Amazon patents show new level of surveillance

Amazon has registered 17 new patents for biometric technology intended to help its doorbell cameras identify “suspicious” people by scent, skin texture, fingerprints, eyes, voice, and gait.

The tech giant has been developing its doorbell security camera system since 2018, when Amazon acquired the firm named Ring and, with it, the original technology. According to media reports, Jeff Bezos’ company is now preparing to enable the devices to identify “suspicious” people with the help of biometric technology, based on skin texture, gait, finger, voice, retina, iris, and even odor.

On top of that, if Amazon’s new patents are anything to go by, all Ring doorbell cameras in a given neighborhood would be interconnected, sharing data with each other and creating a composite image of “suspicious” individuals.

One of the patents for what is described in the media as a “neighborhood alert mode” would allow users in one household to send photos and videos of someone they deem ‘suspicious’ to their neighbors’ Ring cameras so that they, too, start recording and can assemble a “series of ‘storyboard’ images for activity taking place across the fields of view of multiple cameras.

Aside from the possible future interconnectivity among the Ring devices themselves, Amazon’s doorbell cameras, as it stands now, already exchange information with 1,963 police and 383 fire departments across the US, according to Business Insider. Authorities do not even need a warrant to access Ring footage.

Keep reading

Maxwell Case: Surveilled And Silenced

The trial of Ghislaine Maxwell, former partner of Jeffrey Epstein, looks like it is being set up to fail. Prosecutors rested their case after nine days in which victims seemed barely prepared for cross-examination and co-conspirators were notable by their absence.

Even this threadbare reckoning was too much information for Twitter, which banned a popular account reporting daily from Manhattan Federal Court. The new Twitter CEO has previously said the company is not bound by the First Amendment, and blocked posts that were drawing 500,000 views.

The touchy revelation seems to have been that hard drives removed from Jeffrey Epstein’s townhouse in 2019 already had FBI tags on them, suggesting they’d previously been seized and returned to the predator.

The state-corporatist media, like the federal prosecutors, have ignored the clear implication of surveillance and even blackmail. The court case is limited to six counts relating to sex trafficking and Maxwell’s alleged involvement in Jeffrey Epstein’s sexual abuse of teen women.

Not only does it seem U.S. agencies may have been complicit in compromising individuals — Twitter tries to stop us from knowing. Kudos to The Free Press Report for its daily summary of the trial.

Keep reading

Epstein’s Zorro Ranch Had Computer Rooms the ‘Size of Houses’ to Spy on Guests Including Prince Andrew, Victim Claims

An alleged victim of the late billionaire pedophile Jeffrey Epstein is speaking out this week to claim that his infamous Zorro Ranch had three computer rooms “the size of houses” to spy on famous guests like Prince Andrew.

Former Epstein employee Maria Farmer told The Sun that Epstein had footage of Andre’s alleged seven-day stay at his 33,339 square foot desert estate in New Mexico in 2000.

Architect plans for the home reveal a huge underground floor, around 8,000 sq ft in size, including exercise, massage, and jacuzzi rooms, later transformed into a pool area. It also includes three unusually large “mechanical rooms” on this lower floor, and Farmer claimed these were the computer rooms.

“All of Epstein’s residences had these mechanical rooms and tunnel systems. I know this because Epstein told me,” she alleged.

“These rooms were enormous – bigger than houses. I have no idea why anyone needs so many computers in one room. There were pinhole cameras to record everything on every estate. The cameras were ubiquitous. You couldn’t see them unless they were pointed out to you.”

Keep reading

The Future Of Work At Home: Mandatory AI Camera Surveillance

Colombia-based call center workers who provide outsourced customer service to some of the nation’s largest companies are being pressured to sign a contract that lets their employer install cameras in their homes to monitor work performance, an NBC News investigation has found.

Six workers based in Colombia for Teleperformance, one of the world’s largest call center companies, which counts Apple, Amazon and Uber among its clients, said that they are concerned about the new contract, first issued in March. The contract allows monitoring by AI-powered cameras in workers’ homes, voice analytics and storage of data collected from the worker’s family members, including minors. Teleperformance employs more than 380,000 workers globally, including 39,000 workers in Colombia.

“The contract allows constant monitoring of what we are doing, but also our family,” said a Bogota-based worker on the Apple account who was not authorized to speak to the news media. “I think it’s really bad. We don’t work in an office. I work in my bedroom. I don’t want to have a camera in my bedroom.”

The worker said that she signed the contract, a copy of which NBC News has reviewed, because she feared losing her job. She said that she was told by her supervisor that she would be moved off the Apple account if she refused to sign the document. She said the additional surveillance technology has not yet been installed.

