IE 11 is not supported. For an optimal experience visit our site on another browser.

Forget the NSA: Your Tech Gadgets Are Spying on You

Recent headlines about PRISM — the U.S. government program that allows security officials to spy on people’s Internet activity — confirm what conspiracy theorists have long been foretelling: Big Brother is watching.
/ Source: TechNewsDaily

Recent headlines about PRISM — the U.S. government program that allows security officials to spy on people’s Internet activity — confirm what conspiracy theorists have long been foretelling: Big Brother is watching.

But is the government the only one keeping tabs on what you search for, watch and discuss with friends? The truth is, there are others out there — businesses, advertisers, scammers — hoping to line their pockets by collecting your personal data.

And they have a variety of tools at their disposal to gather the information they need — tools you might even have with you right now. That's right — everything from the smartphone in your pocket to the television in your bedroom can potentially be used to spy on you.

Here are some ordinary gadgets with serious spy potential.


You know your phone is smart, but just how smart is it? Smart enough to sense your every movement. Smart enough to capture your every word.

Smartphones possess an arsenal of powerful features — including microphones, GPS receivers, accelerometers and Wi-Fi antennas — that are meant to help users communicate and access information, but those very same tools can also be used for spying.

John Harrison, a representative with security software company Symantec, said mobile devices are increasingly playing host to the kinds of malware once found only on PCs, such as remote-access Trojans (RATs). RATs turn devices into Bond-esque spy tools, stealing passwords, recording video and audio, and launching attacks on other systems.

And smartphones are also vulnerable to other kinds of hacks. In 2010, researchers at Rutgers University in New Jersey performed a series of rootkit attacks on smartphones, demonstrating how to remotely activate a device's microphone to secretly record conversations.

The researchers were also able to install malware that allowed them to track a user's movements using the phone's GPS receiver.

According to the researchers, smartphone malware is even more dangerous than malware designed for nonmobile operating systems because users take their phones everywhere they go.

An infected desktop computer might record all the conversations you have in your home office, but a smartphone can record all those top-secret meetings you attend at headquarters or next week's clandestine rendezvous.

But even if you don't have secrets to keep, your sneaky smartphone can still cause trouble. Last October, researchers with the U.S. military developed an Android app that creates a 3D map of a phone's surroundings by taking candid photos and collecting orientation data with the phone's accelerometer.

The app, dubbed " PlaceRaider," poses as an innocuous camera app and sends sensitive smartphone data to an external server. Thanks to this app, burglars, identity thieves and other criminals could have a real-time blueprint of your home or business. They could even zoom in on noteworthy sections of the map, like that pile of financial statements on the desk or your open underwear drawer.

And most recently, researchers at the University of Alabama found that smartphones are susceptible to an entirely new kind of threat known as a "context-aware" attack. Such attacks activate malware via sound-based, magnetic or visual stimuli.

This type of malware could turn your phone into a sleeper agent, allowing your trusted device to silently bide its time before spilling all your secrets to some cybercriminal at the drop of a heavy bass line.

[ 10 Ways the Government Watches You ]


If your smartphone turns against you, at least you still have your trusty tablet, right? Wrong. Most tablets have the same operating systems — as well as the same built-in spy tools — as smartphones do.

Take the accelerometer, for example. Much like a smartphone, your tablet comes equipped with a little device that senses the orientation of your tablet. Hence, when you flip the tablet sideways, the screen flips with it.

But the accelerometer also has the potential to flip your whole world upside down. A 2011 study by researchers at the University of California, Davis demonstrated how to use an accelerometer to steal usernames and passwords.

The researchers’ keylogger app measures the physical motion made when touching onscreen keys and can detect which keys were touched with 70 percent accuracy. If installed on your tablet, the " TouchLogger " app could provide scammers with all the information they need to wreak havoc on your digital world.

Smart TVs

So your mobile devices are all sneaky robots, but what about the stationary gadgets you keep at home? Surely, those are trustworthy.

Actually, they're not. In December 2012, cybersecurity firm ReVuln discovered a flaw in Samsung's then-newest-generation of smart TVs.

The flaw granted hackers access to viewers' sensitive data, such as viewing history and remote files. It also let hackers spread malware to USB devices attached to TVs.

Luigi Auriemma and Donato Ferrante, co-CEOs of ReVuln, said any device that takes an input from the environment, whether it's using Wi-Fi or some other means, is vulnerable.

"It's also interesting to consider that even a device not accessible from the Internet is at risk because it can be attacked from LAN [a local area network] through a compromised PC, or via other attack vectors like USB or Bluetooth," Auriemma and Ferrante wrote in an email interview with TechNewsDaily.

As more home devices, like TVs and gaming consoles, come equipped with these "attack vectors," they said, the chance of spyware spreading to every device you own increases exponentially. Take, for example, the Flame (aka Flamer, aka Skywiper) malware toolkit of 2012.

That piece of mega-malware was spread from USB to USB, infecting hundreds of machines running Windows’ XP, Vista and 7 operating systems. Once infected, hackers used compromised computers to perform some of the most advanced spy maneuvers the world has ever seen.

Flame — which is believed to have been developed by an unknown national government — could detect keystrokes, take screenshots, monitor user activity both on and offline, record conversations and even spy on other devices connected to the same Wi-Fi network. It then sent this data to a dozen different servers around the world.

Imagine the espionage that could occur if such spyware were compatible with mobile operating systems, like Android, or if it could be spread over the Internet as well as through USB devices.

Cable boxes

You're probably thinking that because your TV isn't connected to the Internet, your television habits are safe from the prying eyes of hackers and other unsavory characters, and you might be right. But then again, you might be wrong.

Although ideas about how to hack this type of device are still in their infancy, the mere possibility that it could happen could introduce privacy concerns.

In 2011, Verizon submitted a patent application for a TV set-top cable box equipped with motion and audio sensors that track viewers' every movement and utterance, all for the sake of bombarding them with targeted advertisements.

If the patent is ever approved, Verizon's voyeuristic device will be sure to wipe away any illusions you had about your privacy in the presence of consumer electronics.

Gaming consoles

While spying cable boxes are not yet a reality, spying Xboxes are. Ever since Microsoft debuted its first Kinect-compatible Xbox console in 2010, gamers have been speculating about whether they’re being spied on in their bedrooms.

This year, Microsoft is set to roll out a new console, the Xbox One — and rumors about its cyborglike capabilities, coupled with Microsoft's ambiguous language surrounding user privacy, aren't doing much to calm those fears.

Like its predecessors, the One connects to the Internet through the Xbox Live service, which must be manually shut off when not in use. That's right, unless you remember to shut it off, the One will be watching.

But what does the One do with the data it collects from gamers? Is this information sent directly to Mordor? To Microsoft?

Unfortunately, that much isn't completely clear. However, it's worth mentioning that much like Verizon, Microsoft also submitted a patent application in 2011 for an app — most likely for the Xbox One — that would track Xbox users’ TV watching and then reward them with advertiser coupons and other promotions.

According to The Verge, these rewards would be granted to users who watch an entire television series from start to finish, or to those who don't leave the room during commercials. 

Smart meters

Right now, you're probably thinking, "I'll just give up playing video games, stop watching TV and flush my cellphone down the toilet." But before you do anything drastic, you should know this: They'll still be watching you.

"Smart" technology — such as refrigerators with touch screens, and wireless electric meters — might help you save money on your utility bills, but these connected devices also help hackers peer into your home.

Last year, a group of German researchers demonstrated the inherent vulnerabilities in smart-meter systems by hacking into an electric company's wireless network and intercepting the supposedly private information of its users.

Equipped with a digital fingerprint of a home's power usage, the researchers could tell when residents were at home, away or asleep. They could even tell what movies people were watching in their living rooms.

Although cybercriminals are likely not interested in your preference for the original “Toy Story” movie, they might like to know when you're spending the week in Disneyland.

But keep in mind that not all smart appliances offer up such valuable information to cybercriminals.

"Will [hackers] make their way onto my washing machine or refrigerator and see how much milk I have?" said Symantec's Harrison. "I am not sure too many hackers would care about that kind of thing."

But for gadgets that do transmit information that could line a hacker's pockets, Harrison recommends taking a few precautionary measures.

"Think before you click," Harrison said. "Users should be careful with which links they click on, even from people they know. If an email seems vague or out of character for that person, don't open it or click on the link. Just clicking on a malicious link can silently infect your system with a drive-by download."

And if you're worried that your TV or webcam is spying on you, Harrison said, there's a low-tech fix for that: Simply put a piece of tape over the camera.

To further thwart those nasty spies, consider a security software solution for all your devices, especially the ones you bring everywhere. And never underestimate the power of a good password.

Follow Elizabeth Palermo  @techEpalermo. Follow us @TechNewsDaily, on Facebook or on  Google+. This story was originally published on TechNewsDaily .