<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dult-threat-model-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title>DULT Threat Model</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dult-threat-model-01"/>
    <author fullname="Maggie Delano">
      <organization>Swarthmore College</organization>
      <address>
        <email>mdelano1@swarthmore.edu</email>
      </address>
    </author>
    <author fullname="Jessie Lowell">
      <organization>National Network to End Domestic Violence</organization>
      <address>
        <email>jlowell@nnedv.org</email>
      </address>
    </author>
    <author fullname="Shailesh Prabhu">
      <organization>Nokia</organization>
      <address>
        <email>shailesh.prabhu@nokia.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="01"/>
    <area>Security</area>
    <workgroup>Detecting Unwanted Location Trackers</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>detecting unwanted location trackers</keyword>
    <keyword>threat model</keyword>
    <abstract>
      <?line 46?>

<t>Lightweight location tracking tags are in wide use to allow users to locate items. These tags function as a component of a crowdsourced tracking network in which devices belonging to other network users (e.g., phones) report which tags they see and their location, thus allowing the owner of the tag to determine where their tag was most recently seen. While there are many legitimate uses of these tags, they are also susceptible to misuse for the purpose of stalking and abuse. A protocol that allows others to detect unwanted location trackers must incorporate an understanding of the unwanted tracking landscape today. This document provides a threat analysis for this purpose, will define what is in and out of scope for the unwanted location tracking protocols, and will provide some design considerations for implementation of protocols to detect unwanted location tracking.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dult.github.io/threat-model/draft-ietf-dult-threat-model.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dult-threat-model/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Detecting Unwanted Location Trackers Working Group mailing list (<eref target="mailto:unwanted-trackers@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/unwanted-trackers/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/unwanted-trackers/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dult/draft-ietf-dult-threat-model"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Location tracking tags are widely-used devices that allow users to locate items. These tags function as a component of a crowdsourced tracking network in which devices belonging to other network users (e.g., phones) report on the location of tags they have seen. At a high level, this works as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Tags ("accessories") transmit an advertisement payload containing accessory-specific information. The payload also indicates whether the accessory is separated from its owner and thus potentially lost.</t>
        </li>
        <li>
          <t>Devices belonging to other users ("non-owner devices") observe those payloads and if the payload is in a separated mode, reports its location to some central service.</t>
        </li>
        <li>
          <t>The owner queries the central service for the location of their accessory.</t>
        </li>
      </ul>
      <t>A naive implementation of this design exposes both a tag’s user and anyone who might be targeted for location tracking by a tag’s user, to considerable privacy risk. In particular:</t>
      <ul spacing="normal">
        <li>
          <t>If accessories simply have a fixed identifier that is reported back to the tracking network, then the central server is able to track any accessory without the user's assistance, which is clearly undesirable.</t>
        </li>
        <li>
          <t>Any attacker who can guess a tag ID can query the central server for its location.</t>
        </li>
        <li>
          <t>An attacker can surreptitiously plant an accessory on a target and thus track them by tracking their "own" accessory.</t>
        </li>
      </ul>
      <t>In order to minimize these privacy risks, it is necessary to analyze and be able to model different privacy threats. This document uses a flexible framework to provide analysis and modeling of different threat actors, as well as models of potential victims based on their threat context. It defines how these attacker and victim persona models can be combined into threat models. It is intended to work in concert with the requirements defined in <xref target="I-D.detecting-unwanted-location-trackers"/>, which facilitate detection of unwanted tracking tags.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <section anchor="conventions">
        <name>Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="definitions">
        <name>Definitions</name>
        <ul spacing="normal">
          <li>
            <t><strong>active scanning</strong>: a search for location trackers manually initiated by a user</t>
          </li>
          <li>
            <t><strong>passive scanning</strong>: a search for location trackers running in the background, often accompanied by notifications for the user</t>
          </li>
          <li>
            <t><strong>tracking tag</strong>: a small device that is not easily discoverable and transmits location data to other devices.</t>
          </li>
          <li>
            <t><strong>easily discoverable</strong>: device is larger than 30 cm in at least one dimension, device is larger than 18 cm x 13 xm in two of its dimensions, device is larger than 250 cm<sup>3</sup> in three-dimensional space</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Incorporation of this threat analysis into the DULT protocol does not introduce any security risks not already inherent in the underlying Bluetooth tracking tag protocols. Existing attempts to prevent unwanted tracking by the owner of a tag have been criticized as potentially making it easier to engage in unwanted tracking of the owner of a tag. However, Beck et al. have <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> a technological solution that employs secret sharing and error correction coding.</t>
      <section anchor="taxonomy-of-unwanted-tracking">
        <name>Taxonomy of unwanted tracking</name>
        <t>To create a taxonomy of threat actors, we can borrow from Dev et al.’s <eref target="https://dl.acm.org/doi/fullHtml/10.1145/3544548.3581484">Models of Applied Privacy (MAP) framework</eref>. This framework is intended for organizations and includes organizational threats and taxonomies of potential privacy harms. Therefore, it cannot be applied wholesale. However, its flexibility, general approach to personas, and other elements, are applicable or can be modified to fit the DULT context.</t>
        <t>The characteristics of threat actors may be described as follows. This is not intended to be a full and definitive taxonomy, but an example of how existing persona modeling concepts can be applied and modified.</t>
        <ul spacing="normal">
          <li>
            <t>Expertise level
            </t>
            <ul spacing="normal">
              <li>
                <t>Expert: The attacker works in or is actively studying computer science, networking, computer applications, IT, or another technical field.</t>
              </li>
              <li>
                <t>Non-expert: The attacker does not work or study in, or is a novice in, a technical field.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Proximity to victim
            </t>
            <ul spacing="normal">
              <li>
                <t>High: Lives with victim or has easy physical access to victim and/or victim’s possessions.</t>
              </li>
