NSA warns of exposing location data
Connecting state and local government leaders
In a cybersecurity advisory, the National Security Agency warned mobile device users that they could be inadvertently revealing their location and risking missions.
The National Security Agency is reminding users of Defense Department and other national security systems used for intelligence or military missions to be sure their mobile devices and computers are not exposing location data.
In an Aug. 4 cybersecurity advisory, NSA warned users of the risks inherent in using connected devices that employ Bluetooth and Wi-Fi and transmit and receive cellular signals that can be used to identify the location of a mobile device even without provider cooperation.
"When location exposure could be detrimental to a mission, users should prioritize mission risk and apply location tracking mitigations to the greatest extent possible," the guidance states. “It can reveal details about the number of users in a location, user and supply movements, daily routines (user and organizational), and can expose otherwise unknown associations between users and locations.”
NSA is also concerned about the proliferation of location and personal data on applications and social media networks, noting that even taking privacy settings into account, "information [on social networks] may be exposed to a wider audience than intended." The guidance also reminds users that the content of pictures and certain metadata encoded in photographs can also yield location data.
NSA advises users to take certain steps, including disabling connectivity and location settings when not in use and operating in airplane mode when devices are not in use. Additionally, location data sharing should be turned off for the device and for individual apps, including those that rely on location data such as mapping, traffic and fitness trackers. Additionally, NSA advises tuning privacy settings to limit advertising tracking, turning off any "find my phone" settings that allow for the remote pinpointing of devices and using an anonymizing virtual private network to shield location information.
This article was first posted to FCW, a sibling site to GCN.