Original Release Date: 8/26/2020
Every breath you take and every move you make
Every bond you break, every step you take, I'll be watching you
Every single day and every word you say
Every game you play, every night you stay, I'll be watching you…
In 1983, when The Police released the hit song, “Every Breath You Take,” they likely had no idea its lyrics would so aptly describe how smartphones can be used today. From services to apps, smartphone users unwittingly consent to being tracked in real-time by a multitude of companies for the purpose of providing requested features, integrations, user experience improvements, and many other laudable-sounding reasons. What many users do not know is that detailed information on their precise location and activity is being beaconed out by their phone and collected, shared, and sold to numerous organizations that aggregate these data sources with others to build a user profile that would make spy agencies and repressive governments green with envy.
The necessity and utility of smartphones is unarguable today. This article is not intended to suggest that individuals discard them. Instead, its purpose is to provide some insight into the unintended privacy and security implications of using smartphones. In addition, the recommendations detailing steps to limit what personal information is shared are not meant to be comprehensive; they only provide some level of awareness and control. Unfortunately, you can implement all the suggested security and privacy controls listed below and still be tracked with full fidelity.
While this article is focused on smartphone data trails, all sorts of other devices, such as your vehicle’s entertainment system, your fitness tracking device, your smartwatch, and just about any other device that emanates a network signal – including cellular, Wi-Fi, Bluetooth, and near-field communications (NFC) – can be used to track your location and other identifying information. In the case of a smartphone, all these network signals could be compiled to essentially publish a diary of your daily activities for the world to read.
Below are some tips to mitigate smartphone security and privacy risks.
NFC is used for various payment services, such as Apple Pay on an iPhone. If you do not set up Apple Pay, then NFC will not be activated; however, there is no way to deactivate NFC on an Apple device if Apple Pay is set up. For Android phones, NFC can be disabled in the Settings -> Connected Devices -> Connection Preferences screen.
Apple Location Settings | Android Location Settings |
Apple and Google provide several options that allow users to control location settings and which apps have access to them. Smartphone owners are advised to review their phone’s location settings and only enable them as necessary for use by applications that you approve. Location Services settings for iPhone can be managed from the Settings -> Privacy & Security -> Location Services screen. For Android devices, swipe down on your screen and tap the location icon to configure your device’s location services. Users may also elect to prevent location services from identifying their precise location and instead choose a relative area, as shown in the below image.
![]() |
Apple Precise Location Setting
Location Data Location data is important to advertising efforts of many businesses, including tech giant Google. The sensitivity of location data requires controls to protect organizations from abusing data collection and sharing. Though no specific federal law regulates the use, collection, or sharing of user location data, many organizations have implemented policies regarding privacy protection and most states have laws to protect consumer privacy and limit how consumers’ data may be used, stored, and shared. During an investigation by lead by several states, Google was found to be in violation of consumer protection laws, including New Jersey’s Consumer Fraud Act, by misleading users regarding location tracking. Google users who turned location settings to “off” could still be tracked using a separate setting, Web & App Activity, which is turned “on” by default when accounts are created. As a result of this violation, Google agreed to pay nearly $392 million to 40 states in what is reportedly the largest multistate privacy settlement. As part of the agreement, Google committed to increasing clarity on its location-tracking practices with users. These adjustments include showing users more information when they turn location tracking on or off and providing a details of the location data routinely collected on a webpage consumers access. With the increase in location data usage for advertising and increased mobile features for location privacy, taking extra steps to verify device settings will provide more control over what data is collected and when and how it can be used. |
Once an app is installed, review the privacy settings on your phone to control what it can access. Does the app need to access your contacts, calendar, or photos? Configure privacy settings as appropriate. Apple and Google continue to implement privacy restrictions for apps they allow into their app stores and keep your apps up to date.
Paranoia or Real Threat TikTok is a very popular short-form video sharing and social networking app that is also at the center of ongoing security and privacy controversy since it is owned by the Chinese technology company, ByteDance. As a registered Chinese company, ByteDance is required to fully cooperate with the Chinese government. As such, there are national security concerns about user data the Chinese government might require ByteDance to provide. Analysis of various versions of TikTok have been found to collect the keystrokes of users, make screen captures every few seconds, access data from the phone’s clipboard, and collect the unique Media Access Control (MAC) address of the device, among other user information. That data may include your passwords and other sensitive information you enter or access – not only into the TikTok app, but also the other apps you use on your device, e.g., email, text messages, eHealth apps, etc. Due to these issues and ByteDance’s ties to the Chinese government, the US Department of Defense, various federal agencies, corporations, and governments around the world have banned TikTok from being installed on their devices. TikTok is not alone in collecting user data. Many apps do, and while those app makers may not provide that data directly to the Chinese government or other regimes that pose national security risks, those governments may ultimately obtain that data through intermediary companies and brokers. Users and organizations must be aware of these risks before installing apps on their phones. In August 2020, then-President Donald Trump issued an executive order requiring China's ByteDance to divest ownership of its US assets. In addition, ByteDance is required to destroy all its copies of TikTok data attached to US users and inform the Committee on Foreign Investment in the United States (CFIUS) when it has destroyed the data. ByteDance is challenging the order in court. |
Many app users are unaware of the fact that apps may also be sharing your user information – location and activity – with the SDK providers and others. In addition to users not knowing what information is being shared and with whom, the app developers are also sometimes unaware.
You can disable ad tracking in both Apple and Android devices.
For Apple iOS devices, toggle off the “Allow Apps to Request to Track” setting under Settings -> Privacy -> Tracking. By doing so, the “Allow Apps to Request to Track” setting will be disabled for all Apple devices tied to your Apple ID. All new app tracking requests would be denied. Based on your usage and activity, you may still see some targeted ads. If you prefer to allow ad tracking, you may want to consider resetting your device’s Advertising Identifier periodically to make it more difficult for advertisers to target you. More information about limiting ad tracking on Apple devices can be found in the following articles: Apple Advertising and Privacy Reporting.
Apple Ad Tracking Settings |
Android Ad Tracking Settings |
For Android devices, disabling ad tracking is a similar process. Toggle the “Opt out of Interest-Based Ads” setting found under Google -> Services -> Ads or Settings -> Privacy -> Advanced -> Ads. From the same screen, you can reset your device’s Advertising ID.
Some ad-tracking companies have also provided users with the ability to opt out of having their information included in their databases.
To adjust the privacy and security settings in Safari, navigate to Settings -> Safari and toggle on/off the setting as appropriate.
Additional information on Safari browser privacy settings can be found here.
Safari Settings |
On an Android device, open the Chrome browser and tap the icon containing three vertical dots and select Settings -> Privacy from the menu. Toggle the “Do Not Track” switch to prevent tracking across sites and consider clearing your browsing history. More information on Chrome’s privacy settings can be found here, and find details on safe browsing here.
Chrome Settings |
Conclusion:
Disabling location services, managing your mobile apps, limiting ad tracking, and enabling privacy settings in your device’s browser will help mitigate the risks of being tracked or having personal information exposed. However, they will not eliminate these risks. Following these recommendations may also result in diminishing the utility and functionality you expect from your smartphone. While this article has focused on many of the abuses of location tracking, there are valid reasons for organizations to collect and track users’ locations. For example, during the COVID-19 pandemic, location tracking has helped prevent the spread of the virus.
Monetizing user information through advertisements is a successful business model that has worked for companies like Google, Facebook, and many others in the internet technologies industry, but it comes with the potential for privacy abuses. With the plethora of user information collected through mobile devices, nations that do not respect user privacy, terrorist groups, and others with nefarious intentions may develop apps that seemingly provide functionality, recreation, or other user value, but instead act as a front for gathering intelligence to further their illicit activities. While you may not pay for a mobile service or application, it will often cost you in the form of your personal user data.
Further Reading:
The following selected resources provide readers with additional information on mobile device location privacy concerns and some risk mitigation strategies: