Lawmaker calls facial recognition on doorbell cameras a ‘privacy nightmare’

Ring, the maker of popular doorbell cameras, said device owners who capture people’s faces may retain the biometric data gathered indefinitely, according to a letter the company sent to a lawmaker.

Sen. Ed Markey (D-MA) asked Ring in October about its privacy policies and how it intends to protect individuals recorded by its new facial recognition technology feature called Familiar Faces. The program, which was released this week, allows Ring owners to easily run face scans of anyone who comes to their door. Ring is owned by tech giant Amazon.

In Ring’s response to Markey, the company also said that individuals whose faces are captured by the Familiar Faces technology have no recourse for ensuring their data is deleted beyond asking individual Ring owners to erase it. As a result delivery drivers are forced to “potentially make separate deletion requests at hundreds or thousands of homes,” according to a Markey press release.

“Despite my warnings, Amazon unleashed a new privacy nightmare on the American people by releasing its Ring doorbell facial recognition feature without any meaningful privacy protections,” Markey said in a statement. “This is a giant step toward a dystopian future where Americans cannot leave their homes without being tracked and surveilled.”

Amazon Vice President of Public Policy Brian Huseman told Markey that Ring owners should ensure they are following local laws governing biometric data collection. In Illinois, for example, the data collection facilitated by Familiar Faces is illegal.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure

Next Post

Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

Related Posts

New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct reconnaissance and execute arbitrary commands on compromised hosts. "Threat actors leveraged compromised credentials that mapped to both Cisco VPN and an over-privileged Active Directory account named, 'serviceaccount,'" eSentire said in a technical report published
Read More

X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts

Social media platform X is urging users who have enrolled for two-factor authentication (2FA) using passkeys and hardware security keys like Yubikeys to re-enroll their key to ensure continued access to the service. To that end, users are being asked to complete the re-enrollment, either using their existing security key or enrolling a new one, by November 10, 2025. "After November 10, if you
Read More

Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with capabilities to observe network traffic to glean details about model conversation topics despite encryption protections under certain circumstances. This leakage of data exchanged between humans and streaming-mode language models could pose serious risks to
Read More