Amazon’s Ring is the ‘largest civilian surveillance network the US has ever seen’ with one in ten police departments using video from doorbell cameras, warns security expert

Amazon’s Ring doorbell camera ‘is effectively building the largest corporate-owned, civilian-installed surveillance network that the US has ever seen,’ it has been claimed.

The stark warning came from Lauren Bridges, a PhD candidate at University of Pennsylvania, who told The Guardian that one in ten police departments around the country have access to video from the civilian cameras after the company partnered with more than 1,800 local law enforcement agencies.

Bridges raises serious concerns that cops are able to request Ring videos from members of the public without a warrant, which she claims is deliberately circumnavigating the Fourth Amendment – the right not to be searched or have items seized without a legal warrant.

Last year alone, law enforcement agencies filed 22,337 individual requests for Ring videos, according to data compiled by Bridges.

A report in the California Law Review claimed that Amazon even assisted and coached law enforcement on how to circumvent legal requirements—such as the Fourth Amendment’s warrant requirement. 

The claims are supported by ‘scripts’, obtained by Vice in 2019 from the Topeka, KS police department, which tell police how to encourage users to share camera footage with police and encourage friends to download the Neighbors app.

The Electronic Frontier Foundation, nonprofit organization for ‘defending civil liberties in the digital world,’ has even formed petitions calling on Ring to end its partnerships with law enforcement agencies. 

Keep reading

Internet Sleuths Find Joe Biden’s Secret Venmo Account in Less Than 10 Minutes – Causing Potential National Security Issue

Internet sleuths found Joe Biden’s secret Venmo account in less than 10 minutes and were able to identify it using his friends list, causing a potential national security issue.

Venmo is a mobile payment service owned by PayPal that allows users to transfer money to other users in their contacts list.

An aide recently revealed that Joe Biden, AKA, “The Big Guy,” uses Venmo to send his grandchildren money.

Internet sleuths immediately started searching for Joe Biden’s account by using the app’s features to look for his aides, friends and family.

Within 10 minutes cyber detectives at BuzzFeed News found Biden’s secret Venmo account, causing potential national security issues.

Keep reading

Research Finds More Than Half of School Apps Sending Personal Student Data to Third Parties

According to a new research report published by the nonprofit entity Me2B Alliance, around 60 percent of school apps are sending student data to a wide range of high-risk third parties without getting the permission of either the students or their parents.

The study audited 73 apps from 38 different schools spread over 14 American states. It involved almost half a million people, including students, their teachers, and family members. The organization warned that school apps must not include third-party data channels and that an “unacceptable amount” of school data was being shared with third parties through these apps, specifically with analytics and advertising platforms.

“The findings from our research show the pervasiveness of data sharing with high-risk entities and the amount of people whose data could be compromised due to schools’ lack of resources… The study aims to bring these concerns to light to ensure the right funding support and protections are in place to safeguard our most vulnerable citizens – our children,” Lisa LeVasseur, executive director of Me2B Alliance, said in a statement.

The study found that around 18 percent of the apps had links to very high risk third parties, meaning that such parties probably re-shared the data with hundreds of thousands of entities. 67 percent of public school apps were found to be sending data to third parties, which is 10 percent higher than private school apps. 

Keep reading

Bill Gates, China, 23andMe, and Your DNA

Is there a connection between China, Bill Gates, YouTube, and DNA collection?

Recent reports reveal that a Chinese company with connections to the Gates Foundation is involved in COVID-19 testing and poses a potential threat to American privacy, particularly the medical and health data of those who have been tested for COVID-19.

In late January, CBS’ 60 Minutes reported:

“60 Minutes has learned Chinese company BGI Group, the largest biotech firm in the world, offered to build COVID labs in at least six states, and U.S. intelligence officials issued warnings not to share health data with BGI. 

The largest biotech firm in the world wasted no time in offering to build and run COVID testing labs in Washington, contacting its governor right after the first major COVID outbreak in the U.S. occurred there. The Chinese company, the BGI Group, made the same offer to at least five other states, including New York and California, 60 Minutes has learned. This, along with other COVID testing offers by BGI, so worried Bill Evanina, then the country’s top counterintelligence officer, that he authorized a rare public warning.”

“Foreign powers can collect, store and exploit biometric information from COVID tests” declared the notice. Evanina believes the Chinese are trying to collect Americans’ DNA to win a race to control the world’s biodata.”

Evanina said a foreign entity could learn about a person’s current or future medical conditions by studying their DNA and using this information to gain a monopoly over necessary drugs and treatments.

BGI Group declined to be interviewed by 60 Minutes and said the idea that Americans genomic data has been compromised by BGI is “groundless”.

Concerns around BGI also arose in late January when Reuters reported that more than 40 publicly available documents and research papers show BGI’s links to the People’s Liberation Army (PLA). Reuters said the research dealt with topics as varied as mass testing for respiratory pathogens to brain science.

Keep reading

Google’s “private” coronavirus tracking app wasn’t so private after all

Back in April 2020, Big Tech firms Apple and Google released their frameworks for contact tracing in an effort to help governments track the coronavirus. When the frameworks were released, both the firms vehemently promised that user data, including their location information and data of whom all they’ve come in contact with, would remain private.

But the recent findings by a privacy analysis firm revealed otherwise.

Both Google and Apple stated that the data users share through their frameworks would be anonymized and shared with public health agencies only. Here’s what Google CEO Sundar Pichai said about the tool last year. “Our goal is to empower with another tool to help combat the virus while protecting user privacy.”

Banking on the promises made by the Big Tech firms, several million users ended up downloading apps built on the frameworks developed by Apple and Google.

