Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
Story Views
Now:
Last hour:
Last 24 hours:
Total:

How TV Ads Silently Ping Commands to Phones: Sneaky SilverPush Code Reverse-Engineered

% of readers think this story is Fact. Add your two cents.


Spy State Hide Signals In TV Ads

Ordering Smartphones To Spy on

You

 

The Alex Jones Channel


 

Published on May 10, 2017

Secret messages embedded in television adverts can direct smartphones to spy on their owners using listening software, according to German researchers. https://www.infowars.com/researchers-…
Help us spread the word about the liberty movement, we’re reaching millions help us reach millions more. Share the free live video feed link with your friends & family: http://www.infowars.com/show

Follow Alex on TWITTER – https://twitter.com/RealAlexJones
Like Alex on FACEBOOK – https://www.facebook.com/AlexanderEme…
Infowars on G+ – https://plus.google.com/+infowars/
 

More Android phones than ever are

covertly listening for inaudible

sounds in ads

Your Android phone may be listening to ultrasonic ad beacons without your knowledge.

Dan Goodin – May 5, 2017 3:14 pm UTC

219

Almost a year after app developer SilverPush vowed to kill its privacy-threatening software that used inaudible sound embedded into TV commercials to covertly track phone users, the technology is more popular than ever, with more than 200 Android apps that have been downloaded millions of times from the official Google Play market, according to a recently published research paper.

As of January, there were 234 Android apps that were created using SilverPush’s publicly available software developer kit, according to the paper, which was published by researchers from Technische Universitat Braunschweig in Germany. That represents a dramatic increase in the number of Android apps known to use the creepy audio tracking scheme. In April 2015, there were only five such apps.

The apps silently listen for ultrasonic sounds that marketers use as high-tech beacons to indicate when a phone user is viewing a TV commercial or other type of targeted audio. A representative sample of just five of the 234 apps have been downloaded from 2.25 million to 11.1 million times, according to the researchers, citing official Google Play figures. None of them discloses the tracking capabilities in their privacy policies.

Enlarge / Five of the 234 apps that were built using the SilverPush SDK

“The example of SilverPush highlights how easily this technology can be used to spy on users,” Erwin Quiring, one of the researchers, wrote in an e-mail. “In this way, they can track the TV viewing habits of users precisely even with traditional broadcasting technologies. In our research paper, we identified three further privacy risks that can occur with this technology, e.g., tracking locations, behavior devices, and even the de-anonymization of Tor users.”

SilverPush founder Hitesh Chawla said the finding surprised him because his company abandoned the ad-tracking business in late 2015.

“We respect consumer privacy and would not want to build our business foundation where the privacy is questionable,” he told Ars. “Even when we were live, our SDK was not present in more than 10 to 12 apps. So there is no chance that our presence in 234 apps is possible. Every time a new handset gets activated with our SDK, we get a ping on our server. We have not received any activation for six months now.”

The researchers, however, stand by the figure and say that all 234 apps positively contain the SilverPush SDK. That means phones that have the apps installed are silently listening for ultrasonic sounds without the knowledge or consent of their owners. While the researchers were unable to find any beacons in TV audio, they compared successful detections with finding a needle in a hay stack and left open the possibility such beacons are actively being embedded into TV audio. Even if they’re not actively used, the growth in apps signals the practice could become widespread in the near future. The results were drawn from a corpus of 1.3 million Android apps submitted to the VirusTotal file scanning service, and as a result they shed no light on how prevalent audio beaconing may be in apps running on iOS devices from Apple.

A Google representative said that the privacy policies enforced on all apps available in the Play market require developers to “comprehensively disclose how an app collects, uses and shares user data, including the types of parties with whom it’s shared.” The representative didn’t respond to a follow-up question asking why none of five apps cited in the research findings disclosed the SilverPush functions. At the time this post went live, all five apps remained available in Play.

