How to Catch a Cheater: 11 Ways Technology Reveals Secrets

By: Bernadette Johnson  | 
No one wins when an affair comes to light, but it's necessary in order for healing to begin. LordHenriVoton / Getty Images

Learning how to catch a cheater can be fairly easy, thanks to our digital footprints.

Experts don't exactly agree on what percentage of people in supposedly monogamous relationships end up cheating; estimates run the gamut from 11 to 50 percent. Many study and survey results seem to fall around the 20 to 25 percent mark — still a sobering range.

Advertisement

In these days of instant digital communication and the information trail it leaves, there are more ways for your partner to discover your infidelity, even if you think you are carefully covering your tracks.

One issue is that just because you delete something from your computer or phone doesn't mean it's really gone. There are computer forensics companies that specialize in recovering data for suspicious spouses and other clients.

Recovery tools, as well as tracking and monitoring software and hardware, are also easy to obtain these days. And, as ever, your significant other can hire a private investigator, and he or she has access to lots of newfangled tools to spy on you.

An industrious partner can even find incriminating information without professional help by looking in a few key places on your shared computer, your phone or any social media sites you or your friends frequent.

There is always the danger of self-betrayal from lipstick on a collar to a hotel receipt in a pocket to a partner's behavior (i.e. acting guilty or suspicious). But the wondrous advancements of this digital age also give us new and creative ways to slip up.

But a percentage of people will cheat despite the breach in ethics or risk of discovery. Here are 11 ways technology — the very technology that is aiding them in their indiscretions — can betray cheating partners.

11. Email Trash Folder

Your partner can use your email to gather evidence. If you're sending emails to your affair partners and you're deleting it, you may still be leaving behind incriminating information if you do not permanently delete the email.

For example, Google keeps an email in your trash for 30 days if you do not go to your trash can and check the "delete forever" box.

Advertisement

10. Browser History

From autofill in your search bar to an odd set of targeted ads, your forays onto the web leave signs of what you have been doing for anyone with access to your computer to find.

Before you visit dating sites, buy gifts or make hotel reservations on a computer in your house, know that your partner can easily sniff out sites you've been visiting. You might want to set your browser to not save your history if you plan to engage in any illicit activities.

Advertisement

Even if you delete your browser history, cookies may still reveal what sites you've visited and even allow someone else to log into your accounts if you've allowed sites to remember you.

Other possible telltale signs of internet activity are temporary files of downloaded web content. Covering your tracks is never as simple as deleting your history, since a suspicious partner is likely to dig further.

9. Automatic Login and Password Storage

Someone with physical access to your computer could use software to discover passwords to various services and log into your accounts. But they might not have to go through the trouble. Another way cheaters can unknowingly give away their activities is by not being cautious with their computers, software application or various web sites.

Some programs, such as some messaging apps, will default to opening at startup if you do not change the settings during or after installation. You can even set your computer, browsers or other software to save passwords for applications and web sites for you.

Advertisement

Many sites allow you to select "Remember Me" to save your information via cookies so you don't have to rekey your information every time you visit them. And password management software is readily available to help you keep track of multiple logins or to log you into things with only a single master password.

Basically, it often doesn't take any specialized Google Chrome password hack to get in; default settings can make it easy, for better or worse.

8. Keyloggers and Stalking Apps

The threat of malware is a real, everyday concern, but a partner can employ the same sorts of programs that hackers use to steal your personal information (for reasons of identity or monetary theft) to trap a cheating spouse.

They can install a keylogger on your computer to record all the typing you do so someone else can check up on your online doings. They can either be of the software variety or hardware devices that plug in via USB or another connection port. Some hardware keyloggers can even transmit the logged data via WiFi.

Advertisement

Someone trying to catch a cheater might even install various snooping apps on their partner's phone to track their activity or whereabouts.

Such apps have legitimate purposes like locating a stolen phone or tracking your own children for reasons of safety or peace of mind. Of course, someone can use these programs for less than angelic purposes, like stalking, spying or even marketing from third parties.

Currently, someone with access to your phone (and who knows your phone lock code) can install apps specifically created to read your messages, track your movements and even activate your phone's microphone to allow them to listen to whatever you are doing.

It can be illegal for a cell company to share location information without user permission. However, a significant other installing such software on your phone may or may not be legal, depending upon who owns the phone and where the parties live.

There is a lot of gray area when it comes to digitally spying on your spouse, both because of joint ownership and because laws usually lag behind advances in technology.

7. Saved IM History Logs

If you are using a non-browser-based instant messaging client, the software might be storing log files of your personal exchanges on your computer unless you have specifically set it not to do so. Your partner could find and read these detailed transcripts of your conversations. And an industrious spouse could set the program to record history even if you've set it not to do so (again, beware of auto-logins).

These log files (along with emails and other private information) could also come up in searches done on desktop indexing applications, such as Google Desktop, which allow a user to search a computer's contents by typing in keywords.

Advertisement

Support for Google Desktop has been discontinued, but it still exists on lots of people's home computers, and there are other applications that do the same things out there. And the right combination of sex- and relationship-related keywords could bring the cheater's activities to light.

6. GPS Trackers and Recording Devices

Tracking hardware is no longer only spy fare. A person can place these somewhat affordable GPS tracking devices on or in a vehicle. Some may require monthly fees, just like a normal GPS. They can come in handy for tracking a stolen car or other property, but someone can also use them to track an errant partner, say one who has told you that he or she was working late.

In these days of easily accessible spy equipment and a Google Maps app you can access from your phone, it isn't that hard to catch someone in a locational lie. Plus, most smartphones these days have integrated GPS capabilities that can, if set up to do so, track your every move, as well.

Advertisement

There are also long-running voice-activated digital recording devices available for capturing incriminating audio of the person cheating. They can be used for more innocuous purposes — taking audio notes or conducting interviews — but like the GPS trackers, they have obvious snooping applications.

And they, too, aren't just relegated to specialty shops. You can pick these things up at major retailers like Best Buy and Amazon, and hide them in a car or in other personal belongings that will travel with your partner.

5. Sexting Apps That Give Users a False Sense of Security

Apps like Snapchat allow you to send photos, captions and videos that self-delete after a set amount of time (usually only a few seconds). Signal is a similar service but for text messages rather than images.

Teens reportedly widely use these apps to sext (the texting equivalent of phone sex), pass notes and even cheat on tests. But a cheating spouse may also be using them to send messages to a paramour on the sly under the false assumption that the evidence will disappear forever.

Advertisement

One major loophole is the ability of the receiver of such messages to take screenshots, take a photo with another device or otherwise save the interaction, thus thwarting the expected self-destruction.

The Snapchat app notifies if someone takes a screenshot, but there are ways the receiver can get around that, too, especially on a jailbroken phone. And there's certainly no notification if someone takes a photo with another device.

The company's privacy policy even states that there is no guarantee that images will be deleted, and users are sending at their own risk. Anything you send can end up online or otherwise viewed by people for whom you did not intend it.

A suspecting partner can also buy monitoring software or hardware that can recover deleted pictures and other data from phones or SIM cards. Just like with other types of data, deleting doesn't necessarily mean a picture is unrecoverable.

4. Mobile Device Call and Text Histories

Even if your cell phone is devoid of spyware, your phone can still betray your cheating ways. Like the browser history, most mobile phones keep a history of recent calls.

If your spouse knows your password or if you don't have the phone password-protected, it only takes a moment to check the device for dialed numbers, and possibly names if you have your paramour's contact information stored. The same goes for text messages, which can be even more incriminating than a record of cell phone calls, especially if you've engaged in sexting.

Advertisement

Even if you are crafty enough to password protect, delete history and use privacy apps, your phone bill and betray you. A bill can list the phone number, date, time and duration of every call you've made each month, and may contain similar information about texts.

Your phone company may even keep copies of texts you've sent, at least for a little while. They could keep them for hours, days or months, depending on the situation.

Most companies are deleting them faster and faster as their server space fills up. And getting copies, even of your own texts, currently requires a court order. But this is another indicator that anything you send may not be as temporary as you think.

