Mobile phone tracking

(Redirected from Cell phone monitoring)

Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be affected by a number of technologies, such as the multilateration of radio signals between (several) cell towers of the network and the phone or by simply using GNSS. To locate a mobile phone using multilateration of mobile radio signals, the phone must emit at least the idle signal to contact nearby antenna towers and does not require an active call. The Global System for Mobile Communications (GSM) is based on the phone's signal strength to nearby antenna masts.[1]

An indoor location tracking map on a mobile phone

Mobile positioning may be used for location-based services that disclose the actual coordinates of a mobile phone. Telecommunication companies use this to approximate the location of a mobile phone, and thereby also its user.[2]

Technology

edit

The location of a mobile phone can be determined in a number of ways.

Network-based

edit

The location of a mobile phone can be determined using the service provider's network infrastructure. The advantage of network-based techniques, from a service provider's point of view, is that they can be implemented non-intrusively without affecting handsets. Network-based techniques were developed many years prior to the widespread availability of GPS on handsets. (See US 5519760, issued 21 May 1996  for one of the first works relating to this.[3])

The technology of locating is based on measuring power levels and antenna patterns and uses the concept that a powered mobile phone always communicates wirelessly with one of the closest base stations, so knowledge of the location of the base station implies the cell phone is nearby.

Advanced systems determine the sector in which the mobile phone is located and roughly estimate also the distance to the base station. Further approximation can be done by interpolating signals between adjacent antenna towers. Qualified services may achieve a precision of down to 50 meters in urban areas where mobile traffic and density of antenna towers (base stations) is sufficiently high.[4] Rural and desolate areas may see miles between base stations and therefore determine locations less precisely.

GSM localization uses multilateration to determine the location of GSM mobile phones, or dedicated trackers, usually with the intent to locate the user.[2]

The accuracy of network-based techniques varies, with cell identification being the least accurate (due to differential signals transposing between towers, otherwise known as "bouncing signals") and triangulation as moderately accurate, and newer "advanced forward link trilateration"[5] timing methods as the most accurate. The accuracy of network-based techniques is both dependent on the concentration of cell base stations, with urban environments achieving the highest possible accuracy because of the higher number of cell towers, and the implementation of the most current timing methods.

One of the key challenges of network-based techniques is the requirement to work closely with the service provider, as it entails the installation of hardware and software within the operator's infrastructure. Frequently the compulsion associated with a legislative framework, such as Enhanced 9-1-1, is required before a service provider will deploy a solution.

In December 2020, it emerged that the Israeli surveillance company Rayzone Group may have gained access, in 2018, to the SS7 signaling system via cellular network provider Sure Guernsey, thereby being able to track the location of any cellphone globally.[6]

Handset-based

edit

The location of a mobile phone can be determined using client software installed on the handset.[7] This technique determines the location of the handset by putting its location by cell identification, signal strengths of the home and neighboring cells, which is continuously sent to the carrier.[8] In addition, if the handset is also equipped with GPS then significantly more precise location information can be then sent from the handset to the carrier.

Another approach is to use a fingerprinting-based technique,[9][10][11] where the "signature" of the home and neighboring cells signal strengths at different points in the area of interest is recorded by war-driving and matched in real-time to determine the handset location. This is usually performed independent from the carrier.

The key disadvantage of handset-based techniques, from service provider's point of view, is the necessity of installing software on the handset. It requires the active cooperation of the mobile subscriber as well as software that must be able to handle the different operating systems of the handsets. Typically, smartphones, such as one based on Symbian, Windows Mobile, Windows Phone, BlackBerry OS, iOS, or Android, would be able to run such software, e.g. Google Maps.

One proposed work-around is the installation of embedded hardware or software on the handset by the manufacturers, e.g., Enhanced Observed Time Difference (E-OTD). This avenue has not made significant headway, due to the difficulty of convincing different manufacturers to cooperate on a common mechanism and to address the cost issue. Another difficulty would be to address the issue of foreign handsets that are roaming in the network.

SIM-based

edit
  1. Using the SIM (Subscriber Identity Module) in GSM and Universal Mobile Telecommunications System (UMTS) handsets, it is possible to obtain raw radio measurements from the handset.[12][13] Available measurements include the serving Cell ID, round-trip time, and signal strength. The type of information obtained via the SIM can differ from that which is available from the handset. For example, it may not be possible to obtain any raw measurements from the handset directly, yet still obtain measurements via the SIM.

