What to do if…
you notice signs your phone camera or mic may have been accessed and you fear intimate content was captured
Short answer
Get to a safer, calmer moment, stop using that phone for anything sensitive, and contact confidential support (sexual violence and/or image-abuse support) while you secure your accounts.
Do not do these things
- Don’t confront the suspected person right now (it can escalate or trigger retaliation).
- Don’t keep using the same phone for intimate photos, calls, or private conversations “to test it”.
- Don’t pay money, send more images, or follow instructions from someone threatening to share content.
- Don’t broadcast the situation publicly or send mass messages from the possibly-compromised device.
- Don’t delete threats/messages in a panic.
What to do now
- Get to safety first. If you feel in immediate danger, call 911 or get to a safer place and ask someone you trust to stay with you.
- Switch to a safer device for any sensitive communication. Use a trusted friend’s phone/computer or another device you control to make calls, change passwords, and seek help.
- Get confidential specialist support.
- For sexual violence support (including coercion/threats), contact RAINN (24/7 hotline and online chat).
- For intimate image abuse support, contact the Cyber Civil Rights Initiative (CCRI) Image Abuse Helpline.
- If you think something may be shared online (or threatened), use prevention/removal tools early.
- Use StopNCII.org (adults) to help prevent/limit re-uploads on participating platforms.
- If content is already posted, platforms’ reporting tools and specialist helplines can guide takedown requests.
- Secure your accounts from a safer device (do email first).
- Change your primary email password and enable two-factor authentication.
- Then change passwords for social media, cloud photo storage, messaging apps, and any accounts linked to your phone.
- Check account security pages for unknown devices/sessions and sign them out.
- Reduce the chance of further capture from the phone.
- Remove unknown apps, and review camera/microphone permissions (deny for anything non-essential).
- Update your phone’s operating system and apps.
- If you suspect SIM swap/number takeover (sudden loss of service, carrier alerts), contact your mobile carrier from another phone to lock down the account.
- Optional reporting routes (only if you want).
- You can report cyber-related incidents to the FBI’s Internet Crime Complaint Center (IC3).
- Be cautious of lookalike reporting sites: type the official address yourself rather than following links from messages.
- If a crime is in progress, threats are escalating, or you need immediate help, you can contact local law enforcement.
- If you may want to report later: keep any threats, messages, usernames, links, or screenshots you already have somewhere safer (for example, saved to a secure account from a trusted device). Avoid doing intense “evidence work” right now—stabilize first.
What can wait
- You do not need to decide right now whether to report to police, file complaints, or tell your workplace/family.
- You do not need to prove the device was accessed before getting help.
- You do not need to factory reset immediately (do that later, after you’ve secured accounts and have support).
Important reassurance
A violation like this can trigger shock, panic, shame, or numbness—those reactions are common and do not mean you caused this. You deserve support and you can take this in small, protective steps.
Scope note
This is first-steps-only guidance focused on safety, stabilizing, and reducing further harm. More detailed technical cleanup, legal options, and longer-term support are best handled after you’ve got a safe channel of communication and someone supporting you.
Important note
This is general information, not legal or medical advice. If you are in immediate danger call 911. If anyone involved is under 18, the situation may involve child sexual exploitation material—prioritize immediate safety and report through appropriate child protection reporting routes.
Additional Resources
- https://rainn.org/help-and-healing/hotline/
- https://cybercivilrights.org/contact-us/
- https://stopncii.org/how-it-works/?lang=en
- https://consumer.ftc.gov/articles/nonconsensual-distribution-intimate-images
- https://consumer.ftc.gov/articles/how-protect-your-phone-hackers
- https://www.ic3.gov/
- https://complaint.ic3.gov/
- https://www.fbi.gov/investigate/cyber