The National Security Agency (NSA) has issued a warning to iPhone and Android users, urging them to disable location tracking features on their devices. The advisory comes amidst growing concerns about privacy risks, foreign surveillance, and the exploitation of personal data. If you’re someone who values your privacy—or if you’re in a profession that demands discretion—this is advice you can’t afford to ignore. 

Please read the following and see how to keep yourself safe from prying eyes.

Why Is the NSA Sounding the Alarm?

Smartphones have become indispensable in our daily lives, serving as everything from digital wallets to GPS navigators. But with convenience comes risk. Your phone constantly broadcasts your location through GPS, Wi-Fi, cellular networks, and even Bluetooth connections. While this helps apps like Google Maps or DoorDash function seamlessly, it also creates a treasure trove of data that can be exploited by bad actors.

The NSA has flagged several reasons for concern:

Foreign Surveillance 

Advanced adversaries, including nation-state actors, can use location data to track movements, identify patterns, and pinpoint sensitive locations. This poses a significant risk to military personnel, government officials, and anyone involved in critical infrastructure.

Foreign surveillance through smartphones is a real and growing threat, with sophisticated methods targeting both the hardware and software of these devices. One common approach is network-based surveillance, where foreign governments exploit cellular networks. For instance, mobile operators can track users’ movements through their connections to nearby cell towers, a process known as cell tower tracking. Devices like IMSI catchers, also called Stingrays, mimic cell towers to intercept communications and pinpoint phone locations. In some cases, authorities can requesttower dumpsto collect data on all phones present in a specific area, revealing who was nearby at a given time.

Another method is device-based surveillance, which involves directly targeting smartphones to gather sensitive information. Malicious actors can push spyware or malware onto phones through firmware updates or by exploiting vulnerabilities in apps and operating systems. Tools like Pegasus spyware are particularly dangerous because they allow attackers to monitor calls, read emails, capture screenshots, and even take full control of a device without the user’s knowledge. Hackers also exploit security flaws to infiltrate phones, leaving users exposed.