Wi-Fi

edit

Crowdsourced Wi-Fi data can also be used to identify a handset's location.[14] The poor performance of the GPS-based methods in indoor environment and the increasing popularity of Wi-Fi have encouraged companies to design new and feasible methods to carry out Wi-Fi-based indoor positioning.[15] Most smartphones combine Global Navigation Satellite Systems (GNSS), such as GPS and GLONASS, with Wi-Fi positioning systems.

Hybrid positioning system

edit

Hybrid positioning systems use a combination of network-based and handset-based technologies for location determination. One example would be some modes of Assisted GPS, which can both use GPS and network information to compute the location. Both types of data are thus used by the telephone to make the location more accurate (i.e., A-GPS). Alternatively tracking with both systems can also occur by having the phone attain its GPS-location directly from the satellites, and then having the information sent via the network to the person that is trying to locate the telephone. Such systems include Google Maps, as well as, LTE's OTDOA and E-CellID.

There are also hybrid positioning systems which combine several different location approaches to position mobile devices by Wi-Fi, WiMAX, GSM, LTE, IP addresses, and network environment data.

Operational purpose

edit

In order to route calls to a phone, cell towers listen for a signal sent from the phone and negotiate which tower is best able to communicate with the phone. As the phone changes location, the antenna towers monitor the signal, and the phone is "roamed" to an adjacent tower as appropriate. By comparing the relative signal strength from multiple antenna towers, a general location of a phone can be roughly determined. Other means make use of the antenna pattern, which supports angular determination and phase discrimination.

Newer phones may also allow the tracking of the phone even when turned on but not active in a telephone call. This results from the roaming procedures that perform hand-over of the phone from one base station to another.[16]

Consumer applications

edit

A phone's location can be shared with friends and family, posted to a public website, recorded locally, or shared with other users of a smartphone app. The inclusion of GPS receivers on smartphones has made geographical apps nearly ubiquitous on these devices. Specific applications include:

In January 2019, the location of her iPhone as determined by her sister helped Boston police find kidnapping victim Olivia Ambrose.[17]

Privacy

edit

Locating or positioning touches upon delicate privacy issues, since it enables someone to check where a person is without the person's consent.[18] Strict ethics and security measures are strongly recommended for services that employ positioning.
In 2012 Malte Spitz held a TED talk[19] on the issue of mobile phone privacy in which he showcased his own stored data that he received from Deutsche Telekom after suing the company. He described the data, which consists of 35,830 lines of data collected during the span of Germany's data retention at the time, saying, "This is six months of my life [...] You can see where I am, when I sleep at night, what I'm doing." He partnered up with ZEIT Online and made his information publicly available in an interactive map which allows users to watch his entire movements during that time in fast-forward. Spitz concluded that technology consumers are the key to challenging privacy norms in today's society who "have to fight for self determination in the digital age."[20][21]

China

edit

The Chinese government has proposed using this technology to track commuting patterns of Beijing city residents.[22] Aggregate presence of mobile phone users could be tracked in a privacy-preserving fashion.[23] This location data was used to locate protesters during protests in Beijing in 2022.[24]

Europe

edit

In Europe most countries have a constitutional guarantee on the secrecy of correspondence, and location data obtained from mobile phone networks is usually given the same protection as the communication itself.[25][26][27][28]

United States

edit

In the United States, there is a limited constitutional guarantee on the privacy of telecommunications through the Fourth Amendment.[29][30][31][32][33] The use of location data is further limited by statutory,[34] administrative,[35] and case law.[29][36] Police access of seven days of a citizen's location data is unquestionably enough to be a fourth amendment search requiring both probable cause and a warrant.[29][37]

In November 2017, the United States Supreme Court ruled in Carpenter v. United States that the government violates the Fourth Amendment by accessing historical records containing the physical locations of cellphones without a search warrant.[38]

