Can mobile phones be tracked?
There's more than one way to track devices by location. Guides on locational tracking point out that with traditional cellphones, tracking technologies often involved radio frequency ID (RFID) chips. This technology uses radio waves to track something in real time. However, RFID is used in passive systems that only track something based on a user prompt, rather than providing continuous tracking.
In modern smartphone tracking, many elements of locational tracking are done according to the wireless networks that support smartphone use. With so much of mobile computing using elements of trackable data and voice networks, carriers supporting smartphone use are often able to keep data on individual devices through the same kinds of networks that support mobile computing. In other words, elements of smartphone tracking systems can build on the centralized controls that help all of a carrier’s distributed users tap, text and stream movies.
Generally, carriers can send signals between towers to assess the relative location of a device. Some refer to these methods as network-based, whereas other chip-driven or device-driven systems can be called SIM-based, and efforts relying on Wi-Fi connections can be called Wi-Fi-based.
In terms of how consumers experience mobile phone tracking, companies making and selling the devices usually offer specific mobile apps and software applications for computers that will help to track a device if it is lost or stolen. These applications will give the user visual views of where a device is located, again, according to proprietary engineering by a particular smartphone maker’s offices.
Ostensibly, no one should be able to track a cell phone without the user's permission. However, revelations about the extent of the NSA's spy capabilities and general surveillance of these networks has brought up the issue of "loveint" and related phenomena, where an NSA employee would theoretically be able to monitor individuals through their smartphones by unauthorized use of the employer's capability.
More Q&As from our experts
- What does the mobile network state mean?
- With more big data solutions moving to the cloud, how will that impact network performance and security?
- What is the difference between cloud computing and web hosting?
- Distributed Computing System
- Hacking Tool
- Snooping Protocol
- Net Send
Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
- Data Governance Is Everyone's Business
- Key Applications for AI in the Supply Chain
- Service Mesh for Mere Mortals - Free 100+ page eBook
- Do You Need a Head of Remote?
- Web Data Collection in 2022 - Everything you need to know
- How to Protect Microsoft 365 from NOBELIUM Hackers
- 5 Steps to Streamline Security for your Hybrid Network