The beacons are frequencies from 18kHz to 20kHz, a range that is inaudible to most humans but can be reliably detected by most phone microphones. By embedding them into audio, marketers can track the whereabouts of shoppers as they move throughout a large department store. Promoters using other companies’ audio-beacon technologies can also use them to push ads or coupons to people who are near a certain store or service. The researchers said two services—Shopkick and Lisnr—use ultrasonic beaconing for legitimate purposes such as these, and they disclose the tracking prominently.

The tracking can also be used for purposes that are decidedly less ethical. Advertisers, for example, may use the beacons with no disclosure at all to measure how often a particular TV ad is viewed. The technology can also be covertly used to perform cross-device tracking that allows marketers to tie a single person to the multiple media devices she uses. The researchers said the beacons could similarly be used to identify people using the Tor anonymity service.

This paper was published at the 2nd annual IEEE European Symposium on Security and Privacy and was presented last week in Paris, France. In the paper, the researchers wrote:

The 234 detected apps contain SilverPush functionality alongside their normal content. Many were developed for large companies such as McDonald’s and Krispy Kreme. At the moment, there are a limited set of countermeasures to prevent such tracking. For people using version 6.0 or higher, they can disable an app’s access to the device microphone. This is a good practice to follow in general, although it may prevent useful features such as voice-to-text from working. It’s also a good idea to limit the number of installed apps.

Longer term, antivirus providers may be able to add features that detect the tracking during routine scans of installed apps. Another long-term solution is to lobby government regulators, Google, Apple, and other companies to strictly enforce clear and prominent disclosure of all ultrasonic-based tracking.

Post updated to add sentences in last paragraph about Android app permissions.

Promoted Comments

  • jfconde Smack-Fu Master, in training

    jump to post

    For anyone wondering if they could hear the sounds this system uses:

    https://www.youtube.com/watch?v=AXhRmv1mrs4

    or if you want to make your own wave files:

    http://www.audiocheck.net/audiofrequenc … netone.php

    84 posts | registered 12/8/2016
  • jdale Ars Tribunus Militum

    jump to post

    sprockkets wrote:
    Well, i just looked at the official McDonald’s app, and it doesn’t use the mic ever.

    Probably a scam version. Still…

    It says it accesses:

    Version 5.4.0 can access:
    Identity
    find accounts on the device
    add or remove accounts

    Contacts
    find accounts on the device

    Location
    approximate location (network-based)
    precise location (GPS and network-based)
    access extra location provider commands

    Phone
    read phone status and identity

    Photos/Media/Files
    read the contents of your USB storage
    modify or delete the contents of your USB storage

    Storage
    read the contents of your USB storage
    modify or delete the contents of your USB storage

    Camera
    take pictures and videos

    Wi-Fi connection information
    view Wi-Fi connections

    Device ID & call information
    read phone status and identity

    Other
    read sync statistics
    receive data from Internet
    view network connections
    create accounts and set passwords
    connect and disconnect from Wi-Fi
    full network access
    use accounts on the device
    prevent device from sleeping
    toggle sync on and off
    set an alarm
    read Google service configuration

    https://play.google.com/store/apps/deta … .app&hl=en

    It’s true that microphone is not listed. But one imagines that the ability to record video includes audio….?

    Also, looking at the rest of those permissions: WTF?

    7004 posts | registered 6/27/2011

     

    zilexa0 Smack-Fu Master, in training

    jump to post

    SHAZAM!

    In December 2015, a Salesteam from Shazam music recognition app came by our office in Amsterdam to sell ads targeted and synchronized with TV commercials. Earlier that year they had done this with several big US advertisers: iPhones (and/or Android devices, I don’t remember but their pitch was specific about the supported platform) with the Shazam app were constantly listening via the phone mic, when they recognised a Pepsi commercial, the app would register this and next time you open Shazam you would see a targeted ad. You had the ability to then target users even in other ad-supported apps and follow them via the Apple Advertising ID.

