We tend to think of privacy threats as something that comes from far away — hackers, corporations, or government agencies. But for many people, the most serious breach of privacy happens at home. Across the country, a growing number of people are discovering that a partner or ex has been quietly monitoring them through hidden cameras, location trackers, or compromised devices.

In November 2025, a 24-year veteran of the San Antonio Police Department was arrested and charged after allegedly installing a tracking device on his estranged wife's vehicle. She discovered the device using the Tile app on her phone after noticing she was being followed. The case illustrates how easily location tracking can be weaponized — even by someone trusted with a badge.

The Invisible Tools of Domestic Surveillance

These intrusions aren't limited to high-profile cases. Hidden cameras disguised as household items, stalkerware apps that silently forward messages, and AirTags used for unauthorized tracking have turned modern relationships into potential surveillance zones.

In one Nebraska case, a woman discovered four separate tracking devices hidden under her car after noticing unusual Bluetooth notifications. Using a plumber's camera and a tracker detection device, she found all four — each hidden in magnetic key holders. Her abusive ex was later arrested. Nebraska law, it turned out, didn't explicitly prohibit placing trackers on someone else's vehicle without consent. Prosecutors are now pushing for reform.

These cases share a common thread: the victims thought they were safe. They weren't.

Why "Secure" Apps Aren't Enough If the Device Is Compromised

If you've ever shared a device, a Wi-Fi network, or a password with someone you no longer trust, your private life could be at risk. Stalkerware apps can run silently in the background, invisible to the phone owner, forwarding messages and location data to whoever installed them. Even strong encryption on your messaging app means nothing if the device itself is reading your messages before they're encrypted.

Signs a device may be compromised include unexpected battery drain, unfamiliar apps in settings, and the device running warm when idle. If you suspect this, the safest move is a factory reset on a device the other person has never had access to — or using a new device entirely.

Protecting Your Communications

Device security and communication security are separate layers. Once you've secured your device, securing your communications means choosing a platform that doesn't retain your messages, doesn't store metadata that reveals your contact patterns, and requires no personal information at sign-up.

GetSafeNow requires no name and no phone number — just an email address and a username. Messages are end-to-end encrypted, meaning only you and the people you're talking to can read them. There's no server-side copy of your conversations, no metadata log of who you contacted and when, and no way for a third party to access your communications without direct access to your device.

If you're in danger: The National Domestic Violence Hotline is available 24/7 at 1-800-799-7233 or thehotline.org. If you suspect your device is monitored, reach out from a device the other person hasn't had access to.