{"id":793,"date":"2026-01-30T08:58:31","date_gmt":"2026-01-30T16:58:31","guid":{"rendered":"https:\/\/dornsife.usc.edu\/scribe\/?p=793"},"modified":"2026-01-30T08:58:33","modified_gmt":"2026-01-30T16:58:33","slug":"privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data","status":"publish","type":"post","link":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/","title":{"rendered":"Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data"},"content":{"rendered":"\n\n\n\n\n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--article-hero \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--article-hero\"\n    \n      >\n\n    \n<div class=\"inner-wrapper\">\n          \n<div class=\"f--field f--image\">\n\n    \n    \n    \n    \n    \n    \n              \n      <img\n                            data-src=\"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1-768x432.jpg\"\n          data-srcset=\"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1-1280x720.jpg 1280w,https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1-768x432.jpg 768w\"          data-sizes=\"(min-width:1200px) 75vw, (min-width:768px) 83vw, 100vw\"          class=\"lazyload\"\n        \n                  role=\"none\"\n        \n        \n                                      \/>\n\n    \n    \n  \n  \n\n<\/div>\n  \n  \n  <div class=\"text-wrapper\">\n    \n              \n<div class=\"f--field f--page-title\">\n\n    \n  <h1>Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data<\/h1>\n\n\n<\/div>\n    \n    \n           <strong class=\"author-field\"><span >By<\/span><a href=\"mailto:zserrano@usc.edu\">Zayanna Serrano<\/a><\/strong>\n    \n          <span class=\"post-date-field\">January 30, 2026<\/span>\n      <\/div>\n<\/div>\n\n\n  <\/div><\/div>\n\n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--social-share \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--social-share\"\n    \n      >\n\n    \n  <div class=\"content-wrapper\">\n    <span class=\"a2a_kit a2a_kit_size_32 addtoany_list\" style=\"line-height: 32px;\">\n      <span class=\"title\">\n        Share\n      <\/span>\n                        <a class=\"a2a_button_copy_link\" target=\"_blank\" href=\"\/#copy_link\" rel=\"nofollow noopener\" title=\"Link\">\n            <span class=\"a2a_svg a2a_s__default a2a_s_copy_link\">\n              <svg height=\"19\" viewBox=\"0 0 19 19\" width=\"19\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m7.43475275 9.52380952-2.17490843 2.26076008c-1.08745421 1.058837-1.68841575 2.518315-1.68841575 4.0350275 0 1.5167124.60096154 2.9475732 1.68841575 4.0350274 1.058837 1.0874543 2.51831502 1.6884158 4.03502747 1.6884158 1.44087681 0 2.80427251-.5423678 3.86936601-1.5289606l.1656615-.1594552 2.2321428-2.2321428-1.6311813-1.6311813-2.2321429 2.26076c-.6581959.658196-1.5167124 1.0016026-2.43246332 1.0016026s-1.7742674-.3434066-2.43246337-1.0016026c-.65819597-.6581959-1.00160257-1.5167124-1.00160257-2.4324633 0-.8547009.2991453-1.6595442.87416905-2.2981957l.12743352-.1342677 2.23214286-2.2321429zm6.88661855-.40736607-5.26116068 5.26116075 1.61881868 1.6188186 5.2611607-5.2611607zm1.3837569-5.54501488c-1.4408768 0-2.8042725.54236779-3.869366 1.52896062l-.1656615.15945513-2.23214282 2.23214286 1.63118132 1.63118132 2.2321429-2.23214286c.6581959-.65819597 1.5167124-1.00160256 2.4324633-1.00160256s1.7742674.34340659 2.4324634 1.00160256 1.0016026 1.51671246 1.0016026 2.43246337c0 .85470089-.2991453 1.65954419-.8741691 2.29819559l-.1274335.1342678-2.2321429 2.2321428 1.5739469 1.5739469 2.2321429-2.2321428c1.0874542-1.058837 1.6884157-2.5183151 1.6884157-4.03502751 0-1.51671245-.6009615-2.94757326-1.6884157-4.03502747-1.058837-1.08745421-2.518315-1.68841575-4.0350275-1.68841575z\" transform=\"translate(-3 -3)\"\/><\/svg>\n            <\/span>\n            <span class=\"a2a_label visually-hidden\">Copy Link<\/span>\n          <\/a>\n                                <a class=\"a2a_button_facebook\" target=\"_blank\" href=\"\/#facebook\" rel=\"nofollow noopener\" title=\"Facebook\">\n            <span class=\"a2a_svg a2a_s__default a2a_s_facebook\">\n              <svg height=\"19\" viewBox=\"0 0 19 19\" width=\"19\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m23.9512 6h-16.9024c-.57923625 0-1.0488.46956375-1.0488 1.0488v16.9024c0 .5792362.46956375 1.0488 1.0488 1.0488h9.10024v-7.34768h-2.46772v-2.87584h2.46772v-2.11508c0-2.45404 1.49872-3.79012 3.68828-3.79012.7389668-.00263323 1.4775241.03516995 2.21236.11324v2.56348h-1.51392c-1.18788 0-1.4174.56544-1.4174 1.39612v1.8316h2.84772l-.37088 2.87584h-2.47684v7.34844h4.83284c.5792362 0 1.0488-.4695638 1.0488-1.0488v-16.9024c0-.57923625-.4695638-1.0488-1.0488-1.0488z\" fill-rule=\"evenodd\" transform=\"translate(-6 -6)\"\/><\/svg>\n            <\/span>\n            <span class=\"a2a_label visually-hidden\">Facebook<\/span>\n          <\/a>\n                                <a class=\"a2a_button_twitter\" target=\"_blank\" href=\"\/#twitter\" rel=\"nofollow noopener\" title=\"X\">\n            <span class=\"a2a_svg a2a_s__default a2a_s_twitter\">\n              <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\"\n\t y=\"0px\" viewBox=\"0 0 30 30\" enable-background=\"new 0 0 30 30\" xml:space=\"preserve\" width=\"19\" height=\"19\">\n<path fill=\"#000\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M14.5,16.2l-0.8-1.1l-6.3-9h2.7l5.1,7.3l0.8,1.1\n\tl6.6,9.4h-2.7L14.5,16.2L14.5,16.2z M16.9,13.4l7.4-8.7h-1.8l-6.5,7.5L11,4.8H5l7.8,11.4L5,25.2h1.8l6.8-7.9l5.5,7.9h6L16.9,13.4\n\tL16.9,13.4z\"\/>\n<\/svg>\n\n            <\/span>\n            <span class=\"a2a_label visually-hidden\">X<\/span>\n          <\/a>\n                                <a class=\"a2a_button_linkedin\" target=\"_blank\" href=\"\/#linkedin\" rel=\"nofollow noopener\" title=\"Linkedin\">\n            <span class=\"a2a_svg a2a_s__default a2a_s_linkedin\">\n              <svg height=\"19\" viewBox=\"0 0 19 19\" width=\"19\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m25 21.4220779c0 1.974026-1.6038961 3.5779221-3.5779221 3.5779221h-11.84415582c-1.97402598 0-3.57792208-1.6038961-3.57792208-3.5779221v-11.84415582c0-1.97402598 1.6038961-3.57792208 3.57792208-3.57792208h11.84415582c1.974026 0 3.5779221 1.6038961 3.5779221 3.57792208zm-14.5584416-12.21428569c-.98701295 0-1.60389606.61688311-1.60389606 1.48051949-.12337663.8636364.49350649 1.4805195 1.48051946 1.4805195.987013 0 1.6038961-.6168831 1.6038961-1.4805195 0-.86363638-.6168831-1.48051949-1.4805195-1.48051949zm1.3571429 12.70779219v-8.6363636h-2.83766234v8.6363636zm10.2402597 0v-4.9350649c0-2.5909091-1.3571428-3.8246753-3.3311688-3.8246753-1.4805195 0-2.0974026.8636363-2.4675325 1.4805194v-1.2337662h-2.8376623v8.6363636h2.8376623v-4.9350649c0-.2467532 0-.4935065.1233767-.7402597.1233766-.4935065.6168831-.987013 1.4805194-.987013.987013 0 1.4805195.7402597 1.4805195 1.974026v4.564935z\" transform=\"translate(-6 -6)\"\/><\/svg>\n            <\/span>\n            <span class=\"a2a_label visually-hidden\">LinkedIn<\/span>\n          <\/a>\n                                <a class=\"a2a_button_bluesky\" target=\"_blank\" href=\"\/#bluesky\" rel=\"nofollow noopener\" title=\"Bluesky\">\n            <span class=\"a2a_svg a2a_s__default a2a_s_bluesky\">\n              <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50px\" height=\"50px\" viewBox=\"0 0 24 24\">\n                <path fill=\"#00000\" d=\"M12 10.8c-1.087-2.114-4.046-6.053-6.798-7.995C2.566.944 1.561 1.266.902 1.565C.139 1.908 0 3.08 0 3.768c0 .69.378 5.65.624 6.479c.815 2.736 3.713 3.66 6.383 3.364c.136-.02.275-.039.415-.056c-.138.022-.276.04-.415.056c-3.912.58-7.387 2.005-2.83 7.078c5.013 5.19 6.87-1.113 7.823-4.308c.953 3.195 2.05 9.271 7.733 4.308c4.267-4.308 1.172-6.498-2.74-7.078a8.741 8.741 0 0 1-.415-.056c.14.017.279.036.415.056c2.67.297 5.568-.628 6.383-3.364c.246-.828.624-5.79.624-6.478c0-.69-.139-1.861-.902-2.206c-.659-.298-1.664-.62-4.3 1.24C16.046 4.748 13.087 8.687 12 10.8\"  fill-rule=\"evenodd\" \/>\n              <\/svg>\n            <\/span>\n            <span class=\"a2a_label visually-hidden\">Bluesky<\/span>\n          <\/a>\n                                <a class=\"a2a_button_email\" target=\"_blank\" href=\"\/#email\" rel=\"nofollow noopener\" title=\"E-mail\">\n            <span class=\"a2a_svg a2a_s__default a2a_s_print\">\n              <svg height=\"12\" viewBox=\"0 0 18 12\" width=\"18\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m8.14285714 9.42857143c-.17142857 0-.34285714 0-.51428571.08571428l7.28571427 6.34285719c.3428572.2571428.6857143.2571428.9428572 0l7.2857142-6.34285719c-.0857142-.08571428-.2571428-.08571428-.4285714-.08571428zm-1.28571428 1.11428567v.1714286 8.5714286c0 .6857143.6 1.2857143 1.28571428 1.2857143h14.57142856c.6857143 0 1.2857143-.6 1.2857143-1.2857143v-8.5714286c0-.0857143 0-.0857143 0-.1714286l-7.2 6.3428572c-.7714286.6857143-1.8857143.6857143-2.6571429 0z\" fill-rule=\"evenodd\" transform=\"translate(-6 -9)\"\/><\/svg>\n            <\/span>\n            <span class=\"a2a_label visually-hidden\">Email<\/span>\n          <\/a>\n                  <\/span>\n  <\/div>\n\n  <\/div><\/div>\n \n\n\n\n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <p><span style=\"font-weight: 400;\">With smartphones and sensors continuously recording human movements in real time, there are emergent risks for geospatial data collections that present systemic risks that extend well beyond the traditional understandings of privacy. This unprecedented rate of data collection has created one of the most all encompassing and least understood security challenges of the technological era. Smart phones, mobile phone apps, advertising software development kits (SDKs), and the Internet of Things (IoT) sensors generate extraordinarily detailed records of individuals\u2019 movements. These data streams are funneled into the commercial ecosystem of aggregators and data brokers who complement a massive centralized database of mobility information. This sensitive information is capable of pinpointing the routes, relationships, and behaviors of millions of individuals. A tool that was originally a resource for navigation has now doubled as a tool for behavioral surveillance, whose risks go beyond traditional privacy concerns.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Location data, in particular, is uniquely sensitive not only in terms of where individuals move to but also, what relations can be exposed from those movements. For example, an individual\u2019s health status, political engagement, religious activities, and relationships can be drawn out from such data collection. In a study conducted with the MIT Media Lab, researchers found that location data are highly susceptible to re-identification: \u201cjust four spatiotemporal points are sufficient to identify 95% of individuals within a dataset\u201d (de Montjoye et al., 2013). Anonymity in this way, even in anonymous data, appears to be a difficult task due to the uniqueness of individual mobility traces. These issues are further exacerbated by a vulnerability in the data supply chain, which can range from permissive app features to a lack of regulation in the data broker markets (Shilton &amp; Greene, 2019). As a result of a vulnerable data supply chain,<\/span><\/p>\n<p><span style=\"font-weight: 400;\">geospatial data has become a valuable commodity to be exploited not only by advertisers and commercial analytics, but also for law enforcement and malicious actors (Fellow, 2022). These threats with a weak system pose a great danger to individuals. Security failures involving location data have left individuals vulnerable to stalking, discrimination, and violence. It has also disclosed visits to reproductive healthcare clinics and undermined national security by exposing military personnel\u2019s movement patterns and base perimeters through fitness-tracking apps (Childs, 2023; FTC, 2022). These incidents underscore how seemingly routine mobility data can lead to dire circumstances in the development of this data, particularly when it reaches many hands without proper scrutiny. This paper investigates three major questions: (1.) How is location data particularly susceptible to identification? (2.) What systemic security failures and real-world incidents illuminate the vulnerabilities in the location data ecosystem? and (3.) What technical and policy interventions could be done to mitigate them?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ultimately, while it appears that geospatial data has legitimate use in navigation, logistics, and urban planning, it seems that in this current data supply chain where data is gathered, stored, and traded, there are still major security risks. This is where coordinated technical reforms through enhanced differential privacy protections, data-minimization requirements, and secure designs combined with policy actions, are urgently needed to reduce systemic risk and safeguard both individual rights and collective security.\u00a0<\/span><\/p>\n<ol>\n<li><b> The Geospatial Data Collection Ecosystem\u00a0\u00a0<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Modern geospatial data collection operates through an expansive and often unclear technological ecosystem. At the most fundamental layer of the ecosystem, mobile operating systems (OS) signals continuously provide location data through GPS, WiFi scanning, and<\/span><\/p>\n<p><span style=\"font-weight: 400;\">bluetooth. These signals provide precise tracking even when users are not actively using location-based services.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Research in human-computer interaction reveals that OS-level data flows are often difficult for users to detect, as multiple apps use location data through operating system permissions. These permissions are frequently misunderstood or accepted without scrutiny (Devaraja &amp; Patil, 2025). This lack of transparency in location based services allows mobility traces to be collected in the background without explicit user awareness. Numerous mobile apps use advertising software development kits (SDKs) that harvest precise GPS data under the guise of providing analytics, personalization, and targeted advertisement features. Studies of the mobile advertising ecosystem revealed that SDKs massively collect data beyond usage, while in turn has a separate data market for mobility traces with no relation to the mobile application (Shilton &amp; Greene, 2019). These SDKs can also transmit detailed movement patterns to numerous third-party developers. This enables cross application aggregation and long-term profiling. Beyond smartphones, other Internet of Things (IoT) devices also form an additional layer for mobility trace data. A number of IoT devices collect location data in a passive manner using their companion apps or embedded sensors. This further expands the scope of mobility trace surveillance. IoT environments further exacerbate this transparency issue, as users are unaware of what data devices gather, how frequently they transmit it, and to who (Devaraja &amp; Patil, 2025).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The location data typically moves through a multilayered pipeline consisting of application developers, SDK providers, data aggregators, and finally, large-scale data brokers. Cell phones use GPS and network-based location information. This data proceeds from individual apps to embedded SDKs, which then transmit the data to aggregators that pool<\/span><\/p>\n<p><span style=\"font-weight: 400;\">information from thousands of other sources. These aggregators clean, label, and enrich the data that is eventually sold to location data brokers. These brokers, working with minimal transparency or regulatory oversight, help commercial firms develop behavioral models and long-term movement patterns for millions of individuals. Their means of gaining revenue from this data involve offering location-based advertising, developing foot-traffic analytics for retail industries, and offering products that are closely related to surveillance (Thompson &amp; Warzel, 2019). Through this system, everyday mobility traces are transformed into lucrative commodities, without explicit user awareness or consent.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This data is usually stored in large cloud services such as Amazon Web Services (AWS), which offer scaling but also present substantial security risks. This area of data management also lacks regulation, with most individuals being uninformed about how their everyday online activities result in long-term data storage, processing, and reselling. This data goes beyond being used for ads and analytics, as it also finds use in government institutions and law enforcement. According to the ACLU, government institutions and law enforcement have at times circumvented warrant requirements by buying commercially available location data instead of requesting it from telecom providers (Fellow, 2022). Such access raises significant privacy concerns, since such bulk of mobility data can reveal sensitive behaviors, associations, and patterns of daily life.