{"id":26698,"date":"2019-04-11T17:30:11","date_gmt":"2019-04-11T17:30:11","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/"},"modified":"2019-04-11T17:30:11","modified_gmt":"2019-04-11T17:30:11","slug":"as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/","title":{"rendered":"As Alexa&#8217;s secret human army is revealed, we ask: Who else has been listening in on you?"},"content":{"rendered":"<p>Sneezes and homophones \u2013 words that sound like other words \u2013 are tripping smart speakers into allowing strangers to hear recordings of your private conversations.<\/p>\n<p>These strangers live an eerie existence, a little like the Stasi agent in the movie <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.imdb.com\/title\/tt0405094\/\"><em>The Lives of Others<\/em><\/a>. They&#8217;re contracted to work for the device manufacturer \u2013 machine learning data analysts \u2013 and the snippets they hear were never intended for third-party consumption.<\/p>\n<p>Bloomberg has <a target=\"_blank\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-04-10\/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio\">unearthed<\/a> the secrets of Amazon&#8217;s analysts in Romania, reporting on their work for the first time. &#8220;A global team reviews audio clips in an effort to help the voice-activated assistant respond to commands,&#8221; the newswire wrote. Amazon has not previously acknowledged the existence of this process, or the level of human intervention.<\/p>\n<p><em>The Register<\/em> asked Apple, Microsoft and Google, which all have smart search assistants, for a statement on the extent of human involvement in reviewing these recordings \u2013 and their retention policies.<\/p>\n<p>None would disclose the information by the time of publication.<\/p>\n<h3 class=\"crosshead\"><span>What&#8217;s it for?<\/span><\/h3>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\" readability=\"7.1003460207612\">\n<p lang=\"en\" dir=\"ltr\">\u201cAmazon, in its marketing and privacy policy materials, doesn\u2019t explicitly say humans are listening to recordings of some conversations picked up by Alexa\u201d <a href=\"https:\/\/twitter.com\/hashtag\/fauxtomation?src=hash&amp;ref_src=twsrc%5Etfw\">#fauxtomation<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/potemkinAI?src=hash&amp;ref_src=twsrc%5Etfw\">#potemkinAI<\/a> <a href=\"https:\/\/t.co\/IoATtepH56\">https:\/\/t.co\/IoATtepH56<\/a><\/p>\n<p>\u2014 One Ring (doorbell) to surveil them all&#8230; (@hypervisible) <a href=\"https:\/\/twitter.com\/hypervisible\/status\/1116140358772113408?ref_src=twsrc%5Etfw\">April 11, 2019<\/a><\/p><\/blockquote>\n<p>As the <em>Financial Times<\/em> <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.ft.com\/content\/37a1ddd2-5a54-11e9-939a-341f5ada9d40\">explained this week<\/a> (paywalled): &#8220;Supervised learning requires what is known as &#8216;human intelligence&#8217; to train algorithms, which very often means cheap labour in the developing world.&#8221;<\/p>\n<p>Amazon sends fragments of recordings to the training team to improve Alexa&#8217;s speech recognition. Thousands are employed to listen to Alexa recordings in Boston, India and Romania.<\/p>\n<p>Alexa only responds to a wake word, according to its maker. However, because Alexa can misinterpret sounds and homophones as its default wake word, the team was able to hear audio never intended for transmission to Amazon. The team received recordings of embarrassing and disturbing material, including at least one sexual assault, Bloomberg reported.<\/p>\n<p>Amazon encourages staff disturbed by what they hear to console each other, but didn&#8217;t elaborate on whether counselling was available.<\/p>\n<p>The retention of the audio files is purportedly voluntary, but this is far from clear in the information Amazon gives users. Amazon and Google allow the voice recordings to be <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.amazon.co.uk\/gp\/help\/customer\/display.html\/?nodeId=GA7E98TJFEJLYSFR\">deleted from your account<\/a>, for example, but this may not be permanent: the recording could continue to be used for training purposes (Google&#8217;s explanation can be found <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/support.google.com\/websearch\/answer\/6030020?co=GENIE.Platform%3DDesktop&amp;hl=en\">here<\/a>).<\/p>\n<p>A personal history shows Amazon continues to hold audio files of data &#8220;not intended for Alexa&#8221;.<\/p>\n<div class=\"CaptionedImage Border width_85\"><a href=\"https:\/\/regmedia.co.uk\/2019\/04\/11\/not_intended_for_alexa_but_recorded.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/04\/11\/not_intended_for_alexa_but_recorded.png?x=648&amp;y=245&amp;infer_y=1\" alt=\"Alexa data retained\" title=\"Alexa data retained\" height=\"245\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">Click to enlarge<\/p>\n<\/div>\n<p>We emailed Microsoft Google and Apple with the following questions.<\/p>\n<p>As mentioned, we have yet to receive a formal statement from any of the three.<\/p>\n<p>Privacy campaigners cite two areas of concern. Voice platforms could offer an &#8220;auto purge&#8221; function deleting recordings older than a day, or 30 days. And they could ensure, once deleted, a file is gone forever. Both merit some formal legal clarity. \u00ae<\/p>\n<h3 class=\"crosshead\"><span>Bootnote<\/span><\/h3>\n<p>The FT noted that &#8220;one ad on Amazon&#8217;s Mechanical Turk marketplace showed a human intelligence task that would pay someone 25 cents to spend 12 minutes teaching an algorithm to make a green triangle navigate a maze to reach a green square. That&#8217;s an hourly rate of $1.25.&#8221; The rate returned to you, the Alexa owner, for training Amazon&#8217;s system is, of course, zero.<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7144\/getting-more-from-less?td=wptl1810\">Getting More From Less<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/04\/11\/amazon_staff_listen_to_alexa\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Lives of Others: Siri, Google and Cortana edition Sneezes and homophones \u2013 words that sound like other words \u2013 are tripping smart speakers into allowing strangers to hear recordings of your private conversations.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26699,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-26698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>As Alexa&#039;s secret human army is revealed, we ask: Who else has been listening in on you? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"As Alexa&#039;s secret human army is revealed, we ask: Who else has been listening in on you? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-11T17:30:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you.png\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"245\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"As Alexa&#8217;s secret human army is revealed, we ask: Who else has been listening in on you?\",\"datePublished\":\"2019-04-11T17:30:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/\"},\"wordCount\":571,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you.png\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/\",\"name\":\"As Alexa's secret human army is revealed, we ask: Who else has been listening in on you? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you.png\",\"datePublished\":\"2019-04-11T17:30:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you.png\",\"width\":648,\"height\":245},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"As Alexa&#8217;s secret human army is revealed, we ask: Who else has been listening in on you?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"As Alexa's secret human army is revealed, we ask: Who else has been listening in on you? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/","og_locale":"en_US","og_type":"article","og_title":"As Alexa's secret human army is revealed, we ask: Who else has been listening in on you? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-04-11T17:30:11+00:00","og_image":[{"width":648,"height":245,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"As Alexa&#8217;s secret human army is revealed, we ask: Who else has been listening in on you?","datePublished":"2019-04-11T17:30:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/"},"wordCount":571,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you.png","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/","url":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/","name":"As Alexa's secret human army is revealed, we ask: Who else has been listening in on you? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you.png","datePublished":"2019-04-11T17:30:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you.png","width":648,"height":245},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/as-alexas-secret-human-army-is-revealed-we-ask-who-else-has-been-listening-in-on-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"As Alexa&#8217;s secret human army is revealed, we ask: Who else has been listening in on you?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26698"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26698\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26699"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}