How To Make Sure Your Photos Are Not Giving Out Your Homes Location

Not many people know how much information is attached to the photos that they take and put online. This is called exif data. Depending on the device taking the photo this can range from the device model to the name of the owner and the GPS location the photo was taken.

If you enjoy this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the site.

Most social media sites scrub this data before you photo is attached to your profiles or posted but you should not depend on them to do it or count on it to to work. In addition you are still submitting this information to them to do with as they please or sell to whoever they please.

Recently we came across a post craigslist when searching the cars for sale for a client. We saved a picture to send them and when we went into our photos app the photo was organized by location. This is because the camera/phone that took the picture had GPS location turned on and embedded the data into the picture file. A criminal could take this information and potentially use it to find the location of the car or where the owner lives in order to steel the car or otherwise target the owner.

Make sure you scrub this information from your pictures before you put them online or send them to anyone (you don’t know what they are going to do with it after you send it to them.) There are may methods that you can use to do this but the most reliable is a dedicated app. There are both mobile and desk top apps made specifically for this purpose.

OTHER METHODS

Screen Shot Method: Open the picture full screen on your device and take a screen shot. This essentially duplicates the picture and none of the original exif data is present. You still however may have some exif data attached but it will almost always be less.

Messenger Method: Some secure messengers will wipe data from files that you send to others. You can then re-download the file from the message thread and the exif data will be gone. Test your messenger with a thread to someone you trust to make sure the data is removed before relying on this method.

New apple IOS Spoofing: Newer apple devices and some that have received recent updates, now allow you to manually change or add certain exif data that is attached to images on the device. This is intended to organization and data base use for individuals who take a lot of photos and video but can just as easily be used to spoof certain data for security and disinformation purposes.

Desktop/Mobile Apps: Dedicated apps can be found on all platforms mobile and desktop for the specific purpose of removing exif data but just like with the messengers, test and verify before you rely on anything.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the site.

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram

Why You Should Be Networking

Networking has been given a bad name. Most people think of it as meeting in some dining haul and throwing business cards at each other for a couple hours and then going home. True networking is as far from this as could be and it should really be known as relationship building.

If you want to support us take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here and Get the most out of our posts by subscribing to our telegram

This relationship building is one of the corner stones that HUMINT operations are built on. whether it’s an intel operative in a foreign country or a patrol officer working his own city. One of the first things the good ones do is start developing relationships. These relationships allow them to keep a finger on the pulse of the area they are working.

Building a network is just as important in every day life but that is amplified when traveling, especially if you are traveling solo, or in times of disaster or crisis. Your network can tell you where the good restaurants are, which neighborhoods to avoid, and are more likely to lend you a hand if something goes wrong.

It’s better to be known than to be a stranger especially if you are somewhere new that you don’t know well. If you’re a stranger people might be suspicious of you, but if they know you they might give you the benefit of the doubt. This can be good if a large emergency or crime is committed as it might keep you from being public enemy number 1 just because they don’t know you and can keep you from becoming a target of their criminals because you have some connection to the locals.

Network building is pretty simple in theory. Build relationships right? Most of us can do this on a natural basis somewhat effectively if all the conditions are right but when we set out to do it deliberately it tends to not work out as well.

This is because most people don’t fully understand the patterns and behaviors that are established in our instincts when it comes to building relationships but whether it’s for business, intelligence, or your personal life, if you want to be successful at anything you need to be deliberate in your actions.

Like so many things it starts with research and planning. You need to know what your goals are for your network. If it’s for business what are your business goals, who can help you achieve them and if you don’t know the people who can help you, who do you know that does? Map it out if you have to and start there.

Most networks consist of three kinds of people, your inner circle(your most trusted contacts or friends) long term contacts(your vetted, People that will look out for you and vice versa.) and short term contacts(your acquaintances/intel sources) They may owe you a favor, or just be someone you just met that hasn’t moved up the ladder yet.

