Lawmaker calls facial recognition on doorbell cameras a ‘privacy nightmare’

Ring, the maker of popular doorbell cameras, said device owners who capture people’s faces may retain the biometric data gathered indefinitely, according to a letter the company sent to a lawmaker.

Sen. Ed Markey (D-MA) asked Ring in October about its privacy policies and how it intends to protect individuals recorded by its new facial recognition technology feature called Familiar Faces. The program, which was released this week, allows Ring owners to easily run face scans of anyone who comes to their door. Ring is owned by tech giant Amazon.

In Ring’s response to Markey, the company also said that individuals whose faces are captured by the Familiar Faces technology have no recourse for ensuring their data is deleted beyond asking individual Ring owners to erase it. As a result delivery drivers are forced to “potentially make separate deletion requests at hundreds or thousands of homes,” according to a Markey press release.

“Despite my warnings, Amazon unleashed a new privacy nightmare on the American people by releasing its Ring doorbell facial recognition feature without any meaningful privacy protections,” Markey said in a statement. “This is a giant step toward a dystopian future where Americans cannot leave their homes without being tracked and surveilled.”

Amazon Vice President of Public Policy Brian Huseman told Markey that Ring owners should ensure they are following local laws governing biometric data collection. In Illinois, for example, the data collection facilitated by Familiar Faces is illegal.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure

Next Post

Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

Related Posts

When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security

The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. Using the CISA Known Exploited Vulnerabilities Catalog as a reference, hundreds of software flaws are now confirmed as actively targeted within days of public disclosure. Each new announcement now triggers a global race
Read More

⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just hours after being found. No system was fully safe. From spying and fake job scams to strong ransomware and tricky phishing, the attacks came from all sides. Even encrypted backups and secure areas were put to the test.
Read More