{"id":20673,"date":"2023-02-09T19:08:33","date_gmt":"2023-02-09T15:08:33","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/non-standard-smartphone-wiretapping\/20673\/"},"modified":"2023-02-09T19:08:41","modified_gmt":"2023-02-09T15:08:41","slug":"non-standard-smartphone-wiretapping","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/non-standard-smartphone-wiretapping\/20673\/","title":{"rendered":"Non-standard smartphone wiretapping"},"content":{"rendered":"<p>In late December 2022, a team of scientists from several US universities published a <a href=\"https:\/\/arxiv.org\/pdf\/2212.12151.pdf\" target=\"_blank\" rel=\"nofollow noopener\">paper<\/a> on wiretapping. The eavesdropping method they explore is rather unusual: words spoken by the person you\u2019re talking to on your smartphone reproduced through your phone\u2019s speaker can be picked up by a built-in sensor known as the accelerometer. At first glance, this approach doesn\u2019t seem to make sense: why not just intercept the audio signal itself or the data? The fact is that modern smartphone operating systems do an excellent job of protecting phone conversations, and in any case most apps don\u2019t have permission to record sound during calls. But the accelerometer is freely accessible, which opens up new methods of surveillance. This is a type of side-channel attack, one that so far, fortunately, remains completely theoretical. But, over time, such research could make non-standard wiretapping a reality.\n<\/p>\n<h2>Accelerometer features<\/h2>\n<p>\nAn <a href=\"https:\/\/en.wikipedia.org\/wiki\/Accelerometer\" target=\"_blank\" rel=\"nofollow noopener\">accelerometer<\/a> is a special sensor for measuring acceleration; together with another sensor, a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Gyroscope\" target=\"_blank\" rel=\"nofollow noopener\">gyroscope<\/a>, it helps to detect changes in the position of the phone it resides on. Accelerometers have been built into all smartphones for more than a decade now. Among other things, they rotate the image on the screen when you turn your phone round. Sometimes they are used in games or, say, in augmented reality apps, when the image from the phone\u2019s camera is superimposed with some virtual elements. Step-counters work by tracking phone vibrations as the user walks. And if you flip your phone to mute an incoming call, or tap the screen to wake up the device, these actions too are picked up by the accelerometer.<\/p>\n<p>How can this standard yet \u201cinvisible\u201d sensor eavesdrop on your conversations? When the other person speaks, their voice is played through the built-in speaker, causing it, and the body of the smartphone, to vibrate. It turns out that the accelerometer is sensitive enough to detect these vibrations. Although researchers have known about this for some time, the tiny size of these vibrations ruled out full-fledged wiretapping. But in recent years, the situation has changed <span style=\"text-decoration: line-through\">for the better<\/span> for the worse: smartphones now boast more powerful speakers. Why? To improve the volume and sound quality when you\u2019re watching a video, for example. A byproduct of this is better sound quality during phone calls since they use the same speaker. The U.S. team of scientists clearly demonstrate this in their paper:<\/p>\n<div id=\"attachment_47114\" style=\"width: 1831px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/02\/09190818\/accelerometer-wiretapping-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-47114\" class=\"size-full wp-image-47114\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/02\/09190818\/accelerometer-wiretapping-01.jpg\" alt=\"Data from smartphone accelerometers during speech playback\" width=\"1821\" height=\"501\"><\/a><p id=\"caption-attachment-47114\" class=\"wp-caption-text\">Spectrogram generated while playing the word \u201czero\u201d six times:<br>(a) \u2013 from accelerometer data of Oneplus 3T ear speaker (older model, no stereo speakers);<br>(b) \u2013 from accelerometer data of Oneplus 7T ear speaker (newer model, with stereo speakers);<br>(c) \u2013 from accelerometer data of Oneplus 7T loud speaker (newer model, with stereo speakers).<\/p><\/div>\n<p>On the left is a relatively old smartphone of 2016 vintage, not equipped with powerful stereo speakers. In the center and on the right is a spectrogram from the accelerometer of a more modern device. In each case, the word \u201czero\u201d is played six times through the speaker. With the old smartphone, the sound is barely reflected in the acceleration data; with the new one, a pattern emerges that roughly corresponds to the played words. The best result can be seen in the graph on the right, where the device is in loudspeaker mode. But even during a normal conversation, with the phone pressed to the ear, there is enough data for analysis. It turns out that the accelerometer acts as a microphone!<\/p>\n<p>Let\u2019s pause here to evaluate the difficulty of the task the researchers set for themselves. The accelerometer may act as a microphone, but a very, very poor one. Suppose we got the user to install malware that tries to eavesdrop on phone conversations, or we built a wiretapping module into a popular game. As mentioned above, our program doesn\u2019t have permission to directly record conversations, but it can monitor the state of the accelerometer. The number of requests to this sensor is limited and depends on the specific model of both the sensor and the smartphone. For example, one of the phones in the study allowed 420 requests per second (measured in Hertz (Hz)), another \u2014 520Hz. Starting with version 12, the Android operating system introduced a limit of 200Hz. Known as the sampling rate, this limits the frequency range of the resulting \u201csound recording\u201d. It is half the sampling rate at which we can receive data from the sensor. This means that at best the researchers had access to \u00a0the frequency range from 1 to 260Hz.<\/p>\n<p>The frequency range for voice transmittance is from around 300 to 3400Hz, but what the accelerometer \u201coverhears\u201d is not a voice: if we try to play back this \u201crecording\u201d we get a murmuring noise that only remotely resembles the original sound. The researchers used machine learning to analyze these voice traces. They created a program that takes known samples of the human voice and compares them with data they captured from the accelerator. Such training further allows a voice recording of unknown content to be deciphered with a certain margin of error.