Mobile phone tracking
Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be effected by a number of technologies, such as the multilateration of radio signals between (several) cell towers of the network and the phone or by simply using GPS tracking. To locate a mobile phone using multilateration of mobile radio signals, the phone must emit at least the idle signal to contact nearby antenna towers and does not require an active call. The Global System for Mobile Communications (GSM) is based on the phone's signal strength to nearby antenna masts.[1]
Mobile positioning may be used for location-based services that disclose the actual coordinates of a mobile phone. Telecommunication companies use this to approximate the location of a mobile phone, and thereby also its user.[2]
Technology
[edit | edit source]The location of a mobile phone can be determined using several complementary technologies. Modern phones typically use a Hybrid positioning system that combines these methods to provide the fastest and most accurate location possible.
Handset-based positioning
[edit | edit source]This is the most common method, where the device itself calculates its own position.
- GNSS / GPS: The phone uses a built-in receiver to calculate its precise location from signals broadcast by satellite navigation constellations (like GPS, GLONASS, or Galileo). This is the most accurate method when outdoors.
- Wi-Fi Positioning: In areas with poor satellite reception, such as indoors or in dense "urban canyons," the phone can scan for nearby Wi-Fi networks. It then calculates its position by cross-referencing the unique identifiers (BSSIDs) of these networks against a global, crowdsourced database of their locations.[3]
- Fingerprinting: This technique records the "signature" of home and neighboring cell signal strengths at different points in an area. The device can then match its current signal signature to this database to determine its location.[4]
Network-based positioning
[edit | edit source]This method relies on the cellular network infrastructure to determine the phone's location. The advantage is that it can be implemented non-intrusively by the service provider without any special software on the handset.[5]
- Cell ID: The least accurate method, which uses the known location of the single cell tower the phone is communicating with. Its precision is low, especially in rural areas where cell towers are far apart.
- Multilateration: More advanced systems use the signal strength and timing from multiple adjacent cell towers to triangulate the phone's position. This is more accurate in urban areas where cell tower density is high.[6]
Data transmission in modern applications
[edit | edit source]For any location-based service to function, the position data calculated by the phone (whether from GPS, Wi-Fi, or the network) must be transmitted to a server. The phone's built-in cellular modem sends this telemetry data over the mobile network (e.g., 4G/5G).
This "phone-as-a-sensor" model is the foundation for many modern on-demand services and is a key part of fleet digitalization. Applications for food delivery, courier services, and ride-hailing (like Uber or Lyft) rely on the phone's transmitted location data to function. The phone itself acts as the GPS tracking unit for the service's fleet management platform, allowing it to dispatch the nearest driver, provide customers with a real-time track and trace map, and calculate billing. The reliability of these services depends on this constant data connection; for example, the shutdown of older 3G networks required many commercial services to ensure their devices were 4G or 5G capable to maintain connectivity.[7]
Operational purpose
[edit | edit source]In order to route calls to a phone, cell towers listen for a signal sent from the phone and negotiate which tower is best able to communicate with the phone. As the phone changes location, the antenna towers monitor the signal, and the phone is "roamed" to an adjacent tower as appropriate. By comparing the relative signal strength from multiple antenna towers, a general location of a phone can be roughly determined. Other means make use of the antenna pattern, which supports angular determination and phase discrimination.
Newer phones may also allow the tracking of the phone even when turned on but not active in a telephone call. This results from the roaming procedures that perform hand-over of the phone from one base station to another.[8]
Consumer applications
[edit | edit source]A phone's location can be shared with friends and family, posted to a public website, recorded locally, or shared with other users of a smartphone app. The inclusion of GPS receivers on smartphones has made geographical apps nearly ubiquitous on these devices. Specific applications include:
- Geo-fence specific locations of interest such as No Fly Zones
- GPS navigation and maps
- Locator apps like Find My Friends
- Dating apps like Grindr
- Recording a journey, for example to show a hiking accomplishment
- For quantified self purposes such as fitness tracking
- GPS drawing
In January 2019, the location of her iPhone as determined by her sister helped Boston police find kidnapping victim Olivia Ambrose.[9]
Privacy
[edit | edit source]Locating or positioning touches upon delicate privacy issues, since it enables someone to check where a person is without the person's consent.[10] Strict ethics and security measures are strongly recommended for services that employ positioning.