              <li>
                <t>Medium: Has some physical access to the person and possessions of someone who lives with victim, such as when the attacker and victim are co-parenting a child.</t>
              </li>
              <li>
                <t>Low: Does not live with or have physical access to victim and/or victim’s possessions.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to resources
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The attacker has access to resources that may amplify the impact of other characteristics. These could include, but are not limited to, funds (or control over “shared” funds), persons assisting them in stalking behavior, or employment that provides privileged access to technology or individuals’ personal information.</t>
              </li>
              <li>
                <t>Low: The attacker has access to few or no such resources.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>In addition, the victim also has characteristics which influence the threat analysis. As with attacker characteristics, these are not intended as a definitive taxonomy.</t>
        <ul spacing="normal">
          <li>
            <t>Expertise level
            </t>
            <ul spacing="normal">
              <li>
                <t>Expert: The victim works in or is actively studying computer science, networking, computer applications, IT, or another technical field.</t>
              </li>
              <li>
                <t>Non-expert: The victim does not work or study in, or is a novice in, a technical field.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Expectation of unwanted tracking
            </t>
            <ul spacing="normal">
              <li>
                <t>Suspecting: The victim has reason to believe that unwanted tracking is a likely risk.</t>
              </li>
              <li>
                <t>Unsuspecting: The victim has no particular reason to be concerned about unwanted tracking.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to resources
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The victim is generally able to safely access practical and relevant resources. These might include funds to pay a car mechanic or private investigator, law enforcement or legal assistance, or other resources.</t>
              </li>
              <li>
                <t>Low: The victim is generally unable to safely access practical and relevant resources. These might include money to pay a car mechanic or private investigator, law enforcement or legal assistance, or other resources.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to technological safeguards
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The victim is able to safely use, and has access to, technological safeguards such as active scanning apps.</t>
              </li>
              <li>
                <t>Limited: The victim is able to safely use, and has access to, technological safeguards such as active scanning apps, but is unable to use their full capacity.</t>
              </li>
              <li>
                <t>Low: The victim is not able to use technological safeguards such as active scanning apps, due to reasons of safety or access.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>It is also appropriate to define who is using the tracking tags and incorporate this into a model. This is because if protocols overly deprioritize the privacy of tracking tags’ users, an attacker could use a victim’s own tag to track them. Beck et al. describe a <eref target="https://eprint.iacr.org/2023/1332.pdf">possible technological solution</eref> to the problem of user privacy vs privacy of other potential victims. In designing the protocol, these concerns should be weighed equally. TODO: Is this actually how we want to weigh them? This warrants further discussion.</t>
        <ul spacing="normal">
          <li>
            <t>Tracking tag usage
            </t>
            <ul spacing="normal">
              <li>
                <t>Attacker only: The attacker controls one or more tracking tags, but the victim does not.</t>
              </li>
              <li>
                <t>Victim only: The victim controls one or more tracking tags, but the attacker does not.</t>
              </li>
              <li>
                <t>Attacker and victim: Both the attacker and victim control one or more tracking tags.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Any of the threat analyses above could be affected by placement of the tag(s). For instance, a tag could be placed on a victim's person, or in proximity to a victim but not on their person (e.g. a child's backpack). Examples include:</t>
        <ul spacing="normal">
          <li>
            <t>Tag placement
            </t>
            <ul spacing="normal">
              <li>
                <t>Tag on victim's person or immediate belongings. This attack vector allows an attacker to track a victim in a fine-grained way. It is also more likely that this attack would trigger an alert from the tag.</t>
              </li>
              <li>
                <t>Tag(s) in proximity to victim but not on their person (e.g. child's backpack, car). While this is a less fine-grained attack, it may also be less likely to be discovered by the victim. A child may not realize the significance of an alert or know how to check for a tag. A parent may not think to scan for such a tag, or may have more difficulty finding a tag in a complex location such as a car.</t>
              </li>
              <li>
                <t>Tags nearby but not used for unwanted location tracking (e.g. false positives by companions or on transit). While this is not an attack vector in its own right, repeated false positives may discourage a victim from treating alerts seriously.</t>
              </li>
              <li>
                <t>Multiple tags using multiple types of placement. This attack vector may trick a victim into believing that they have fully addressed the attack when they have not. It also allows for a diversity of monitoring types (e.g. monitoring the victim's precise location, monitoring a child's routine, monitoring car usage).</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Anticipation, or lack thereof, of unwanted tracking, may affect the threat and the attack. If the victim does not realize that they are at risk (as is common early in an abusive relationship, or if a victim is being stalked by a stranger), they may be less likely to use active scanning tools or understand the implications of detected tags.</t>
        <ul spacing="normal">
          <li>
            <t>Anticipation of unwanted tracking
            </t>
            <ul spacing="normal">
              <li>
                <t>High anticipation: The victim believes that an attacker is tracking or may be tracking their location.</t>
              </li>
              <li>
                <t>Low anticipation: The victim is unaware or does not believe that an attacker is tracking or may be tracking their location.</t>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="example-scenarios-with-analyses-todo-expand-scenarios-to-incorporate-expanded-taxonomy">
          <name>Example scenarios with analyses TODO: expand scenarios to incorporate expanded taxonomy</name>
          <t>The following scenarios are composite cases based upon reports from the field. They are intended to illustrate different angles of the problem. They are not only technological, but meant to provide realistic insights into the constraints of people being targeted through these tags. There is no identifying information for any real person contained within them. In accordance with research on <eref target="https://dl.acm.org/doi/10.1145/2207676.2208573">how designers understand personas</eref>, the characters are given non-human names without attributes such as gender or race.
