Ring Will Stop Giving Cops a Free Pass on Warrantless Video Requests

Ring, the Amazon-owned home surveillance company known for its long history of partnering with police, announced today that it plans to shut down a controversial tool that allows law enforcement to ask users to share their footage without first obtaining a warrant.
Civil liberties advocates are praising the move, but some warn that the very presence of home surveillance cameras continues to pose a risk to privacy and fuel police overreach.
Although Ring says the RFA tool will no longer be available starting next week, there are several other ways police can access Ring users' surveillance footage without obtaining a warrant.
Controversy over Ring's relationship with law enforcement stems from its police partnership program, first revealed in a CNET investigation in June 2019.
For years, Ring worked with police to sell discounted devices, some of which were subsidized with taxpayer funds, and frequently pressured police departments to follow company talking points.
A December 2019 Gizmodo investigation that mapped Ring's surveillance network using metadata from videos posted to the Neighbors app found that cities around the United States were blanketed by Ring cameras, subjecting residents to widespread surveillance.
The Washington Post found that Ring had partnered with more than 400 police departments in the US as of August 2019-a figure that rose to more than 2,100 by July 2022, according to a letter Ring sent to US senator Ed Markey, a Massachusetts Democrat, who has introduced legislation that attempts to place limits on corporate-run surveillance networks like Ring's.


This Cyber News was published on www.wired.com. Publication date: Thu, 25 Jan 2024 00:13:04 +0000


Cyber News related to Ring Will Stop Giving Cops a Free Pass on Warrantless Video Requests

