AirTag Stalking: How Can You Avoid It?

  • By Greg Brown
  • Published: Jan 03, 2023
  • Last Updated: Jan 04, 2023

AirTag Stalking

Cyberstalking has taken on a life of its own with the internet, email, and other similar forms of communication. Predators no longer need to map out a target’s routine; they simply attach an electronic tracking device and maliciously harass another person. 

Apple AirTags burst onto the scene in April of 2021 as a way to track items such as car or home keys, luggage, and other personal belongings. When first introduced, AirTags was met with plenty of optimism, letting users track third-party items and other Apple devices.

AirTags are small Bluetooth-enabled transmitters providing location information back to iPhones. Surprisingly, Hedy LaMarr (1914-2000), a beautiful Austrian-American actress, pioneered the technology that one day would form the foundation of wi-fi, GPS, and Bluetooth communication. LaMarr’s inventive genius was largely ignored in favor of her stunning good looks.

There are several options if you are in the market for a Bluetooth tracking device. A significant factor that sets Apple’s device apart from the others is its Precision Finding technology. The precision finding feature offers directional instructions on an iPhone display, guiding users to their lost AirTag. Tap the “Play Sound” button within the Find My app to locate the missing AirTag.

AirTag Stalking

AirTags, SmartTags, and similar button-sized Bluetooth-enabled devices are now used by stalkers, car thieves, and child predators. Billed as a cheap means of tracking small personal items, law enforcement worldwide began receiving complaints about the trackers hidden in luxury cars and luggage.

The more sophisticated technology has become, the easier it is for predators to misuse it. Unfortunately, when a new device or technology hits the market, companies do not take the issue seriously and fail to address the accusations.

On the other hand, Apple has moved aggressively to address these issues and listen to each new complaint. Apple began new software updates, helping iPhone users to become more aware of unknown AirTags that may be following them. 

Eva Galperin, Director of the Electronic Frontier Foundation, says, I was concerned ahead of their release as soon as I figured out how they worked. I was concerned very shortly after they were released when I started seeing reports of stalking and being contacted by people who were being stalked using these devices,”

Is an AirTag Following You?

AirTags and a few AirPods are part of Apple’s “Find My” network. Once you have set up your device, any unwanted tracking and location mechanism is displayed on the Items tab within the Find My app.

According to Apple, if unwanted tracking tiles are moving with you over time, iPhones notify their owner in one of two ways:

  1. To ensure you receive alerts on your iPhone, AirPods, or iPad, go to location services under the privacy tab. Turn on the Location Services feature.
  2. If AirTags are not with their owner for some time, the device will emit an alert when it’s moved. 

Stop an AirTag from Following You

If the Precision Finding app does not locate the unwanted tracking device, there are a few other options. The first step is physically looking for the device inside a car or luggage. Remember, the AirTag must be moving to send out a signal. Look inside pockets and bags, and thoroughly examine your car.

AirTags have two technologies to track locations. 

  1. Near-Field Communications (NFC) allows a device within a few feet of each other to communicate wirelessly. NFC is also useful for pairing a device, and from the iPhone 11 on, the NFC reader can pull up a URL from the AirTag. 
  2. Ultra-wideband is used for longer distances and location tracking.

Bluetooth Scanner

AirTags emit a Bluetooth signal regularly, and scanners cannot identify an AirTag specifically. Apple has made it impossible to identify an AirTag because the device regularly changes its Bluetooth signature. However, these simple apps can give you a lay of the land around your location. Some Bluetooth tracking tiles will label themselves in the broadcast.

Opt-Out of the Find My Network

AirTag’s technology is not revolutionary but relies on older tracking devices to get a Bluetooth signal to the owner. There is no built-in GPS; instead, the signal piggybacks off other nearby devices to get a signal to its owner.

Disabling the Find My network app prevents Bluetooth-enabled devices from tracking you. Unfortunately, this removes your ability to track your own AirTag device. 

AirTag Serial Numbers

Owners can include the AirTag’s serial number and phone number when setting up their devices. If you come across an unwanted AirTag, the serial number can help track the intrusion. There is no direct link from the AirTag, and owners are not notified in any way.

To find the serial number, tap the notification on the paired iPhone. A webpage opens and shows the serial number. 

Any unwanted tracking leaves a trail of information. An AirTag requires a device for pairing, a compatible iPhone or iPad, and an iCloud account. 

Disable the AirTag

Apple uses end-to-end encryption, which protects all location information sent from the device to an iPad, iPhone, or MAC. Remove the battery if you have found an unwanted AirTag and obtained all the information available. Once the AirTag’s battery has been removed, all location information is no longer visible.

On the back of the AirTag, push down and twist counterclockwise. Take the back cover off and remove the battery. 

Keep Yourself Protected and Aware of the Dangers

how to prevent airtag stalking

Apple AirTags and similar Bluetooth tracking devices are great little gems for people who forget or lose everything. Keys, luggage, and cars in large parking lots have found a home for AirTags.

Unfortunately, criminals always take what is useful and turn it into a nightmare. Law enforcement is well aware of the cars being stolen with AirTags attached; what is frightening are the stalkers going after children and women.

Plenty of reports have surfaced where Bluetooth-enabled devices are attached to a woman’s car or a vehicle with children. No matter how safe a person tries to be, predators get around the rules, finding a way to attack the unsuspecting.

About the Author
IDStrong Logo

Related Articles

How To Make Your IG Account Private

There are occasions when it makes more sense to have a private Instagram (IG) account. You might w ... Read More

Windows 10 Privacy Settings You Should Change Now

Privacy is a buzzword we hear a lot these days in the wake of data breaches, Wikileaks, and other ... Read More

How to Delete Your Facebook Account

It might seem absurd to some people who live on Facebook, deleting your Facebook account. But, man ... Read More

How to Change Network From Public to Private On Windows

Privacy has become a major concern for many of us after reading about all the data breaches, hacki ... Read More

Twitter Security and Privacy Settings Made Simple

With data breaches and ransomware intrusions in the news daily, privacy is the word on everyone&rs ... Read More

Latest Articles

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

What is Bait and Switch Scams: How it Works and How to Avoid It

What is Bait and Switch Scams: How it Works and How to Avoid It

Ever follow an ad featuring limited-time products to a company's web page only to find they're selling something else entirely?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close