recommended reading

Police Want to Know What Alleged Murderer’s Amazon Echo Heard, on the Night of the Crime

Jeff Chiu/AP

In a reminder that our smart devices can also be used against us, police from Bentonville, Arkansas, are querying whether an Amazon Echo device heard what happened at a murder scene in 2015. They have asked Amazon to hand over the recording data of the voice-activated smart home machine to help investigate the crime.

A man named Victor Collins was found dead in a hot tub at James Bates’ home in Bentonville one November morning in 2015, after spending the night with two other friends at the Bates home. Police said Collins died of strangulation, with drowning as a secondary cause, USA Today reports.

Police charged Bates with murder Nov. 22, 2015. As officers investigated the crime scene, they realized several smart home devices, including a smart water meter and an Amazon Echo, might hold evidence about what exactly transpired.

The Bentonville police department presented Amazon with a search warrant for all audio recording, transcript, or data obtained through the Echo device between Nov. 21 and Nov. 22, 2015. The company did not provide the data, but gave police Bates’ Amazon account details and purchase records instead.

The Bentonville Police has not returned requests for comment.

In a statement to Engadget, the company said it “will not release customer information without a valid and binding legal demand properly served on us. Amazon objects to overbroad or otherwise inappropriate demands as a matter of course.”

When switched on, Amazon Echo is always listening for the wake word, “Alexa,” but does not start recording until it hears the word. It then sends whatever is said to the company’s servers, with encryption. Echo also does not keep over 60 seconds of audio in its internal storage, according to USA Today. The device microphone can also be turned off, and recordings can be deleted manually from the account.

The case poses some of the same issues posed when the FBI went to court against Apple, ordering it to unlock an iPhone owned by the San Bernardino, California, shooters. Smart home devices that record our personal lives can also be used by governments to provide evidence of crimes we may commit.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.