Skip to content

Tracking Prevention

Guidance on detecting, preventing, and defending against unwanted location tracking and surveillance. This includes handling devices like AirTags and hidden cameras.


  • Check surroundings: Regularly inspect personal belongings, vehicles, and living areas for unfamiliar devices
  • Minimize exposure: Avoid sharing location details publicly or on social media
  • Secure devices: Keep electronic devices updated and use security features
  • Anti-surveillance apps: AirGuard for Android helps detect nearby trackers
  • iOS built-in: iPhones will alert you to unknown AirTags traveling with you
  • GPS signal blockers: Consider using in sensitive situations (note legal restrictions)

  • Look for anomalies: Regularly check less visible areas of personal items and vehicles for signs of tampering
  • Use light: A flashlight can help spot lens reflections from hidden cameras
  • Check common hiding spots:
    • Wheel wells and undercarriage of vehicles
    • Inside bags and luggage
    • Stuffed into clothing or gifts
    • In or behind everyday objects

RF (radio frequency) detectors are essential for finding wireless devices:

Considerations when selecting:

  • Frequency Range: Should cover frequencies used by surveillance devices
  • Sensitivity: Ability to detect weak signals
  • Usability: User-friendly for non-technical users
  • Portability: Size and power requirements

Tool Selection by Budget:

LevelUse CasePrice Range
BasicHome-to-work vehicle sweeps$15-50
Mid-rangeHotel room sweeps$500-1000
ProfessionalFull TSCM site management$2000+
  • Check Wi-Fi connections: Monitor for unknown devices on your network
  • Use security applications: Network scanning tools can alert to unauthorized access
  • Router admin panel: Regularly review connected devices

DeviceDetection
Apple AirTagiOS alerts automatically; Android requires AirGuard app
TileHarder to detect; some scanner apps can find
Samsung SmartTagGalaxy phones alert; others need scanner apps
  • Often hardwired into vehicles
  • May be battery-powered and hidden
  • Require RF scanner to detect when transmitting
  • Some only log and don’t transmit (harder to detect)

Common hiding spots:

  • Smoke detectors
  • Clocks
  • Electrical outlets
  • Plants and decorations
  • USB chargers

Detection:

  • RF scanner for wireless cameras
  • Flashlight for lens reflection
  • Phone camera (some can see IR lights)

  1. Don’t destroy immediately - May be evidence
  2. Document everything:
    • Take photos
    • Note exact location found
    • Record date and time
    • Note any identifying features
  3. Consider leaving in place temporarily if you want to identify who placed it
  4. Preserve evidence if legal action is a consideration
  • If you feel threatened
  • If stalking is suspected
  • If the device is sophisticated (potential government surveillance)
  • For documentation purposes
  • Enhance security: Upgrade both physical and digital security
  • Awareness training: Educate family and colleagues
  • Regular sweeps: Make checking for devices routine
  • Vary patterns: Change routes and schedules

Exterior:

  • Wheel wells (common hiding spot for magnetic trackers)
  • Undercarriage
  • Bumpers (inside and behind)
  • Behind license plates

Interior:

  • Under seats
  • In door panels
  • Behind dashboard components
  • In trunk/cargo area
  • OBD-II port (diagnostic port under dashboard)
  • Scratches or marks near panels
  • Loose trim pieces
  • Unfamiliar wires
  • Objects that don’t belong
  • Dirt patterns disturbed

Regular checks:

  • Smoke detectors and carbon monoxide detectors
  • Electrical outlets and switches
  • Plants and decorations
  • Electronics (especially new or gifted)
  • Behind mirrors and pictures
  • In air vents
  • Along baseboards
  • Review Wi-Fi connected devices
  • Check for unknown Bluetooth devices nearby
  • Review router logs for unusual activity
  • Check for unfamiliar apps on devices

  • Check luggage for unknown items
  • Note the arrangement of items in bags
  • Consider travel-specific devices only
  • Research local surveillance laws
  • Use hotel safes (imperfect but deterrent)
  • Check room for cameras (especially rental properties)
  • Cover laptop cameras
  • Be aware of who has access to your belongings
  • Use Faraday bags for devices when not in use
  • Consider burner devices
  • Vary your schedule and routes
  • Trust your instincts

  • Many apps request unnecessary location permissions
  • Social media often embeds location in posts
  • Fitness apps like Strava can reveal patterns
  • Photos may contain GPS coordinates in metadata
  • Review and revoke unnecessary location permissions
  • Disable location services when not needed
  • Turn off location for camera app
  • Use “While Using” instead of “Always” for necessary apps
  • Disable significant locations (iOS)
  • Turn off Google location history (Android)

Airplane mode doesn’t guarantee you can’t be tracked:

  • Some devices still log GPS data
  • WiFi and Bluetooth may still be active
  • Device may reconnect automatically

For true isolation, use a Faraday bag.


For serious concerns, consider professional TSCM (Technical Surveillance Countermeasures) services.


Daily habits:

  • Vary your routes
  • Check belongings for unfamiliar items
  • Review app location permissions
  • Be aware of your surroundings

Weekly:

  • Check vehicle for trackers
  • Review Wi-Fi connected devices
  • Check for unknown Bluetooth devices

Before sensitive activities:

  • Full device sweep
  • Disable location services
  • Consider Faraday bags
  • Leave personal devices behind if appropriate