The UK’s National Health Service app, Canada’s Digital Service COVID Alert app, and Virginia’s Department of Health’s COVIDWISE app were all built on the frameworks provided by Apple and Google.

While the NHS app has more than 15 million users, Canada’s COVID Alert app had over six million downloads in January alone.

Based on what the researchers at AppCensus, a privacy analysis firm, state, there was a privacy flaw in the Android version of contact tracing tools. What’s more, the researchers at AppCensus even ended up informing Google about it, but to no avail.

Keep reading

CIA Secretly Owned World’s Top Maker of Encryption Devices – Reports

The US and West German intelligence agencies clandestinely owned the world’s leading manufacturer of encryption devices, Swiss-based Crypto AG, enjoying throughout the Cold War direct access to closely guarded secrets of more than 120 countries, the Washington Post reported on Tuesday.

“It was the intelligence coup of the century,” the newspaper quoted a CIA report as saying. “Foreign governments were paying good money to the US and West Germany for the privilege of having their most secret communications read by at least two (and possibly as many as five or six) foreign countries.”

For decades, since World War II and well into the 21st century, Crypto was selling sophisticated equipment for coded correspondence to state clients all over the world, among them Iran, India and Pakistan, countries of Latin America and the Vatican, the report said.

According to the publication, from 1970 the CIA and the National Security Agency together with their German partners controlled nearly every aspect of the company’s operations, including “hiring decisions, designing its technology, sabotaging its algorithms and directing its sales targets.”

Keep reading

Facebook leaks full names, phone numbers, email addresses, and other info on half a BILLION users

The personal data, including phone numbers and emails, of more than 500 million Facebook users has been leaked online. The social media company claims that the data was obtained through a vulnerability that has since been fixed.

A user in a low-level hacking forum published the personal data of over 533 million Facebook users. The leaked data includes Facebook IDs, full names, phone numbers, email address, and other personal identifiable information. It affects Facebook users from 106 countries, including data on over 33 million users in the US and 11 million users in the UK.

Business Insider verified the authenticity of the leaked data by matching several of known user’s phone numbers to the Facebook IDs listed.

A Facebook spokesperson said that the data was illegally obtained via a vulnerability that was fixed back in 2019. Whether or not the data is a few years old, it could still be used by cybercriminals for identity theft and other scams.

Keep reading

Metadata: The Digital Fingerprint You Had No Idea Is Attached To Every Photo You Take

In a day and age where everyone is walking around carrying a portable GPS/supercomputer in their pockets, it should be of no surprise that location data can help track you at almost any given point in the day.

But while this may be semi-expected, one way in which people may not know they’re offering up information is through photographs.

Such was the topic of a new BBC report, which delved into exactly how much information people are offering up with their photo metadata – the digital “fingerprint” that’s attached to every digital photo you take.

Metadata became a national issue when comparisons of two photographs of former President Trump at Walter Reed Medical Center were scrutinized closely to try and determine whether they were staged or not, BBC notes. Metadata also led to authorities being able to detain John McAfee in 2012, after a photograph’s location data revealed he was in Guatemala at the time.

This data “automatically and parasitically burrows itself into every photo you take,” BBC notes. And while it’s not impossible to get rid of, most people don’t even realize that it’s there before widely sharing their photographs on social media. And while some platforms remove sensitive information, like where a photo was taken, others don’t.

The tool has become useful for police investigations, who often use it to place criminals at a scene. But the data can clearly be a slippery slope and be used for nefarious purposes, as well.

Keep reading

Smartphones share our data every four and a half minutes, says study

Android handsets and iPhones share data with their respective companies on average every 4½ minutes, with data being sent back even when idle in a pocket or handbag, according to a new academic study.

The Trinity College Dublin research has raised fresh privacy concerns about smartphones, with the research claiming there was little difference between Apple and Google when it came to collecting certain data.

The study, which was published by Prof Doug Leith at Trinity’s Connect Centre, claimed iPhones offered no greater privacy than Google devices.

However, the study noted that Google handsets collected “a notably larger volume of handset data than Apple” with 1MB of data being sent from idle Google Pixel handsets every 12 hours, compared with 52KB sent from the iPhone.

Among the data potentially sent back by the handsets were the insertion of a SIM and handset details such as the hardware serial number, IMEI, Wifi MAC address and the phone number.

Keep reading

Google repeatedly hands over user data to law enforcement without a warrant

Google is turning over user data to US law enforcement, even when requests for that come without a warrant, in the form of requests that are not court-ordered.

That emerges from information shared with the LA Times by an anonymous Google user, who said they were notified about this in an email from the tech giant, who said the request came from the Department of Homeland Security, without including the request itself in the email.

When this Google user asked to see the document, it turned out to be an administrative subpoena issued by the Immigrations and Customs Enforcement (ICE), while the data the agency was requesting from Google included the user’s name, home, email, and IP addresses, as well as sources of payment associated with the account.

And here, the term “account” covers any Google service and app, such as Gmail, Google Pay, YouTube, etc.

In the original email that arrived from the giant’s Legal Investigations Support, the user was advised that this data would indeed be handed to the agency as requested unless they obtained a federal court stamped motion to quash the subpoena within seven days.

For most people, Just Futures’ co-founder Paromita Shah suggested, this is a task they would be unlikely to accomplish, as it requires hiring a lawyer and going to federal court, and do it all in such a short period
of time.

According to available data from the company’s transparency report covering the first half of 2020, Google received 15,500 subpoenas and complied in turning over “some data” in 83% percent of cases.

Keep reading