
Who’s been collecting the voice prints of millions of people saying “My voice is my password”? Why has it become tougher for law enforcement to scoop up cellphone data? And who’s been turning up your central heating?
All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by John Hawes from AMTSO.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
And when these callers were being pressed for more information, the caller would say things like, "The doorbell keeps ringing, but when I answer, there's no one there."
Hello, hello, and welcome to Episode 84 of Smashing Security. My name is Graham Cluley.
Over 1 million files are uploaded every day by folks analyzing malware and attempting to determine what different antivirus products call a sample.
But you can do much more than that with VirusTotal Intelligence, which helps you get more context about your alerts through advanced malware threat hunting, relationship and behavioral visualization, as well as historical analysis on billions of malware samples.
To learn more about how VirusTotal Intelligence can help you, visit virustotal.com/intelligence.
Learn or email the team at and be sure to say you heard about them on the Smashing Security podcast. Right guys, well look, I want you to do me a favor.
Can you say my voice is my password?
Neither of you are prepared to say, "My voice is my password." Well, if you were in the habit of ringing up HMRC, which is another name for the British taxman, they may well ask you to say that phrase.
And they stand accused of stealthily collecting a database of 5 million voice prints saying exactly that. Shut up!
HMRC announced way back in January 2017 that they were introducing voice ID technology to help it recognize taxpayers when they called in and speed up the security steps needed.
You know, those hurdles you have to jump over before a call can be dealt with.
They said the first time you call, you might be asked to say this phrase up to 5 times, and then you'll be passed to an advisor to complete the call, right?
They said, "We're going to securely store your passphrase and you can just use your voice in future to confirm your identity." Don't worry a jot about how we secure this.
Anyway, they said that they received a number of complaints, and so they tested HMRC's system and they found there was no way to opt out or to have your voiceprint securely deleted.
So what happens is this: if you ring up the taxman, if you ring up HMRC here in the UK, You are asked to say, "My voice is my password." And if you decline by saying, "No thanks," you're told, "I'll need you to say exactly those words." And if you keep on refusing, they say, "It's important you repeat exactly the same phrase.
Please say, 'My voice is my password.'" Say it.
It's a bit misleading that, because a real password, it's easy to change, but it isn't easy to change your voice, is it?
Last year, BBC Click reporter Dan Simmons set up an HSBC account which uses voice ID for authentication, and he wheeled in his non-identical twin brother Joe to mimic his voice.
And as you can hear, he managed it quite successfully. After the tone, please repeat the phrase, "My voice is my password." My voice is my password.
Yeah, I mean, this is tax information. This is not, you know, presumably if you get through, you have access to all the tax background information.
And the concern of Big Brother Watch is that this might be being used as a backdoor for collecting biometric data on millions of UK citizens.
And might this data be being shared with other government agencies? HMRC aren't saying how it's being used.
So even if I've opted out, they can basically— They're screwed! They can opt me in.
So are they just taking "my voice is my password" as a way of reading in your voice, or is that something you have to say every time you log in again?
Who knows what's going to happen to this, because sometimes the rules are rather different for government agencies than the rest of us. So watch this space.
But in the meantime, I'd tell people, be a little bit careful.
I mean, if I was asked to give my biometric, I might be tempted to do one of my famous impressions instead, like my Scottish. Or—
And they always find him straight away. It turns out, as things are at the moment, they pretty much can do that.
It's possible for police to ask cell phone providers for big, big swathes of data based only on suspecting that it might be useful in their investigation.
I think it was Ohio and Michigan. And ironically, they actually stole a bunch of smartphones.
And they went to the cell company and said, can you just give us everything you've got on these 16 people?
And then they matched up where they had been over a period of 4 months or something, 127 days for one of them.
And one of them, Timothy Carpenter, for whom they looked at something like 13,000 data points for this 127-day period, he was convicted and sentenced to 116 years in jail.
If they've got evidence that you're outside that many locations where crimes are being committed, unless you can claim that you're some sort of superhero crime fighter.
It's quite unlikely, isn't it?
It's a Fourth Amendment right to privacy thing.
Right, and his original appeal was rejected in 2015, but then last year this went up to the Supreme Court and they've been pondering it for the last 6 or 7 months.
I think it was November 2017 that they heard the arguments, and then finally last week they came out with their decision saying he's right and the cops should not be allowed to get at that data without a warrant.
They should have a proper formal warrant, and it shouldn't just be give me everything on this guy.
It should be I'm fairly sure this guy is a strong suspect in this case, and I would like this particular data from this particular period for these particular reasons.
I have no problem with people putting warrants together to get information because they need it, because they suspect someone of a crime.
What I don't like is that potentially innocent people that have not committed any crime have their data being flying between departments and organizations willy-nilly.
This is really only a kind of a small change in the law that affects particular law enforcement agencies and how they go about doing their business.
But there are kind of implications that it will expand to impact, say, when law enforcement goes to Apple and says, can you unlock these phones, please?
Because we believe they belong to terrorists or something. Technology is moving a lot faster than law, obviously.
I mean, a lot of this expectation of privacy law relies on a case from, I think, 1967, where some guy was in a phone box and the phone box was bugged.
The argument was, you know, I'm in a phone box. I have a reasonable expectation that it's private.
And when these callers were being pressed for more information, the caller would say things like, "I turned on my air conditioner, but then it switched off all without me touching it," or, "The code of my digital lock changes daily.
I don't know how it's doing this." Or the doorbell keeps ringing, but when I answer, there's no one there.
You go up to someone's door and you leg it after ringing it. And as for the air conditioner, it turns off when it's decided it's now cool enough in the room.
So the New York Times conducted more than 30 interviews with domestic abuse victims, lawyers, shelter workers, and emergency responders.
Turns out the perps had somehow gained access to the IoT-enabled apps on the smartphone.
Now we're talking about apps that run things like doors or speakers or thermostats or lights or cameras, you name it.
And we're not talking just accessing these, but also remotely controlling these devices in the victim's home.
Basically to either drive them batty or make them scared out of their wits.
Remember with those baby monitors, IoT baby monitors? Yes. So take Graciela Rodriguez. She runs a shelter in San Rafael, California.
She told New York Times that some people have come in talking of thermostats suddenly being kicked up to 100 degrees or smart speakers suddenly blasting music.
He's got his phone, he's got apps, he's got the apps to manage the thermostat and to manage the Amazon device or Google device. But, you know, he's a bit smart with these things.
So while people love the convenience and the kind of snazziness of internet-enabled devices, the problem seems to be that victims and even some emergency responders, when they're called in, don't have the required knowledge to stop these abuses.
They just don't know how to do it. But I'm thinking we do. I've pulled together a few tips.
I wanted you guys to throw in a few as well as I go along, if you have any advice for our listeners on what we would recommend they do if they feel they're in this type of situation.
Ready?
So you're talking things like heating and TVs and locks and Wi-Fis. And I suggest label everything in your house, put a little sticker on it saying that is Wi-Fi enabled.
People have Wi-Fi fridges, for God's sake.
And even if you're not sure, if you bought it in the last five years, I would just look up online and look up the manufacturing code to see if it has any internet capability.
Okay, so things you want to think first, can you reset the device to just reset it, bring it back to zero?
If it's you, you can create a new account, maybe even change your username, but definitely change your password on that device.
Now, there are some devices that will not let you change those passwords.
And if you can't change those passwords on those devices, find out if there's a microphone or a video camera on that device.
If there is, then I'd consider dumping it if you can't change the password. Would you guys agree with that?
Now, for instance, my husband bought our household a VPN service and it's been installed on some of my devices under his email and password.
So there's only one registered user for that account, but I have access to it. So be wary of that. So one, look for accounts and see if there's shared users.
There's two email addresses, for example, tied to one account.
And also, if you think that account's been shared with anybody, switch it up, change the password to a new unique password.
And of course, use password managers to manage all that stuff so they're nice, long, and complex, and not your dog's name, Fifi.
You would be amazed at the devices that have microphones and cameras these days. And if you're not sure, look online and find out and figure out if you can disable those things.
I bet there are some fridges where you can do Dick Tracy style, you know, FaceTime equivalent chatting, you know, I bet you can do video calls and things like that. Yeah.
So you want to check your settings, check the accounts, check all the configuration settings and get rid of accounts you don't need.
And basically you just want to change everything, all the passwords you can. Try and lock it down, especially the Locate My Phone.
And obviously there's not much you can do about that, but it feels to me like that would be something.
And also look at your routers generally, because if you were with a nerdy person who might now be tormenting you via IoT, there's always the potential that they could log into the router remotely and reconfigure it or set up an additional Wi-Fi network inside your house so that all those devices can get back online too.
So you can look through the list and go, hang on, I don't recognize that fridge.
His Wi-Fi said his name, and so I knew which house he lived in, and then I was able to pester him.
So times, dates, apps used, or technology involved, or details, the incident screenshots, screenshots, screenshots, photos, all that stuff, really useful.
But a really good tip that I read is don't hand over too much information or irrelevant information as part of that, because it could always be handed over as evidence to the courts or shared with, you know, inadvertently with the abuser.
So, for example, don't include personal photos unrelated to the incident. Good to know, right? As I said, there's a lot of information on our website and show notes.
And if you have a friend or colleague that's going or has mentioned things this, don't assume they're nuts. You know, they're not cray-cray.
Share the podcast with them so they can get some help.
Over a million files are uploaded to VirusTotal every day for analysis and to determine what different antivirus products call them.
But you can do much more than that with VirusTotal Intelligence.
VirusTotal Intelligence helps you get more context about alerts through advanced malware threat hunting, behavioral visualization, as well as historical analysis of samples.
Learn more by visiting virustotal.com/learn, and be sure to let VirusTotal know that you heard about them from the Smashing Security podcast.
And welcome back to the show, and it's our favorite part of the show, the part of the show that we to call Pick of the Week.
It could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they like.
Doesn't have to be security-related necessarily.
Well, what it does when you go to it, it asks you to name an artist and you type in the artist's name.
All these names will swirl around of other artists who it believes are similar or other music that you might like if you are a fan of whoever you put in.
And so I discovered Ron Sexsmith, who I think is another Canadian, isn't he?
Then you can go and check them out on Spotify or one of those and say, oh no, I do actually really like them. So it's a great way of finding other things.
So I found, for instance, some sort of Danish miserable rock genre, right, which because Ron Sexsmith is a bit of a hangdog deputy dawg kind of figure, a bit morose, which is what I like.
And so it's helped me find other artists. And so I really like it. And that is why it is my pick of the week.
I don't know if it's something like an Amazon people have also bought this or I don't know where this data is coming from, but like the Apple Genius thing. Yeah, not sure.
And I don't have specific times when I listen, so I very much like a show they have called Pick of the Week, where they have a guest on and they choose their favorite shows from the last week.
And no, so Pick of the Week is not my pick of the week this week.
I actually wanted to mention a show that I heard on Pick of the Week, or I heard an excerpt from, which is a clip from a show called Shortcuts.
Which is lots of little documentaries, plays, just kind of 5-10 minute bits. And this particular one was about meatspace, which people with long memories might actually remember.
So basically there was a guy wrote a novel, I think, called Meatspace. I don't know this at all.
Him and a friend were looking into ways to promote this and they were very literal-minded people, obviously.
So they decided to get a lamb chop from their local curry house and send it up into space on a weather balloon with a camera attached.
And they had this plan that they would send it up on this weather balloon and taking a video and then figured out where it would come back down again and went to the field where it was going to come back down and it wasn't there.
And so this episode of this show details how they went about getting it back and particularly how they were basically messed with by some weird dude who kept telling them that he had their camera and he would meet them at the motorway service station outside Bridgewater, and then wouldn't show up, and then would phone them and say, oh, I'm sorry, I'm on my way home, let's go and meet in somewhere else.
And it was a very interesting story, and they eventually obviously did get it back because there's quite a famous video on YouTube of the lamb chop going from the curry house to space, which I recommend you watch.
It's like 2 minutes long.
Okay, that's really cool.
We've had two quality picks of the week, dare I say it, so far this week. Let's see what you've got. Okay, I'm a podcast junkie.
So I was thrilled that Adam Buxton recently published an interview with the Black Mirror creator, Charlie Brooker.
It's a rambly chat, and it touches on everything from playing video games to behind the scenes of Black Mirror. And yeah, they do. They chat, there's bathroom humor in there.
Yeah, you know, it's funny stuff to me, but maybe pooping is not everyone's cup of tea. There's a bit of cussing, so maybe adults only.
I've never watched it myself, but it's something like one cup, two—
Well, on that proverbial bombshell, I think we've just about wrapped it up, haven't we?
John, if people want to find out more about you or about AMTSO, what's the best way they can get in touch with you?
You can buy t-shirts and stickers and other kinds of goodies at smashingsecurity.com/store. And thanks for tuning in. If you like the show, rate us on Apple Podcasts.
Helps people find us. It's fantastic. And go to smashingsecurity.com for past episodes and for details of how to get in touch with us. Until next time, cheerio. Bye-bye. Bye everyone.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
John Hawes
Show notes:
- Voice ID showcases latest digital development for HMRC customers
- HMRC takes 5 million taxpayers’ Voice IDs without consent – Big Brother Watch
- UK taxman has amassed voice profiles of 5.1 million taxpayers
- BBC fools HSBC voice recognition security system
- Knock down ginger — What Graham meant to say when he referred to “Postman’s knock”
- Victory! Supreme Court Says Fourth Amendment Applies to Cell Phone Tracking
- Thermostats, Locks and Lights: Digital Tools of Domestic Abuse
- Safety Net: the National Safe & Strategic Technology Project
- US Tech Safety hotlines
- UK National Domestic Violence Helpline
- Worldwide helpline directory
- Music-Map – The Tourist Map of Music
- Del Amitri
- Ron Sexsmith
- BBC Radio 4 – Short Cuts
- Tandoori Lambchop Sent to Space (Meatspace) – YouTube
- Adam Buxton podcast with Charlie Brooker
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
VirusTotal Intelligence is one of the world’s largest malware intelligence services. Security professionals rely on it to better understand the effects of malware in enterprise networks.
Go to www.virustotal.com/learn to learn more
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!


RSS for nerds? Podcasts = Apple Podcasts …Look a lot like a fanboie here (elite for fanboy).
Most of our downloads come from Apple Podcasts/iTunes, followed closely by PocketCasts . Our listeners are overwhelmingly iOS users (my guess is that's because Android doesn't ship with a default podcast app).
Personally I like Overcast and PocketCasts, and think Apple Podcasts is horrendous. The good news is that you can listen via any podcast app using the RSS feed, although the uninitiated may be baffled as to what they're supposed to do with it.