The concerns of the workers, who all spoke on the condition of anonymity because they were not authorized to speak to the media, highlight a pandemic-related trend that has alarmed privacy and labor experts: As many workers have shifted to performing their duties at home, some companies are pushing for increasing levels of digital monitoring of their staff in an effort to recreate the oversight of the office at home.

Keep reading

Microsoft exec: Targeting of Americans’ records ‘routine’

 Federal law enforcement agencies secretly seek the data of Microsoft customers thousands of times a year, according to congressional testimony Wednesday by a senior executive at the technology company.

Tom Burt, Microsoft’s corporate vice president for customer security and trust, told members of the House Judiciary Committee that federal law enforcement in recent years has been presenting the company with between 2,400 to 3,500 secrecy orders a year, or about seven to 10 a day.

“Most shocking is just how routine secrecy orders have become when law enforcement targets an American’s email, text messages or other sensitive data stored in the cloud,” said Burt, describing the widespread clandestine surveillance as a major shift from historical norms.

The relationship between law enforcement and Big Tech has attracted fresh scrutiny in recent weeks with the revelation that Trump-era Justice Department prosecutors obtained as part of leak investigations phone records belonging not only to journalists but also to members of Congress and their staffers. Microsoft, for instance, was among the companies that turned over records under a court order, and because of a gag order, had to then wait more than two years before disclosing it.

Since then, Brad Smith, Microsoft’s president, called for an end to the overuse of secret gag orders, arguing in a Washington Post opinion piece that “prosecutors too often are exploiting technology to abuse our fundamental freedoms.” Attorney General Merrick Garland, meanwhile, has said the Justice Department will abandon its practice of seizing reporter records and will formalize that stance soon.

Keep reading

Your IoT Device is Likely Spying on You through Backdoor Security Flaws

Many people are used to trading privacy for convenience these days. After all, this is how those with nefarious agendas get people to adopt technology that continually spies on them. IoT technology is no different. A recently discovered security vulnerability from a major manufacturer of IoT devices has exposed just how dangerous this technology can be. The following article from TweakLibrary details how this sort of surveillance technology can wreak havoc upon our lives. – Truth Unmuted Editor Jesse Smith

This Security Vulnerability Could Change An IoT Device Into A Nasty Spy

IoT has had a remarkable impact on our lives. We now have devices connected over a network that are capable of making our lives much easier and comfortable. From smartphones to smartwatches to internet-powered doorbells, door alarms, security cameras, speakers, door locks, lights, bulbs, and baby monitors, the list is just endless. However, with this boon, a bane looms around and that is, miscreants can hack into these devices and if not acted upon promptly, they can wreak havoc on our lives. But, when can hackers feed on IoT devices? The answer is when they sniff a security vulnerability or when we as users don’t practice healthy security habits.

We’ll get into the security habits on a user’s part later in the blog but, let’s first discuss how a security vulnerability can lead a hacker into your IoT device and then into your personal or professional life. Quite recently, a security vulnerability has hit IoT devices. This security flaw can give access to your IoT audio and video feeds and turn into a spying tool.

What is This Security Vulnerability All About? How Severe Is The Security Flaw

As per the researchers at Nozomi Networks Lab and DHS, the security flaw can let malicious attackers tamper with an IoT device. They can easily convert a given IoT device such as a home security camera, a baby monitor, or a smart doorbell into a spying tool. Owing to this vulnerability, they can steal crucial data or spy on video feeds as well. Apart from intruding into one’s personal lives through the aforementioned channels, an attacker can even steal crucial business data such as data related to customers, employees, or even production techniques. The security flaw is indeed very severe. So much so that the Common Vulnerability Scoring System (CVSS) rates it at 9.1/10 on a severity scale.

How Did This Security Flaw Surface?

The flaw is a supply chain bug that was discovered in a software component (P2P SDK) manufactured by a company called ThroughTek who is one of the prominent suppliers of IoT devices. The P2P’s SDK gives remote access to audio/ video streams over the internet. The SDK is found in smart sensors, security cameras such as baby and pet monitoring cameras,  doorbells, etc. and it help a viewer gain access to audio/ video streams. The flaw affects P2P’s version 3.1.5 or before. As Nozomi has demonstrated, the older versions of the SDK allow data packets to be intercepted while in transit. A hacker can refurbish these packets into complete audio or video streams.

ThroughTek’s Defence

ThroughTek has countered this bug in version 3.3 that was released in mid-2020. Though the issue is that quite many devices still run the older build. Secondly, as per ThroughTek, to conduct an attack, a prospective attacker will need to have extensive knowledge of network sniffer tools, network security, and encryption algorithm.

Keep reading

Massachusetts Android users alarmed to wake up to COVID tracking app auto-installed

Massachusetts recently launched a contact tracing app for COVID-19, called MassNotifyApp, to track the spread of the virus in the state. But there is one big problem with the app; it is installing itself on Android devices without users’ consent, and even on devices with parental-lock.

