Amazon planning to monitor customer service workers' keyboard and mouse strokes

CyberTech

Level 44
Thread author
Verified
Top Poster
Well-known
Nov 10, 2017
3,250
Why it matters: According to an internal Amazon document obtained by Vice, the company plans to use increasingly close surveillance measures on its customer service workers to better detect outside actors who try to access customer data. Amazon thinks this surveillance is sorely needed in a time when more Amazon employees are working from home.

According to the document, Amazon initially considered using software that records all of an employee's keystrokes. However, it is now looking at a product that analyzes user behavior in a more general way to create profiles which it then uses to identify whether another person is using that device. That behavior might include typing rhythm, mouse movements, and touch gestures. "We have a security gap as we don't have a reliable mechanism for verifying that users are who they claim they are," it reads.

The document points out different situations in which customer data could be stolen through employees' systems: A remote worker who doesn't live alone may leave their station without securing it; someone could use software on an employee workstation to input keystrokes at "superhuman" speeds; a hacker may have bought an employee's security credentials.
 

Slerion

Level 5
Verified
Well-known
Feb 24, 2016
246
Not surprised by amazon.

worked for them as soon as you are somewhere on the area of the work any privacy is gone and your getting profiled heavily thats nothing new.
 
  • Like
Reactions: Gandalf_The_Grey

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top