Is My Phone Listening To Me? We Asked Cybersecurity Experts
โ€” Updated on 21 October 2022

Is My Phone Listening To Me? We Asked Cybersecurity Experts

โ€” Updated on 21 October 2022
John McMahon
WORDS BY
John McMahon

When I woke up last Monday, I felt like a glass of orange juice.

I didnโ€™t voice this out loud, I didnโ€™t add it to my shopping list on my phone, I just thought to myself: Hey, itโ€™s Monday morning, and after drinking 2,000 beers over the weekend, it might be nice to treat my body to a glass of the sweet, sweet nectar that is freshly squeezed OJ.

A short while later as I strolled the aisles of the local Woolies, I said to my girlfriend (out loud), โ€œOh yeah, how about some orange juice?โ€

And then, not even 15 minutes after Iโ€™d already bought said juice, I was scrolling Instagram stories when I was dealt with an advertisement for Nudie orange juice just three swipes in. Youโ€™ve got to be fucking kidding me, I thought to myself. Thatโ€™s the second time Iโ€™d consciously noticed a targeted ad in 24 hours, and the third in a week.

Smartphone in hand

Iโ€™m not talking about targeted advertisements sourced from browser cookies or my search habits; that marketing tsunami is a different beast. Iโ€™m talking about instances where Iโ€™d said something in a private conversation โ€“ at a volume that only the two parties present could have heard (or so I naively still think) โ€“ to find it only a few taps away the next time I unlock my iPhone.

The day prior to this, I was discussing Daniel Ricciardoโ€™s move to McLaren with a colleague. Half an hour later, a Sky Sports article on the same topic popped up at the top of my โ€suggested for youโ€ Facebook feed. Earlier that week during dinner with my housemates, I was talking about a PayPal scam that happened to a friend of mine years ago. Next thing I know, thereโ€™s a PayPal ad waiting for me as I enjoyed a quick scroll before bed.

Is my phone listening to me? Iโ€™m certain of it. To what extent though, Iโ€™ll never know. Some people suspect it, sure, some tech companies have even admitted to it (though not many, and usually after theyโ€™ve been caught in the act), but we live in a grey area where not everyone fully realises whatโ€™s happening to them. If you arenโ€™t aware of it, then you canโ€™t control it โ€“ and thatโ€™s where the problem currently lies.

At the risk of sounding like a disgruntled Boomer with a tendency to attack every element of technological progression that I struggle to accept, I canโ€™t help but admit Iโ€™m frustrated with the explicit overextension of targeted advertising. And in many ways, the more pissed off I get, the less receptive I am to the brands that are being forced down my throat. Funny that, isnโ€™t it? Somewhat ironic, too, for a guy who works in digital media.

But the worst part is that unless you dust off your OG Motorola flip phone or whip out your Grandadโ€™s typewriter, thereโ€™s almost nothing you can do to stop it. Iโ€™ve begun to seriously wonder to what extent this is happening, what precautions or tools we have to mitigate it, and, on which side of the law this subject finds itself.

Letโ€™s start with the latter. The short answer is yes, itโ€™s legal because I give permission for it to happen. Not to mention that the legal system is inherently flawed at regulating these rapidly changing capabilities. The problem is also cross-jurisdictional, but thatโ€™s another issue entirely.

Despite Facebook consistently denying allegations that itโ€™s always listening to us, chances are youโ€™ve already tapped โ€˜allowโ€™ when prompted with the request for access to your microphone on all of the companyโ€™s popular apps, including WhatsApp and Instagram.

For smart assistant services such as Siri, Google and Alexa to function properly, they explicitly rely on what are known as โ€˜audio triggersโ€™ to capture specific pieces of data from your conversations. Youโ€™re probably familiar with โ€œHey Siriโ€ and โ€œOkay Googleโ€, but you likely donโ€™t know that there are hundreds โ€“ possibly thousands โ€“ of triggers, and when it comes to Facebook, nobody actually knows what they are.

The information sourced from these known triggers somehow finds its way back to other networks (like Facebookโ€™s, for example), but anything beyond that is not fully understood. This data is encrypted and only kept deep within the apps themselves, but you can bet on the fact that itโ€™s archived and added to an evolving profile of who you are, what youโ€™re interested in, and what you might be keen to consume.

So the technology is there. If itโ€™s 110% possible that a trigger captured by Google will lead to an acutely targeted advertisement on YouTube (also owned by Google), then itโ€™s not at all impossible that this information ends up elsewhere in the data nexus.

โ€œSeeing as Google are open about it, I would personally assume the other companies are doing the same,โ€ said Dr. Peter Hannay in an interview with Vice in 2018. Apple even issued a public apology a few years back when its employees were caught snooping on private Siri conversations.

โ€œReally, thereโ€™s no reason they wouldnโ€™t be. It makes good sense from a marketing standpoint, and their end-use agreements and the law both allow it, so I would assume theyโ€™re doing it, but thereโ€™s no way to be sure.โ€

To expand on Hannayโ€™s claims, I turned to Mimecastโ€™s cybersecurity expert Garrett Oโ€™Hara, asking him point-blank if he thinks itโ€™s silly to directly link targeted advertisements with our phones listening to us.

โ€œI donโ€™t think itโ€™s silly at all. Every time you think somethingโ€™s silly these days, it turns out to be true.โ€

โ€œBut I personally donโ€™t think thatโ€™s whatโ€™s happening here. You could talk about a holiday in Bali dozens of times and nothing happens, so youโ€™re not aware of it, but then one of those times an advertisement might appear just after youโ€™ve spoken about it, and that could actually be the reason youโ€™re linking two and two together.โ€

โ€œItโ€™s called the โ€˜Baader-Meinhofโ€™ phenomenon, and I think thatโ€™s what could be at play here for the most part. The human mind is just built that way, it plays funny tricks on us all the time.โ€

โ€œThatโ€™s not to say there isnโ€™t a scary thing happening at the moment with smartphones and digital footprints generally. When you triangulate all of your different data sources out there on the internet itโ€™s crazy how accurate they can become. They can predict what youโ€™re going to do next. Itโ€™s a bit of a clichรฉ, but they know you better than you know yourself.โ€

To draw the most likely conclusion from this, I ask Garrett why he thinks weโ€™re quick to pin it on eavesdropping smartphones.

โ€œFor most people, comprehending the complexity of digital footprints is so confounding that itโ€™s much easier to just assume that smartphones are listening to us.โ€

This would also conveniently shift the blame from you or I to corporate goliaths like Facebook; when in reality, the responsibility for our privacy falls squarely on us.

The Social Network & Phones Listening
Sony Pictures

Garrett also cleared up some consumer confusion between โ€˜always onโ€™ phone listening and isolated instances such as the aforementioned Apple scandal.

โ€˜There are huge technical barriers to โ€˜always onโ€™ listening. Do you know how many billion smartphones there are? The processing power for any company to always be listening to us just isnโ€™t possible. Thereโ€™s no realistic way that they, in real-time, are processing your conversations all the time.โ€

โ€œThere is some evidence from what they call โ€˜network snoopingโ€™ to suggest that segments of audio are being sent to Facebook via the cloud โ€“ much like the audio triggers you spoke of โ€“ and these triggers donโ€™t require as much processing. But that research couldnโ€™t figure out what the triggers were โ€“ which is why I donโ€™t think itโ€™s silly โ€“ because no one really knows for sure.โ€

If Facebookโ€™s track record is anything to go by, these hypotheticals probably donโ€™t fall too far from reality.

โ€œFacebook already has a huge question mark over its integrity. Every time theyโ€™ve said theyโ€™re not doing something, they actually are โ€“ itโ€™s a rinse and repeat scenario. Each time they push the boundaries it becomes the new normal.โ€

In a world that is more digitally opaque by the day, itโ€™s more important than ever to know how these companies collect this information and what weโ€™re willing to just โ€˜acceptโ€™ with blissful ignorance.

Things you can do to get back in control

Think hard about what apps you download onto your devices and connect to your social accounts. Even when theyโ€™re deleted, they still have your data and can repurpose it whenever they want for the highest bidder. The more you log-in to websites or services using a Google or Facebook account, the easier it is for them to connect the dots โ€“ and youโ€™ve given them further permission to do so.

โ€œIโ€™m not on Facebook, I use an Android phone and I rarely install apps. I personally donโ€™t trust these companies at all,โ€ says Garrett, with a light-hearted aside that he doesnโ€™t want to be seen as the guy with a tinfoil hat.

But if anyone would have the insight to justify wearing one, itโ€™d be him.

โ€œBe very conscious of the permissions youโ€™re granting apps when you download them and make sure theyโ€™re appropriate to the app in question. WhatsApp might need your camera and microphone, but does the โ€˜Face Swapโ€™ app really need access to your microphone? Thereโ€™s some consumer fatigue here when it comes to managing privacy.โ€

Itโ€™s cases like these that should encourage the average joe to check their microphone settings and location services regularly. Unfortunately, if you want to use any of the common communication apps, you donโ€™t have much of a choice in your microphone being switched on. Regardless, you should make sure that itโ€™s set to โ€˜only while using the appโ€™ rather than โ€˜alwaysโ€™, as is the case of iOS.

And while weโ€™ll never really know if that actually achieves anything, comments from Edward Snowden lean even further towards the extreme end of the scale. Take what he said about eavesdropping smartphones in a 2016 episode of Digits, for example.

โ€œTV is a medium that you watch. The Internet is a medium that watches you as you watch it. Everywhere you go, even when youโ€™re not actively using your phone, itโ€™s still listening.โ€

I bet you didnโ€™t know that your iPhone stores your location data in the depths of its settings, either? It uses it to predict things like weather suggestions, daily alarms, traffic routes home and literally dozens of other targeted pressure points. Amazingly, my phone can tell me how I got home (walked or drove), how long it took for me to get there, and how long I stayed at home for โ€“ every day since I inspected my apartment last year on November 21st โ€“ which was three weeks before Iโ€™d even moved in.

Go to โ€˜Privacyโ€™ > โ€˜ Location Servicesโ€™ > โ€˜System Servicesโ€™ > โ€˜Significant Locationsโ€™
I went for a walk to Freshwater last Saturday. Turns out my walk and the 16 minutes I spent at the coffee shop were both logged in the depths of my phone. The Apple Pay transaction I did probably connected the dots, too, understanding that I tend to enjoy an almond croissant and a flat white here on Saturday mornings.

Even just by using cash every now and then (but not during COVID-19 for obvious reasons), rather than card, you can win back a small bit of your privacy. Itโ€™s that easy.

And what if Iโ€™m wrong?

Before continuing down a very deep and dark rabbit hole that I might not be able to crawl out of in the space of this article, I asked myself โ€“ okay, say my phone isnโ€™t listening to me, what other explanation might there be for this increased targeting?

I quickly realised that Iโ€™d already answered my own question, with the screenshots above sealing the deal.

Unfortunately, the entire online ecosystem currently revolves around advertisers, not individual users. Data is now a currency, soon to be worth more than oil, gold, and cold hard cash, if not already. We willingly surrender some elements of our privacy and the personal information thatโ€™s attached to it to enjoy a more convenient and connected world. Iโ€™ve been doing so ever since I joined Facebook in 2009, and likely even before that with the likes of MySpace, MSN, eBay, and just about everything else Iโ€™ve ever signed up to. Hell, even my Nintendo 64 probably betrayed me.

Itโ€™s an element of life that weโ€™ve had to accept as a society. Our movements, browsing history, spending habits, private messages, interactions, interests, political views, relationships, employment history โ€“ literally every single thing that weโ€™ve ever knowingly or unknowingly surrendered to an electronic device is clearly being tracked, stored and sold. Weโ€™ve even given companies enough angles of our faces to unlock phones with just a sideways glance. Letโ€™s not forget that we live in an era where elections and referendums can hang in the balance of this information.

So in theory, 11 years worth of data, a pile which Iโ€™ve added to via hundreds of touchpoints a day for over 4000 days of my life, could have become so finely tuned to my habits that it predicted on the morning of May 18th, 2020, Iโ€™d be slightly hungover and probably in the mood for a glass of orange juice. Just as Garrett had suspected.

It really is possible, thatโ€™s the scariest thing about it all.

Could Facebook have really known that, or was it a complete coincidence? Maybe it was just 15 minutes late to the party, another trial and error in a catalogue of targeted trials used to focus its algorithm even further. Only Zuck can give me the answer, but, if true, this question makes the idea of my phone listening to me seem like the least of my worries.

Phone listening with Apple Pay

How concerned do I need to be?

Itโ€™s the value of this data that should soften any concerns we have about our phones listening to us. For the big players, at least, the buck stops with the data collectors. After all, Facebook, Google and Apple arenโ€™t going to sell your hard data to third parties when itโ€™s their biggest asset, the lubricant for their unmatchable money-making machines. Rather than flogging it off to the highest bidders, corporate tech companies prefer the model of acting as the intermediaries for advertisers that are keen to get in front of a specific audience โ€“ and theyโ€™re using our data as the leverage.

But whoโ€™s to say that wonโ€™t ever change? Each month thereโ€™s another report of a big fish getting eaten by an even bigger fish, i.e., a smaller tech giant being acquired by a larger tech giant, fueling the fire even more and monopolising the data game even further.

What happens, then, when the data collection snowball continues to gather so much momentum that itโ€™s more precise, more powerful and more relentless than the consumer can possibly handle? Surely itโ€™ll suffocate the user to a point of no return, a point which I became astutely aware of in aisle 5 of Woolworths the other morning.

But hey, whether your phone is listening to you or not, if, like myself, youโ€™re only just fighting back now, then youโ€™re probably already fucked.

RELATED: Bill Gates Made 15 Predictions Back In 1999 โ€“ Hereโ€™s How Many Came True

Shop B.H. Magazine

John McMahon
WORDS by
John McMahon is a founding member of the Boss Hunting team who honed his craft by managing content across website and social. Now, he's the publication's General Manager and specialises in bringing brands to life on the platform.

TAGS

Share the article