By Swati Khandelwal
It’s not always necessary to break into your computer or smartphone to spy on you. Today all are day-to-day devices are becoming more connected to networks than ever to add convenience and ease to daily activities.
But here’s what we forget: These connected devices can be turned against us because we are giving companies, hackers, and law enforcement a large number of entry points to break into our network.
These connected devices can also be a great boon for law enforcement that can listen and track us everywhere.
Let’s take the recent example of 2016 Arkansas murder case where Amazon was asked to hand over audio recordings from a suspect’s Echo.
However, that was not the first case where feds asked any company to hand over data from a suspect’s connected device, as they have long retrieved such information from connected cars.
According to court documents obtained by Forbes, United States federal agencies have a 15-year history of “Cartapping” — where vehicle tech providers are ordered to hand over almost real-time audio and location data from a user.
How Police Have Spied On Connected-Cars For Years?
Example? In 2014, satellite radio and telematics provider SiriusXM provided location information of a Toyota 4-Runner following a warrant by New York police, which was recently unsealed.
The warrant asked SiriusXM “to activate and monitor as a tracking device the SIRIUS XM Satellite Radio installed on the Target Vehicle” for ten days, and the company admitted to Forbes that it complied with the order.
How did SiriusXM achieve this? The company simply turned on the stolen vehicle recovery feature of its Connected Vehicle Services technology on the target vehicle, Toyota 4-Runner. It’s like Apple turning on the Find My iPhone feature to track a customer’s location, the court documents [PDF] says.
Continues here: http://thehackernews.com/2017/01/cartapping-connected-cars.html