\u00a0<\/span><\/p>\n<p><b>III. Why Is Geospatial Data Uniquely Susceptible to Identification?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Geospatial data contains a high susceptibility to re-identification due to its uniqueness. This uniqueness arises from the mobility traces that are extremely distinct. Even when datasets are anonymized, unique patterns act as quasi-identifiers, which render it feasible to make inferences about an individual with minimal information. According to MIT\u2019s Media Lab, it was<\/span><\/p>\n<p><span style=\"font-weight: 400;\">feasible to identify 95% of individuals through using four spatiotemporal points from a user\u2019s smartphone. In the MIT study, researchers were able to find the health record of the governor of Massachusetts simply by using a healthcare database and a voters list (de Montjoye et al., 2013). This means that mobility traces are a form of behavioral fingerprint, which has become continuous, unique, and easily traceable to the people who created them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The re-identifiability of location data matters because mobility patterns enable highly sensitive personal inferences. A series of visits to places of worship, political events, or community organizing spaces, for example, can expose an individual\u2019s beliefs and associations. This raises concerns about the freedom of speech and assembly. Medical inferences are equally alarming. As precise location traces can reveal visits to reproductive health clinics, HIV treatment sites, mental health providers, or substance-use programs, can become a form of exploitation. Investigations have shown that commercial data retailers like Acxiom and CoreLogic have sold data sets that revealed visits to abortion clinics and addiction recovery centers, often without users\u2019 knowledge or consent (Bhatia, 2024). Also, location data can reveal information about an individual\u2019s sexual orientation or intimate relationships. This information can heighten risks of stalking, harassment, and domestic violence by revealing home routines and travel patterns. Ultimately, the danger of location data used to re-identification not only lies with identifying a person but also in exposing what they do, where they go, and what they believe in.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Anonymization of geospatial data has been proven unsuccessful in all cases due to properties of location data. High spatial and temporal resolution allows detailed trajectories to be established even without direct identifiers. In other words, properties which make this data so valuable also make anonymization of this data ineffective.<\/span><\/p>\n<ol>\n<li><b> Security Failures in the Location Data Ecosystem\u00a0<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Security failures in the location data ecosystem occur at all layers of the collection and distribution pipeline. The ecosystem starts with the mobile apps that serve as the primary interface for geospatial data collection. Many of these apps have been shown to exhibit poor permission management and excessive location permissions, often retaining background permissions (Wijesekera et al., 2015). These vulnerabilities combined with insecure transmission and storage practices as well as embedded third-party SDKs amplify these problems. All together, it creates a large amount of unregulated data collection pathways that are then used for advertising and analytics SDKs that often harvest precise coordinates, device identifiers, and wireless scans independently of the host app\u2019s stated purpose (Shilton &amp; Greene, 2019).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At the top of the ecosystem, commercial data brokers introduce structural risks with minimal transparency, ineffective security measures, and large-scale aggregation of sensitive geospatial data. Data brokers rarely implement comprehensive security audits and maintain unclear data sharing agreements with advertisers, analytics agencies, and government contractors (Neally, 2021). Studies on mobility datasets makes it clear that there is a risk associated with centralized data ecosystems. A researcher team at Princeton University found that geolocation data created from IoT and maintained on cloud infrastructures is extremely susceptible to inference attacks (Apthorpe et al., 2017). Collectively, these findings show that the structural conditions of commercial data brokerage, such as centralization and lack of transparency, do not have robust security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Real-world incidents underscore the consequences of these systemic weaknesses. The Strava Global Heatmap incident revealed how even \u201canonymized\u201d visualizations can expose sensitive operational information when movement patterns correlate with spatial signatures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Subsequent analysis of the heatmap demonstrated that activity hotspots unveiled the location of military bases, patrol routes, and personnel habits, proving a point that aggregation does not eliminate identifiability (Childs, 2023). Regulatory investigations into data brokers further highlight the risks: for example, the U.S. Federal Trade Commission has documented instances in which data brokers collected and sold location data reflecting visits to medical facilities, religious institutions, and military sites, demonstrating that commercial datasets often reach a level of precision capable of uncovering deeply sensitive behaviors.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Together, these technical failures and real-world incidents illustrate something fundamental: the location data ecosystem is structurally insecure. From apps and SDKs to data brokers and municipal systems, vulnerabilities enable the extraction, aggregation, and misuse of highly sensitive mobility data with profound implications for both privacy and safety. <\/span><b>VI. Evaluation of Technical Approaches to Protect Location Data\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There are five technical approaches that are, rather widely, considered to help mitigate privacy and security risks from location data: the adoption of decentralized\/personal data stores (PDS), on-device computation, differential privacy (DP) applied to mobility, encrypted geofencing and secure multiparty computation (SMPC).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Decentralized personal data stores (PDS) propose a move for raw location data from central servers to user-controlled pods. This will allow services to query or calculate on data without having to extract it, enabling for user consent to be strengthened. Research on PDS architecture shows fundamental challenges related to complex workflows (Fallatah et al., 2023). As a result, PDS models remain promising but difficult to deploy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second approach, on-device\/local computation, retains raw mobility traces on the device but sends aggregated outputs and model updates. This technique is useful for population<\/span><\/p>\n<p><span style=\"font-weight: 400;\">analytics but restricted in its use. It also poses computational and communication challenges\u00a0 (Melis et al., 2019). Further, without extra safety measures, model updates could disclose meaningful information regarding user data via reconstruction attacks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The third approach, Differential Privacy (DP), provides mathematically rigorous privacy guarantees by intentionally introducing noise into either aggregate or model outputs, while constraining the impact of a single user\u2019s location data. But DP cannot be effectively implemented without significantly compromising utility for high-dimensional data as seen in mobility information, which remains an unresolved challenge in the research literature (Gursoy et al., 2017).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The fourth and final possible approach, encrypted geofencing and secure multiparty computation (SMPC), enables the computation of spatial assertions without revealing sensitive coordinates. (Zhao et al., 2019). These tools have great capabilities but are more suited for highly sensitive or regulated contexts.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Comparatively, there is not a single approach that meets the varying challenges sufficiently. Regarding aggregators, on-device computation with secure aggregation and differential privacy offers strong protection with reasonable utility. Ultimately, the most optimal solution would need to combine technical minimization, cryptographic safeguards, differential privacy, and governance measures.\u00a0<\/span><\/p>\n<p><b>VII. Policy, Regulatory, and Governance Solutions\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Although the United States has begun to develop more robust data privacy protections at the state level, existing frameworks remain narrow in scope compared with the European Union\u2019s General Data Protection Regulation (GDPR). California\u2019s California Privacy Rights Act<\/span><\/p>\n<p><span style=\"font-weight: 400;\">(CPRA) expands on the California Consumer Privacy Act (CCPA) by classifying geolocation as \u201cpersonal information\u201d and giving residents the right to limit and correct use of that data in an opt-out consent; however, said protection extends only to California residents and businesses, leaving a large segment of U.S. consumers outside its protection.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In contrast, the GDPR, applies to any personal data of individuals in the EU, regardless of the processor\u2019s location, and it mandates a legal basis for processing. The GDPR also features an explicit opt-in consent. This restraint is beyond the CPRA\u2019s primarily opt-out framework. GDPR\u2019s expansive definition of personal data, including location and device identifiers, coupled with strict purpose limitation, creates stronger baseline protections for mobility data than what CPRA\u2019s more limited regime allows (Mallet, 2025). These differences further show that though CPRA is an advance, it is still narrow in scope and enforcement compared to the GDPR and cannot be comprehensive in dealing with the systemic risks posed by pervasive geospatial data collection.