You won’t be able to prove camera hacking because, on iPhone, this type of remote access is not technically possible without your knowledge, but there are steps you can take to check for security issues and gather evidence of anything suspicious.
First, it’s important to know that the iPhone’s security model does not allow anyone to remotely activate your camera or microphone without an on-screen indicator. If the camera is in use, you will always see a green indicator light in the top-right of the screen. There’s no way to disable or hide that through software.
That said, if someone has access to your device, your accounts, or your iCloud data, you can absolutely investigate and document that. Here’s what you can do:
1. Check for signs of account compromise
Go to Settings > Your Name > Password & Security
- Review Devices and remove any you don’t recognize.
- Change your Apple ID password and enable two-factor authentication if it isn’t already on.
2. Review installed profiles or management
Go to Settings > General > VPN & Device Management
If you see a configuration profile you did not install, remove it.
3. Update iOS
Ensure your iPhone is on the latest version:
Settings > General > Software Update
4. Check app permissions
Go to Settings > Privacy & Security > Camera / Microphone / Photos
See which apps have access. Revoke anything you don’t trust.
5. If you believe a crime has been committed
Apple users cannot “prove” hacking at home. But law enforcement can request logs from Apple if needed.
You should:
- Document any suspicious messages, screenshots, or unusual behavior.
- Contact your local police and explain your concerns.
- Ask them to submit a law enforcement data request to Apple if they believe evidence exists.
6. Consider a clean start (optional but effective)
If you want complete peace of mind:
- Back up essential photos/files.
- Go to Settings > General > Transfer or Reset iPhone > Erase All Content and Settings
- Set it up as new, without restoring an old backup.
This guarantees the device software is clean.
You may read more about cybercrime and cybersecurity specially related to Apple products on my personal blog.