    Did I mention this all happened in 2015 ?

    We immediately decided not to use this type of targeted advertising. Listening to our clients (advertisers) consumers 24/7 should not be necessar to sell your brand or product. It is sad actually if an advertiser thinks he/she needs this. The ad business is a lucrative market and every content provider wants in, this doesn’t mean advertisers should just go for every available​ tech and should certainly not be too much dependent on Googles or Facebooks ad business.

    7 posts | registered 7/20/2016
    shelbystripes Ars Scholae Palatinae

    jump to post

    zilexa0 wrote:
    SHAZAM!

    In December 2015, a Salesteam from Shazam music recognition app came by our office in Amsterdam to sell ads targeted and synchronized with TV commercials. Earlier that year they had done this with several big US advertisers: iPhones (and/or Android devices, I don’t remember but their pitch was specific about the supported platform) with the Shazam app were constantly listening via the phone mic, when they recognised a Pepsi commercial, the app would register this and next time you open Shazam you would see a targeted ad. You had the ability to then target users even in other ad-supported apps and follow them via the Apple Advertising ID.

    Did I mention this all happened in 2015 ?

    Shazam is an app that does nothing but listen to audio and transmit samples back to a server for analysis. The key thing is, people can control whether or not the app listens full-time. And at least on the iPhone, whenever Shazam (or any app) is using the microphone in the background, iOS displays a big red warning at the top that the microphone is in use, and by which app. It looks just like the blue warning that GPS is in use or the green active phone call notification, it’s just a different color (and it doesn’t get more obvious than red). If you don’t like this feature listening all the time, you can turn it off, and the lack of red bar confirms that it’s not listening in the background.

    If you’re intentionally letting someone listen in and controlling when they do it, and you’re made aware when they’re doing it, then at least it’s your own choice.

    2333 posts | registered 6/13/2013

     

     

     

——————————————————————————————————————————————–

Millions of Android Devices Could Be

Secretly Spying on Users,

Researchers Claim

May 07, 2017
Researchers believe some popular smartphones may be listening a little too closely to your activities.

A team from the German Technical University of Braunschweig (Brunswick) found 234 Android applications that contain code, known as SilverPush, that listens for ultrasonic signals embedded in media or emitted by beacons. Though primarily intended to track users’ media consumption and shopping habits to help target advertising, the research team says the apps could also potentially be used to establish users’ identities across multiple devices, track location, and even de-anonymize services like Bitcoin and Tor.

The most widely-downloaded of the detected apps do not notify users of these capabilities.

“Device tracking is a serious threat to the privacy of users, as it enables spying on their habits and activities,” the researchers wrote. “A recent practice embeds ultrasonic beacons in audio and tracks them using the microphone of mobile devices. This side channel allows an adversary to identify a user’s current location, spy on her TV viewing habits or link together her different mobile devices.”

They added: “Our findings confirm our privacy concerns: We spot ultrasonic beacons in various web media content and detect signals in 4 of 35 stores in two European cities that are used for location tracking. While we do not find ultrasonic beacons in TV streams from 7 countries, we spot 234 Android applications that are constantly listening for ultrasonic beacons in the background without the user’s knowledge.”

Researchers identified apps by comparing known SilverPush code to a database of 1.3 million apps. The apps found to contain SilverPush code include those from McDonald’s and Krispy Kreme in the Philippines, each installed by around 500,000 Android users. The other apps were predominantly targeted at users in India and the Philippines, and some had as many as 5 million downloads. Researchers found that the use of SilverPush had proliferated over time, from 39 apps found in December of 2015 to 234 in January of this year.

Get Data Sheet, Fortune’s technology newsletter.

The researchers also detected ultrasonic beacons in four of 35 retail stores they visited in Europe, though they failed to find signals in media after reviewing 140 hours of television and audio. They presented their findings at an IEEE conference in late April, so the research has not yet received full academic peer review.