The analysis of each scenario provides an example usage of the modeling framework described above. It includes a tracking tag usage element for illustrative purposes. However, as discussed previously, this element becomes more or less relevant depending on protocol evolution.
Note that once a given attacker persona has been modeled, it could be recombined with a different victim persona, or vice versa, to model a different scenario. For example, a non-expert victim persona could be combined with both non-expert and expert attacker personas.</t>
          <section anchor="scenario-1">
            <name>Scenario 1</name>
            <section anchor="narrative">
              <name>Narrative</name>
              <t>Mango and Avocado have two young children. Mango, Avocado, and the children all use smartphones, but have no specialized technical knowledge. Mango left because Avocado was abusive. They were homeless for a month, and the children have been living with Avocado. They now have an apartment two towns away. They do not want Avocado to know where it is, but they do want to see the children. They and Avocado meet at a public playground. They get there early so that Avocado will not see which bus route they arrived on and keep playing with the children on the playground until after Avocado leaves, so that Avocado will not see which bus route they get on. Two days later, Avocado shows up at Mango’s door, pounding on the door and shouting.</t>
            </section>
            <section anchor="analysis">
              <name>Analysis</name>
              <t>In this case, the attacker has planted a tag on a child. Co-parenting after separation is common in cases of intimate partner violence where the former partners have a child together. Child visits can be an opportunity to introduce technology for purposes of stalking the victim.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Avocado</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Victim</td>
                    <td align="left">Medium</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Unknown, but can be presumed higher than Mango’s due to Mango’s recent homelessness</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Victim Profile</th>
                    <th align="left">Mango</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Normal</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Avocado and Mango</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-2">
            <name>Scenario 2</name>
            <section anchor="narrative-1">
              <name>Narrative</name>
              <t>Strawberry and Elderberry live together. Neither has any specialized technological knowledge. Strawberry has noticed that Elderberry has become excessively jealous – every time they go to visit a friend by themselves, Elderberry accuses them of infidelity. To their alarm, over the last week, on multiple occasions, Elderberry has somehow known which friend they visited at any given time and has started to harass the friends. Strawberry eventually gets a notification that a tracker is traveling with them, and thinks it may be in their car, but they cannot find it. They live in a car-dependent area and cannot visit friends without the car, and Elderberry controls all of the “family” money, so their cannot take the car to the mechanic without Elderberry knowing.</t>
            </section>
            <section anchor="analysis-1">
              <name>Analysis</name>
              <t>Here, the attacker and the victim are still cohabiting, and the attacker is monitoring the victim’s independent activities. This would allow the attacker to know if, for instance, the victim went to a police station or a domestic violence agency. The victim has reason to think that they are being tracked, but they cannot find the device. This can happen if the sound emitted by the device is insufficiently loud, and is particularly a risk in a car, where seat cushions or other typical features of a car may provide sound insulation for a hidden tag. The victim could benefit from having a mechanism to increase the volume of the sound emitted by the tag. Another notable feature of this scenario is that because of the cohabitation, the tag will spend most of the time in “near-owner state” as defined by the proposed industry consortium specification <xref target="I-D.detecting-unwanted-location-trackers"/>. In near-owner state it would not provide alerts under that specification.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Elderberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Victim</td>
                    <td align="left">High</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Victim Profile</th>
                    <th align="left">Strawberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Impaired (cannot hear alert sound)</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Elderberry and Strawberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-3">
            <name>Scenario 3</name>
            <section anchor="narrative-2">
              <name>Narrative</name>
              <t>Lime and Lemon have been dating for two years. Lemon works for a tech company and often emphasizes how much more they know about technology than Lime, who works at a restaurant. Lemon insists on having access to Lime’s computer and Android phone so that they can “make sure they are working well and that there are no dangerous apps.” Lemon hits Lime when angry and has threatened to out Lime as gay to their conservative parents and report them to Immigration &amp; Customs Enforcement if Lime “talks back.” Lime met with an advocate at a local domestic violence program to talk about going to their shelter once a bed was available. The advocate did some safety planning with Lime, and mentioned that there is an app for Android that can scan for location trackers, but Lime did not feel safe installing this app because Lemon would see it. The next time Lime went to see the advocate, they chose a time when they knew Lemon had to be at work until late to make sure that Lemon did not follow them, but when Lemon got home from work they knew where Lime had been.</t>
            </section>
            <section anchor="analysis-2">
              <name>Analysis</name>
              <t>This is a case involving a high-skill attacker, with a large skill difference between attacker and victim. This situation often arises in regions with a high concentration of technology industry workers. It also may be more common in ethnic-cultural communities with high representation in the technology industry. In this case the victim is also subject to a very high level of control from the attacker due to their imbalances in technological skills and societal status, and is heavily constrained in their options as a result. It is unsafe for the victim to engage in active scanning, or to receive alerts on their phone. The victim might benefit from being able to log into an account on another phone or a computer and view logs of any recent alerts collected through passive scanning.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Lemon</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Victim</td>
                    <td align="left">High</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Victim Profile</th>
                    <th align="left">Lime</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Low</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Lemon and Lime</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
        </section>
        <section anchor="bluetooth-vs-other-technologies">
          <name>Bluetooth vs. other technologies</name>
