
Man awarded $12,500 after Google Street View camera captured him naked in his yard in Argentina
The policeman had sought payment from the internet giant for harm to his dignity, arguing he was behind a 6 1/2-foot wall when a Google camera captured him in the buff, from behind, in small-town Argentina in 2017.
His house number and street name were also laid bare, broadcast on Argentine TV covering the story, and shared widely on social media.
The man claimed the invasion exposed him to ridicule at work and among his neighbors.
Another court last year dismissed the man's claim for damages, ruling he only had himself to blame for "walking around in inappropriate conditions in the garden of his home."
Google, for its part, claimed the perimeter wall was not high enough.
Appeals judges, however, concluded the man's dignity had been flagrantly violated, and awarded him an amount in Argentine pesos equivalent to about $12,500, payable by Google.
"This involves an image of a person that was not captured in a public space but within the confines of their home, behind a fence taller than the average-sized person. The invasion of privacy... is blatant," they wrote.
The judges said "there is no doubt that in this case there was an arbitrary intrusion into another's life."
And they found there was "no justification for (Google) to evade responsibility for this serious error that involved an intrusion into the plaintiff's house, within his private domain, undermining his dignity.
"No one wants to appear exposed to the world as the day they were born."
The judges pointed to Google's policy of blurring the faces and license plates of people and vehicles photographed for Street View as evidence it was aware of a duty to avoid harm to third parties.
But in this case, "it was not his face that was visible but his entire naked body, an image that should also have been prevented."
The court absolved co-accused telecoms company Cablevision SA and news site El Censor of liability for the image spreading, saying their actions had "helped highlight the misstep committed by Google."
On a website about its Street View policy, Google says it has implemented measures to protect the privacy of people when images is published to Google Maps.
"We have developed cutting-edge face and license plate blurring technology that is designed to blur identifiable faces and license plates within Google-contributed imagery in Street View," Google says.
The company adds that "if you would like us to blur your entire house, car, or body, submit a request using the "Report a problem" tool."
In 2019, Google reportedly agreed to pay a $13 million settlement over the company's collection of people's private information through its Street View project.
In 2010, Google acknowledged that it trespassed when it took a photo of a Pittsburgh-area house for its Street View service, but only paid $1 in damages to a couple who sued.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


WIRED
13 hours ago
- WIRED
Leak Reveals the Workaday Lives of North Korean IT Scammers
Aug 7, 2025 7:15 PM Spreadsheets, Slack messages, and files linked to an alleged group of North Korean IT workers expose their meticulous job-planning and targeting—and the constant surveillance they're under. PHOTO-ILLUSTRATION: WIRED STAFF; GETTY IMAGES Job hunting is a fresh kind of hell. Hours are wasted sifting through open roles, tweaking cover letters, dealing with obtuse recruiters—and that's all before you get started with potential interviews. Arguably, some of the world's most prolific job applicants—or at least most persistent—are those of North Korea's sprawling IT worker schemes. For years, Kim Jong Un's repressive regime has successfully sent skilled coders abroad where they're tasked with finding remote work and sending money back to the heavily sanctioned and isolated nation. Each year, thousands of IT workers bring in somewhere between $250 million and $600 million, according to United Nations estimates. Now an apparent huge new trove of data, obtained by a cybersecurity researcher, sheds new light on how one group of alleged North Korean IT workers has been running its operations and the meticulous planning involved in the money-making schemes. Money made by scam IT workers contributes to North Korea's weapons of mass destruction development efforts and ballistic missile programs, the US government has said. Emails, spreadsheets, documents, and chat messages from Google, Github, and Slack accounts allegedly linked to the alleged North Korean scammers show how they track potential jobs, log their ongoing applications, and record earnings with a painstaking attention to detail. The cache of data, which represents a glimpse into the workaday life of some of North Korea's IT workers, also purportedly includes fake IDs that may be used for job applications, as well as example cover letters, details of laptop farms, and manuals used to create online accounts. It reinforces how reliant upon US-based tech services, such as Google, Slack, and GitHub, the DPRK workers are. 'I think this is the first time to see their internal [operations], how they are working,' says the security researcher, who uses the handle SttyK and asked not to be named due to privacy and security concerns. SttyK, who is presenting their findings at the Black Hat security conference in Las Vegas today, says an unnamed confidential source provided them with the data from the online accounts. 'There are several dozen gigabytes worth of data. There are thousands of emails,' says SttyK, who showed WIRED their presentation ahead of the conference. North Korea's IT workers have, in recent years, infiltrated huge Fortune 500 companies, a host of tech and crypto firms, and countless small businesses. While not all IT worker teams use the same approaches, they often use fake or stolen identities to get work and also use facilitators who help cover their digital tracks. The IT workers are often based in Russia or China and are given more freedom and liberties—they've been seen enjoying pool parties and dining out on expensive steak dinners—than millions of North Koreans who are not afforded basic human rights. One North Korean defector who operated as an IT worker recently told the BBC that 85 percent of their ill-gained earnings were sent to North Korea. 