Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Mobile phone tracking

From Wikipedia, the free encyclopedia
(Redirected fromGSM localization)
Identifying the location of a mobile phone
An indoor location tracking map on a mobile phone

Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be effected by a number of technologies, such as themultilateration of radio signals between (several)cell towers of thenetwork and the phone or by simply usingGPS tracking. To locate a mobile phone using multilateration of mobile radio signals, the phone must emit at least the idle signal to contact nearby antenna towers and does not require an active call. TheGlobal System for Mobile Communications (GSM) is based on the phone'ssignal strength to nearby antenna masts.[1]

Mobile positioning may be used forlocation-based services that disclose the actual coordinates of a mobile phone.Telecommunication companies use this toapproximate the location of a mobile phone, and thereby also its user.[2]

Technology

[edit]

The location of a mobile phone can be determined using several complementary technologies. Modern phones typically use aHybrid positioning system that combines these methods to provide the fastest and most accurate location possible.

Handset-based positioning

[edit]

This is the most common method, where the device itself calculates its own position.

  • GNSS /GPS: The phone uses a built-in receiver to calculate its precise location from signals broadcast bysatellite navigation constellations (like GPS,GLONASS, orGalileo). This is the most accurate method when outdoors.
  • Wi-Fi Positioning: In areas with poor satellite reception, such as indoors or in dense "urban canyons," the phone can scan for nearbyWi-Fi networks. It then calculates its position by cross-referencing the unique identifiers (BSSIDs) of these networks against a global, crowdsourced database of their locations.[3]
  • Fingerprinting: This technique records the "signature" of home and neighboring cell signal strengths at different points in an area. The device can then match its current signal signature to this database to determine its location.[4]

Network-based positioning

[edit]

This method relies on the cellular network infrastructure to determine the phone's location. The advantage is that it can be implemented non-intrusively by the service provider without any special software on the handset.[5]

  • Cell ID: The least accurate method, which uses the known location of the singlecell tower the phone is communicating with. Its precision is low, especially in rural areas where cell towers are far apart.
  • Multilateration: More advanced systems use the signal strength and timing from multiple adjacent cell towers to triangulate the phone's position. This is more accurate in urban areas where cell tower density is high.[6]

Data transmission in modern applications

[edit]

For anylocation-based service to function, the position data calculated by the phone (whether from GPS, Wi-Fi, or the network) must be transmitted to a server. The phone's built-in cellular modem sends thistelemetry data over the mobile network (e.g., 4G/5G).

This "phone-as-a-sensor" model is the foundation for many modern on-demand services and is a key part offleet digitalization. Applications for food delivery, courier services, and ride-hailing (likeUber orLyft) rely on the phone's transmitted location data to function. The phone itself acts as theGPS tracking unit for the service'sfleet management platform, allowing it to dispatch the nearest driver, provide customers with a real-timetrack and trace map, and calculate billing. The reliability of these services depends on this constant data connection; for example, theshutdown of older 3G networks required many commercial services to ensure their devices were 4G or 5G capable to maintain connectivity.[7]

Operational purpose

[edit]

In order to route calls to a phone,cell towers listen for a signal sent from the phone and negotiate which tower is best able to communicate with the phone. As the phone changes location, the antenna towers monitor the signal, and the phone is "roamed" to an adjacent tower as appropriate. By comparing the relative signal strength from multiple antenna towers, a general location of a phone can be roughly determined. Other means make use of the antenna pattern, which supports angular determination andphase discrimination.

Newer phones may also allow the tracking of the phone even when turned on but not active in a telephone call. This results from the roaming procedures that perform hand-over of the phone from one base station to another.[8]

Consumer applications

[edit]

A phone's location can be shared with friends and family, posted to a public website, recorded locally, or shared with other users of a smartphone app. The inclusion of GPS receivers on smartphones has made geographical apps nearly ubiquitous on these devices. Specific applications include:

In January 2019, the location of her iPhone as determined by her sister helped Boston police find kidnapping victim Olivia Ambrose.[9]

Privacy

[edit]

Locating or positioning touches upon delicateprivacy issues, since it enables someone to check where a person is without the person's consent.[10] Strict ethics and security measures are strongly recommended for services that employ positioning.