\u00a0<\/span><\/p>\n<p><b>VIII. Conclusion\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As geospatial technologies continue to improve, emerging surveillance markets will increase risks around mobility data. Commercial tracking of political activity, including visits to protests, campaign events, or ideological spaces, will further threaten freedoms. These threats will be further magnified by the continued advance of machine learning. It is now clear that fusing partial mobility traces from different sources can dramatically increase re-identification against apparently anonymized datasets. Trajectory signature learning in inference attacks has shown models to identify individuals and sensitive behaviors with uncanny precision (Liu, et al., 2022). As mobility data become more deeply integrated into IoT infrastructures, these<\/span><\/p>\n<p><span style=\"font-weight: 400;\">capabilities will only expand. Future research must therefore bridge GEOINT, cybersecurity, machine learning, and legal research. Key priorities include evaluating technical protections such as encrypted geofencing and differential privacy against realistic adversarial conditions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In closing, while geospatial data enable valuable public and commercial applications, the systems that collect and monetize mobility traces create structural vulnerabilities that current U.S. practices do not adequately address. Because mobility patterns are uniquely re-identifiable and semantically rich, even \u201canonymized\u201d datasets expose sensitive information about individuals\u2019 health, politics, religion, and relationships. These risks demand both technical minimization and regulatory reforms, from enforcing data minimization and governing data brokers to restricting uses entailing high-risk. The governance of geospatial data is essential not only for privacy, but for civil liberties and national security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Works Cited<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Apthorpe, Noah, and Dillon Reisman. <\/span><i><span style=\"font-weight: 400;\">A Smart Home is No Castle: Privacy<\/span><\/i> <i><span style=\"font-weight: 400;\">Vulnerabilities of Encrypted IoT Traffic<\/span><\/i><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">2017. <\/span><i><span style=\"font-weight: 400;\">Princeton University Department of<\/span><\/i> <i><span style=\"font-weight: 400;\">Computer Science<\/span><\/i><span style=\"font-weight: 400;\">, https:\/\/arxiv.org\/pdf\/1705.06805.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bhatia, Rhea. \u201cA Loophole in the F A Loophole in the Fourth Amendment: The Go th<\/span> <span style=\"font-weight: 400;\">Amendment: The Government&#8217; ernment&#8217;s Unregulated Purchase of Intimate Health<\/span> <span style=\"font-weight: 400;\">Data.\u201d <\/span><i><span style=\"font-weight: 400;\">Washington Law Review<\/span><\/i><span style=\"font-weight: 400;\">, vol. 98, no. 1, 2024, pp. 1-35. <\/span><i><span style=\"font-weight: 400;\">Washington Law Review<\/span><\/i><span style=\"font-weight: 400;\">,<\/span> <span style=\"font-weight: 400;\">https:\/\/digitalcommons.law.uw.edu\/cgi\/viewcontent.cgi?article=1076&amp;context=wlro.<\/span> <span style=\"font-weight: 400;\">Childs, Kevin, et al. <\/span><i><span style=\"font-weight: 400;\">Heat Marks the Spot: De-Anonymizing Users\u2019 Geographical Data<\/span><\/i> <i><span style=\"font-weight: 400;\">on the Strava Heatmap<\/span><\/i><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">2023. <\/span><i><span style=\"font-weight: 400;\">University Raleigh, North Carolina<\/span><\/i><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">https:\/\/www.cise.ufl.edu\/~k.childs\/Papers\/HeatMarksTheSpot.pdf.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">de Montjoye, Yves-Alexandre, and Cesar A. Hidalgo. <\/span><i><span style=\"font-weight: 400;\">Unique in the Crowd: The privacy<\/span><\/i> <i><span style=\"font-weight: 400;\">bounds of human mobility<\/span><\/i><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">2013. <\/span><i><span style=\"font-weight: 400;\">Scientific Reports<\/span><\/i><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">file:\/\/\/Users\/zayannaserrano\/Downloads\/Unique_in_the_Crowd_The_Privacy_Bounds_of<\/span><span style=\"font-weight: 400;\"> _<\/span><span style=\"font-weight: 400;\">Human_Mo.pdf.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Devaraja, Manila, and Sameer Patil. <\/span><i><span style=\"font-weight: 400;\">Understanding User Prioritization and<\/span><\/i> <i><span style=\"font-weight: 400;\">Comprehension of Smartphone Permissions<\/span><\/i><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">2025. <\/span><i><span style=\"font-weight: 400;\">ACM Digital Library<\/span><\/i><span style=\"font-weight: 400;\">,<\/span> <span style=\"font-weight: 400;\">https:\/\/dl.acm.org\/doi\/10.1145\/3743739.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fallatah, Khalid, and Mahmoud Barhamgi. <\/span><i><span style=\"font-weight: 400;\">Personal Data Stores (PDS): A Review<\/span><\/i><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">2023.<\/span> <i><span style=\"font-weight: 400;\">N<\/span><\/i><i><span style=\"font-weight: 400;\">IH National Center for Biotechnology Information<\/span><\/i><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC9921726\/.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fellow, Brennan. \u201cNew Records Detail DHS Purchase and Use of Vast Quantities of Cell<\/span> <span style=\"font-weight: 400;\">Phone Location Data.\u201d <\/span><i><span style=\"font-weight: 400;\">ACLU<\/span><\/i><span style=\"font-weight: 400;\">, 18 July 2022,<\/span><\/p>\n<p><span style=\"font-weight: 400;\">https:\/\/www.aclu.org\/news\/privacy-technology\/new-records-detail-dhs-purchase-and-use of-vast-quantities-of-cell-phone-location-data. Accessed 11 December 2025.<\/span> <span style=\"font-weight: 400;\">\u201cFTC Sues Kochava for Selling Data that Tracks People at Reproductive Health Clinics,<\/span> <span style=\"font-weight: 400;\">Places of Worship, and Other Sensitive Locations.\u201d <\/span><i><span style=\"font-weight: 400;\">Federal Trade Commission<\/span><\/i><span style=\"font-weight: 400;\">, 29<\/span> <span style=\"font-weight: 400;\">August 2022,<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2022\/08\/ftc-sues-kochava-selling-d<\/span> <span style=\"font-weight: 400;\">ata-tracks-people-reproductive-health-clinics-places-worship-other. Accessed 11<\/span> <span style=\"font-weight: 400;\">December 2025.