https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/IoTWorldToday-mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Thinkstock

Cyberpunk

The Ghost of IoT

Secretive cyber-weapons can backfire or end up in the wrong people’s hands. The Internet of Things compounds the problem.
  • Written by Brian Buntz
  • 11th March 2017

What if we developed a super powerful intelligent combat robot that was effective against any enemy, and then our enemies stole it? That’s the premise of the original Ghost in the Shell media franchise and upcoming film starring Scarlett Johansson, but there are also eerie parallels with what’s going on in secretive cyberwar operations across the world.  

Only recently, Wikileaks alleged that the CIA “lost control of the majority of its hacking arsenal,” giving anyone possessing them “the entire hacking capacity of the CIA.” For now, Wikileaks has released a cache of 8700 documents and files, which it says are a fragment of the total.

History Repeats Itself: Powerful Software Attracts Thieves

The CIA leak would not been an isolated incident. In our uber-connected era, the more capable a nation state’s hacking tools are, the harder they seem to be to safeguard.

Only recently, The New York Times exposed a “secret cyberwar against North Korean missiles” that purportedly caused some of those weapons to malfunction. Exposing this sabotage program could lead nations like Russia and China to target U.S. missiles with cyber-weapons of their own, the Times reports. That wouldn’t necessarily be a new development, however. “I promise you, Russia and China have been targeting American missiles with cyberattacks since well before the World Wide Web even existed,” says Kenneth Geers, a senior research scientist at Comodo Group and a NATO Cyber Centre ambassador.

Note: The topic of IoT security is a key item on the agenda at Internet of Things World in Santa Clara this May. Check out the agenda for the world’s biggest IoT event.

In the past several years alone, details have emerged about several powerful and secretive cyber-weapons. In 2010, there was Stuxnet—purportedly a U.S.–Israeli cyber-weapon that caused physical damage to Iranian centrifuges. Iran seems to have responded to that initiative by beefing up its cyber army, launching attacks on U.S. banks and a New York dam. And in 2011, Iran claimed to have stolen a U.S. military drone in mid-air. In 2013, Edward Snowden revealed NSA’s cyber-espionage efforts, claiming the U.S. government could spy on citizens through smartphones and computers. Over the years, we have also learned of a U.S. defense program reportedly code-named Nitro Zeus designed to take down Iran’s air defenses, communication networks, and parts of its power grid.

Ultimately, the Internet is a war zone. NATO made that distinction official last year. “The geography of cyberspace changes all the time, and is subject not only to hostile data packets but human spies, and spectacular Special Forces operations that may achieve with explosives and wire cutters what hackers couldn’t accomplish with a digital denial-of-service,” Geers says.

The IoT as a Global Robot

In the modern age, not only are our computing devices potential attack vectors, so are our smartphones, routers, and smart TVs. “Computers run everything from elections to electricity, and they have always been intimately associated with national security,” Geers explains. “Tanks, planes, and ships today are rolling, flying, and floating computer networks.”

The potential for cyberwarfare only increases with the proliferation of the IoT technology across the industrial and consumer sectors. “Everything is becoming a computer,” Bruce Schneier explained in an RSA session this year. “And computer security is becoming everything security.”

According to one classic definition, to qualify as as a robot, a technology must sense, plan, and act. When you think about it, this is precisely what the Internet of Things aims to do. “I argue that we are creating a world-sized robot, and we don’t even realize it,” Schneier said.

Still, our common conception of a robot is inspired by science fiction—a robot is typically an independent entity housed in a metal shell with computing power within, and sensors and actuators at the surface. “But that’s not what we are building,” Schneier says. With the Internet of Things, we are creating a system that is distributed, potentially imbuing common objects, vehicles, and other devices with computing power. But lacking a central brain, IoT has no central authority or no singular goal or purpose. “And most importantly, it’s not something deliberately designed,” Schneier explains, referring to the totality of Internet connected devices.

But even tools that are carefully developed and safeguarded can end up empowering enemies. “This is also what the new (and old) movie Ghost in the Shell addresses,” Geers explains. “What happens when an adversary steals your powerful soldier-robots?”

Tags: Article Security Technologies

Related Content


  • Caltech campus
    Robots Could Gain Sense of Touch, With New Artificial Skin
    New design can help businesses determine the presence of hazardous materials, offer greater safety for workers
  • Clearview AI Fined $9.4M Over Facial Data Scraping
    The company was ordered to delete any data it held on U.K. citizens.
  • Microsoft Ramping up Cybersecurity Service Offerings
    Three new managed services will boost the company’s presence in the security space
  • IoT Product Roundup
    IoT Product Roundup: PTC, Nokia, Arm and More
    All the latest Internet of Things products

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest News

  • Unmanned Robotic Combat Vehicle Being Tested
  • Image shows a Close up of lens on black background
    Carnegie Mellon Researchers Invent System to Find Hidden Cameras
  • STMicroelectronics
    STMicroelectronics, Microsoft Partner to Develop IoT Security Solutions
  • Image shows IoT (Internet of Things) concept.
    IoT Product Roundup: Amazon, Synaptics, Urban Control and More

Roundups

View all

IoT Product Roundup: Canonical, InfluxData, Wiliot and More

23rd June 2022

IoT Product Roundup: Cisco, Telit, Draganfly and More

9th June 2022

IoT Deals, Partnerships Roundup: Google, Arm, Senet and More

26th May 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all

AI Summit 2022: easyJet’s Ben Dias on AI in Aerospace

The company’s director of data science and analytics talks about the industry’s use of AI.

AI Summit 2022: Bob Compton, CIO of Mobilize Financial Services

Compton talks about some of the biggest business challenges with AI

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

IoT Deals and Partnerships Roundup: Sony, Emnify, Nexxiot and more dlvr.it/STBT4j https://t.co/F9miX0gvkV

1st July 2022
IoTWorldToday, IoTWorldSeries

AI Summit 2022: easyJet’s Ben Dias on AI in Aerospace dlvr.it/ST9SXq https://t.co/ZFAoLpy4v5

1st July 2022
IoTWorldToday, IoTWorldSeries

#Selfdriving tech leaders urging @CAgovernor to allow #autonomous trucks to operate in the state. #AVs @Waymo… twitter.com/i/web/status/1…

30th June 2022
IoTWorldToday, IoTWorldSeries

Wimbledon 2022: AI Operations Inside the Control Room  dlvr.it/ST6sQs https://t.co/dXvyIjtuJD

30th June 2022
IoTWorldToday, IoTWorldSeries

AI Summit 2022: Bob Compton, CIO of Mobilize Financial Services dlvr.it/ST4sVs https://t.co/1dq3tbwycl

29th June 2022
IoTWorldToday, IoTWorldSeries

Vodafone Hints at IoT Spinoff dlvr.it/ST46FV https://t.co/5SNxgkK9yN

29th June 2022
IoTWorldToday, IoTWorldSeries

Autonomous Helicopter Takes off in Canada dlvr.it/ST3sPr https://t.co/OA9RA1XJcY

29th June 2022
IoTWorldToday, IoTWorldSeries

AI Summit 2022: AutoTrader’s Nick King dlvr.it/ST3Ylw https://t.co/XgT5qZtme1

29th June 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X