Short term contacts are just what they sound like short term. These are the people that you have recently met, maybe you haven’t vetted them completely enough to make them long term contacts yet, or you just haven’t found a way to work them into your network in more long term way.

These are the people that you maybe threw a bone and did them an easy favor and now they owe you one, or a trade show rep you just met and had drinks with, or maybe the B&B owner who just let you into the property. They may be able to open some doors or point you in the right direction on something if you need it.

You wont spend as much time or effort maintaining the relationship with these contacts but they are good to keep in some contact with as you never know when you might have a need they can help you with, vice versa, or how they could wind up as a long term contact someday.

On the security side this is where you do need to be careful as this is where you have the best chance of stopping insider threats before they start. Trade shows and other events where you will be meeting these new contacts are usually a hunting ground for corporate espionage agents as they are always looking to gain access to some form of insider information that they can either sell to the highest bidder or take back to their own company.

Someone at the hotel or air B&B might be feeding marks to a thief ring or worse.

Long term contacts, these are those you have vetted and given strategic positions in your network. They maybe business partners, friends, they could be your family members, and trusted intel sources but you still may not trust them completely And most of them are not in your inner circle.

These people support you, and protect you and you them. You can generally depend on them but they may or may not drop everything to help you if you need it and vice versa. You’re regularly in contact with them and you may even spend some of your personal time with them.

From the security stand point as you don’t trust these people implicitly you should remain careful what you say around them and monitor what they have access to as this is where they would likely start having access to the more critical information or access to you or your business. This is where some damage can be done in one way or another if a threat has made it this far.

Your inner circle, is where you have your most trusted friends and business contacts that you trust implicitly. This does provide a security risk as they will have the most access to you and any private information, however you should have vetted them and established a tight enough relationship that you trust them in this position. Provided you are careful, only the long cons, very good liers, and people with good back stories or resources should make it this far as threats. The major threat you need to be carful of is people within this circle becoming compromised to the point that someone can control their actions.

You should always strive to have at least a couple super connectors in your network. Especially when you’re growing a business network.

Super connectors are people that either intentionally or as a side effect of their situation (profession or socially) are connected to a large number of individuals in a variety of bubbles (industry or location), professions, or social circumstances.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here and Get the most out of our posts by subscribing to our telegram

Escape Route Planning and Methods

Whether it’s a route out of a building or out of a city, you should have escape routes planned in case something happens. We recommend you follow the P.A.C.E method. Meaning a Primary, Alternative, Contingency, and Emergency. You should know the fastest ways out of the building your in a probable safe location outside where you can regroup, and route out of the neighborhood or city depending on the situation. You want alternatives as well should the problem at hand be between you and your primary exit.

 

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the

Get Out of The Building

Your primary could be a typical exit such as main doors, your secondary could be a door out a different side of the building. Exits that you can use for a low profile exit as well. While you Contingency and Emergency route could also be windows or loading docks etc. Something that under non emergency circumstances might raise eyebrows.

Make sure you remain flex-able, No plan survives contact with the enemy. You might make it al the way to your exit right as a second threat appears there and you need to move for a different one.

Out of the area

This could be the neighborhood or the city it is basically the same process. You should know the area you’re in or at least be somewhat familiar. Know the main paths out as well as some alternates that are less used. Figure out the routes that are going to get congested and avoid those routes in escape route planning. Apply this same process to roads and highways for the city itself.

Have at least one route going in a different direction than the rest incase the direction of your routes is compromised from a wildfire, earthquake, civil unrest or alien landing.

Also consider alternative modes of transportation when you are considering routes. For example at just about any major city all the roads or going to grid lock but maybe you have a major water way that you have access to with a boat or you have access to small recreational vehicles like dirt bikes or ATVs that can take routes cars cannot.

When to leave

Should also be considered. Some events you can see coming and you can get out before the rush such as wildfire. Maybe the neighborhood down the road is evacuating but you have not been notified yet. You have no absolute need to stay there at the moment and you can leave and stay at a family members property. You might consider leaving as there is no down side to getting out early.

Non Typical Routes and Transportation

You don’t need to stick to roads, sidewalks, or “designated paths” You can cut through buildings, parking lots, parks, or maybe a hiking trail starts near you and crosses a road farther down that you can then use or hitch a ride. Can you swim? Jump in the river and use the current to float away from the threat, the skies the limit. Transportation can be more than just your feet or your car, if you have an office maybe put a bike in there as a back up, maybe you work on the coast and a marina is close by where you can dock a small boat or store a canoe, kayak or paddle board. If it moves and can carry you it could be a form of transportation in an emergency.

Conclusion

Make sure that you have Primary, Secondary, and at least a Contingency if not also an Emergency, route out of your buildings, and cities. Apply the same PACE plan to modes of transportation if you can. If you can take your car great if not maybe you have a bike in your office, a boat at the marina and as a last resort….RUN

 

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram channel

Scavenge a Vehicle

You should always have an emergency kit of some kind in your vehicle. This could be a dedicated kit for your vehicle, you Get home bag, or a combination there of, but there are some scenarios where this is either not enough. Maybe you’re in a long term survival scenario and your kit is depleted and you come across a vehicle that has been abandoned. Maybe your kit was stolen as the incident kicked off, or maybe your vehicle is broken down in a remote location and you need to take what you can before you try to make it out your self.

If you enjoy our site take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the site.

 

Whether it’s your own vehicle, or one someone has abandoned, there is a host of items that can and should be scavenged from a vehicle in a survival situation.

Now you wont have to worry about legal issues when it is your own vehicle but before you go and tear apart a vehicle you think is abandoned be sure that either the entire system is collapsing and you wont have to worry about legal repercussions anymore anyway or the situation is bad enough that your actions will be justified. In the event that they are not you may face criminal charges or have to deal with it in civil court for destruction and theft.

First things first, check the floors, under the seats, the trunk and the glove compartments. Glove compartments can be found in the dash between or under seats and some times built into the rear seat of cars. Depending on time span and how fast and the bad the emergency came on there might still be good things left out in the open or in the glove compartments.

Start picking it a part.

Start with the battery if you can, this can help prevent in accidental sparks or depleting it by crossing wires as you take other parts out. You will need either a wrench, players or wire cutters in order to disconnect the battery. The battery can be used to start fires, charge devices,
jump another car, or even weld if you have multiple batteries. Make sure to look for and take the jumper cables if there are some.

Next is the jack and tools. You probably found these when you were doing your first pass through but look for them now if you havn’t. The lug wrench can make a decent pry-bar or a blunt weapon. You will need it and the jack to remove the tires. The jack can also be used to lift or spread apart objects in an improvised rescue or to gain entry or exit form a building. You may also find an assortment of other tools that could come in handy depending on what the vehicle came with or what the previous owner had in the vehicle.

Once you have some tools you can start pulling out the rest of the good stuff

Fuel can be worth its weight in gold in a survival situation. From a great barter item in long term catastrophes or less developed countries to an aid in fire starting in a more short term incident. Obviously if your vehicle shares the same fuel type you can use it there. Gasoline can also be used as a solvent. In order to get the fuel out of the vehicle you will need to either siphon it out with a hose/tube or a purpose made shaker siphon or pierce the tank and let the fuel pour out. Either way you will need a container of some kind to capture and carry the fuel.

Tires beyond the obvious possible use as another spare tire, tires make great smoke signals when burnt. You will need the Jack and lug wrench from earlier to remove the tire, the fuel you scavenge earlier can be added to aid them along as well. Make sure to puncture or let the air out of the tire before lighting them to avoid an explosion that can lead to injury or extinguishment of your fire.

Carpet from the floor boards, trunk liners, and floor mats as well as padded fabric from seats can be used for sleeping mats, blankets, or shelter insulation in cold environments. A knife will be necessary in order to remove most of it in a timely fashion.

Mirrors whether the rear view or side mirrors can make great rescue signals due to their typically high quality. Some survivors have also used them as a fire starter. If you are by your self they can also be used to aid in a self medical examination such as looking for ticks, leaches etc. They could also be used to check corners, or over walls in an urban survival scenario.

