Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Human Workers Can Listen to Google Assistant Recordings

Google contractors regularly listen to and review some recordings of what people say to artificial-intelligence system Google Assistant, via their phone or through smart speakers such as the Google Home.

Google contractors regularly listen to and review some recordings of what people say to artificial-intelligence system Google Assistant, via their phone or through smart speakers such as the Google Home.

The company acknowledged that humans can access those recordings after some of its Dutch language audio snippets were leaked. Google product manager David Monsees acknowledged the leak in a blog post Thursday, and said the company is investigating the breach.

“We are conducting a full review of our safeguards in this space to prevent misconduct like this from happening again,” he wrote.

More than 1,000 recordings were obtained by Belgian broadcaster VRT NWS, which noted in a story that some contained sensitive personal conversations — as well as information that identified the person speaking. Google says no user account information is associated with the recordings, and reviewers are instructed not to transcribe background conversations.

But VRT reporters could hear spoken home addresses in some of the recordings, and were able to track down the speakers. Some of these conversations were not directed at Assistant and happened either as background noise or as a mistaken recording when Assistant thought it was being spoken to, but wasn’t.

Google says contractors listen to recordings to better understand language patterns and accents. Its user terms confirm recordings may be used by the company, stating Assistant “records your voice and audio on Google services to improve speech recognition.”

Monsees wrote that Google works with contractors around the world to analyze the recordings.

“These language experts review and transcribe a small set of queries to help us better understand those languages,” he wrote.

Advertisement. Scroll to continue reading.

Google’s terms don’t explicitly say that people review the recordings, but do state that data could be analyzed as the company updates services or create new features.

The company acknowledged earlier this year that its reviewers listen to anonymous recordings in response to a Bloomberg report revealing that Amazon’s Alexa also uses contractors to listen to recordings. Amazon confirmed the report.

Google’s recording feature can be turned off, but doing so means Assistant loses some of its personalized touch. People who turn off the recording feature lose the ability for the Assistant to recognize individual voices and learn your voice pattern.

Assistant recording is actually turned off by default — but the technology prompts users to turn on recording and other tools in order to get personalized features.

Google Assistant is available on more than 1 billion devices, including smartphones and smart speakers. It’s made quite a dent in the smart speaker market — still the primary place where people use voice technology — but still trails behind Amazon.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...