In 2012Malte Spitz held aTED talk[11] on the issue of mobile phone privacy in which he showcased his own stored data that he received fromDeutsche Telekom after suing the company. He described the data, which consists of 35,830 lines of data collected during the span ofGermany'sdata retention at the time, saying, "This is six months of my life [...] You can see where I am, when I sleep at night, what I'm doing." He partnered up withZEIT Online and made his information publicly available in aninteractive map which allows users to watch his entire movements during that time in fast-forward. Spitz concluded that technology consumers are the key to challenging privacy norms in today's society who "have to fight for self determination in the digital age."[12][13]

China

[edit]

TheChinese government has proposed using this technology to track commuting patterns ofBeijing city residents.[14] Aggregate presence of mobile phone users could be tracked in a privacy-preserving fashion.[15] This location data was used to locate protesters duringprotests in Beijing in 2022.[16]

Europe

[edit]

InEurope most countries have a constitutional guarantee on thesecrecy of correspondence, and location data obtained from mobile phone networks is usually given the same protection as the communication itself.[17][18][19][20]

United States

[edit]

In theUnited States, there is a limited constitutional guarantee on theprivacy of telecommunications through theFourth Amendment.[21][22][23][24][25] The use of location data is further limited bystatutory,[26]administrative,[27] andcase law.[21][28] Police access of seven days of a citizen's location data is unquestionably enough to be afourth amendment search requiring bothprobable cause and awarrant.[21][29]

In November 2017, theUnited States Supreme Court ruled inCarpenter v. United States that the government violates the Fourth Amendment by accessing historical records containing the physical locations of cellphones without a search warrant.[30]

See also

[edit]