Lights and Wire may take longer to remove in some cases but if you have the extra time could be a good get. Pliers, wire cutters or a screwdrivers could be necessary. If you can harvest both the bulbs and the wire you can provide lighting either for signaling or just to make life easier at night. if you can remove the head light assembly intact it can use as an improvised spot light.

Seat belts can easily be cut free with a knife but are still extremely strong. They make great straps or cordage with a limitless list of uses. Make sure that you pull them as far out as possible and cut them as close to the end as possible in order to get them as long as possible.

Oil like fuel will need a container to carry it in and can be added to fire for smoke for signaling or to lubricate equipment if its relatively clean.

Spark plugs can be removed if you have sockets or wrenches depending on the engine. You can break the ceramic off the ends and use them as throwable for window breakers to prevent injury to your self if you need to break a window.

Miscellaneous

Given enough time ad the proper tools you could potentially take an entire vehicle a part. But some extra odds and ends you should consider is bolts, screws, and other pieces of hardware. That are easily removed or that could serve an immediate need. body panels for shelter or possibly making a sled. The only limitations to what you can do are your needs, tools, ingenuity and available time.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the site.

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram.

Emergency Travel Safe Havens

Rarely does catastrophe strikes or a threat emerge at an opportune time. This means you may be away from your home, or bug out location when it becomes necessary for you to take shelter or hold up somewhere till it blows over, the threat dissipates or you find a way to deal with it. These locations would be a safe haven or safe house.

Safe houses are pre established clandestine facilities usually setup in relatively public or easily accessible areas. The public owner records are usually done in a way to not give away the true owner of the property to allow for more privacy and security. There is usually a high financial bar to clear to set this up and will not be an option for most people but are an example of the best possible option. These are designed for both emergency and planned stop off scenarios usually with a cache of emergency supplies.

Now some options for the average person are…

Embassies(when traveling over seas): in most cases embassies are a haven for the embassy’s citizens from the reach of the host territory in extreme instances. The grounds of the embassies are considered the soil of the embassy’s country where the host nation has no jurisdiction. They are also usually afforded a decent security detail with reinforcements not too far away if needed in case of unrest or host country collapse. Now as we have seen in an ever growing list of incidents however your home country coming to the rescue is not a guarantee and you should always expect to have to self rescue and have a plan to get out on your own.

Places of business or civil service buildings that are open to the general public as self service spaces, are minimally staffed or require little interaction with them to be present. This can range from libraries, internet cafes and churches to homeless shelters, or train/bus stations, airports, and in some short term cases hotel lobbies.

Vehicles are most effective for active evasion. They serve as transportation and temporary shelters. This can be your car or a rental car or bug out vehicle but can also be

airplanes, buses, boats, trains and so on. Each of which may have different privacy and security considerations you will need to consider.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram or Matrix/element rooms ​

 

How to Secure Your Valuables at the Beach

At very crowded beaches it is not unusual to see a beautiful women walking along the beach, distracting the beach goers(usually men just saying)

What most people do not see is the the small crew following slightly behind her and off to the side snatching what they can from anyone who is side tracked by the beautiful view. This is a petty theft version of the honey pot which is a tactic that is used in almost every aspect of society. Ranging from business sales to criminal activities to espionage, it boils down to the age old adage, “Sex Sells”

Now whether orchestrated as a honey pot or not the majority of thefts when traveling are going to happen at the beach even if the beach is in your home town. Average beach goers are often distracted by one thing or another or leaving their valuables unattended to take a dip in the ocean.

Swim wear is not usually good for carrying an EDC or any other items more than maybe a set of keys and there is little to no way to truly secure belongings, however there is things you can do to better your odds.