“Thank you MA/Google for silently installing #MassNotify on my phone without consent. But I have a request: Can you also silently install an app that makes my phone explode and kill me?” someone wrote on Twitter.

The story is perhaps one of the most egregious violations of an app during the pandemic. It also contradicts what Gov. Charlie Baker, a Republican, said about the app; that it would be voluntary.

Keep reading

Trump DOJ Obtained Data on Schiff and Swalwell, Two Long-Time Champions of Domestic Spying

The Trump Justice Department in 2017 and early 2018 issued subpoenas to Apple to obtain the communications records of at least two Democratic members of the House Intelligence Committee, Reps. Adam Schiff (D-CA) and Eric Swalwell (D-CA). According to The New York Times, DOJ prosecutors attempting to determine who leaked classified information to the media about Russiagate suspected the two House Democrats were the culprits, and to prove that, they obtained their communications records as well as those of family members, including minor children.

A DOJ leak investigation aimed at sitting members of Congress is highly unusual. Both the Obama and Trump administrations, in a hunt for leakers, created controversy by obtaining the communications records of journalists, including — in the case of the Obama DOJ — the family members of those journalists. But investigating members of the House Intelligence Committee for leaking crimes — as opposed to corruption or other standard criminal charges — can present different dangers. Neither Congressman was charged with any crimes and the investigation reportedly bore no fruit.

The two House Democrats, among the most fanatical disseminators of baseless Russiagate conspiracies and long known to serve as anonymous sources of leaks to liberal media outlets, reacted with predictable outrage. “This baseless investigation, while now closed, is yet another example of Trump’s corrupt weaponization of justice,” Schiff intoned on Thursday night. As difficult as it is, Swalwell, as he often does, found a way to be even more melodramatic than Schiff: “Like many of the world’s most despicable dictators, former President Trump showed an utter disdain for our democracy and the rule of law.”

Investigating possible crimes — such as leaking classified information — is the job of the Justice Department. To accomplish that, FBI agents and prosecutors often obtain personal communications records about their suspects. But invading the communications records of journalists, as both the Obama and Trump DOJ did, can create serious threats to press freedom and the possibility of abuse and retaliation. The same is true for invading the communications records of members of the legislative branch, particularly ones hostile to the president. An investigation is certainly warranted to determine the propriety of these subpoenas.

But like so many politicians before them, Schiff and Swalwell have zero credibility to object to this targeting. When it comes to ordinary Americans, both have been long-time champions of expanding domestic spying powers and blocking efforts at reform designed to curb abuses of the type they claim took place here.

Keep reading

Facebook Still ‘Secretly’ Tracks Your iPhone—This Is How To Stop It

So, this isn’t good. Your iPhone settings enable you to tell Facebook you don’t want your location tracked. It’s clear and non-ambiguous. Why then, if you tell Facebook “never” to access your location, is the data harvesting giant doing exactly that?

Apple’s iOS 14.5 is just a few weeks old, and the data already suggests it has delivered the expected strike against Facebook . Unsurprisingly, more than 80% of users do not opt in to being tracked. Millions of you have seen through the brazen warnings that Facebook’s free apps won’t remain free unless we surrender our right to privacy.

Facebook generates almost all its revenue from digital advertising—targeting ads by harvesting as much data from you and about you as it can. “Facebook marketing is generally dominated by iOS,” one ad industry article laments, “it’s pretty safe to assume Facebook has lost at least half their data, arguably the most valuable half.”

All of which means that Facebook will be doing ever more with the data that remains. And there’s a hidden danger in all the iOS 14.5 publicity—a false sense of security for iPhone users, thinking that the Facebook data issue is suddenly over, that everything has now changed. That would be very wrong—it really hasn’t.

Keep reading

Research Finds More Than Half of School Apps Sending Personal Student Data to Third Parties

According to a new research report published by the nonprofit entity Me2B Alliance, around 60 percent of school apps are sending student data to a wide range of high-risk third parties without getting the permission of either the students or their parents.

The study audited 73 apps from 38 different schools spread over 14 American states. It involved almost half a million people, including students, their teachers, and family members. The organization warned that school apps must not include third-party data channels and that an “unacceptable amount” of school data was being shared with third parties through these apps, specifically with analytics and advertising platforms.

“The findings from our research show the pervasiveness of data sharing with high-risk entities and the amount of people whose data could be compromised due to schools’ lack of resources… The study aims to bring these concerns to light to ensure the right funding support and protections are in place to safeguard our most vulnerable citizens – our children,” Lisa LeVasseur, executive director of Me2B Alliance, said in a statement.

The study found that around 18 percent of the apps had links to very high risk third parties, meaning that such parties probably re-shared the data with hundreds of thousands of entities. 67 percent of public school apps were found to be sending data to third parties, which is 10 percent higher than private school apps. 

Keep reading