element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      • Japan
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Vietnam
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Wireless
  • Technologies
  • More
Wireless
Blog Smartphone Camera Spying
  • Blog
  • Forum
  • Documents
  • Polls
  • Quiz
  • Events
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Wireless to participate - click to join for free!
  • Share
  • More
  • Cancel
Group Actions
  • Group RSS
  • More
  • Cancel
Engagement
  • Author Author: gervasi
  • Date Created: 23 Mar 2014 12:17 AM Date Created
  • Views 767 views
  • Likes 1 like
  • Comments 1 comment
  • privacy
  • smartphones
Related
Recommended

Smartphone Camera Spying

gervasi
gervasi
23 Mar 2014

Ten years ago I worked on a video conferencing system designed to sit in the center of a conference table.  It had several cameras pointing toward the people sitting around the table.  Software could take data from the cameras and microphones and focus the recording of a meeting on the person talking at that moment.  When used for audio-conferencing, the product requirements called for a physical shield cover the cameras when not in operation.  The engineers suggested it would be much easier to have an LED indicator.  A physical shield was required, however, because users might be unnerved by a camera trained on them and may not trust the indicator.  image

 

Ten years later cameras are ubiquitous because of smartphones.  A paper in the latest issue of IEEE Communications on how malicious apps could exploit phones' cameras. 

 

The Android permission system gives users the opportunity to see what a device can access prior to installation, but many users do not understand what the permission requests stand for. They tend to pay attention access to contact lists, calling history, location, and file access. Users often see camera access as benign.  There are nearly hundred apps designed for taking surreptitious pictures with the users knowledge, but there is a danger of useful apps secretly taking pictures without the user's knowledge.  This is particularly dangerous because people carry phones everywhere. 

 

Apps for taking secret pictures are not necessarily designed for spying or dishonest purposes.  A spy camera app could  take a picture every time someone uses the device, so the user can know if someone is using it without permission.  It could be activated remotely to identify a stolen phone.

 

A malicious application using the camera to spy needs to avoid the various avenues of detection.

  • It must avoid using the CPU when a user app is using the CPU heavily, so the user does not notice the decreased performance and investigate.  Similarly it can avoid using battery-intensive operations when the phone is not plugged into a charger, so the user does not notice decreased battery life.
  • It must turn off the phone's sound and vibration when it activates the camera and then quickly restore them to their previous levels.
  • It must hide the camera preview, which is difficult in Android.  The app can hide the preview by putting the camera preview on a layer behind the app on top or by making the camera preview size 1x1 pixel. 
  • It must store files in confusing file names in obscure directories.
  • It must avoid using excessive mobile data.  One way is to wait until the user connects to a Wi-Fi hotspot to upload the files. 

 

Researchers were able to use the camera for eye tracking to see characters typed by the user.  This was surprising to me, but it turns out eye tracking software is not new. 

 

When eye traacking is deployed while the phone is locked, the locking screen unintentionally provides a shield for the spyware, obviating the need to hide the camera screen running just beneath the lock screen. 

 

Researchers tested this with four-digit passcodes on phones running Android 4.1, 4.2, and 4.3.  The software was able to track eye movements and identify the passcode or narrow it down to a few possibilities. 

 

imageI don't see a malicious app using the camera to work out the combination to unlock someone's phone.  There are probably more straightforward ways to steal this information.  It is a powerful illustration, however, of the unexpected information a malicious app can glean from the camera. 

 

After reading this research, I did a quick search for stories of attackers exploiting camera phones and could not find any.  I would be surprised, however, if it were not happening.  I suspect governments have at least looked into the issue.  Three years ago when the US Congress was working on legislation to prevent a lapse in the “Patriot Act”, two senators on the Intelligence Committee said when people find out how the government has interpreted the Patriot Act and how it is using the powers, people will be “stunned”, “angry”, and “alarmed”.[Link to source NYT article]  Their position on the committee gives them access to the details, but they are not allowed to share it.  The language could be politicking or grandstanding, but reading this article makes me wonder if the government is deploying, at least in special cases, software that exploits cameras and microphones to catch criminals. 

 

This would be hard at this time to deploy on a large scale without being detected.  But if the software is well designed, it could easily be used on a limited basis.  This opens the potential for people working with the software to deploy it for personal gain or for simple peeping.  Is it paranoid to want a physical shield over my camera like the one in the conference system ten years ago?

  • Sign in to reply
  • DAB
    DAB over 11 years ago

    Good post.

     

    I agree that the Patriot Act should not be renewed.  I may not know the specifics, but from my observation, it has enabled too much intrusion into people's privacy.

    There is a very fine line between protecting and controlling a population.  The Patriot Act crosses that line.

     

    As for smart phones with cameras, I do not own one.  It is a purely personal issue, I see little advantage in having a device that can be used against me.  Plus I am anti-social and do not need others around me at all  hours of the night and day.

     

    If you have a smart phone, keep it in a closed pouch.  They can still track you, but you deny them the ability to see what you see, unless you want to share it.

    In the end, the only person insuring your privacy is you.  If you are doing nothing and have no problem with others knowing where you are and what your camera can see, then it is not an issue.

    On the other hand, if you want your privacy, you only need to secure your phone in a metalized container.  You are then safe until you take it out.

     

    Technology is inherently benign, but there are always people who want to exploit it for their own reasons.  As a consumer, you need to understand that fact and act accordingly.

     

    Besides, there are plenty of ways to track where you area and what you do.  It is the world we now live in.

     

    DAB

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube