Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

The unforeseen risks of sharing smartphone location data

By Mike Fong
location-data-freepik55842.jpg
November 19, 2021

The app economy is built on the tacit agreement that users give up some of their data to access valuable services for free, in turn providing app developers with a prime source of revenue. Of all the data given up, location data is perhaps the most personal, as this record of day-to-day movements creates not only a diary of one’s life but also opportunities for third parties to infer everything from where one lives to what one believes. In the hands of a malicious actor, such insights can facilitate physical tracking, blackmail, the outing of deeply held secrets and more. Understanding these risks may make you think twice about sharing your location data.

Before getting into specifics, it’s important to understand how location data makes its way across the app economy. Developers of apps that require location data to function as intended — think mapping, weather, ridesharing and localized recommendations —  have a few ways of making money off of raw location data. Commonly, a developer will embed a software development kit (SDK) into their app that essentially siphons location data directly to a data broker or advertising platform. Some SDKs even include the ability to track users’ locations through public Bluetooth beacons, which enable fine-grained tracking indoors. Embedding SDKs is a popular practice because it saves development work and creates a predictable stream of income that grows bigger as more people use the app. Alternatively, app developers can keep location data in-house or sell it in bulk to a data broker.

With location data alone, it’s not difficult to spot an individual’s home or workplace and then find identifying details using an inferred address and publicly available information. But data brokers typically draw on other sources of information, like mobile advertising identifiers, phone numbers and email addresses, that enable them to tie the data to a real identity.

The repackaged data is then sold to any number of third parties, be they a hedge fund searching for an information edge, a real estate investor looking to identify attractive properties or a retailer seeking to analyze shoppers’ in-store behavior. However, because location data is easy to purchase from data brokers, just about any interested party can do so.

We’ve seen law enforcement organizations go this route, most notably with the Department of Homeland Security buying access to smartphone location data to investigate illegal border crossings and track migrant groups. There’s very little stopping foreign intelligence services from using a front company to purchase such data. Nor is there much to stop clients from freely sharing the data they access. And then there’s the issue of data breaches, providing yet another opening as hackers look to use the data for their own economic ends.

When smartphone location data is in the wrong hands or just freely available for scrutiny, the results can be devastating.

One risk is getting singled out for monitoring. It’s not uncommon for police departments to use bulk data collection to track protesters, as they did in places like Ferguson and Baltimore. Police departments have also taken to using reverse search warrants, typically directed at Google, to try to locate individuals who happened to be near the scene of a crime. One such case in Arizona resulted in a man being wrongly arrested based largely on location data supplied by the tech giant. Location data can also illuminate individuals working in a secretive capacity for a company or agency of interest to a foreign intelligence service, opening the door to targeted surveillance.

For those deemed a target, location data can also help outsiders identify those in the individual’s circle of trust, with frequent physical contact highlighting close family members, friends, colleagues and associates. Because the target is most likely to share any valuable nuggets of information with these close contacts, surveilling them can yield direct conversations with the target as well as any information that’s reshared after the fact.

For situations in which location secrecy is of paramount importance, such as a known M&A executive scouting an acquisition target, smartphone location data can reveal protected locations to the world. A famous example involved the popular fitness tracking app Strava, which published a heat map that unwittingly revealed the locations of American military bases and patrol routes.

Another danger is that location data can be used to physically track an individual, as it reveals the person’s pattern of life — their home, their workplace and any other locations they may happen to frequent in any given week, along with the timing of such visits. For a kidnapper seeking to abduct a high-net-worth individual or a stalker looking to chase down their victim, it may be less risky to make contact at the target’s favorite lunch spot or preferred grocery store than at their home or place of business.

Beyond the locations themselves, inferences based on an individual’s one-time or regular visits can yield insights into their more embarrassing habits, preferences and struggles, and these can be weaponized for blackmail or public attacks. Consider the potential damage of broadcasting a politician’s recurring trysts with an assumed prostitute or a famous actor’s visits to a drug rehab center. But the victim need not be a public figure. Recently, a Catholic priest was publicly outed by a newsletter that used location data ultimately tied to Grindr. The publication was able to pinpoint which device belonged to the priest based on pings at his residence and other known locations, and then tracked that device to various gay bars.

And then there are future use cases for location data, some of which we can’t currently imagine given existing technology or norms. One possibility is that individualized underwriting for health or life insurance can tap location data for insights into risky behaviors, perhaps revealing a penchant for fast driving, sky diving or eating at fast food restaurants, ultimately translating to higher premiums.

While we can’t control what happens to our location data after we share it with an app, there are a few things you can do to keep your location data private. At a minimum, make sure to only allow your smartphone’s location to be used by apps that you trust, and only when the request is necessary for desired app functionality. If the use of location is necessary, only allow the app to access your location while you’re actively using the app. And if precise location isn’t necessary, as is the case with a weather app, choose to share only your approximate location.

Beyond app permissions, when traveling you can disable your device’s location services, which uses GPS, nearby cell towers and known Wi-Fi networks to determine your location, and you can shut off any radios that can be tapped for location data, including cellular, Wi-Fi and Bluetooth. For extra protection or simply as a convenient alternative to manipulating software settings, you can employ a Faraday case to shield out any such radio signals when on the go.

When it comes to location data, many smartphone users assume that they’re safe for any number of reasons, perhaps because they think they have nothing to hide or that their data will get lost in the noise. The truth is that location data can paint an incredibly vivid narrative of a person’s life and there’s very little to stop outsiders from accessing this narrative and exploiting it for their own ends. Only after accepting this can we make informed choices about whether and how we share our location data.

KEYWORDS: cyber security data privacy mobile security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike fong

Mike Fong is Founder and CEO of Privoro.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0719-Cyber-Feat-slide1_900px

    Privacy: The Age of Context – Ensuring the Benefits of Sharing Outweigh the Risks

    See More
  • phone open to home screen

    FTC bans Texas media company from sharing location data

    See More
  • report on desk

    Digital-first economy introduces unforeseen risks for 89% of CISOs

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing