{"id":103103,"date":"2018-07-04T14:38:30","date_gmt":"2018-07-04T14:38:30","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=103103"},"modified":"2025-07-01T23:20:29","modified_gmt":"2025-07-02T06:20:29","slug":"siri-cyber-security-weaknesses-uk-government","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/siri-cyber-security-weaknesses-uk-government\/","title":{"rendered":"Has Siri just highlighted cyber-security weaknesses at the heart of the British government?"},"content":{"rendered":"<p>Is Siri the most useless of all the AI assistants? Well, objectively speaking, probably, but Siri\u2019s lack of practical use can lull iPhone users into a false sense of security. Despite a lot of Softonic tutorials on mobile security, it is easy to forget that once activated, <strong>Siri is always listening.<\/strong><\/p>\n<figure id=\"attachment_103104\" aria-describedby=\"caption-attachment-103104\" style=\"width: 700px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-103104 size-full\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/07\/Siri-in-the-houses-of-Parliament.jpg\" alt=\"Siri listening to the UK Government\" width=\"700\" height=\"350\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/07\/Siri-in-the-houses-of-Parliament.jpg 700w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/07\/Siri-in-the-houses-of-Parliament-300x150.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-103104\" class=\"wp-caption-text\">If Siri was listening in the Houses of Parliament, where else was she listening?<\/figcaption><\/figure>\n<p>Although it isn\u2019t ideal to forget that your PHONE could be listening to everything you say, most of us can get away with the oversight. If you\u2019re the Defense Secretary of the United Kingdom, however, there are a lot of things that you or the people around you might be saying that you don\u2019t want to\u00a0a hackable device to hear. In the UK Parliament yesterday, <strong>UK Secretary of Defense Gavin Williamson was interrupted by Siri trying to answer a query while he was talking about Syria.<\/strong> Siri is set to &#8220;always listening&#8221; on his phone. Let that sink in. Siri is listening to everything that UK Secretary of Defense is saying.<\/p>\n<div class=\"sc-related-articles-grey\">\r\n<p class=\"sc-related-articles-grey__title\">More Softonic Articles<\/p>\r\n  <div class=\"sc-related-articles-grey__row\">\r\n    <a title=\"5 tips to prevent security issues with your phone\" href=\"https:\/\/en.softonic.com\/articles\/5-tips-to-prevent-security-issues-with-your-phone\">\r\n    <div class=\"sc-related-articles-grey__article\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/03\/Screen-Shot-2018-03-19-at-12.34.02.png)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>5 tips to prevent security issues with your phone<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n    <a title=\"8 tricks to strengthen your WhatsApp security\" href=\"https:\/\/en.softonic.com\/articles\/8-tricks-to-strengthen-your-whatsapp-security\">\r\n    <div class=\"sc-related-articles-grey__article sc-related-articles-grey__article--last\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/11\/whatsapp-web-screenshot-1024x576-1024x576.png)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>8 tricks to strengthen your WhatsApp security<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n  <\/div>\r\n  <div class=\"sc-related-articles-grey__row\">\r\n    <a title=\"7 mistakes that put your internet security at risk\" href=\"https:\/\/en.softonic.com\/articles\/mistakes-internet-security-risk\">\r\n    <div class=\"sc-related-articles-grey__article\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/06\/5mistakesHeader-1024x576.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>7 mistakes that put your internet security at risk<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n    <a title=\"8 tricks to boost your security on Google Chrome\" href=\"https:\/\/en.softonic.com\/articles\/8-tricks-to-boost-your-security-on-google-chrome\">\r\n    <div class=\"sc-related-articles-grey__article sc-related-articles-grey__article--last\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/11\/crome-security-1024x576-1024x576.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>8 tricks to boost your security on Google Chrome<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n  <\/div>\r\n<\/div>\n<p><iframe loading=\"lazy\" width=\"848\" height=\"477\" src=\"https:\/\/www.youtube.com\/embed\/jcMPJ7tiIfg?feature=oembed\" frameborder=\"0\" allow=\"autoplay; encrypted-media\" allowfullscreen><\/iframe><\/p>\n<p>So just <strong>how vulnerable is Siri<\/strong> and, accordingly, all of the classified secrets that UK Secretary of Defense has to talk about on a daily basis?<\/p>\n<p>Well, in September, Chinese researchers discovered a shocking backdoor into voice assistants from Google, Amazon, Microsoft, and yes, Appl,e too. Called <a href=\"https:\/\/arxiv.org\/pdf\/1708.09537.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">DolphinAttack<\/a>, the vulnerability plays on the fact that digital assistants can hear frequencies that lay outside the range of human hearing. This allows attackers to issue normal voice commands at such a high frequency that it is inaudible to human ears.<\/p>\n<p><iframe loading=\"lazy\" width=\"848\" height=\"477\" src=\"https:\/\/www.youtube.com\/embed\/21HjF4A3WE4?feature=oembed\" frameborder=\"0\" allow=\"autoplay; encrypted-media\" allowfullscreen><\/iframe><\/p>\n<p>DolphinAttack means that anybody within a few feet could be issuing silent commands to a smartphone\u2019s digital assistant. The researchers didn\u2019t just stick to basic commands either. <a href=\"https:\/\/www.forbes.com\/sites\/kevinmurnane\/2017\/09\/11\/hackers-can-talk-to-voice-assistants-like-siri-and-alexa-by-speaking-with-a-voice-you-cant-hear\" target=\"_blank\" rel=\"noopener noreferrer\">Using only basic equipment<\/a>, the researchers were able to get iPhone\u2019s to make calls and even initiate FaceTime video calls. Incredibly, they were even able to make Alexa unlock IoT connected smart locks or <a href=\"https:\/\/www.fastcodesign.com\/90139019\/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\" target=\"_blank\" rel=\"noopener noreferrer\">redirect the navigation systems on Audi A3<\/a>. If a user is wearing an Apple Watch, it allows these ultrasonic attacks to take place from further away.<\/p>\n<div class=\"sc-related-articles-grey\">\r\n<p class=\"sc-related-articles-grey__title\">Self-driving cars<\/p>\r\n  <div class=\"sc-related-articles-grey__row\">\r\n    <a title=\"Californians attack self-driving cars\" href=\"https:\/\/en.softonic.com\/articles\/techaways-the-week-best-bits-in-4-bites-4\">\r\n    <div class=\"sc-related-articles-grey__article\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/03\/TA.EN_.W11.V3.news1_.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>Californians attack self-driving cars<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n    <a title=\"Pizza Hut wants autonomous pizza vans\" href=\"https:\/\/en.softonic.com\/articles\/pizza-hut-want-to-take-us-back-to-the-future\">\r\n    <div class=\"sc-related-articles-grey__article sc-related-articles-grey__article--last\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/01\/pizza-hut-1024x576.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>Pizza Hut wants autonomous pizza vans<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n  <\/div>\r\n  <div class=\"sc-related-articles-grey__row\">\r\n    <a title=\"Connected Cars: the future\" href=\"https:\/\/en.softonic.com\/articles\/connected-cars-the-future\">\r\n    <div class=\"sc-related-articles-grey__article\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2015\/06\/bosch-260logiQ.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>Connected Cars: the future<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n    <a title=\"How to Order an Uber from your PC\" href=\"https:\/\/en.softonic.com\/articles\/how-to-order-an-uber-from-your-pc\">\r\n    <div class=\"sc-related-articles-grey__article sc-related-articles-grey__article--last\">\r\n      <div class=\"sc-related-articles-grey__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/09\/uber-1024x576.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-grey__text\">\r\n        <p>How to Order an Uber from your PC<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n  <\/div>\r\n<\/div>\n<p>The implications of such an attack could be severe for a man, like Williamson, with high-security clearance. Anybody passing him in the street could issue an ultrasonic command, which could open a certain website on his mobile browser. From there, the website could automatically install malware onto the phone that would open up the contents of the phone and possible communications to exploitation.<\/p>\n<p>Siri is supposed to only respond to the voice of the user who trained it, but with convincing deep-fake technology becoming more and more prevalent it is easier than ever to reproduce somebody else\u2019s voice. In this particular case, it doesn\u2019t matter that Siri was responding to Williamson\u2019s voice. As Jordan Peele adeptly demonstrates below, it wouldn\u2019t be hard to fake him saying &#8220;Hey Siri,&#8221; and then feed the fake command through the ultrasonic processors.<\/p>\n<p><iframe loading=\"lazy\" width=\"848\" height=\"477\" src=\"https:\/\/www.youtube.com\/embed\/cQ54GDm1eL0?feature=oembed\" frameborder=\"0\" allow=\"autoplay; encrypted-media\" allowfullscreen><\/iframe><\/p>\n<p>It is all well and good laughing at Siri\u2019s interruption in the House of Commons, and coming up with a witty response to make light of the embarrassing situation. Is there something more, however, that we need be seeing. Does Siri\u2019s intervention highlight a worrying lack of insight into the implications of modern technology at the highest levels of the Conservative government in the UK? A lack of insight that could be putting the security of the British nation and her allies at risk? Is it a laughing matter if the man in charge of security for an entire country can\u2019t even manage the security settings of his own mobile phone?<\/p>\n<!-- Shortcode [playwire] does not match the conditions -->\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is Siri the most useless of all the AI assistants? Well, objectively speaking, probably, but Siri\u2019s lack of practical use can lull iPhone users into a false sense of security. Despite a lot of Softonic tutorials on mobile security, it is easy to forget that once activated, Siri is always listening. Although it isn\u2019t ideal &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/siri-cyber-security-weaknesses-uk-government\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Has Siri just highlighted cyber-security weaknesses at the heart of the British government?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9073,"featured_media":103104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[1067,1066,1032,1068,1083,1072,1027],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-103103","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-amazon","tag-apple","tag-gadgets","tag-google","tag-ios","tag-microsoft","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/103103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9073"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=103103"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/103103\/revisions"}],"predecessor-version":[{"id":327752,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/103103\/revisions\/327752"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/103104"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=103103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=103103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=103103"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=103103"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=103103"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=103103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}