But old phones may not actually turn off, even if they appear to be powered down. For example, Graham said many old "feature phones," even when they were switched off, would have a baseband processor power up every 10 minutes or so to retrieve SMS messages, but not phone calls. "The moral of this is that just because you define the phone as 'off' doesn't mean that it's 100% completely 'off' all the time," he said.
An intelligence agency that could exploit this technological caveat, of course, would be able to track targets without their knowledge, as the Post story makes clear. And thus an entire intelligence ecosystem grew up around related data-collection practices, fed in part by the NSA embedding so-called "tactical cryptologic support teams" within military units and tasking them with collecting data during missions.
Another program, dubbed the Geolocation Cell, or Geo Cell, involved a combined team from the NSA and the National Geospatial-Intelligence Agency. Its purpose was to track targets in real time -- motto: "We Track 'Em, You Whack 'Em" -- so they could be killed using drones.
Grisly stuff, but what about for the rest of us -- meaning, anyone who's not an Iraqi insurgent or suspected terrorist? Numerous NSA surveillance programs have recently come to light thanks to the leaks by former agency contractor Edward Snowden, a Booz Allen Hamilton employee who worked at an agency facility in Hawaii that processes intelligence from around the Pacific Rim. Some of the thousands of documents he removed reveal a panoply of obscurely named, and overlapping, surveillance programs with names such as PRISM (audio, email and video interception), Mainway (traffic analysis of cell phone calls), Marina (Internet traffic analysis) and Nucleon (telephone content interception). Do you now have to worry about the NSA being able to track you even when the cell phone in your pocket has supposedly been powered down?
Predictably, White House and intelligence officials argue that the NSA's surveillance programs are both lawful and designed to avoid collecting data on U.S. residents. Civil liberties advocates, however, have criticized the agency's approach of collecting all possible data, then using search algorithms to attempt to avoid retrieving information about Americans.
But the scale of the data collection and potential for abuse should give us pause. Furthermore, if the NSA can apply its advanced skills to intercept this type of data, it could presage more mundane efforts by companies to track consumers. To wit, the Economist recently reported that Nordstrom was testing a Wi-Fi tracking system from Euclid Analytics, designed to track shoppers who enter or pass by 17 of their stores. The system works by passively watching for smartphones' and laptops' Wi-Fi beacons, thus tracking people without their devices even logging into a store-controlled Wi-Fi network.
Nordstrom posted a public notice near its stores saying that people might be tracked via their smartphones. But should such practices be allowed -- warning or no? And how far of a step is it for retailers to amass data not just about consumers via Wi-Fi, but also about their digital wallets? Tracking people via their smartphones is no less ominous when it's being practiced by a retailer instead of the NSA.
In today's enterprise, the endpoint could be any number of devices operating in any number of locations. With endpoint technology changing so rapidly, what's the best approach to building an effective, enforceable endpoint security strategy that works across the enterprise? Download our Building And Enforcing An Endpoint Security Strategy report today. (Free registration required.)