Light bulb Limited Spots Available: Secure Your Lifetime Subscription on Gumroad!

Apr 07, 2026 · 6 min read

The First Stalkerware Maker Prosecuted in a Decade Just Got a $5,000 Fine and Zero Jail Time

Bryan Fleming marketed pcTattletale to people who wanted to secretly spy on spouses and partners. After the DOJ’s first stalkerware prosecution since 2014, he walked away with a fine smaller than most traffic tickets.

A federal courtroom gavel on a desk with a blurred laptop showing surveillance software in the background

A Landmark Case With a Hollow Sentence

On April 4, 2026, a federal judge in San Diego sentenced Bryan Fleming to time served, which amounted to a single day, plus a $5,000 fine. Fleming had pleaded guilty in January 2026 to one count of intentionally manufacturing, possessing, and selling a device designed for the surreptitious interception of electronic communications.

It was the first criminal prosecution of a stalkerware maker by the U.S. Department of Justice since 2014. Prosecutors themselves had asked the judge for no custodial sentence, effectively setting the ceiling for what victims and privacy advocates could expect.

The message to the stalkerware industry is hard to miss: in the United States, running a surveillance software business may carry criminal liability, but it does not yet carry the certainty of incarceration.

What pcTattletale Did

pcTattletale was a Michigan based surveillance software company that Fleming operated through Fleming Technologies LLC starting as early as 2017. The software was designed to be installed on a target's phone or computer without their knowledge, then covertly monitored through a remote dashboard.

According to the plea agreement, the software could intercept texts, emails, phone calls, GPS location, and web browsing activity. It also created a video recording every time the victim used their device, giving the person who installed it a visual replay of everything the target did on screen.

Fleming was not subtle about his target market. In a YouTube video, he demonstrated the product by saying: "You put it on their Android phone, they won't be able to see it. As they use their Android phone and click around, you see a movie of everything they've done." The company website claimed the app "has been developed for over 15 years and has helped thousands of spouses, family's [sic], and employers."

How the Investigation Unfolded

Homeland Security Investigations launched its probe in June 2021, investigating over 100 stalkerware companies. An undercover HSI agent posed as both a marketing affiliate and a customer to gather evidence against Fleming and pcTattletale.

The company ceased operations in 2024 after suffering a data breach of its own, an ironic end for a business built on surveilling others. But by that point, the software had already been marketed and sold for years to people who used it to monitor partners, spouses, and other targets without consent.

Why the Sentence Matters

Criminal prosecutions of stalkerware makers remain extraordinarily rare. While the Federal Trade Commission has penalized companies in this sector through civil enforcement actions, the DOJ has largely left the criminal side untouched for over a decade. Even the makers of Predator spyware in Greece received prison sentences before the U.S. managed to prosecute a single stalkerware developer.

The Fleming case was supposed to change that. Instead, it handed the industry a data point it will study carefully: a guilty plea, a $5,000 fine, and freedom. For an industry that generates millions of dollars by enabling intimate partner surveillance, stalking, and harassment, this is not a deterrent. It is a cost of doing business.

HSI has indicated that pcTattletale is one of several stalkerware operations currently under investigation, a signal that the prosecution pipeline may be widening. Whether future cases produce stronger sentences remains to be seen.

The Scale of the Stalkerware Problem

pcTattletale was not an isolated case. The stalkerware industry is a thriving market with dozens of active companies selling surveillance tools to consumers. In February 2026, a hacktivist exposed 536,000 payment records from a Ukrainian stalkerware vendor, revealing the sheer volume of people willing to pay to secretly monitor someone else's phone.

Domestic abuse organizations have documented the role stalkerware plays in intimate partner violence. These apps give abusers real time access to a victim's location, communications, and daily activities, making it nearly impossible for victims to seek help or plan an escape without being monitored.

The gap between the harm these tools cause and the legal consequences their creators face has never been wider. Until prosecutors treat stalkerware manufacturing with the same severity as the surveillance it enables, the industry will continue to operate with near impunity.

How to Check If Stalkerware Is on Your Device

If you suspect someone has installed monitoring software on your phone, there are steps you can take:

  • Check for unfamiliar apps in your device settings, particularly apps with generic names or no visible icon
  • Look for unusual battery drain or data usage, which can indicate background surveillance activity
  • On Android, check if "Install unknown apps" is enabled for any app you did not authorize
  • Use a reputable mobile security scanner such as Malwarebytes or Lookout to detect known stalkerware signatures
  • If you find stalkerware and are in a domestic abuse situation, contact the National Domestic Violence Hotline (1-800-799-7233) before removing the software, as the abuser may be alerted