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Liu, Yiyong, et al. <\/span><i><span style=\"font-weight: 400;\">Membership Inference Attacks by Exploiting Loss Trajectory<\/span><\/i><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">2022,<\/span> <span style=\"font-weight: 400;\">ACM Digital Library.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mallet, Pierre. \u201cComparative Analysis of Data Privacy Legislation: Convergence and<\/span> <span style=\"font-weight: 400;\">Divergence Between the GDPR and CCPA.\u201d <\/span><i><span style=\"font-weight: 400;\">Tech Fusion in Business and Society<\/span><\/i><span style=\"font-weight: 400;\">, vol. 3,<\/span> <span style=\"font-weight: 400;\">no. 1, 2025, pp. 465-475. <\/span><i><span style=\"font-weight: 400;\">ResearchGate<\/span><\/i><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">https:\/\/www.researchgate.net\/publication\/390994398_Comparative_Analysis_of_Data_Pr<\/span> <span style=\"font-weight: 400;\">ivacy_Legislation_Convergence_and_Divergence_Between_the_GDPR_and_CCPA.<\/span><span style=\"font-weight: 400;\"> N<\/span><span style=\"font-weight: 400;\">eally, Daniel. <\/span><i><span style=\"font-weight: 400;\">DATA BROKERS AND PRIVACY: AN ANALYSIS OF THE INDUSTRY<\/span><\/i><i><span style=\"font-weight: 400;\"> A<\/span><\/i><i><span style=\"font-weight: 400;\">ND HOW IT&#8217;S REGULATED<\/span><\/i><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">2021. <\/span><i><span style=\"font-weight: 400;\">HeinOnline<\/span><\/i><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">file:\/\/\/Users\/zayannaserrano\/Downloads\/22AdelphiaLJ30.pdf.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Shilton, Katie, and Daniel Greene. <\/span><i><span style=\"font-weight: 400;\">Linking Platforms, Practices, and Developer Ethics:<\/span><\/i><i><span style=\"font-weight: 400;\"> L<\/span><\/i><i><span style=\"font-weight: 400;\">evers for Privacy Discourse in Mobile Application Development<\/span><\/i><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">2019. <\/span><i><span style=\"font-weight: 400;\">Journal of<\/span><\/i><i><span style=\"font-weight: 400;\"> B<\/span><\/i><i><span style=\"font-weight: 400;\">usiness Ethics<\/span><\/i><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">file:\/\/\/Users\/zayannaserrano\/Downloads\/Linking_Platforms_Practices_and_Developer_Et<\/span> <span style=\"font-weight: 400;\">hics_L.pdf.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Warzel, Charlie, and Stuart A. Thompson. \u201cOpinion | Twelve Million Phones, One<\/span> <span style=\"font-weight: 400;\">Dataset, Zero Privacy (Published 2019).\u201d <\/span><i><span style=\"font-weight: 400;\">The New York Times<\/span><\/i><span style=\"font-weight: 400;\">, 19 December 2019,<\/span> <span style=\"font-weight: 400;\">https:\/\/www.nytimes.com\/interactive\/2019\/12\/19\/opinion\/location-tracking-cell-phone.ht<\/span> <span style=\"font-weight: 400;\">ml. Accessed 11 December 2025.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Wijesekera, Primal, and Arjun Baokar. <\/span><i><span style=\"font-weight: 400;\">Android Permissions Remystified: A Field Study<\/span><\/i> <i><span style=\"font-weight: 400;\">on Contextual Integrity<\/span><\/i><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">2015. <\/span><i><span style=\"font-weight: 400;\">USENIX<\/span><\/i><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity15\/sec15-paper-wijesekera<\/span> <span style=\"font-weight: 400;\">.pdf.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Zhao, Chuan, et al. \u201cSecure Multi-Party Computation: Theory, practice and applications.\u201d<\/span> <i><span style=\"font-weight: 400;\">I<\/span><\/i><i><span style=\"font-weight: 400;\">nformation Sciences<\/span><\/i><span style=\"font-weight: 400;\">, vol. 476, no. 476, 2019, pp. 357-372. <\/span><i><span style=\"font-weight: 400;\">Science Direct<\/span><\/i><span style=\"font-weight: 400;\">,<\/span> <span style=\"font-weight: 400;\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0020025518308338.<\/span><\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1036,"featured_media":644,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[26],"tags":[],"class_list":["post-793","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-and-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data - Scribe\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Scribe\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-30T16:58:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-30T16:58:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1640\" \/>\n\t<meta property=\"og:image:height\" content=\"1640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Henry Mcquillan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/\"},\"author\":{\"name\":\"Henry Mcquillan\",\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/#\/schema\/person\/85ae5955a9ba6bb5a1212b7144ce53d3\"},\"headline\":\"Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data\",\"datePublished\":\"2026-01-30T16:58:31+00:00\",\"dateModified\":\"2026-01-30T16:58:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/\"},\"wordCount\":12,\"image\":{\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1.jpg\",\"articleSection\":[\"Policy and Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/\",\"url\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/\",\"name\":\"Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data - Scribe\",\"isPartOf\":{\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1.jpg\",\"datePublished\":\"2026-01-30T16:58:31+00:00\",\"dateModified\":\"2026-01-30T16:58:33+00:00\",\"author\":{\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/#\/schema\/person\/85ae5955a9ba6bb5a1212b7144ce53d3\"},\"breadcrumb\":{\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#primaryimage\",\"url\":\"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1.jpg\",\"contentUrl\":\"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1.jpg\",\"width\":1640,\"height\":1640},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dornsife.usc.edu\/scribe\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/#website\",\"url\":\"https:\/\/dornsife.usc.edu\/scribe\/\",\"name\":\"Scribe\",\"description\":\"USC Dornsife \",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dornsife.usc.edu\/scribe\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/#\/schema\/person\/85ae5955a9ba6bb5a1212b7144ce53d3\",\"name\":\"Henry Mcquillan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dornsife.usc.edu\/scribe\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/96845f55fba7683656b8bbcb8a68b3c951a4e7abf7765d2478782dc73d20fd2b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/96845f55fba7683656b8bbcb8a68b3c951a4e7abf7765d2478782dc73d20fd2b?s=96&d=mm&r=g\",\"caption\":\"Henry Mcquillan\"},\"url\":\"https:\/\/dornsife.usc.edu\/scribe\/author\/hmcquill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/","og_locale":"en_US","og_type":"article","og_title":"Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data - Scribe","og_url":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/","og_site_name":"Scribe","article_published_time":"2026-01-30T16:58:31+00:00","article_modified_time":"2026-01-30T16:58:33+00:00","og_image":[{"width":1640,"height":1640,"url":"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1.jpg","type":"image\/jpeg"}],"author":"Henry Mcquillan","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#article","isPartOf":{"@id":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/"},"author":{"name":"Henry Mcquillan","@id":"https:\/\/dornsife.usc.edu\/scribe\/#\/schema\/person\/85ae5955a9ba6bb5a1212b7144ce53d3"},"headline":"Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data","datePublished":"2026-01-30T16:58:31+00:00","dateModified":"2026-01-30T16:58:33+00:00","mainEntityOfPage":{"@id":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/"},"wordCount":12,"image":{"@id":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#primaryimage"},"thumbnailUrl":"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1.jpg","articleSection":["Policy and Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/","url":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/","name":"Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data - Scribe","isPartOf":{"@id":"https:\/\/dornsife.usc.edu\/scribe\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#primaryimage"},"image":{"@id":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#primaryimage"},"thumbnailUrl":"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1.jpg","datePublished":"2026-01-30T16:58:31+00:00","dateModified":"2026-01-30T16:58:33+00:00","author":{"@id":"https:\/\/dornsife.usc.edu\/scribe\/#\/schema\/person\/85ae5955a9ba6bb5a1212b7144ce53d3"},"breadcrumb":{"@id":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#primaryimage","url":"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1.jpg","contentUrl":"https:\/\/dornsife.usc.edu\/scribe\/wp-content\/uploads\/sites\/491\/2025\/11\/Icon1.jpg","width":1640,"height":1640},{"@type":"BreadcrumbList","@id":"https:\/\/dornsife.usc.edu\/scribe\/2026\/01\/30\/privacy-risks-in-the-collection-brokerage-and-use-of-geospatial-location-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dornsife.usc.edu\/scribe\/"},{"@type":"ListItem","position":2,"name":"Privacy Risks in the Collection, Brokerage, and Use of Geospatial Location Data"}]},{"@type":"WebSite","@id":"https:\/\/dornsife.usc.edu\/scribe\/#website","url":"https:\/\/dornsife.usc.edu\/scribe\/","name":"Scribe","description":"USC Dornsife ","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dornsife.usc.edu\/scribe\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/dornsife.usc.edu\/scribe\/#\/schema\/person\/85ae5955a9ba6bb5a1212b7144ce53d3","name":"Henry Mcquillan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dornsife.usc.edu\/scribe\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/96845f55fba7683656b8bbcb8a68b3c951a4e7abf7765d2478782dc73d20fd2b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96845f55fba7683656b8bbcb8a68b3c951a4e7abf7765d2478782dc73d20fd2b?s=96&d=mm&r=g","caption":"Henry Mcquillan"},"url":"https:\/\/dornsife.usc.edu\/scribe\/author\/hmcquill\/"}]}},"_links":{"self":[{"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/posts\/793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/users\/1036"}],"replies":[{"embeddable":true,"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/comments?post=793"}],"version-history":[{"count":1,"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/posts\/793\/revisions"}],"predecessor-version":[{"id":794,"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/posts\/793\/revisions\/794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/media\/644"}],"wp:attachment":[{"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/media?parent=793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/categories?post=793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dornsife.usc.edu\/scribe\/wp-json\/wp\/v2\/tags?post=793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}