Connect with us

Technology

Reclaim your privacy by disabling your cellphone carrier’s data tracking

Published

on

Reclaim your privacy by disabling your cellphone carrier’s data tracking

We’ve all heard before that our cellphones are listening to us and monitoring our every move. While this has been debunked (or, at least, explained), the fact of the matter is that data tracking is standard practice by the most popular mobile carriers these days.

And still in 2024, even with complaints from users, new tracking methods are continually emerging, making it harder for users to take back control of their data.

So, what do you need to know exactly about how your mobile carrier tracks your data? And how can you reclaim your privacy without having to say goodbye to your mobile carrier altogether?

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Women looking at a phone (Kurt “CyberGuy” Knutsson)

Advertisement

ASK ANY TECH QUESTION, AND GET KURT’S FREE CYBERGUY REPORT NEWSLETTER HERE

What is data tracking, and what do mobile carriers collect?

To start, let’s talk about what “data tracking” actually means. Data tracking is when companies collect information about a user’s online activities, including but not limited to their browsing history, location data, messaging information and app usage.

This data is used directly by the company collecting it or shared with third-party companies to ultimately tailor their advertising to you. (There are other justifications for this, such as “improving services.” But nowadays, targeted advertising is the primary reason, which leads users to feel more and more like their phones are listening in on them.)

Data tracking may look different from one company to the next. When it comes to mobile carriers, they can collect a wide range of information about their users, which is no surprise since, for most of us, our phones are an extension of ourselves. Therefore, it’s important for you to be aware of these practices and actively manage your privacy settings to maintain control over your personal information.

NO MORE MISSED ALARMS: HOW TO CRANK UP YOUR IPHONE’S ALARM VOLUME

Advertisement
WOMAN with iphone

A woman holding an iPhone (Kurt “CyberGuy” Knutsson)

MORE: FCC SLAPS AT&T, VERIZON, T-MOBILE WITH MEGA FINES FOR DATA DECEIT

Different ways mobile carriers collect data

Mobile carriers employ a variety of techniques to gather specific data from their users:

T-Mobile

  • User behavior profiling: T-Mobile analyzes personal data to predict user behaviors and preferences, which can influence future services and marketing strategies.
  • Research support: The carrier shares data to aid public and scientific research initiatives, ensuring that personal identifiers are removed.
  • App usage analysis: Tracks the frequency and duration of app usage to gather insights into user preferences and habits.
  • Advertising personalization: This process collects information on app usage and demographic details to tailor advertisements more closely to the user’s interests.

Verizon

  • Network usage insights: Verizon uses data like web browsing and app usage to offer additional services or upgrades.
  • Aggregate consumer insights: Combines user data with external data to generate insights into consumer behaviors and trends.
  • Customized user experience: Verizon analyzes the websites and apps users engage with to create a more personalized service experience.
  • Marketing optimization: Uses detailed user data to refine and personalize marketing efforts and service offerings.

AT&T

  • Browsing and location tracking: AT&T collects detailed records of users’ web browsing and location to customize ads and offers.
  • Automated decision-making: They employ algorithms to use collected data to make automated decisions that affect the ads and content presented to the user.
  • Demographic and viewing data: Gathers demographic information alongside viewing habits to better understand and segment their user base.
  • Identity verification services: AT&T shares certain data with third parties to facilitate identity verification and fraud prevention measures.

Feeling a bit surprised by all of this? Yeah, we are, too.

person on phone

A person holding a phone (Kurt “CyberGuy” Knutsson)

MORE: AT&T DATA LEAK FROM 73 MILLION CUSTOMERS; WHAT YOU NEED TO DO NEXT

How to turn off data tracking on your device based on your mobile carrier

If you don’t want your mobile carrier to have so much overarching access to your data, there are ways you can stop them. The problem is that most mobile carriers aren’t going to broadcast this information because it’s beneficial for them to maintain this access.

However, that’s why we’re here to help. Managing your data privacy involves understanding the settings available on your mobile device. Below, you will find instructions for disabling data tracking on devices served by the major U.S. carriers – T-Mobile, Verizon and AT&T – as well as a general guide for other carriers.

Advertisement

T-Mobile

To adjust privacy settings on a T-Mobile device:

Log into your T-Mobile account.