See also

edit

References

edit
  1. ^ "Tracking a suspect by any mobile phone: Tracking SIM and handset". BBC News. 2005-08-03. Retrieved 2010-01-02.
  2. ^ a b "Location Based Services for Mobiles: Technologies and Standards“, Shu Wang, Jungwon Min and Byung K. Yi, IEEE International Conference on Communication (ICC) 2008, Beijing, China
  3. ^ Mobile Positioning Using Wireless Networks
  4. ^ Laitinen, H.; Lahteenmaki, J.; Nordstrom, T. (2001). "Database correlation method for GSM location". IEEE VTS 53rd Vehicular Technology Conference, Spring 2001. Proceedings (Cat. No.01CH37202). Vol. 4. Rhodes, Greece: IEEE. pp. 2504–2508. doi:10.1109/VETECS.2001.944052. ISBN 9780780367289. S2CID 195858053.
  5. ^ Wang, S.S.; Wylie-Green, M.P. (September 2004). "Geolocation propagation modeling for cellular-based mobile positioning". IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004. Vol. 7. pp. 5155–5159 Vol. 7. doi:10.1109/VETECF.2004.1405083. ISBN 0-7803-8521-7. S2CID 38110004.
  6. ^ Black, Crofton; Kirchgaessner, Stephanie; Sabbagh, Dan (December 16, 2020). "Israeli spy firm suspected of accessing global telecoms via Channel Islands". The Guardian – via www.theguardian.com.
  7. ^ Handset-based mobile phone tracking app example 1: MobileTrack
  8. ^ Reynolds, Bethany. "Handset-based Mobile phone carrier tracking app". Retrieved 6 February 2015.
  9. ^ Ibrahim, M.; Youssef, M. (2012-01-01). "CellSense: An Accurate Energy-Efficient GSM Positioning System". IEEE Transactions on Vehicular Technology. 61 (1): 286–296. arXiv:1110.3425. doi:10.1109/TVT.2011.2173771. ISSN 0018-9545. S2CID 14790516.
  10. ^ Ibrahim, M.; Youssef, M. (2010-12-01). "CellSense: A Probabilistic RSSI-Based GSM Positioning System". 2010 IEEE Global Telecommunications Conference GLOBECOM 2010. pp. 1–5. arXiv:1004.3178. Bibcode:2010arXiv1004.3178I. doi:10.1109/GLOCOM.2010.5683779. ISBN 978-1-4244-5636-9. S2CID 3220133.
  11. ^ Ibrahim, M.; Youssef, M. (2011-06-01). "A Hidden Markov Model for Localization Using Low-End GSM Cell Phones". 2011 IEEE International Conference on Communications (ICC). pp. 1–5. arXiv:1010.3411. CiteSeerX 10.1.1.750.7082. doi:10.1109/icc.2011.5962993. ISBN 978-1-61284-232-5. S2CID 7459928.
  12. ^ ETSI TS 102 223 V9.1.0 SIM standard
  13. ^ Ted Gibbons (25 August 2008). "Vodafone Local Zone". PC World.
  14. ^ "Q&A on Location Data". apple.com. Apple. Retrieved 2013-03-08.
  15. ^ Pourhomayoun; Fowler (2012). "Improving WLAN-Based Indoor Mobile Positioning Using Sparsity" (PDF). Asilomar Conference on Signal Processing 2012.
  16. ^ Declan McCullagh and Anne Broache (6 December 2008). "Roving Bug in Cell Phones Used By FBI to Eavesdrop on Syndicate". The Chicago Syndicate -BLOG.
  17. ^ "A common smartphone feature helped find missing woman - The Boston Globe". BostonGlobe.com.
  18. ^ Waxman, Seth. "Brief for technology companies as amici curiae in support of neither party" (PDF). scotusblog. Supreme Court of the United States. Retrieved 23 June 2018.
  19. ^ "Your phone company is watching - TEDGlobal 2012". ted.com. June 2012. Retrieved 26 January 2016.
  20. ^ Fitzgerald, Britney (25 July 2012). "Malte Spitz's TED Talk Takes On Mobile Phone Privacy Debate (VIDEO)". Huffington Post. Retrieved 26 January 2016.
  21. ^ Biermann, Kai (10 March 2011). "Betrayed by our own data". Die Zeit. ZEIT. Retrieved 26 January 2016.
  22. ^ Cecilia Kang (March 3, 2011). "China plans to track cellphone users, sparking human rights concerns". The Washington Post. Archived from the original on June 24, 2011.
  23. ^ D. Quercia, Ilias Leontiadis, Liam McNamara, Cecilia Mascolo, Jon Crowcroft (2011). SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones. IEEE ICDCS
  24. ^ Xiong, Nectar Gan, Yong (2022-12-02). "Chinese police are using cellphone data to track down protesters". CNN. Retrieved 2022-12-03.{{cite web}}: CS1 maint: multiple names: authors list (link)
  25. ^ Spyropoulos, Philippos K. (2009). Constitutional law in Greece. Fortsakis, Théodore. Netherlands: Kluwer Law International. ISBN 978-90-411-2878-2. OCLC 383848443.
  26. ^ Campbell, John (2020), "The origins and development of the right to privacy", Comparative Privacy and Defamation, Edward Elgar Publishing, pp. 9–23, doi:10.4337/9781788970594.00008, ISBN 978-1-78897-059-4, S2CID 225586361, retrieved 2020-10-24