Personally I have never been big on the whole go to the beach to sit around thing so I recommend getting off the beach and exploring more whether thats the urban areas or the wild areas is up to your. No for the people that “Have” to go to the beach, Most consultants advise only taking to the beach that which you are willing to loose, I agree to a point, but as I have covered before I am not a fan of leaving your stuff unattended in your room either especially if that is your passport or other important documents.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram or Matrix/element rooms ​

 

Urban GHB

Being crisis “proof” is a misnomer, crisis resistant is a more accurate description. Regardless becoming that way is more about your mind set, your skills, and your ability to handle stress.

Generally I recommend splitting the gear into what you carry on you and what you carry in your GHB (get home bag) In my case in the colder seasons I pull some stuff out of my GHB and put in my jacket as well. We covered EDC in a past post to this one will revovle around your GHB

GHB/GO BAG

I use a Mystery Ranch 3day assault pack right now for my GHB. It is not too out side the base line for areas in my usual life while getting the size, organization and durability that I Look for in a pack.

Water: A titanium/steel non-vacume bottle is best because you can use it to boil water if needed.

24hrs of calories: Power bars, Freeze dried food, MRE etc. For the average person would range between 2200-2500 calories. In an emergency situation or if your stuck in the elements you’ll want 3000-3500.

All black shemagh: Shemaghs offer a number of uses beyond being a scarf. In urban environments they typically stand out however and the all black pattern finds a balance to my satisfaction. I still keep it in by pack and out of site unless being used.

Backup lighter and fuel: A zippo lighter in a pyrovault with an additional capsule of fuel.

Roll of quarters: when grasped in a fist this can offer some more umph to your punches as well as can be used for pay phones or vending machines if needed

2 locking carabiners with a length of either 8mm cord or climb spec tubular webbing: This can be used for a host of reasons including creating a harness and using for escape from multi story buildings in case of fire or other incidents.

Headlamp: Allows for hands free light if needed

GPS + paper map: 2 is one one is none, this GPS should use standard batteries that you can scavenge if need be and you wont rely on having to recharge like your watch. Always have a low tech way of navigation as well and know how to use it.

Full size lensatic compass

Back up communications: This can be a beartooth, gotenna, Ham radio, a DIY Lora device like meshtastic or a combination. I currently use beartooth with Iphone but am looking into a DIY device. I also recommend having an un activated burner phone on an alternate network than your primary phone with what ever minute cards etc required to activate them in a time of need.

Change of cloths +/- a hat: Make these clothes match the base line but be different colors or shades than what you are currently wearing. This gives you quick change capability. If you don’t wear a hat bring one to throw on if needed. Bonus points if you choose clothes that can also just be added as an additional layer if you get caught in bad weather. I also carry a small compressible rain layer.

Additional assorted small escape/bypass tools:

Fixed blade knife if not on your person (check local laws)

Battery pack/spare batteries and charging cords for all devices you carry. You can also find small solar panels for recharging if you are in a blackout or more rural scenario

Faraday bag(s) for any of the electronic device in your bag as well as for stashing your phone if needed.

Headphones: Hands free comms or in minor scenarios for podcasts or music when delayed. They can also be used to appear less threatening if you appear to be paying attention to them and not the world around you.

Deck of cards or some form of analog entertainment: If stranded or delayed when traveling and don’t want to or cant run down your batteries or maybe you want to play a friendly game of cards with the stranger at the cafe.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to some of the articles we post here.

Get the most out of our posts by subscribing to our telegram or Matrix/element rooms ​

 

 

Testing Faraday Bags

Always remember Trust but Verify! You should never blindly trust anyone or any piece of equipment. Always vet, test and verify anything before you put your trust in it and even then depending on the situation you may not want to trust it completely, but hey I have trust issues (I think they are warranted) so take that with a grain of salt.

Today we are specifically talking about faraday bags. Faraday bags are made from a special fabric that blocks, or limits the ability of wireless signals to pass through it. In most case people use these to completely block signals from going to the device to either protect from tracking, hacking, or in the case of law enforcement to stop suspects from remotely wiping seized devices.

