Lawmaker calls facial recognition on doorbell cameras a ‘privacy nightmare’

Ring, the maker of popular doorbell cameras, said device owners who capture people’s faces may retain the biometric data gathered indefinitely, according to a letter the company sent to a lawmaker.

Sen. Ed Markey (D-MA) asked Ring in October about its privacy policies and how it intends to protect individuals recorded by its new facial recognition technology feature called Familiar Faces. The program, which was released this week, allows Ring owners to easily run face scans of anyone who comes to their door. Ring is owned by tech giant Amazon.

In Ring’s response to Markey, the company also said that individuals whose faces are captured by the Familiar Faces technology have no recourse for ensuring their data is deleted beyond asking individual Ring owners to erase it. As a result delivery drivers are forced to “potentially make separate deletion requests at hundreds or thousands of homes,” according to a Markey press release.

“Despite my warnings, Amazon unleashed a new privacy nightmare on the American people by releasing its Ring doorbell facial recognition feature without any meaningful privacy protections,” Markey said in a statement. “This is a giant step toward a dystopian future where Americans cannot leave their homes without being tracked and surveilled.”

Amazon Vice President of Public Policy Brian Huseman told Markey that Ring owners should ensure they are following local laws governing biometric data collection. In Illinois, for example, the data collection facilitated by Familiar Faces is illegal.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure

Next Post

Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

Related Posts

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new ransomware-as-a-service (RaaS) offering called VolkLocker that suffers from implementation lapses in test artifacts, allowing users to decrypt files without paying an extortion fee. According to SentinelOne, VolkLocker (aka CyberVolk 2.x) emerged in August 2025 and is capable of targeting both Windows
Read More

Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly

Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini artificial intelligence (AI) model API to write its own source code for improved obfuscation and evasion. "PROMPTFLUX is written in VB Script and interacts with Gemini's API to request specific VBScript obfuscation and
Read More

Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI's ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users' memories and chat histories without their knowledge. The seven vulnerabilities and attack techniques, according to Tenable, were found in OpenAI's GPT-4o and GPT-5 models. OpenAI has
Read More