  27. ^ "Chapter X, Fundamental Rights and Duties of Citizens, Article 128". 1936 Constitution of the USSR. The inviolability of the homes of citizens and privacy of correspondence are protected by law.
  28. ^ Roxana Maria Roba. The Legal Protection of the Secrecy of Correspondence, Curentul "Juridic" (archived), 2009, number 1, Tîrgu-Mureş, Romania.
  29. ^ a b c Carpenter v. United States, 583 U.S. (Supreme Court of the United States 22 June 2018) ("The Government's acquisition of Carpenter's cell-site records was a Fourth Amendment search.").
  30. ^ Riley v. California, 573 U.S. (Supreme Court of the United States 25 June 2014) ("Required a warrant to search mobile telecommunications devices.").
  31. ^ United States v. Jones, 565 U.S. 400 (Supreme Court of the United States 23 January 2012) ("Limited use of GPS devices [such as in a cell phone] to track movements.").
  32. ^ Katz v. United States, 389 U.S. 347 (Supreme Court of the United States 18 December 18, 1967) ("(a) that an enclosed telephone booth is an area where, like a home, and unlike a field, a person has a constitutionally protected reasonable expectation of privacy; (b) that electronic as well as physical intrusion into a place that is in this sense private may constitute a violation of the Fourth Amendment; and (c) that an invasion of a constitutionally protected area by federal authorities is, as the Court has long held, presumptively unreasonable in the absence of a search warrant.").
  33. ^ Ex parte Jackson, 96 U.S. 727 (Supreme Court of the United States 1878) ("Letters and sealed packages subject to letter postage in the mail can be opened and examined only under like warrant, issued upon similar oath or affirmation, particularly describing the thing to be seized, as is required when papers are subjected to search in one's own household. The constitutional guaranty of the right of the people to be secure in their papers against unreasonable searches and seizures extends to their papers, thus closed against inspection, wherever they may be.").
  34. ^ "Stored Communications Act (18 U.S. Code § 2703(d) - Required disclosure of customer communications or records)". Requirements for Court Order.— A court order for disclosure under subsection (b) or (c) may be issued by any court that is a court of competent jurisdiction and shall issue only if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation. In the case of a State governmental authority, such a court order shall not issue if prohibited by the law of such State. A court issuing an order pursuant to this section, on a motion made promptly by the service provider, may quash or modify such order, if the information or records requested are unusually voluminous in nature or compliance with such order otherwise would cause an undue burden on such provider.
  35. ^ "47 CFR Subpart E - Privacy Act Regulations". LII / Legal Information Institute.
  36. ^ United States v. Karo, 468 U.S. 705 (Supreme Court of the United States 3 July 1984) ("the use of a beeper to conduct surveillance on Karo and his accomplices constituted an unlawful search and seizure in violation of the Fourth Amendment.").
  37. ^ Liptak, Adam (23 June 2018). "Warrant Required for Cellphone Tracking Data" (print). The New York Times. Vol. CLXII, no. 58, 002 (National ed.). pp. A1, A16. Retrieved 23 June 2018. "We decline to grant the state unrestricted access to a wireless carrier's database of physical location information," Chief Justice John G. Roberts Jr. wrote for the majority. ... "Mapping a cellphone's location over the course of 127 days provides an all-encompassing record of the holder's whereabouts," he wrote, going on to quote from an earlier opinion. "As with GPS information, the time-stamped data provides an intimate window into a person's life, revealing not only his particular movements, but through them his 'familial, political, professional, religious and sexual associations.'" ... "cellphones and the services they provide are 'such a pervasive and insistent part of daily life' that carrying one is indispensable to participation in modern society."
  38. ^ Keyaerts, K. (2018). "United States ∙ Carpenter v US: Supreme Court Rules Police Need a Warrant to Obtain Cell-Site Location Information". European Data Protection Law Review. 4 (4): 525–530. doi:10.21552/edpl/2018/4/17. ISSN 2364-2831.
edit