The conversation surrounding the use of Apple AirTags—small tracking devices designed to help users locate lost personal items—raises significant concerns about privacy and security, particularly regarding unwanted tracking. Despite suggestions from various guides to utilize Bluetooth scanners for locating hidden AirTags, experts such as Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation, argue that this method lacks reliability. Galperin reveals her personal experiences with Bluetooth scanners, noting that they do not consistently detect AirTags. This issue is compounded by the reality that millions of Americans do not own smartphones, which limits their ability to use technology-based solutions to uncover hidden trackers. Instead, they must rely on visual and auditory cues, such as the unmistakable circular white disc of the AirTag, which resembles a larger quarter.
One high-profile instance of AirTag discovery was reported by Ashley Estrada, who found one wedged under her license plate. Her experience, shared on TikTok, garnered over 22 million views, highlighting the growing public awareness and concern about the potential misuse of these devices. Initially, Apple programmed AirTags to emit a beeping noise if they were separated from their owner for over three days. However, following criticisms and concerns surrounding stalking and abuse, Apple revised this feature, shortening the timeline to 24 hours or less. Nonetheless, relying solely on sound for detection may still lead to challenges, as some users have discovered ways to disable this feature or even utilize noiseless versions available online.
If someone encounters an AirTag, the most effective means of disabling it is by removing the battery. To do this, users should hold the AirTag with the Apple logo facing them, press down, and turn it counterclockwise to access the battery compartment. Apple’s support page advises individuals who feel threatened by a hidden AirTag to contact local law enforcement authorities. In such cases, law enforcement can collaborate with Apple to obtain information about the device. For instance, identifying the serial number can be done by using an NFC-enabled smartphone to scan the AirTag, which can reveal the device’s details and potentially the owner’s contact information.
The issue of unwanted tracking, particularly through devices like AirTags, disproportionately affects various demographics, with women frequently cited as targets in viral reports. Galperin stresses, however, that framing the problem as one that only affects women oversimplifies the case. Although many victims of tech-enabled abuse do identify as women, Galperin notes that a significant number are men. She posits that this figure could be even higher if societal stigma surrounding male victimization did not exist. This perspective emphasizes that abuse is not constrained to one gender or identity; men, women, and nonbinary individuals can all be victims or perpetrators.
Galperin’s insights are critical in recognizing the complexity of abuse stemming from technology, urging society not to impose limiting narratives on who can be a victim. Such frameworks can inhibit individuals from seeking help if they do not fit traditional victim profiles. For those seeking resources or support related to domestic violence and tech-enabled abuse, the National Domestic Violence Hotline provides help. Individuals can reach the hotline by calling 1-800-799-7233 or texting “START” to 88788, ensuring that all victims have access to vital support.
In light of recent developments and updates to AirTags, known vulnerabilities, and ongoing public discourse about their potential misuse, it is important for users to stay informed. As tracking technology continues to evolve, so do the metrics of privacy and safety. It’s not only essential for individuals to know how to locate and disable such trackers but also to understand the broader implications of their use. The evolving landscape of technology requires vigilance and proactive measures to ensure safety, privacy, and accountability while balancing the conveniences that devices like AirTags can offer. The responses to these emerging challenges will require collective societal awareness, ongoing dialogue, and appropriate legislative measures to protect individuals from abuse while utilizing technology effectively.