{"id":43705,"date":"2022-02-17T12:24:52","date_gmt":"2022-02-17T17:24:52","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=43705"},"modified":"2022-02-17T12:24:52","modified_gmt":"2022-02-17T17:24:52","slug":"how-to-protect-from-stalking-with-airtag","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-stalking-with-airtag\/43705\/","title":{"rendered":"AirTag stalking and how to protect yourself"},"content":{"rendered":"<p>Apple\u2019s AirTags have only been on the market since last spring, but they have already earned a bad reputation for being a way to facilitate criminal activity and track people without their permission. In this article we look closely at how AirTags work and why they can be dangerous. We also tell you how to protect yourself from being tracked with AirTags and from other types of cyberstalking.<\/p>\n<h2>How AirTags work<\/h2>\n<p>Apple unveiled AirTags in April 2021 as devices that help search for easy-to-lose objects. Inside an AirTag there is a board with a wireless module, along with a replaceable battery and a speaker which is actually rather large, and that\u2019s really the bulk of the device.<\/p>\n<p>Here\u2019s how AirTags work in the simplest scenario: you stick the little fob on your keys, and if one day you\u2019re running late for work and your keys are lost somewhere in your apartment, you activate search mode on your iPhone. Using <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ultra-wideband\" target=\"_blank\" rel=\"nofollow noopener\">ultra-wideband<\/a> (UWB) technology, the phone points you toward the AirTag, giving you helpful prompts like \u201chot\u201d or \u201ccold.\u201d<\/p>\n<p>In a more complicated scenario, suppose you\u2019ve attached the AirTag to your backpack and one day you rush off the subway so fast you accidentally leave it behind. Since you and your iPhone are already far away from your backpack when you realize you lost it, UWB won\u2019t help you. Now anyone who has a relatively modern Apple device \u2014 iPhone 7 and newer \u2014 can get involved. Using Bluetooth, they detect the AirTag nearby and transmit approximate or specific coordinates to your Apple account. Now you can use Apple\u2019s Find My service to see where your backpack has ended up \u2014 such as in the lost-and-found office or with a new owner. What\u2019s key is that all of this happens automatically; you don\u2019t even need to install anything. Everything the AirTag search system needs to work is already built into the iOS of hundreds of millions of users.<\/p>\n<p>But considering that Bluetooth has a maximum distance range of just a few dozen meters, this works only in large cities, where there are a lot of people with iPhones. If your backpack ends up in a small town where all the residents use Android smartphones (or even the latest push-button phones that <a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-feature-phones\/42466\/\" target=\"_blank\" rel=\"noopener nofollow\">barely connect to the Internet<\/a>), it will be challenging to pin down the location of the AirTag. In this case a third detection mechanism kicks in: if a few hours go by and the AirTag hasn\u2019t had a connection with any iPhone, the built-in speaker starts playing a sound. If the person who finds the item figures out how to connect their smartphone with NFC to the AirTag, the AirTag tells them the phone number of the item\u2019s owner.<\/p>\n<h2>AirTags and shady business<\/h2>\n<p>In theory, AirTags are a useful and, at $29 for one or $99 for a pack of four, a relatively inexpensive accessory for everyday tracking of easy-to-lose objects. The technology can help you find your hidden keys or a bag you\u2019ve left behind. One example of a useful application that has been widely <a href=\"https:\/\/9to5mac.com\/2021\/05\/03\/airtags-for-checked-baggage\/\" target=\"_blank\" rel=\"nofollow noopener\">discussed<\/a> over the last year is sticking an AirTag on a suitcase before getting on a plane. On a number of occasions, travelers have been able to locate their lost baggage faster than the airline employees could.<\/p>\n<p>But in practice, right after the device went on sale, reports started cropping up about how people used it in ways that were not completely legal, and there were even reports of overt criminal activity. Here are the major examples.<\/p>\n<ul>\n<li>An activist from Germany <a href=\"https:\/\/lilithwittmann.medium.com\/bundesservice-telekommunikation-enttarnt-dieser-geheimdienst-steckt-dahinter-cd2e2753d7ca\" target=\"_blank\" rel=\"nofollow noopener\">uncovered<\/a> the location of a top-secret state agency after mailing it an envelope containing an AirTag. A lot of people use such a tactic \u2014 which is more or less legal depending on the laws of a country \u2014 to track actual mail delivery routes, for example. But it\u2019s also possible to use an AirTag like the German activist did: if someone uses a PO Box to receive mail so they can keep their real address private, a piece of mail that has an AirTag inside it will reveal the actual place of residence.