  • Navigate to My Account, then click on Profile.
  • Scroll to the bottom and select Privacy and Notifications, then Privacy Dashboard.
  • Here, you can toggle off various options:Share data for public and scientific research: Prevents the use of your data for external research projects.Analytics and reporting: Stops the aggregation of your usage data for business reports.Advertising options: Limits personalized ads based on your app usage and other collected data.Profiling and automated decisions: Opt out of data usage for profiling purposes.Do not sell or share my personal information: Ensure your data is not sold or shared externally.
  • Share data for public and scientific research: Prevents the use of your data for external research projects.
  • Analytics and reporting: Stops the aggregation of your usage data for business reports.
  • Advertising options: Limits personalized ads based on your app usage and other collected data.
  • Profiling and automated decisions: Opt out of data usage for profiling purposes.
  • Do not sell or share my personal information: Ensure your data is not sold or shared externally.

Additionally, T-Mobile offers a separate app to limit data shared with third-party advertisers through the Magenta Advertising Platform.

Verizon

To manage privacy settings on a Verizon device:

  • Log into your Verizon account.
  • Go to Account, then Account Overview and select Edit Profile and Settings.
  • Choose Manage Privacy Settings.
  • You can adjust the following:Customer Proprietary Network Info: Opt out to stop Verizon from using your data to market additional services.Business and Marketing Insights: Disable this to prevent the use of your data for creating consumer insights.Custom Experience and Custom Experience Plus: Opt out to stop personalized marketing based on your web and app usage.
  • Customer Proprietary Network Info: Opt out to stop Verizon from using your data to market additional services.
  • Business and Marketing Insights: Disable this to prevent the use of your data for creating consumer insights.
  • Custom Experience and Custom Experience Plus: Opt out to stop personalized marketing based on your web and app usage.

Resetting the Custom Experience settings will also stop Verizon from using previously collected browsing and location data.

AT&T

To disable data tracking on an AT&T device:

Advertisement
  • Log into your AT&T account.
  • Navigate to Profile, then Privacy Choices.
  • AT&T offers four main toggles you can turn off:Personalized Plus: Stops the use of your location and browsing data for personalized ads.Personalized: Disables automated decision-making using your data.Share or sell my personal information: This prevents AT&T from sharing your data for advertising purposes.
  • Personalized Plus: Stops the use of your location and browsing data for personalized ads.
  • Personalized: Disables automated decision-making using your data.
  • Share or sell my personal information: This prevents AT&T from sharing your data for advertising purposes.

It’s recommended that identity verification be kept active for security purposes.

MORE: TOP AFFORDABLE CELLPHONE PLANS

Other carriers

If you don’t use one of the above mobile carriers, the steps are likely very similar. But if you have any doubts, talk to your mobile carrier directly, perhaps by going into a store or searching online about how to do it for your specific carrier.

  • Log into your account through the carrier’s website or app.
  • Locate the privacy settings or preferences, which may be under sections labeled as Privacy, Security, or Data Management.
  • Review and adjust the settings to limit data tracking as per your preference.
WOMAN on phone

A woman on her phone (Kurt “CyberGuy” Knutsson)

MORE: TIDY UP YOUR TECH: SPRING-CLEANING TIPS FOR SAFEGUARDING YOUR DATA

Strengthen your privacy with a VPN

While disabling carrier tracking is an important step, using a virtual private network (VPN) adds an extra layer of protection for your mobile data. A VPN encrypts all of your internet traffic and routes it through a secure server, shielding your online activities from prying eyes, including your carrier.

With a trusted VPN service, your carrier won’t be able to see which websites you visit, what you search for or the contents of your communications. Your IP address and location will also be masked. Setting up a VPN on your smartphone is easy and affordable, with many top providers offering mobile apps. Just be sure to choose a no-logs VPN with robust encryption that doesn’t sell your data to third parties. Combining VPN protection with disabling carrier tracking maximizes your privacy on the go. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices.

Advertisement

Kurt’s key takeaways

Even as users voice their concerns about their data, mobile carriers are still finding creative arguments to justify what they take and why they take it. It’s more important than ever to take your data into our own hands and utilize these tips to keep your data private as much as possible. Remember, if your data falls into the wrong hands, you have a much higher chance of becoming a victim of a cybercrime.

What do you think about all this data privacy information? Will this information influence how you choose your mobile carrier in the future or how you’ll take control of your data? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on Facebook, YouTube and Instagram.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Philips Hue’s jaunty sunrise smart lamp is called the Twilight

Published

on

Philips Hue’s jaunty sunrise smart lamp is called the Twilight

Philips Hue’s next smart bedside lamp will reportedly be called the “Twilight.” The lamp will feature two buttons on top for power, scene selection, and sleep automation, and it also has LEDs in the back that will feature a sunrise or sunset effect, according to HueBlog.com.

