Breaking News



Home / 1. Free Content / Google Admits That “Others” Can Access The Camera On Samsung & Android Smartphones

Google Admits That “Others” Can Access The Camera On Samsung & Android Smartphones

By Alanna Ketler

  • The Facts: Hackers have successfully been able to access the front facing cameras on Google and Samsung phones without permission from the user and regardless of whether or not the phone was unlocked. They were able to take pictures and record video.
  • Reflect On: Why should you care? This is an outright invasion of our right to privacy. If we continue to willingly give up all our rights, soon we won’t have any left.

As handy as they are, our smartphones are literally portable tracking devices. Equipped with GPS technology, people can easily be located; and for most Android users a record of where they’ve been each day since they’ve had their fancy phones is stored online. If that’s not creepy enough, the microphones on our phones are also able to record our conversations because they are listening even when we don’t think they are. Finally, you know those handy front-facing cameras often used to capture the perfect selfie? Recently, researchers have revealed how this camera can be used to spy on users. Who would have thought?

The security research team from Checkmarx has uncovered a major vulnerability that is affecting Google and Samsung smartphones and has a potential to impact the hundreds of millions of Android users across the globe. Apparently, it’s now fixed, but the researchers discovered a way for a hacker to take control of the front-facing camera and remotely take photos, record video, listen in on your conversations and more. All happening silently in the background without your awareness.

BOOK AD

Coup d’etat in Slowmotion

by Ole Dammegard

For almost 30 years investigator Ole Dammegård has been on a quest to find the truth behind some of the worst conspiracies in the history of world – such as the murders US President John F. Kennedy, Robert Kennedy, John Lennon and the blowing up of m/s Estonia killing at least 852 innocent people. This has taken him on a very frightening and dangerous journey into unknown territories. What has been claimed as acts by lone madmen has turned out to be connected to the International military industrial complex and top level high finance, all sanctioned locally behind dark smoke screens. This ground breaking book focuses on the assassination of the Swedish Prime Minister Olof Palme, who was gunned down in February 1986. In Volume I secret agents, mercenaries, professional assassins, top politicians and innocent scapegoats fill the pages of this explosive book which shows a side of Sweden and the western world earlier glimpsed by very few. This is not the private opinion of one individual, but the disclosure of a puzzle so vast that it blows your mind. Let the detailed content speak for itself, but do not accept it uncritically. Read it – make up your own mind – then spread it.

To preview the book click on the thumbnail below:
Vol 1 Paperback Vol 2 Paperback
Buy The eBook here

And, although it’s important to note that the following is merely speculation, if hackers have the ability to do this, then you better believe that the NSA and other high-level government agencies are able to do the same thing.

This isn’t something new, Edward Snowden, NSA whistleblower, and many others like him have talked about and have explained how our phones are actually used to spy on us.

What Did The Checkmarx Security Research Team Find?

Their research began on the Google camera app on the Pixel 2XL and Pixel3 smartphones, they found a few vulnerabilities which were initiated by allowing an attacker to remotely bypass user permissions. Apparently, facial recognition, fingerprint and password security are not as secure as we’ve been led to believe.

“Our team found a way of manipulating specific actions and intents,” Erez Yalon, director of security research at Checkmarx said, “making it possible for any application, without specific permissions, to control the Google Camera app. This same technique also applied to Samsung’s Camera app.”

Davey Winder, from Forbes.com explains how an attacker is able to exploit the Google Camera app vulnerabilities,

Checkmarx created a proof of concept (PoC) exploit by developing a malicious application, a weather app of the type that is perennially popular in the Google Play Store. This app didn’t require any special permissions other than basic storage access. By just requesting this single, commonplace permission, the app would be unlikely to set off user alarm bells. We are, after all, conditioned to question unnecessary and extensive permission requests rather than a single, common one. This app, however, was far from harmless. It came in two parts, the client app running on the smartphone and a command and control server that it connects to in order to do the bidding of the attacker. Once the app is installed and started, it would create a persistent connection to that command and control server and then sit and wait for instructions. Closing the app did not close that server connection. What instructions could be sent by the attacker, resulting in what actions?

I hope you are sitting down as it’s a lengthy and worrying list.

  • Take a photo using the smartphone camera and upload it to the command server.
  • Record video using the smartphone camera and upload it to the command server.
  • Wait for a voice call to start, by monitoring the smartphone proximity sensor to determine when the phone is held to the ear and record the audio from both sides of the conversation.
  • During those monitored calls, the attacker could also record video of the user at the same time as capturing audio.
  • Capture GPS tags from all photos taken and use these to locate the owner on a global map.
  • Access and copy stored photo and video information, as well as the images captured during an attack.
  • Operate stealthily by silencing the smartphone while taking photos and recording videos, so no camera shutter sounds to alert the user.
  • The photo and video recording activity could be initiated regardless of whether the smartphone was unlocked.

Of course, when Google was confronted about this alarming issue they seemed glad to hear about it so that they could fix the problem, telling Winder after he reached out,

We appreciate Checkmarx bringing this to our attention and working with Google and Android partners to coordinate disclosure. The issue was addressed on impacted Google devices via a Play Store update to the Google Camera Application in July 2019. A patch has also been made available to all partners.

Why Should You Care?

While it is great that they are enhancing their security, there is no doubt in my opinion that hackers can find a way to get around the new security. What’s even more alarming than hackers is government agencies having the ability to turn on your camera and “check in” on you whenever they  please without your permission, or your awareness.

Sound Familiar?

This is literally Orwell’s 1984 coming to life! If you are unfamiliar with this book, firstly, I highly recommend it; secondly, it basically foreshadows a totalitarian government referred to as “Big Brother” that is constantly watching and spying on citizens to ensure they are following the rules set forth by the State. As Orwell writes,

The telescreen received and transmitted simultaneously. Any sound Winston made, above the level of a very low whisper, would be picked up by it; moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever the wanted to. You had to live- did live, from habit that became instinct- in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.

and..

He thought of the telescreen with its never-sleeping ear. They could spy upon you night and day, but if you kept your head you could still outwit them. With all their cleverness they had never mastered the secret of finding out what another human being was thinking. . . . Facts, at any rate, could not be kept hidden. They could be tracked down by inquiry, they could be squeezed out of you by torture. But if the object was not to stay alive but to stay human, what difference did it ultimately make? They could not alter your feelings; for that matter you could not alter them yourself, even if you wanted to. They could lay bare in the utmost detail everything that you had done or said or thought; but the inner heart, whose workings were mysterious even to yourself, remained impregnable.

So, What Can We Do?

I’m sure there are a great number of you out there who are thinking, I’ve got nothing to hide, so who cares?  This is a very passive stance, and it’s not about whether or not you are participating in illegal activities and/or are worried about being sentenced to jail or caught by authorities, it’s about our right to privacy. As whistleblower Edward Snowden has said, “Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.”

But, to each their own. Some steps you can take to protect your privacy,

  • Tape the front facing camera on your device while you’re not using it.
  • You may want to put some sticky tack over the microphone when you’re not using it as well.
  • Turn off your phone when not in use.
  • Simply use your phone less, and when not on it, put it in a different room.
  • You may want to be extra cautious when changing, or plotting to overthrow your government.
  • You can actually buy nifty little sliding covers to block your camera for your phone and computer.
  • Personally, I’ve been toying with the idea of going back to a good ol’ basic flip phone… not just for the security and privacy measures, but to avoid wasting so much time.

Hi, I’m Alanna! My journey really began in 2007 when I began to question what was being presented to me, my path led me to Collective Evolution and I joined the team in 2010. Wow, has it been an incredible journey so far! I am extremely passionate about learning new information! I aim to have a voice for animals and animal rights, I also enjoy writing about health, consciousness and I am very interested in psychedelics for healing purposes! I strongly believe that knowledge is power, and the first step to creating change on this planet is by raising awareness. “If we could see the miracle of a single flower clearly, our whole life would change.” -Jack Kornfield Questions or comments? Email me [email protected]

This article was sourced from Collective Evolution.

Please take a moment to support Ole on Patreon!

About Guest Author

Much of the daily content we publish is notable to us for various reasons. Having said that, the views and opinions expressed in this content, (articles, videos or any other content), are those of the authors and do not necessarily reflect the opinions of the authors of this site. As always, please do your own research. Please do not believe what you are told. Take what you like, and leave the rest.