Connect with us

Technology

Ghosts in the Kinect

Published

on

Ghosts in the Kinect

Billy Tolley swings a Microsoft Kinect around an abandoned room in sudden, jittery movements. “Whoa!” he says. “Dude, it was so creepy.” On the display, we see an anomaly of arrows, spheres, and red lines that disappears almost as soon as it arrives. For Tolley and Zak Bagans, two members of the Ghost Adventures YouTube channel, this is enough to suggest they should leave the building. Because for this team and other similar enthusiasts, that seemingly innocuous blotter of white arrows means something more terrifying: a glimpse at specters and phantoms invisible to the human eye.

Fifteen years after its release, just about the only people still buying the Microsoft Kinect are ghost hunters like Tolley and Bagans. Though the body-tracking camera, which was discontinued in 2017, started as a gaming peripheral, it also enjoyed a spirited afterlife outside of video games. But in 2025, its most notable application is helping paranormal investigators, like the Ghost Adventures team, in their attempts at documenting the afterlife.

The Kinect’s ability to convert the data from its body-tracking sensors into an on-screen skeletal dummy delights these investigators, who allege the figures it shows in empty space are, in fact, skeletons of the spooky, scary variety. Looking at it in use — the Kinect is particularly popular with ghost-hunting YouTubers — it’s certainly producing results, showing human-like figures where there are none. The question is: why?

With the help of ghost hunters and those familiar with how the Kinect actually works, The Verge set out to understand why the perhaps most misbegotten gaming peripheral has gained such a strong foothold in the search for the paranormal.

Part of the reason is purely technical. “The Kinect’s popularity as a depth camera for ghost hunting stems from its ability to detect depth and create stick-figure representations of humanoid shapes, making it easier to identify potential human-like forms, even if faint or translucent,” says Sam Ashford, founder of ghost-hunting equipment store SpiritShack.

Advertisement

This is made possible by the first-generation Kinect’s structured light system. By projecting a grid of infrared dots into an environment — even a dark one — and reading the resulting pattern, the Kinect can detect deformations in the projection and, through a machine-learning algorithm, discern human limbs within those deformations. The Kinect then converts that data into a visual representation of a stick figure, which, in its previous life, was pumped back into games like Dance Central and Kinect Sports.

The Kinect isn’t always seeing what it thinks it is

When it was released in 2010, the first-gen Kinect was cutting-edge technology: a high-powered, robust, and lightweight depth camera that condensed what would usually retail upward of $6,000 into a $150 peripheral. Today, you can find a Kinect on eBay for around $20. Ghost hunters, however, typically mount it to a carry handle and a tablet and upsell it for around $400-600, rebranded as a “structured light sensor” (SLS) camera. “The user will direct the camera to a certain point of the room where they believe activity to be present,” says Andy Bailey, founder of a gear shop for ghost hunters called Infraready. “The subject area will be absent of human beings. However, the camera will often calculate and display the presence of a skeletal image.”

Though this is often touted as proof we’re all bound for an eternity haunting aging hotels and abandoned prisons, Bailey urges caution, telling would-be ghost hunters that the cameras are best paired with other equipment to “provide an additional layer of supporting evidence.” For this, Ghost Hunters Equipment, the retail arm of haunted tour operator Ghost Augustine recommends that “EMF readings, temperature, baseline readings, and all of that are essential when considering authentication of paranormal activity.”

That’s because the Kinect isn’t always seeing what it thinks it is. But what is it actually seeing? Did Microsoft, while trying to break into a motion-control market monopolized by the Nintendo Wii, accidentally create a conduit through which we might glimpse the afterlife? Sadly, no.

Advertisement

Photo by Joe Raedle/Getty Images

The Kinect is actually a straightforward piece of hardware. It is trained to recognize the human body, and assumes that it’s always looking at one — because that’s what it’s designed to do. Whatever you show it, whether human or humanoid or something entirely different, it will try and discern human anatomy. If the Kinect is not 100 percent sure of its position, it might even look like the figure it displays is moving. “We may recognise the face of Jesus in a piece of toast or an elephant in a rock formation,” says Jon Wood, a science performer who has a show devoted to examining ghost hunting equipment. “Our brains are trying to make sense of the randomness.” The Kinect does much the same, except it cannot overrule its hunches.

That suits ghost hunters just fine, of course: the Kinect’s habit of finding human shapes where there are none is a crowd-pleaser. The Kinect, deployed in dark rooms bathed in infrared light from cameras and torches, wobbling in the hands of excitable ghost hunters as it tries to read a precise grid of infrared points, is almost guaranteed to show them what they want to see.