'It's still much better than when we were in North Korea,' they said. Multiple screenshots of spreadsheets in the data obtained by SttyK show a cluster of IT workers that appear to be split into 12 groups—each with around a dozen members—and an overall 'master boss.' The spreadsheets are methodologically put together to track jobs and budgets: They have summary and analysis tabs that drill down into the data for each group. Rows and columns are neatly filled out; they appear to be updated and maintained regularly. The tables show the potential target jobs for IT workers. One sheet, which seemingly includes daily updates, lists job descriptions ('need a new react and web3 developer'), the companies advertising them, and their locations. It also links to the vacancies on freelance websites or contact details for those conducting the hiring. One 'status' column says whether they are 'waiting' or if there has been 'contact.' Screenshots of one spreadsheet seen by WIRED appears to list the potential real-world names of the IT workers themselves. Alongside each name is a register of the make and model of computer they allegedly have, as well as monitors, hard drives, and serial numbers for each device. The 'master boss,' who does not have a name listed, is apparently using a 34-inch monitor and two 500GB hard drives. One 'analysis' page in the data seen by SttyK, the security researcher, shows a list of types of work the group of fraudsters are involved in: AI, blockchain, web scraping, bot development, mobile app and web development, trading, CMS development, desktop app development, and 'others.' Each category has a potential budget listed and a 'total paid' field. A dozen graphs in one spreadsheet claim to track how much they have been paid, the most lucrative regions to make money from, and whether getting paid weekly, monthly, or as a fixed sum is the most successful. 'It's professionally run,' says Michael 'Barni' Barnhart, a leading North Korean hacking and threat researcher who works for insider threat security firm DTEX. 'Everyone has to make their quotas. Everything needs to be jotted down. Everything needs to be noted,' he says. The researcher adds that he has seen similar levels of record keeping with North Korea's sophisticated hacking groups, which have stolen billions in cryptocurrency in recent years, and are largely separate to IT worker schemes. Barnhart has viewed the data obtained by SttyK and says it overlaps with what he and other researchers were tracking. 'I do think this data is very real,' says Evan Gordenker, a consulting senior manager at the Unit 42 threat intelligence team of cybersecurity company Palo Alto Networks, who has also seen the data SttyK obtained. Gordenker says the firm had been tracking multiple accounts in the data and that one of the prominent GitHub accounts was previously exposing the IT workers' files publicly. None of the DPRK-linked email addresses responded to WIRED's requests for comment. GitHub removed three developer accounts after WIRED got in touch, with Raj Laud, the company's head of cybersecurity and online safety, saying they have been suspended in line with its 'spam and inauthentic activity' rules. 'The prevalence of such nation-state threat activity is an industry-wide challenge and a complex issue that we take seriously,' Laud says. Google declined to comment on specific accounts WIRED provided, citing policies around account privacy and security. 'We have processes and policies in place to detect these operations and report them to law enforcement,' says Mike Sinno, director of detection and response at Google. 'These processes include taking action against fraudulent activity, proactively notifying targeted organizations, and working with public and private partnerships to share threat intelligence that strengthens defenses against these campaigns.' 'We have strict policies in place that prohibit the use of Slack by sanctioned individuals or entities, and we take swift action when we identify activity that violates these rules,' says Allen Tsai, senior director of corporate communications at Slack's parent company Salesforce. 'We cooperate with law enforcement and relevant authorities as required by law and do not comment on specific accounts or ongoing investigations.' Another spreadsheet also lists members as being part of a 'unit' called 'KUT,' a potential abbreviation of North Korea's Kim Chaek University of Technology, which has been cited in US government warnings about DPRK-linked IT workers. One column in the spreadsheet also lists 'ownership' as 'Ryonbong,' likely referring to defense company Korea Ryonbong General Corporation, which has been sanctioned by the US since 2005 and UN since 2009. 'The vast majority of them [IT workers] are subordinate to and working on behalf of entities directly involved in the DPRK's UN-prohibited WMD and ballistic missile programs, as well as its advanced conventional weapons development and trade sectors,' the US Treasury Department said in a May 2022 report. Across the myriad of IT worker-linked GitHub and LinkedIn accounts, CVs, and portfolio websites that researchers have identified in recent years, there are often distinct patterns. Email addresses and accounts use the same names; CVs can look identical. 'Reusing resume content is also something that we've seen frequently across their profiles,' says Benjamin Racenberg, a senior researcher who has tracked North Korean IT worker personas at cybersecurity firm Nisos. Racenberg says the scammers are increasingly adopting AI for image manipulation, video calls, and as part of scripts they use. 'For portfolio websites, we've seen them use templates and use the same template over and over again,' Racenberg says. That all points to some day-to-day drudgery for the IT workers tasked with running the criminal schemes for the Kim regime. 'It's a lot of copy and paste,' Unit 42's Gordenker says. One suspected IT worker Gordenker has tracked was spotted using 119 identities. 'He Googles Japanese name generators—spelled wrong of course—and then over the course of about four hours, just fills out spreadsheets just full of names and potential places [to target].' The detailed documentation also serves another purpose, though: tracking the IT workers and their actions. 'There's a lot of moving parts once the money gets into the actual hands of leadership, so they're going to need accurate numbers,' DTEX's Barnhart says. Employee monitoring software has been seen on the scammers' machines in some instances and researchers claim North Koreans in job interviews won't answer questions about Kim. SttyK says they saw dozens of screen recordings in Slack channels showing the workers daily activity. In screenshots of a Slack instance, the 'Boss' account sends a message: '@channel: Everyone should try to work more than at least 14 hrs a day.' The next message they sent says: 'This time track includes idling time, as you know.' 'Interestingly, their communication has been all English, not Korean,' SttyK says. The researcher, along with others, speculates this may be for a couple of reasons: first, to blend into legitimate activity; and secondly, to help improve their English skills for applications and interviews. Google account data, SttyK says, shows they were frequently using online translation to process messages. Beyond a glimpse at the ways in which the IT workers track their performance, the data SttyK obtained gives some limited clues about the day-to-day lives of the individual scammers themselves. One spreadsheet lists a volleyball tournament the IT workers apparently had planned; in Slack channels, they celebrated birthdays and shared inspirational memes from a popular Instagram account. In some screen recordings, SttyK says, they can be seen playing Counter-Strike . 'I felt there was a strong unity among the members,' SttyK says.


Forbes
a day ago
- Forbes
Google Confirms It Has Been Hacked — User Data Stolen
The Google Threat Intelligence Group has officially confirmed that user data has been stolen following a successful hack attack impacting one of its databases. Here's what we know so far. Google Has Been Hacked — Data Has Been Compromised This is not a warning that the Google Chrome web browser is in need of an urgent security update, or a story about switching from passwords to passkeys to protect your Google account. No, this is exactly what the headline says: Google has been hacked. Source? That would be Google itself. An August 5 posting by the Google Threat Intelligence Group has confirmed that one of the corporate databases was impacted by hackers thought to be associated with the ShinyHunters ransomware group, more formally known as UNC6040. 'Google responded to the activity, performed an impact analysis and began mitigations,' the GTIG posting stated, adding the database in question was a Salesforce instance 'used to store contact information and related notes for small and medium businesses.' Customer data was, Google said, 'retrieved by the threat actor,' in the short period of time that the attack window remained open. Although Google has not gone into great detail regarding the attack as of yet, it did confirm that the stolen data consisted of 'basic and largely publicly available business information, such as business names and contact details.' I have reached out to Google for a statement. Google has stated that ShinyHunters commonly uses an attack tactic of extorting victims using emails or telephone calls demanding bitcoin ransom payments within 72 hours of compromise. It has not, however, confirmed or denied that this was the case here. Google did confirm that the attack itself occurred in June. This is a developing story, and I will update it if more information from Google is forthcoming.


Business Insider
a day ago
- Business Insider
Google (GOOGL) Becomes Latest Victim of ShinyHunters Salesforce Hack
U.S. tech giant Alphabet (GOOGL) has revealed that it has become the latest victim of a data breach using Salesforce (CRM) databases. Elevate Your Investing Strategy: Take advantage of TipRanks Premium at 50% off! Unlock powerful investing tools, advanced data, and expert analyst insights to help you invest with confidence. Google revealed in a blog post that some customers' information has been stolen via one of its Salesforce database systems. Google Hunt Google's Threat Intelligence Group said the database is used for storing contact information and related notes for small and medium businesses. It has been breached by a hacking group known as ShinyHunters. 'The data retrieved by the threat actor was confined to basic and largely publicly available business information, such as business names and contact details,' the company said. Google did not reveal how many customers are affected or whether it has received a ransom demand. Google did say, however, that the ShinyHunters group is likely preparing a data leak site, which some ransomware gangs use to publish stolen data to extort victims into paying a ransom. Long Line of Hits A number of companies using Salesforce have also witnessed data breaches in recent weeks. This includes French luxury brand Chanel, fellow premium group Louis Vuitton (LVMUY), Dior, Tiffany & Co, Adidas (ADDYY), Qantas (QUBSF) and Allianz Life. Hackers from the ShinyHunters group have been stealing data from Salesforce customers since early 2025. They use a trick called 'social engineering,' in which they call employees pretending to be IT support and convince them to install a fake app. This allows hackers to bypass normal security and access sensitive customer data. Salesforce confirmed that its platform has not been compromised. Instead, the breaches stem from credential theft and poor access controls on the customer side. The company is urging users to adopt best practices, including multi-factor authentication (MFA), limited access, and tighter oversight of connected applications. However, the incidents are still likely to have caused a dent in Salesforce's reputation with clients and the wider public. As one can see below, tech risks are key for both the business and investors. Is CRM a Good Stock to Buy Now? On TipRanks, CRM has a Moderate Buy consensus based on 33 Buy, 9 Hold and 2 Sell ratings. Its highest price target is $440. CRM stock's consensus price target is $351.59, implying a 41.88% upside.