          <t>The above taxonomy and threat analysis focus on location tracking tags. They are protocol-independent; if a tag were designed using a technology other than Bluetooth, they would still apply. The key attributes are the functionalities and physical properties of the accessory from the user’s perspective. The accessory must be small and not easily discoverable and able to transmit its location to other consumer devices.</t>
        </section>
      </section>
      <section anchor="possible-methods-to-circumvent-dult-protocol">
        <name>Possible Methods to Circumvent DULT Protocol</name>
        <t>There are several different ways an attacker could attempt to circumvent the DULT protocol in order to track a victim without their consent. These include deploying multiple tags to follow a single victim and using a non-compliant tag (e.g. speaker disabled, altered firmware, spoofed tag). There are also other potential concerns of abuse of the DULT Protocol, such as remotely disabling a victim's tracking tag.</t>
        <section anchor="threat-prioritization-framework-for-dult-threat-model">
          <name>Threat Prioritization Framework for DULT Threat Model</name>
          <t>Threats in the DULT ecosystem vary in severity, feasibility, and likelihood, affecting users in different ways. Some threats enable long-term tracking, while others exploit gaps in detection mechanisms or leverage non-compliant devices. To assess and prioritize these risks, the following framework classifies threats based on their impact, likelihood, feasibility, affected users, and the availability of mitigations. A Threat Matrix is included that provides a structured assessment of known threats and their associated risks. This categorization helps in understanding the challenges posed by different tracking techniques and their potential mitigations.</t>
        </section>
        <section anchor="threat-matrix">
          <name>Threat Matrix</name>
          <t>To systematically assess the risks associated with different threats, we introduce the following threat matrix. This categorization considers key risk factors:</t>
          <ul spacing="normal">
            <li>
              <t>Impact: The potential consequences of the threat if successfully exploited.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Minimal effect on privacy and security.</t>
                </li>
                <li>
                  <t>Medium: Moderate effect on user privacy or tracking protection.</t>
                </li>
                <li>
                  <t>High: Severe privacy violations or safety risks.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Likelihood: The probability of encountering this threat in real-world scenarios.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Rare or requires specific conditions.</t>
                </li>
                <li>
                  <t>Medium: Possible under common scenarios.</t>
                </li>
                <li>
                  <t>High: Frequently occurring or easily executed.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Feasibility: The difficulty for an attacker to execute the attack.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Easy: Requires minimal effort or common tools.</t>
                </li>
                <li>
                  <t>Moderate: Needs some technical expertise or resources.</t>
                </li>
                <li>
                  <t>Hard: Requires significant effort, expertise, or access.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Risk Level: A qualitative assessment based on impact, likelihood, and feasibility.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Limited risk requiring minimal mitigation.</t>
                </li>
                <li>
                  <t>Medium: Requires mitigation to prevent common attacks.</t>
                </li>
                <li>
                  <t>High: Critical threat needing immediate mitigation.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Affected Users: These are categorized as either:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Victims: Individuals specifically targeted or affected by the attack.</t>
                </li>
                <li>
                  <t>All users: Anyone using the system, even if they are not directly targeted.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Mitigation Available?: Whether a known mitigation strategy exists.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Yes: A viable mitigation exists.</t>
                </li>
                <li>
                  <t>Partial: Some mitigations exist but are not fully effective.</t>
                </li>
                <li>
                  <t>No: No effective mitigation currently available.</t>
                </li>
              </ul>
            </li>
          </ul>
          <table>
            <thead>
              <tr>
                <th align="left">Threat</th>
                <th align="left">Impact</th>
                <th align="left">Likelihood</th>
                <th align="left">Feasibility</th>
                <th align="left">Risk Level</th>
                <th align="left">Affected Users</th>
                <th align="left">Mitigation Available?</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Deploying Multiple Tags</td>
                <td align="left">High</td>
                <td align="left">High</td>
                <td align="left">Easy</td>
                <td align="left">High</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Remote Advertisement Monitoring</td>
                <td align="left">High</td>
                <td align="left">High</td>
                <td align="left">Easy</td>
                <td align="left">High</td>
                <td align="left">All users</td>
                <td align="left">No</td>
              </tr>
              <tr>
                <td align="left">Non-Compliant Tags</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Moderate</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">No</td>
              </tr>
              <tr>
                <td align="left">Misuse of Remote Disablement</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Moderate</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Rotating Tracker IDs</td>
                <td align="left">High</td>
                <td align="left">High</td>
                <td align="left">Easy</td>
                <td align="left">High</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Delayed Activation of Trackers</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Easy</td>
                <td align="left">High</td>
                <td align="left">Victims</td>
                <td align="left">No</td>
              </tr>
              <tr>
                <td align="left">Multi-Tag Correlation Attack</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Moderate</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">No</td>
              </tr>
              <tr>
                <td align="left">Exploiting Gaps in OS-based Detection</td>
                <td align="left">High</td>
                <td align="left">High</td>
                <td align="left">Moderate</td>
                <td align="left">High</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Spoofing Legitimate Devices</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Moderate</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">No</td>
              </tr>
              <tr>
