Technician admits to accessing security cameras

Technician admits to accessing security cameras

A former technician admitted Thursday that he regularly accesses clients’ home security accounts to spy on naked women and watch their couples while having sex. After his confession, the technician faces up to five years in prison.

The technician, 35, works for ADT, a domestic and small office security company in Telcepharo Aviles, Dallas, Texas. Convicted of recording a computer fraud and another attacker, Aviles admitted Thursday that he had access to the cameras of more than 200 customers at about 10,000 different times, Ars Technica explained, “with women in homes. Make a note of. Deem is attractive. And look at his cameras for sexual gratification. He says he sees naked women and couples having sex. ”

Aviles does this by adding its email address to the list of authorized addresses in the customer’s ADT Pulse account. This allows Aviles to remotely access video feeds. But remotely disable in the customer’s home or interact with other devices such as lights.

Aville used this method to spy on individuals and couples for five years. However, in April 2020, customers noticed unauthorized emails in their Pulse accounts. Later learned of Aville’s actions, expelled him from the company and informed the prosecutors.

ADT has personally contacted customers to inform them of status and address concerns. The company has also shared a statement, which is being updated on major developments there. ADT states that most of its customer concerns and disputes have been resolved, although the company’s actions are inadequate for some.

Not surprisingly, there are two proposed class action lawsuits: one on behalf of clients and one on behalf of minors living in affected homes. The suit claims that ADT is not sufficient to ensure that their home security software is safe. ADT is a channel for parents to monitor their children and pets using their smartphones. ADT is not a security measure that can protect customers, such as 2FA or. Automatic notifications when new users are allowed to access their accounts.

As with Avillez’s sentence, the outcome of the prosecution has not yet been determined. For now, this strange and tragic incident is yet a reminder of the dangers of networked devices.

While many people are urging companies like ADT to uninstall their home security system, it is important to take basic steps to protect their privacy, especially if your home security cameras are pointing to them.

Telesfor Aviles, a 35-year-old former ADT employee, pleaded guilty to computer fraud on Thursday, before Judge David Horan was sentenced by plea documents Aviles admitted it was against company policy. He added a personal email address to his client’s “ADT” Pulse “account. Regularly, providing himself with real-time access to home video feeds. In some cases he claimed to have” tested “the system Required to attach themselves temporarily; in other cases, they attached themselves without them.

US attorney Motivator Shah said, “Defendants were assigned to protect a client’s home rather than trespassing at their most intimate moments.” this is sick.

Aviles noted which houses had attractive women, and then repeatedly logged into these customers’ accounts to see their photos to their sexual satisfaction, she admitted. The plea letters indicated that she saw several videos of naked women and couples who engaged in sexual activities in their homes.

Over a period of four and a half years, Aviles secretly accessed nearly 200 customer accounts more than 9,600 times without his consent, he accepted.

Brandon Hoffman, chief information security officer at Netenrich, a provider of IT, cloud and cyber security operations and services in San Jose, said: the continuity of privacy issues among consumers as consumers buy and use connected systems, especially service-dependent systems. Continuing to do, privacy is a major concern.

Due to the increased risk of invasion of privacy by basic connected devices, home appliance buyers should be wary of such systems that are intrusive. Even if they are designed for additional security or service purposes, it is important to understand the details of what these systems provide and measure their benefits against risks.

Furthermore, there is a lack of discussion and readiness to caution against intrusions from these systems that are common or basic that can be understood and used by non-technical users. “


Write a Comment

Your email address will not be published. Required fields are marked *