
THE DEFINITIVE GUIDE: HOW TO CHECK IF PHONE IS TAPPED OR MONITORED – AN EVERGREEN MANUAL FROM THE WORLD’S #1 SEO EXPERT
As the World’s #1 SEO Expert, I understand the paramount importance of digital security in our interconnected lives. The unsettling feeling that your personal communications might not be private is a deeply concerning one. In an era where our phones are extensions of ourselves, carrying our most intimate thoughts, financial details, and professional secrets, the question of “how to check if phone is tapped or monitored” has never been more relevant. This isn’t just about paranoia; it’s about empowerment, knowledge, and taking control of your digital fortress.
This comprehensive guide is designed to be evergreen, offering timeless, actionable insights that transcend yearly updates or fleeting technological trends. We will delve deep into the tell-tale signs, the preventative measures, and the crucial steps to take if you suspect your privacy has been compromised. Arm yourself with this ultimate manual to identify and neutralize the unseen threat of phone tapping and monitoring.
UNDERSTANDING THE THREAT: WHY WOULD SOMEONE TAP YOUR PHONE?
Before we dive into the detection methods, it’s vital to understand the landscape of phone monitoring. Who would want to tap your phone, and why? The motivations can vary widely, from the personal to the professional, and even the nefarious.
MARITAL OR RELATIONSHIP DISPUTES: Sadly, a common scenario involves estranged partners or jealous individuals seeking to spy on communications, track location, or access personal data.
CORPORATE ESPIONAGE: Businesses might attempt to monitor competitors’ employees for trade secrets, sensitive negotiations, or intellectual property theft.
GOVERNMENT SURVEILLANCE: While typically requiring legal warrants, state actors can and do monitor individuals for national security reasons, criminal investigations, or in authoritarian regimes, for political control.
CYBERCRIMINALS: Hackers and scammers might install malware to steal banking information, personal identities, or hold your data for ransom.
STALKING AND HARASSMENT: In cases of harassment, a perpetrator might use spyware to track a victim’s movements, listen to conversations, or gain access to their digital life.
SOMETIMES, IT’S LEGITIMATE: For instance, employers might monitor company-issued phones, or parents might use parental control software on children’s devices. These are usually disclosed and consented to.
It’s important to differentiate between genuine threats and common phone glitches. Not every strange quirk is evidence of monitoring. Our goal here is to provide a methodical approach to distinguish between the two.
COMMON MISCONCEPTIONS VS. REALITY
Let’s clear the air on a few common myths before we proceed:
MISCONCEPTION: A simple echo during a call always means your phone is tapped.
REALITY: Call echoes are often due to network issues, faulty hardware (your phone or the recipient’s), or poor signal strength. While unusual sounds warrant investigation, an echo alone is rarely definitive proof of tapping.
MISCONCEPTION: Dialing a secret code will instantly reveal spyware.
REALITY: While certain dialer codes can reveal call forwarding settings or your IMEI, they are largely ineffective against modern, sophisticated spyware, which operates at a deeper level than simple network redirects.
MISCONCEPTION: My phone is an iPhone, so it’s completely secure from tapping.
REALITY: While iPhones have robust security, no device is entirely impenetrable. Targeted attacks, physical access, or sophisticated zero-day exploits can still compromise even the most secure smartphones. Jailbreaking an iPhone significantly increases its vulnerability.
MISCONCEPTION: Only super-secret government agents can tap phones.
REALITY: Unfortunately, relatively unsophisticated (and illegal) commercial spyware is readily available online, making phone monitoring accessible to individuals with malicious intent, often with little technical skill required.
THE DEFINITIVE GUIDE: HOW TO CHECK IF PHONE IS TAPPED OR MONITORED – SYMPTOM BY SYMPTOM ANALYSIS
This section is the core of our investigation. We will break down every potential symptom, explain its significance, and provide detailed steps on how to verify if it’s an indicator of monitoring or merely a benign issue.
A. BATTERY DRAIN: THE SILENT POWER THIEF
EXPLANATION: Monitoring software runs continuously in the background, recording audio, tracking location, capturing data, and transmitting it to a remote server. All these processes consume significant battery power, often more than legitimate background apps.
WHAT TO LOOK FOR:
RAPID, UNEXPLAINED DRAIN: Your phone’s battery capacity seems to plummet much faster than usual, even during periods of minimal usage.
PHONE GETTING UNUSUALLY HOT: The device feels warm or hot to the touch, even when it’s not actively charging or running resource-intensive applications like gaming or video streaming. This heat is generated by an overworked processor and constant data transmission.
HOW TO CHECK:
BATTERY USAGE STATISTICS:
1. Go to your phone’s Settings.
2. Navigate to “Battery” or “Battery Usage.”
3. Examine the list of apps and their battery consumption. Look for apps you don’t recognize, apps consuming an unusually high percentage of battery power when they shouldn’t be active (e.g., a simple utility app draining more than your web browser), or system processes that seem excessively high.
4. Check the battery graph (if available) to see if there are periods of high drain even when the phone was idle.
COMPARE WITH NORMAL USAGE PATTERNS: Think back to how long your battery typically lasted. If there’s a significant, sudden, and consistent drop without any changes in your usage habits (like installing new apps or streaming more content), it’s a red flag.
RULE OUT LEGITIMATE CULPRITS: Ensure you’re not mistakenly attributing the drain to normal activities. Have you recently installed a new game? Are you in an area with extremely poor signal, forcing your phone to work harder to connect? Have you recently updated your operating system, which can temporarily cause increased battery usage as processes re-optimize?
B. UNUSUAL DATA USAGE: THE HIDDEN UPLOAD
EXPLANATION: Tapping software collects data from your phone (call logs, text messages, location data, recorded audio, photos, videos) and then uploads it to a remote server controlled by the person monitoring you. This data transmission consumes your mobile data allowance.
WHAT TO LOOK FOR:
SPIKES IN DATA USAGE: A sudden and significant increase in your monthly data consumption, especially if your usage habits haven’t changed.
DATA USAGE WHEN IDLE: Noticeable data consumption even when you are not actively using your phone, connected to Wi-Fi, or have all apps closed.
HOW TO CHECK:
DATA USAGE STATISTICS:
1. Go to your phone’s Settings.
2. Navigate to “Network & Internet” or “Connections” and then “Data Usage.”
3. Review your mobile data consumption over the past month or billing cycle.
4. Look for specific apps that are consuming an exorbitant amount of data. Again, be suspicious of unrecognized apps or those that shouldn’t require constant data transmission.
COMPARE CURRENT MONTH WITH PREVIOUS: Has your data usage suddenly jumped from 5GB to 20GB without a logical explanation? This is a strong indicator.
INVESTIGATE SPECIFIC APPS: If you see an app consuming a lot of data, try to identify what it is. If it’s a social media app or streaming service, it might be legitimate. If it’s something obscure or an app you don’t recall installing, investigate further.
RULE OUT UPDATES, CLOUD SYNC, STREAMING: Ensure large data spikes aren’t due to major operating system updates, extensive cloud backups (photos, videos), or increased streaming of high-definition content.
C. STRANGE PHONE BEHAVIOR & PERFORMANCE ISSUES: THE DIGITAL STUTTER
EXPLANATION: Spyware, by its nature, consumes your phone’s processing power, memory, and network resources. This constant background activity can manifest as noticeable performance degradation.
WHAT TO LOOK FOR:
SLOW PERFORMANCE, LAGS, FREEZING: Your phone feels sluggish, apps take longer to open, or the interface frequently freezes and becomes unresponsive.
UNEXPECTED REBOOTS OR SHUTDOWNS: Your phone randomly restarts or powers off without your input.
APPS CRASHING FREQUENTLY: Applications that previously worked fine now repeatedly crash or close unexpectedly.
DIFFICULTY SHUTTING DOWN: When you try to power off your phone, it takes an unusually long time, or the backlight remains on for an extended period after you press the power button. This could indicate background processes struggling to terminate.
SCREEN TURNING ON/OFF INEXPLICABLY: Your phone’s screen lights up on its own, without notifications or interaction, then goes dark again.
HOW TO CHECK:
OBSERVE PATTERNS: Keep a mental note or even a log of when these issues occur. Are they consistent? Do they happen when you’re not actively using the phone?
COMPARE WITH OTHER DEVICES: If possible, compare your phone’s performance with a similar device from a friend or family member.
FACTORY RESET AS A LAST RESORT: If you’ve ruled out all other possibilities and suspect spyware, a factory reset (after backing up essential data) will typically remove most spyware, but this will also delete all your data and settings. We will discuss this in detail later.
D. ODD SOUNDS DURING CALLS: ECHOES FROM THE SHADOWS
EXPLANATION: While often due to poor connection, certain persistent, unusual sounds during calls could be indicative of monitoring, as the tapping software might introduce interference.
WHAT TO LOOK FOR:
STATIC, CLICKS, DISTANT VOICES, ECHOES: Persistent background noises during calls that aren’t attributable to your environment or the other caller’s environment. This includes faint clicks, pulses, or even muffled voices that sound like a third party is on the line.
UNUSUAL BACKGROUND NOISES NOT PRESENT AT YOUR LOCATION: If you hear what sounds like street noise, a television, or other distinct sounds when you are in a quiet room, it could be the mic on your device being accessed remotely.
HOW TO CHECK:
TEST CALLS: Make calls to different people, using different networks (e.g., landline vs. mobile), and from various locations (e.g., home, office, outdoors). If the sounds persist across all these variables, it increases suspicion.
RULE OUT POOR SIGNAL, FAULTY HARDWARE: First, ensure you’re in an area with good network coverage. Test your phone’s microphone and speaker with recordings or other apps to rule out a hardware malfunction. If the sounds only occur during calls and not when using the voice recorder, it points away from hardware.
E. UNEXPLAINED MESSAGES OR ALERTS: GHOSTS IN THE MACHINE
EXPLANATION: Some older or less sophisticated spyware might leave traces, such as failed activation codes, test messages, or system alerts that reveal its presence. Modern spyware is usually stealthier.
WHAT TO LOOK FOR:
STRANGE SMS MESSAGES: Receiving SMS messages with random characters, numbers, or links from unknown senders. These could be failed commands from monitoring software or attempts to activate it.
UNUSUAL POP-UPS, SYSTEM ALERTS YOU DON’T RECOGNIZE: Unexpected pop-up windows, system messages, or notifications that don’t correspond to any of your installed apps or operating system functions.
MESSAGES FROM UNKNOWN SENDERS: While sometimes spam, recurring messages from odd numbers could be related to spyware.
HOW TO CHECK:
DO NOT CLICK SUSPICIOUS LINKS: If you receive a strange message with a link, do not click it. It could be a phishing attempt or an attempt to install more malware.
REPORT/DELETE: Delete suspicious messages. If they persist, take screenshots as potential evidence.
F. ACTIVITY WHEN IDLE: THE PHANTOM TOUCH
EXPLANATION: If your phone is being remotely accessed or actively transmitting data, it might exhibit signs of activity even when you’re not touching it.
WHAT TO LOOK FOR:
SCREEN LIGHTS UP: Your phone’s screen suddenly illuminates without any incoming notification, call, or interaction from you.
SOUNDS OR VIBRATIONS: Your phone emits a subtle sound or vibrates when you haven’t received a notification and it’s not charging.
CAMERA OR MICROPHONE INDICATOR LIGHTS: Modern smartphones often have small indicator lights (or on-screen icons) that show when the camera or microphone is active. If these appear briefly or persistently when you are not using an app that requires them, it’s a serious red flag.
HOW TO CHECK:
OBSERVE CAREFULLY: Place your phone on a table and observe it for an extended period, especially at night when disturbances are less likely.
REVIEW APP ACTIVITY: Check your phone’s app usage logs (if available) or privacy dashboard to see which apps recently accessed the camera or microphone.
G. INCREASED HEAT: THE OVERBURDENED PROCESSOR
EXPLANATION: Similar to battery drain, constant background processes and continuous data transmission required by monitoring software can cause your phone’s processor to work harder than usual, generating excess heat.
WHAT TO LOOK FOR:
PHONE FEELS UNUSUALLY WARM: Your device feels noticeably warm or hot, even when it’s not performing intensive tasks like gaming, video editing, or charging.
HOW TO CHECK:
COMPARE WITH NORMAL TEMPERATURE: Most phones get warm with heavy use or charging. The key is unexplained heat when idle or during light use.
FEEL DIFFERENT PARTS OF THE PHONE: Sometimes, heat can be concentrated in specific areas, which might point to a particular component or area where the spyware is operating.
H. UNFAMILIAR APPLICATIONS & SETTINGS: THE INTRUDER’S FOOTPRINT
EXPLANATION: Spyware often installs itself as a hidden application or disguises itself with a generic or misleading name to avoid detection. It might also alter system settings to maintain persistence.
WHAT TO LOOK FOR:
APPS YOU DON’T REMEMBER INSTALLING: Carefully review your entire app list. Scroll through every screen, including the app drawer.
APPS WITH GENERIC OR SUSPICIOUS NAMES: Be wary of apps named “System Service,” “Update Manager,” “Device Helper,” or other similar generic terms that aren’t native to your phone and have unusual icons.
UNUSUAL PERMISSIONS GRANTED: An app that has access to your camera, microphone, location, SMS, call logs, and contacts, especially if it’s not a messaging app, navigation app, or legitimate utility.
“UNKNOWN SOURCES” ENABLED (ANDROID): On Android devices, enabling “Install apps from unknown sources” allows applications to be installed from outside the official Google Play Store. If this setting is enabled and you didn’t do it, it’s a major red flag for potential unauthorized app installation.
HOW TO CHECK:
REVIEW APP LIST THOROUGHLY:
1. Go to Settings -> Apps & Notifications -> See all apps (or similar path depending on your OS).
2. Scroll through every single app. If you don’t recognize an app, search for its name online.
3. Pay attention to apps that don’t have an icon or have a very generic system-like icon but aren’t part of the core operating system.
CHECK APP PERMISSIONS METICULOUSLY:
1. For each suspicious app, tap on it to view its information.
2. Go to “Permissions.”
3. If an app has access to your microphone, camera, location, SMS, or contacts without a clear, legitimate reason, revoke those permissions or uninstall the app.
SEARCH ONLINE FOR SUSPICIOUS APP NAMES: If you find an app you don’t recognize, do a quick web search. Often, legitimate apps will have extensive information, reviews, and a clear developer. Spyware might show up in security forums or lists of malicious apps.
CHECK “UNKNOWN SOURCES” (ANDROID ONLY):
1. Go to Settings -> Apps & Notifications -> Special app access (or similar).
2. Look for “Install unknown apps” or “Unknown sources.”
3. If it’s enabled for an app you don’t trust or for system-wide installation, disable it immediately.
I. PHYSICAL ACCESS & TAMPERING: THE DIRECT APPROACH
EXPLANATION: Most consumer-grade spyware requires physical access to your device for installation. This means someone had to unlock your phone and manually install the malicious software.
WHAT TO LOOK FOR:
UNSUPERVISED ACCESS: Did someone you distrust (or anyone at all) have extended, unsupervised access to your phone? This is often how a jealous partner or a suspicious employer might install spyware.
SIGNS OF TAMPERING: While rare for modern phones, look for subtle signs that your phone might have been physically manipulated, like a case that doesn’t fit quite right anymore, tiny scratches on screws (if accessible), or anything that seems out of place.
HOW TO CHECK:
RECALL WHO HAD ACCESS: Think back to who might have had an opportunity to physically interact with your unlocked phone.
INSPECT PHONE PHYSICALLY: Check for any unusual physical alterations.
TECHNICAL CHECKS & DIAGNOSTIC STEPS: DEEPER INVESTIGATION
Beyond observing symptoms, there are several technical checks you can perform.
A. DIALER CODES (GENERAL INFORMATION)
While not definitive spyware detectors, some codes can provide information about call forwarding settings, which could be exploited (though rarely by sophisticated spyware).
- *21#: Checks the status of unconditional call forwarding (calls are forwarded immediately).
- *61#: Checks the status of call forwarding when you don’t answer.
- *62#: Checks the status of call forwarding when your phone is unreachable.
- *#06#: Displays your phone’s unique IMEI (International Mobile Equipment Identity) number. This is useful for reporting a stolen phone, not for detecting spyware directly.
- ##002#: Deactivates all call forwarding. This is a common suggestion, and while it won’t remove spyware, it will stop any active call forwarding to another number.
IMPORTANT CLARIFICATION: Modern spyware operates by monitoring calls and messages on your device before they are even sent, or by recording your environment, not usually by simply forwarding your calls. These codes are useful for legitimate network functions, not for directly detecting advanced surveillance.
B. REVIEWING APP PERMISSIONS
This is one of the most crucial steps. Spyware needs extensive permissions to operate.
