If You Think Your Location Is Being Tracked
A quick guide for disabling tracking across phones, apps, vehicles, and wearables.
If Your Location Is Being Tracked
Phone Settings
These options focus on your device itself. Changing settings can affect maps, ride apps, and other services, so consider what will be noticed.
- Check location services:
- Open your phone’s main Settings.
- Look for “Location,” “Privacy,” or “Security & Location.”
- Note what is turned on before changing anything.
- Decide whether to turn location off completely or only for specific apps.
- Review system-level location features:
- Check for options like “Find My iPhone,” “Find My Device,” “Device Locator,” or “Find My Mobile.”
- See what accounts (email, cloud, family) are connected to these tools.
- Consider whether someone else knows those account logins or passwords.
- If it is safe, change passwords and enable two-factor authentication using a safe email or number.
- Look for account sharing:
- Check services like “Family Sharing,” “Location Sharing,” or “Shared with Family.”
- See if your location is shared with another person’s account.
- Consider whether turning off sharing would be noticed or questioned.
- If you change sharing settings, note the date and time for your own records.
- Check recent location access:
- In many phones, you can see which apps recently used location.
- Look for any app or service you do not recognize.
- Search the app name online to understand what it does.
- Consider uninstalling or disabling suspicious apps if that feels safe and not easily detectable.
App / Location Permissions
Apps can track where you go, sometimes in the background. These options help you review and adjust that access.
- Review app permissions:
- Open Settings > Apps (or “Applications” / “App Management”).
- Open the permissions or “App permissions” section.
- Check who can use “Location,” “Nearby Devices,” and “Bluetooth.”
- Look for:
- Navigation or map apps you rarely use.
- “Phone cleaner,” “booster,” or “security” apps you did not install.
- Apps disguised as calculators, notes, or utilities that ask for location.
- Any app installed shortly before you noticed tracking or monitoring.
- Adjust location access:
- Set location to “Never,” “Ask every time,” or “While using the app” rather than “Always,” where possible.
- Consider leaving commonly-used apps (like maps or rideshare) unchanged if noticing a change would cause questions.
- Check connected accounts inside apps:
- Open apps that often use location (maps, social media, messaging, family locator apps).
- Review “Location,” “Live Location,” “Share My Location,” or similar settings.
- See if you are in any “circles,” “groups,” or “family” tracking spaces.
- Consider whether it is safer to leave these as-is, change who can see your location, or pause sharing temporarily.
- Sign-ins and linked devices:
- In your main email or cloud account, look for “Devices,” “Security,” or “Where you’re signed in.”
- Note any devices or sessions you do not recognize.
- If safe, sign out of unknown devices and change your password from a device you trust.
Car / GPS Devices
Tracking can happen through built-in vehicle systems, add-on GPS units, or hidden devices. Some steps can be done on your own, and some may be better handled by a trusted professional.
- Built-in car systems:
- Check the car’s main screen for menus like “Navigation,” “Connected Services,” or “Account.”
- Look for:
- Saved accounts or driver profiles in someone else’s name or email.
- Connected phones that are not yours.
- “Share trip” or “Share location” options.
- Consider whether removing another person’s account or phone from the car would be noticed.
- Plug-in and stand-alone GPS units:
- Check:
- Under the dashboard near the steering wheel.
- In the OBD-II port (often under the steering column) for devices that look like add-ons.
- Power sockets and USB ports for unfamiliar devices.
- If you find an unknown device, you can:
- Take clear photos of how and where it is connected.
- Record serial numbers or labels.
- Consider getting advice from a trusted mechanic or advocate before removing it.
- Check:
- Hidden or battery-powered trackers:
- Common areas to visually scan:
- Glove compartment, storage bins, and under seats.
- Seat pockets and trunk compartments.
- Wheel wells or magnetized areas under the car (if safe and accessible).
- Options if you suspect a tracker but cannot find it:
- Ask a trusted mechanic to inspect the vehicle and note anything unusual.
- Use that information when planning routes, appointments, or leaving the area.
- Common areas to visually scan:
- Planning around possible tracking:
- Assume travel in that vehicle may be observed when:
- Going to legal appointments, medical visits, or support services.
- Meeting with advocates or talking about your plans.
- Consider using a different vehicle, public transport, or ride services arranged from a safe device for sensitive trips.
- Assume travel in that vehicle may be observed when:
Smartwatches
Smartwatches can share GPS, health, and movement data. They are often linked to a phone or cloud account that another person may control.
- Check what account the watch is using:
- Open the companion app on your phone (for example, Watch, Wear OS, or brand-specific app).
- Confirm which email or account name is listed.
- Note if the account belongs to someone else or is shared.
- Review location and sharing features:
- In the watch app and on the watch, look for:
- “Location,” “GPS,” or “Share Location.”
- “Family setup,” “Guardian,” or “Parent” controls.
- “Emergency sharing,” “SOS contacts,” or “Trusted contacts.”
- See whether your routes, workouts, or location are visible to others.
- In the watch app and on the watch, look for:
- Connection to another phone:
- Some watches send data to the phone that originally set them up.
- If that phone is not under your control, the other person may see:
- Location history or maps of your movements.
- When the watch is on or off your wrist.
- Options if the watch feels unsafe:
- Leave the watch behind when going to sensitive appointments or locations.
- Turn off location or airplane mode if that will not raise questions.
- Consider resetting the device only if it will not create conflict or alert the other person.
Emergency Safe Device
A “safe device” is any phone, tablet, or computer that another person cannot easily access or control. It can be useful for planning, communication, and research that you do not want monitored.
- Options for a safer device:
- A low-cost prepaid phone paid for with cash or a separate account.
- A device kept outside the home (for example, at work or with a trusted person).
- Public computers in libraries or community centers, used with care for privacy.
- Setting up the safe device:
- Create a new email account that:
- Does not use names or details others can guess.
- Uses unique, strong passwords not used on other accounts.
- Turn off automatic syncing with any shared or old accounts.
- Review location settings and app permissions from the start.
- Create a new email account that:
- Using the safe device:
- Use it for:
- Searching for legal information, housing, or support options.
- Communication with trusted contacts, advocates, or services.
- Storing copies of important documents in secure cloud storage.
- Avoid logging into shared accounts that might connect it back to monitored devices.
- Log out after each session, especially on public computers.
- Use it for:
- Storing and explaining the device:
- Keep the device where it will not be discovered if that is a concern.
- Consider what explanation you might use if the device is noticed (for example, work or school use).