- The Security Primer Newsletter
- Posts
- April 22 - AirTags and Mexico
April 22 - AirTags and Mexico
We are digging into how you can discover an AirTag and what's the latest threat in Mexico.

Weekly Rundown
Happy Monday! Let’s recap some great highlights from last week and prime ourselves for the week ahead. 8 Min read.
Table of Contents
WHAT’S NEW
Detecting AirTags with iPhone
AirTags are small, lightweight devices designed by Apple, primarily used for tracking personal belongings like keys, wallets, etc. They have a user-replaceable battery and employ Apple's precision finding technology, which uses various sensors in conjunction with the Find My network to pinpoint items' locations (HotAirTag). In the past several years, we have seen an increase in the number of incidents where AirTags have been placed on a person or their car without their knowledge. So how can you tell if there is an AirTag on you?
To detect unknown AirTags using an iPhone:
Enable Location Services and Bluetooth: Go to Settings > Privacy > Location Services and Settings > Bluetooth.
Turn on Tracking Notifications: Navigate to Settings > Notifications > Tracking Notifications.
Alerts and Notifications: If an AirTag that isn’t registered to you is moving with you, your iPhone will alert you with a notification stating "AirTag Found Moving With You".
Locating the AirTag: Tap the alert notification to access a map in the Find My app showing the AirTag’s movement. To help locate it, select "Play Sound".
Managing Unknown AirTags: If the AirTag is unfamiliar, and you need to disable its tracking ability, follow the onscreen instructions provided in the Find My app to disable the AirTag and prevent further tracking (Apple Support).
Using Android Devices to Detect AirTags:
Android users can use the Tracker Detect app available on Google Play to scan for AirTags:
Download and Use Tracker Detect: After downloading the app, use it to scan for item trackers within Bluetooth range that are separated from their owner.
Alerts for Unknown Trackers: If a tracker like an AirTag is found near you for at least 10 minutes, the app will allow you to play a sound to help locate it (Apple Support).
SECURITY ENVIRONTMENT
Mexico
I had an opportunity to go to Mexico last week, and I thought I would update my readership on some of the latest on the cartels. The following is a summary from a couple international sources on the escalation of violence in Mexico.
The escalating violence in Mexico due to cartel activities continues to pose significant security and political challenges. The Jalisco New Generation Cartel (CJNG) and the Sinaloa Cartel are among the most powerful, with their influence extending deep into the social and political fabric of Mexico. These cartels have increasingly affected the political landscape, directly influencing elections through violence and corruption. This influence is not only a local phenomenon but also has transnational implications, affecting neighboring countries and the broader region.
Violence and territorial disputes among cartels have been exacerbated by shifts in drug markets, such as the decreasing profitability of heroin and the increased use of fentanyl. These changes have driven cartels to diversify into other illicit activities like extortion, oil theft, and kidnapping, which require control over local territories. This diversification has led to intensified conflicts, particularly in states like Guerrero, Chiapas, and Tamaulipas, further destabilizing the region and contributing to a surge in migration towards the United States.
The upcoming 2024 elections in Mexico are expected to witness heightened political violence as cartels seek to secure their influence over local and state governments. This situation underscores the complex interplay between organized crime and political processes in Mexico, where criminal groups use both violence and economic power to influence political outcomes to their advantage.
For a deeper dive into the current situation and the complexities of cartel influence in Mexico, you can explore detailed analyses and updates provided by sources like the Council on Foreign Relations and ACLED. If you are looking for more incident data, I encourage you to check out Data Int.
THE AI SPACE
Adobe Premiere Pro
Adobe has adopted the use of AI in many of its business lines, and they recently announced the upcoming changes to Premiere Pro. Adobe Premiere Pro is set to enhance its video editing capabilities with the integration of the Firefly generative AI model. This new feature will allow editors to effortlessly modify or remove objects from footage and extend scenes. Additionally, Adobe plans to support third-party AI tools like OpenAI's Sora. These innovations aim to provide editors with powerful tools for content creation, improving efficiency and creative possibilities in video production. The generative AI features are expected to be available in beta by the end of the year. To see a video release of the information, you can find it here - Youtube
Cybersecurity
Looking to enhance your cybersecurity knowledge? TL;DR Sec is your essential resource for the latest in cybersecurity insights. With weekly newsletters, in-depth blog posts, and practical guides, TL;DR Sec covers everything from software supply chain threats to AI in cybersecurity. Curated by Clint Gibler, it’s packed with actionable tips and the latest tools to help security professionals, developers, and tech enthusiasts stay ahead of risks.
Don’t miss out on cutting-edge cybersecurity trends and solutions. Subscribe to TL;DR Sec today and join a community of informed readers! Visit tldrsec.com for more information and to subscribe.
THINGS TO WATCH
New Standard for Security Risk Assessment
Every organization depends on certain assets—people, property, and information—to operate. An essential aspect of ensuring these assets are protected is conducting a Security Risk Assessment (SRA). The ASIS SRA Standard provides a logical, structured approach to identifying risks, which helps decision-makers choose appropriate risk treatment strategies effectively. This revised standard guides the user through security-specific risk assessments, including physical, non-physical, and logical risks.
The process established by the SRA Standard includes planning SRA activities, conducting risk identification, analysis, and evaluation. It also covers post-SRA activities and offers guidance on integrating these assessments into comprehensive reports. By aligning the risk management process with an organization’s mission, vision, and core values, SRAs help manage and prioritize risks, supporting informed decision-making to navigate uncertainties and achieve organizational objectives effectively.
For more detailed information, you can read more on ASIS International.