Ring Will Stop Giving Cops a Free Pass on Warrantless Video Requests - Ring, the Amazon-owned home surveillance company known for its long history of partnering with police, announced today that it plans to shut down a controversial tool that allows law enforcement to ask users to share their footage without first ...
9 months ago Wired.com
CVE-2022-48998 - In the Linux kernel, the following vulnerability has been resolved: powerpc/bpf/32: Fix Oops on tail call tests test_bpf tail call tests end up as: test_bpf: #0 Tail call leaf jited:1 85 PASS test_bpf: #1 Tail call 2 jited:1 111 PASS test_bpf: #2 ...
2 weeks ago Tenable.com
'Corrupt' cop jailed for tipping off pal to EncroChat op The Register - A British court has sentenced a "Corrupt" police analyst to almost four years behind bars for tipping off a friend that officers had compromised the EncroChat encrypted messaging app network. Natalie Mottram, 25, of Warrington, England, was sent down ...
11 months ago Theregister.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
FBI's latest defense of warrantless S. 702 snooping is China The Register - Analysis The FBI's latest PR salvo, as it fights to preserve its warrantless snooping powers on Americans via FISA Section 702, is more big talk of cyberattacks by the Chinese government. Wray cited an example he's used previously about how, last ...
8 months ago Go.theregister.com
5 Valuable Skills Kids Can Gain by Playing Video Games - Video games come in all shapes and sizes and can be very educational for children of all ages. Video games can provide children with valuable skills that can help them in their everyday lives. From problem-solving abilities to self-control, learning ...
1 year ago Welivesecurity.com
CVE-2021-47434 - In the Linux kernel, the following vulnerability has been resolved: xhci: Fix command ring pointer corruption while aborting a command The command ring pointer is located at [6:63] bits of the command ring control register (CRCR). All the control ...
5 months ago Tenable.com
WebRTC vs. RTSP: Understanding the IoT Video Streaming Protocols - At the moment, there is a constantly increasing number of smart video cameras collecting and streaming video throughout the world. Here's what you need to know about WebRTC vs. RTSP and their suitability for various streaming needs. The Basics of ...
9 months ago Feeds.dzone.com
CVE-2023-52664 - In the Linux kernel, the following vulnerability has been resolved: net: atlantic: eliminate double free in error handling logic Driver has a logic leak in ring data allocation/free, where aq_ring_free could be called multiple times on same ring, if ...
5 months ago Tenable.com
Senate Leaders Plan to Prolong NSA Surveillance Using a Must-Pass Bill - Roughly a quarter of a million people are targeted by the program each year, and it is estimated that the number of individual messages collected reaches into the hundreds of millions. While the NSA is not allowed to target the communications of "US ...
11 months ago Wired.com
Employee giving and volunteerism drives positive business outcomes - Cisco was honored last year to win the top spot on People's 2023 List of Companies That Care, and a key factor was our employee culture of giving back. We've been on a multi-year journey to engage our employees for positive impact at scale. Not only ...
9 months ago Feedpress.me
CVE-2023-52494 - In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Add alignment check for event ring read pointer Though we do check the event ring read pointer by "is_valid_ring_ptr" to make sure it is in the buffer range, but ...
7 months ago Tenable.com
CVE-2021-28689 - x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement ...
1 year ago
CVE-2024-49931 - In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix array out-of-bound access in SoC stats Currently, the ath12k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ...
2 weeks ago Tenable.com
CVE-2024-49930 - In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix array out-of-bound access in SoC stats Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ...
2 weeks ago Tenable.com
The Benefits of Video Conferencing with iMind: Exploring the Positive Impacts - Video conferencing with iMind is a great way to leverage the benefits of remote communication for employees and businesses alike. From increasing collaboration and flexibility to cost-savings and improved time management, the advantages of video ...
1 year ago Hackread.com
The SAFE Act to Reauthorize Section 702 is Two Steps Forward, One Step Back - Section 702 of the Foreign Intelligence Surveillance Act is one of the most insidious and secretive mass surveillance authorities still in operation today. The Security and Freedom Enhancement Act would make some much-needed and long fought-for ...
7 months ago Eff.org
StopCrypt: Most widely distributed ransomware now evades detection - A new variant of StopCrypt ransomware was spotted in the wild, employing a multi-stage execution process that involves shellcodes to evade security tools. StopCrypt, also known as STOP Djvu, is the most widely distributed ransomware in existence that ...
7 months ago Bleepingcomputer.com
Think Twice Before Giving Surveillance for the Holidays - With the holidays upon us, it's easy to default to giving the tech gifts that retailers tend to push on us this time of year: smart speakers, video doorbells, bluetooth trackers, fitness trackers, and other connected gadgets are all very popular ...
11 months ago Eff.org
CVE-2021-1622 - A vulnerability in the Common Open Policy Service (COPS) of Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, remote attacker to cause resource exhaustion, resulting in a denial of service (DoS) ...
2 years ago
RagnarLocker ransoms its last victim as cybercops seize site The Register - Law enforcement agencies have taken over RagnarLocker ransomware group's leak site in an internationally coordinated takedown. Among the agencies involved are Europol's European Cybercrime Centre, the US's Federal Bureau of Investigation, and ...
11 months ago Theregister.com
Google Admits Editing of AI Viral Video for Enhanced Presentation - jA widely-viewed video showcasing the purported real-time interaction capabilities of Google's artificial intelligence model, Gemini, has been revealed to have been manipulated for demonstration purposes. The video, garnering 1.6 million views on ...
10 months ago Cysecurity.news
CVE-2024-35818 - In the Linux kernel, the following vulnerability has been resolved: LoongArch: Define the __io_aw() hook as mmiowb() Commit fb24ea52f78e0d595852e ("drivers: Remove explicit invocations of mmiowb()") remove all mmiowb() in drivers, but it says: "NOTE: ...
5 months ago Tenable.com
CVE-2024-38601 - In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Fix a race between readers and resize checks The reader code in rb_get_reader_page() swaps a new reader page into the ring buffer by doing cmpxchg on ...
4 months ago Tenable.com
The House Intelligence Committee's Surveillance 'Reform' Bill is a Farce - Earlier this week, both the House Committee on the Judiciary and the House Permanent Select Committee on Intelligence marked up two very different bills, both of which would reauthorize Section 702 of the Foreign Intelligence Surveillance Act-but in ...
10 months ago Eff.org

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)