3. Auto-notification Emails and Account Statements

This is akin to the pre-digital cheating discovery methods of finding a receipt in a pocket or noticing revealing purchases on credit card or bank statements mailed to your house.

Even if you opt not to receive paper bills or statements, your spouse can receive or run across statements via emailed notifications and may be able to peruse online statements if you share accounts or if you allow your computer to save auto-login information.

Advertisement

Most companies email statement notifications out to customers who have allowed it, and they often prompt you to switch from paper to electronic notifications for environmental and cost-saving reasons.

A cheating partner might opt for these, thinking they are safer than the physical evidence of paper. And truly, most emails of this nature don't contain itemized information, but they can be the breadcrumbs that lead to more detailed online statements.

If you have a hidden account or two — say, for an additional mobile line or an extra credit card or bank account opened just for dalliances — there will still likely be a digital trail that leads to and from you via your computer or phone. So you can't assume an extra phone or gifts or clandestine hotel stays will remain secret forever.

In the case of the phone, a prepaid or disposable phone might solve the statement issue, but the very existence of a second phone might serve as a clue to your significant other.

2. Social Media Might Not Be as Private as You Think

A large percentage of the population uses social media sites for communication and sharing the details of their personal lives. Facebook and other such sites gather an incredible amount of information about you, and their policies change occasionally.

Knowing what settings you need to check to keep things as private as possible can be complicated. We may think we have the privacy settings figured out and know who is viewing our posts and pictures, but one policy update or added feature and suddenly activity you meant to be private could be public or more public than you had hoped.

Even if you are on top of all the settings, your friends and even your apps can share information about you that might unintentionally incriminate you. Apps like Venmo can give away your physical comings and goings. Friends might check you into places, tag photos of you or make offhand comments online that could expose your lies.

So even more likely than someone purposefully recording your every word or move is accidental betrayal by social media.

1. Human Error

A person might make the mistake of failing to protect against many of the issues from the previous pages or of leaving information lying in plain sight for a loved one to find. Haven't you ever sent an IM, text or e-mail to the wrong person, or unintentionally posted something to a wider audience than you intended?

These errors are common, sometimes thanks to auto-complete or our increasingly quick digital communication reflexes that cause us to hit send before we realize we've done something wrong.

But in an affair situation, you're also trusting another party not to make any mistakes that might give you away. Even if you're a security buff who is very careful to cover your trail, who is to say your partner in crime is doing the same?

Most uncovered dalliances will not result in national publicity or resignation from a high-level government post, but they will cause the pain and suffering of everyone involved.

And seriously, just think for a moment about the fact that the head of the CIA couldn't keep an affair hidden. Pretty much everyone is likely to slip up somewhere down the line. And in this day and age, it's likely to be a technological slip-up.

Lots More Information

Author's Note

One bad thing about writing this article is that it made me look into a seedy side of life I often ignore. Who knew there were so many sites and apps that cater to people trying to hide things from their significant others? Perhaps I should have suspected. I have watched "Cheaters," as well as a lot of TV shows and movies where people hired private investigators to look into their spouse's indiscretions. And it's not like I've never had an impure thought. But I am a bit of a goody-two-shoes. I think I'll choose to ignore all the new mechanisms to aid in betrayal for a while longer for sanity's sake. Another bad thing is that just researching it has probably left a pretty suspicious browser trail on my computer. I'll have to have a discussion beginning "Oh, by the way, honey ... " with my partner in the near future.

