Home > Internet > Mobiles and Laptops as a Tracking Device

Mobiles and Laptops as a Tracking Device

By: Jack Claridge - Updated: 18 Dec 2010 | comments*Discuss
Mobiles And Laptops As A Tracking Device

In today’s fast moving, fast paced society there are very few of us who do not own a laptop or a mobile telephone. In fact recent figures show that at least one in three of us owns a mobile while one in five of us owns a laptop computer.

This is of course excellent for the individual who spends their time whizzing from important business meeting to important business meeting but this trend of owning the newest and most up to date technology has a down side as well.


You may not be familiar with the term and you may not even know it happens but it does happen often. ‘Toothing’ is a form of hacking which involves very little effort on behalf of the hacker; indeed he or she may have to do nothing more than stand within the same radius as you.

’Toothing’ involves using a separate bluetooth device to attach to your mobile telephone or laptop without you even knowing it is happening. And when this has happened the hacker has complete access to the information stored on your laptop’s hard drive or your mobile’s memory card, leaving you open to identity theft without your knowledge.

Your privacy is important and you should do what you can to protect it so when using your laptop outdoors unless you are using the internet wirelessly disable your laptop’s bluetooth connection.


Nearly all mobile telephones on the market today have some form of GPS (Global Positioning Satellite) software in them which sends a signal to a satellite orbiting the Earth. This information is then relayed back to the nearest telephone mast as a ‘ping’. This ‘ping’ is a system function which records your last known position and also helps to ensure a constant signal as you are on the move.

This same software can also be found in some laptop computers which useless wireless connectivity to use the Internet. This wireless connectivity or Wi-Fi allows you laptop to latch onto so-called ‘hot spots’ which are open for all to use the Internet wirelessly.

Also this information is relayed to your ISP (Internet Service Provider) so that they can keep check of your usage and also as it has recently become apparent what content you view.

Closing the Gaps

As we have already mentioned it is important to ensure that your wireless devices are protected at all times to reduce the risk of unwanted interference and also breaches to your privacy. Where possible you should ensure that your laptop has encryption always on ensuring that you and only you has access to it and its ports.

The same should apply to your mobile telephone; when using a bluetooth device always ensure that when you have installed the bluetooth device you disallow connectivity from any other device except the one you use. This ensures that no other device can simply attach itself to your handset and allow unauthorised access.

If you are in any doubt as to how to go about safeguarding your equipment in this manner ask your mobile service provider for assistance in making the device singular bluetooth only. You can do this by contacting their customer service number, visiting their website or visiting one of their high street stores.

Also if you are buying a laptop you should ask before you buy as to whether the wireless features can be disabled as and when you need them to be.

You might also like...
Share Your Story, Join the Discussion or Seek Advice..
Why not be the first to leave a comment for discussion, ask for advice or share your story...

If you'd like to ask a question one of our experts (workload permitting) or a helpful reader hopefully can help you... We also love comments and interesting stories

(never shown)
(never shown)
(never shown)
(never shown)
Enter word:
Latest Comments
  • Bunny
    Re: Your Medical Records
    Your medical records are Sensitive Data and the GDPR Data Protection Act doesn't allow sharing without your specific consent. Also, the data…
    20 April 2019
  • Scott
    Re: Do They Have the Right to Use My Photo on Website?
    Our org is asking for a personal photo which they wish to use to have avatar created from Do we…
    17 April 2019
  • MissMystery
    Re: Do They Have the Right to Use My Photo on Website?
    What is the legal standing regarding an ex employer using images containing me as part of their…
    12 April 2019
  • anjohn
    Re: Do They Have the Right to Use My Photo on Website?
    I'm part of a volunteer group in my local area and my son, who started the group, puts photographs on…
    11 April 2019
  • Marie
    Re: Your Medical Records
    I recently requested my medical records from my local gp practise. The practise manager refused to give them to me if I did not reveal my…
    7 April 2019
  • Hgvdriver
    Re: Employee Surveillance
    I work for local council who recently fitted all trucks with cameras we were told that it was to protect us from false claims from the…
    31 March 2019
  • Corkey
    Re: Your Medical Records
    I recently had an ENT appointment as I am suffering from tinnitus, I am now being inundated with advertisements for Tinnitus, someone has…
    31 March 2019
  • I am the storm
    Re: Your Medical Records
    Have tried to change surgeries only to find that the new place appears to have "shredded" my application (according to the receptionist…
    30 March 2019
  • Olivia
    Re: Your Medical Records
    my med. docs have been shared between hospitals without my consent and state that I have calcification in my right lung possibly as a…
    26 March 2019
  • Jomesie8
    Re: Employee Surveillance
    Hi My employer has put cctv behind the bar and inside the social club I work at monitoring employees and customers as well the Secretary…
    25 March 2019