                <td align="left">Heterogeneous Tracker Networks</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Hard</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">No</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="deploying-multiple-tags">
          <name>Deploying Multiple Tags</name>
          <t>When an attacker deploys tracking tags to follow a victim, they may deploy more than one tag. For example, if planting a tracking tag in a car, the attacker might place one tag inside the car, and another affixed on the outside of the car. The DULT protocol must be robust to this scenario. This means that scans, whether passive or active, need to be able to return more than one result if a device is suspected of being used for unwanted tracking, and the time to do so must not be significantly impeded by the presence of multiple trackers. This also applies to situations where many tags are present, even if they are not being used for unwanted location tracking, such as a busy train station or airport where tag owners may or may not be in proximity to their tracking tags. This method prolongs unwanted tracking, making it a high-impact threat, as it enables continuous monitoring even if some tags are discovered. Since multiple low-cost tags can be easily deployed, the likelihood is high, and the feasibility is easy, given the availability of commercially accessible trackers. As a result, the overall risk is high, requiring robust countermeasures. While scanning for multiple tags offers partial mitigation, sophisticated attackers may still evade detection by distributing tags strategically.</t>
        </section>
        <section anchor="remote-advertisement-monitoring">
          <name>Remote Advertisement Monitoring</name>
          <t>Bluetooth advertisement packets are not encrypted, so any device with Bluetooh scanning capabilities in proximity to a location tracking tag can receive Bluetooth advertisement packets. If an attacker is able to link an identifier in an advertisement packet to a particular tag, they may be able to use this information to track the tag over time, and potentially by proxy the victim or other individual, without their consent. Tracking tags typically rotate any identifiers associated with the tag, but the duration with which they rotate could be up to 24 hours (see e.g. <xref target="I-D.detecting-unwanted-location-trackers"/>). Beck et al. have <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> a technological solution that employs secret sharing and error correction coding that would reduce this to 60 seconds. However, work must investigate how robust this scheme is to the presence of multiple tags (see <xref target="deploying-multiple-tags"/>). This attack has a high impact, as it allows persistent surveillance while circumventing built-in protections. Given that capturing Bluetooth signals is trivial using common scanning tools, the likelihood is high, and the feasibility is easy, making it a high-risk attack. While rotating identifiers provides partial mitigation, attackers can still use advanced correlation techniques to bypass this defense.</t>
        </section>
        <section anchor="non-compliant-tags">
          <name>Non-compliant tags</name>
          <t>An attacker might physically modify a tag in a way that makes it non-compliant with the standard (e.g. disabling a speaker or vibration). An attacker might make alterations to a tag's firmware that make it non-compliant with the standard. This bypasses key protections entirely, making the impact high by preventing victims from discovering hidden trackers. Although technical modifications require some expertise, they are achievable with moderate effort, making the likelihood medium and feasibility moderate. As a result, the overall risk remains medium. Current mitigation methods are incomplete, though research continues on detecting such rogue devices.</t>
        </section>
        <section anchor="misuse-of-remote-disablement">
          <name>Misuse of Remote Disablement</name>
          <t>An attacker might misuse remote disablement features to prevent a victim detecting or locating a tag. This could be used to prevent a victim locating an attacker's tag, or could be used by an attacker against a victim's tag as a form of harassment. The ability to disable a victim’s protections introduces a medium impact, while the likelihood is medium, as it requires specific technical knowledge. Since execution is moderately complex, feasibility is moderate, leading to a medium-risk attack. While authentication measures can partially mitigate this risk, these protections are not foolproof.</t>
        </section>
        <section anchor="rotating-tracker-ids">
          <name>Rotating Tracker IDs</name>
          <t>Attackers may use dynamic identifier changes, such as rotating Bluetooth MAC addresses, to evade detection. This makes it difficult for detection systems relying on persistent unknown device identification. Pattern recognition techniques capable of detecting clusters of devices exhibiting ID rotation behaviors can help mitigate this. The impact is high, as it directly undermines detection mechanisms, while the likelihood is high, given that this is a widely used evasion technique. Since implementing ID rotation is straightforward, feasibility is easy, making this a high-risk attack. While time-based correlation methods offer partial mitigation, an ongoing arms race exists between detection and circumvention.</t>
        </section>
        <section anchor="delayed-activation-of-trackers">
          <name>Delayed Activation of Trackers</name>
          <t>Some tracking devices remain inactive for extended periods before starting to broadcast, making them harder to detect during initial scans. This allows attackers to delay detection until the victim has traveled a significant distance. Historical tracking behavior analysis, rather than solely real-time scanning, is necessary to mitigate this threat. The impact is medium, as it temporarily bypasses detection systems, while the likelihood is high, given how easy it is to implement such a delay in firmware. Since execution requires minimal effort, feasibility is easy, making this a high-risk attack. No effective mitigation currently exists, though long-term behavioral analysis could help detect such trackers.</t>
        </section>
        <section anchor="multi-tag-correlation-attack">
          <name>Multi-Tag Correlation Attack</name>
          <t>By distributing multiple tracking tags across locations frequently visited by a target (home, workplace, etc.), attackers can reconstruct movement patterns over time. Traditional tracking prevention measures focus on individual devices, making this method difficult to counter. Cross-tag correlation analysis could improve detection of recurring unknown trackers near a user. The impact is high, as it enables persistent monitoring, while the likelihood is medium, since multiple devices are required. Given that execution is moderately complex, feasibility is moderate, leading to a medium-risk attack. While no effective mitigation exists, coordinated scanning across devices could help detect recurring unknown trackers.</t>
        </section>
        <section anchor="exploiting-gaps-in-os-based-detection">
          <name>Exploiting Gaps in OS-Based Detection</name>
          <t>Some detection systems trigger alerts only under specific conditions, such as when motion is detected. Attackers can adjust device behavior to avoid detection during these periods. A more consistent, vendor-independent approach to unwanted tracking alerts would help reduce blind spots. The impact is high, as it results in gaps in protection across different platforms, while the likelihood is high, given OS fragmentation and differences in security policies. With feasibility at a moderate level, this results in a high-risk attack. While cross-platform threat modeling provides partial mitigation, detection gaps remain.</t>
