8 smart ways that tech can reveal a cheating spouse

(Credit: iStock)


People cheat. Not everyone, not all the time, but extramarital affairs are very common. Even now, in the age of serial divorce, and polyamory, when the wedding is so flexible – and even disposable – as it ever has been, dedicated men and women succumb to the temptation.

In the search for evidence, partners usually get to spy apps. This mysterious phone apps to keep track of everything a person does and where the person goes. Click or tap here for five smartphone apps that get the job done.

In addition, the camera technology has advanced a lot in the past few years. They are becoming smaller and smaller, making it possible to hide them in any way.

Spycam manufacturers are creative in producing some of the most cleverly disguised (and small) camera/DVR systems, complete with HD video, motion detection, a large storage card support, and remote controls. Tap or click here for 10 types of spy cameras, the people would not suspect it to look.

In many ways, technology makes infidelity easier to pull off. Spouses can keep the erotic video chats, send “pins” that mark of their favorite meeting spots, and the exchange of images and text with their loved ones in many different ways. An actual appointment, people must be physically present at the same place, but the foreplay can happen anytime, anywhere – and the believers may have no idea.

At the same time, the year of the marriage will be the grinding of a husband instincts, and we often know when something seems funny. Computers, tablets and smartphones absorb adulterous evidence, such as a sponge, and as soon as suspicions are aroused, tech can offer many clues about a possible dalliance.

Let me be clear: The best thing you can do is a candid and honest conversation with your partner about your marriage. Couples therapy can work wonders. However, if your relationship is not healthy to begin with, or you have something tangible for the start of divorce proceedings, these are the basic methods for busting a cheater.

More about this…

  • 3 iPhone features that are really important for Apple users

  • Blocking your cell phone number of the caller-ID with this trick

  • Browser password hack puts millions of Wi-Fi networks at risk

1. A Hidden or Locked Phone

Many people put their phones away from others to protect their privacy. However, most of us don’t hide our phones from our spouses. This gesture is subtle, but it may suggest illicit text conversations. Cheaters are often protective of their phones; they share their passwords, and they even change their passwords to their phones, ” the contents of a secret.

Push notifications are a nightmare for the unfaithful spouses, because they can show excerpts of a conversation of texts, e-mails, and so on – that could incriminate both parties. The spotting of a suspicious push message, or even noticing the sudden absence of one of them, may be suggestive.

2. A Second Phone

The easiest way to have two romantic lives separate to purchase two separate phones. That way, the cheater does not get confused and text the wrong person by accident. The existence of this second phone is also an obligation, even if it is described as a “work” or “emergency” phone.

Another technique is to purchase a separate SIM card, which can be enabled of phones that are “jail broken.” This is a lot of work and probably for most cheaters, but when you insert a SIM card, allows you to extract the data to insert in another phone.

3. The Scanning Of Digital Coupons

The receipts are often sent by sms message or e-mail. If you have access to your spouse’s online accounts, you can be surprised to find out these digital vouchers for products and services that you’ve never heard of. (Read: hotels, restaurants, jewelers, etc). Most people do not leave a physical “paper trail”, but virtual documentation often persists.

The same is true for the frequent flyer miles and credit card points, that a trickster can spend on a fling. Cheaters often go to extremes in order to avoid using their checking and credit card accounts, but there are many other ways to pay for a rendez-vous, You to Paypal to Venmo, and they will still leave a trace of their transactions.

4. Try to Find Their Phone

Many popular devices that use any form of location technology and often make it easier to find the service is enabled to disable it. If your spouse uses an Apple device that is connected to a family account and have enabled location sharing, you can locate the device by logging in to and clicking on ” Find My iPhone or using the Find My Friends app.

If your spouse uses an Android phone and is signed in to Google on a shared computer, you can type “Find My Phone” into the search bar, and you will be provided with the location of the phone.

5. Then, Look for a GPS

As we are more dependent on GPS these days, you may also want to take a look at your spouse (o) the location of the history. For users of Google, the “last destinations” menu option on the navigation system can record your spouse’s movements; for Android users, the Google’s Timeline feature (found in the Google Maps app or Google Maps online if they are logged in) works the same way.

If your spouse uses an iPhone, there is a place to definitely look into. Many people do not even know this treasure trove of tracking.

You will find their frequent locations in Settings > Privacy > location services > System Services > Important Locations. It takes quite some effort to consistently disable or delete these types of settings so if they are not well, you’re likely to find something here.

6. Find Each Letter of the Alphabet

Cheaters would have to be pretty stupid not to clear the search history on their browsers. If they routinely access dating sites, especially hook-up services, such as Ashley Madison and adult friendfinder, they will probably think that their tracks to hide it, unless she likes to flirt with the disaster as much as attractive strangers.

Auto-fill is more difficult to remember. Search engines such as Google does a remarkable job of guessing your search parameters, based on everything you’ve ever searched before.

If you share a computer with a suspicious spouse, you may intend to type “Megalodon, and in its place the words “Megan Granger home phone number” flash across the field. Take this a few steps further. To start typing each letter of the alphabet and see what pops up.

7. Check All Cloud Services

The most dangerous habit for cheaters is for the sending of photos and video. This media to spice things up, but they are vivid evidence of an affair, and such materials may be used as evidence in a divorce case – especially if a betrayed husband or wife can save or download copies.

The photos and video covert, cheaters may have a special cloud service. For example, the Keepsafe Photo Vault is designed to store these media files and prevent others from accessing them. Many customers use Keepsafe for work or personal reasons, but if you notice that your spouse has a Keepsafe account, and you can’t figure out why you may be on to something.

Two similar services are Safe, and Hide It Pro, which were created to store pictures and video and protect them with a PIN. They also work in the same way to cloud services such as Google Drive, Dropbox and Apple’s Cloud, but security is their top priority. Check on Amazon Prime, because this service gives you a place to store your photos also.

8. Secret Messages Hidden in the Audio or Photo Files

If your cheater is savvy, he or she knows, how to secretly embed an image in an audio or picture file. You think it’s a well-known song or a landscape shot, but a steamy shapes can be hidden behind the comments, and trees.

It is easy to make and even easier to distribute them unnoticed. Tools such as DeepSound or QuickStego this point-and-click on the work for the casual cheater. The snoop usually suspects nothing out of the ordinary. The files appear to be just. You must know a special keystroke or the code to unlock the files.

Technological espionage is the least healthy way to address these problems, and you should only use these techniques as a last resort. Invade your spouse’s privacy can lead to even more damage, and certain types of violations have been bona fide illegal.

What the digital lifestyle, if you have any questions? Call my radio show and click here to find it on your local radio station. You can listen to the Kim Komando Show on your phone, tablet or computer. Of the buy of an opinion to the digital world problems, click here for my free podcasts.

Copyright 2018, WestStar Multimedia Entertainment. All rights reserved.

Learn about the latest technology on the Kim Komando Show, the nation’s largest weekend radio talk show. Kim takes calls and provides advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, newsletters and more, visit her website at

Recent posts

Follow us

Don't be shy, get in touch. We love meeting interesting people and making new friends.

Most popular