Lawmaker calls facial recognition on doorbell cameras a ‘privacy nightmare’

Ring, the maker of popular doorbell cameras, said device owners who capture people’s faces may retain the biometric data gathered indefinitely, according to a letter the company sent to a lawmaker.

Sen. Ed Markey (D-MA) asked Ring in October about its privacy policies and how it intends to protect individuals recorded by its new facial recognition technology feature called Familiar Faces. The program, which was released this week, allows Ring owners to easily run face scans of anyone who comes to their door. Ring is owned by tech giant Amazon.

In Ring’s response to Markey, the company also said that individuals whose faces are captured by the Familiar Faces technology have no recourse for ensuring their data is deleted beyond asking individual Ring owners to erase it. As a result delivery drivers are forced to “potentially make separate deletion requests at hundreds or thousands of homes,” according to a Markey press release.

“Despite my warnings, Amazon unleashed a new privacy nightmare on the American people by releasing its Ring doorbell facial recognition feature without any meaningful privacy protections,” Markey said in a statement. “This is a giant step toward a dystopian future where Americans cannot leave their homes without being tracked and surveilled.”

Amazon Vice President of Public Policy Brian Huseman told Markey that Ring owners should ensure they are following local laws governing biometric data collection. In Illinois, for example, the data collection facilitated by Familiar Faces is illegal.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure

Next Post

Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

Related Posts

North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews

As many as 3,136 individual IP addresses linked to likely targets of the Contagious Interview activity have been identified, with the campaign claiming 20 potential victim organizations spanning artificial intelligence (AI), cryptocurrency, financial services, IT services, marketing, and software development sectors in Europe, South Asia, the Middle East, and Central America. The new findings
Read More

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises “complete coverage” or “AI-powered automation,” but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools are truly pulling their weight. The result? Bloated stacks, missed signals, and mounting pressure to do more with less. This
Read More