        </section>
        <section anchor="spoofing-legitimate-devices">
          <name>Spoofing Legitimate Devices</name>
          <t>Attackers can modify tracker broadcasts to mimic common Bluetooth devices, making them blend into their surroundings and evade detection. Using machine-learning-based anomaly detection techniques can help distinguish genuine devices from potential tracking attempts. The impact is medium, as users may mistakenly assume the tracker is a harmless device. However, the likelihood is medium, since executing a convincing spoof is difficult, and the feasibility is moderate, due to the technical requirements. This results in a medium-risk attack. Currently, no effective mitigation exists.</t>
        </section>
        <section anchor="heterogeneous-tracker-networks">
          <name>Heterogeneous Tracker Networks</name>
          <t>Attackers may use a mix of tracking devices from different manufacturers (e.g., Apple AirTags, Tile, Samsung SmartTags) to exploit gaps in vendor-specific tracking protections. Many detection systems are brand-dependent, making them ineffective against mixed tracker deployments. Establishing a cross-vendor framework for detection and alerts would enhance protection. The impact is high, as it circumvents traditional defenses, while the likelihood is medium, since deploying multiple brands requires effort. With feasibility at a hard level, this remains a medium-risk attack. No effective mitigation currently exists, though research into cross-technology threat detection is ongoing.</t>
        </section>
      </section>
      <section anchor="what-is-in-scope">
        <name>What is in scope</name>
        <section anchor="technologies">
          <name>Technologies</name>
          <t>The scope of this threat analysis includes any accessory that is small and not easily discoverable and able to transmit its location to other consumer devices.</t>
        </section>
        <section anchor="attacker-profiles">
          <name>Attacker Profiles</name>
          <t>An attacker who deploys any of the attacks described in <xref target="threat-prioritization-framework-for-dult-threat-model"/> is considered in scope. This includes attempts to track a victim using a tracking tag and applications readily available for end-users (e.g. native tracking application) is in scope. Additonally, an attacker who physically modifies a tracking tag (e.g. to disable a speaker) is in scope. An attacker who makes non-nation-state level alterations to the firmware of an existing tracking tag or creates a custom device that leverages the crowdsourced tracking network is in scope.</t>
        </section>
        <section anchor="victim-profiles">
          <name>Victim Profiles</name>
          <t>All victims profiles are in scope regardless of their expertise, access to resources, or access to technological safeguards. For example, protocols should account for a victim's lack of access to a smartphone, and scenarios in which victims cannot install separate software.</t>
        </section>
      </section>
      <section anchor="what-is-out-of-scope">
        <name>What is out of scope</name>
        <section anchor="technologies-1">
          <name>Technologies</name>
          <t>There are many types of technology that can be used for location tracking. In many cases, the threat analysis would be similar, as the contexts in which potential attackers and victims exist and use the technology are similar. However, it would be infeasible to attempt to describe a threat analysis for each possible technology in this document. We have therefore limited its scope to location-tracking accessories that are small and not easily discoverable and able to transmit their locations to other devices. The following are out of scope for this document:</t>
          <ul spacing="normal">
            <li>
              <t>App-based technologies such as parental monitoring apps.</t>
            </li>
            <li>
              <t>Other Internet of Things (IoT) devices.</t>
            </li>
            <li>
              <t>Connected cars.</t>
            </li>
            <li>
              <t>User accounts for cloud services or social media.</t>
            </li>
          </ul>
        </section>
        <section anchor="attack-profiles">
          <name>Attack Profiles</name>
          <t>Attackers with nation-state level expertise and resources who deploy custom or altered tracking tags to bypass protocol safeguards or jailbreak a victim end-device (e.g. smartphone) are considered out of scope.</t>
        </section>
        <section anchor="victim-profiles-1">
          <name>Victim Profiles</name>
          <t>N/A</t>
        </section>
      </section>
    </section>
    <section anchor="design-considerations">
      <name>Design Considerations</name>
      <t>As discussed in <xref target="security-considerations"/>, unwanted location tracking can involve a variety of attacker, victim, and tracking tag profiles. A successful implementation to preventing unwanted location tracking should:</t>
      <ul spacing="normal">
        <li>
          <t>Include a variety of approaches to address different scenarios, including active and passive scanning and notifications or sounds</t>
        </li>
        <li>
          <t>Account for scenarios in which the attacker has high expertise, proximity, and/or access to resources within the scope defined in <xref target="what-is-in-scope"/> and <xref target="what-is-out-of-scope"/></t>
        </li>
        <li>
          <t>Account for scenarios in which the victim has low expertise, access to resources, and/or access to technological safeguards within the scope defined in <xref target="what-is-in-scope"/> and <xref target="what-is-out-of-scope"/></t>
        </li>
        <li>
          <t>Avoid privacy compromises for the tag owner when protecting against unwanted location tracking using tracking tags</t>
        </li>
      </ul>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>The DULT protocol should 1) allow victims to detect unwanted location tracking, 2) help victims find tags that are tracking them, and 3) provide instructions for victims to disable those trackers if they choose. These affordances should be implemented while considering the appropriate privacy and security requirements.</t>
        <section anchor="detecting-unwanted-location-tracking">
          <name>Detecting Unwanted Location Tracking</name>
          <t>There are three main ways that the DULT protocol should assist victims in detecting potentially unwanted location tracking: 1) active scanning, 2) passive scanning, and 3) tracking tag alerts.</t>
          <section anchor="active-scanning">
            <name>Active Scanning</name>
            <t>There may be scenarios where a victim suspects that they are being tracked without their consent. Active scanning should allow a user to use a native application on their device to search for tracking tags that are separated from their owners. Additional information about when that tag has been previously encountered within a designated time window (e.g. the last 12 hours) should also be included if available (see <xref target="privacy-and-security-requirements-todo"/>). Allowing users to "snooze" or ignore tags known to be safe (e.g. tags from a family member) could also be implemented. Tracking tags that are near their owners should not be shared to avoid abuse of the active scanning feature.</t>
          </section>
          <section anchor="passive-scanning">
            <name>Passive Scanning</name>
            <t>The platform should passively scan for devices suspected of unwanted location tracking and notify the user. This will involve implementing one or more algorithms to use to flag trackers and determine when to notify the user. (A dedicated DULT WG document will address tracking algorithms, and will be linked when it is available.) The user could be notified through a push notification or through Sounds and Haptics (see <xref target="tracking-tag-alerts"/>). There will be tradeoffs between detecting potential unwanted location tracking promptly and alerting the potential victim prematurely. One way to handle these tradeoffs is to allow users to set the sensitivity of these alerts. For example, the <eref target="https://github.com/seemoo-lab/AirGuard">AirGuard</eref> app includes three different "Security Level" settings that users can customize.</t>
            <t>To improve the accuracy of unwanted tracking detection, a confidence scoring mechanism can be used. Instead of issuing binary alerts for all detected tracking devices, the system assigns a confidence score based on multiple factors, helping distinguish between genuine tracking threats and benign scenarios.</t>
            <t>A confidence-based approach offers the following advantages:</t>
            <ul spacing="normal">
              <li>
                <t>Reduced False Positives: A confidence-based approach can help filter out benign tracking scenarios, such as transient signals or shared family devices. Instead of triggering alerts based solely on presence, the system can dynamically adjust its sensitivity based on behavioral patterns. For example, if a tracking device appears near a user only briefly or follows a predictable shared usage pattern (e.g., a Bluetooth tag frequently used by family members), it may be assigned a low confidence score. This prevents unnecessary alerts while still ensuring that persistent and anomalous tracking behaviors are flagged for user attention.</t>
              </li>
              <li>
                <t>Context-Aware Threat Evaluation: The confidence score can incorporate contextual factors such as movement patterns, duration of proximity, and recurrence. For instance, if a tracker is detected only once in a public place (e.g., at a café or airport), it is less likely to indicate malicious tracking. However, if the same tracker reappears near the user across multiple locations or over an extended period, its confidence score increases, prompting a higher-priority alert.</t>
              </li>
              <li>
                <t>Adaptive Alert Sensitivity: By dynamically adjusting detection thresholds based on confidence scores, the system can prioritize high-risk scenarios while minimizing unnecessary alerts. Users may receive warnings based on escalating levels of certainty, such as:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>Low confidence: Informational notification (e.g., "An unfamiliar tracker was briefly detected nearby.")</t>
                  </li>
                  <li>
                    <t>Medium confidence: Warning with recommended actions (e.g., "A tracker has been detected multiple times near you. Check your surroundings.")</t>
                  </li>
                  <li>
                    <t>High confidence: Urgent alert with mitigation options (e.g., "A tracker has been persistently following you. Consider removing or disabling it.")</t>
                  </li>
                </ul>
              </li>
            </ul>
            <t>This approach ensures that users receive actionable and meaningful alerts, reducing notification fatigue while maintaining strong protection against unwanted tracking.</t>
          </section>
          <section anchor="tracking-tag-alerts">
            <name>Tracking Tag Alerts</name>
            <t>Tracking tags may be difficult to locate, and users may not have a device that can actively or passively scan for tracking tags. The DULT protocol should be built with <eref target="https://cdt.org/insights/centering-disability-in-mitigating-harms-of-bluetooth-tracking-technology/">accessibility in mind</eref> so that the most people can be protected by the protocol. In addition to push notifications on nearby devices, tracking tags themselves should be able to notify end users. This should include periodic sounds when away from an owner, along with lights and haptics so that people who are Deaf or hard of hearing can still locate them.</t>
          </section>
        </section>
        <section anchor="finding-tracking-tags">
          <name>Finding Tracking Tags</name>
          <t>Even after a location tracker is detected through passive or active scanning, a user may have difficulty in locating it. For example, a tag may be buried under a vehicle cushion. Platforms should allow users who have discovered a tracker through passive or active scanning to request that the tracker signal its presence. This assistance should be done in a way that is accessible to users with sensory or other impairments by using multimodal signals as described in <xref target="tracking-tag-alerts"/>. Platforms may also implement other methods to assist in locating trackers, such as precision finding using Ultra-wideband.</t>
        </section>
        <section anchor="disabling-tracking-tags">
          <name>Disabling Tracking Tags</name>
          <t>In order to effectively prevent unwanted location tracking, users should be able to disable location tracker tags. This includes a non-owner user being tracked by a tag's owner, as well as an owner user who believes that an attacker is using their own tag to track them. Platforms should provide instructions for disabling tracking tags once they are located.</t>
        </section>
        <section anchor="privacy-and-security-requirements-todo">
          <name>Privacy and Security Requirements (TODO)</name>
        </section>
      </section>
      <section anchor="design-constraints">
        <name>Design Constraints</name>
        <t>There are also design constraints that the DULT Protocol must consider, including limitations of the Bluetooth Low Energy (BLE) protocol, power constraints, and device constraints.</t>
        <section anchor="bluetooth-constraints">
          <name>Bluetooth constraints</name>
          <t>Detecting trackers requires analyzing Bluetooth Low Energy (BLE) advertisement packets. Most advertisements are publicly transmitted, allowing passive scanning by any nearby receiver. While this enables open detection of unknown tracking devices, it also raises privacy concerns (see <xref target="introduction"/>). Some BLE implementations employ randomized MAC addresses and other privacy-preserving techniques, which could impact persistent tracking detection.</t>
          <t>The BLE payload in BLE 4.0 can support advertisement packets of up to 37 bytes. One current adoption of unwanted location tracking requires 12 of these bytes for implementing the basic protocol, with the remaining optional (see <xref target="I-D.detecting-unwanted-location-trackers"/>). Implementation of the DULT protocol will need to consider these limitations. For example, in <eref target="https://eprint.iacr.org/2023/1332.pdf">Eldridge et al</eref>, implementing Multi-Dealer Secret Sharing required using two advertisement packets were needed instead of one due to payload constraints. While BLE 5.0 supports 255+ bytes of data, the protocol is not backwards compatible and thus may not be suitable for the DULT protocol.</t>
