Is your smartphone being tracked? We asked an expert

In the movies, people on the run are often hunted down because of their cell phones. There are countless scenes where expensive smartphones are smashed to bits, or dropped in rivers, to evade capture by nefarious government operatives or well-equipped mobsters.

Hopefully you’re not in that situation. But if you were, do you really need to go that far? We asked the experts what information your cell phone is really broadcasting about you, how to protect yourself, and what it would take to truly go off the grid.

Recommended Videos

The simple options don’t work

If you suspected your phone were being tracked and wanted to start covering your tracks without snapping it in half, your first bet might be to simply turn on airplane mode. That won’t cut it.

“Every phone has two operating systems,” explains Gary S. Miliefsky, CEO of SnoopWall, “One that connects to cellular networks, and one that interfaces with the consumer. Airplane mode may only disable features in the consumer facing operating system, such as Android or iOS, but not in the OS used between the phone and the carrier network. A phone may be giving out a ‘ping’ and you’d never know it.”

Communicating at all with a cell tower could expose you

It doesn’t even need to be sending out GPS coordinates — communicating at all with a cell tower could expose you. By comparing the signal strength of your cell phone on multiple cell towers, someone looking for you can approximate your location with triangulation. This requires access to data from your mobile network, which should keep it out of reach for criminals, but carriers can be compelled to provide that data to law-enforcement agencies.

So how about removing the SIM card?

“Removing the SIM may work to stop most cyber criminals, but every phone has a built-in feature set of identifiers that may be detected via tools like Stingray devices now used by the police and military, as well as fake 2G cell towers put up by the NSA,” Gary explains, “Forcing a phone to 2G means no encryption and it’s easily detected and tracked.”

Stingrays are also known as cell-site simulators, or IMSI catchers. They mimic cell phone towers and send out signals that can trick your cell phone into replying with your location and data that can be used to identify you. And they’re surprisingly widely used.

The American Civil Liberties Union has a map and list of federal agencies known to use cell-site simulators, which includes the FBI, the DEA, the Secret Service, the NSA, the U.S. Army, Navy, Marshals Service, Marine Corps, National Guard, and many more. For obvious reasons, it’s not an exhaustive list.

What about Wi-Fi?

At short range, you can be tracked by Wi-Fi. Every time you turn Wi-Fi on, your phone is sending out a signal that includes your unique MAC address, which is kind of like a fingerprint for digital devices. This kind of technology is already being used by stores to track your movements. It’s not ideal for surveillance, because of the limited range, but if someone has obtained your MAC address it could be used to deduce something like when you enter or leave a specific building.

The simple solution here is to avoid unencrypted public Wi-Fi. It’s also possible, on some phones, to change or spoof your MAC address. Some Android apps can help you do it, but you might have to root your phone. With iOS 8, Apple introduced more security by randomizing your MAC address, though, according to iMore, this feature may not work as well in practice as you’d hope.

Miliefsky also notes other reasons to avoid public Wi-Fi networks: so-called man-in-the-middle attacks and fake “trusted” routers. Fake Wi-Fi access points are also sometimes called “evil twins,” and they’re designed to look like a legitimate Wi-Fi network, but they’re actually operated by an attacker. If you connect, then they can eavesdrop, or direct you to a fake website where they can obtain sensitive passwords and other information.

Man-in-the-middle attacks are more common, because an attacker just has to be in range of an unencrypted Wi-Fi access point, and they can potentially intercept messages between two parties, or even interject new messages.

“If you are using HTTPS, TLS, or SSL it’s harder to eavesdrop on public Wi-Fi, but there have been some exploits like the SSL Heartbleed attack,” Miliefsky explains.

The TLS and SSL standards are supposed to ensure that your communications are encrypted. That’s why the Heartbleed vulnerability was such a big deal. It was an OpenSSL bug that potentially enabled cyber criminals to collect sensitive information, like encryption keys, so they could set up undetectable man-in-the-middle attacks.

The threat within

You may have concerns about privacy infringement from threats like Stingray, but there are easier ways to track us. Most criminals go for the low-hanging fruit, and the biggest threat for tracking and spying is probably malware.

“Public Wi-Fi is a smaller risk than trusted apps being creepware and spying on you,” suggests Miliefsky.

There are a lot of commercial, mobile spyware products on the market that can enable someone to intercept your emails, text messages, and calls.

In some cases it may even be possible for hackers to remotely access your smartphone microphone or camera.

“You may have already installed an app you trust that can do this,” Miliefsky says, “Just go to the Google Play store or Apple iTunes and look at the permissions of some of the most popular apps like Flashlights, Bibles, Battery Maximizers, QR Readers, Password Managers, other utilities and games.”

Gary’s company SnoopWall hit the headlines last year with a Flashlight Spyware Report. It revealed that many popular flashlight apps in the Play Store were asking for a suspiciously long list of permissions, enabling them to theoretically do all sorts of things, like track you via GPS, access text message history, and access call logs.

In some cases it may even be possible for hackers to remotely access your smartphone microphone or camera, as Gary demonstrated on Good Morning America.

Steering clear of malware

The good thing about malware is that you have to install a malicious app. You can avoid opening SMS attachments, avoid apps from unknown sources, and cast a suspicious eye over your installed app list.

“It’s absolutely time for a spring cleaning,” suggests Gary, “Delete all the apps you don’t use.”

For the apps you decide to keep, Gary recommends checking four things:

  1. Permissions (Are there too many for what the app needs to do?)
  2. Privacy policy (Read it closely.)
  3. Company website (Are they based in malware hotbeds like China, Russia, Brazil, or India?)
  4. App developer email (Send one to see how they respond.)

“If you don’t like what you see with these four items, dump it and find a better, less privacy-invasive alternative,” says Gary, “You may have to buy an app to get one that doesn’t use ad networks and have creepware behaviors, but it’s worth 99 cents to reclaim your identity, isn’t it?”

How do you avoid being tracked?

There’s a difference between something being possible and something being probable. With a little bit of common sense, most of us can avoid any problems. Make sure you have lock-screen security, so no one can physically install an app on your phone when you’re not looking, follow the advice above about installing new apps, and avoid public Wi-Fi. If you absolutely must access public Wi-Fi, then use a VPN service or app. That will safeguard you against the most likely criminal threats.

Being tracked by a rogue FBI agent, hostile foreign government, or extremely well-equipped criminal gang is a different matter. If your concerns run this crazy deep, there are only a couple of foolproof options to safeguard your privacy.

“To avoid being tracked it’s best to put your phone in a PrivacyCase, or remove the battery,” says Miliefsky. A PrivacyCase wraps your phone in shielding that blocks signals from going in or out, kind of like going into a basement.

If you’re wondering why turning the phone off might not be enough, it’s because of malware, like PowerOffHijack. You won’t find it in the Play Store, and it requires your device to be rooted in order to work, but AVG reported more than 10,000 installations, mostly in China. It plays your usual shutdown animation and turns the screen blank, but actually keeps the device on, so that it can monitor you.

So if you truly want to go off-grid in a hurry, remove the battery. Of course, many modern smartphones, like the iPhone 6 and the Galaxy S6, don’t let you do that. So maybe the movies weren’t exaggerating after all: You may have to smash or ditch that smartphone if you really want to evade surveillance entirely.

Editors' Recommendations

Former Digital Trends Contributor
Simon Hill is an experienced technology journalist and editor who loves all things tech. He is currently the Associate Mobile…
Best Fitbit deals: Save on Versa 4, Charge 6, and Sense 2

One of the best fitness trackers is a great way to up your workout, though they can get expensive. Even with the current Apple deals, Apple Watch deals, and Samsung Galaxy Watch deals things can get a little expensive. Fitbit is a good fitness tracker brand to turn to if you’re looking for affordability. It has a great lineup of options, and Fitbit watches are almost always seeing a deal. In fact, right now Fitbit deals make for some of the best smartwatch deals you can shop. Below you’ll find what we feel are the best Fitbit deals to shop right now. There are several models to choose from for some savings, as well as a great deal on the Fitbit Charge 4.
Today's best Fitbit deal
Fitbit Charge 4 -- $125, was $150

While there are newer Fitbit Charge models on the market that include both the Fitbit Charge 5 and the Fitbit Charge 6, the Fitbit Charge 4 still has a lot to offer. It has all sorts of fitness and activity tracking capabilities. It can measure your resting heart rate and calorie burn throughout the day, as well as your SpO2 nightly average. The Charge 4 also uses built-in GPS to see your pace and distance during outdoor runs, rides, hikes, and other activities. You can head out for a long hike with this smartwatch, as the Charge 5 can last up to seven days on a single battery charge, and up to five hours when GPS is being used.

Read more
Best Samsung deals: The Galaxy S24 Ultra is up to $750 off

Whether you’re looking to shop TV deals, phone deals, smartwatch deals, and even tablet deals, Samsung almost always has something we could direct your attention toward. It’s regularly regarded as one of the top electronics brands, and almost always places among the best TV brands. There are a lot of Samsung deals worth shopping right now, and they cross the full spectrum of tech. We’ve done some of the heavy lifting for you and have rounded up what we feel are the best Samsung deals to shop right now. You’ll find a little bit of everything with these deals, so read onward for more details.
Samsung Galaxy Watch 4 — $150, was $200

On the surface, the Samsung Galaxy Watch 4 may look like a watch with a cool digital screen. And, of course, that'd be quite nice. But it turns out to be more of a wearable health monitor, giving you access to info on your overall fitness, running capabilities, and sleep cycles. Our Samsung Galaxy Watch 4 review compliments it for its seamless pairing with Samsung devices and its compatibility with small wrists. As you're sure to be adventuring, running, and exploring with this watch, be sure to grab one of the best Samsung Galaxy Watch 4 screen protectors to preserve its longevity.

Read more
Galaxy AI is coming to more Samsung phones very soon

Samsung is bringing its Galaxy AI technology to more Galaxy smartphones and tablets. This comes just months after the software was revealed with the Galaxy S24 series.

Samsung has begun rolling out Galaxy AI features to anyone with a Galaxy S22 series phone, Galaxy Z Fold 4, or Galaxy Z Flip 4. You will soon be able to download One UI 6.1 to get all of the benefits of Galaxy AI. The update appears to be rolling out in Korea now, suggesting it should hit U.S. devices very soon.

Read more