Privacy & Security

Smartphone Surveillance: How Your Phone Tracks Your Every Move

Concept art of an article about Smartphone Surveillance: How Your Phone Tracks Your Every Move: hand holding a smartphone with an eye watching, representing surveillance (AI Art)

Your Smartphone is Spying on You (Again)

It’s no surprise that Big Brother takes an intense interest in how we interact with our mobile devices. Imagine carrying a spy in your pocket everywhere you go—one that monitors your every move, conversation, and interaction. That spy is your smartphone.

Smartphones: The Perfect Surveillance Device

Think about your smartphone for a moment. You probably carry your smartphone everywhere you go. It likely has dozens of apps installed, many of which contain sensitive personal information. You presumably use it for phone calls, text messages, and, of course, to find the nearest Starbucks. When it’s time to pay bills, a smartphone makes it easy. Just log in to your bank’s mobile app.

But what if every action on your smartphone is being watched? Simply powering it on exposes your location. Anyone who has access to the cellphone network can track your location in real time, as well as access records of where you’ve been.

Your smartphone’s mobile carrier has the built-in capacity to monitor everything you do with your device. This includes what websites you visit, what apps you install, who you call or who calls you, and who you text or who texts you. It also can keep a permanent record of this activity. What’s more, it’s almost child’s play to plant spyware on a smartphone. Detecting such software is impossible unless you’re an expert.

Cameras and Microphones: The Eyes and Ears of Surveillance

Your smartphone also contains a camera and a microphone. Many apps containing spyware can secretly activate them, converting your smartphone into a wiretapping device.

Governments also use surveillance technology originally developed for the military that masquerades as a cell tower, thus fooling your smartphone into connecting to it. The generic term for this type of surveillance is “IMSI Catcher,” referring to the fact that the devices employing it identify your phone’s international mobile subscriber identification (IMSI) number. One class of devices using this technology is called “Stingray.” A more advanced version is called “Dirtbox.”

The COVID-19 Pandemic: A Catalyst for Surveillance

The reaction by governments to the COVID-19 pandemic has further escalated the threat of smartphone surveillance. Hundreds of millions of people across the world can’t travel or even leave their homes unless they install a tracking app on their smartphone. At least 47 smartphone-based contact tracing apps in 28 countries use mobile data tracking to record your interactions with other people to assess your risk of exposure to COVID-19. China, South Korea, Taiwan, and Israel use human contact tracers who have access to CCTV video streams and mobile phone location data to enforce quarantines.

TikTok and Beyond: The Risks of Popular Apps

Then there’s TikTok, a video-sharing social networking app that’s uber-popular with teenagers.

In August 2020, President Trump signed an executive order that would remove TikTok from US app stores because it poses a security risk. (TikTok’s corporate parent is a Chinese company.) TikTok admits that it collects usage information, IP addresses, the identity of your cellular company, your keystroke patterns, and your location data, among other information.

But TikTok is just the tip of the iceberg. If TikTok is a security risk to the average American user, so is Google, Facebook, Instagram, WhatsApp, and Snapchat. Have you ever considered how much of your personal data these apps collect and what they do with it?

I suspect the real reason for the ban (temporarily delayed by a recent court order) is that TikTok isn’t controlled by US security agencies.

Uncle Sam is Watching: Government Surveillance

That may sound paranoid or simply crass, except that there’s a long history of Uncle Sam spying on our electronic communications.

In 2013, whistleblower Edward Snowden revealed that the Pentagon’s ultra-secretive National Security Agency taps directly into the server hubs of leading internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. Companies mentioned in the documents include Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. The NSA has essentially placed a drift net across the electronic spectrum to capture everything transmitted over it.

National Security Letters: A Tool for Mass Data Collection

Nor have more recent developments indicated that Big Brother has changed its behavior.

In 2019, The Washington Post revealed that the FBI issued “national security letters” (NSLs) to more than 120 companies. They included a cross-section of corporate giants entrusted with our most sensitive data, including financial services giants Bank of America and Capital One; cellular service providers AT&T, T-Mobile, and Verizon; credit bureaus Equifax, Experian, and TransUnion; and technology companies Google, Microsoft, and Facebook.

The NSL mechanism, which was greatly expanded by the USA PATRIOT Act, permits the FBI to force companies to disclose customer information without a search warrant. The FBI can obtain telephone logs, e-mail histories, financial and bank records, and credit reports this way. It may retain the records indefinitely, even when they prove irrelevant to an investigation. The records may also be shared broadly, facilitating the creation of electronic dossiers on tens of thousands of Americans.

The reach of these letters is extensive, and they come with a gag order. The FBI may also prohibit the recipient of an NSL from disclosing its existence “to any person” other than the recipient’s lawyer, with five years’ imprisonment as the prescribed punishment.

Oh, and by the way … earlier in 2020, in a rare example of bipartisanship, Congress voted to renew the USA Freedom Act, which extends the PATRIOT Act’s expansive domestic surveillance authority.

Why You Should Care About Smartphone Surveillance

You might be tempted to conclude that the furor over smartphone spying is much ado about nothing. After all, what harm can it do if you’re not doing anything wrong?

The problem is that the concept of “right” and “wrong” can be redefined anytime. For instance, while the First Amendment gives Americans “freedom of speech,” exercising that right while having your smartphone with you means you’ll be monitored.

Have you ever stopped to think about what this level of surveillance could mean for your personal freedoms? You may not have noticed, but eyes in the sky were watching when demonstrators marched in American cities to protest the killing of George Floyd.

In Houston, Las Vegas, Portland, Washington, D.C., and other metropolitan areas, police and National Guard units employed extensive use of surveillance aircraft to monitor conditions on the streets. And they used an advanced version of the Dirtbox IMSI catcher to track a smartphone’s physical location as well as monitor conversations, emails, and text messages. Naturally, all this surveillance occurred without any type of search warrant.

Protecting Your Privacy: Steps You Can Take

If you’d rather not be subjected to this type of surveillance, there’s a simple, albeit drastic solution to end it. That’s to throw away your smartphone. Replace it with a burner phone – a cheap mobile phone you can buy with cash and purchase prepaid voice and internet service. Why not start taking steps today to secure your personal privacy? Follow this link to learn where to buy one or set one up.

A good time to begin securing your smartphone would be today. Big Brother certainly isn’t going to do it for you.

On another note, many clients first get to know us by accessing some of our well-researched courses and reports on important topics that affect you.

Like How to Go Offshore in 2024, for example. It tells the story of John and Kathy, a couple we helped from the heartland of America. You’ll learn how we helped them go offshore and protect their nestegg from ambulance chasers, government fiat and the decline of the US Dollar… and access a whole new world of opportunities not available in the US. Simply click the button below to register for this free program.

About The Author

Need Help?

We have 40+ years experience helping Americans move, live and invest internationally…

Need Help?

We have 40+ years experience helping Americans move, live and invest internationally…

As Featured on

Get our latest strategies delivered straight to your inbox for free.

Get Our Best Plan B Strategies Right to Your Inbox.

The Nestmann Group does not sell, rent or otherwise share your private details with third parties. Learn more about our privacy policy here.

The Basics of Offshore Freedom

Read these if you’re mostly or very new to the idea of going offshore

What it Really Takes to Get a Second Passport

A second passport is about freedom. But how do you get one? Which one is best? And is it right for you? This article will answer those questions and more…

How to Go Offshore
in 2024

[CASE STUDY] How we helped two close-to-retirement clients protect their nest egg.

Nestmann’s Notes

Our weekly free letter that shows you how to take back control.