Telco Security
Back to Mobile Attacks
4G/LTE Attacks

Location Tracking

HIGH SEVERITY
Overview

Location tracking attacks exploit LTE protocols and network architecture to determine the physical location of mobile devices without user consent or awareness.

Technical Overview

LTE location tracking can be performed through various methods: paging message analysis, timing advance measurements, cell tower triangulation, or exploiting location services protocols. Attackers can achieve varying levels of precision from cell-level to GPS-accurate positioning.

Impact
Potential consequences of this attack
  • Privacy violations through location surveillance
  • Stalking and harassment enablement
  • Physical security threats
  • Intelligence gathering
  • Targeted attack preparation
Attack Vectors
Methods used to execute this attack
  • Paging message monitoring for presence detection
  • Timing advance measurement for distance calculation
  • Multiple rogue eNodeB for triangulation
  • SUPL protocol exploitation
  • Cell tower database correlation
Attack Methodology
Step-by-step attack execution process
  1. 1Deploy multiple rogue eNodeBs or monitoring stations
  2. 2Trigger paging for target device
  3. 3Measure signal characteristics (timing advance, RSSI)
  4. 4Perform triangulation calculations
  5. 5Correlate with cell tower database
  6. 6Track movement over time
Mitigations & Defense
Protective measures and countermeasures
  • Disable location services when not needed
  • Use location privacy features in OS
  • Monitor for unusual paging activity
  • Use VPN to mask network-level location
  • Implement IMSI/SUPI privacy protection
  • Deploy anti-tracking technologies
Real-World Examples
Known incidents and use cases
  • Law enforcement tracking operations
  • Stalking and domestic abuse cases
  • Corporate espionage and competitor tracking
  • Government surveillance programs
  • Targeted advertising and analytics