Tracking Prevention
Tracking Prevention
Section titled “Tracking Prevention”Guidance on detecting, preventing, and defending against unwanted location tracking and surveillance. This includes handling devices like AirTags and hidden cameras.
Everyday Prevention
Section titled “Everyday Prevention”Personal Awareness
Section titled “Personal Awareness”- Check surroundings: Regularly inspect personal belongings, vehicles, and living areas for unfamiliar devices
- Minimize exposure: Avoid sharing location details publicly or on social media
- Secure devices: Keep electronic devices updated and use security features
Technology Aids
Section titled “Technology Aids”- Anti-surveillance apps: AirGuard for Android helps detect nearby trackers
- iOS built-in: iPhones will alert you to unknown AirTags traveling with you
- GPS signal blockers: Consider using in sensitive situations (note legal restrictions)
Detection Techniques
Section titled “Detection Techniques”Visual Inspection
Section titled “Visual Inspection”- Look for anomalies: Regularly check less visible areas of personal items and vehicles for signs of tampering
- Use light: A flashlight can help spot lens reflections from hidden cameras
- Check common hiding spots:
- Wheel wells and undercarriage of vehicles
- Inside bags and luggage
- Stuffed into clothing or gifts
- In or behind everyday objects
Electronic Scanners
Section titled “Electronic Scanners”RF (radio frequency) detectors are essential for finding wireless devices:
Considerations when selecting:
- Frequency Range: Should cover frequencies used by surveillance devices
- Sensitivity: Ability to detect weak signals
- Usability: User-friendly for non-technical users
- Portability: Size and power requirements
Tool Selection by Budget:
| Level | Use Case | Price Range |
|---|---|---|
| Basic | Home-to-work vehicle sweeps | $15-50 |
| Mid-range | Hotel room sweeps | $500-1000 |
| Professional | Full TSCM site management | $2000+ |
Network Monitoring
Section titled “Network Monitoring”- Check Wi-Fi connections: Monitor for unknown devices on your network
- Use security applications: Network scanning tools can alert to unauthorized access
- Router admin panel: Regularly review connected devices
Common Tracking Devices
Section titled “Common Tracking Devices”Bluetooth Trackers
Section titled “Bluetooth Trackers”| Device | Detection |
|---|---|
| Apple AirTag | iOS alerts automatically; Android requires AirGuard app |
| Tile | Harder to detect; some scanner apps can find |
| Samsung SmartTag | Galaxy phones alert; others need scanner apps |
GPS Trackers
Section titled “GPS Trackers”- Often hardwired into vehicles
- May be battery-powered and hidden
- Require RF scanner to detect when transmitting
- Some only log and don’t transmit (harder to detect)
Hidden Cameras
Section titled “Hidden Cameras”Common hiding spots:
- Smoke detectors
- Clocks
- Electrical outlets
- Plants and decorations
- USB chargers
Detection:
- RF scanner for wireless cameras
- Flashlight for lens reflection
- Phone camera (some can see IR lights)
If Tracking is Identified
Section titled “If Tracking is Identified”Immediate Actions
Section titled “Immediate Actions”- Don’t destroy immediately - May be evidence
- Document everything:
- Take photos
- Note exact location found
- Record date and time
- Note any identifying features
- Consider leaving in place temporarily if you want to identify who placed it
- Preserve evidence if legal action is a consideration
When to Involve Authorities
Section titled “When to Involve Authorities”- If you feel threatened
- If stalking is suspected
- If the device is sophisticated (potential government surveillance)
- For documentation purposes
Long-term Strategies
Section titled “Long-term Strategies”- Enhance security: Upgrade both physical and digital security
- Awareness training: Educate family and colleagues
- Regular sweeps: Make checking for devices routine
- Vary patterns: Change routes and schedules
Vehicle Security
Section titled “Vehicle Security”Checking Your Vehicle
Section titled “Checking Your Vehicle”Exterior:
- Wheel wells (common hiding spot for magnetic trackers)
- Undercarriage
- Bumpers (inside and behind)
- Behind license plates
Interior:
- Under seats
- In door panels
- Behind dashboard components
- In trunk/cargo area
- OBD-II port (diagnostic port under dashboard)
Signs of Tampering
Section titled “Signs of Tampering”- Scratches or marks near panels
- Loose trim pieces
- Unfamiliar wires
- Objects that don’t belong
- Dirt patterns disturbed
Home Security
Section titled “Home Security”Physical Sweeps
Section titled “Physical Sweeps”Regular checks:
- Smoke detectors and carbon monoxide detectors
- Electrical outlets and switches
- Plants and decorations
- Electronics (especially new or gifted)
- Behind mirrors and pictures
- In air vents
- Along baseboards
Digital Sweeps
Section titled “Digital Sweeps”- Review Wi-Fi connected devices
- Check for unknown Bluetooth devices nearby
- Review router logs for unusual activity
- Check for unfamiliar apps on devices
Travel Security
Section titled “Travel Security”Before Travel
Section titled “Before Travel”- Check luggage for unknown items
- Note the arrangement of items in bags
- Consider travel-specific devices only
- Research local surveillance laws
During Travel
Section titled “During Travel”- Use hotel safes (imperfect but deterrent)
- Check room for cameras (especially rental properties)
- Cover laptop cameras
- Be aware of who has access to your belongings
In High-Risk Areas
Section titled “In High-Risk Areas”- Use Faraday bags for devices when not in use
- Consider burner devices
- Vary your schedule and routes
- Trust your instincts
Digital Location Tracking
Section titled “Digital Location Tracking”Apps That Track You
Section titled “Apps That Track You”- Many apps request unnecessary location permissions
- Social media often embeds location in posts
- Fitness apps like Strava can reveal patterns
- Photos may contain GPS coordinates in metadata
Mitigation
Section titled “Mitigation”- Review and revoke unnecessary location permissions
- Disable location services when not needed
- Turn off location for camera app
- Use “While Using” instead of “Always” for necessary apps
- Disable significant locations (iOS)
- Turn off Google location history (Android)
Airplane Mode Limitations
Section titled “Airplane Mode Limitations”Airplane mode doesn’t guarantee you can’t be tracked:
- Some devices still log GPS data
- WiFi and Bluetooth may still be active
- Device may reconnect automatically
For true isolation, use a Faraday bag.
Resources
Section titled “Resources”Detection Apps
Section titled “Detection Apps”- AirGuard - Android tracker detection
- Tracker Detect - AirTag detection for Android
Guides
Section titled “Guides”Professional Services
Section titled “Professional Services”For serious concerns, consider professional TSCM (Technical Surveillance Countermeasures) services.
Quick Reference
Section titled “Quick Reference”Daily habits:
- Vary your routes
- Check belongings for unfamiliar items
- Review app location permissions
- Be aware of your surroundings
Weekly:
- Check vehicle for trackers
- Review Wi-Fi connected devices
- Check for unknown Bluetooth devices
Before sensitive activities:
- Full device sweep
- Disable location services
- Consider Faraday bags
- Leave personal devices behind if appropriate