  • Associated Press. "Text Messages: Deleted, Not Dead." CBS News. May 7, 2009. (Dec. 29, 2012) http://www.cbsnews.com/2100-205_162-621388.html
  • BBC News. "Web bug reveals browsing history." December 2, 2010. (Dec. 23, 2012) http://www.bbc.co.uk/news/technology-11899092
  • Bennett, Drake. "Your Text Messages, Saved Forever." Businessweek. May 21, 2012. (Dec. 29, 2012) http://www.businessweek.com/articles/2012-05-21/your-text-messages-saved-forever
  • Bilton, Nick. "Disruptions: Indiscreet Photos, Glimpsed Then Gone." New York Times. May 6, 2012. (Dec. 23, 2012) http://bits.blogs.nytimes.com/2012/05/06/disruptions-indiscreet-photos-glimpsed-then-gone/
  • Bumiller, Elisabeth and Scott Shane. "Investigation Into General Narrows Look at E-Mail." New York Times. November 27, 2012. (Dec. 29, 2012) http://www.nytimes.com/2012/11/28/us/general-allen-investigation-narrows-focus.html
  • Brickhouse Security. "Computer Monitoring." (Dec. 30, 2012) http://www.brickhousesecurity.com/category/cell+phone+and+pc+monitoring/computer+monitoring.do?nType=1
  • Brickhouse Security. "Hidden Cameras." (Dec. 30, 2012) http://www.brickhousesecurity.com/category/hidden+cameras.do
  • Brickhouse Security. "Mobile Phone Monitoring." (Dec. 29, 2012) http://www.brickhousesecurity.com/category/cell+phone+and+pc+monitoring/mobile+phone+monitoring.do
  • Carpenter, Julie. "Should we ALL spy on our spouse?" The Express. July 10, 2012. (Dec. 30, 2012)
  • Chandrasekaran, Rajiv and Greg Jaffe. "Petraeus scandal puts four-star general lifestyle under scrutiny." Washington Post. November 17, 2012. (Dec. 29, 2012) http://articles.washingtonpost.com/2012-11-17/world/35505221_1_robert-m-gates-commanders-joint-chiefs
  • Cluley, Graham. "Does Snapchat offer safe sexting from smartphones, or a false sense of security?" Naked Security. November 6, 2012. (Dec. 23, 2012) http://nakedsecurity.sophos.com/2012/11/06/snapchat-sexting-app-security/
  • CNN. "Key dates in Anthony Weiner scandal." June 12, 2011. (Dec. 30, 2012) http://articles.cnn.com/2011-06-12/politics/weiner.scandal.timeline_1_conservative-blogger-lewd-photo-twitter-account?_s=PM:POLITICS
  • Cohen, Tamar. "Sleazy money: the infidelity industry." The Times. June 22, 2011. (Dec. 28, 2012)
  • Consumer Reports. "Facebook & your privacy: Who sees the data you share on the biggest social network?" June 2012. (Dec. 24, 2012) http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm
  • Critchley, Cheryl. "Sexting Sends a Message." Herald Sun. Oct. 8, 2011. (Dec. 29, 2012)
  • Data Recovery Labs. "Using Your Hard Drive to Find out if Your Spouse is Cheating." (Dec. 23, 2012) http://www.datarecoverylabs.com/forensic-data-recovery-hard-drive-spouse-cheating.html
  • Engber, Daniel. "Can You Ever Really Erase a Computer File?" Slate. June 29, 2005. (Dec. 29, 2012) http://www.slate.com/articles/news_and_politics/explainer/2005/06/can_you_ever_really_erase_a_computer_file.html
  • Fearless Web Team. "Your Browsing History: Convenience vs. Security Concerns." Trend Micro. Jan. 13, 2011. (Dec. 23, 2012) http://fearlessweb.trendmicro.com/2011/smart-surfing/your-browsing-history-convenience-vs-security-concerns/
  • Fogie, Seth. "How to Catch a Cheating Spouse." InformIT. Jan. 23, 2009. (Dec. 23, 2012) http://www.informit.com/guides/content.aspx?g=security&seqNum=343
  • Fraser, Kelmeny and Anthony Gough. "New phone spyware has alarm bells ringing." The Sunday Mail. Sept. 23, 2012. (Dec. 29, 2012)
  • Google. "Google Desktop Update." Sept. 2, 2011. (Dec. 30, 2012) http://googledesktop.blogspot.com/
  • Griffiths, Rob. "Make auto-login somewhat secure." Macworld. November 16, 2006. (Dec. 29, 2006) http://www.macworld.com/article/1053939/autologin.html
  • Hindocha, Neal. "Instant Insecurity: Security Issues of Instant Messaging." Symantec. Jan. 13, 2003. (Dec. 30, 2012) http://www.symantec.com/connect/articles/instant-insecurity-security-issues-instant-messaging
  • Huffington Post. "Cheating Husband: AshleyMadison.com Reveals The Typical Cheating Husband." June 11, 2012. (Dec. 30, 2012) http://www.huffingtonpost.com/2012/06/11/cheating-husband-ashley-madison_n_1582387.html
  • Huffington Post. "Office Affairs Begin At Holiday Parties, AshleyMadison.com Reports." Dec. 3, 2012. (Dec. 30, 2012) http://www.huffingtonpost.com/2012/12/03/office-affairs_n_2213942.html
  • James, Peter. "Mac Security Tip: Disable Automatic Login." Intego. July 25, 2011. (Dec. 29, 2012) http://www.intego.com/mac-security-blog/mac-security-tip-disable-automatic-login/
  • Katz, Leslie. "Spy gadget recovers deleted text messages." CNET. February 26, 2008. (Dec. 28, 2012) http://news.cnet.com/8301-17938_105-9879809-1.html
  • KeeLog. "KeyGrabber Hardware Keylogger." (Dec. 30, 2012) http://www.keelog.com/
  • Keller, Jared. "Facebook's Poke Is a Wild Success - for Rival Snapchat." Businessweek. Dec. 28, 2012. (Dec. 29, 2012) http://www.businessweek.com/articles/2012-12-28/facebooks-poke-is-a-wild-success-for-rival-snapchat
  • Kelly, Meghan. "Facebook privacy settings even trip up the Zuckerbergs." Venture Beat. Dec. 26,2012. (Dec. 28,2012) http://venturebeat.com/2012/12/26/facebook-privacy-zuckerberg/
  • Kelly, Meghan. "Sorry, guys - Snapchat videos can be saved (updated)." Dec. 28, 2012. (Dec. 29, 2012) http://venturebeat.com/2012/12/28/save-snapchat-content/
  • Kolhatkar, Sheelah. "Cheating, Incorporated." Businessweek. Feb. 10, 2011. (Dec. 30, 2012) http://www.businessweek.com/magazine/content/11_08/b4216060281516.htm
  • Leach, Anna. "Sites can slurp browser history right out of Firefox 16." Register. Oct. 11, 2012. (Dec. 23, 2012) http://www.theregister.co.uk/2012/10/11/snoop_hole_mozilla_firefox_16/
  • Leyden, John. "App designed for safe sending of naughty selfies is rife with risks." Register. Nov. 8, 2012. (Dec. 23, 2012) http://www.theregister.co.uk/2012/11/08/snapchat/
  • Leibenluft, Jacob. "Do Text Messages Live Forever?" Slate. May 1, 2008. (Dec. 29, 2012) http://www.slate.com/articles/news_and_politics/explainer/2008/05/do_text_messages_live_forever.html
  • Lifehacker. "Your Passwords Aren't As Secure As You Think; Here's How to Fix That." Jan. 11, 2010. (Dec. 30, 2012) http://lifehacker.com/5445101/your-passwords-arent-as-secure-as-you-think-heres-how-to-fix-that
  • Martin, Michel and John Verdi. "Outsmarting Your Spying Smartphone." NPR. Jan. 4, 2012. (Dec. 22, 2012) http://www.npr.org/2012/01/04/144678541/outsmarting-your-spying-smartphone
  • Mendick, Robert. "I Spy...Something Beginning with Adultery." Telegraph. Nov. 12, 2011. (Dec. 29, 2012)
  • Miller, Shari. "The cheat's app: How adulterers can make lovers' texts and calls disappear at the shake of a phone." Daily Mail. Oct. 14, 2012. (Dec. 30, 2012) http://www.dailymail.co.uk/news/article-2217512/The-cheats-app-How-adulterers-make-lovers-texts-calls-disappear-shake-phone.html
  • Musil, Steven. "Week in review: Keyloggers and crime fighters." CNET. July 20, 2007. (Dec. 29, 2012) http://news.cnet.com/Week-in-review-Keyloggers-and-crime-fighters/2100-1083_3-6197799.html
  • New York Times. "Editorial - Sneaky Apps That Track Cellphones." Dec. 23, 2012. (Dec. 28, 2012) http://www.nytimes.com/2012/12/24/opinion/sneaking-after-cellphone-users.html?_r=0
  • Oliphant, James. "The Anthony Weiner scandal: How it all went wrong." LA Times. June 26, 2011. (Dec. 30, 2012) http://articles.latimes.com/2011/jun/16/news/la-pn-weiner-scandal-timeline-20110616
  • Pash, Adam. "Five Best Desktop Search Applications." Lifehacker. Aug. 14, 2008. (Dec. 30, 2012) http://lifehacker.com/400365/five-best-desktop-search-applications
  • Pash, Adam. "Five Best Password Managers." Aug. 28, 2008. (Dec. 30, 2012) http://lifehacker.com/5042616/five-best-password-managers
  • Prince, Brian. "Popular Websites Sniff Browser History, Researchers Find." eWeek. Dec. 6, 2010. (Dec. 23, 2012) http://www.eweek.com/c/a/Security/Popular-Websites-Sniff-Browser-History-Researchers-Find-147530/
  • Rice, Maureen. "Think men are the unfaithful sex? A study shows WOMEN are the biggest cheats - they're just better at lying about it." Daily Mail. Sept. 7, 2009. (Dec. 29, 2012) http://www.dailymail.co.uk/femail/article-1211104/Think-men-unfaithful-sex-A-study-shows-WOMEN-biggest-cheats--theyre-just-better-lying-it.html
  • Roig-Franzia, Manuel and Michelle Boorstein. "Computers, the new private eyes for cheating." Washington Post. Nov. 13, 2012. (Dec. 28, 2012) http://articles.washingtonpost.com/2012-11-13/lifestyle/35507021_1_e-mail-suspicious-spouse-private-investigator
  • Rosen, Christine. "Let he who has not sext cast the first stone." Dominion Post. Nov. 21, 2012. (Dec. 28, 2012)
  • Schulte, Bret. "How Common Are Cheating Spouses?" US News and World Report. March 27, 2008. (Dec. 29, 2012) http://www.usnews.com/news/national/articles/2008/03/27/how-common-are-cheating-spouses
  • Slashdot. "Google Desktop Search Functions As Spyware." Oct. 15, 2004. (Dec. 30, 2012) http://tech.slashdot.org/story/04/10/15/1840215/google-desktop-search-functions-as-spyware
  • Straits Times. "Stop cheating spouses." May 23, 2012. (Dec. 29, 2012)
  • Uppidy. "Safely store, search or share your text messages for free." (Dec. 29, 2012) https://app.uppidy.com/home
  • Van Grove, Jennifer. "Oh, snap! Facebook launches Poke, an iPhone app for self-destructing messages." Venture Beat. Dec. 21, 2012. (Dec. 29, 2012) http://venturebeat.com/2012/12/21/facebook-poke/
  • Weaver, Jane. "Many cheat for a thrill, more stay true for love." MSNBC. April 16, 2007. (Dec. 30, 2012) http://www.msnbc.msn.com/id/17951664/ns/health-sexual_health/t/many-cheat-thrill-more-stay-true-love/
  • Wilkinson, Matt. "The secret txt app to help you cheat." The Sun. Oct. 15, 2012. (Dec. 29, 2012)
  • Your Teen. "Snapchat - Where Teens Send Photos That Self-Destruct." (Dec. 23, 2012) http://yourteenmag.com/2012/10/snapchat-teens-photos/
  • Zachariah, Holly. "Phone companies' ditching of text messages might hamper crime investigations." The Columbus Dispatch. May 1, 2011. (Dec. 29, 2012) http://www.dispatch.com/content/stories/local/2011/05/01/phone-companies-ditching-of-text-messages-might-hamper-crime-investigations.html

Advertisement

Loading...