\n<\/p>\n<h2>Spying<\/h2>\n<p>\nFor researchers of wiretapping methods, this is all-too familiar. The authors of the new paper refer to a host of predecessors who have shown how to obtain voice data using the seemingly most unlikely of objects. Here\u2019s a real <a href=\"https:\/\/www.theguardian.com\/world\/2013\/aug\/22\/gchq-warned-laser-spying-guardian-offices\" target=\"_blank\" rel=\"nofollow noopener\">example<\/a> of a spying technique: from a nearby building, attackers direct an invisible laser beam at the window of the room where the conversation they want to eavesdrop on is taking place. The sound waves from the voices cause the window pane to vibrate ever so slightly, and this vibration is traceable in the reflected laser beam. And this data is sufficient to restore the content of a private conversation. Back in 2020, scientists from Israel <a href=\"https:\/\/ad447342-c927-414a-bbae-d287bde39ced.filesusr.com\/ugd\/a53494_443addc922e048d89a664c2423bf43fd.pdf\" target=\"_blank\" rel=\"nofollow noopener\">showed<\/a> how speech can be reconstructed from the vibrations of an ordinary light bulb. Sound waves cause small changes in its brightness, which can be detected at a distance of up to 25 meters. Accelerometer-based eavesdropping is very similar to these spying tricks, but with one important difference: The \u201cbug\u201d is already built into the device to be tapped.<\/p>\n<p>Yes, but to what extent can the content of a conversation be recovered from accelerometer data? Although the new paper seriously improves the quality of wiretapping, the method cannot yet be called reliable. In 92% of cases, the accelerometer data made it possible to distinguish one voice from another. In 99% of cases, it was possible to correctly determine gender. Actual speech was recognized with an accuracy of 56% \u2014 half of the words could not be reconstructed. And the data set used in the test was extremely limited: just three people saying a number several times in succession.<\/p>\n<p>What the paper did not cover was the ability to analyze the speech of the smartphone user. If we only hear the sound from the speaker, at best we have only half the conversation. When we press the phone to our ear, vibrations from our speech should also be felt by the accelerometer, but the quality is bound to be far worse than the vibrations from the speaker. This remains to be studied in more detail in new research.\n<\/p>\n<h2>Unclear future<\/h2>\n<p>\nFortunately, the scientists were not looking to create a usable wiretapping device for the here and now. They were simply testing out new methods of privacy invasion that may one day become relevant. Such studies allow device manufacturers and software developers to proactively develop protection against theoretical threats. Incidentally, the 200Hz sampling rate limit introduced in Android 12 does not really help: the recognition accuracy in real experiments has decreased, but not by much. Far greater interference comes from the smartphone user naturally during a conversation: their voice, hand movements, general moving around. The researchers were unable to reliably filter out these vibrations from the useful signal.<\/p>\n<p>The most important aspect of the study was the use of the smartphone\u2019s built-in sensor: all previous methods relied on various additional tools, but here we have out-of-the-box eavesdropping. Despite the modest practical results, this interesting study shows how such a complex device as a smartphone is full of potential data breaches. On a related note, we recently wrote about how signals from Wi-Fi modules in phones, computers, and other devices unwittingly <a href=\"https:\/\/www.kaspersky.com\/blog\/wi-peep-wireless-localization\/46611\/\" target=\"_blank\" rel=\"noopener nofollow\">give away their location<\/a>, how robot <a href=\"https:\/\/www.kaspersky.com\/blog\/robot-vacuum-privacy\/46682\/\" target=\"_blank\" rel=\"noopener nofollow\">vacuum cleaners spy<\/a> on their owners, and how <a href=\"https:\/\/www.kaspersky.com\/blog\/ip-cameras-unsecurity-eufy\/46574\/\" target=\"_blank\" rel=\"noopener nofollow\">IP cameras like to peep<\/a> where they shouldn\u2019t.<\/p>\n<p>And while such surveillance methods are unlikely to threaten the average user, it would be nice if the technology of the future were armed against all risks of spying, eavesdropping, and sneaky peeking, however small. But since these cases involve malware being installed on your smartphone, you should always have the <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">ability to trace and block it<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>In a new study, security experts explore eavesdropping on phone conversations through a bug inside almost every smartphone. How dangerous is it?<\/p>\n","protected":false},"author":2721,"featured_media":20675,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,1226,1486],"tags":[43,45,2615],"class_list":{"0":"post-20673","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-technology","9":"category-threats","10":"tag-privacy","11":"tag-smartphones","12":"tag-wiretapping"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/non-standard-smartphone-wiretapping\/20673\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/non-standard-smartphone-wiretapping\/25179\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/non-standard-smartphone-wiretapping\/27839\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/non-standard-smartphone-wiretapping\/25511\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/non-standard-smartphone-wiretapping\/47113\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/non-standard-smartphone-wiretapping\/31550\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/non-standard-smartphone-wiretapping\/31263\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/smartphones\/","name":"smartphones"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2721"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20673"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20673\/revisions"}],"predecessor-version":[{"id":20674,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20673\/revisions\/20674"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20675"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}