Is the new Apple AirTag a friendly accessory or stalking device?

Feb 2, 2022

2 min

Demetrice Rogers

The Apple AirTag, the newest addition to the Apple family, launched last year and is designed to help consumers keep track of personal items. But the gadget could have another, more sinister use – stalking people. While an owner is tracking their items, someone can follow the owners’ movements through the device. So, who’s tracking who?



Cybersecurity expert Demetrice Rogers, an adjunct professor in Tulane University’s School of Professional Advancement, is available to speak about the concerns for personal safety and how not to fall victim to your own device. For interviews, contact Roger Dunaway at roger@tulane.edu or 504-452-2906.


“There has been a recent concern with individuals using the AirTag to stalk people or vehicles covertly,” Rogers said. “Apple recently released updates to their personal safety guide to address these concerns. One feature is for an individual’s iPhone to notify them when an AirTag is ‘traveling with’ the individual. This feature lets someone know that an AirTag (not belonging to them) has been discovered nearby. Additionally, Apple released a new Android application named “Tracker Detect,” which will notify Android users if AirTags are found nearby. Other trackers that rely on technology to locate individuals or objects should release similar applications that individuals can use to determine if a tracking device is in their vicinity.”


The small device communicates with nearby Apple devices and provides near real-time updates to the owner of the AirTag with an accurate location of the tracker. When used correctly, the AirTag communicates with the tag owner if it is in range of any iPhone. The U1 Chip in the AirTag provides a precise location, both indoors and outdoors, and the AirTag has a replaceable battery and built-in speaker to help locate it.


The device is small enough to be hidden and used for questionable purposes. Those with Apple or Android smartphones can only detect the AirTag. The AirTag does not work natively with the Android operating system and requires an Apple device to function. A consumer who may not have a smartphone can use a Bluetooth device finder.


“I do believe the AirTag is safe for public use. Apple is now making the information available publicly, but consumers still need to be made aware of the guide addressing the privacy issues and the possible risks associated with its use,” Rogers said.


Connect with:
Demetrice Rogers

Demetrice Rogers

Adjunct Professor

Demetrice Rogers is an expert in cybersecurity and information technology.

CyberattacksInformation AssuranceComputer ForensicsCybersecurityInformation Technology

You might also like...

Check out some other posts from Tulane University

1 min

Expert: Historic password breach creates public urgency for better password protection

Cybercriminals recently executed a significant breach, stealing the world’s most extensive collection of passwords. These stolen credentials, a staggering 10 billion unique passwords, have been uploaded to the notorious RockYou2024 database, a hub for cybercriminal activity. Tulane University cybersecurity expert Demetrice Rogers says the stolen passwords are a significant vulnerability for most users and underscore the need for strong password management. With malicious actors now armed with an extensive database of nearly 10 billion unique passwords, the risk of successful hacks on unsuspecting users is significantly higher. "The massive growth of the RockYou2024 password list shows just how tough it’s getting to keep our accounts safe. Hackers will love this list, making it a go-to tool for breaking into accounts. We need strong, unique passwords and multi-factor authentication to stay one step ahead. Think of it like locking your doors and setting the alarm—essential steps to keep the cybercriminals out." Rogers can cover: • How users can check to see if their information and passwords are included in the leak. • The importance of creating strong, unique passwords for each account and using reputable password managers to generate and store them securely. (Many users use the same password across multiple websites, making an attacker’s job much easier.) • Why adopting multi-factor authentication is increasingly important to ensure account security.

2 min

Are soaring home insurance rates in Gulf Coast states coming for the rest of the country?

The Gulf Coast faces an expected active 'above-normal' hurricane season, with many insurance carriers withdrawing from the market. Homeowners are left with skyrocketing rates and dwindling coverage options. Louisiana bore the brunt with four major hurricanes in 2020 and 2021, causing $75 billion in combined damage. The state passed a series of insurance reforms to attract more insurance companies, following in the footsteps of Florida. Insurance woes for homeowners aren’t just a coastal issue. Homeowners in the Midwest are struggling with insurance carriers because of damage from the record amount of tornadoes. Wildfires in the US are also a growing threat to insurance carriers, accounting for an annual total cost between $394 billion and $893 billion. Christopher Otten, an insurance and legal expert at Tulane University’s A. B. Freeman School of Business, is available to speak about the impact of new hurricane insurance regulations in several states, the challenges of holding insurance carriers accountable from state to state and the difficulties property owners face in finding hurricane insurance. Christopher can also discuss: • Why insurance markets differ among the states in the Gulf Coast region. • The Fortified Roof incentive programs • Affordability and the need for more carriers to improve competition and pricing risk. Christopher Otten Quote: “The Gulf States are the canaries in the coal mine right now for insurance markets,” Otten said. “It’s probably going to get worse before it gets better. A quiet hurricane season, as unlikely as that is, will help things some – but that doesn’t mean rates will not go up or down. They may increase less than they otherwise would have. With these new laws, particularly in Louisiana, it will take a hurricane for us to know how the new regulations are shaping out.” Contact Roger Dunaway, assistant director of media relations, for interviews at roger@tulane.edu.

2 min

Vulnerability exposed: Car dealerships grapple with fallout from cybersecurity attacks

Nearly 15,000 car dealerships across North America are still struggling to operate after a massive cyberattack has crippled their software systems. As more vehicles become connected to the Internet and reliant on digital systems, cyberattacks pose a serious risk to businesses and consumers. Tulane University cybersecurity expert Demetrice Rogers is available to discuss the next steps in auto industry recovery efforts and what other industries can learn from the incident to avoid repeat attacks. Professor Rogers can speak about: 1. The implications for data security and privacy and the possible compromise of sensitive customer data, including personal information and financial details. 2. Specific cybersecurity weaknesses within the automotive industry that made these car dealerships targets for the cyberattack. 3. Offer insights into effective cybersecurity measures and best practices that car dealerships can implement to strengthen their defenses against future cyber threats. Quote from Demetrice Rogers: “The preliminary reports indicate that the attack on CDK Global was a ransomware incident. Their systems will essentially be held hostage until specific demands, likely monetary, are fulfilled. Initial reports indicate CDK plans to pay the ransom, which could be tens of millions of dollars, to the attackers. I would expect systems to slowly come back online, with some data and processes unavailable until they have fully recovered.” “This situation highlights the critical need for an effective backup and disaster recovery program. Organizations should routinely test their recovery capabilities to ensure preparedness for such incidents. Additionally, it is generally recommended not to comply with hackers' demands or pay the ransom. While it is true that some companies opt to pay (though this is rarely publicized), it is usually more prudent to activate a well-prepared disaster recovery plan.” Contact Roger Dunaway, assistant director of media relations, for interviews at roger@tulane.edu.

View all posts