          <t>BLE advertisements operate in the 2.4 GHz ISM band, making them susceptible to interference from Wi-Fi, microwave ovens, and other wireless devices. The presence of environmental noise may degrade detection accuracy and introduce variability in scan results.</t>
          <t>The BLE protocol also enforces strict power efficiency mechanisms, such as advertising intervals and connection event scheduling, which impact detection frequency. Devices operating in low-power modes may significantly reduce their advertisement frequency to conserve energy, making periodic detection less reliable. Furthermore, platform-level constraints, such as OS-imposed scanning limits and background activity restrictions, further impact the consistency and responsiveness of tracking detection mechanisms. For further discussion of power constraints, see <xref target="power-constraints"/>.</t>
          <t>To address these challenges, detection mechanisms must balance efficiency, privacy, and accuracy while working within the constraints of the BLE protocol. Solutions may include leveraging multiple observations over time, integrating probabilistic risk scoring, and optimizing scanning strategies based on known BLE limitations.</t>
        </section>
        <section anchor="power-constraints">
          <name>Power constraints</name>
          <t>Unwanted tracking detection mechanisms typically rely on periodic Bluetooth scanning to identify unknown tracking devices. However, continuous background scanning poses a significant power challenge, especially for mobile devices with limited battery capacity. Maintaining high-frequency scans for extended periods can lead to excessive energy consumption, impacting device usability and battery longevity.</t>
          <t>To address these concerns, detection systems must incorporate power-efficient approaches that balance security with practicality. Adaptive scanning strategies can dynamically adjust the scan frequency based on contextual risk levels. For example, if a suspicious tracking device is detected nearby, the system can temporarily increase scan frequency while reverting to a lower-power mode when no threats are present.</t>
          <t>Event-triggered detection offers another alternative by activating scanning only in specific high-risk scenarios. Users moving into a new location or transitioning from a prolonged stationary state may require more frequent detection, while routine movement in known safe environments can minimize energy consumption. Additionally, passive Bluetooth listening techniques could serve as a low-power alternative to active scanning, allowing background detection without excessive battery drain.</t>
          <t>The DULT protocol must account for these power limitations in its design, ensuring that detection mechanisms remain effective without significantly degrading battery performance. Consideration of device-specific constraints, such as variations in power efficiency across smartphones, wearables, and IoT devices, will be critical in maintaining a balance between security and usability.</t>
        </section>
        <section anchor="device-constraints">
          <name>Device constraints</name>
          <t>Unwanted tracking detection is constrained by the diverse range of devices used for scanning, each with varying hardware capabilities, operating system restrictions, processing power, and connectivity limitations. These factors directly impact the effectiveness of detection mechanisms and must be carefully considered in protocol design.</t>
          <t>Hardware variability affects detection accuracy. While newer smartphones are equipped with advanced Bluetooth Low Energy (BLE) chipsets capable of frequent and reliable scanning, older smartphones, feature phones, and IoT devices may have reduced BLE performance. Differences in antenna sensitivity, chipset power, and OS-level access control can result in inconsistent detection, where some devices fail to detect tracking signals as reliably as others.</t>
          <t>Operating system restrictions can affect detection efforts, particularly due to background Bluetooth Low Energy (BLE) scanning policies. Both iOS and Android implement mechanisms to manage background scanning behavior, balancing energy efficiency and privacy considerations. On iOS, background BLE scanning operates with periodic constraints, which may limit the frequency of detection updates. Android applies similar policies to regulate background processes and optimize power consumption. Additionally, privacy frameworks on mobile platforms may influence how applications access and process certain device-related data. These factors, along with resource limitations in wearables and IoT devices, can impact the feasibility of continuous scanning and detection.</t>
          <t>Processing and memory constraints are another limiting factor, particularly for low-end mobile devices and embedded systems. Continuous scanning and anomaly detection algorithms, especially those relying on machine learning-based threat detection, require substantial processing power and RAM. Devices with limited computational resources may struggle to maintain effective real-time detection without degrading overall performance. Ensuring that detection mechanisms remain lightweight and optimized for constrained environments is essential.</t>
          <t>Connectivity limitations introduce additional challenges. Some unwanted tracking detection mechanisms rely on cloud-based lookups to verify tracker identities and share threat intelligence. However, users in offline environments, such as those in airplane mode, rural areas with limited connectivity, or secure facilities with network restrictions, may be unable to access these services. In such cases, detection must rely on local scanning and offline heuristics rather than real-time cloud-based verification.</t>
          <t>To address these challenges, detection mechanisms should incorporate adaptive scanning strategies that adjust based on device capabilities, optimizing performance while maintaining security. Lightweight detection methods, such as event-triggered scanning and passive Bluetooth listening, can improve efficiency on constrained devices. Additionally, fallback mechanisms should be implemented to provide at least partial detection functionality even when full-featured scanning is not available. Ensuring that detection remains effective across diverse hardware and software environments is critical for broad user protection.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="I-D.detecting-unwanted-location-trackers">
        <front>
          <title>Detecting Unwanted Location Trackers</title>
          <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
            <organization>Apple</organization>
          </author>
          <author fullname="Zachary Eddinger" initials="Z." surname="Eddinger">
            <organization>Google</organization>
          </author>
          <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
            <organization>Apple</organization>
          </author>
          <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
            <organization>Google</organization>
          </author>
          <date day="20" month="December" year="2023"/>
          <abstract>
            <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-detecting-unwanted-location-trackers-01"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 464?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
