In this article:
In this article:
Scammers and stalkers can track your location by using spyware or legal apps on your phone — unless you follow these steps to keep your location private.
In this article:
In this article:
If you get the feeling that someone's watching your every move, you may not be that far off. According to recent research from Zimperium [*]:
25% of all North American devices have been impacted by spyware that can potentially give scammers and stalkers access to your camera, microphone, and location.
In the wrong hands, location information can be incredibly dangerous. Your location history can allow people to track you, lead to unwanted advertising, or even incriminate you in the eyes of law enforcement.
Thankfully, there are ways to limit location tracking and protect your privacy. In this guide, we'll show you how and why your location might be tracked and what built-in and third-party tools you can use to prevent this from happening to you.
{{show-toc}}
Our cell phones, along with legitimate and malicious apps, regularly track and share our location data by using a combination of GPS, Wi-Fi, and cell tower triangulation.
While phone location tracking is only meant to be used for legitimate or functionality purposes (such as giving you access to your mobile network or tagging where a photo was taken), that’s not always the case.
Apps and companies that track location data can sell it to data brokers who use it to understand your behavior and target you with ads. In these cases, location data is almost always aggregated and anonymized — meaning your personal location can’t be tracked.
However, scammers, hackers, and stalkers can also track your location through malicious apps and viruses or even built-in settings on your mobile phone.
Here are some of the different ways that someone can track your location:
Hackers can infect your phone with viruses that send them your location data — or even give them access to your microphone and camera. Spyware hides deep within your device or compromised apps and can only be removed with antivirus software.
There are many legitimate location tracking apps, such as Google Maps and Find My Device. Using your cell phone location, these apps can give you directions or weather information. While many claim they don't sell your data [*], some — like Life360 — have been caught and sued for selling user data to data brokers [*].
Anyone with access to your phone can enable location sharing in Google Maps and track your every move by logging in to their Google account. This method can even continue to work if your phone is in airplane mode.
Your mobile carrier tracks your device's location by using cellular signals to help improve your network performance and share real-time locations with emergency services. While U.S. cell carriers deny selling location data to companies, they do admit to handing over location data to authorities [*].
Many apps and organizations use Wi-Fi signals to track customer location data. For example, a mall can monitor the shopping habits of the customers connected to its Wi-Fi network, which may also lead to unwanted location-based advertising.
Data brokers are in the market of buying and selling all types of customer data [*]. Bad actors can either buy from them or find any location data that leaks onto the Dark Web.
Tracking devices help you find the exact location of whatever you connect them to — great for lost keys or luggage. Unfortunately, they can also be used for stalking. While devices like Apple AirTags have implemented security measures to prevent stalking and hacking, researchers have found ways of getting around these defenses [*].
Law enforcement, cybercriminals, and scammers all use cell site simulators (CSS) to mimic legitimate cell towers and track mobile devices that connect to them. While Apple and Google devices have set up protections against CSS, some Android phones remain vulnerable [*].
Bluetooth devices (or beacons) emit a constant and frequent signal that allows other devices to detect and connect. Researchers out of UC San Diego discovered that these signals often have unique fingerprints that allow for the identification and tracking of the host device [*].
Email images offer a couple of ways to track people, including tracking pixels and embedded links in images. Tracking pixels hide in images and tell marketers where, when, and how you opened an email and what you did with it [*]. Email images may also contain hidden hyperlinks that direct you to a scam website capable of tracking your IP address [*].
Whenever you receive a text message, your phone sends out a delivery receipt to the sender. Research out of Northeastern University indicates that sending a burst of texts to a single phone number could allow hackers to triangulate the recipient's current location [*].
You might share location information in your social media posts and pictures as a way to increase engagement, but it can also help people track you down.
The bottom line: Your privacy (and location) are almost certainly at risk. Even if your location data is being tracked for “legitimate” reasons, it can make you more vulnerable to hacking, stalking, and identity theft. Consider protecting your phone and your identity with a digital security solution.
