<img height="1" width="1" src="https://www.facebook.com/tr?id=3323484487762706&amp;ev=PageView&amp;noscript=1">
Blog Post, Security in Seconds, Cyber Attacks

Security In Seconds: Tracking Location Via Cellular Devices

May 20, 2021

Recent Content

How is it possible for someone to track my location based on my cellular phone?

Mobile Device manufacturers have put a lot of effort into trying to conceal a user’s identity, which would make it hard to track and identify a person based on their cellular phone.

The challenge though, is doing it in a way that doesn’t break the wireless LAN protocol, and also doesn’t require consumers to do anything to conceal their identity.

Unfortunately for us consumers, and fortunately for those in the know, there are still ways to track people based on their cellular device.

 

Tracking a cellular device that connects to a Wi-Fi network

Every modern cell phone has a feature called “Private MAC Addressing” enabled by default. This feature assigns a totally random Media Access Control (MAC) address to a cellular phone. So how would you track it?

Well, private MAC addressing, although random, persists across every wireless network the mobile device connects to. This means that, although random, every time you connect to the wireless network named “Starbucks” your MAC address will stay the same, and it doesn’t matter if you connect to one in Virginia this week, and California the next. That MAC address will stay the same, making it possible to track that person every time they connect to the same wireless network name twice.

Unfortunately, even if you try to “Forget this Network” that random MAC address will still persist, so there is no easy way to stop this from happening.

 

Tracking a cellular device that connects to cellular

Every cell phone with a cellular data plan has what is called a Subscriber Identification Module (SIM) card. This card is what data plan providers use to monitor the data used each month, which is then charged back to that user on their monthly cell phone bill. That SIM card has what is called an International Mobile Subscriber Identifier (IMSI) number that is then used to correlate cellular data usage to the subscriber (user).

If someone was able to get ahold of that IMSI number they would then be able to track a device whenever that device was using cellular data. Every time you leave your house, unless you have a hotspot, you are using cellular data to surf the internet. As an attacker there are ways to trick a cellular device into revealing its IMSI number, which could then be used for malicious purposes.

This same type of attack could also be used to defend against attackers who are trying to break into the wireless network, and thankfully it doesn’t just help identify the type of device being used, but it also helps identify the user who is subscribed to the data plan, revealing the identity of the attacker!

Tim Connell - Head of Enterprise Products

Tim Connell - Head of Enterprise Products

At his core Tim is just a normal guy who found a passion for technology and wants to use his knowledge to help others (people, companies) protect themselves from having their sensitive data compromised. He also enjoys working with professionals looking to advance their careers and is willing to give guidance anywhere that he can. As Head of Enterprise Products for Pulsar Security, he guides the team in creating solutions which satisfy the needs of real-world customers, specializing in the areas of data management, storage network visibility, and enterprise security. He has supported state and local governments, the Fortune 500, and small-medium sized businesses to help carry out this mission. Tim holds technical certifications as an Offensive Security Certified Professional (OSCP), CompTIA Network+, CompTIA Security+, GIAC Penetration Tester (GPEN), GIAC Web App Penetration Tester (GWAPT), and GIAC Python Coder (GPYC). Tim is an accomplished business consultant and strategist with credentials such as Certified ScrumMaster and HubSpot Sales Professional with deep training and knowledge in the Sandler Selling Methodology.