(813) 658-9438
(727) 648-3510
(407) 374-8721

After conducting a thorough Technical Surveillance Countermeasures (TSCM) sweep on a vehicle and finding a GPS tracking device, we were contacted two-months later by the client telling us she thought she was still being followed and that the subject had planted another device on her vehicle.  We arrived and conducted another sweep of the vehicle that did not turn up a device on the vehicle.  So we began to explore other avenues that might be exploited for tracking. Both smartphones and modern vehicles have built-in capabilities that can be leveraged in ways by an ex, stalker or someone just harassing you that can easily evade traditional detection methods. Here’s a comprehensive look below at potential tracking methods and countermeasures.

5 Ways to Track a Person by Their Cell Phone

1. Spyware or Tracking Apps:

Malicious applications can be installed on a smartphone without the owner’s knowledge, enabling continuous monitoring of location, messages, and other activities. These apps often disguise themselves as innocuous software, making detection difficult. They will be labeled Samsung or another brand to trick the victim into not removing it.  Or they will just say “Do Not Remove.”

Countermeasure:

  • Regularly check for and remove unfamiliar apps.
  • Perform a factory reset to clear any malicious software.  Once you have backed up.  Then only add back to the device what you need manually.  DO NOT Back Up from the cloud as you may simply restore the app and its settings back onto the phone.
  • Keep the phone’s operating system and ONLY Needed/Trusted Apps updated.
  • Regularly monitor for unusual activity, such as sudden battery drain, high temperature or increased data usage.

2. Location Sharing Services:

Unauthorized access to built-in location sharing features such as Find My iPhone or Google Location Sharing can be exploited to track an individual’s movements.

Countermeasure:

  • Disable location sharing features.
  • Review and revoke permissions for all apps that request location access.
  • Change passwords for all accounts linked to the phone.
  • Enable two-factor authentication for added security.

3. SIM Card Tracking:

The phone’s SIM card can be used to track its location via certain services, providing accurate and real-time location data.

Countermeasure:

  • Consider changing the SIM card or phone number periodically.
  • Use a dual-SIM phone and switch between SIMs to disrupt tracking.

4. Cellular Network Data: 

Advanced tracking can be done via cellular network triangulation by sophisticated stalkers, using data from multiple cell towers to find out a phone’s location.

Countermeasure:

  • Using a Faraday bag can prevent this type of tracking.  But understand you will not receive any incoming messages or phone calls.
  • Airplane mode is not always a practical option but it is an option if you need it.

5. Wi-Fi and Bluetooth: 

Public Wi-Fi and Bluetooth signals can be used to determine a device’s location, especially in densely populated areas where multiple access points can triangulate the signal.

Countermeasure:

  • Turn off Wi-Fi and Bluetooth when not needed.
  • Avoid connecting to unfamiliar networks.
  • Use a VPN to encrypt Wi-Fi connections.

4 Modern Vehicle Tracking Methods

Modern vehicles, especially those produced in recent years, are equipped with advanced technology that can be exploited for tracking purposes. Here are some methods to consider:

1. Built-in GPS and Telematics Systems: Many newer vehicles have built-in GPS and telematics systems that can report location data to third-party services or even directly to the manufacturer. 

Countermeasure:

  • Disable or limit the use of these systems through the vehicle’s settings.
  • Contact the vehicle manufacturer for guidance on privacy settings and who has access to your account.  In this case it was a Range Rover.
  • Regularly review and update the vehicle’s software to patch any vulnerabilities.

2. Vehicle Infotainment Systems: These systems can store and transmit data about the vehicle’s location and usage, which can be accessed remotely if not properly secured.

Countermeasure:

  • Regularly clear data stored in the infotainment system.
  • Disable any unnecessary connectivity features, such as automatic location tracking.
  • Be mindful of the personal information shared with the infotainment system.

3. Bluetooth and Wi-Fi Connectivity: Vehicles with built-in Bluetooth and Wi-Fi can be tracked if these features are exploited by malicious actors.

Countermeasure:

  • Disable these features when not in use.
  • Regularly check the vehicle’s settings for unauthorized connections.
  • Use strong, unique passwords for vehicle connectivity features.

4. Diagnostic Ports: The OBD-II port are generally found on the drivers side under the dash and can be used to install tracking devices that are hard to detect and can continuously monitor the vehicle’s location.

Countermeasure:

  • Use a locking device on the OBD-II port to prevent unauthorized access.
  • Regularly check the port for unfamiliar connections.
  • Consider professional inspection if tampering is suspected.

General Recommendations:

1. Professional TSCM Sweep for Digital Threats: 

In addition to physical sweeps, consider a professional assessment of digital threats, including checking the smartphone for spyware and other malicious software as described above.

2. Increase Awareness and Vigilance: 

Individuals must educated themselves about potential threats and remain vigilant in monitoring their devices and vehicle settings.

3. Legal and Protective Measures: 

Document all suspicious activities and interactions for legal purposes. You may opt for a police report or a restraining order, but sometimes this gives the stalker the access they want or it may cause more issues as they intensify their activities out of spite.  Sometimes monitoring their activities but not responding to them gives you more control. A book I always recommend to clients who are stalking victims is the Gift of Fear by: Gavin DeBecker

4. Use Privacy-Focused Apps and Tools: 

Utilize apps and tools designed to enhance privacy, such as encrypted messaging apps, secure email providers, and privacy-focused browsers.  Examples: Brave Browser, Signal for IM and Proton eMail to name a few.

5. Security Audits: 

Schedule a security audit to assess and improve the security posture of both personal/professional spaces, devices and vehicles. This proactive approach helps identify vulnerabilities before they can be exploited.

6. Secure Communication Channels: 

Encourage the use of secure communication channels for sensitive information. Avoid discussing critical information over unsecured or easily accessible platforms.  Also do not contact a sweep team from the area or device you feel is compromised.

7. Consult with Experts: 

If you need specialized assistance to further investigate these potential threats, our team can provide comprehensive TSCM services, including digital assessments to ensure complete security for your client. Our experts stay abreast of the latest tracking technologies and countermeasures to provide the highest level of protection.

Conclusion

Technology is deeply integrated into our daily lives, the potential for misuse by malicious actors is significant. While a thorough TSCM sweep can identify and remove many physical tracking devices, the evolving landscape of digital tracking requires ongoing vigilance and proactive measures. By understanding the various methods of tracking and implementing countermeasures, individuals can significantly reduce their risk of being tracked without their consent.

At FloridaTSCM, we are dedicated to providing comprehensive security solutions tailored to meet the unique needs of our clients. Whether it’s through professional TSCM sweeps, digital threat assessments, or ongoing education and support, we are here to help you maintain your privacy and security. 

Tim O’Rourke, CPS has over thirty (30)+ years in the profession of safeguarding the lives and secrets of political figures, corporate executives and high net-worth individuals. His experience and research has led him to writing and speaking about the methods and best practices of TSCM / electronic surveillance and counter-surveillance.