Airbnb + hidden cameras | How to Scan Your Airbnb for Hidden Cameras


Senior Billi
Maybe something to consider when using Airbnb...

How to Scan Your Airbnb for Hidden Cameras
It’s not as technically difficult as it might sound.
April 12, 2019
How to Scan Your Airbnb for Hidden Cameras outlets reported that a New Zealand man named Andrew Barker had found a camera, hidden in a smoke detector, in his Airbnb that was livestreaming a feed of the living room. Barker was in Cork, Ireland, on a 14-month trip around Europe with his family when they checked into the rental house. Once they unpacked, Barker, who works in IT security, conducted a scan of the Wi-Fi network and found a camera the owner had not mentioned. He was then able to connect to the camera and view the live feed.

The next day, the Barkers notified Airbnb, but he told the media that the company treated the incident like a canceled booking and just temporarily suspended the rooming post after a privacy investigation that the family found unsatisfactory. It wasn’t until Nealie Barker, Andrew’s wife, posted details of the incident on Facebook that Airbnb removed the listing and admitted that the original response “did not meet the high standards we set for ourselves.”

This isn’t the first time that an Airbnb guest has discovered hidden recording devices in a rental unit. As Ars Technica reported, a woman found a remote-controlled camera in the living room of an apartment she had been planning to stay in for a month in 2013. She sued both Airbnb and the apartment’s residents, alleging that the camera had filmed her without clothing and recorded intimate conversations she had with her partner. In 2017, Florida police arrested a man for video voyeurism after his Airbnb guests reported finding a camera in the bedroom’s smoke detector.

Airbnb’s terms of service dictate that hosts must disclose the presence of cameras to their guests. It’s unclear how common a practice it is for Airbnb hosts to hide cameras in their units, but if you’re particularly worried about prying eyes, there are imperfect ways to search for invasive devices. “Hidden cameras are probably rare but there are steps that an average user can take to increase their chances of finding one if one exists,” Barker wrote in an email to Slate. “Since our incident I will be performing network and ports scans at every accommodation we stay at.”

That seems like a good practice. But it also requires some knowledge. When the story hit the internet, lots of people found themselves wondering how, exactly, to scan a network. The good news is that doing network and port scans for suspicious devices on the local Wi-Fi network doesn’t require as much technical knowledge as you might fear. Nor does it require expensive gear.

Various apps that can perform the scans for you; Barker recommends Angry IP Scanner, NetworkMapper, and Network Scanner by First Row. In his Ireland Airbnb, Barker used Network Scanner for the network scan and NetworkMapper for the port scan, but most apps have both features.

Network scans generally allow users to view the IP addresses and manufacturers of devices connected to the Wi-Fi. In Barker’s case, the manufacturer of the hidden recording device was literally listed as “IPCAMERA.” Once you have the list, it’s a good idea to work backward. “You should in theory be able to tick off each device found through the scan to a device you are aware of and can physically see,” Barker wrote.

If you see a device that looks suspicious, a port scan can help to identify its purpose. The scan will list the different ports for connecting to the device and the services they provide. The services will be listed as short codes; a Google search will generally reveal what the codes mean. For example, the code RDP indicates that users can remotely control the desktop of the computer. The codes RTMP and RTSP are for video streaming.

These sorts of scans will only work if your device and the camera are connected to the same Wi-Fi network. If the camera is on a different network, or if it stores the footage on an internal hard drive, you’ll have a harder time finding it. For more details on how the scans work, check out the guide that Barker wrote for travelers after his Airbnb incident.

Good old-fashioned sleuthing can also be helpful for finding cameras. Consumer-grade hidden cameras come embedded in a variety of different commonplace objects. Glance through the website for BrickHouse Security or the Amazon search results for the term “hidden camera” and you’ll find fake alarm clocks, USB chargers, buckets, lamps, stuffed animals, and bottles of Mountain Dew ($429–$519 on the website Covert Law Enforcement, if you’re curious) with discreet pinhole cameras. When you enter a room, you should check around to see if anything looks out of place. “These things tend to stand out like a sore thumb,” says Dan Tentler, founder and CEO of Phobos Group, a cybersecurity firm. For example, he recommends checking to see whether there are inexplicably two smoke detectors in the same room.

Holding an object in your hands can also help to determine whether it’s fake. “If there’s a can of Mountain Dew randomly sat on the kitchen counter … and you walk up and pick up the can, you’re going to immediately know that it’s a hidden camera,” says Tentler. Look for reflections when you shine a light on objects, which may reveal the presence of a lens.

If and when you find such a device, make sure to alert Airbnb or the hotel. You might also want to inform law enforcement, especially if you’re in a state where two-party consent is required for recording. “If you find a camera, take pictures of it,” says Tentler. “Make noise, post pictures of the thing on the internet, on Twitter.”


What about these so called researcher's listening to ?

Not Just Alexa: Even Apple & Google Employees Listen To Your Voice
S AADEETYA11.04.19
4 min read
Smart speakers like Amazon’s Echo and Apple HomePod are hearing your conversations and probably recording them as well. But what you might not have known is these companies have humans sitting behind the desk and listening to your chats.
This has been reported by Bloomberg on Thursday, which says that Amazon has thousands of people on board, who’re basically there to listen to users’ conversations, transcribe them and feed it back into software, to help Alexa learn human interaction better.
After all, that’s how machine learning adapts itself, where humans feed information into machines, in this case Alexa, the voice assistant. So, the next time you hear Amazon saying ‘all the Alexa recordings are kept on the cloud’ it’s going to be hard to believe them.

The report further elucidates that Amazon has set up its team across different parts of the world, including India, where most of the Echo smart speakers are available to the consumer.
Speaking anonymously to the news site, these people are said to be working over nine hours, where they end up going through over 1,000s of recordings, check them for mistakes and send it back to respond. But their work patterns end up making them listen to conversations which were supposed to be private, and sometimes even upsetting.

Echo Dot 2017 (left) and the Echo Dot 2018 (right)

Echo Dot 2017 (left) and the Echo Dot 2018 (right)(Photo: The Quint)

Such conversations are shared in the internal chat rooms by the employees, who’re asked to reveal the details to relieve their stress.
In its defence, Amazon says only a small sample of Alexa recordings are annotated, but just the admission is likely to spook users of such devices even more.

Amazon mentions that every time a user activates an Echo device by saying the trigger word ‘Alexa’, the voice assistant records everything you say to it and stores it at the back-end.
The device does not have the permission to record or send any data unless the user says the voice assistant’s trigger word. There must be times when an acoustic aberration might trigger Alexa whereby it starts speaking random gibberish, but that is an anomaly and happens rarely.
Simply saying, two people could be talking about the Tata Hexa or Maruti Nexa and Alexa might get activated out of nowhere. It has happened with many.

More Culprits Out There
But Amazon would say it’s not alone. Another report from BBC cites Apple and Google also have humans at their end who’re listening to conversations of users with their respective smart speakers.
And in case of Google and Apple, not only are speaker conversations being heard, even the Assistant (Siri, Google Assistant) running on phones (including iPhone) are also being reviewed. To make things feel safer, both these companies seem to have fool-proof security measures, to make sure the identity of the said user and his/her conversations are not recognisable.
Speakers equipped with voice-assistant capability are set to become the norm.

Speakers equipped with voice-assistant capability are set to become the norm.(Photo: Altered by The Quint)

Siri, according to Apple resets itself as and when the voice assistant is turned off.
While Amazon doesn’t let you opt out of voice recording or human reviews, just like Google and Apple, users get the power to delete the chats via multiple steps which are listed on the company’s support page.
In all, it would be unfair to single out Amazon’s Alexa as a culprit. The fact that it is listening to your conversations and recording data can be considered a necessary evil for the technology to work.
In the end, users have to be responsible and have to be circumspect and vigilant on how they use technology. Because, ‘they’ are listening.

Not Just Alexa: Even Apple & Google Employees Listen To Your Voice