In 2012 Malte Spitz held a TED talk[11] on the issue of mobile phone privacy in which he showcased his own stored data that he received from Deutsche Telekom after suing the company. He described the data, which consists of 35,830 lines of data collected during the span of Germany's data retention at the time, saying, "This is six months of my life [...] You can see where I am, when I sleep at night, what I'm doing." He partnered up with ZEIT Online and made his information publicly available in an interactive map which allows users to watch his entire movements during that time in fast-forward. Spitz concluded that technology consumers are the key to challenging privacy norms in today's society who "have to fight for self determination in the digital age."[12][13]
China
[edit | edit source]The Chinese government has proposed using this technology to track commuting patterns of Beijing city residents.[14] Aggregate presence of mobile phone users could be tracked in a privacy-preserving fashion.[15] This location data was used to locate protesters during protests in Beijing in 2022.[16]
Europe
[edit | edit source]In Europe most countries have a constitutional guarantee on the secrecy of correspondence, and location data obtained from mobile phone networks is usually given the same protection as the communication itself.[17][18][19][20]
United States
[edit | edit source]In the United States, there is a limited constitutional guarantee on the privacy of telecommunications through the Fourth Amendment.[21][22][23][24][25] The use of location data is further limited by statutory,[26] administrative,[27] and case law.[21][28] Police access of seven days of a citizen's location data is unquestionably enough to be a fourth amendment search requiring both probable cause and a warrant.[21][29]
In November 2017, the United States Supreme Court ruled in Carpenter v. United States that the government violates the Fourth Amendment by accessing historical records containing the physical locations of cellphones without a search warrant.[30]
See also
[edit | edit source]- Carpenter v. United States
- Cellphone surveillance
- Geofence warrant
- Geolocation
- GLONASS Russian "Global Navigation Satellite System"
- Google Latitude
- GPS phone
- Indoor positioning
- Information privacy
- IMEI number
- Local positioning system
- Mass surveillance
- Mobile dating
- Mobile device forensics
- Mobile identification number
- Mobile security
- Positioning technology
- Phone surveillance
- Radio resource location services protocol
- Real-time locating system
- Riley v. California
- Satellite navigation
- Secure telephone
- Triggerfish (surveillance)
- United States v. Jones (2012)
- United States v. Karo
- Vehicle tracking system
References
[edit | edit source]- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ "Location Based Services for Mobiles: Technologies and Standards“, Shu Wang, Jungwon Min and Byung K. Yi, IEEE International Conference on Communication (ICC) 2008, Beijing, China
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Mobile Positioning Using Wireless Networks
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ D. Quercia, Ilias Leontiadis, Liam McNamara, Cecilia Mascolo, Jon Crowcroft (2011). SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones. IEEE ICDCS
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ "Chapter X, Fundamental Rights and Duties of Citizens, Article 128". 1936 Constitution of the USSR.
The inviolability of the homes of citizens and privacy of correspondence are protected by law.
- ^ Roxana Maria Roba. The Legal Protection of the Secrecy of Correspondence, Curentul "Juridic" (archived), 2009, number 1, Tîrgu-Mureş, Romania.
- ^ a b c Carpenter v. United States, 583 U.S. (Supreme Court of the United States Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).) ("The Government's acquisition of Carpenter's cell-site records was a Fourth Amendment search.").
- ^ Riley v. California, 573 U.S. (Supreme Court of the United States Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).) ("Required a warrant to search mobile telecommunications devices.").
- ^ United States v. Jones, 565 U.S. 400 (Supreme Court of the United States Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).) ("Limited use of GPS devices [such as in a cell phone] to track movements.").
- ^ Katz v. United States, 389 U.S. 347 (Supreme Court of the United States Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).) ("(a) that an enclosed telephone booth is an area where, like a home, and unlike a field, a person has a constitutionally protected reasonable expectation of privacy; (b) that electronic as well as physical intrusion into a place that is in this sense private may constitute a violation of the Fourth Amendment; and (c) that an invasion of a constitutionally protected area by federal authorities is, as the Court has long held, presumptively unreasonable in the absence of a search warrant.").
- ^ Ex parte Jackson, 96 U.S. 727 (Supreme Court of the United States Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).) ("Letters and sealed packages subject to letter postage in the mail can be opened and examined only under like warrant, issued upon similar oath or affirmation, particularly describing the thing to be seized, as is required when papers are subjected to search in one's own household. The constitutional guaranty of the right of the people to be secure in their papers against unreasonable searches and seizures extends to their papers, thus closed against inspection, wherever they may be.").
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ United States v. Karo, 468 U.S. 705 (Supreme Court of the United States Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).) ("the use of a beeper to conduct surveillance on Karo and his accomplices constituted an unlawful search and seizure in violation of the Fourth Amendment.").
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
External links
[edit | edit source]- Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).