If someone can get near you, or accessories like your favorite backpack, sneaking into your life some tracking technology is relatively easy for them to put in place. This client advisory unpacks the recent events of VIPs being tracked by Tile or Apple AirTag technology.
Given the recent marketing push by Apple, the new AirTag appears to be the tracker of choice among consumers and would be stalkers.
A few weeks ago, a Sports Illustrated model reported that a stranger tried to track her location using an Apple AirTag. To date our clients have reported finding trackers, including AirTag competitor models, on jackets, bikes, inside purses, computers/work bags, and in car glove compartments. It can be planted almost any place at any time.
With an ounce of prevention, you can become more aware of tracking technology to protect yourself.
Tracking someone without their consent is quite common:
Unmasking Tracking Devices:
Preventing Tracking Without Consent:
What to Do If You Find a Rogue Apple AirTag:
Being tracked without your permission is not okay. If you discover that you are being tracked, consider filing a police report.
If you feel your personal safety could be in danger, consider developing an emergency plan now and share it with people you trust. Resources such as the ones available at this website can help by providing ideas about how to build your personal safety plan: https://www.techsafety.org/resources-survivors/technology-safety-plan.
Fortalice Solutions has partnered as a Data Privacy Champion. With the goal of increased awareness about online privacy among individuals and organizations, one goal of Data Privacy Week is to help organizations understand why it is important that they respect the data of their users, employees and suppliers.
T-Mobile announced on January 19 that it was reviewing a November 2022 data breach, potentially impacting 37 million accounts through one of its APIs. This advisory is intended to help our clients understand the urgent need to understand and review their API security, while also summarizing recent T-Mobile breaches.