Speaking to Ars Technica, SilverPush creator Hitesh Chawla disputed the report’s findings. SilverPush claims to have turned away from the ad-tracking business after the Federal Trade Commission in 2016 issued warnings about the practice to 12 app developers.

The researchers found no unusual implementations of listening code from Shopkick and Lisnr, which use similar technology but are more transparent about their apps’ capabilities. They did not analyze iPhone apps, meaning there’s no guarantee SilverPush isn’t lurking throughout Apple’s ecosystem as well.

 

 

 

How TV ads silently ping commands

to phones: Sneaky SilverPush code

reverse-engineered

Near-ultrasonic sound system drives pets, and users, crazy

20 Nov 2015 at 01:41, Iain Thomson

Earlier this week the Center for Democracy and Technology (CDT) warned that an Indian firm called SilverPush has technology that allows adverts to ping inaudible commands to smartphones and tablets.

Now someone has reverse-engineered the code and published it for everyone to check.

SilverPush’s software kit can be baked into apps, and is designed to pick up near-ultrasonic sounds embedded in, say, a TV, radio or web browser advert. These signals, in the range of 18kHz to 19.95kHz, are too high pitched for most humans to hear, but can be decoded by software.

An application that uses SilverPush’s code can pick up these messages from the phone or tablet’s builtin microphone, and be directed to send information such as the handheld’s IMEI number, location, operating system version, and potentially the identity of the owner, to the application’s backend servers.

Imagine sitting in front of the telly with your smartphone nearby. An advert comes on during the show you’re watching, and it has a SilverPush ultrasonic message embedded in it. This is picked up by an app on your mobile, which pings a media network with information about you, and could even display followup ads and links on your handheld.

How it works … the transfer of sound-encoded information from a TV to a phone to a backend server

“This kind of technology is fundamentally surreptitious in that it doesn’t require consent; if it did require it then the number of users would drop,” Joe Hall, chief technologist at CDT told The Register on Thursday. “It lacks the ability to have consumers say that they don’t want this and not be associated by the software.”

Hall pointed out that very few of the applications that include the SilverPush SDK tell users about it, so there was no informed consent. This makes such software technically illegal in Europe and possibly in the US.

There are similar systems in use already. Ratings agency Nielsen has an audio system that does just this to measure the size of radio station audiences, but it’s something people have to agree to use and get paid to do so.

In addition, this sort of thing doesn’t just need to be used for advertising. What if a repressive regime decided to use it to track the phones of dissidents, he posited.

Of course, none of this matters if you don’t have an app listening out for the sounds of SilverPush. But initial research found almost 30 applications using the SilverPush SDK, predominantly shopping apps run by Indian or Far Eastern firms.

As the news about SilverPush spread, Kevin Finisterre of security consultancy Digital Munition decided to take a look at the code. He has since published his findings on GitHub.

He found that the software assigned letters of the alphabet to high-pitch tones, eg: an 18kHz sound translates into an ‘A’, and 19.125kHz is a ‘P’. Pairs of these characters are used to identify TV ads: ‘AP’ is used to recognize a Geico ad and display an image and link to the insurance biz, we’re told. Sound-playing online adverts appear to use a fingerprint of five characters.

The logical next step is to see if these signals can be disrupted. Finisterre played around with trying to spoof the sounds the apps are looking for and send them junk data. It would also be possible to write a program that randomly sent out ultrasonic tones to disrupt the system, although this would “probably piss your dog and a bunch of other animals off,” he told The Reg.

“I would try to block this at the audio driver level, not at the browser level. Any other app can implement the same type of tech,” he said.