Much of ghost hunting depends on ambiguity. If you’re searching for proof of something, be it the afterlife or not, logic suggests you’d want tools that can provide the clearest results, the better to cement the veracity of that proof. Ghost hunters, however, prefer technology that will produce results of any kind: murky recordings on 2000s voice recorders that might be mistaken for voices, low-resolution videos haunted by shadowy artifacts, and any cheap equipment that can call into question the existence of dust (sorry, spirit orbs) — bonus points if battery life is temperamental.

“I’ve watched ghost hunters use two different devices for measuring electromagnetic fields (EMF),” Wood says. “One would be an accurate and expensive Trifled TF2, that never moves unless it actually encounters an electrical field. The other would be a £15 [$18], no-brand, ‘KII’ device with five lights that go berserk when someone so much as sneezes. Which one was more popular, do you think?”

Advertisement

Glitches aren’t tolerated — they’re encouraged

Given the notoriously unreliable skeletal tracking of the Kinect — most non-gaming applications bypass the Kinect’s default SDKs, preferring to process its raw data by other, less error-prone, means — it would be stranger if it didn’t see figures every time it’s deployed. But that’s the point. Like so much technology ghost hunters use, the Kinect’s flaws aren’t bugs or glitches. They’re not tolerated — they’re encouraged.

“If a person pays good money to enjoy a ghost hunt, what are they after?” Wood asks. “They prime themselves for a ‘spooky encounter’ and open up to the suggestion of anything being ‘evidence of a ghost’ — they want to find a ghost, so they make sure they do.”

If it were just the skeletal tracking that ghost hunters were after, better options are now possible with a simple color image. But improved methodology wouldn’t return the false-positives that maintain belief, and so skeletal tracking from 2010 is preferred. None of this is likely to move the needle for those who believe towards something more skeptical. But we do know why the Kinect (or SLS) returns the results it does, and we know it’s not ghosts.

That said, even if its results are erroneous, maybe the Kinect’s new lease on afterlife isn’t a bad thing. Much as ghosts supposedly patrol the same paths over and over until interrupted by ghost hunters, perhaps it’s fitting that the Kinect will continue forevermore to track human bodies — even if the bodies aren’t really there.

Advertisement

Technology

A giant cell tower is going to space this weekend

Published

on

A giant cell tower is going to space this weekend

This weekend’s scheduled Blue Origin rocket launch is rather momentous. Success would signal an end to SpaceX’s monopoly on reusable orbital launch vehicles, and set up a three-way race to make that “No Service” indicator on your phone disappear forever.

On Sunday morning, Jeff Bezos’ massive New Glenn rocket is scheduled to launch with the first-stage booster that launched and landed on the program’s second mission last November. It’s a critical test, because cost-effective booster reuse is what’s made SpaceX’s Falcon 9 so dominate.

Amazon desperately needs a reusable rocket of its own to accelerate its Leo launches. Without one, it’s only been able to launch 241 Leo satellites, putting it well behind schedule. In that same 12-month time period, SpaceX’s Falcon 9 rocket was able to deploy over 1,500 satellites to its Starlink constellation.

Sunday’s mission will carry AST SpaceMobile’s BlueBird 7 satellite to low Earth orbit. Instead of blanketing the region with thousands of small satellites like Amazon and SpaceX, AST’s plan is to deploy fewer satellites that are much more powerful. Bluebird 7 features a massive 2,400-square-foot phased-array antenna, making it the largest commercial communications array ever deployed in low Earth orbit. It’s essentially a cell tower in space, and will be the second of the company’s “Block 2” next-generation satellites to launch.

The BlueBird 7 is designed to provide 4G and 5G broadband, at speeds exceeding 120 Mbps, to the phones we already carry. AST plans to have 45 to 60 satellites launched by the end of 2026. When AST lights up its service sometime this year, it will be in direct competition with Starlink’s direct-to-cell service, already operating with T-Mobile in the US, and Globalstar, the satellite network snapped up by Amazon that keeps iPhones and Apple Watches communicating in dead zones.

Advertisement
Continue Reading

Technology

New FBI warning reveals phishing attacks hitting private chats

Published

on

New FBI warning reveals phishing attacks hitting private chats

NEWYou can now listen to Fox News articles!

You probably think your messages are safe. After all, apps like WhatsApp, Signal and Telegram promote strong encryption.

Advertisement

But a new warning from the Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation shows that attackers do not need to break encryption at all.

Instead, they are going after you.

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

FBI WARNS ABOUT FOREIGN APPS AND YOUR DATA
 

A new federal advisory says phishing campaigns tied to Russian intelligence are going after messaging app users instead of trying to break encryption. (MStudioImages/Getty Images)

What the FBI and CISA just revealed

According to the joint advisory, cyber actors tied to Russian intelligence are running large-scale phishing campaigns targeting messaging apps.

Advertisement

These attacks are not random. They have focused on high-value targets like government officials, military personnel and journalists. However, the tactics can easily spread to everyday users.

Here is the key takeaway: Hackers are not cracking the apps themselves. They are tricking people into giving up access. 

How these messaging app attacks actually work

This is where it gets interesting and a bit unsettling. Instead of breaking encryption, attackers use phishing to gain control of individual accounts. Once inside, they can:

  • Read private conversations
  • Access contact lists
  • Send messages as if they were you
  • Launch new scams targeting your contacts

It becomes a chain reaction. One compromised account can quickly lead to many more. In some cases, attackers impersonate trusted contacts. That makes the scam feel real and urgent.

Why encryption is not enough anymore

Encryption still matters. It protects messages as they travel between devices. But here is the problem. If someone logs into your account, they see everything just like you do.

That means even the most secure app cannot protect you if your login gets compromised. This is a shift in how cyberattacks work. The weakest link is no longer the technology. It is human behavior.

Advertisement

AI IS NOW POWERING CYBERATTACKS, MICROSOFT WARNS
 

The FBI and CISA are warning that attackers are targeting users of encrypted messaging apps by tricking them into handing over account access. (BackyardProduction/Getty Images)

Who is at risk from messaging app phishing attacks

While the advisory highlights high-profile targets, the tactics are not limited to them.

If you use messaging apps for:

  • Personal conversations
  • Work communication
  • Sharing sensitive information

You are a potential target. Phishing works because it relies on simple mistakes. A quick tap on the wrong link is often all it takes. 

What this means for you

This warning highlights a bigger trend. Cyberattacks are becoming more personal. Instead of attacking systems, hackers are targeting people directly. That makes awareness your strongest defense. The more you understand how these scams work, the harder it becomes for attackers to succeed.

Advertisement

Ways to stay safe from messaging app phishing attacks

You do not need to be a cybersecurity expert to protect yourself. You just need to slow things down and follow a few smart habits.

1) Be skeptical of unexpected messages

If a message feels urgent or out of place, pause. Even if it looks like it came from someone you know.

2) Never click suspicious links

Avoid links sent through messages unless you can verify them independently. Strong antivirus software can help detect suspicious behavior after a compromise. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

3) Turn on two-factor authentication

Two-factor authentication (2FA) adds a second layer of protection even if your password gets exposed.

TECH GIANTS UNITE TO FIGHT ONLINE SCAMS
 

Advertisement

Officials say hackers can read messages, access contacts and impersonate users once they gain control of a messaging app account. (FreshSplash/Getty Images)

4) Watch for login alerts

Many apps notify you when a new device signs in. Do not ignore these warnings.

5) Verify requests in another way

If a contact asks for something unusual, call them or confirm through another channel.

6) Use a data removal service

Limit how much of your personal information is available online. Data removal services work to delete your data from broker sites, making it harder for scammers to target you with convincing phishing messages. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

7) Keep your device and apps updated

Install updates regularly. Security patches fix vulnerabilities that attackers can exploit after gaining access.

Advertisement

Kurt’s key takeaways

Messaging apps feel private. They feel secure. That sense of comfort is exactly what attackers are counting on. The technology is still strong. The real question is whether your habits are keeping up. So the next time a message pops up that feels slightly off, trust that instinct and take a second look.

Have you ever received a suspicious message that made you stop and question if it was real? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

YouTube’s mobile app finally lets you share timestamped videos

Published

on

YouTube’s mobile app finally lets you share timestamped videos

YouTube is making some changes that might affect how you share videos from the mobile app. From the app, you can finally share videos from a specific timestamp, which will make it easier to point someone to a part of a video you might want them to see while you’re on your phone. However, this change will replace the Clips feature that lets you make a shareable clip from a video.

You’ll still be able to watch any Clips that you’ve already made. But moving forward, “the ability to set an end time or include a custom description when sharing will no longer be available,” YouTube says. The company notes that while clipping is “important way for creators to reach new audiences,” it says that “a number of third-party tools with advanced clipping features and authorized creator programs are now available to do this across different video platforms.”

The company originally introduced the Clips feature in 2021.

Continue Reading

Trending