The rear LED and main light, like the Hue Dymera’s top and bottom lights, will apparently be individually controllable, and when triggering its sleep automation, the site says it will simulate a sunset before turning off. It’s not clear yet when — or for how much — Philips will release the Twilight.

Philips might also have a new 5-meter (about 16 feet) lightstrip called the Hue Solo on the way, as it was briefly listed by “a major American retailer” for $89.99 before being taken down, according to a story HueBlog published yesterday. And there is indeed a cached Best Buy Hue Solo product page that describes a “seamless blend of multicolor light in a single LED strip” and says it can be controlled via Bluetooth.

Continue Reading

Technology

FCC names its first-ever AI scammer in threat alert

Published

on

FCC names its first-ever AI scammer in threat alert

Join Fox News for access to this content

You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading.

By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive.

Please enter a valid email address.

Having trouble? Click here.

The first artificial intelligence robocall scammer has been officially named by the Federal Communications Commission. But is it too little, too late? 

After all, Royal Tiger has already gotten away with loads of scams that have impacted millions of Americans.

Advertisement

Let’s talk about what these headlines mean for AI scammers in general, what you still need to be on the lookout for and how to protect yourself from these sophisticated scams going forward.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

A woman receiving a robocall. (Kurt “CyberGuy” Knutsson)

So, who is the Royal Tiger cyber gang?

Royal Tiger is the first robocall gang named by the Federal Communications Commission (FCC). This group is known to use sophisticated techniques in their cyber scams, such as AI voice cloning, to impersonate staff from government agencies, banks and utilities, known as “robocall” scams.

The crew consists of individuals and voice service providers operating from various countries, including India, the U.K., the United Arab Emirates, and the U.S. The group is led by Prince Jashvantlal Anand, who uses the alias “Frank Murphy,” and his associate Kaushal Bhavsar. Anand has served as “CEO” of “U.S.-based companies” like Illum Telecommunication and PZ Telecommunication 

Advertisement

END OF ANNOYING ROBOCALLS? FTC CRACKS DOWN ON DECEPTIVE PRACTICES

What are robocalls and AI scams?

Robocalls and AI scams involve using automated calling systems and artificial intelligence to deceive and defraud individuals. Although there are a few ways to do this, scammers like Royal Tiger are now relying on AI voice cloning to create realistic-sounding voices that impersonate legitimate entities such as government agencies, banks and utility companies.

Generally, these scams involve using certain trick scenarios to take advantage of their victims, like calling about credit card interest rate reductions or fake purchase authorization orders, which enable them to obtain consumers’ financial and other sensitive data from the individuals that they target.

With phone spoofing techniques, it’s possible to make your caller ID actually show a call from these agencies, too, to make it look more legitimate.

man on phone

A man frustrated by a robocall. (Kurt “CyberGuy” Knutsson)

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Advertisement

Is the Federal Communications Commission doing anything about it?

The first step to making scammers public — thus, spreading more awareness about these types of scams — is to publicly name and shame them. That’s what the FCC is attempting to do with Royal Tiger, with the hope that detailing their operations will encourage international action against the scammers. Meanwhile, in the U.S., the FCC aims to disrupt their activities and hold them accountable by sending cease-and-desist letters to companies involved in the operation, such as Illum Telecommunication, PZ Telecommunication and One Eye.

In some cases, the FCC has actually required downstream providers to block traffic from these companies. Additionally, the FCC has classified Royal Tiger and its entities as a Consumer Communications Information Services Threat (C-CIST), due to the significant danger they pose to consumer trust in communications services.

CYBER SCAMMERS USE AI TO MANIPULATE GOOGLE SEARCH RESULTS

What experts have to say

Dr. Ilia Kolochenko, CEO at ImmuniWeb and Adjunct Professor of Cybersecurity at Capital Technology University, commented:

“In 2024, we will probably see a surge of computer-enabled fraud and crimes — which should, however, be distinguished from pure cybercrime — propelled by the ballooning misuse of freely available Generative AI (GenAI) tools and online services. When combined with well-thought-out social engineering campaigns, GenAI can cause unprecedented financial damage in mass-scale phishing or fraud campaigns. For instance, elderly people and other socially vulnerable groups may be perfidiously tricked into paying ‘fines’ for speeding or petty offences that they have never committed.