Despite the many ways of tracking phones, most methods rely on an app or malware to be installed on the device first. These can be tricky to spot, but not impossible.
If you think your phone is being tracked, look for the following warning signs:
With so many legal and illegal forms of tracking, it can be very difficult to stop people from knowing your location entirely, but you can reduce your chances of being harmed by tracking.
Spyware lodges itself in your device and relays your personal data — such as your GPS location — to a third-party. Since these are difficult to find, the best way to remove malware like this is with antivirus software.
How to scan and remove spyware on Android:
Note: Apple doesn’t allow third-party antivirus apps to scan iPhones and other iOS devices. You can still check for iPhone viruses, such as by reviewing your battery settings for apps that are using up significant resources, as well as your mobile data usage.
Your device can pick up suspicious apps in many ways. They might be fake apps found in unofficial app stores, hidden on websites, or included in malicious app packages.
You may have accidentally installed them; malware on your device could be responsible, or hackers could have exploited a vulnerability in a legitimate app. Whatever the reason, you should remove suspicious apps as soon as you notice them.
How to remove suspicious apps:
💡 Related: How To Remove Viruses and Malware From Androids →
Shutting down your phone's location settings blocks apps from accessing your GPS information. While this can prevent unwanted location tracking, it also means you can't use phone features that rely on GPS — such as maps, fitness, and augmented reality apps.
How to disable location services on your phone:
Tracking devices can be stuck to clothing, devices, and vehicles to then secretly relay your location to a remote receiver. If you think you're being tracked, you should perform a few different checks to make sure you're not carrying one of these devices.
How to check for tracking devices:
💡 Related: How To Protect Your Privacy and Personal Information Online →
The permissions you give apps may enable location sharing, and it can happen without you knowing it. Permissions might change with updates, or they might be intentionally hidden or masked in fake apps. Double-check what permissions your apps have, and make the necessary changes.
How to update app permissions:
When you browse online, the websites you visit — as well as third-party websites — gather information about you (including your location) that helps them improve their performance and allows them to generate personalized content and advertising for you. Anti-track software can prevent data collection and keep your personal data private.
How to use anti-track software:
💡 Related: The 8 Best Anti-Tracking Software for Online Privacy →
Email images can hide tracking pixels, hyperlinks, and malware. By turning off the image auto-load feature in your email client, you block the image and receive an image notification instead. This maintains your privacy and protects you against potential threats.
How to turn off image auto-load:
Your IP address can tell others your general location, such as your city or ZIP Code. In combination with other personal information, this data can be quite revealing. With a virtual private network (VPN), you replace your IP address with one from your remote VPN server.
💡 Related: Pros and Cons of Using a VPN (How To Know If Your Need One) →
Over time, your devices and software may encounter bugs or vulnerabilities that cybercriminals can exploit. To counteract this, developers release security patches and updates that keep your devices protected and running smoothly. When you postpone or ignore these updates, you put your device — and potentially your personal information — at risk.
How to update devices and software:
In some cases, you may need to resort to a factory reset to stop someone from tracking your device and location. This will clear your personal information, apps, and settings from the device. It will disable your location services and may even replace your device and user ID.
How to perform a factory reset:
NOTE: Make sure you have backed up your data before factory resetting your device as it will wipe all apps, data, and settings.
For hackers and stalkers, it's never been easier to track someone's location. That's why it's more important than ever to keep your devices clean of viruses and suspicious apps, and to be aware of the tracking possibilities around you.
While the safety precautions provided in this guide will help you protect your location, you might consider employing real professionals in identity protection to make sure you and your family members are safe.
Aura helps keep your location private with anti-tracking and ad-blocking software, Safe Browsing tools, and a VPN with military-grade encryption. Plus, you get award-winning identity theft and credit protection, 24/7 U.S.-based support, and up to $5 million in identity theft insurance coverage.
Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.