New Apple AirTag Can Be Used to Stalk Victims

Apple has installed weak anti-stalking measures in the AirTag, but tracking devices from other manufacturers have even fewer, if any, security features.

New Apple AirTag Can Be Used to Stalk Victims

Apple recently launched its AirTag, which is a small device that can be attached to keys, backpacks, cars, wallets and other personal items.

According to Apple:

“AirTag is a supereasy way to keep track of your stuff. Attach one to your keys, slip another in your backpack. And just like that, they’re on your radar in the Find My app, where you can also track down your Apple devices and keep up with friends and family.”

While AirTag can help people keep track of their belongings, according to CyberNews, it has the potential for misuse by stalkers.

The magazine conducted an experiment on the device and found it makes it easy for someone to track a person without his or her knowledge.

During the experiment, the device was placed in the victim’s backpack. The victim (who knew she was being tracked) was using an Android phone, which, according to CyberNews, works with AirTags “only with limited capacity.” For two hours, the magazine tracked the victim’s location.

The AirTag only gave away its presence by starting to beep three days after the experiment began. (The audible alarm is a security feature built into the device by Apple.) The beep was quiet and short in duration (15 seconds), and might not be noticed by a real victim, especially if the device is in a noisy environment.

“It proves that you can follow a person at least for a couple of hours without him/her suspecting anything,” the magazine claims.

The Washington Post conducted a similar experiment and also found the device to be a convenient tool for stalkers. Their experiment used an iPhone, and the victim was tracked (with his permission) for a week from across the San Francisco Bay.

“These are an industry-first, strong set of proactive deterrents,” Kaiann Drance, Apple vice president of iPhone marketing, said in an interview with the Washington Post. “It’s a smart and tunable system, and we can continue improving the logic and timing so that we can improve the set of deterrents.”

At least Apple is implementing some security on its AirTags. According to the Post, manufacturers of other devices have done little or nothing to prevent misuse of their products so far.

About the Author

Robin Hattersley Gray

Robin has been covering the security and campus law enforcement industries since 1998 and is a specialist in school, university and hospital security, public safety and emergency management, as well as emerging technologies and systems integration. She joined CS in 2005 and has authored award-winning editorial on campus law enforcement and security funding, officer recruitment and retention, access control, IP video, network integration, event management, crime trends, the Clery Act, Title IX compliance, sexual assault, dating abuse, emergency communications, incident management software and more. Robin has been featured on national and local media outlets and was formerly associate editor for the trade publication Security Sales & Integration. She obtained her undergraduate degree in history from California State University, Long Beach.

Read More Articles Like This… With A FREE Subscription

Campus Safety magazine is another great resource for public safety, security and emergency management professionals. It covers all aspects of campus safety, including access control, video surveillance, mass notification and security staff practices. Whether you work in K-12, higher ed, a hospital or corporation, Campus Safety magazine is here to help you do your job better!

Get your free subscription today!

Subscribe Today!

One response to “New Apple AirTag Can Be Used to Stalk Victims”

  1. Let’s imagine that the suspect pus a tag on a device/ suitcase / handbag worn by an unsuspecting “carrier” – That will work in whatever the scenario – I have tracked people on and off Flotels / Oil platforms – and used them to track visitors into/out of a facility – or assets. The only solution is for the unsuspecting person to have a RF field around them when they are “out” that overpowers the weak field that the tag can use or generate.

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters
Campus Safety Conference Ed Spaces Registration Open Promo Campus Safety HQ