https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Getty Images

Spying

IoT Security: What Are the Ramifications for Spying?

The amount of data large tech firms collect based on what we do in and outside of our homes is growing.
  • Written by Brian Buntz
  • 13th February 2019

Last year, I went to 172 places in 53 cities located across six countries and evidently skied 55 miles. If those trips together — whether by foot, car, plane, train or on a pair of skis — were in a straight line, it would be enough to go around the planet 1.6 times. But I know this because Google informed me that it is so. The company has been tracking me precisely and sometimes incorrectly, telling me that I went to the dentist instead of a café, for instance, but most of the time, the service is accurate. Today, Google knows that I was curious about the weather yesterday because I asked the smart speaker in my home to tell me the forecast. A Nest thermostat keeps track of how often the heat is in use.

And with the rise of IoT and AI, the amount that Google and other colossal tech companies know about us is poised to expand in ways that are hard to fathom. While adoption is arguably still in the early phases for both, there is little to stop connected sensors from continuing to proliferate all around us while algorithms take charge of a growing list of duties once only performed by humans.

While the cybersecurity ramifications of these trends have become a prominent theme, the question for how this might change the state of spying has been less considered. It would cost a fortune for a private investigator to travel the world — shadowing someone from a distance and tallying the distance of their trips, but Google offers me that information for free while also using it to enable targeted advertising.

The possibilities expand as the number of connected devices around us do. As CES showed us this year, Google is serious about being a dominant force in the smart home market. The company, along with Amazon, is steadily expanding the functionality of its smart assistants while working to integrate it with an ever-expanding assortment of products: TVs, fans, air purifiers and newer household appliances.  

What all of this might mean from a cybersecurity perspective is less clear. Decades ago, the notion of willingly setting up a network of microphones to allow a large corporation to have access to audio from within your home would have seemed ludicrous. But now, a sizable portion of the U.S. population — 32 percent according to one survey — has a so-called smart speaker.

And a large number of smartphone users enable tech firms to know nearly each and every location they visit by merely carrying a smartphone with them.

[Internet of Things World is the intersection of industries & IoT innovation. Book your conference pass and save $350, get a free expo pas, or see the IoT security speakers at the event.]

There is already evidence that the connected devices we carry  — either near us or even within us — can enable new possibilities for spying. In 2016, former Director of National Intelligence James Clapper said it is possible that the U.S. government would spy on suspects via smart home devices. While that may be more of a possibility than a reality, there are a handful of cases where such devices have enabled unprecedented types of surveillance. One such example comes via a man named Ross Compton who allegedly set fire to his home in 2016 as part of an insurance scam. Local police got a warrant for his pacemaker data and a cardiologist determined that his alibi didn’t line up with his cardiac data. He told cops, however, that he broke a window in his house with a cane and threw his possessions out it and then climbed out and pulled heavy items to the front of his house. His steady pulse during the time of the fire apparently told a different story — as did the traces of gasoline outside of his house.

That is an isolated example involving an individual. Consider the possibilities if, say, a nation-state actor or other types of threat actor was able to achieve access to millions of records of citizens — perhaps even collating them with their social security cards and other personally identifiable information.

Such an outcome is possible. It wasn’t long ago — in the summer of 2017 — when Equifax was hit by one of the most infamous cyberattacks in U.S. history. Ultimately, some 145.5 million U.S. consumers had their data exposed, including their full names, social security numbers, birth dates, addresses and in some cases driver’s license numbers.

While attribution of a cybercrime is notoriously difficult, there were tale-tell signs that a nation state was behind the Equifax breach. There was also evidence that the nation in question was China, although the investigators studying the Equifax breach did not universally agree on that conclusion. Whether China-backed hackers were behind the hack, Equifax leaders feared Chinese spies were targeting the firm and shared their concerns with the FBI, according to The Wall Street Journal. The subsequent investigation also revealed that the attackers behind the Equifax breach were targeting specific individuals.

The U.S. Justice Department concluded that Russian intelligence officers were behind another famous breach — a 2014 Yahoo attack that exposed data on 500 million users. Yahoo would go on to divulge that a 2013 attack affected its entire user base of 3 billion users.

Ultimately, when it comes to cybersecurity, it is hard to make definitive conclusions about broad-based attacks, but it is true that most of us have a growing amount of data being collected about our activities and, second, that nation-state–based agents appear to be interested in that information.

Tags: Security Features Opinion

Related


  • Image shows welding robotics and a digital manufacturing operation.
    IoT Supply Chain Vulnerability Poses Threat to IIoT Security
    The supply chain provides building blocks for IoT but also vulnerabilities. IT pros need to ward against malicious attacks that exploit supply chain security gaps.
  • IoT Security Needs Pen Testing Approach
    IoT pen testing is a no-brainer, say experts. But don’t test everything.
  • Image shows a digital background depicting innovative technologies in security systems,
    Securing IoT Devices With Zero Trust Requires Mindset Shift
    Zero-trust approaches require a shift in mindset to ensure IoT devices have rigorous security policies applied — and the work is never done, say IT pros.
  • An Integrated Approach to IoT Security
    This e-book provides a comprehensive framework to help organizations reduce risk in IoT products and environments.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Common Internet of Things Security Pitfalls 
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Developing a Critical Infrastructure Cybersecurity Strategy
  • Addressing IoT Security Challenges From the Cloud to the Edge 

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

IoT Remote Monitoring Helps Enterprises Traverse COVID-19 and Beyond dlvr.it/RtZ3K5 https://t.co/owJXYf1gkO

26th February 2021
IoTWorldToday, IoTWorldSeries

Securing the Industrial Internet of Things dlvr.it/RtYfYk https://t.co/khUn79dvQD

26th February 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @BluetoothSIG — the global standard for simple, secure wireless connections. ➕ Le… twitter.com/i/web/status/1…

26th February 2021
IoTWorldToday, IoTWorldSeries

How IoT Devices Can Enhance the Connected Customer Experience dlvr.it/RtPcvS

24th February 2021
IoTWorldToday, IoTWorldSeries

🤝 Meet #EIOTWORLD speaker Ingo Feldner, Project Lead for Virtual #Hardware Platforms at @RobertBoschGmbH 📅 Join hi… twitter.com/i/web/status/1…

24th February 2021
IoTWorldToday, IoTWorldSeries

Developing IoT Applications with Rust: Using a Rust Development Environment dlvr.it/RtNqrk https://t.co/wOmnoz2UVT

24th February 2021
IoTWorldToday, IoTWorldSeries

Chip-Enabled Edge AI Drives Next-Gen IoT dlvr.it/RtKcMQ https://t.co/dLjBzE6Qei

23rd February 2021
IoTWorldToday, IoTWorldSeries

The eSIM Cookbook – Towards the Next Generation of Connected Devices dlvr.it/RtG5bB https://t.co/5kXa8Pnv4T

22nd February 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X