<\/li>\n<li>On a more serious note, in December 2021 the Canadian police <a href=\"https:\/\/www.pcmag.com\/news\/car-thieves-are-using-airtags-to-track-vehicles\" target=\"_blank\" rel=\"nofollow noopener\">investigated<\/a> several incidents in which criminals used AirTags to steal cars. They stuck an AirTag on a car in a public parking lot, used it to figure out where the owner lived, and then at night stole the car while it was parked in a suburb, a little further from potential witnesses.<\/li>\n<li>Finally, there are <a href=\"https:\/\/www.tomsguide.com\/news\/airtag-stalking-incidents\" target=\"_blank\" rel=\"nofollow noopener\">many testimonials<\/a> involving the use of AirTags to <a href=\"https:\/\/www.huffpost.com\/entry\/apple-airtags-tracking_n_61f425ade4b067cbfa1cb2b8\" target=\"_blank\" rel=\"nofollow noopener\">stalk women<\/a>. In this case, the perpetrators stick an AirTag on a woman\u2019s car or slip it into her bag, and then they ascertain where she lives and see the routes she travels regularly. AirTags contain protection against this kind of stalking: if the tag is constantly moving around while being far away from the iPhone it\u2019s tied to, the built-in speaker starts beeping. However, it didn\u2019t take long for tinkerers to figure out that there\u2019s a workaround: <a href=\"https:\/\/www.tomsguide.com\/news\/muted-airtags-danger\" target=\"_blank\" rel=\"nofollow noopener\">modified<\/a> AirTags with the beeper disabled have recently started showing up on the market.<\/li>\n<\/ul>\n<p>But this isn\u2019t even the most frightful scenario. In theory one can hack the AirTag and modify its behavior in the software. Clear steps in this direction have already been made: For instance, last May a researcher successfully <a href=\"https:\/\/twitter.com\/ghidraninja\/status\/1391148503196438529\" target=\"_blank\" rel=\"nofollow noopener\">gained access<\/a> to the device\u2019s protected firmware. This will be most dangerous for Apple and users if someone manages to exploit the network of hundreds of millions of iPhones to track people illegally without the knowledge of the manufacturer, the owners of the smartphones that are taking part in a search operation, and the victims themselves.<\/p>\n<h2>How dangerous AirTags are<\/h2>\n<p>The most frightful scenario has not yet come to pass, and it is unlikely to \u2014 after all, Apple cares about the security of its own infrastructure. You also need to keep in mind that there are other devices similar to AirTags. Various legal and illegal tracking devices have existed for over a decade.<\/p>\n<p>Moreover, even consumer tags with similar functionality to AirTags have been on the market for a long time. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Tile_(company)\" target=\"_blank\" rel=\"nofollow noopener\">Tile<\/a> released its tags in 2013, and they also offer ways to search for lost objects over a large distance by applying the same principle as AirTags. Of course, this company probably won\u2019t be able to achieve \u201ccoverage\u201d from hundreds of millions of iPhones. In addition, devices like these cost money \u2014 sometimes a lot of money \u2014 and they are relatively easy to detect.<\/p>\n<p>In the case of AirTags, they need to be connected to an Apple account, which is hard to create anonymously without providing a real name and usually a credit card number. If the police report a case of illegal tracking, Apple turns over this data \u2014 admittedly, you need to convince the police to request such data, and according to testimonials by victims in different countries, this doesn\u2019t always happen.<\/p>\n<p>Ultimately, it\u2019s the same story we always see: AirTags are a handy piece of technology that criminals can also use for malicious purposes. Apple didn\u2019t invent cyberstalking, but it did come up with a convenient technology that enables people to engage in illegal stalking. That means that it\u2019s the company\u2019s responsibility to make it harder for people to use the device for objectionable purposes.<\/p>\n<p>Once again, the closed ecosystem of Apple\u2019s software and devices has come under criticism. If you have an iPhone and someone has snuck an AirTag into your bag, your phone will notify you. But what if you don\u2019t have an iPhone? For the time being, Apple has developed a band-aid solution by releasing an <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.apple.trackerdetect\" target=\"_blank\" rel=\"nofollow noopener\">app<\/a> for Android smartphones that you need to install to detect tracking. The upshot is that Apple created a problem for everyone but offered a simple solution only to its own customers. Everyone else needs to adjust somehow.