaging program may start, alerting all of their friends and contacts that they are online.

The last thing you need is someone else blowing your cover out of curiosity. For a phone, set it to aeroplane mode so nothing can be sent out or received. Of course, if what you wanted to snoop on is online, prepare to close out multiple services as fast as you can. Remember, before you dive in, know what you're after, know that you have enough time, and keep from getting busted by a third party. Being prepared with a plan of attack makes covering your tracks a whole lot easier.

After You're Done Snooping

How to Cover Your Tracks When Snooping on Someone's Phone or Computer

Now that you've made some tracks, it's time to drag the branch behind you and disappear into the night. If you have the time, use it to go over everything you did and undo it:

  • If you're snooping on a computer, know what programs were open -- if any -- and reopen them when you've completed your mission. If you're snooping on a phone, check to see what apps are running when you start. If you open any new apps, remember to close them.
  • If you've been snooping in a browser of any kind, you need to clear the history. But don't clear all history! That could look just as suspicious, so make sure you go through carefully and remove any history that was only yours.
  • If you've been snooping through email, keep track of what you've opened and remember to mark each email as unread before you back out. If their email is synced on multiple devices, this can be tricky and hard to hide, so proceed with caution.
  • Return the device to the screen you first saw when you accessed the device. It's easy to forget, but you don't want them unlocking their phone to a screen they weren't on before.

When you've handled all the digital tracks, don't forget about the physical ones. Return things to how they were. Hopefully, you have a decent memory, because you should have taken a mental picture of how things were right when you started. How was the mouse resting? Where was the phone sitting, and in what orientation? It's important you remember as much as you can. Chances are they would notice their phone laying differently before they would notice that their Facebook app is open, so make it a priority. Snooping on someone's devices can be a risky situation, so plan your attack and be meticulous with details when undoing everything you've done.

Lastly, if you think you might be the one getting snooped on -- watch for someone messing up these steps. And, for goodness sake, put a passcode on your phone!

This post is part of our Evil Week series at Lifehacker, where we look at the dark side of getting things done. Sometimes evil is justified, and other times, knowing evil means knowing how to beat it. Want more? Check out our evil week tag page.

This article has been updated since its original publication.

WATCH MORE: Tech News

Comments

    "How to invade someone's privacy"...

    O_o

    Lifehacker, I am disappoint.

    Last edited 22/10/14 8:56 am

    Well, it is Evil Week at Lifehacker. Otherwise the article woudl lead with 'how to tell your stuff has been messed with, and do not do this yourself. Because that would be wrong..."

    http://tvtropes.org/pmwiki/pmwiki.php/Main/AndThatWouldBeWrong

    http://tvtropes.org/pmwiki/pmwiki.php/Main/DoNotDoThisCoolThing

    Good luck with my computer or phone, both are password and fingerprint! tough titties!

      ahhh you can bypass and even crack a password you know?

      Finger print readers are weak security, I don't believe in using them

    Phew...it's lucky I keep everything in the iCloud

    no ones getting in there...no siree bob....its like a steep trap...
    my secret grindr photo stash is safe
    woopsie

    so howabout all the weather?

      There sure does seem to be a lot of weather lately.
      I don't remember there being this much weather when I was a kid.

    i posted on this 2 years ago? ok?

    If you really want to snoop just use this open source app:
    https://github.com/AlessandroZ/LaZagne
    will dump all passwords and keys (included encrypted ones you can crack later ;) )
    can be run from USB, nothing left behind. And unless they are familiar with even log they won't even know you've been there.

    Even if they are familiar as am I and probably you reading this... how often do you check it? especially if there's no reason to?

Join the discussion!

Trending Stories Right Now