References

[edit]
  1. ^"Tracking a suspect by any mobile phone: Tracking SIM and handset".BBC News. 2005-08-03. Retrieved2010-01-02.
  2. ^"Location Based Services for Mobiles: Technologies and Standards“, Shu Wang, Jungwon Min and Byung K. Yi,IEEE International Conference on Communication (ICC) 2008, Beijing, China
  3. ^"Q&A on Location Data".apple.com. Apple. Retrieved2013-03-08.
  4. ^Ibrahim, M.; Youssef, M. (2012-01-01). "CellSense: An Accurate Energy-Efficient GSM Positioning System".IEEE Transactions on Vehicular Technology.61 (1):286–296.arXiv:1110.3425.doi:10.1109/TVT.2011.2173771.ISSN 0018-9545.S2CID 14790516.
  5. ^Mobile Positioning Using Wireless Networks
  6. ^Laitinen, H.; Lahteenmaki, J.; Nordstrom, T. (2001). "Database correlation method for GSM location".IEEE VTS 53rd Vehicular Technology Conference, Spring 2001. Proceedings (Cat. No.01CH37202). Vol. 4. Rhodes, Greece: IEEE. pp. 2504–2508.doi:10.1109/VETECS.2001.944052.ISBN 9780780367289.S2CID 195858053.
  7. ^"Will The 3G Sunset Leave Supply Chains In The Dark?".Forbes. August 3, 2023. RetrievedOctober 7, 2025.
  8. ^Declan McCullagh and Anne Broache (6 December 2008)."Roving Bug in Cell Phones Used By FBI to Eavesdrop on Syndicate".The Chicago Syndicate -BLOG.
  9. ^"A common smartphone feature helped find missing woman - The Boston Globe".BostonGlobe.com.
  10. ^Waxman, Seth."Brief for technology companies as amici curiae in support of neither party"(PDF).scotusblog. Supreme Court of the United States. Retrieved23 June 2018.
  11. ^"Your phone company is watching - TEDGlobal 2012".ted.com. June 2012. Retrieved26 January 2016.
  12. ^Fitzgerald, Britney (25 July 2012)."Malte Spitz's TED Talk Takes On Mobile Phone Privacy Debate (VIDEO)".Huffington Post. Retrieved26 January 2016.
  13. ^Biermann, Kai (10 March 2011)."Betrayed by our own data".Die Zeit. ZEIT. Retrieved26 January 2016.
  14. ^Cecilia Kang (March 3, 2011)."China plans to track cellphone users, sparking human rights concerns".The Washington Post. Archived fromthe original on June 24, 2011.
  15. ^D. Quercia, Ilias Leontiadis, Liam McNamara, Cecilia Mascolo, Jon Crowcroft (2011).SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones.IEEE ICDCS
  16. ^Xiong, Nectar Gan, Yong (2022-12-02)."Chinese police are using cellphone data to track down protesters".CNN. Retrieved2022-12-03.{{cite web}}: CS1 maint: multiple names: authors list (link)
  17. ^Spyropoulos, Philippos K. (2009).Constitutional law in Greece. Fortsakis, Théodore. Netherlands: Kluwer Law International.ISBN 978-90-411-2878-2.OCLC 383848443.
  18. ^Campbell, John (2020),"The origins and development of the right to privacy",Comparative Privacy and Defamation, Edward Elgar Publishing, pp. 9–23,doi:10.4337/9781788970594.00008,ISBN 978-1-78897-059-4,S2CID 225586361, retrieved2020-10-24
  19. ^"Chapter X, Fundamental Rights and Duties of Citizens, Article 128".1936 Constitution of the USSR.The inviolability of the homes of citizens and privacy of correspondence are protected by law.
  20. ^Roxana Maria Roba.The Legal Protection of the Secrecy of Correspondence,Curentul "Juridic" (archived), 2009, number 1,Tîrgu-Mureş,Romania.
  21. ^abcCarpenter v. United States, 583 U.S. (Supreme Court of the United States 22 June 2018) ("The Government's acquisition of Carpenter's cell-site records was a Fourth Amendment search.").
  22. ^Riley v. California, 573 U.S. (Supreme Court of the United States 25 June 2014) ("Required a warrant to search mobile telecommunications devices.").
  23. ^United States v. Jones, 565 U.S. 400 (Supreme Court of the United States 23 January 2012) ("Limited use of GPS devices [such as in a cell phone] to track movements.").
  24. ^Katz v. United States, 389 U.S. 347 (Supreme Court of the United States 18 December 18, 1967) ("(a) that an enclosed telephone booth is an area where, like a home, and unlike a field, a person hasa constitutionally protected reasonable expectation of privacy; (b) thatelectronic as well as physicalintrusion into a place that is in this sense private may constitute a violation of the Fourth Amendment; and (c) that an invasion of a constitutionally protected area by federal authorities is, as the Court has long held, presumptively unreasonable in the absence of a search warrant.").
  25. ^Ex parte Jackson, 96 U.S. 727 (Supreme Court of the United States 1878) ("Letters and sealed packages subject to letter postage in the mail can be opened and examined only under like warrant, issued upon similar oath or affirmation, particularly describing the thing to be seized, as is required when papers are subjected to search in one's own household. The constitutional guaranty of the right of the people to be secure in their papers against unreasonable searches and seizures extends to their papers, thus closed against inspection, wherever they may be.").
  26. ^"Stored Communications Act (18 U.S. Code § 2703(d) - Required disclosure of customer communications or records)".Requirements for Court Order.— A court order for disclosure under subsection (b) or (c) may be issued by any court that is a court of competent jurisdiction andshall issue only if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation. In the case of a State governmental authority, such a court order shall not issue if prohibited by the law of such State. A court issuing an order pursuant to this section, on a motion made promptly by the service provider, may quash or modify such order, if the information or records requested are unusually voluminous in nature or compliance with such order otherwise would cause an undue burden on such provider.
  27. ^"47 CFR Subpart E - Privacy Act Regulations".LII / Legal Information Institute.
  28. ^United States v. Karo, 468 U.S. 705 (Supreme Court of the United States 3 July 1984) ("the use of a beeper to conduct surveillance on Karo and his accomplices constituted an unlawful search and seizure in violation of the Fourth Amendment.").
  29. ^Liptak, Adam (23 June 2018)."Warrant Required for Cellphone Tracking Data"(print).The New York Times. Vol. CLXII, no. 58, 002 (National ed.). pp. A1, A16. Retrieved23 June 2018."We decline to grant the state unrestricted access to a wireless carrier's database of physical location information," Chief Justice John G. Roberts Jr. wrote for the majority. ... "Mapping a cellphone's location over the course of 127 days provides an all-encompassing record of the holder's whereabouts," he wrote, going on to quote from an earlier opinion. "As with GPS information, the time-stamped data provides an intimate window into a person's life, revealing not only his particular movements, but through them his 'familial, political, professional, religious and sexual associations.'" ... "cellphones and the services they provide are 'such a pervasive and insistent part of daily life' that carrying one is indispensable to participation in modern society."
  30. ^Keyaerts, K. (2018)."United States ∙ Carpenter v US: Supreme Court Rules Police Need a Warrant to Obtain Cell-Site Location Information".European Data Protection Law Review.4 (4):525–530.doi:10.21552/edpl/2018/4/17.ISSN 2364-2831.

External links

[edit]
Mobile
networks
,
protocols
Generations
General
operation
Mobile
devices
Form factors
Smartphones
Mobile
specific
software
Apps
Commerce
Content
Culture
Environment
and health
Law
Positioning systems
Navigation systems
Retrieved from "https://en.wikipedia.org/w/index.php?title=Mobile_phone_tracking&oldid=1322294630"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp