3 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
The article explains how mobile carriers can access your GPS location, even without your explicit consent. It highlights the protocols used in different cellular generations to silently transmit GNSS data to carriers, raising concerns about privacy and surveillance. The piece also discusses past instances of government agencies using this data for tracking.
If you do, here's more
Mobile carriers can access your GPS location, even if you think your data is secure. With the release of iOS 26.3, Apple has added a privacy feature that limits precise location data shared with cellular networks, but only for devices using Apple's new modem introduced in 2025. Cellular networks typically determine your location based on which cell towers your device connects to, which can be imprecise—sometimes putting you within tens or hundreds of meters. However, there are protocols in cellular standards that allow devices to send GNSS (GPS, GLONASS, Galileo, BeiDou) location data directly to carriers. This data can pinpoint your location with accuracy down to single-digit meters.
For example, in 2G and 3G networks, this is managed through Radio Resources LCS Protocol (RRLP), while 4G and 5G use LTE Positioning Protocol (LPP). These methods work behind the scenes, making them largely invisible to users. GNSS coordinates are calculated passively on your device, similar to reading a road sign, which means the carrier doesn’t need to know your location unless you allow it. Despite the lack of public awareness, this capability has been exploited by agencies like the DEA in the U.S. and Shin Bet in Israel. These organizations have used court orders to obtain GPS data from phones, illustrating that the technology has been in use for years.
Israel's use of this data for COVID-19 contact tracing highlights its precision and raises concerns about privacy. The GSS Tool, used by Israel's General Security Services, tracks phones in real-time, collecting data from cellular companies to pinpoint locations through triangulation and GPS. While RRLP and LPP are known techniques for obtaining GNSS data, it’s unclear if there are other methods or backdoors that could be exploited. The article also raises the possibility that foreign carriers might access this data, citing previous abuses of the SS7 protocol for spying. Apple’s recent update is a step towards limiting surveillance, but more robust user controls are needed to ensure privacy.
Questions about this article
No questions yet.