“There are lots of possibilities. It really depends on which aspect of it you are trying to protect against. The audible beacon triggers themselves (audio driver-based protections, spoofing tones, etc), or the data collection process (think blocking the IPs of the servers), or the monetization of the data collection (think spoofing randomized invalid data at the backend).” ®

——————————————————————————————————————————————–

 

Hundreds of Apps Using Ultrasonic

Signals to Silently Track Smartphone

Users

Wednesday, May 03, 2017 Mohit Kumar

 

 

Your smartphone may have some apps that are continuously listening inaudible, high-frequency ultrasonic sounds from your surroundings and they know where you go, what you like and dislike — all without your knowledge.

Ultrasonic Cross-Device Tracking is a new technology that some marketers and advertising companies are currently using to track users across multiple devices and have access to more information than ever before for ad targeting.

For example, retail stores you visit, a commercial on TV or an advertisement on a web page can emit a unique “ultrasonic audio beacon” that can be picked up by your device’s mobile application containing a receiver.

This information helps advertisers to create your personalized profile and collect your interests by figuring out that both devices probably belongs to you, allowing them to target you with interest-based advertisements.
 

More & More Apps Have Started Using Ultrasonic Tracking Technology

In fact, while presenting research last week at the IEEE European Symposium on Security and Privacy, security researchers said they discovered 234 Android applications that ask permission to access your smartphone’s microphone to incorporate a particular type ultrasonic beacon to track consumers.

 
Moreover, the researchers found that 4 of the 35 retail stores they visited in Germany have ultrasonic beacons installed at the entrance.

According to investigators, SilverPush, Lisnr, and Shopkick are three SDKs that use ultrasonic beacons to send messages to the mobile device. While SilverPush allows developers to track users across multiple devices, Lisnr and Shopkick perform location tracking.

The researchers analyzed millions of Android apps and discovered few that were using the Shopkick and Lisnr SDKs, but there were much more that were using the SilverPush SDK.
 

Serious Privacy Concerns

Although cross-device user tracking technologies are currently being used for the legitimate purposes, it has already raised some serious privacy concerns.

Since an app requires no mobile data nor Wi-Fi connection, but only microphone access to listen to beacons, tracking works even when you have disconnected your phone from the Internet.

In fact, a team of researchers last year demonstrated that how ultrasonic sounds emitted by ads on a web page accessed through Tor can be used to deanonymize Tor users by making nearby phones or computers send identification information, such as location and IP, back to advertisers.

In 2014, Snowden revelations disclosed that how spying agencies were tracking foreign travelers’ movements across the city by capturing their device’ unique MAC address at the airport and then comparing it with the data collected by free WiFi hotspots installed in various coffee shops, restaurants, and retail stores.

 
This incident could also be another great example, showcasing how intelligence agency could use this ultrasonic cross-device tracking technology to track your movements across the country.
 

How can You Protect Yourself?

Since you can not stop ultrasonic beacons from emitting sound frequencies around you, the best way to reduce the chance of your smartphone listening for beacons and feed data to a third party is to simply restrict unnecessary permissions you have granted to the apps installed on your device.

In other words, use your common sense.

For example, Skype wants microphone access? Fair enough, as it is necessary for Skype to work as intended. But what about if an app for beauty or clothing store wants microphone access? No way.

To revoke such unnecessary app permissions, some Android phone manufacturers, like One Plus provide a feature called Privacy Guard that allowed its users to block unnecessary app permissions of certain apps on a smartphone that do not have anything to do with the primary function of the apps.

Navigate to Settings → Personal → Privacy → Privacy Guard. Now select any from the list of apps and edit unnecessary permissions you have granted it.

A similar feature has been included in Android 7. Navigate to Settings → Apps → App Permissions. Now edit the privileges you’ve granted each app.

For iOS 10 users: Go to Settings → Privacy → Microphone to see which apps have requested access to it, and which apps you have granted it to.
 

Entrepreneur, Hacker, Speaker, Founder and CEO — The Hacker News and The Hackers Conference.
 
 
 
 
 
 
 
 



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 1 comment
    • unidentified

      thought technology is next, secretly transmitting unwanted commands through electronic equipment

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.