Apple Siri contractors often hear up to 30 seconds of accidental recordings
Apple has been open about the fact that it screens some Siri recordings to improve the AI assistant’s ability to “understand you better and recognize what you say.” But there are more of these recordings — notably accidental ones — than most customers realize, The Guardian reports, and they’re being heard by human contractors with high turnover rates, not just internal Apple teams. Worse yet, a whistleblower says that the recordings often contain highly private details that could be used to identify and compromise Apple’s users.
According to the report, the key issue is that Siri can be accidentally triggered by audio cues, including anything from the sound of a zipper to the word “Syria,” as well as gestures such as raising an Apple Watch on a certain angle. These inadvertent activations aren’t just frequent; on the Watch, they also lead to 30-second long recordings, some fraction of which are shared with Apple’s contractors for analysis, where they “can gather a good idea of what’s going on.”
The snippets have allegedly included “countless instances” of discussions between doctors and patients, sexual encounters, business deals, and criminal activities such as drug deals, accompanied by the user’s location, contact details, and app data. While contractors aren’t specifically listening for private activities in the recordings, the whistleblower claims that Apple doesn’t do “much vetting of who works there, and the amount of data that we’re free to look through seems quite broad … If there were someone with nefarious intentions, it wouldn’t be hard to identify [people on the recordings].”
Compounding the issue, Siri responds to the question “are you always listening?” by saying “I only listen when you’re talking to me,” providing a false sense of security regarding accidental activations. The most frequent accidental recordings come from Apple Watches and HomePod speakers, the whistleblower said, without specifying ratios for Apple’s other devices, such as iPhones, iPads, and Apple TVs.
Asked for comment, Apple suggested that the requests aren’t associated with the user’s Apple ID, and claimed that Siri responses are analyzed in “secure facilities” by reviewers who are all “under the obligation to adhere to Apple’s strict confidentiality requirements.” The company said that only a random subset of under 1% of daily Siri activations are used for accuracy grading — a number that could be massive, given that there are at least 500 million Siri devices out there — and most recordings are only a few seconds long.
Apple has positioned itself as the world’s most privacy-conscious tech giant, in recent months marketing its devices as particularly secure with users’ personal data. In January, it launched a gigantic billboard at CES under the theme “what happens on your iPhone, stays on your iPhone,” and representatives have portrayed the company as wholly disinterested in what’s on users’ devices — apart from keeping their content safe from unwanted inspection. The company also explicitly said last year that iPhones aren’t spying on users, though bugs in its FaceTime Audio system have twice enabled other users to surreptitiously hear private conversations in the vicinity of iPhones
Industry: Cyber Security
- SPLUNK SOC Analyst level 3, London.
SPLUNK SOC Analyst level 3, Must be able to commute to the City of London. Onsite role. Security clearance needed. The SPLUNK SOC Analyst level 3 must have current experience working within a SOC environment with specific experience using a range of tools and techniques to investigate security incidents. Current experience with Splunk is essential. any additional experience Individuals with Elastic Security SIEM are highly desirable. Any of the following certifications are desirable Splunk Phantom certified admin, Splunk Core Certified Power User / Advanced, Splunk Certified Enterprise Security Admin, etc The role will include, but not be limited to working with sophisticated information security tools, investigating security incidents, incident management, technical escalation, process improvement, research into the latest threats, reporting etc The individual MUST currently be living in the UK and be able to achieve UK security clearance. (SC) This is a permanent role To arrange a call with Chris Holt https://calendly.com/chris-holt/arranged-call-with-chris-holt-elastic-siem-engineer-soc Chris.Holt@dclsearch.com
- ISO 27001 & Business Continuity Security Specialist, End User
- United Kingdom
CH7828 ISO 27001 & Business Continuity Security Specialist, End User, £70,000 United Kingdom ISO 27001 & Business Continuity Security Specialist needed to join a Cyber team within an end user. The ISO 27001 & Business Continuity Security Specialist will have end to end responsibility for the information security and Business Continuity management system. ISMS/BCMS. Both from an information security and technical security perspective working alongside the CISO. Experience must include, but not be limited to; a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling to achieve compliance. ISO 22301, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. Experience taking a company through accreditation is highly desirable Experience managing internal stakeholders, technical teams and external third parties essential Flexible working, very occasional travel to London office This is an exclusive role to DCL Search & Selection. Looking to interview immediately. https://calendly.com/chris-holt/iso-27001-business-continuity-security-specialis
- PCI- DSS Security Consultant, End User
PCI- DSS Security Consultant needed to join a Cyber team within an end user. The PCI- DSS Security Consultant will have end to end responsibility for PCI - DSS and its continuing certification. Both from an information security and technical security perspective working alongside the CISO. Experience must include, but not be limited to; a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling to achieve compliance. PCI objectives / 12 key requirements, OWASP top 10, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. PCI Cloud compliance, specifically someone with experience taking PCI-DSS from on premise into the cloud is HIGHLY desired. However, someone with Solid PCI experience with a strong technical background which include Cyber / Secure by design etc would be considered. Experience managing internal stakeholders and external third parties essential. Flexible working, but with the ability to get into London. This is an exclusive role to DCL Search & Selection. 1st stage interviews to happen the week of the 14th September Arrange a call with Chris on https://calendly.com/chris-holt/arrange-a-call-chris-dcl-pci-compliance
- IAM Contractor CyberArk
Identity & Access Management Architect Contractor Flexible • Extensive PAM / IAM experience required, • MUST have CyberArk and or Beyondtrust. Privileged access management • Technical review, recommendation, design and hands on technical delivery. • 6 month contract Arrange a call with Chris Holt https://calendly.com/chris-holt/arranged-call-with-chris-holt?month=2020-09