Advertisement

“Well-prepared fake calls nefariously exploit people’s respect of law enforcement and government, for instance, calling on behalf of the local police or the FBI, citing numerous laws and regulations with some legalese to intellectually disarm and psychologically paralyse their victims. With VoIP, phone numbers can be easily spoofed, so many gangs utilize real phone numbers of law enforcement agencies to increase authenticity of their calls.

“Then the victim may be offered a ‘big favour’ (allegedly available only to first-time offenders) to pay the fine online or even by sharing their credit card details via phone — instead of traveling to the police station or local court. Sadly, most victims will readily pay. Worse, quite some will keep the event confidential, truly thinking that they did something bad and were lucky to avoid harsher penalties.”

HOW TO STOP PHONE NUMBER SPOOFING AND PROTECT YOURSELF FROM SCAMMERS

How to take protection into your own hands

While it’s great news that the FCC has taken these measures thus far, groups like Royal Tiger are generally able to move quickly and stay one step ahead, redefining their tactics and becoming more sophisticated. Here are some tips to take matters into your own hands and protect yourself:

Be skeptical of unsolicited calls: Be cautious when receiving unsolicited calls, especially those that request personal information or offer services that seem too good to be true.

Advertisement

Use call-blocking services: Many phone providers offer services to block or screen unwanted calls. Utilize these features to reduce the number of robocalls you receive.

Verify caller identity: If you receive a call from someone claiming to be from a government agency, bank or utility company, hang up and call the official number of the organization to verify the authenticity of the call.

Avoid sharing personal information at all costs: Do not share sensitive information such as Social Security numbers, bank account details or credit card numbers over the phone unless you are certain of the caller’s identity.

Report suspicious calls: Report any suspicious calls to the FCC or the Federal Trade Commission (FTC). Your reports can help these agencies track and take action against scam operations.

Use data removal services: Consider using data removal services to minimize the amount of personal information available online, making it harder for scammers to obtain. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for personal data removal services here.

Advertisement
Woman on robocall

A woman receiving a robocall. (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

While the FCC naming Royal Tiger the first official AI robocall scammer gang is a positive step, sophisticated AI-powered scams exploiting voice cloning and caller ID spoofing will likely surge. We must all remain extremely vigilant — verify any unsolicited calls demanding personal information or payment through official channels, never share sensitive data over the phone and report suspected scams. A coordinated effort from the government, companies, and individuals is crucial to combating these evolving AI-enabled fraud tactics effectively.

What role should AI companies play in preventing their technologies from being misused for nefarious purposes like voice cloning scams? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading

Technology

How Asus claims it’s overhauling customer support after Gamers Nexus investigation

Published

on

How Asus claims it’s overhauling customer support after Gamers Nexus investigation

ASUS now has a new inbox called “executivecare@asus.com” that they have created specifically to re-process prior RMAs that customers feel were unfairly classified, were misclassified, or charged for a service that should be free

ASUS has published a timeline for improvements: June 14th, today, is the publication of this email and template. ASUS has promised us an email this month with other changes.

ASUS has committed to refunds of service charges for unnecessary repairs which customers felt compelled to accept in order to have a warranted repair covered, such as unrelated or misclassified CID [Customer Induced Damage]

ASUS has committed to refunding shipping charges in scenarios where a warranted repair was part of the RMA. For clarity, if a customer has both an out-of-warranty repair and an in-warranty repair in the same claim, shipping will be covered by ASUS

ASUS has committed to refunding labor and taxes related to these aforementioned qualifying disputes

Advertisement

ASUS has created a Task Force team to retroactively go back through a long history of customer surveys that were negative to try and fix the issues

ASUS has removed the power from the repair centers to claim CID. Now, CID claims must go through ASUS’ team. This will remove some of the financial incentive to fail devices. There still is one, but now it won’t be motivated as much by speed

ASUS is creating a new support center in the US. This will enable customers to choose between a repair of their board or a faster swap with a refurbished board. This solves an issue where refurbs were the only option in some scenarios previously

After over a year of refusing to acknowledge the microSD card reader failures on the ROG Ally, ASUS will be posting a formal statement next week about the defect, resulting from this series

ASUS will publish a more transparent repair report template in September of 2024

Advertisement

ASUS is changing the Advance RMA language to reduce emphasis on physical damage

Continue Reading

Trending