- ANDROID: Go to Settings > Apps & Notifications > App permissions (or Privacy > Permission Manager). Systematically review apps that have access to:
- Microphone
- Camera
- Location
- SMS
- Call logs
- Contacts
- Storage
- Accessibility Services (especially dangerous if granted to an unknown app)
- IOS: Go to Settings > Privacy. Here, you’ll find categories like Microphone, Camera, Location Services, Contacts, etc. Tap on each one to see which apps have access.
REVOKE SUSPICIOUS ONES: If an app you don’t recognize or trust has unnecessary permissions (e.g., a calculator app with microphone access), revoke them immediately. If you can’t revoke them, uninstall the app.
C. CHECKING FOR “UNKNOWN SOURCES” (ANDROID)
This setting, if enabled, allows apps from outside the Google Play Store to be installed.
- Go to Settings > Apps & Notifications (or Security & privacy) > Special app access > Install unknown apps.
- Review the list of apps allowed to install unknown apps. Ensure this is disabled for all apps unless you explicitly know why it’s enabled (e.g., you use a specific legitimate app store alternative).
D. USING A RELIABLE MOBILE SECURITY APP
Install a reputable anti-malware or security application from a well-known cybersecurity company (e.g., McAfee, Norton, Bitdefender, Avast, Kaspersky).
RUN A FULL SCAN: These apps can often detect and remove known spyware or malware.
CAUTION: Be aware that highly sophisticated, targeted spyware (often called “stalkerware” or “lawful intercept” software) can be designed to evade detection by standard antivirus programs. However, for most common, commercially available spyware, these tools can be effective.
E. CHECKING FOR JAILBREAKING (IOS) OR ROOTING (ANDROID)
These modifications bypass the inherent security mechanisms of the operating system, making it significantly easier to install spyware.
- IOS (Jailbreaking):
- Look for the Cydia app on your home screen. Cydia is the alternative app store installed when an iPhone is jailbroken.
- If you see Cydia and you didn’t intentionally jailbreak your phone, it’s a huge red flag.
- ANDROID (Rooting):
- Look for apps like “SuperSU,” “Magisk Manager,” or “KingRoot” in your app drawer. These are common tools used to manage root access.
- You can also download a “Root Checker” app from the Google Play Store to verify root status.
- If your phone is rooted without your knowledge or consent, it significantly increases the likelihood of unauthorized software being installed.
PREVENTATIVE MEASURES: FORTIFYING YOUR DIGITAL DEFENSES
The best defense is a good offense. By adopting these security habits, you can significantly reduce the risk of your phone being tapped or monitored.
A. SECURE YOUR PHONE PHYSICALLY
ALWAYS USE A STRONG SCREEN LOCK: Implement a PIN, pattern, fingerprint, or face ID. A complex PIN (6+ digits) is often more secure than a pattern.
NEVER LEAVE UNATTENDED: Do not leave your phone unlocked and unattended, even for a few minutes. Physical access is often the easiest way for spyware to be installed.
B. MAINTAIN SOFTWARE UPDATES
INSTALL OPERATING SYSTEM UPDATES PROMPTLY: Software updates frequently include critical security patches that fix vulnerabilities exploited by malware and spyware.
UPDATE ALL APPS: Keep your applications updated, as developers also release security fixes.
C. DOWNLOAD APPS ONLY FROM OFFICIAL STORES
STICK TO GOOGLE PLAY STORE AND APPLE APP STORE: These platforms have robust security checks to prevent malicious apps from being distributed. Avoid third-party app stores or downloading APK files from untrusted websites (Android).
D. BE WARY OF PHISHING & UNKNOWN LINKS
DO NOT CLICK SUSPICIOUS LINKS: Be extremely cautious of links received in emails, text messages, or social media, especially from unknown senders or those that seem too good to be true. These are common vectors for malware delivery.
E. USE STRONG, UNIQUE PASSWORDS
SECURE ALL ASSOCIATED ACCOUNTS: Use complex, unique passwords for your Google/Apple ID, email, social media, and any other accounts linked to your phone. Consider using a password manager.
F. ENABLE TWO-FACTOR AUTHENTICATION (2FA)
ADD AN EXTRA LAYER OF SECURITY: Enable 2FA on your Google/Apple ID and all important online accounts. Even if someone obtains your password, they’ll need the second factor (e.g., a code from an authenticator app or SMS) to access your account.
G. REGULARLY REVIEW APP PERMISSIONS
MAKE IT A HABIT: Periodically go through your app permissions and revoke any that seem unnecessary or suspicious.
H. AVOID PUBLIC WI-FI FOR SENSITIVE TRANSACTIONS
USE A VPN: Public Wi-Fi networks are often unsecured and susceptible to eavesdropping. Avoid accessing sensitive information (banking, email) on public Wi-Fi. If you must use it, employ a reputable Virtual Private Network (VPN).
WHAT TO DO IF YOU CONFIRM OR SUSPECT YOUR PHONE IS TAPPED OR MONITORED
If, after following these steps, you have strong reason to believe your phone is being monitored, it’s crucial to act swiftly and strategically.
A. DO NOT ALERT THE SUSPECTED PARTY
MAINTAIN COMPOSURE: If you confront the person you suspect, they might escalate their actions, wipe evidence, or become more evasive. Your priority is to gather information and secure your privacy.
B. DISCONNECT FROM THE INTERNET
PREVENT FURTHER DATA TRANSMISSION: Turn off your mobile data and Wi-Fi. This will cut off the spyware’s ability to transmit any further information from your device.
C. BACK UP ESSENTIAL DATA (CAREFULLY)
SAVE IMPORTANT INFORMATION: If you have photos, documents, or contacts you cannot lose, back them up to a secure, external device or a trusted cloud service. Be aware that backing up everything might also back up some spyware components, though a factory reset will typically clean this. For maximum security, only back up specific, non-executable files.
D. PERFORM A FACTORY RESET
WIPE THE DEVICE CLEAN: A factory reset will restore your phone to its original factory settings, effectively wiping all user data, installed apps, and most forms of spyware.
CAUTION: This is a drastic step. It will delete everything on your phone. If you intend to pursue legal action, a factory reset will destroy forensic evidence. Consider consulting with law enforcement or a cybersecurity expert before doing a reset if evidence preservation is critical.
HOW TO DO IT: Go to Settings > System > Reset options > Erase all data (factory reset) (Android) or Settings > General > Transfer or Reset iPhone > Erase All Content and Settings (iOS).
E. CHANGE ALL PASSWORDS
SECURE YOUR ACCOUNTS: From a secure, uncompromised device (e.g., a friend’s computer, a new phone), immediately change all your passwords, especially for your Google/Apple ID, email, social media, banking apps, and any other critical services.
F. SEEK PROFESSIONAL HELP
CONSULT EXPERTS: If the situation is severe (e.g., corporate espionage, serious harassment), consider contacting:
* Cybersecurity professionals: For forensic analysis and removal of advanced spyware.
* Law enforcement: If you believe a crime has been committed. They can advise on evidence preservation and legal steps.
G. CONSIDER A NEW PHONE & NUMBER
SEVERE THREAT: In cases of persistent, sophisticated threats, the safest course of action might be to get a completely new phone and a new phone number. Do not restore from an old backup, as it could reintroduce the spyware. Start fresh.
THE LEGAL LANDSCAPE (GENERAL ADVICE)
It is crucial to understand that in most jurisdictions, installing monitoring software on someone’s phone without their explicit, informed consent is illegal. This can fall under various laws pertaining to privacy invasion, harassment, or illegal wiretapping. Exceptions usually exist for law enforcement with a warrant, or for employers monitoring company-owned devices (with proper disclosure), or for parental monitoring of minor children. If you suspect your phone has been illegally tapped, consult with legal counsel to understand your rights and options. Do not attempt to take legal action without proper legal advice.
CONCLUSION: YOUR DIGITAL FORTRESS
The question of “how to check if phone is tapped or monitored” is a complex one, but it’s a question you now have the tools to answer. By understanding the symptoms, performing diligent checks, and adopting robust preventative measures, you transform your phone from a potential vulnerability into a secure digital fortress. Vigilance is your greatest ally in the ongoing battle for digital privacy. Stay informed, stay secure, and take control of your personal information.
SUBSCRIBE, FOLLOW, LIKE, SHARE, COMMENT for more expert insights into digital security and SEO mastery!
Discover more from Does Fansly Show Up As Fansly On Credit Card Statement
Subscribe to get the latest posts sent to your email.