Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
194 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Stop Following Me! Evaluating the Effectiveness of Anti-Stalking Features of Personal Item Tracking Devices (2312.07157v1)

Published 12 Dec 2023 in cs.CR

Abstract: Personal item tracking devices are popular for locating lost items such as keys, wallets, and suitcases. Originally created to help users find personal items quickly, these devices are now being abused by stalkers and domestic abusers to track their victims' location over time. Some device manufacturers created `anti-stalking features' in response, and later improved on them after criticism that they were insufficient. We analyse the effectiveness of the anti-stalking features with five brands of tracking devices through a gamified naturalistic quasi-experiment in collaboration with the Assassins' Guild student society. Despite participants knowing they might be tracked, and being incentivised to detect and remove the tracker, the anti-stalking features were not useful and were rarely used. We also identify additional issues with feature availability, usability, and effectiveness. These failures combined imply a need to greatly improve the presence of anti-stalking features to prevent trackers being abused.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (31)
  1. Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Comput. Surv. 50, 3 (aug 2017).
  2. Apple. An update on airtag and unwanted tracking. https://www.apple.com/uk/newsroom/2022/02/an-update-on-airtag-and-unwanted-tracking/, 2022.
  3. “So-Called Privacy Breeds Evil”: Narrative justifications for intimate partner surveillance in online forums. Proceedings of ACM on Human-Computer Interaction 4, CSCW3 (January 2021).
  4. Cahn, A. F. Apple’s AirTags are a gift to stalkers. https://www.wired.com/story/opinion-apples-air-tags-are-a-gift-to-stalkers/, 2021.
  5. 23 ways to nudge: A review of technology-mediated nudging in human-computer interaction. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2019), CHI ’19, Association for Computing Machinery, p. 1–15.
  6. Charlton, H. Apple’s AirTag item trackers increasingly linked to criminal activity. https://www.macrumors.com/2021/12/31/airtag-increasinglylinked-to-crime/, 2021.
  7. The spyware used in intimate partner violence. In 2018 IEEE Symposium on Security and Privacy (SP) (2018), pp. 441–458.
  8. Cole, S. Police records show women are being stalked with Apple AirTags across the country. https://www.vice.com/en/article/y3vj3y/apple-airtags-police-reports-stalking-harassment, 2022.
  9. Technology-facilitated domestic and family violence: Women’s experiences. British Journal of Criminology 59, 4 (2019), 551–570.
  10. Domestic violence and communication technology: Survivor experiences of intrusion, surveillance, and identity crime. The Australian Communications Consumer Action Network (ACCAN), Australia, 2019.
  11. Fowler, G. A. Apple’s AirTag trackers made it frighteningly easy to ‘stalk’ me in a test. https://www.washingtonpost.com/technology/2021/05/05/apple-airtags-stalking/, 2021.
  12. “A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2018), CHI ’18, Association for Computing Machinery, p. 1–13.
  13. Users’ expectations about and use of smartphone privacy and security settings. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2022), CHI ’22, Association for Computing Machinery.
  14. AirGuard – Protecting Android users from stalking attacks by Apple Find My devices. https://arxiv.org/abs/2202.11813, 2022.
  15. Hill, K. I used Apple AirTags, Tiles and a GPS tracker to watch my husband’s every move. https://www.nytimes.com/2022/02/11/technology/airtags-gps-surveillance.html, 2022.
  16. Holpuch, A. Two women sue Apple over AirTag stalking. https://www.nytimes.com/2022/12/06/business/apple-airtag-lawsuit.html, 2022.
  17. Detecting Unwanted Location Trackers. Internet-Draft draft-detecting-unwanted-location-trackers-00, Internet Engineering Task Force, May 2023. Work in Progress.
  18. Leitão, R. Technology-facilitated intimate partner abuse: a qualitative analysis of data from online domestic abuse forums. Human–Computer Interaction 36, 3 (2021), 203–242.
  19. Privacy threats in intimate relationships. Journal of Cybersecurity 6, 1 (2020), 1–13.
  20. ‘Internet of Things’: How abuse is getting smarter. SSRN Electronic Journal 63 (03 2019).
  21. Are Apple AirTags being used to track people and steal cars? https://www.nytimes.com/2021/12/30/technology/apple-airtags-tracking-stalking.html, 2021.
  22. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2017), CHI ’17, Association for Computing Machinery, p. 2189–2201.
  23. National Network To End Domestic Violence. A glimpse from the field: How abusers are misusing technology. https://www.techsafety.org/blog/2015/2/17/a-glimpse-from-the-field-how-abusers-are-misusing-technology, 2015.
  24. SoK: The dual nature of technology in sexual abuse. In 2022 2022 IEEE Symposium on Security and Privacy (SP) (SP) (Los Alamitos, CA, USA, May 2022), IEEE Computer Society, pp. 1533–1533.
  25. Refuge. Refuge, the UK’s largest domestic violence charity says 72% of service users experience abuse through technology and launches chatbot to provide real-time information to survivors. https://www.refuge.org.uk/72-of-refuge-service-users-identify-experiencing-tech-abuse/, 2019.
  26. “They Don’t Leave Us Alone Anywhere We Go”: Gender and digital abuse in South Asia. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2019), CHI ’19, Association for Computing Machinery, p. 1–14.
  27. Computer misuse as a facilitator of domestic abuse. https://researchportal.port.ac.uk/en/projects/computer-misuse-as-a-facilitator-of-domestic-abuse, 2021.
  28. Tom Scott plus. Can you stalk someone with an Apple AirTag? https://www.youtube.com/watch?v=GmC05wOc5Dw, 2022.
  29. Tom Scott plus. He tracked me with an AirTag. now it’s my turn. https://www.youtube.com/watch?v=NuEgjAMfdIY, 2022.
  30. Can’t keep them away: The failures of anti-stalking protocols in personal item tracking devices. In Security Protocols XXVIII (Cham, 2023), F. Stajano, V. Matyáš, B. Christianson, and J. Anderson, Eds., Springer Nature Switzerland, pp. 78–88.
  31. Woodlock, D. The abuse of technology in domestic violence and stalking. Violence Against Women 23, 5 (2017), 584–602.

Summary

We haven't generated a summary for this paper yet.