AirTag Stalking: How Can You Avoid It?

  • By Greg Brown
  • Published: Jan 03, 2023
  • Last Updated: Jan 04, 2023

AirTag Stalking

Cyberstalking has taken on a life of its own with the internet, email, and other similar forms of communication. Predators no longer need to map out a target’s routine; they simply attach an electronic tracking device and maliciously harass another person. 

Apple AirTags burst onto the scene in April of 2021 as a way to track items such as car or home keys, luggage, and other personal belongings. When first introduced, AirTags was met with plenty of optimism, letting users track third-party items and other Apple devices.

AirTags are small Bluetooth-enabled transmitters providing location information back to iPhones. Surprisingly, Hedy LaMarr (1914-2000), a beautiful Austrian-American actress, pioneered the technology that one day would form the foundation of wi-fi, GPS, and Bluetooth communication. LaMarr’s inventive genius was largely ignored in favor of her stunning good looks.

There are several options if you are in the market for a Bluetooth tracking device. A significant factor that sets Apple’s device apart from the others is its Precision Finding technology. The precision finding feature offers directional instructions on an iPhone display, guiding users to their lost AirTag. Tap the “Play Sound” button within the Find My app to locate the missing AirTag.

AirTag Stalking

AirTags, SmartTags, and similar button-sized Bluetooth-enabled devices are now used by stalkers, car thieves, and child predators. Billed as a cheap means of tracking small personal items, law enforcement worldwide began receiving complaints about the trackers hidden in luxury cars and luggage.

The more sophisticated technology has become, the easier it is for predators to misuse it. Unfortunately, when a new device or technology hits the market, companies do not take the issue seriously and fail to address the accusations.

On the other hand, Apple has moved aggressively to address these issues and listen to each new complaint. Apple began new software updates, helping iPhone users to become more aware of unknown AirTags that may be following them. 

Eva Galperin, Director of the Electronic Frontier Foundation, says, I was concerned ahead of their release as soon as I figured out how they worked. I was concerned very shortly after they were released when I started seeing reports of stalking and being contacted by people who were being stalked using these devices,”

Is an AirTag Following You?

AirTags and a few AirPods are part of Apple’s “Find My” network. Once you have set up your device, any unwanted tracking and location mechanism is displayed on the Items tab within the Find My app.

According to Apple, if unwanted tracking tiles are moving with you over time, iPhones notify their owner in one of two ways:

  1. To ensure you receive alerts on your iPhone, AirPods, or iPad, go to location services under the privacy tab. Turn on the Location Services feature.
  2. If AirTags are not with their owner for some time, the device will emit an alert when it’s moved. 

Stop an AirTag from Following You

If the Precision Finding app does not locate the unwanted tracking device, there are a few other options. The first step is physically looking for the device inside a car or luggage. Remember, the AirTag must be moving to send out a signal. Look inside pockets and bags, and thoroughly examine your car.

AirTags have two technologies to track locations. 

  1. Near-Field Communications (NFC) allows a device within a few feet of each other to communicate wirelessly. NFC is also useful for pairing a device, and from the iPhone 11 on, the NFC reader can pull up a URL from the AirTag. 
  2. Ultra-wideband is used for longer distances and location tracking.

Bluetooth Scanner

AirTags emit a Bluetooth signal regularly, and scanners cannot identify an AirTag specifically. Apple has made it impossible to identify an AirTag because the device regularly changes its Bluetooth signature. However, these simple apps can give you a lay of the land around your location. Some Bluetooth tracking tiles will label themselves in the broadcast.

Opt-Out of the Find My Network

AirTag’s technology is not revolutionary but relies on older tracking devices to get a Bluetooth signal to the owner. There is no built-in GPS; instead, the signal piggybacks off other nearby devices to get a signal to its owner.

Disabling the Find My network app prevents Bluetooth-enabled devices from tracking you. Unfortunately, this removes your ability to track your own AirTag device. 

AirTag Serial Numbers

Owners can include the AirTag’s serial number and phone number when setting up their devices. If you come across an unwanted AirTag, the serial number can help track the intrusion. There is no direct link from the AirTag, and owners are not notified in any way.

To find the serial number, tap the notification on the paired iPhone. A webpage opens and shows the serial number. 

Any unwanted tracking leaves a trail of information. An AirTag requires a device for pairing, a compatible iPhone or iPad, and an iCloud account. 

Disable the AirTag

Apple uses end-to-end encryption, which protects all location information sent from the device to an iPad, iPhone, or MAC. Remove the battery if you have found an unwanted AirTag and obtained all the information available. Once the AirTag’s battery has been removed, all location information is no longer visible.

On the back of the AirTag, push down and twist counterclockwise. Take the back cover off and remove the battery. 

Keep Yourself Protected and Aware of the Dangers

how to prevent airtag stalking

Apple AirTags and similar Bluetooth tracking devices are great little gems for people who forget or lose everything. Keys, luggage, and cars in large parking lots have found a home for AirTags.

Unfortunately, criminals always take what is useful and turn it into a nightmare. Law enforcement is well aware of the cars being stolen with AirTags attached; what is frightening are the stalkers going after children and women.

Plenty of reports have surfaced where Bluetooth-enabled devices are attached to a woman’s car or a vehicle with children. No matter how safe a person tries to be, predators get around the rules, finding a way to attack the unsuspecting.

About the Author
IDStrong Logo

Related Articles

How To Make Your IG Account Private

There are occasions when it makes more sense to have a private Instagram (IG) account. You might w ... Read More

Windows 10 Privacy Settings You Should Change Now

Privacy is a buzzword we hear a lot these days in the wake of data breaches, Wikileaks, and other ... Read More

How to Delete Your Facebook Account

It might seem absurd to some people who live on Facebook, deleting your Facebook account. But, man ... Read More

How to Change Network From Public to Private On Windows

Privacy has become a major concern for many of us after reading about all the data breaches, hacki ... Read More

Twitter Security and Privacy Settings Made Simple

With data breaches and ransomware intrusions in the news daily, privacy is the word on everyone’ ... Read More

Latest Articles

What You Need to Know about the Hot Topic Data Breach

What You Need to Know about the Hot Topic Data Breach

Hot Topic plays in the fashion, apparel, and shoe industry as a retailer of music-influenced apparel and accessories, such as jeans, tops, belts, dresses, pajamas, sunglasses, jewelry, and tees.

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close