<\/p>\n<p>This month Apple tried to respond to the avalanche of criticism by issuing a long <a href=\"https:\/\/www.apple.com\/newsroom\/2022\/02\/an-update-on-airtag-and-unwanted-tracking\/\" target=\"_blank\" rel=\"nofollow noopener\">statement<\/a>. It acknowledged that before releasing AirTag it hadn\u2019t envisioned all the ways of using it \u2014 whether legal or illegal. It pledged to tell AirTag buyers more explicitly that AirTags are not to be used for tracking people. It also plans to raise the volume of the beep that helps you find an AirTag someone has planted on your belongings. This is laudable, but it doesn\u2019t solve all the problems. We hope that over time Apple will be able to clearly separate legal and illegal ways of using AirTags.<\/p>\n<h2>Stalkerware<\/h2>\n<p>In conclusion, we need to mention that using software for surveillance is much more dangerous and commonplace in real life than AirTags. Apple\u2019s AirTags cost a fair amount of money, a person doing the tracking needs to pair an AirTag with their real account, and the manufacturer is actually trying to make it harder to hide the tags.<\/p>\n<p>In contrast, developers of spyware and stalkerware apps are doing their best to make them as undetectable as possible. In addition to tracking location, tracking apps give the spy a heap of other options. In particular, they open access to the victim\u2019s documents, photos and messages, which can be even more dangerous than geolocation. So if you\u2019re worried about being tracked, the first thing you need to do is <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">protect your smartphone<\/a> \u2014 it\u2019s the most <a href=\"https:\/\/www.kaspersky.com\/blog\/smartphone-spying-protection\/31894\/\" target=\"_blank\" rel=\"noopener nofollow\">obvious target<\/a>.<\/p>\n<p>Then you can look around for unknown AirTags. If you use an iPhone, it will notify you pretty quickly that there\u2019s a tag. If you have an Android and you want to protect yourself from being tracked with an AirTag, install the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.apple.trackerdetect\" target=\"_blank\" rel=\"nofollow noopener\">Apple Tracker Detect<\/a> app.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.<\/p>\n","protected":false},"author":665,"featured_media":43706,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788,2683],"tags":[4298,105,14,1250,45,714,3181,4299],"class_list":{"0":"post-43705","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-threats","9":"tag-airtag","10":"tag-android","11":"tag-apple","12":"tag-ios","13":"tag-smartphones","14":"tag-spyware","15":"tag-stalkerware","16":"tag-stalking"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-stalking-with-airtag\/43705\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-protect-from-stalking-with-airtag\/23910\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-protect-from-stalking-with-airtag\/19397\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/how-to-protect-from-stalking-with-airtag\/9755\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-to-protect-from-stalking-with-airtag\/26148\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-protect-from-stalking-with-airtag\/24111\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-to-protect-from-stalking-with-airtag\/23933\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-to-protect-from-stalking-with-airtag\/26929\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/how-to-protect-from-stalking-with-airtag\/26473\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-protect-from-stalking-with-airtag\/32401\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/how-to-protect-from-stalking-with-airtag\/10529\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-to-protect-from-stalking-with-airtag\/18567\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/how-to-protect-from-stalking-with-airtag\/19016\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/how-to-protect-from-stalking-with-airtag\/15812\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/how-to-protect-from-stalking-with-airtag\/28194\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/how-to-protect-from-stalking-with-airtag\/28123\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-protect-from-stalking-with-airtag\/24840\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-protect-from-stalking-with-airtag\/30253\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-protect-from-stalking-with-airtag\/30032\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/stalkerware\/","name":"stalkerware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/43705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=43705"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/43705\/revisions"}],"predecessor-version":[{"id":43709,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/43705\/revisions\/43709"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/43706"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=43705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=43705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=43705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}