Is Your Smart Speaker Spying On You?

Is Your Smart Speaker Spying On You?

Those personal assistants everyone seems to be getting for their home are convenient voice-activated tools for an increasing number of tasks. But when Alexa and Google Home are constantly recording and uploading your voice to the cloud, a third-party server, you could potentially be exposing yourself to hackers, government intrusion, and corporate spying. Are these legitimate concerns or paranoid conspiracy?

Amazon Echo and Alexa 

By now, almost everyone is familiar with Amazon’s voice-command personal assistant, Alexa – arguably better than Siri, but not quite as intuitive as HAL 9000, though that’s probably for the best. Since the technology was introduced in 2014, a number of iterations from Amazon and Google have been created to put smart speakers in the homes of every consumer.

These speakers are able to play your favorite song, order pizza, activate other smart devices, and maintain your calendar. But some of the other conveniences they can handle involve personal data, like locating your phone, accessing bank account information, and calling your loved ones. All of this is accomplished by having a microphone ready to start recording at any given moment.

These days, new technological advents are a double-edged sword; they’re increasingly convenient, but also increasingly intrusive. That microphone recording your request to order take-out is also uploading it to a cloud server; a third party that is able to do what it wishes with that information.

Now, it would require a lot of data storage to record and save everything, all the time, so the device waits for a wake word to start listening. Your recording is then sent to the cloud to be translated by voice recognition software.

Amazon calls this the Alexa Voice Service, or AVS, which one can access and use to build your own voice assistant with a single-board computer like Raspberry Pi. That’s why the basic versions of the technology, like the Amazon Dot, that don’t include a Bluetooth speaker, can provide the technology so inexpensively; it’s basically just a microphone that sends your voice recordings to software in the cloud.

 

home intelligent voice activated assistant 3d rendering concept of hi tech futuristic artificial intelligence speech recognition technology

 

 

So, if the technology is that simple, doesn’t that leave it vulnerable to hackers? Yes, it does. In fact, there have been several different successful hacks that have forced Amazon to warn users of design flaws and vulnerabilities.

On Amazon’s pre-2017 technology, one programmer created a malware code that could be installed on Alexa-enabled devices to make it stream recorded conversations directly to his computer. This program was installed by physically removing the rubber bottom and soldering a connection between the device’s internal hardware, an SD card reader, and his laptop.

Though this particular connection would have been blatantly obvious to the person whose device was tapped, he said he would be able to create a 3D-printed plate that could be easily planted and go unnoticed with more time and development.

Amazon’s response? Don’t buy one of their devices from a third party. This might be the only advice needed for most consumers, but for those unfamiliar with the technology, they may be unwittingly spied on in public places where Amazon products are starting to be planted. Last year, the Wynne hotel in Las Vegas announced it would put Echoes in all of its rooms, while Amazon is adamantly targeting other hotel groups to do the same.

But that wasn’t the only instance of someone finding a security flaw in one of these speakers. Hackers have found a way to translate voice commands into high-frequency pitches able to be heard by Alexa but not by you – kind of like a dog whistle. Again, to use this hack you must be close to the speaker, though it’s much more reticent than having to install something.

While just about anything can be hacked by someone with enough know-how, there have been cases in which these devices have been recording everything as soon as they were turned on, straight from the factory. One tech blogger found his Google Home mini-speaker was recording and uploading his conversations without him saying the wake word. Google has since fixed this design oversight, but it goes to show just how easily it could “accidentally” happen.

Can Government Subpoena Your Voice Assistant?

The technology has only been available for a few years and already the police have tried to acquire a warrant to access recordings from one of these always-on devices. In a case in Arkansas, police sought access to an Amazon Echo in the home of a man convicted of murder.

The company refused to hand over the information and told police that there wouldn’t even be anything there unless the wake word was used to activate the device. Eventually, the defendant agreed to allow the police access to the Echo, from which they found no incriminating evidence, and the case was dropped.

But it wasn’t just the Amazon smart speaker that the police and prosecution hoped to find evidence in, it was also his smart water meter. Prosecutors pointed to a large amount of water used between 1-3 a.m., the time it was thought the defendant hosed down his porch to clean off blood from the victim. The defendant said the am/pm function wasn’t accurate and that he used that much water 12 hours earlier to fill the hot tub.

 

alexa spying on you

 

It’s this level of detail that our web of smart devices can unwittingly tell others about our activity. The use of a smart electric meter can even be used to see what television programs we’re watching by matching electricity fluctuations with the brightness of the screen. Essentially, each program creates a unique power signature, that can be matched to monitor your television habits.

Because these devices are recording data and uploading it to a third-party server, it can be made public or sold to advertisers who can calculate your habits with metadata. It’s unclear whether this type of intrusive data collection is actually being employed by many companies, but it’s highly likely. And as more and more of our appliances become part of the Internet of Things or IoT, every time you use them, data will be mined and analyzed in order to monitor your behavior.

The ACLU has proposed a set of rules and regulations that should be adhered to by law enforcement and other third parties for the protection of consumer privacy, though they haven’t been written into any legislation yet. It seems that unless we figure out a way to prevent the sharing of all this personal information from the use of smart utilities, we may be offering up access to every minute detail of our lives.



4-Year University Study Discredits Official 9/11 Narrative

“Jet fuel can’t melt steel beams,” has been an aphorism used by those who believe the events on 9/11 were a false flag operation. It is also used pejoratively by those who believe that several steel-framed buildings fell in on themselves in downtown Manhattan that day, due primarily to intense heat from fires, defying all historical precedence for structures of that magnitude and level of engineering.

It can be difficult to take a firm stance on either side of the argument when talking about an event that was so tragic and insidious. But no matter where one stands in their perspective of Sept. 11, 2001, it helps to keep an open mind and always question the narrative we are fed that is so often controlled by underlying agendas.

9/11 False Flag

Of the horrific attacks that took place that day, there are seemingly endless postulations and conspiracies as to what really went on. Millions of dollars of United and American Airlines “put-option” stocks were traded in the week leading up to the attack; there were blatant business ties between the Bush family and Osama bin Laden; and only one flight was allowed in the air after the attacks, flying 140 Saudi nationals home to safety. These are just a few of the conspicuous events tied to that day.

But the use of those events as justification to go to war, ostensibly makes 9/11 a false flag event used as an imperialist grab of oil reserves, miring us in an endless conflict with no light at the end of the tunnel. Terrorism persists, Operation Iraqi Freedom created a bigger monster in ISIS, and the situation in Afghanistan is still a quagmire.

But the truth behind the events of that day still remain shrouded by government cover-ups and harsh ridicule of those who dare to question that narrative. All the elements of the events that have transpired since, are the classic building blocks of a false flag operation. And a majority of Americans believe the government is concealing information about 9/11, while 15 percent believe the towers were brought down in a controlled demolition.

Read Article

Our unique blend of yoga, meditation, personal transformation, and alternative healing content is designed for those seeking to not just enhance their physical, spiritual, and intellectual capabilities, but to fuse them in the knowledge that the whole is always greater than the sum of its parts.


Use the same account and membership for TV, desktop, and all mobile devices. Plus you can download videos to your device to watch offline later.

Desktop, laptop, tablet, phone devices with Gaia content on screens
Testing message will be here