Now a lot of faraday bags on the market are not actually designed to completely block these signals but only to limit them and that is because these bags specifically are designed to lessen the signals in order to offer a layer of protection against the health issues related to wireless signals but still allow the devices to function so that you can still use them.

This means that if you are looking for a faraday bag for privacy or security reason you should look for ones specifically designed for this task as well as test them before relying on them.

There are two general ways to test a faraday bag, We will start with the quick and dirty.

The quick and dirty method requires a second device and really only works with communications devices such as phones You will need another, what ever you are planning to put in the bag, If thats a radio then you need a second radio if thats a phone then you need a second phone. You will place the one you plan to use the bag for in the bag and then attempt to contact it with the second one.

In the case of a phone if your using blue tooth devices their connections should disconnect which can tell you if the blu tooth is blocked as well.

As you can probably imagine this method is limiting as it doesn’t test GPS and may not necessarily test wifi connections depending on how your phone is set up at the time as well as is limiting when you are wanting to test devices that you may work in this manner.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram or Matrix/element rooms ​

 

Atmospheric Shifts

“Atmospheric Shifts are like ripples in a pond caused by the splashing of a stone, atmospheric shifts are the emotional and situational reactions to a development in a situation” ~ Patrick Horne/Jason Riley

An atmospheric shift is the environment around you reacting to a change within it. This can be a new person entering the area, something said, or something done. We see things like this on a daily basis. For instance, a group of office employees are chatting in the break room when their hardass boss walks in. They go from talking to silent, and sitting to heading back to their desk. This would be an atmospheric shift caused by the boss entering the room.

Another example would be those scenes in the movies we have all seen where the gang or group of soldiers rolls into a neighborhood and every one starts scurrying away as the shop owners start closing up and locking shutters.

Now the change in atmosphere is only the indicator, what changed the atmosphere is what you need to become aware of as it is what likely going to pose the threat. Did a group of gang members just walk into the food court that sent most people to the exits or did your friends suddenly stop laughing when you’re doing your imitation of your boss? or maybe its something as small as you see someone running but they don’t look like they should be, maybe they are wearing a dress instead of exercise cloths, then you see another person running. Look around, are they running from someone else, are they running towards a taxi, or is Godzilla a couple blocks down you get the point

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram or Matrix/element rooms ​

 

Phone locations can be tracked without GPS

The location of your phone can be tracked even If your GPS is turned off, and used to track your location. This is done by a method triangulating the phone using cell towers and the signal from them in called Radio Direction Finding.

Quick defense tactic to counter this tracking is a faraday bag, get yours here and support our site in the process

When your phone connects to a cell tower the cell tower generally can tell what general direction your phone is from that tower based on the strength of the connection in different directions. This is the same concept of how wildlife tracking collars have used for decades and how the FCC tracks down pirate radio stations, this is because “cell service” is really just a radio signal sent out from the tower, same as any radio station, or hand held radio just on a different frequency.

The result of this is a general direction/heading from that tower that your phone could be found. With typical cell phones now the signal sent out by the cell tower is a wide beam
that spreads out and gets weaker over distance, imagine a cone with the wide end extending out from the tower.

Now if your phone can connect to multiple towers this gives multiple directions/headings that if laid over a map would create a cross point, al be it a wide one where theoretically your phone would be located. Now the more towers your phone can connect to the more accurate the location will be because the
the area within that cross point where your phone can connect to all the towers theoretically gets smaller the more towers there are. Now in most areas your phone will connect to 1 or maybe 2 towers with the exception of larger major cities where you may connect to more.

This method can also be used to track location via Bluetooth connection. It was announced a few years ago that the UK was using Bluetooth hotspots in trashcans and other city fixtures to track “traffic patterns” by connecting to peoples phones that walk near them.

Any device that uses cell service or any radio frequency, can be tracked in this fashion, Tablet, Car, laptops, smart watches, ham radio, etc. If it has cell service or uses radio frequencies, it can be tracked by radio direction finding.

S2_Underground has a great video on Radio direction finding on their #lbry channel.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram or Matrix/element rooms ​