Skip to Content

How Malware Can Track Your Smartphone Without Using Location Data

The way your smartphone uses power provides a simple way to track it, say computer scientists who have developed an app to prove it.

Location data is closely guarded by many smartphone users. Nobody wants to think they are being tracked even though they carry the technology to do so in their own pockets.

That’s why the Android and iOS operating system prevent third party apps from accessing location data without the specific permission of the user.  But it turns out that malware can track you anyway, without this data.

Today, Yan Michalevsky at Stanford University in California and few pals say that malicious software can determine the position of a smartphone simply by measuring the way it uses the power. “Our approach enables known route identification, real-time tracking, and identification of a new route by only analyzing the phone’s power consumption,” they say.

The technique is straightforward in theory.  The idea is that a smartphone’s power usage depends largely on the distance from the nearest base station.

As a user moves, this distance changes, increasing or decreasing the power needed to communicate with a base station. So the power usage profile is strongly correlated with the movement of the phone, or in other words, with the route taken by its owner. Given several different potential routes, the power usage profile should reveal which the user has taken.

There are a couple of caveats. The first is that the user must be moving. The power usage profile is no use in identifying the location of a stationary phone.  The second is that this technique distinguishes between different routes which the eavesdropper must have independent knowledge of.

To find out how well this technique works in practice, Michalevsky and co created an Android app called PowerSpy that measures power usage. They  then tested it on a number of Nexus 4 devices. In total, they took 43 different power usage profiles on four different routes each about 14 kilometers long.

They then analyzed the power usage profiles to see if they could determine which route had been taken for each. It turned out they could do this with accuracy of 93 per cent.

That’s pretty good, given that there is always noise in the form of power used by other apps throughout the day. That turns out to be of little consequence. Michalevsky and co say it is relatively straightforward to ignore the noise because it is not correlated with the routes. “We showed that applications that read the phone’s ampere meter can gain information about the location of a mobile device without accessing the GPS or any other coarse location indicators,” they say.

So what can be done to prevent this kind of spying? Michalevsky and co have considered a number of ideas. One option is to prevent apps gaining access to power usage data at all, although this is probably overkill. A better option is to give apps access to power usage data other than those involved in radio communication.  “We suggest that supplying only measurements of the power consumed by the processors (excluding the power consumed by the TX/RX chain) could be a reasonable tradeoff between functionality and privacy,” they say.

That should be straightforward to implement, if  Android or iOS can be bothered.

Michalevsky and co’s work provides an interesting take on privacy and how it can be so easily undermined. Power usage—who’d have thought! It’s also a warning that whatever steps are taken to protect personal data, there will always be ways that it can leak unexpectedly.

Ref: : PowerSpy: Location Tracking using Mobile Device Power Analysis

Keep Reading

Most Popular

Geoffrey Hinton tells us why he’s now scared of the tech he helped build

“I have suddenly switched my views on whether these things are going to be more intelligent than us.”

Meet the people who use Notion to plan their whole lives

The workplace tool’s appeal extends far beyond organizing work projects. Many users find it’s just as useful for managing their free time.

Learning to code isn’t enough

Historically, learn-to-code efforts have provided opportunities for the few, but new efforts are aiming to be inclusive.

Deep learning pioneer Geoffrey Hinton has quit Google

Hinton will be speaking at EmTech Digital on Wednesday.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.